Summary

This document contains computer studies questions. It covers topics such as networking, including LAN and WAN, alongside fundamental concepts in databases and spreadsheets. The questions are designed for Form 4 students in Malawi.

Full Transcript

MALAWI NATIONAL EXAMINATIONS QUESTIONS FORMAT AND DISTRIBUTION MSCE JCE LOWER LEVEL 15%  Knowledge LOWER LEVEL 45%  Knowledge  Comprehension  Comprehension...

MALAWI NATIONAL EXAMINATIONS QUESTIONS FORMAT AND DISTRIBUTION MSCE JCE LOWER LEVEL 15%  Knowledge LOWER LEVEL 45%  Knowledge  Comprehension  Comprehension MEDIUM LEVEL 60%  Comprehension MEDIUM LEVEL 30%  Comprehension  Application  Application HIGH LEVEL 25%  Analysis HIGH LEVEL 25%  Analysis  Synthesis  Synthesis  Evaluation  Evaluation USING SPREADSHEETS 2 INTRODUCTION TO NETWORKS NETWORK APPLICATIONS USING DATABASES 1|Page INTRODUCTION TO NETWORKS LOW LEVEL QUESTIONS – TO TEST KNOWLEDGE OF STUDENTS 1. What is a computer network? 2. Define protocols in the context of computer networks. 3. Name three types of computer network technologies. 4. What is the purpose of a Personal Area Network (PAN)? 5. Provide examples of devices that can be connected in a PAN. 6. What geographical areas do Local Area Networks (LANs) typically cover? 7. How are Wireless Local Area Networks (WLANs) different from traditional LANs? 8. Explain the purpose of a Metropolitan Area Network (MAN). 9. How does a Wide Area Network (WAN) differ from a Metropolitan Area Network (MAN)? 10. What is the primary function of a Wide Area Network (WAN)? 11. What is the main characteristic that distinguishes LANs, MANs, and WANs in terms of coverage range? 12. Which network type is typically more secure: LAN, MAN, or WAN? 13. Give an example of a situation where a LAN would be used. 14. How are computers connected in a Wide Area Network (WAN)? 15. What are the differences between LAN, MAN, and WAN in terms of cost? 16. Define what a network topology is. 17. What are the two main forms of network topology? 18. Describe physical topology in a computer network. 19. What are peripheral devices in a network? 20. Explain the concept of logical topology. 21. What are the main types of physical network topologies? 22. How is data transmitted in a star topology? 23. What is the function of a hub or switch in a star topology? 24. Define extended star topology. 25. What are the advantages of star topology? 26. Explain the term "bus topology". 27. List the advantages of bus topology. 28. What are the disadvantages of a ring topology? 29. Describe the mesh topology. 30. What factors should be considered when choosing a network topology? 31. What is the primary difference between physical and logical network topology? 32. Can you provide examples of logical network topologies? 33. What is the purpose of Carrier Sense Multiple Access/Collision Detection (CSMA/CD) in Ethernet networks? 34. How does Fast Ethernet differ from traditional Ethernet in terms of transmission speed? 35. What is the main advantage of LocalTalk protocol in Apple computers? 36. Explain how Token Ring networks operate in terms of token passing. 37. What is the significance of redundancy in the Fibre Distributed Data Interface (FDDI) topology? 38. How does Asynchronous Transfer Mode (ATM) differ from Ethernet in terms of packet size? 2|Page 39. Describe the transmission speed of Gigabit Ethernet and the types of cables it can use. 40. Compare and contrast the logical topologies of Ethernet and Token Ring networks. 41. What are Network Reference Models, and what purpose do they serve in standardizing communication networks? 42. Explain the difference between the OSI model and the TCP/IP protocol suite in terms of their structure and layers. 43. Describe the function of the Physical Layer in the OSI model and provide examples of protocols used in this layer. 44. How does the Data Link Layer facilitate communication between nodes on a network segment in the OSI model? Give examples of protocols used in this layer. 45. What role does the Network Layer play in the OSI model, and what are some common protocols used at this layer? 46. Explain the responsibilities of the Transport Layer in the OSI model and discuss the difference between TCP and UDP. 47. Describe the purpose of the Session Layer in the OSI model and provide examples of protocols associated with this layer. 48. What functions does the Presentation Layer serve in the OSI model, and how does it ensure effective communication between systems? 49. Discuss the role of the Application Layer in the OSI model and provide examples of common protocols used at this layer. 50. How does the TCP/IP protocol suite differ from the OSI model in terms of its structure and organization? 51. Explain the function of the Physical and Data Link Layers in the TCP/IP protocol suite and provide examples of protocols used in these layers. 52. What are some key protocols associated with the Network Layer in the TCP/IP protocol suite, and what roles do they play in data transmission? 