0% found this document useful (0 votes)
30 views12 pages

Computers

The document provides a comprehensive answer key for the CS101: Introduction to Computer Science past paper, detailing questions and their corresponding answers across three sections. It covers topics such as input/output devices, operating systems, internet services, and basic computer functions. Additionally, it includes practical tasks related to using Excel and creating a Gmail account.

Uploaded by

albert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views12 pages

Computers

The document provides a comprehensive answer key for the CS101: Introduction to Computer Science past paper, detailing questions and their corresponding answers across three sections. It covers topics such as input/output devices, operating systems, internet services, and basic computer functions. Additionally, it includes practical tasks related to using Excel and creating a Gmail account.

Uploaded by

albert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Great!

Here's a full answer key for the CS101: Introduction to Computer


Science past paper, including both questions and answers.

---

SECTION A [40 marks]

1. and `are examples of both an input and output device.

Answer: Touchscreen and modem.

2. Secondary storage devices are being sold at every corner of the street in
Harare. And is an example of these devices.

Answer: Flash drive.

3. WWW is an abbreviation of

Answer: World Wide Web.

4. Software applications are being developed on a daily basis. State any


three examples.

Answer: Microsoft Word, Google Chrome, Adobe Photoshop.

5. Which binary number exists just before 1001110₂ in a number line?

Answer: 1001101₂
6. When my computer has been affected by a virus, I use an ____ software to
remove the infection.

Answer: Antivirus

7. GUI stands for

Answer: Graphical User Interface

8. Convert 100100001₂ to decimal.

Answer: 289

9. ____ and ____ are examples of web browsers.

Answer: Mozilla Firefox and Google Chrome

10. A dark border on a cell in Excel indicates the ____ cell.

Answer: Active

11. Internet has made it possible for us to access lots of services online. ____
is an example of such a service.

Answer: Online banking


12. Which keyboard key deletes the character to the right of the insertion
point?

Answer: Delete key

13. The cell reference for a range of cells that starts in cell D4 and goes over
to column H and down to row 56 is

Answer: D4:H56

14. State any two examples of devices that serve only as an input device.

Answer: Keyboard, Mouse

15. There are a number of operating systems today in the market for mobile
and personal computers. State any three that you know.

Answer: Windows, macOS, Android

16. RAM is an abbreviation of

Answer: Random Access Memory

17. "Ctrl + P", is a shortcut for

Answer: Print
18. State any two examples of devices that serve only as an output device.

Answer: Monitor, Printer

19. A central processing unit (CPU) consists of two main parts which are ____
and ____.

Answer: Arithmetic Logic Unit (ALU) and Control Unit (CU)

20. Computers can be classified in terms of their sizes. State the four
classes.

Answer: Supercomputer, Mainframe, Minicomputer, Microcomputer

21. "Ctrl + S", is a shortcut for

Answer: Save

22. CPU is an abbreviation of

Answer: Central Processing Unit

23. Times New Roman, Cambria, Arial are the example of font face or font
type. (True/False)

Answer: True
24. The slide that is used to introduce a topic and set the tone for the
presentation is called the

Answer: Title slide

25. A number or a letter that appears little below the normal text is called a
subscript (True/False)

Answer: True

26. The process of removing unwanted part of an image in MS Word is called

Answer: Cropping

27. ____ and ____ are used for creating ordered/unordered list in a document.

Answer: Bullets and Numbering

---

SECTION B [40 marks]

Question 1

a. Explain any five functions of an operating system.


Answer:

1. Process Management – Manages execution of processes including


multitasking.

2. Memory Management – Allocates and manages RAM.

3. File Management – Organizes and controls file storage and access.

4. Device Management – Controls input/output devices using drivers.

5. User Interface – Provides graphical or command-based interface for user


interaction.

b. Describe how you would classify computers by purpose.

Answer:

General Purpose Computers: Designed to perform a variety of tasks (e.g.,


desktops, laptops).

Special Purpose Computers: Designed for a specific task (e.g., ATMs,


embedded systems in appliances).
c. Zimbabwean Education sector has made some great steps towards digital
learning due to COVID-19. State any three challenges faced by students and
suggest solutions.

Answer:

1. Limited access to internet – Provide subsidized data bundles or Wi-Fi


hotspots.

2. Lack of digital devices – Government and NGOs could distribute affordable


gadgets.

3. Lack of computer literacy – Introduce computer basics in early education


curriculum.

---

Question 2

a. Internet has made it possible for us to access lots of services online. State
and explain any three services offered by internet to its users.

Answer:
1. Email: Send and receive digital messages.

2. E-commerce: Buy and sell goods and services online.

3. Cloud Storage: Store and retrieve files online (e.g., Google Drive).

b. What is cyber-attack and give one example.

Answer:

A cyber-attack is a malicious attempt to damage, disrupt, or gain


unauthorized access to a computer system.

Example: Phishing

c. A number of organizations are now using internet in offering their services


and they have been exposed to cyber threats. Explain any three cyber
threats to the organization and also how best can an organization prevent
itself from cyber threats.

Answer:

1. Malware – Use antivirus and update software regularly.

2. Phishing attacks – Train staff on how to detect and report phishing.


3. Ransomware – Backup data frequently and use secure firewalls.

d. Give three symptoms of viruses in computers.

Answer:

1. Slow performance

2. Unexpected pop-ups

3. Files disappearing or corrupting

e. State any two ways that are used to prevent computer virus.

Answer:

1. Install and update antivirus software

2. Avoid downloading files from unknown sources


---

SECTION C [20 marks]

Question 1

a. Use table 1.1 for this question.

(Assuming Table 1.1 has marks for CS101 in column B, CS102 in C, CS103 in
D from row 2 to 5)

i. In cell B6 calculate the average mark for marks obtained in CS101 (using
Excel formula).

Answer: =AVERAGE(B2:B5)

ii. In cell C6 calculate the total from the marks obtained in CS102 (using
Excel formula).

Answer: =SUM(C2:C5)

iii. In cell D6 use an Excel formula to obtain the highest mark reached in
CS103.

Answer: =MAX(D2:D5)

b. Describe the steps carried out in creating a Gmail account for personal
use.

Answer:

1. Visit www.gmail.com
2. Click on "Create account"

3. Choose "For myself"

4. Fill in your name, username, and password

5. Enter phone number for verification

6. Add recovery email (optional), DOB, and gender

7. Agree to terms and finish setup

c. State the steps in which Gracious can follow to insert a table in MS Word.

Answer:

1. Open MS Word
2. Click on the "Insert" tab

3. Select "Table"

4. Choose number of rows and columns or draw manually

5. Table is inserted into the document

---

Let me know if you want a printable version or if you want to go over any
answers in more detail!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy