Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 QUESTION ONE a) Computer is an electronic device that is capable of performing calculations (i.e. computations) and making logical decisions at very high speed. Some of the uses of computers in our society include; Education and research; Computers are being used to disseminate information from the tutors/lecturers through the use of laptops and overhead projectors. They also play an important role in collecting and analyzing information (data) during research work. Through the computers, researchers access the internet and obtain loads of vital information. Computers are also being used in open distance learning where the students access training materials and information without physically being present at the training institutions and at the same time interacting with the tutors/lecturers through e-mail. Government institutions; Computers play a major role in the improvement and efficiency of service delivery to the people. For instance, computers help in record keeping reducing the episodes of information disappearing like in the judiciary, pensions and lands departments. Computers have also ensured accurate capturing of bio-data particulars of the people through the introduction of biometric voter registration. Last but not least, computers have enabled the government to accelerate the processes such as passport application, personal identification number (PIN) registration, provision of e-pay slips to her employees, remittance of taxes to the revenue authority, payment of utility bills like water, electricity, telephone etc. Communication institutions; The telecommunication industry heavily depends on the computers which play a vital role at the exchanges. The mobile telephony industry also relies on the computer to connect the phone calls made by millions of mobile phone users. Computers also play a significant role in transport sector where they make it possible to do online booking, reservation and payment of tickets. Employment; The computing industry worldwide provides employment opportunities to many people, amounting to over 60% in some countries e.g. Singapore. Multimedia applications; Multimedia is currently used exclusively in business presentations, training, information distribution, point of sale terminals, education/learning, photo albums, reference books etc. b) The five generations of computer in terms of technology are; First generation computers e.g. ENIAC (Electronic Numerical Integrator And Computer). Second generation computers e.g. IBM 1620. Third generation computers e.g. IBM-360. Fourth generation computers e.g. the present day personal computers (PCs). Fifth generation computers e.g. supercomputer. AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 c) A computer bus is a set of wires that carry special information to and from the central processing unit (CPU). The three types computer buses are; Address bus - this bus carries address given by the CPU from one unit to another in the computer. Data bus - this bus carries data from one unit to another. It is a bi-directional bus and that is the data can be carried in both directions. Control signal - this bus carries control signal from the arithmetic logical unit (ALU) to the memory and from the memory to the ALU and then to the output unit. d) The following are the functions of a UPS (Uninterrupted Power Supply); Provides power for some time after blackout has occurred enabling backing up of data not yet saved. Continues to provide power to equipment during line sags. Absorbs relatively small power surges. Smoothens out noisy power sources. Automatic shutdown of equipment during long power outages. Monitoring and logging of the status of the power supply. Displays the voltage/current draw of the equipment. Restarts the equipment after a long power outage. Displays the voltage currently on the line. Provides alarms on certain error conditions. Provides short circuit protection to the equipment. e) Microprocessor operating cycle: The microprocessor is a multipurpose, programmable device that accepts digital data as input and processes it according to instructions stored in its memory and provides results as output. The microprocessor contains the arithmetic and logic unit (ALU) and the control unit (CU) for a microcomputer. It is connected to memory and input-output devices via buses which carry information between the units. The ALU handles all mathematical calculations and logical comparisons. It takes commands from the CU and executes them, storing the results back into the memory. These four steps i.e. fetching, decoding, execution and storage are referred to as the machine cycle of a computer. The memory is described as a digital processing system which can store the data. It takes the command from the CU and executes them, storing the results back into the memory. These four steps (fetch, decode, execute and store) are referred to as the machine cycle of a computer. Input ALU Output CU (CPU) Memory AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 f) Kinds of memories in the computer; Random Access Memory (RAM) - This is a primary storage and is referred to as RAM since it is possible to randomly select and use any location of the memory to directly store data. The storage of data and instructions inside primary memory is temporary and it disappears from RAM immediately there is a power failure. These kinds of memories that lose their contents on failure of power are known as volatile memories. Read Only Memory (ROM) - The ROM stores some standard processing programs supplied by the manufacturer to operate the personal computer. The ROM can only be read by the CPU and cannot be changed. The basic input/output program that examines and initializes the various equipment attached to the personal computer (PC) when the switch is made on is stored in the ROM. Storage of programs and data in the ROM is permanent and is not lost on power failure. These kinds of memories that do not lose their contents on failure of power are known as non-volatile memories. Programmable Read Only Memory (PROM) - This type of