53. Describe the responsibilities of the Transport Layer in the TCP/IP protocol suite and compare the features of TCP and UDP. 54. Discuss the role of the Application Layer in the TCP/IP protocol suite and provide examples of common protocols used at this layer. 55. Compare and contrast the OSI model and the TCP/IP protocol suite in terms of their similarities and differences. 56. What is the difference between the Internet and an Intranet? 57. Name three Internet Service Providers (ISPs) in Malawi. 58. Explain the concept of "Internet Everywhere" and "Internet of Things" in simple terms. 59. List three devices that can be connected to the Internet of Things (IoT). 60. Name three methods used to access the Internet. 61. Describe how a modem facilitates Internet access via telephone lines. 62. What are the two types of mobile networks used for Internet access via mobile phones? 63. Provide an example of a technology used for Internet access on GSM networks. 64. What is the maximum speed of a 3G network according to the table provided? 65. Explain how a subscriber can access the Internet via fiber links. 66. What is WiMAX, and how does it provide wireless data communication? 3|Page 67. What is a Wi-Fi hotspot, and where can you typically find one? 68. How do devices with Wi-Fi capability connect to the Internet? 69. What are the advantages of accessing the Internet via fiber optic cables? 70. Why is WiMAX considered suitable for providing wireless data communication over long distances? 71. What is the purpose of an IP address in computer networks? 72. How are the source and destination addresses used in packet communication? 73. What are the two types of IP addresses? 74. How many bits does an IPv4 address consist of? 75. Describe the structure of an IPv4 address. 76. What are the main differences between IPv4 and IPv6? 77. Explain the concept of classes in IP addressing. 78. What are the characteristics of Class A IP addresses? 79. How many host addresses can a Class B network accommodate? 80. What is the maximum number of hosts in a Class C network? 81. Describe the addressing structure of IPv6. 82. How are network and host numbers specified in IPv6 addresses? 83. Compare the address space of IPv4 and IPv6. 84. Why is IPv6 considered more flexible and extensible than IPv4? 85. Explain the steps to configure an IP address in a Windows operating system. LOW LEVEL QUESTIONS – TO TEST COMPREHENSION OF STUDENTS 1. What is the purpose of a Personal Area Network (PAN)? 2. Can you define protocols in the context of computer networks? 3. Name one example of a device that can be connected in a PAN. 4. Describe the coverage range of a Local Area Network (LAN). 5. How do Wireless Local Area Networks (WLANs) differ from traditional LANs? 6. Explain the function of a Metropolitan Area Network (MAN). 7. What geographical areas do LANs typically cover? 8. Differentiate between a Wide Area Network (WAN) and a Metropolitan Area Network (MAN). 9. What is the primary function of a Wide Area Network (WAN)? 10. Give an example of a situation where a LAN would be used. 11. Define the term "protocol" as it relates to computer networks. 12. How are computers connected in a Wide Area Network (WAN)? 13. What characteristic distinguishes LANs, MANs, and WANs in terms of coverage range? 14. Can you provide an example of a device connected in a Personal Area Network (PAN)? 15. Describe the differences between LAN, MAN, and WAN in terms of cost. 16. What does physical topology refer to in a computer network? 17. Can you explain the difference between physical and logical topology? 18. How does data travel in a star topology network? 19. What is the function of a hub or switch in a star topology? 20. Describe the main characteristics of a bus topology. 4|Page 21. What are the advantages of using a mesh topology? 22. Why is mesh topology considered more expensive than other topologies? 23. List some factors to consider when choosing a network topology. 24. What are the disadvantages of using a ring topology? 25. Define extended star topology. 26. How is data transmitted in a bus topology network? 27. Why is bus topology suitable for smaller networks? 28. What are peripheral devices in a network? 29. Explain the concept of logical topology. 30. What is the purpose of using a ring topology in a network? 31. What is the primary difference between physical and logical network topology? 32. Can you provide examples of logical network topologies? 33. What is the purpose of Carrier Sense Multiple Access/Collision Detection (CSMA/CD) in Ethernet networks? 34. How does Fast Ethernet differ from traditional Ethernet in terms of transmission speed? 35. What is the main advantage of LocalTalk protocol in Apple computers? 36. Explain how Token Ring networks operate in terms of token passing. 37. What is the significance of redundancy in the Fibre Distributed Data Interface (FDDI) topology? 38. How does Asynchronous Transfer Mode (ATM) differ from Ethernet in terms of packet size? 39. Describe the transmission speed of Gigabit Ethernet and the types of cables it can use. 40. Compare and contrast the logical topologies of Ethernet and Token Ring networks. 41. What is the purpose of Network Reference Models? 