Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

INSTITUTE OF PUBLIC ADMINISTRATION AND

MANAGEMENT (IPAM)
STUDENTS’ UNION GOVERNMENT – (SUG)

MINISTRY OF EDUCATION
(1 & 2)

PAST QUESTIONS AND ANSWERS


FOR YEAR ONE (1) STUDENTS’ -

FIRST SEMESTER

ON
INFORMATION, COMMUNICATION AND TECHNOLOGY - 1 -
(ICT)

Prepared and Compiled by:


Hon. Ministers of Education 1 & 2 - (IPAM-SUG’21)

Mr. Augustine Abu Kamara (+232 76 291807)

& Mr. Fayia Peter Sahr (+232 30 499482)


NOTE: Recommended Extra - Lesson is ACADEMIC EXCELLENCE SYNDICATE, Call the above
contacts for more details AND tutorial guide.

2018
Q1. a) Differentiate between a Hardware and Software and give two (2) examples of each.

Answer
Hardware - refers to the part of the computer you can see and touch (tangible part). It consists
of interconnected electronic devices that can control everything that the computer does.
Examples of hardware are; keyboard, system unit, monitor, flash drive, screen, hard disk etc.
While
Software - refers to a set of instructions that tells the computer what to do in performing a task.
Software is the intangible part of the computer which is known as program. Examples of
software are as follows; antivirus, Microsoft word, word processing software, Microsoft
excel, Microsoft software PowerPoint etc.
b) List three (3) input devices and two (2) output devices.

Answer
List of input devices
1. Key board 4. Camera. 7. Barcode reader
2. Mouse. 5. Microphone 8. Touch pad
3. Scanner. 6. Joy stick

List of output devices


1. Monitor. 4. Plotters 7. Touch pad
2. Printer. 5. Projectors
3. Speakers 6. Ear phone

c) Redo the table below in your booklet and indicate by ticking in the most appropriate box the
category each software belongs to:
SOFTWARE APPLICATION SYSTEM
Word Processing Software yes✅
Anti-Virus Software Yes✅
Linux Yes✅
Internet Browser yes✅
Printer Driver Yes✅
Android Yes✅
Unix Yes✅
Q2. Each Generation of computers is characterized by major technological developments
that fundamentally changed the way computers operates, resulting in increasingly smaller,
cheaper, powerful, efficient and reliable devices. With reference to this discuss the
generations of computers.

Answer
Generation in computer terminology is a change in technology a computer is/was being used.
Initially, the generation term was used to distinguish between varying hardware technologies.
Nowadays, generation includes both hardware and software, which together make up an entire
computer system.
There are five computer generations known till date. Each generation has been discussed in
detail along with their time period and characteristics. In the following below, approximate
dates against each generation has been mentioned, which are normally accepted.
1. First Generation: Vacuum Tubes (1940-1956): the first computer systems used vacuum
tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire
rooms. These computers were very expensive to operate and in addition to using a great deal of
electricity, the first computers generated a lot of heat, which was often the cause of malfunctions.

2. Second Generation: Transistors (1956-1963): the world would see transistors replace
vacuum tubes in the second generation of computers. The transistor was invented at Bell Labs in
1947 but did not see widespread use in computers until the late 1950s.The transistor was far
superior to the vacuum tube, allowing computers to become smaller, faster, cheaper, more
energy-efficient, and more reliable than their first-generation predecessors. Though the transistor
still generated a great deal of heat that subjected the computer to damage, it was a vast
improvement over the vacuum tube. Second-generation computers still relied on punched cards
for input and printouts for output.

3. Third Generation: Integrated Circuits (1964-1971): the development of the integrated


circuit was the hallmark of the third generation of computers. Transistors were reduced and
placed on silicon chips, called semi-conductors, which drastically increased the speed and
efficiency of computers.