primary memory allows for storage of programs and once the programs have been written, they cannot be changed and remain intact even if the power is switched off. The programs or instructions written in PROM therefore cannot be erased or changed. AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 QUESTION TWO a) Types of human computer interface (HCI); Graphical user interfaces Web-based user interfaces Command line interfaces Touch user interfaces Features that make HCI user friendly; Design of a user interface - This affects the amount of effort the user must expend to provide input for the system and to interpret the output of the system, and how much effort it takes to learn how to do this. Usability - is the degree to which the design of a particular user interface takes into account the human psychology and physiology of the users, and makes the process of using the system effective, efficient and satisfying. Attractive - screen arrangements i.e. colours, typefaces (font and sizes), graphics elements, all impact on the look of the interface. Forgiving - users should be able to recover easily from mistakes users should be able to get on line help easily. Customizable - the user should be able to tweak the interface to his or her own habits e.g. ability to size or move windows, design icons and tools, design desktop patterns. Transparent - this implies predictability i.e. the interface should provide choices that are logical and reflect how users are likely to react to situations. Safe - e.g. the pilot of a jumbo jet. b) A computer network refers to an interconnection of various computers located at different places. In networking, two or more computers are linked together with a medium and data communication devices. The computer that provides resources to other computers in a network is called a server, while the individual computers which access the shared resources are known as workstations or nodes. Networking is necessary in the ICT world because of the following; Sharing of information/data. Sharing of resources e.g. printers. c) Star topology is a network topology where a number of workstations (or nodes) are directly linked to a central node, which controls all the activities of the nodes. Any communication between the station must pass through the central node. There is a bi-directional communication between the various nodes. Some of the advantages of the star topology are; It offers flexibility of adding or deleting of workstations from the network. Breakdown of one station does not affect any other device on the network. The major disadvantage of star topology is that the failure of the central node disables communication throughout the entire network. Workstation 1 Workstation 3 Central Node Workstation 2 Workstation 4 AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 d) Functions of the following; Repeaters - These are electronic devices that receive signals and retransmit them it at a higher level or higher power, or onto the other side of an obstruction, so that the signals can cover longer distances. Bridges - Network bridges are network devices that connect more than one network segment to allow the networks to communicate independently as separate networks. Routers - These are devices that forward data packets between computer networks thereby creating overlay interworks. Gateway - This a network point that acts as an entrance to another network. e) Services offered by the internet Communication services (E-mail): This is sending a message electronically over the internet from the sender to the receiver. Remote access: The internet allow computer users to connect to other computers and information stores easily, wherever they may be accessed across the world. File sharing: A file can be e-mailed by the internet using an attachment in the e-mail. A computer file can also be put on to a shared location on a shared network so that people using the network have access to it. Streaming media: Radio and television broadcasters provide internet feeds of their live audio and video streams. Voice telephony: VoIP means voice over IP where IP refers to internet protocol that underlies all internet communication. This began as an optional two-way voice extension on some instant messaging systems. This has become easy to use and is much cheaper or even free that normal calls especially for long distances. f) Transmission media refer to technical devices that employ the material substances to transmit or guide waves and the transmission of networks. The following are examples of transmission media; Wire pairs: These are commonly used in local telephone communication and for short distance digital data communication. They are normally made up of copper and the pair of wires is twisted together. Data transmission speed is normally 9,600 bits per second in a distance of 100 meters. Coaxial cables: These are groups of specially wrapped and insulated wires that are able to transfer data at a higher rate. They consist of central copper wire surrounded by an insulation over which copper mesh is placed. They are used for long distance telephone lines and local area network for their noise immunity and faster data transfer. Microwave: This system uses very high frequency radio signals to transmit data through space. The transmitter and receiver of a microwave system should be in line of sight because the radio signal cannot bend. With microwave very long distance transmission is not possible. In order to overcome the problem of line of sight and power amplification of weak signal, repeaters are used at intervals of 25 to 30 kilometers between the transmitting and receiving ends. Communication satellites: This is a microwave relay station placed in outer space e.g. INSAT-1B that is accessible from anywhere in India. Here, microwave signals are transmitted from a transmitter on earth to the satellite at space. The satellite amplifies the weak signal and transmits it back to the receiver. The main advantage of satellite AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 communication is that it is a single microwave relay station visible