42. How many layers are there in the OSI model? 43. Can you name three layers of the OSI model? 44. What is the role of the Physical Layer in network communication? 45. What does TCP stand for in the TCP/IP protocol suite? 46. Name two protocols used in the Data Link Layer of the OSI model. 47. What does IP stand for in the TCP/IP protocol suite? 48. What is the function of the Transport Layer in the OSI model? 49. Give an example of a protocol used in the Session Layer of the OSI model. 50. How many layers does the TCP/IP protocol suite have? 51. What is the main responsibility of the Network Layer in the OSI model? 52. Can you name two protocols used in the Transport Layer of the TCP/IP protocol suite? 53. What does ICMP stand for, and what is its purpose? 54. Describe the role of the Presentation Layer in network communication. 55. Compare the Application Layer of the OSI model with the Application Layer of the TCP/IP protocol suite. 56. What is the Internet, and how does it differ from an Intranet? 57. Can you name any Internet Service Providers (ISPs) mentioned in the text? 58. What are "Internet Everywhere" and "Internet of Things," and how do they relate to accessing the Internet? 59. Name three types of devices that can be connected to the Internet of Things (IoT). 60. List three methods used to access the Internet as described in the text. 5|Page 61. How does a modem facilitate Internet access via telephone lines? 62. What are the two main types of mobile networks used for Internet access? 63. Provide an example of a technology used for Internet access on GSM networks. 64. According to the table, what is the maximum speed of a 3G network? 65. Describe how subscribers can access the Internet via fiber links. 66. What is WiMAX, and how does it provide wireless data communication? 67. Explain what a Wi-Fi hotspot is and where you might find one. 68. How do devices with Wi-Fi capability connect to the Internet? 69. What are the advantages of using fiber optic cables for Internet access? 70. Why is WiMAX suitable for providing wireless data communication over long distances? 71. What is the purpose of an IP address in computer networks? 72. How many types of IP addresses are mentioned in the content? 73. Describe the structure of an IPv4 address. 74. What are the differences between IPv4 and IPv6? 75. Can you explain the concept of IP address classes? 76. How many bits does an IPv4 address consist of? 77. What are the characteristics of Class A IP addresses? 78. How are network and host numbers specified in IPv6 addresses? 79. What is the maximum number of hosts in a Class C network? 80. How do you configure an IP address in a Windows operating system? MEDIUM LEVEL QUESTIONS – TO TEST COMPREHENSION OF STUDENTS 1. Compare and contrast the functionalities of a Personal Area Network (PAN) and a Local Area Network (LAN). 2. Explain the significance of protocols in facilitating communication within computer networks. 3. How do Wireless Local Area Networks (WLANs) overcome the limitations of traditional wired LANs? 4. Discuss the role of Metropolitan Area Networks (MANs) in urban connectivity and communication. 5. Evaluate the advantages and disadvantages of using a Wide Area Network (WAN) over a Local Area Network (LAN) for a multinational corporation. 6. Describe the process of establishing a connection in a Wide Area Network (WAN) across different geographical regions. 7. Compare the security measures implemented in LANs, MANs, and WANs, highlighting their effectiveness. 8. Assess the scalability of a Personal Area Network (PAN) in accommodating various types of devices and expanding its coverage. 9. Analyze the impact of network latency on the performance of Metropolitan Area Networks (MANs) in densely populated areas. 10. Investigate the challenges associated with managing and maintaining Wide Area Networks (WANs) across vast geographical distances. 6|Page 11. Explore the potential applications of Virtual Private Networks (VPNs) in enhancing the security and privacy of data transmission within computer networks. 12. Propose strategies for improving the reliability and resilience of Local Area Networks (LANs) in corporate office environments. 13. Examine the role of encryption techniques in safeguarding data transmitted over Wireless Local Area Networks (WLANs) from unauthorized access. 14. Critically evaluate the cost-effectiveness of implementing a Storage Area Network (SAN) compared to traditional file storage methods in an enterprise setting. 15. Investigate the ethical implications of using computer networks for remote communication and surveillance in public spaces. 16. Compare and contrast physical and logical network topologies, providing examples of each. 17. Describe the process of data transmission in a star topology network. How does it differ from other topologies? 18. Explain the advantages and disadvantages of using a bus topology in a network. 19. How does a ring topology differ from a star topology in terms of data transmission and network structure? 20. Discuss the factors that influence the choice of network topology in a given scenario. 