4. Fourth Generation: Microprocessors (1971-Present): the microprocessor ushered in the


fourth generation of computers, as thousands of integrated circuits were built onto a single
silicon chip. What in the first generation filled an entire room could now fit in the palm of the
hand. The Intel 4004 chip, developed in 1971, located all the components of the computer from
the central processing unit and memory to input/output controls on a single chip.
5. Fifth Generation: Artificial Intelligence (Present and Beyond): fifth generation computing
devices, based on artificial intelligence, are still in development, though there are some
applications, such as voice recognition, that are being used today. The use of parallel
processing and superconductors is helping to make artificial intelligence a reality.

Q3. a) What is the world wide web (www)?

Answer
The World Wide Web (www) is a way of accessing information over the medium of the internet.
It is an information-sharing model that is built on top of the internet.

b) Explain any four (4) uses of the internet.


Answer
Survey shows that individuals, corporations, business people, and groups use Internet primarily
as a communications vehicle as these users reduce their use of fax machines, telephones, and the
postal service. E-mail should remain at the top of the list. The Internet has continued and will
continue to change how we view the world, making it a global village.

1. Entertainments: The Internet is the most effective means of entertainment. There are various
options available on the Internet, which people can try, such as watching movies, playing online
games, listening to songs, etc. The Internet has also made it easy for people to download
entertainment items to their local storage. Using the Internet, people can also share their videos,
songs, pictures online with others. Also, nowadays, people can watch live TV or sports on the
Internet.

2. Navigation: The navigation mechanism is one of the most beneficial uses of the Internet.
Once a user put the location in the online maps (such as Google maps), it provides all the details
about that location. Users can even find the best route to visit that particular location. The map
also provides the distance between the locations. The best thing about navigation is that it will
provide the shortest possible route with less traffic. One can also search for any specific place
like the nearest hotel, restaurants, banks, ATM, etc. Apart from this, a person can share a live
location with others using the Internet and the navigation technique.

3. Advertising: Because most people use the Internet, it is the best means of promoting
something or advertising. There are options for paid promotion as well as free promotion. There
are many advertising platforms on the Internet that help promote products or businesses online.
These platforms advertise products on other related websites using banners, videos, email etc.
They charge for these advertisements according to distance, keywords and audience etc.
However, one can also use social media platforms to create online groups or communities and
advertise freely.
4. Education: Many devices can connect to the internet nowadays. This has helped
to access education via the internet in a few clicks. The best thing about the
internet, you can get educational content on different topics; hence you can study
any topic quickly. This has solved the need to look for several books to access the
desired information. Moreover, the internet has enabled many students to access
their classes through video conferencing. The students can comfortably connect to
their teachers or any professional across the world.

5. Research: Internet is very crucial in this sector. Before the internet, it was
difficult to collect information. People had to look for hundreds of books so as to
get the desired information. Nowadays, the internet has made work easy, and
researchers can get any information quickly. In research, you can study failed
research or success hence work on improvements. Indeed, the internet has
incredibly benefited many researchers.

6. Electronic mail: Electronic mail or email is also significant use of the internet.
Email has made individuals access faster communication on the internet. In an
email, people can also quickly share data files like audio, video, images, and other
kinds of files. An email has minimized the use of papers, which was the main way
of communicating in older days.

C) Discuss three (3) advantages and two (2) disadvantages of email.


Answer

Email is an instant form of business communication and it's hard to imagine a workplace that
does not rely on email for the majority of its internal and external communications. There are
numerous advantages of email communication, not least that it's fast and reliable. But email has
several downfalls to go along with its benefits that sometimes make it a challenging way to send
information.
Advantages
Fast Client Communication
When you need to get an important message to a client or business associate who is located
thousands of miles away, one of the fastest ways to do it is by email. The advantage email has
over the telephone in communication speed is that you can send attachments with an email that
contain important documents or even a presentation to clarify your message. Phone calls take
longer in general anyway, because you have to get through to the right person and catch them
when they can talk. An email, on the other hand, can be sent quickly and be waiting for them
when they're ready to review it.
Availability and Portability
The increased use of email has resulted in business people receiving hundreds of emails every
day. Yet, thousands of email messages can be archived into folders on your computer or
handheld communication device such as a cell phone to be retrieved when you need them. The
convenience of email prevents you from having to keep file folders filled with papers. It also
makes your important correspondence easily portable without lugging around unwieldy file
folders.
Reduces Shipping and Mailing Costs
Aside from the cost of your internet connection, email is free. One of the benefits of email
communication is that you can send as many messages, files, videos, documents and
presentations as you want without having to pay anything. It significantly reduces your
company's shipping and postage costs as well as the time – and the cost of that time – you or a
co-worker spend packaging documents for mailing, addressing them and getting them in the
mail.

