2.8 A microphone is an output device.
2.9 Data stored in memory is volatile, meaning it is lost when the power is turned off.
2.10 Digital security helps protect against unauthorized access to computer systems.
QUESTION 3: Fill in missing Word/Phrase
[5 Marks]
3.1 ............................................................i.s. the technology used for recognizing fingerprints.
3.2 A ....................................i.s a device that is primarily used to output printed documents.
3.3 The temporary storage that a computer uses to store running programs is the
3.4 .................................is the term for a program that manages hardware and software on a
computer?
3.5 ..............................i.s the type of storage medium that uses lasers to read and write data.
QUESTION 4: Structured Questions
[25 Marks]
Answer each of the following questions.
4.1 Explain the terms Input, Data, Information and instructions in Information Systems.
(8)
4.2 Compare the use of LEDand LCDdisplays in business environments, focusing on image
quality, power consumption, and durability
(6)
4.3 List five (5) display quality aspects you should consider when selecting a display device.
(5)
4.4 What are the four (4) basic categories of output while working with a computer.
Name and Discuss any three (3).
(6)
QUESTION 5: Structured Questions
[30 Marks]
Answer each of the following questions.
5.1 Briefly explain 5 advantages of encryption.
(10)
5.2 Name and discuss any two common methods of encryption.
(4)
5.3 List and explain four (4) methods of security theft.
(8)
5.4 How can unethical actions in information technology harm individuals and society?
Discuss 3 aspects of how such actions can be damaging to People.
(6)
4