<=Back

<= KNEC Craft Certificate in ICT module 2 Computer Maintenance and Support past paper: July 2017

Distinguish between primary memory and secondary memory as used in computer

    Viewed:  518  times

  Share in:
        

Question Answer:





Questions List:

1. Explain the term latency as used in magnetic disks
2. Describe the term thin client as used in computers
3. Describe each of the following types of hard disk interfaces: (i)IDI; (ii)SATA.
4. Janice intends to use USB port instead of parallel port to connect peripheral devices on her computers. Outline four advantages of USB that could be influencing her choice
5. Explain two circumstances under which a computer user would use a wireless printer connection.
6. Explain two limitations of serial port as used in computers
7. Differentiate between parity and non-parity method of detecting memory errors
8. Explain two negative effects of electronic waste
9. Outline four safety aspects that should be considered when selecting a power supply unit
10. Distinguish between disk compressor and disk defragmenter utilities as used in computers.
11. Philip was required to conduct training on the use of new computer system in the company. Explain two training conducts that could be have used
12. Computer technician experience several challenges carrying out routine maintenance. Outline three challenges they could experience
13. Harry was required to repair a client’s monitor. Describe two tools that he could use
14. A lecturer described FAT 16 to a computer maintenance and support class. Outline four disadvantages of FAT 16 that he could have mentioned.
15. Differentiate between duo core and quad core processor types
16. Daughter boards are commonly used when assembling computers Outline three scenarios when they are applicable
17. Outline four examples of daughter board in computers
18. Explain the functions of each of the following keys during power on self test (POST) process in a computer system. (i) Esc ii) F10.
19. IT support professionals are required in every organization (i)Outline two skills that should be exhibited by these professionals (ii)Outline four typical routine procedures that could be assigned to these professionals.
20. Sarah noted that some of her documents in her computers are encrypted and she was forced to pay a certain fee through internet to decrypt her files. (i) Identify this type of attack ii)Outline four possible causes for the attack identified in (i).(
21. Amani was required to replace a faulty RAM chip in a computer. Outline four precautions that she could observe in order to accomplish the task
22. Peter replaced a printer cartridge with a new one but the printer produced a distorted print out. Explain three possible causes for this problem
23. List two types of Computer mouse
24. Distinguish between primary memory and secondary memory as used in computer
25. List four types of application software as used in computers
26. Outline five factors that should be considered selecting troubleshooting technique
27. Explain three circumstances under which an organization could consider disposing computers.