Disadvantages
Vulnerability to Loss
It would take a manual effort on the part of someone to access all of your important printed
documents and destroy them. But all of your emails and important information can be lost with a
simple hard-drive crash. If you store your email information on another server, then you could
lose your data if that site goes down or out of business. Be sure to use a back-up method for
important emails that you want to save even for a short while, such as copying them regularly
onto a flash drive.

Accessible to Others
When someone hands you a business letter, you are the only person that receives that letter.
Never consider your emails to be private. Since email is sent over networks, it's possible that
others could gain access to them or receive them by mistake. An email can be intercepted by a
hacker or go to an incorrect email address and wind up in someone else's inbox. Therefore, be
careful what information you send in an email. If it's private information that you don't want
anyone else to see, email may not be the best communication method to use. Your sensitive
information and messages are very accessible to hackers and even unsuspecting recipients when
you use email.
Difficult to Interpret Emotions
A disadvantage of email is that people tend to treat it like a conversation because email can
happen so quickly. They begin to use slang terms and try to carry on conversations via email.
However, since email recipients cannot see each other, the emails do not have any voice
inflection or emotion that can help with proper interpretation. This can and does cause
misinterpretations of the emotion behind the email, leading to hurt feelings, anger, resentment
and many more emotions. It's a good idea to reread your emails before sending them and look for
wording that could be taken in a negative light.
Advantages of email
1. Email is a free tool, once you are online, there is no further expenses.
2.. email allows for mass sending of messages.
3. Email is simple, that is it is easy to use once you have account.
4. Email is accessible from anywhere once there is internet.
5. Email allow for easy referencing, that is messages that have been sent can be stored.
6. Email is quick, that is once you have finished composing the message sending it is simple as
clicking a button.

Disadvantages of email
1. Email cannot be ignored for a long time, when an email is ignored more and more messages
will enter the inbox which will make it no longer manageable.
2.. Email messages can contain viruses.
3. Email lacks a personal touch, that is one cannot touch it, but see it.
4. Email requires timely responses.
5. Email should be kept short and brief.
6. Email could potentially cause information overload.

Q4. Briefly describe the roles of ICT in each of the following areas.
a) Communication
b) Education
c) Health
d) Business
e) Security

Answer
Information communication technologies (ICT) at present are influencing every aspect of human
life. They are playing prominent roles in work places, business, education, and entertainment.
Moreover, many people recognize ICTs as catalysts for change; change in working conditions,
handling and exchanging information, teaching methods, learning approaches, scientific
research, and in accessing information communication technologies.
The role/ important of ICT in communication
Information and communication technology has been the order of the day, it has contributed
immensely in the transfer of information from one place or person or medium to another, using
different type of gadgets, websites and other social media.
For example, through ICT, the university of Sierra Leone uses different types of communication
models (email, Radio, Facebook, WhatsApp, telephone etc.) in bringing information to it
students and the public as well.
Mobile Telecommunications industries, Educational institutions, business organizations etc.
through ICT, they all found it very easy to send and receive information from their clients.