21. Describe the structure and functionality of a mesh topology. What are its primary advantages and disadvantages? 22. Compare the cost and complexity of implementing a star topology versus a mesh topology. 23. Explain why a ring topology is less secure than a star topology. What measures can be taken to enhance security in a ring network? 24. Discuss the concept of redundancy in a mesh topology. How does it contribute to network reliability? 25. Describe the main characteristics of an extended star topology and its application in network design. 26. How does a bus topology handle data collisions? What are the implications of collisions on network performance? 27. Evaluate the scalability of different network topologies, considering factors such as network size and expansion capability. 28. Discuss the role of routers in a mesh topology network. How do routers contribute to efficient data transmission? 29. Explain the term "point-to-point connection" in the context of mesh topology. Why is it considered advantageous? 30. Compare the fault tolerance of star, bus, and ring topologies. Which topology is better suited for minimizing disruptions in case of link failures? 31. Explain the key differences between physical and logical network topology. 32. How does Ethernet use Carrier Sense Multiple Access/Collision Detection (CSMA/CD) to manage network traffic? 33. Describe the main features of Fast Ethernet and its advantages over standard Ethernet. 34. What are the advantages and disadvantages of LocalTalk protocol, particularly in comparison to Ethernet? 7|Page 35. Compare and contrast the token passing mechanism used in Token Ring networks with the token-based approach in FDDI networks. 36. How does Asynchronous Transfer Mode (ATM) facilitate the transmission of real-time data such as video and audio? 37. Discuss the benefits of redundancy in FDDI networks and how it contributes to network reliability. 38. Explain the significance of the 1000BaseTX method in Gigabit Ethernet and the types of cables it can use. 39. How do logical network topologies such as Ethernet and Fast Ethernet differ in terms of cable types and transmission speeds? 40. Describe the operation of LocalTalk networks and how they handle data transmission between devices. 41. Explain the concept of Network Reference Models and their significance in standardizing communication. 42. Differentiate between the OSI model and the TCP/IP protocol suite in terms of their structure and number of layers. 43. How does the Physical Layer facilitate data transmission in a network, and what are some common protocols used in this layer? 44. Discuss the responsibilities of the Data Link Layer in the OSI model and provide examples of protocols used in this layer. 45. Describe the role of the Network Layer in both the OSI model and the TCP/IP protocol suite, highlighting the similarities and differences. 46. Explain the purpose of the Transport Layer and compare the functions of TCP and UDP, two protocols used in this layer. 47. Analyze the significance of the Session Layer in establishing and managing communication sessions between network devices. 48. Discuss the functionalities of the Presentation Layer and its importance in data exchange between systems. 49. Compare and contrast the Application Layer of the OSI model with the Application Layer of the TCP/IP protocol suite, considering their functions and protocols. 50. Evaluate the advantages and disadvantages of using the OSI model compared to the TCP/IP protocol suite in modern networking environments. 51. Explain how the TCP/IP protocol suite handles physical and data link layer functions differently from the OSI model. 52. Critically assess the impact of the Internet Protocol (IP) on modern networking and communication systems. 53. Discuss the role of the Address Resolution Protocol (ARP) and the Reverse Address Resolution Protocol (RARP) in network communications. 54. Analyze the significance of the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) in the Transport Layer of the TCP/IP protocol suite. 55. Evaluate the similarities and differences between the physical and data link layers in the OSI model and the TCP/IP protocol suite. 8|Page 56. Compare and contrast the Internet and an Intranet, highlighting their key differences and similarities. 57. Discuss the significance of Internet Service Providers (ISPs) in facilitating access to the Internet. How do they differ from each other? 58. Explain the concepts of "Internet Everywhere" and "Internet of Things," and provide examples of how they are reshaping connectivity. 59. Describe at least three methods of accessing the Internet mentioned in the text, and discuss the advantages and limitations of each. 60. How do modems work to enable Internet access via telephone lines, and what role do they play in the communication process? 61. Compare the Internet access capabilities of GSM and CDMA networks, considering factors like speed, evolution, and current usage. 62. Analyze the evolution of Internet access technologies on GSM networks from 1G to 4G, focusing on the improvements in speed and capabilities. 