differences in the computer training provided by colleges as opposed to those offered by the universities (3mks)(b) Describethreeduties of each of the following computer specialists :-(6mks)(i) Database administrator(ii) System analyst(c) Information technology has bought about a lot of concern in people’s lives-social effects, list three arguments for and against information technology (3mks)(d.) Repetitive strain injury happens when one overuses the computer keyboard or mouse. Causing inflammation or injury on muscles or tendons .Describe threemeasures userscan apply to prevent or reduce RSI (3mks)18. A school computer laboratory is scheduled o undergo major renovations. The lab is schedule to receive new computer whose specifications are given below:-Pentium IV 2.8GHz processor40GB HDD31/2 FDD256 MB RAM568CD ROM17” SVGA TFT monitorThe computers are gong to be networked and will be able to browse the internet.(a) Explain what is meant by the terms:-(2mks)(i) FDD(ii) HDD(iii) SVGA(iv)TFT(b) The computer is to be networked, name one extra device that should be fitted on every computer to enable this to happen (1mk)(c) The computer is to receive internet facilities through the server on a dial; up system. Nameand describe the function of a special device that needs to be connected to the server to
complete the connection (1mk)(d) (i) The school has to apply he star topology to link up the computer. List twoadvantagesof this type of topology (1mk)(ii) Name the central device used to connect the computers in this topology. (1mk)(e) List twoother types of topologies that the school could have opted for (1mk)(f) List fouradvantages of using a network (2mks)(g) (i) Data transmission via the internet is done using a mode known as packet switching. Describe this data transmission mode(1mk)(ii) Name twoother modes of data transmission (1mk)(h) (i) The school’s LAN is done using UTR cable. List twodisadvantages of using this type of cable.(1mk)(ii) List twoadvantages of using fibre cable in networking (1mk) (j) Data flows in the school’s LAN in a duplex manner. Discuss twoother type of data transmission in network giving examples (2mks)19. (a) Differentiate between a database and a DBMS (1mk)(b) List fouradvantages of using database systems (2mks) (c) In a data base system, data integrity ensures the correctness and completeness of the data in the database. Differentiate the following types of integrity constraints:-(i) Validity integrity (1mk)(ii) Entity integrity (1mk)(iii) Referential integrity (1mk)(d) Briefly describe the threedatabase models :-(3mks)(i) Hierarchical model(ii) Network model(iii) Relation model(e) Using diagrams describe the following three types of relationships (3mks)(i) One –on- one(ii) One –to- many(iii) many-to-many(f) File organisation refers to the arrangement of records on secondary storage. Briefly describe the following file organization methods:-(3mks)(i) Sequential(ii) Random /direct(iii) Serial20. (a) State and describe anytwoareas of Artificial intelligence (2mks)(b) What is virtual reality?(1mk)(c) List three
You've reached the end of your free preview.
Want to read all 75 pages?
- Fall '12
- mks, following terms