Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. a.brieftly discuss two important computer technological development and their

ID: 3914270 • Letter: 1

Question

1. a.brieftly discuss two important computer technological development and their societal impacts.
b. List and discribe two necessart qualities information shoulf posses.

2. a. Briefly describe the steps in the machine cycle
b. Describe two trends in computer hardware.

3. briefly explain what type of software is SPSS?

4. a. Differentiate between application software and system software. Give two examples of each.

b.The use of the mail merge feature to send a standard document to many recipient requires that there exist a main document and a merge document. Describe the main characteristics of each document.

c. For a main document thar contains five pages and requires that this document be sent to 20 recipients, explain many pages will be generated for the final merge document.

d. Oscar has a set of data in a MS Excel Workbook in rangr A1:C6 regarding different scores for Marlon in various cricket matches. List the steps to guide Oscar to enable him to create a bar chart in MS Excel.

5. Define SDA and state two input devices currently used to facilitate such. Give two advantage

6. Define the term network bandwidth and topology.

7. Explain two measures that can be employed by the company to secure its data and information.

Explanation / Answer

Ans:

[6]

Network Bandwidth: Network Bandwidth is the capacity of a network communications link (wired or wireless network) to transmit those greatest sum of information from one perspective to another workstation system alternately over a computer network in a given amount of time.

Network Topology: A network topology is the course of action of a network or we can call it the arrangements of networks, including its hubs and interfacing lines. There are two approaches of characterizing network geometry: the physical topology and the signal topology. The physical topology of a system is the real geometric design of workstations. There are several common physical topologies, as satar, mesh, bus , etc.

Ans:

[7]

Security of the data and information from unauthorized user is a major task that every company faces in todays time. The advancement of the hackers made it even more difficult for them. In order to prevent this, the company needed to apply some security measures:

{1} Basic System Security Measures: The computers at the workstation should be equipped with basic features of security which provide initial support to the company's data and information. These features include:

1. Strong Passwords: The computers should be password protected with strong password so that it can't be hacked easily.

2. Firewall Protection: Firewall provides security from the unauthorized sites and network interference to the computer. It only allows those incoming connections necessary to fulfill the business need.

3. Malware Protection: The system should be updated with latest malware protection.

{2} Intermediate Security Measures: The system should have intermediate security measures which varies from high level to critical level security. They are as follows:

1. Authorization and Authentication: The user can access the system only after Authorization and Authentication process of the company.

2. Log Records: The company should keep track of each and every record happening in their premesis.

3. Update and maintanace of the system: The system should be updated on regular basis.

Ans:

[4] [a]

The major difference between application software and system software are as follows:

Ans:

[4][b]

Main document: In a mail-merge operation for Word, this will be the archive that holds the content Furthermore graphics that are the same for every rendition of the consolidated document, for example, those return address or those salutation in a form letter.

Merged document: This is the resulting document or report that you accept when you blend your mail-merge main document with your location rundown list. The resulting document make the printed consequence or another expressions report that holds the blend effects or merge results.

Ans:

[2][a]

A machine cycle comprises of the steps that a computer’s processor executes whenever it receives a machine dialect direction instruction. Those four steps which the CPU carries out to each machine dialect instruction are: fetch, decode, execute, and store. These steps are performed by the control unit.

1. Fetch: The CU requests the instructions from the primary memory as indicated by the program counter or instruction counter.

2. Decode: Gained info would decoded in the instruction register. This includes breaking those operand field under its parts dependent upon those instruction’s operation code (opcode).

3. Execute: This includes the instruction’s opcode as it tags the CPU operation obliged. The system counter demonstrates the instruction arrangement to machine. These info are orchestrated under those instruction register

4. Store: After all the process the information is stored in the memory.

Application Software System Software 1. For performing specific task the user uses application software. 1. It is used for operating system hardware. 2. The user interacts with the application software 2. The user did not interact with the system software as it runs in the background of OS 3. User install it in their system according to their own requirements 3. This system is installed in the sytem as per the operating system requirements. 4. Application software can’t run independently. They need a base to run the application 4. System software can run independently. It provides the base for the application software.