December 2017 Holiday Assignment

Total Page:16

File Type:pdf, Size:1020Kb

December 2017 Holiday Assignment

DECEMBER 2017 HOLIDAY ASSIGNMENT COMPUTER STUDIES

INTERNET & E-MAIL

1. The first computer Network was set up by ARPA in the United States of America. What is the full meaning of the acronym ARPA 2. Your manager wishes to be connected to the Internet. He already has a powerful personal Computer (PC), a printer, and access to a Telephone line. However, he understands that he will need a Modem. State why a modem is required to connect him to the internet. 3. The Internet connects millions of computers and telecommunication devices that have different hardware and software configurations. For these incompatible devices to be able to communicate, a protocols? b) Name the two most common protocols for the Internet, and state their functions. 4. a) Explain the following terms as used in internet: i) Website ii) Browse/Surf the web. 5. a) What is meant by the term e-learning? b) A school intends to set-up an e-learning system. List three problems that are likely to be encountered. 6. a) Identify the parts of the following e-mail address labelled A, B, C and D

lat @africaonline . co.ke

A B C D

b) Mention two examples of e-mail software. 7. Discuss four advantages and two disadvantages that electronic mails have over regular mails. 8. a) What is a search engine? 9. Briefly describe four factors contributing to Internet access and growth in Kenya. DATA SECURITY & CONTROL 1. Differentiate between data security and data integrity. 2. a) Define the term Computer crime b) Explain the meaning of each of the following with reference to computer crimes. 3. Outline four ways of preventing piracy with regard to data and information. 4. a) What is a Computer virus? b) i) State two ways through which computer viruses may be controlled. ii) Explain how each of the two ways listen in b (i) above assist in controlling computer viruses. 5. Computer systems need maximum security to prevent an unauthorized access. State six precautions that you would expect an organization to take to prevent illegal access to its computer-based systems. 6. Give four rules that must be observed in order to keep within the law when working with data and information. 7. An individual has a right to demand guarantee to privacy of personal information stored on a computer. Give three such types of information.

Recommended publications