The role/ importance of ICT in Education


In this digital era, ICT use in the classroom is important for giving students opportunities to learn
and apply the required 21st century skills. ICT improves teaching and learning and its
importance for teachers in performing their role of creators of educational environments. ICT
helps a teacher to present his teaching attractively and able to learn from the learners at any level
of educational programmed. Today in India teaching training programmed making useful and
attractive by the term of ICT. Information and Communication Technologies (ICTs) exemplified
by the internet and interactive multimedia are obviously an important focus for future education
and need to be effectively integrated into formal teaching and learning – especially in a teacher
education institution

The role/ Importance of ICT in Health


Information and communications technologies (ICTs) can play a critical role in improving
health care for individuals and communities. By providing new and more efficient ways of
accessing, communicating, and storing information, ICT’s can help bridge the information
divisions that have emerged in the health sector in developing and new industrial countries—
between health professionals and the communities they serve and between the producers of
health research and the practitioners who need it. Through the development of databases and
other applications, ICTs also provide the capacity to improve health system efficiencies and
prevent medical errors.

Also most of the instruments and machines used in the health operations are programmed
through ICT processes. For example, x-ray machines, scanning machines, thermometer,
microscopes etc. were programmed through by ICT methods

The role/ Important of ICT in Business


Business transactions are becoming easier every day, ICT systems allow your business to
store, process, analyze and share vast amounts of data. The information available from
corporate data enables managers and employees to make decisions quickly and accurately so
that they can manage operations effectively and respond rapidly to business opportunities or
threats. Communication networks also enable decision-makers in different locations to work
together easily when they need to take joint decisions. By automating business processes and
giving employees ICT tools, your business can improve its individual and overall
productivity.
On the production line, for example, solutions such as computer-aided design can help to
reduce set-up times and improve manufacturing accuracy so that employees spend less time
on reworking. Access to manufacturing data enables managers to plan production more
effectively, making better use of resources and reducing lead times.
The role/importance of ICT in security
Information and communication technology (ICT) security measures are necessary to protect
confidential information from unauthorized use, modification, loss or release. Monitoring and
controlling access to confidential information. Safe transmission of data.
Secure storage and disposal of data Information technology plays a significant role and will
continue to strengthen the national security against future upcoming threats and cyber-attacks.
Particularly, information technology can help countries to identify potential threats, share
information easily, and protect mechanisms in them.

Q5. a) What is a network?


Answer
A network is defined as the connection of at least two computer systems, either by a cable or a
wireless connection. Or
A network is a group of two or more computers or other electronic devices that are
interconnected for the purpose of exchanging data and sharing resources.

b) Explain what is meant by a client/server network.


Answer
A client-server network is the medium through which clients access resources and services from
a central computer, via either a local area network (LAN) or a wide-area network (WAN), such
as the Internet.
Or
It is a type of network where PCs and workstations called clients are interconnected by local area
networks and share application with network servers.

c. Explain the following acronyms:

i. LAN
ii. WAN
iii. PAN
iv. MAN

Answer
I) LAN (local area network): LAN is a network contained within a small geographic area,
usually within the same building. Home Wi-Fi networks and small business networks are
common examples of LANs. LAN cover small geographic area.
II) MAN (Metropolitan Area Network): MAN is a larger network than LAN. It often covers
multiple cities or towns. It is quite expensive and a single organization may not have own it.
MAN is a network that covers cities and towns.

III) WAN (Wide Area Network): WAN is a much larger network than LAN and MAN. It often
covers multiple countries or continents. It is quite expensive and a single organization may not
have own it. Satellite is used to manage WAN. WAN is larger area network that covers
countries.

IV) PAN (Personal area network): PAN is the interconnection of information technology
devices within the range of an individual person, typically within a range of 10 meters.

2019
Q1. Critically discuss the internet with respect to its contributions to societal development.

a) Briefly explain the following terms


 Networking Hardware
 Web 2.0
 Networking Topology
 OSI Model
 Main-frame Computer
 Mini-Computer
 Database Management System
Answer

i. Networking hardware: Networking hardware, also known as network


equipment or computer networking devices, are electronic devices which are required for
communication and interaction between devices on a computer network.
Specifically, they mediate data transmission in a computer network. Units which are the last
receiver or generate data are called hosts, end systems or data terminal equipment.

