STAGE 1(THEORY)
1. Outline two physical security measures that a blank could put in place to avoid
unauthorized access to their server room.
2. Explain one advantage of data back-ups to an organization.
3. Explain the term disk partitioning as applied in operation system.
4. Outline two factors that would qualify an e-mail to be categorized as spam mail.
5. Explain video conferencing technology as applied in office automation.
6. Define the term single user operating system as applied in Information
Communication Technology.
7. Joan accessed the website address shown in figure 1:
http://.www.guks.org
(i) (ii)
Explain the parts labelled (i) and (ii) of the website address.
8. James, the ICT technician prepared a schedule of activities that should be carried
out during computer maintenance. Outline two activities that could be on the
schedule.
9. Explain the term plug and play device as applied to computer components’
installation.
10. Outline two reasons why the use of file directories is necessary in a computer.