1. The ________will enable users to optimize personal computers.
    1. utility routines
    2. operating system
    3. device drivers
    4. programming languages
  2. The service needed to transfer or upload files on the Internet Service Provider is called
    1. HTTP
    2. FTP
    3. IP
    4. HTML
  3. The first computing device used to perform arithmetic calculations is
    1. Weaving loom
    2. Slide rule
    3. Napier’s bones
    4. Abacus
  4. Software systems are developed using
    1. antivirus tools
    2. operating systems
    3. programming languages
    4. word processing
  5. Identify the correct rule for HTML tags from the following
    1. Do not use < and > symbols
    2. Symbols and tag text should be spaced.
    3. There should always be an opening and closing tag.
    4. All tags must start eith equal signs (=).
  6. A row in a database table that contains information about a given person, event, product ot asset is a
    1. field
    2. record
    3. key
    4. mask
  7. The important way to prptect data and other computer network resources is referred to as
    1. decoding
    2. backup
    3. zipping
    4. encryption
  8. The views that enable a user to rearrange the order of slides are:
    1. Outline view
    2. Slide sorter view
    3. Notes page view
    4. Slideshow view
    5. Normal view
      1. 1,2,3
      2. 2,3,4
      3. 3,4,5
      4. 1,2,5
  9. A computer that is not connected to a network is caleed a
    1. Stand-alone
    2. Client
    3. Server
    4. Terminal
  10. Publishing a webpage means;
    1. Creating files and placing them on a webserver
    2. Creating an advert and placing it in a Newspaper.
    3. Web content is printed directly from the source document
    4. The source documents are merged to webserver contents.
  11. Which one of the following is not a storage device?
  1. Flash Disk
  2. Memory card
  3. Hard Disk
  4. Motherboard

12. A good password contains

  1. very few characters
  2. text and numbers
  3. common words or names
  4. only numbers

13. A light pen facility can best help computer users to

  1. draw pictures
  2. play computer games
  3. convert hardcopy text into bit-mapped image forms
  4. mark examinations on a computer

14. In document production, a font is

  1. data of the same field.
  2. characters of the same face and shape.
  3. data of the same record.
  4. characters in the same document and file

15. The error message that will appear in a cell when the formula used contains a function which is not recognized in spreadsheet is

  1. ###
  2. #VALUE
  3. #NAME?
  4. #REF!

16. The process of checking whether essential computer peripherals are attached and operational is called

  1. configuration
  2. CMOS
  3. POST
  4. defragmentation

17. Which of the sets below contains characteristics of advancement in computer technology?

  1. Smaller in size, faster and more expensive.
  2. Bigger in size, faster and cheaper.
  3. Bigger in size, more expensive and faster.
  4. Smaller in size, faster and cheaper.

18. Computer maintenance, upgrade and configuration utilities are accessed through

  1. control panel.
  2. network manager
  3. system registry
  4. my computer

19. The lowest level language of a computer is

  1. BASIC
  2. FORTRAN
  3. MACHINE
  4. COBOL

20. The abbreviation MIS in system analysis stands for

  1. Memory Interface System
  2. Management Information System
  3. Memory Interface Structures
  4. Management Information Support

21. a) What is meant by Computer Evolution?
b) Use the terms below to complete the statements (i) to (iv)

  • Data processing
  • Information
  • Computer
  • Data
  • Hard disk
  • Information technology
  1. An electronic device that accepts data input, processes it, outputs the desired information and stores the result is.
  2. The conversion of data into information is
  3. Raw facts or figures that are of little meaning until they are sorted in a useful way are called?
  4. Processed data that has meaning and is useful to the human being is?

     c) Give two examples of how computer are used in each of the following sectors
     i) Health
    ii) Security

 

22. a) Define the term computer hardware
b) Fill in the appropriate category of the hardware devices from the given list: Input, Output, Storage, Communication.

Hardware Device

Category

  1. Compact Disk
 
  1. MODEM
 
  1. Projector
 
  1. Barcode Reader
 


c) Explain the functions of the computer components below

  1. Power supply Unit
  2. ROM chip

23 a) i) What is a wild card in database management systems?

     ii)Give one importance of a wild card in a query criterion.
     iii)Name one example of the frequently used wild cards.

    b) i) State one characteristic of a label when placed in a spreadsheet cell.
    ii) Outline three uses of electronic spreadsheets.

24. a) i) State any two ways a systems administrator can prevent access to some information on the Internet.

        ii)Give three reasons for preventing access to such information.

      b) i) Explain the term data transmission media in computer networks.

         ii) List three examples of computer data transmission media.

25 a) Give the importance of the following features in word processing .

  1. Footnote
  2. Toggle Case

    b) Distinguish between Cut and Copy editing features of a word processor.

    c) What is presentation software?

   d) Outline two areas where presentation software may be used.

26.a) Explain the function of each of the following programming concepts:

     i) Termination
    ii) Varaible declaration

   b) State the use of a complier to a programmer.

   c) Explain the term device drivers as applied to computers

   d) Give any two forms of interfaces that can be provided by an operating system to the computer user.

 

27. a) Assuming that an organization is faced with a challenge of choosing between a peer-to-peer network and a server-based network, outline five factors to consider before the final decision is made.

      b) Explain any five limitations to full Internet use in Uganda.

28 a) Describe any five factors a Headteacher should consider before buying computers for a school.

    b) Explain five ways in which computer hardware should be taken care of.

29. Describe five conditions that can lead to a computer system re-boot.