Docs - 20230420-Concepts of Management of Computing
Docs - 20230420-Concepts of Management of Computing
INSTRUCTIONS TO CANDIDATES
1. Answer ALL questions.
1
Question 1
a) With reference to an opened MS Excel program Windows, explain the following terms:
i. Cell Address. (2)
ii. Formula bar. (2)
b) Outline the five stages of the information processing cycle. (10)
Question 2
Computer systems are vulnerable to many threats that can inflict various types of damage.
a) Explain what is meant by hacking. (5)
b) Describe ways in which computer systems can be protected against hacking. (10)
c) Apart from the computer viruses and hacking explain other computer threats you are
aware of.
(10)
Question 3
a) Explain the features associated with a good word processing program. (8)
b) Outline any four advantages associated with computer-based word processing. (8)
Question 4
a) In the recent past many computer users have noticed to prefer using packaged software as
compared to tailor-made systems. Explain why this is so. (10)
b) Explain the various possible input and output devices that are likely to be used in POS
systems common in supermarkets.
(15)
Question 5
Explain the benefits and limitations of computerized databases. (15)
END OF PAPER
2
SUGGESTED
SOLUTIONSS
CONCEPTS OF MANAGEMENT COMPUTING
MAY 2022
Question 1
a)
i) A cell reference, or cell address, is an alphanumeric value used to identify a
specific cell in a spreadsheet. Each cell reference contains one or more letters followed
by a number. The letter or letters identify the column and the number represents the row.
ii) The formula bar is the toolbar at the top of the spreadsheet that lets you enter or
view information in a cell. To use the formula bar to view information, click on a
cell and look at the formula bar to see what it written in it.
iii) In Microsoft Excel, a workbook is a collection of one or more spreadsheets, also
called worksheets, in a single file.
iv) In Excel, the Name Box refers to an input box directly to the left of the formula
bar. The Name Box normally displays the address of the "active cell" on the
worksheet.
b) The five main steps are input, processing, storage, output and communication.
3
Question 2
1. Use a firewall.
Windows and macOS have built-in firewalls – software designed to create a barrier between your
information and the outside world. Firewalls prevent unauthorized access to your business
network and alert you to any intrusion attempts.
Make sure the firewall is enabled before you go online. You can also purchase a hardware
firewall from companies such as Cisco, Sophos or Fortinet, depending on your broadband router,
which also has a built-in firewall that protects your network. If you have a larger business, you
can purchase an additional business networking firewall.
Computer viruses and malware are everywhere. Antivirus programs such as Bitdefender, Panda
Free Antivirus, Malwarebytes and Avast protect your computer against unauthorized code or
software that may threaten your operating system. Viruses may have easy-to-spot effects – for
example, they might slow your computer or delete key files – or they may be less conspicuous.
Antivirus software plays a major role in protecting your system by detecting real-time threats to
ensure your data is safe. Some advanced antivirus programs provide automatic updates, further
protecting your machine from the new viruses that emerge every day. After you install an
antivirus program, don't forget to use it. Run or schedule regular virus scans to keep your
computer virus-free.
Spyware is a special kind of software that secretly monitors and collects personal or
organizational information. It is designed to be hard to detect and difficult to remove and tends to
deliver unwanted ads or search results that are intended to direct you to certain (often malicious)
websites.
4
Some spyware records every keystroke to gain access to passwords and other financial
information. Anti-spyware concentrates exclusively on this threat, but it is often included in
major antivirus packages, like those from Webroot, McAfee and Norton. Anti-spyware packages
provide real-time protection by scanning all incoming information and blocking threats.
Using secure passwords is the most important way to prevent network intrusions. The more
secure your passwords are, the harder it is for a hacker to invade your system.
More secure often means longer and more complex. Use a password that has at least eight
characters and a combination of numbers, uppercase and lowercase letters, and computer
symbols. Hackers have an arsenal of tools to break short, easy passwords in minutes.
Don't use recognizable words or combinations that represent birthdays or other information that
can be connected to you. Don't reuse passwords, either. If you have too many passwords to
remember, consider using a password manager, such as Dashlane, Sticky
Password, LastPass or Password Boss. [See related article: How to Create a Strong Password]
Always install new updates to your operating systems. Most updates include security fixes that
prevent hackers from accessing and exploiting your data. The same goes for apps. Today's web
browsers are increasingly sophisticated, especially in privacy and security. Be sure to review
your browser security settings in addition to installing all new updates. For example, you can use
your browser to prevent websites from tracking your movements, which increases your online
privacy. Or, use one of these private web browsers.
6. Ignore spam.
Beware of email messages from unknown parties, and never click on links or open attachments
that accompany them. Inbox spam filters have gotten pretty good at catching the most
conspicuous spam. But more sophisticated phishing emails that mimic your friends, associates
and trusted businesses (like your bank) have become common, so keep your eyes open for
anything that looks or sounds suspicious.
If your business is not already backing up your hard drive, you should begin doing so
immediately. Backing up your information is critical in case hackers do succeed in getting
through and trashing your system.
Always be sure you can rebuild as quickly as possible after suffering any data breach or loss.
Backup utilities built into macOS (Time Machine) and Windows (File History) are good places
to start. An external backup hard drive can also provide enough space for these utilities to
operate properly.
5
8. Shut it down.
Many businesses, especially those operating a web server, are "all systems go" all the time. If
you're not operating a complex internet-based company, however, switch off your machine
overnight or during long stretches when you're not working. Always being on makes your
computer a more visible and available target for hackers; shutting down breaks the connection a
hacker may have established with your network and disrupts any possible mischief.