ii. Web 2.0: the second stage of development of the internet, characterized especially by the
change from static web pages to dynamic or user-generated content and the growth of social
media.
.
iii. Networking topology: Network protocols are a set of rules, conventions, and data structures
that dictate how devices exchange data across networks. In other words, network protocols can
be equated to Languages that two devices must understand for seamless communication of
information, regardless of their infrastructure and design disparities.
iv. OSI model: The Open Systems Interconnection model (OSI model) is a conceptual
model that characterizes and standardizes the communication functions of
a telecommunication or computing system without regard to its underlying internal structure
and technology.
Its goal is the interoperability of diverse communication systems with standard communication
protocols.

v. Mainframe computer: a mainframe computer is a large integrated machine with a lot of


memory, a lot of storage capacity, and a lot of high-end processors. For such a large functioning,
it has a lot of computational power in comparison to normal computer systems.

vi. Minicomputer: a minicomputer is also known as mini. It is a class of small computers that
was introduced into the world in the mid-1960s. A minicomputer is a computer which has all
the features of a large size computer, but its size is smaller than those. A minicomputer lies
between the mainframe and the microcomputer because its size is smaller than the former one
and larger than the latter one. A minicomputer is also called as a mid-range
computer. Minicomputers are mainly multi-users systems where more than one user can work
simultaneously.

vii. Database management system: Database Management Systems (DBMS) are software
systems used to store, retrieve, and run queries on data. A DBMS serves as an interface between
an end-user and a database, allowing users to create, read, update, and delete data in the
database.
Q2. a) Explain why it is critical to consider the end users and other staff when designing
and implement an information system.

Answer

In business, it used to take a call to the software vendor to make even small adjustments to the
systems. With the advent of EUIS, all levels of business personnel interact directly with the
system apps. End-User Information System refers to technology that is designed to promote
collaboration, business intelligence and knowledge management, with a particular emphasis on
the human factor. EUIS improves your business value by solving business problems,
improving workplace productivity and making your business more profitable.

The End users and other staffs have both hand-on knowledge of the problems that needs to be
solved by the new software. Their expertise and proximity to the problems make them qualified
to give suggestions for how to best fix those problems. End users have experience with the
previous software application.
The end users and other staff themselves can provide feedback on general issues that are causing
problems and more importantly useful feedback on any missing features that would be of great
value in deploying the product. End users might also be asked to worked directly with
development terms.
The end users and other staff can play great roles for any given project, as the project customer,
sponsor (with authority to negotiate, authority and/or fund) and as performing members (to
participate in planning and execution).

b) Describe what is meant by end users computing, and explain under what
circumstances end user computing is the most appropriate development approach.

Answer
End-user computing: end users computing (EUC) is a term that refers to the technology that IT
professionals use to deploy, manage and secure the devices, applications and data that workers
require to perform their jobs.

In what circumstances end users computing is most appropriate?


it is mostly appropriate to build an effective user interface; all design should begin with an
understanding of the intended user, including their profiles of their age, physical ability’s
education, etc. end user development can be defined as a set of methods, techniques, and tools
that allow users of software systems, who are acting as non- professional software developers, at
some point to create, modify or extend a software artifact.
c) State three (3) types of communication Networks that businesses use to operate
around the world.

Answer
the communication Networks that business uses to operate around the world are as follow:
1. LAN (Local Area Network).
2. PAN (Personal Area Network).
3. WAN (Wide area network).
4. MAN (Metropolitan Area network).

Q3. a) State the Seven (7) layers of the OSI model in the correct order and briefly describe
the function of each layer.

Answer
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to
describe the functions of a networking system. The OSI model characterizes computing
functions into a universal set of rules and requirements in order to support interoperability
between different products and software. In the OSI reference model, the communications
between a computing system are split into seven different abstraction layers: Physical, Data
Link, Network, Transport, Session, Presentation, and Application.

The Seven (7) Layers of the OSI Model are:


1. Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw
unstructured data bits across the network from the physical layer of the sending device to the
physical layer of the receiving device. It can include specifications such as voltages, pin layout,
cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as
network hubs, cabling, repeaters, network adapters or modems.

2. Data Link Layer


At the data link layer, directly connected nodes are used to perform node-to-node data transfer
where data is packaged into frames. The data link layer also corrects errors that may have
occurred at the physical layer.

