ICT Theory 2017 July Knec Past Paper

(a) State two types of Random Access Memories as used in computer systems.
(b) Outline two functional differences between impact and non-impact printers.
Outline four reasons why a computer system may fail to boot.
Explain the function of each of the following features of word processing applications:
(a) section break;
(b) hyphenation.
4. (a) Mike intends to show a few selected slides out of the many slides he created using a presentation software. Describe the software feature he could use to achieve his objective. (2 marks)
(b) Explain the function of slide orientation feature as used in presentation programs. (2 marks)
5. A company has installed a tailor made software for their inventory control system.
(a) Explain the terms tailor made software. (2 marks)
(b) Outline two advantages that the company could derive by using the software. (2 marks)
6. Explain the circumstance under which each of the following spreadsheet features would be applied on a spreadsheet document:
(a) print titles; (2 marks),
(b) freeze panes. (2 marks)
7. An organization has laid down fiber optic cable for the networking of its branches across Kenya.
Explain two benefits the company is likely to derive from this move. (4 marks)
8. Differentiate between serial and direct file organisation methods. (4 marks)
9. (a) The following arc computer system resources that Maendeleo United Front organization possesses: Drivers, word processors, routers, scanner.
Classify the resources as either hardware or software. (2 marks)
(b) State two ways of ensuring the safety of stored data on a CD-RW

10. The social media sites over the Internet have become popular among the young people in Kenya.
Explain two disadvantages the media could pose to the young people.

(Visited 271 times, 1 visits today)
Share this:

Written by