Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

UGANDA NATIONAL EXAMINATION BOARD

SUBSIDIARY ICT 850/1


UACE 2019 MARKING GUIDE
1. (a) Define the term computer. (02 marks)
 This electronic device that accepts data, process it, store and output
information.
 A programmable electro-mechanical device that accept data, stores it,
process it, retrieves it and output information.
 A general-purpose machine that performs tasks in response to
instructions given to it and stores information.

(b). Give any three peripheral devices of a desktop computer.

 Keyboard
 Mouse
 Joystick
 Modem
 Flash diskette
 Monitor
 Printer
 Digital speakers
 Digital projector
 Bar code reader
 Light pen
 Optical mark reader
 Optical Character Reader
 Game pad
 Stylus and tablet
 Wi-Fi Router
 Magnetic ink character reader
 External hard drive Any 03x01=03 marks

UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 1 of 12


2. (a) State one reason why a computer laboratory should have:(03 marks)
(i) A good lightening system
 To avoid accidental damage of equipment.
 To reduce of the eye/sight effects to the computer user.

(ii) A well ventilated environment


 To provide a conducive working environment.
 To enable proper inlet of fresh air in the laboratory so as to
reduce on over heating of the room.
(iii) Appropriate furniture
 To provide firm placement of equipment.
 To provide a proper sitting posture to reduce health
complications.

(b) Give two measures a computer laboratory technician should put in place
to improve on electricity power security.

 By putting uninterruptible power supply.


 By installing power surge protectors.
 By putting in power stabilizer
 By installing fire alarms.
 By putting up circuit breakers. Any 02x01=02 marks
3. Outline the negative impact of ICT on the following sectors:
(a) Economic sector
 Has worsened the rates of unemployment.
 Resulted into industrial espionage
 Facilitates forgery
 Causes unnecessary competition hence duplication of
products.
 Has resulted into hacking Any 2x1=2marks
(b)Social sector.
 Has resulted into increased pornography in society.
 Has resulted into cultural erosion
 Increased permissiveness
 Increased forgery and impersonation
 Hacking
 Cyber crime Any 3x1=3marks
UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 2 of 12
4. (a) Describe the booting process of a computer.

 When power is supplied an electric signal is sent to the


motherboard and other devices located in the system unit.
 The CPU resets itself and looks for the ROM that
contains the BIOS.
 The BIOS executes the POST to ensure that all the
computer hardware is connected properly. checks for the
connected devices
 The results of POST are compared with data on the
CMOS chip.
 The BIOS looks for boot loader that loads the operating
system.
 The boot loader loads the kernel of the operating system
into RAM.
 The OS loads the configuration information and then
displays desktop icons. Any 3x1=3marks
Or
 Press the power switch
 Press the power button on the system case
 Switch on the monitor
 Enter the password Any 3x1=3marks
Note: The procedures should be in a proper order.

(b) State two possible consequences a computer may encounter


whenever improper shut down is done.

 Corrupt of the operating system


 Unsaved files will be lost
 Damage of the hard disk drive
 Computer takes long to reboot Any 2x1=2marks

UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 3 of 12


5. Identify the following input devices: (05 marks)
A. Mouse
B. Track point
C. Touch pad
D. Joystick
E. Light pen
6. Differentiate between system files and document files. (02 marks)

System files are files for permanent use and enable execution of other
computer files.
While
Document files are files created using document programs or text related
applications such as Microsoft word.

(b) Give any three circumstances under which a computer user may
choose the option save as from a file menu.

 When saving a file for the first time.


 In case one wants to change the file location.
 When saving a file to a given specific location.
 In case a user wants to give a file a defined file name.
 In case one wants to choose a specific file type.
Any 3x1=3marks
7. (a) Distinguish between primary storage and secondary storage.
(02marks)
 Primary storage is that stores data temporary and can easily be
accessed by the CPU.
 While
 Secondary storage is that stores/keep/retain data permanently or
semi-permanently.

(b) Name one example of primary storage and two examples of


secondary storage.
(i) Primary
 RAM (Random Access Memory)
 ROM (Read Only Memory) Any 1x1=1mark

UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 4 of 12


(ii) Secondary
 Hard disk drive
 Compact disc
 Floppy diskette
 Digital Versatile Disc
 Jazz diskette
 Flash diskette
 Zip diskette
 Memory card
 Modem Any 2x1=2marks

8. (a) Describe a Graphical User Interface (GUI). (02 marks)

 This is where a user interacts with a computer system by use of


graphical images and icons to issue commands. Such as windows
operating system.
(b) State one function of each of the following desktop icons.
(03marks
(i) My computer
 Storage location for computer files and access of other storage
partitions in a computer memory.

(ii) Recycle bin.


 Storage location for temporary deleted files.

(iii) My documents
 Default storage location for computer files.

9. Define the following terms in relation to computer data processing:

(a). Processor speed. (02 marks)


 This is the rate of time taken by the CPU to execute given tasks/
instructions.
(b). Fetching. (01 mark)
 This is the act of capturing or retrieving an instruction from the
computer memory for execution.
UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 5 of 12
(c). Decoding. (02 marks)
 This is the act of comparing the retrieved command waiting to be
executed by the CPU.

10. (a) Explain any two elements of the “off-the-shelf” software.

 Machine independent, they can run on almost all the computer


platforms.
 User friendly, support a number of users and can easily be interacted
with.
 Have a clear syntax, designed in a simple programming language.
 Flexibility, meet a number of tasks and can easily switch from one to
another.
 Suitability, meet the purpose are basically designed for.
 Availability, readily available and can easily be accessed.
Any 2 well explained x1=2marks

(b) Give one example of the “off-the-shelf” software.


