December 2017 Holiday Assignment

December 2017 Holiday Assignment

<p> DECEMBER 2017 HOLIDAY ASSIGNMENT COMPUTER STUDIES </p><p>INTERNET & E-MAIL</p><p>1. The first computer Network was set up by ARPA in the United States of America. What is the full meaning of the acronym ARPA 2. Your manager wishes to be connected to the Internet. He already has a powerful personal Computer (PC), a printer, and access to a Telephone line. However, he understands that he will need a Modem. State why a modem is required to connect him to the internet. 3. The Internet connects millions of computers and telecommunication devices that have different hardware and software configurations. For these incompatible devices to be able to communicate, a protocols? b) Name the two most common protocols for the Internet, and state their functions. 4. a) Explain the following terms as used in internet: i) Website ii) Browse/Surf the web. 5. a) What is meant by the term e-learning? b) A school intends to set-up an e-learning system. List three problems that are likely to be encountered. 6. a) Identify the parts of the following e-mail address labelled A, B, C and D </p><p> lat @africaonline . co.ke</p><p>A B C D</p><p> b) Mention two examples of e-mail software. 7. Discuss four advantages and two disadvantages that electronic mails have over regular mails. 8. a) What is a search engine? 9. Briefly describe four factors contributing to Internet access and growth in Kenya. DATA SECURITY & CONTROL 1. Differentiate between data security and data integrity. 2. a) Define the term Computer crime b) Explain the meaning of each of the following with reference to computer crimes. 3. Outline four ways of preventing piracy with regard to data and information. 4. a) What is a Computer virus? b) i) State two ways through which computer viruses may be controlled. ii) Explain how each of the two ways listen in b (i) above assist in controlling computer viruses. 5. Computer systems need maximum security to prevent an unauthorized access. State six precautions that you would expect an organization to take to prevent illegal access to its computer-based systems. 6. Give four rules that must be observed in order to keep within the law when working with data and information. 7. An individual has a right to demand guarantee to privacy of personal information stored on a computer. Give three such types of information.</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us