COMPUTER OBJ

1-10 - DCABBAACCD
11-20 - CBADCCAADA
21-30 - BBDAACABBA
31-40 - DDCBCCADCB
41-50 - ABBDACCAAD


COMPUTER STUDIES ANSWERS 

1a.  Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

1ii.
 a)  Run defragmentation 
b) Run anti-spyware


1bi.  Feasibility Study: The purpose of this first phase is to find out the scope of the problem and determine solutions.  Resources, cost,  time,  benefits and other items should be considered here.

1bii System Design: This third phase describes,  in details, the necessary specifications,  features and operations that will satisfy the functional requirements of the proposed system which will be in place

1biii.  Maintenance: The last phase is when end users can fine-tune the system,  if they wish,  to boost performance, add new capabilities or meet additional user requirements.

========================================================

(2a)
(i) Add all basic details to every song (ie tag) : title, artist, album name, album artist, track number, year, genre
(ii) Add artwork for every track
(iii) Add lyrics for every track
(iv) Add genre category to each track
(2b)
(i) Copy
(ii) Move
(2c)
(i) file: is a computer resource for recording data discretely in a computer storage device. In other words Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet

(ii) record:  is a collection of fields, possibly of different data types, typically in fixed number and sequence.

=====
3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.

(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.

(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits

For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits

(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes

=======

4.bii

Characteristics of Computer

SPEED : In general, no human being can compete to solving the complex computation, faster than computer.
ACCURACY : Since Computer is programmed, so what ever input we give it gives result with accuratly.
STORAGE : Computer can store mass storage of data with appropriate formate.
DILIGENCE : Computer can work for hours without any break and creating error.
VERSATILITY : We can use computer to perform completely different type of work at the same time.
POWER OF REMEMBERING : It can remember data for us.
NO IQ : Computer does not work without



5a)

encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor.


 *(5aii)* 
✅ Biometric
✅ Password

 *(5aiii)* 

✅ Encryption hides your data from curious eyes


✅ Prevents unwanted access to documents and e-mail messages






Post a Comment

 
Top