The data link layer encompasses two sub-layers of its own. The first, media access control
(MAC), provides flow control and multiplexing for device transmissions over a network. The
second, the logical link control (LLC), provides flow and error control over the physical medium
as well as identifies line protocols.

3. Network Layer
The network layer is responsible for receiving frames from the data link layer, and delivering
them to their intended destinations among based on the addresses contained inside the frame.
The network layer finds the destination by using logical addresses, such as IP (internet protocol).
At this layer, routers are a crucial component used to quite literally route information where it
needs to go between networks.

4. Transport Layer
The transport layer manages the delivery and error checking of data packets. It regulates the size,
sequencing, and ultimately the transfer of data between systems and hosts. One of the most
common examples of the transport layer is TCP or the Transmission Control Protocol.

5. Session Layer
The session layer controls the conversations between different computers. A session or
connection between machines is set up, managed, and termined at layer 5. Session layer services
also include authentication and reconnections.

6. Presentation Layer
The presentation layer formats or translates data for the application layer based on the syntax or
semantics that the application accepts. Because of this, it at times also called the syntax layer.
This layer can also handle the encryption and decryption required by the application layer.

7. Application Layer
At this layer, both the end user and the application layer interact directly with the software
application. This layer sees network services provided to end-user applications such as a web
browser or Office 365. The application layer identifies communication partners, resource
availability, and synchronizes communication.

b) Explain the difference between the TCP and UDP protocols. Provide an example of an
application that uses TCP and an application that uses UDP.
Answer
If you are just starting with TCP/IP, then you are probably wondering why there are two
transport layer protocols- (TCP and UDP).

Why don’t we just have one? After all TCP seems to be the best option anyway.

The aim of this short introductory tutorial is to explain the basic differences between the two and
why each protocol is needed, and when they are used.
Both TCP and UDP sit at the transport layer of the TCP/IP protocol stack and both use the IP
protocol.

Applications are designed to use one or the other protocol depending on their requirements.

TCP- Transmission Control Protocol


TCP is a connection orientated protocol with built in error recovery and re transmission.
You can liken a TCP connection to a telephone connection.
With a telephone connection you first need to setup the connection by dialing the number, and
once the calling party answers you have a both way communications channel.
You then proceed to speak and once done you hang up the connection.

TCP is used by application protocols that need guaranteed message delivery.


HTTP, FTP, SMTP, POP3, IMAP4 and many other common Internet application protocols use
TCP.

While

UDP is a connectionless protocol.


You can liken UDP to email or the normal post.
With email or a written message, you send your message, but have no idea whether or not that
message was received.

UDP does not correct or recover errors in the message. Any error detection and recovery is the
responsibility of the receiving application.
Because there is no connection setup, UDP is faster than TCP and results in less network traffic.

In addition, it doesn’t consume resources on the receiving machine as it doesn’t hold a


connection open.

Utility applications like DNS, DHCP, RIP and others use UDP.

Q4. As we know the key goal of a computer system is to execute user programs and to
make solving user problems easier. Since bare hardware alone cannot be used, application
programs (or application software) are designed for ease of work.
These application programs therefore require the operating system. For instance, they
require certain common operations such as those controlling the I/Q devices. These
common functions of controlling and allocating resources are then brought together into
one piece of software which is the Operating System. Hence, the need for Operating
Systems to exist, as they offer a reasonable way to solve the problem of creating a usable
computing system.
a) Within the broad family of operating systems, there are generally three (3) types. List
these categories and write short notes on them, giving examples.
Answer
1. Batch operating system
2. Time sharing operating system
3. Distributed operating system
1. Batch Operating System: This type of operating system does not interact with the computer
directly. There is an operator which takes similar jobs having the same requirement and group
them into batches. It is the responsibility of the operator to sort jobs with similar needs.

2. Time-Sharing Operating Systems: Each task is given some time to execute so that all the
tasks work smoothly. Each user gets the time of CPU as they use a single system. These systems
are also known as Multitasking Systems. The task can be from a single user or different users
also. The time that each task gets to execute is called quantum. After this time interval is over OS
switches over to the next task.