63. Evaluate the advantages and disadvantages of accessing the Internet via fiber links compared to other methods discussed in the text. 64. Discuss the applications and benefits of WiMAX technology in providing wireless data communication over long distances. 65. Explain the concept of Wi-Fi hotspots and their role in providing wireless Internet access in various environments. 66. Assess the reliability and coverage of Wi-Fi compared to other wireless access methods such as WiMAX and mobile networks. 67. How do devices with Wi-Fi capability automatically connect to Wi-Fi hotspots, and what security considerations should users be aware of? 68. Critically evaluate the statement that "the Internet can be accessed everywhere around the world," considering factors like infrastructure, accessibility, and digital divide issues. 69. Discuss the impact of fiber optic cables on Internet access speed and reliability, particularly in comparison to traditional copper cables. 70. Analyze the challenges and opportunities associated with expanding Internet access in rural and underserved areas using technologies like WiMAX and satellite Internet. 71. Explain the difference between the Internet and Intranet. 72. How does the Internet facilitate the sharing of information among various entities? 73. Describe the concept of Internet Service Providers (ISPs) and provide examples from Malawi. 74. What are the different methods used to access the Internet? 75. Explain how Internet access via telephone lines differs from accessing it via mobile telephone networks. 76. Discuss the evolution of GSM networks in relation to Internet access. 77. What are the characteristics of Class B IP addresses, and how do they differ from Class A and Class C addresses? 78. Explain the concept of CIDR and how it addresses the limitations of classful IP addressing. 79. Compare and contrast classful and classless IP addressing. 80. How does IPv6 address the limitations of IPv4 in terms of address space exhaustion? 81. Describe the steps involved in configuring an IP address in a Windows operating system. 9|Page 82. Discuss the significance of subnet masks in IP address configuration. 83. Explain how IPv6 addresses are represented and specified. 84. What is the purpose of network and host numbers in an IP address? 85. Discuss the advantages and disadvantages of using WiMAX for wireless Internet access. MEDIUM LEVEL QUESTIONS – TO TEST APPLICATION OF STUDENTS 1. Design a network architecture for a medium-sized business office, considering the deployment of both Local Area Networks (LANs) and Wireless Local Area Networks (WLANs). 2. Implement a Personal Area Network (PAN) using Bluetooth technology to connect various smart devices within a smart home environment. 3. You are tasked with designing a network for a small office environment with ten computers. Considering the advantages and disadvantages of different network topologies, justify your choice of a specific network topology for this scenario. 4. Imagine you are managing a network for a company with multiple branch offices located in different cities. Discuss how you would implement a metropolitan area network (MAN) to connect these offices efficiently. What factors would you consider in designing this network? 5. You are troubleshooting a network connectivity issue in a star topology network. One of the computers is unable to communicate with other devices on the network. Describe the steps you would take to identify and resolve the problem. 6. Suppose you are responsible for upgrading an existing network infrastructure to improve its performance and reliability. Compare the advantages and disadvantages of upgrading to a mesh topology versus a star topology. Which topology would you recommend and why? 7. You have been asked to set up a ring topology network for a small business. Describe the hardware and configuration required to establish this network, including any necessary devices and cable types. 8. You are designing a network for a research laboratory where data security is a top priority. Propose a network topology that provides enhanced security features, and explain how this topology mitigates potential security risks. 9. Design a network layout using a star topology, indicating the central hub or switch and the connected devices. 10. Propose a network configuration for a small office using Fast Ethernet, specifying the type of cables and devices needed for implementation. 11. Develop a token passing scheme for a Token Ring network involving five computers, illustrating how the token circulates among the nodes. 12. Suppose you are tasked with setting up Internet access for a small office with ten employees. Discuss which method of Internet access (e.g., telephone lines, mobile networks, fiber links) would be most suitable for this scenario and justify your choice. 13. You're tasked with selecting an appropriate Internet Service Provider (ISP) for a school in Malawi. What factors would you consider when making this decision? 