💻 COMPUTER SYSTEMS FOR BUSINESS MAY/JUNE 2020 LEVEL TWO PAST QUESTION | Armstrong Computers If you're preparing for the Computer Systems for Business May/June 2020 exam, this blog post is for you! 💡 We've collected and curated a selection of past questions from levels one and two, complete with answers, to help you ace your exam.
🖨️Download and Print for Hands-on Practice!🔥
INFORMATION AND COMMUNICATION TECHNOLOGY QUESTIONS
MAY/JUNE 2020
LEVEL TWO
SUBJECT: COMPUTER SYSTEMS FOR BUSINESS
SECTION A
Answer all questions in this section
Protection Against New Threats Cyber threats, including viruses, malware, and ransomware, are constantly evolving. Regular updates ensure that the antivirus software has the latest virus definitions and protection mechanisms to detect and neutralize new threats.
Improved Security Features Updates often include enhancements and new features that improve the software’s ability to protect against sophisticated attacks. This ensures the antivirus software remains effective against emerging security vulnerabilities.
Patch Security Vulnerabilities Updates can fix bugs and close security gaps that could be exploited by malicious actors to compromise the system.
Star Topology In a star topology, all devices are connected to a central hub or switch. The hub acts as a central point for data transmission.
Ring Topology In a ring topology, each device is connected to two other devices, forming a circular data path.
Mesh Topology In a mesh topology, each device is connected to every other device in the network, Data can be transmitted directly between any two devices, providing multiple paths for data transmission.
The Internet is a global network of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to link devices worldwide.
The Web, or World Wide Web, is a service that operates over the Internet. It consists of a vast collection of interconnected documents and resources, linked by hyperlinks and URLs. The Web uses HTTP (Hypertext Transfer Protocol) to access data on the Internet.
- Resource Sharing
- Data Accessibility
- Enhanced Communication
- Centralized Management
- Increased Efficiency and Productivity
- Planning
- Analysis
- Design
- Implementation
- Testing
- Deployment
- Maintenance
the CPU, often referred to as the "brain" of the computer, is responsible for executing instructions and processing data. It performs arithmetic and logical operations, controls system functions, and manages communication between hardware components.
-
Three Basic Parts of CPU
- Arithmetic Logic Unit (ALU)
- Control Unit (CU)
- Registers
- Touch Screen Acts as an input device by detecting touch and gestures. Functions as an output device by displaying information and graphical content.
- Fax Machine Serves as an input device by scanning documents for transmission. Functions as an output device by printing received documents.
- Use Strong Passwords Implement complex passwords and change them regularly to prevent unauthorized access.
- Install and Update Security Software Use antivirus, anti-malware, and firewall software to detect and prevent threats.
- Enable Encryption Encrypt sensitive data to protect it from unauthorized access during storage and transmission.
- Regular Backups Perform regular backups of important data to protect against data loss from hardware failure or cyberattacks.
- Educate Users Provide training on safe computing practices, such as recognizing phishing attempts and avoiding suspicious downloads.
- A LAN is a network that connects computers and devices within a limited geographical area, such as an office, school, or home.
- A WAN is a network that spans a large geographical area, often across cities, countries, or continents.
- A MAN is a network that covers a larger area than a LAN but smaller than a WAN, typically encompassing a city or metropolitan area. It connects multiple LANs within a region to facilitate data transfer and communication.
- A CAN is a network that connects multiple LANs within a limited geographical area, such as a university campus, industrial complex, or business park. It is designed to facilitate data communication and resource sharing among various buildings or departments within the campus.
When a computer goes into a deadlock, a Cold Boot (Hard Boot) is preferred because it resets the entire system, breaking the deadlock and allowing the computer to start afresh.
SECTION B
Answer all questions in this section
- Input This stage involves collecting and entering raw data into the computer system. Data can be gathered through various input devices such as keyboards, scanners, and sensors.
- Processing The data entered during the input stage is processed and manipulated to produce meaningful information. This can involve calculations, comparisons, sorting, and other data transformation techniques.
- Storage Processed information is stored for future use. Storage can be temporary (in RAM) or permanent (on a hard drive, SSD, or cloud storage).
- Output The processed information is presented to users in a readable and understandable format. Output can be visual, printed, or electronic.
- Feedback This stage involves evaluating the output and making necessary adjustments or corrections to the input and processing stages. Feedback ensures accuracy and continuous improvement in the information processing cycle.
- Education
- Healthcare
- Finance
- Retail
- Transportation
- Manufacturing
- Entertainment
- Communication
- Government
- Agriculture
- A Desktop Computer is a stationary device designed for use at a single location. It typically includes a separate monitor, keyboard, and mouse, and is suitable for both home and office use.
- Laptop Computer is a portable computer that integrates the components of a desktop, including a monitor, keyboard, and battery, into a single compact unit. It is ideal for mobile use and on-the-go productivity.
- Tablet Computer is a portable device with a touchscreen interface, typically larger than a smartphone. It is used for browsing the web, reading, and multimedia consumption and can have optional keyboards.
- Netbook is a smaller, lighter, and less powerful version of a laptop designed primarily for internet browsing and basic computing tasks. It is highly portable and energy-efficient.
- Mainframe computers are powerful and large-scale systems designed to handle and process large volumes of data. They are used by large organizations for critical applications, bulk data processing, and transaction processing.
- Supercomputers are the most powerful computers available, capable of performing trillions of calculations per second. They are used for complex scientific computations, weather forecasting, and simulations.
- Minicomputers, also known as mid-range computers, are smaller than mainframes but more powerful than personal computers. They are used in businesses for tasks such as database management and transaction processing.
- Microcomputers, also known as personal computers, are designed for individual use. They are suitable for a wide range of tasks including word processing, internet browsing, and gaming.
- Alphanumeric Keys
- Function Keys
- Control Keys
- Navigation Keys
- Numeric Keypad
- Printer
- Graphics Card
- Sound Card
- Network Adapter
- Resolution The number of pixels on the screen, affecting image clarity and detail. Higher resolution provides sharper images.
- Refresh Rate The number of times the screen refreshes per second, measured in Hertz (Hz). Higher refresh rates reduce motion blur and improve display smoothness.
- Panel Type Different types of panels such as IPS, TN, and VA offer varying levels of color accuracy, viewing angles, and response times.
- Connectivity The availability of ports such as HDMI, DisplayPort, and USB, which affect the monitor’s compatibility with other devices.
A printer is a peripheral device that converts digital documents and images into physical prints on paper or other media. Printers are used to produce hard copies of text, graphics, and photos.
- Character Printers They print one character at a time.
- Line Printers they print whole Line at time.
- Page Printers They print whole page at a time.
This characteristic makes ROM an essential component for storing firmware and system-level software that needs to be available immediately upon powering up the device.