 Microsoft office Applications
 Computer games
 Avast antivirus
 Operating system Any 1x1=1mark

11. (a) List any two requirements for internet connection.


 MODEM
 Wi-Fi router
 Computer
 ISP (Internet Service Provider) Any 2x1=2marks

(b) Outline three advantages of internet connectivity.

 Enables convenient communication.


 Provides a wider geographical connection/link.
 Provides convenient learning platform.
 Eases online buying and selling (E-commerce)
 Provides wider research information. Any 3x1=3marks
UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 6 of 12
12. (a) State one function of each of the following utility programs:
(i) Diagnostic utility. (03 marks)

 This is a form of service program that detects physical and


logical problem with computer devices and provides a
report.
(ii) File Compression Unity.
 This is a form of service program that helps to reduce the
size of computer files in a computer memory.

(iii) Antivirus utility.


 This is a form of service program that detects and removes
malicious programs.
 This is a computer program that detects and removes
computer malware.
 This is a computer program that helps to detect, scan and
remove computer virus.

(b) Outline two ways of reducing the spread of computer viruses.

 Scanning all downloads from internet before use.


 Scanning all storage media before attaching them to a
computer system.
 Installing antivirus utility/ software.
 Avoid using pirated software/ using only copyrighted
software
 Avoiding sharing storage media. Any 2x1=2marks

13.(a) Write WWW in full as used in internet technology. (01 mark)


 World Wide Web
(b) Distinguish between a web browser and a search engine.
(02 marks)
 Web browser is a program that enables to access and view contents of a
website. Whereas
 Search engine is an application program that enables to access/locate/look
for information by use of a keyword.

UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 7 of 12


(c) Give an example of a:
(i) Web browser
 Mozilla fire fox
 Opera mini
 Google chrome
 Internet explorer
 Apple safari Any 1x1=1mark
(ii) Search engine
 Google
 Bing
 Ask. Com
 Yahoo
 Yandex.ru
 Duck duck go
 Baidu
 Internet archive Any 1x1=1mark

14. (a) Differentiate between IP address and Domain name. (02 marks)

 IP address is a number /numeric code that unique identifies a


computer on a communication network. Such as 162.225.25.1
Where as
 Domain name is a text version that uniquely identifies a
computer on a communication network.

(b) Describe each of the following protocols in relation to data


communication: (03 marks)

(i) Simple Mail Transfer Protocol (SMTP)


 This is a communication protocol that manages the
transfer of electronic messages from on computer to
another.

(ii) Post Office Protocol (POP)

 This is a standard protocol that manages the access


and retrieval of electronic mails from the mail server.
UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 8 of 12
(iii)
Hyper Text Transfer Protocol (HTTP)
 This is a network protocol that enables the transfer of
files such as text, graphics images, audio, video and
other multimedia files on the World Wide Web.
15. (a) Outline any three violations of computer ethics usage by computer
users.
 Hacking into people’s information using computers.
 Distributing pornography
 Duplication of computer software
 Impersonation
 Cyber bullying Any 3x1=3marks

(b) Suggest two measures that should be put in place to guard


against information piracy in an organization.

 By use of callback systems


 By use of biometric devices
 By use of a strong password
 Using a firewall.
 Carrying out data encryption. Any 3x1=3marks

16. List five elements of data communication. (05 marks)

(i). Sending device


(ii). Receiving device
(iii). Data /message/information
(iv). Transmission channel/ communication channel
(v). Protocol
(vi) . Communication device

UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 9 of 12


17. The table below shows a budget for an introduction ceremony.

A B C D E
1 TOTAL COST TOTAL COST
IN SHS IN £
ITEM UNIT COST QUANTITY
2 Cultural dress 180,000 2
3 Food 3,500 150
4 Decoration 1,200,000 1
5 Soda 19,000 13
6 Mineral water 15,000 5
7 Exchange
rate of £1 4,630

(a) Which (((a) which computer application was used to design the given
budget?
(02 marks)
 Spreadsheet Application Or Microsoft Excel

(b) Identify the cell formatting feature which was applied to contents in
D1 and E1. (01 mark)
 Wrap text
(c) Write down the formula that would be used to compute:

(i) TOTAL COST in shillings (shs). (01 mark)


 =B2*C2
(ii) TOTAL COST in pounds (£). (Use the exchange rate in cell B7).
(02 marks)

 =D2/B7 or = (B2*C2) /B7

18. Describe any five tasks that are performed by digital forensic
specialists.

 Condoning scene of crime


 Providing evidence in courts
 Analyzing bio-data
 Re-establishing scenes of crime
 Recovering data from damaged or erased drives

UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 10 of 12


 Writing and reviewing investigative reports.
 Gathering and maintaining evidence Any 5x1=5marks

19. (a) state the use of each of the following features in presentation:

(03 marks)

(i) Slide looping.


 Helps to create a continuous visual effect until
pressing Esc
(ii) Slide transition
 Helps to create a visual movement amongst slides
(iii) Hyper link
 Helps to create a bulletin connection between slides and
elements of a slide

(b) Give one advantage of using the following in a presentation:

(02 marks

(i) Handouts.
 Helps to reduce or minimize paper wastage.
(ii) Notes pages.
 Enables to generate a printout similar to a document
file

20. (a) outline any two uses of a server in a computer network.

 Acts as a backup for data and computer files


 Provides a centralized connection to client computers
 Provides resources to client computers
 Helps to manage and monitor system security.
Any 2x1=2marks

(b) Name three types of computer networks.

 LAN (Local Area Network)


 WAN (Wide Area Network)
 MAN (Metropolitan Area Network)
Any 3x1=3marks

UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 11 of 12


END

UACE GUIDE 2019 COMPLLED BY SSEKUBULWA DANIEL Page 12 of 12

You might also like