from any point of a very large area thereby eliminating the use of repeaters. The data transmission rate is 16 gigabytes per second. They are mostly used to link big metropolitan cities. AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 QUESTION THREE a) User Application Operating System Hardware An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The OS is a vital component of the system software in a computer system. Application programs usually require an operating system to function. For hardware functions such as input and output and memory allocation, the OS acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. b) A high level language is a simple language that use English and mathematical symbols like +, -, %, / etc for its program construction. They are problem oriented because their instructions are suitable for solving a particular problem. The following are the three popular third generation languages; COBOL (Common Business Oriented Language): This language is mostly suited for business language where there is very little processing of huge output. FORTRAN (Formula Translation): This language is for scientific application. BASIC (Beginners All-purpose Symbolic Instruction Code): c) Data: Refers to a collection of raw facts that become information after processing by the computer. Information: Refers to a processed data. Data processing : Refers to any process that uses a computer to enter data and summarize, analyze or otherwise convert data into usable information. d) Utility software is a system software that is designed to help analyze, configure, optimize or maintain a computer. Examples of Utility software include; anti-virus, archive and backup. AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 e) A spreadsheet is an interactive computer application program for organization and analysis of information in tabular form. Spreadsheets are developed as computerized simulations on paper accounting worksheets. Features of spreadsheets that are used in financial modeling Rows and columns Cell formatting Cell merging Copy paste and cut Multiple worksheets Graphs and charts Inserting/deleting columns and rows Mathematical functions Mathematical formulas f) Conversion of 459 to binary system; 2 2 2 2 2 2 2 2 2 1 1 0 1 0 0 1 1 1 459 229 114 57 28 14 7 3 1 111001011 Therefore 459 in binary system in 111001011 g) Conversion of 11100111 to decimal system; List of the elements of the digits; 128 64 32 16 8 4 2 1 1 1 1 0 0 1 1 1 ____________________________________________________ 128 + 64 + 32 + 0 + 0 + 4 Hence 11100111 in decimal system is 231 + 2 + 1 = 231 AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 QUESTION FOUR a) Important Ergonomics in computer architecture design; Physical ergonomics: This is concerned with the human anatomy and some of the anthropometric, physiological and bio-mechanical characteristics as they relate to physical activity Cognitive ergonomics: This is concerned with the mental processes such as perception, memory, reasoning and motor response as they affect interactions among humans and other elements of the system. Organizational ergonomics: This is concerned with the optimization of socio-technical systems, including their organizational structures, policies and processes. Environmental ergonomics: This is concerned with human interaction with the environment b) Computer virus is a computer program that replicates itself and spread form one computer to another. Sources of computer viruses include; Downloadable programs Cracked software E-mail attachments Internet Booting from compact disk (CD) c) How an infected computer can be cleaned; Backup files that you know are safe onto a disk or other external media source if possible. Do not use system restore since when you create a restore point the virus file's are also backed up. Turn off the system restore and delete all of the restore points. That way you make sure you move the virus, it will be off your computer. Download free and anti-virus and anti-spyware software on non-infected PC and then put the files on a disk and bring to the infected PC After installing your anti-spyware and anti-virus software, update them and run a scan them. Make sure you write down the name of the infection it finds before you remove them. Restart your computer in safe mode. Use the F5 or F8 keys depending on which operating system you are running. Repeat the scanning step to make your PC is clean. d) Two methods of starting and quitting application program in Linux operating system; Method One: To start word program; Boot the machine Go to the menu on the task bar Open all applications Open for instance office.org word to open word AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 Go to the title bar and open a new document To quit Save the document Then quit Method Two: To open word program; Boot the machine Go to the menu on the task bar Open terminal Type open office.org word on the command line Then press enter To quit; Type log out on the command line e) Types of software interfaces; Macintosh/Mac Windows/PC Linux ubuntu Linux kabuntu f) How to perform the following using spreadsheet; Regression; Enter the data into the spreadsheet that you are evaluating. Open the regression analysis tool. Define your input, Y range. Repeat the previous step for the input, X range. Designate where output will appear. Click OK and the summary of your regression will appear where designated. Anova; Feed the file FEED_ANOVA or enter the data into an excel datasheet. In Excel 2003 or earlier versions, pull down "Tools" to "Data Analysis". In Excel 2007, click Data and then Data Analysis. Select Anova: Single Factor. In the dialogue box, enter the input range that corresponds to the data column and click OK. Check the option "Label in First Row". T-test Feed the data into an Excel datasheet. Click Data then Data Analysis. Select t-test: Two samples assuming equal variance. AFS 611 COMPUTER APPLICATIONS CAT I A56/78111/2012 Then click OK and enter cells for Variable range 1, cells for variable range 2, and a free cell for output range. Then click OK and the printout appears.