9. Use virtualization.
Not everyone needs to take this route, but if you visit sketchy websites, expect to be bombarded
with spyware and viruses. While the best way to avoid browser-derived intrusions is to steer
clear of unsafe sites, virtualization allows you to run your browser in a virtual environment,
like Parallels or VMware Fusion, that sidesteps your operating system to keep it safer.
Routers don't usually come with the highest security settings enabled. When setting up your
network, log in to the router, and set a password using a secure, encrypted setup. This prevents
intruders from infiltrating your network and messing with your settings.
Passwords are the first line of defense against computer hackers, but a second layer boosts
protection. Many sites let you enable two-factor authentication, which boosts security because it
requires you to type in a numerical code – sent to your phone or email address – in addition to
your password when logging in.
Even if cybercriminals gain access to your network and files, encryption can prevent them from
accessing any of that information. You can encrypt your Windows or macOS hard drive
with BitLocker (Windows) or FileVault (Mac), encrypt any USB flash drive that contains
sensitive information and use a VPN to encrypt web traffic. Only shop at encrypted websites;
you can spot them immediately by the "https" in the address bar, accompanied by a closed-
padlock icon. [See related article: A Small Business Guide to Computer Encryption]
iii)
Minor Threats
Hacktools
Hacktools are programs designed to assist the intruder with hacking. The most common among
them are port scanners that detect vulnerabilities in firewalls and other components of computer
protection system. Besides hackers, such tools are used by administrators to check security of
6
their networks. Occasionally, common software that can be used for hacking and various
programs that use social engineering techniques are designated as among hacktools as well.
Adware
Usually, this term refers to a program code implemented into freeware programs that force
display of advertisements to users. However, sometimes such codes can be distributed via other
malicious programs and show advertisements in web browsers. Many adware programs operate
with data collected by spyware.
Jokes
Like adware, this type of minor threats can not be used to inflict any direct damage to the
system. Joke programs usually just generate messages about errors that never occurred and
threaten to perform actions that will lead to data loss. Their purpose is to frighten or annoy
users.
Dialers
These are special programs that are designed to scan a range of telephone numbers and find
those where a modem answers. These numbers are then used to mark up the price of
telephoning facilities or to connect the user to expensive telephone services.
Riskware
These programs were not intended as computer threats, but can potentially cripple or be used to
cripple system security due to certain features and, therefore, are classified as minor threats.
Riskware programs are not only those that can accidentally damage or delete data, but also ones
that can be usebbd by crackers or some malicious programs to do harm to the system. Among
such programs are various remote chat and administrative tools, FTP-servers, etc.
Question 3
a) Word Processing
Creating, editing, saving and printing documents.
Copying, pasting, moving and deleting text within a document.
Formatting text, such as font type, bolding, underlining or italicizing.
Creating and editing tables.
Inserting elements from other software, such as illustrations or photographs
7
b) Advantages of Word Processing
Word processing software is used to type text, input data and create written documents. Word
processors have eclipsed the alternative typing software that’s built into most computer
operating systems. For example, Techwalla explains that text editor programs like Microsoft
Windows Notepad are fine for typing and editing plain text, but text editors don’t allow for any
formatting. By comparison, word processing is far more robust and versatile.
With Word processing software, you can add bullet points, borders, lines, bright colors,
distinctive fonts and other graphic elements to your documents. Word processing software also
offers templates for putting together job resumes, brochures, flyers, ads, inventory sheets and
letterhead. Many templates are free and easy to use. Companies can save money by doing their
own graphic design work and emailing newsletters instead of paying for postage.
Accuracy of Information
Accuracy is one of the biggest benefits of word processor use. Word processing software
applications spot errors in grammar or punctuation, which improves the overall quality of the
work. Because word processing software automatically catches misspellings, overall speed and
accuracy increase. Employees have more time to work on other tasks when they can quickly
finish a letter or report.
Anyone who has ever used a typewriter can fully appreciate the benefits of a word processor
when it comes to fixing mistakes. Gone are the days of covering up typos with white correction
tape or messy white-out fluid. Prior to word processing, mistakes were more likely to go
unnoticed and cause embarrassment to the business when errors were later spotted by
recipients of a mass mailing.
The importance of word processors is notable when it comes to teamwork. Word processors
allow cross-functional team members to collaborate on documents in real time from anywhere
in the building or even around the world. For example, Google Docs is a free online word
processor that allows multiple users to write, edit and comment on each others’ drafts and
reports. Group projects can be saved on Google’s servers, making documents readily
accessible on the web whenever they are needed.
Data security is another consideration when weighing the benefits of word processing.
Electronic records can be encrypted, password-protected, and retained on servers to protect
confidential information. An audit trail shows who has viewed the file, which adds another
layer of security. In the event of a fire or other natural disaster, electronic records can often
still be retrieved from a computer or from a cloud backup, whereas paper records might be
damaged or destroyed. Being able to retrieve important records even off-site supports
continuity of operations.
8
c) Data warehousing is the storage of information over time by a business or other
organization. New data is periodically added by people in various key departments such as
marketing and sales. ... A database is designed to supply real-time information. A data
warehouse is designed as an archive of historical information.
Question 4
Software
The Advantages of Off the Shelf Software The Disadvantages of Off the S
Anything that is used to control a computer system or to send data to it is an input device.
Keyboard
Mouse
Track pad
Graphics tablet
Webcam
Microphone
Scanner
9
Devices that the computer system uses to send out or display information from the processor are
called output devices.
Monitor
Speaker
Printer
Projector
Plotter
Question 5
11