Question
Question 2 Kero Data Services (KDT) has recruited new employees to be able to serve their expanding clientele better. The manager, Mr. Okello wishes to
Question 2 Kero Data Services (KDT) has recruited new employees to be able to serve their expanding clientele better. The manager, Mr. Okello wishes to provide computers to their new employees and has emphasized that these computers should be connected to the company's computer network. Mr.Okello has asked the Systems Administrator to sensitise the new employees about cache memory, Random Access Memory(RAM) and clipboard which are key terms related to computer memory. Additionally, Mr. Okello wishes that the new employees are able to connect peripheral devices to the computer through the Universal Serial Bus (USB) since he is aware that the USB has several advantages. Mr. Okello has requested the systems administrator to come up with computer security measures for the new users in order to protect company data. As a system's administrator, you have been requested to sensitise the new employees about the issues which Mr. Okello raised. Required: (a) Explain to the employees the following terms in relation to computer memory: (b) (i) Briefly describe any threeperipheral devices that can be connected (i) Cache memory (ii) RAM (iii) Clip board to the computer using a USB port. (3 marks)
(ii) Explain anythreeadvantages of using a USB port over other ports provided on the system unit. (6 marks)
(c) Describe any four computer security measures for the new users of the computer system.
Question 3 (a) Computer hardware and software have evolved over the years. Notably, computers have been reducing in physical size, increasing in memory capacity and getting more powerful over the different computer generations. There has also been evolution of software suites. Furthermore, different types of computer software have become complex and demand for huge resources (memory) in order to perform the task at hand. Required: (i) Describe any five computer generations and for each generation identify a unique feature of internal operation and processing. (10 marks) (ii) Explain the three major types of computer software giving examples. (6 marks) (b) Software suites have been recognised as a significant evolution of software and in-fact many companies today have shifted to purchasing software suites. Required: Explain: (i) the meaning of a software suite. (ii) anythree advantages of using software suites. Question 4 Save Micro Finance Ltd (SML) has branches across the country and has embarked on a project at the head office to link all branches by establishing a computer network. However, for any computer network to work efficiently, a suitable network topology has to be put in place. Required:
(a)Suggest a suitable type of network that SMLshould adopt in order to link all the branches in the country. (2 marks)
b)Explain four reasons why you would recommend the identified type of network in (a) (i) above. (8 marks)
c)Suggest the best network topology that SMLhas to use in-order to effectively link all the branches. (2 marks) d)Explain three reasons why you suggested the topology in b (i) above. (6 marks)
e)Discuss two likely disadvantages of the network topology you suggested in (b)(i) above
Question 5 World over, the Internet is an essential and valuable tool for many successful businesses in the 21st century. In Uganda many organisations have embraced internet connectivity in their offices. The management Pafsa Ltd would like to have internet installed in their offices so as to benefit from using internet services, and also be able to use cloud computing. However, although the internet can enhance the work environment, it also has negative aspects for instance internet misuse has infiltrated offices. It has been reported that employees abuse internet usage knowingly or unknowingly. You have been invited to sensitise staff of PafsaLtd about internet applications, cloud computing and internet abuse.
Required: a)Explain to the staff of Pafsa Ltd any: four services on the internet they will be able to use. (8 marks)
ii)two ways how employees may abuse internet. (4 marks) iii)fourbenefits the company will gain from using cloud computing.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started