3. Distributed Operating System: These types of the operating system are a recent
advancement in the world of computer technology and are being widely accepted all over the
world and, that too, with a great pace. Various autonomous interconnected computers
communicate with each other using a shared communication network. Independent systems
possess their own memory unit and CPU. These are referred to as loosely coupled systems or
distributed systems. These system’s processors differ in size and function.

b) State five (5) functions that the Operating Systems performs in solving the problem of
creating a usable computing system.
Answer
1. Prevents unauthorized access to programs and data.
2. Aids in error detection, that is production of dumps, traces, error messages, and other
debugging and error detecting aids.
3. Manages the way information is stored on and retrieve from disks.
4. Keeps track of time and resources used by various jobs and users.
5. Provides the instructions to display on the screen element with which you interact
collectively. This element is known as user interface.
6. Coordinate how programs work with the CPU (central processing unit), keyboard,
mouse, printers etc., and other hardware.
7. Control system performance.

c) Despite its capabilities, the computer still has its limitation. Discuss these limitations.
Answer

1. Computer depends on user’s inputs: Computer of itself can’t function by itself unlike
human, it only depends on the direction or command given by the end-user to perform certain
task.

2. Computer has no imagination: Computer don’t have mental intelligent to foreseen


imagination.
3. Computers work on commands: computer can’t work all by itself feeding it command or
instruction.

4. Computers are unable to correct wrong instructions:

5. Computers do not think neither do they make decisions


6. Computers do not feel
7. Computers do not have intelligence of its own to complete a task
8. Computers cannot operate without the instructions given by humans.

Q5. a) Briefly discuss the meaning of Email and state three (3) of its benefits to
organizations.

Answer
Electronic mail (email) is a method of exchanging messages (mails) between people using
electronic devices. It is also a mean or system for transmitting messages electronically (as
between computers on a network), communicating by email.

Benefits of email to an organization


1. It saves an organization money.
2. It saves an organization time.
3. It provides security to an organization information.
4. It help in filing organization documents.
5. It provides convenience in an organization.

b) Outline the steps involved in creating and Email account.


Answer
Step 1: visit google account creation page accounts. Google. Com.
Step 2: click on create account
Step 3: the sign -up form will appear. Enter your first and last name.
Step 4: choose a username for your account. (Here you can also use an existing email address).
Step 5: after choosing a username, enter a password. Type the password again to confirm. (as
per google instructions always use 8 or more characters with a mix of letters, numbers &
symbols
Step 6: at last tap on next. (right corner of the screen)
Step 7: on the next page enter your phone number to verify your account. (it is a two- step
verification process for security)
Step 8: on the given mobile number you will receive a text message from google with a
verification code. Enter the verification code and tap on verify.
Step 9: on the next page enter your DOB in the specified fields.
Step 10: choose a gender.
Step 11: Tap on next.
Step 12: read, google terms of service and privacy policy will appear on the screen and click on
the I agreed.

c) List down four (4) email protocols and explain any two (2) of them.
Answer

E- mail protocol is set of rules that help the client to properly transmit the information auto or
from the mail server. Below is the list of Four (4) main protocols.
1. SMTP: simple mail transfer protocol
2. IMAP: internet message Access protocol
3. POP: post office protocol
4. MIME: Multipurpose Internet Mail Extension

1. SMTP: simple mail transfer protocol, was first proposed in 1986. It is a standard protocol
used for sending email efficiently and reliable over the internet.

2. IMAP: internet message access protocol, was first proposed in 1986. IMAP allows the client
program to manipulate the email message on the server without downloading them on the local
computer.

3. POP: post office protocol, it is generally used to support a single client. There are several
versions of POP but the POP3 is the current standard.

4. MIME: Multipurpose Internet Mail Extension (MIME) is a standard email protocol that,
Identifies the type of information in a message or document Detects and transfers non-text data
(such as colors and pictures in email messages) in an email file for email readers, Web servers,
and browsers.

You might also like