14. You've been assigned to configure IP addresses for a small office network. Describe the steps you would take to assign unique IP addresses to each device while ensuring proper communication within the network. 10 | P a g e 15. A company is planning to expand its network infrastructure and requires a large number of IP addresses. Would you recommend using IPv4 or IPv6 for this expansion? Justify your choice. 16. You're tasked with evaluating the performance of different Internet access methods, such as DSL, cable, and satellite. How would you conduct a comparative analysis to determine the most suitable option based on factors like speed, reliability, and cost? HIGH LEVEL QUESTIONS – TO TEST ANALYSIS OF STUDENTS 1. Compare and contrast the advantages and disadvantages of using a Wide Area Network (WAN) versus a Metropolitan Area Network (MAN) for connecting multiple branch offices of a multinational corporation. 2. Analyze the impact of network topology on data transmission efficiency and reliability. How do different topologies, such as star, bus, ring, and mesh, influence factors like network congestion, fault tolerance, and scalability? 3. Compare and contrast the physical and logical aspects of network topology. How do physical topology configurations, such as star and bus, differ from logical topologies like token ring and Ethernet? Discuss the implications of these differences on network performance and management. 4. Analyze the factors influencing the choice between wired and wireless network topologies. Compare the advantages and disadvantages of each type of topology in terms of reliability, speed, security, and deployment flexibility. Provide real-world examples to support your analysis. 5. Analyze the significance of access methods like Carrier Sense Multiple Access/Collision Detection (CSMA/CD) and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) in Ethernet and LocalTalk networks, discussing their effectiveness in managing network collisions and optimizing data transmission. 6. Evaluate the role of address resolution protocols (ARP and RARP) in mapping logical IP addresses to physical MAC addresses in Ethernet networks. How do these protocols contribute to efficient data transmission and address resolution in local area networks? 7. Compare and contrast the advantages and disadvantages of different methods of Internet access, including DSL, cable, fiber optics, and wireless technologies. Assess their suitability for various scenarios, such as residential use, business applications, and remote areas. 8. Evaluate the role of Internet Service Providers (ISPs) in shaping Internet accessibility and affordability worldwide. Investigate the market dynamics, regulatory challenges, and technological innovations driving competition and market consolidation in the ISP industry. 9. Analyze the impact of the exhaustion of IPv4 addresses on the development and implementation of IPv6. 10. Evaluate the effectiveness of classful IP addressing in managing Internet Protocol addresses compared to classless IP addressing. 11. Compare and contrast the advantages and disadvantages of accessing the Internet via telephone lines and mobile telephone networks, considering factors such as speed, reliability, and accessibility. 11 | P a g e 12. Critically analyze the role of Internet Service Providers (ISPs) in facilitating global connectivity and information sharing, particularly in emerging markets like Malawi. 13. Analyze the role of address classes in IPv4 addressing and their relevance in contemporary network architecture, considering factors such as scalability, address space utilization, and administrative overhead. NETWORK APPLICATIONS LOW LEVEL QUESTIONS – TO TEST KNOWLEDGE OF STUDENTS 1. What is a network application, and how does it facilitate communication between different hosts? 2. Define the World Wide Web (WWW) and explain its significance in accessing information online. 3. What is the purpose of a web browser, and name three popular web browsers used to access the Internet. 4. Describe the structure of a URL (Uniform Resource Locator) and provide an example. 5. Explain how a search engine functions, including its components and processes. 6. What is a hypertext document, and how does it differ from a traditional linear document? 7. Name three examples of search engines and briefly describe their functions. 8. What are the three components of a search engine, and how do they work together to deliver search results? 9. Define the term "website" and explain its relationship to web pages. 10. Describe the role of a web server and its function in delivering web content to users. 11. How does a search engine index web pages, and what role does keyword scanning play in this process? 12. Explain the purpose of a home page or index page on a website. 13. What is the significance of hyperlinks in hypertext documents, and how do they enhance navigation? 14. Define the term "search query" and explain how users utilize search engines to find information online. 15. Describe the function of a spider or web crawler in the context of search engine operations. 16. What are some examples of internet services mentioned in the content? 17. Define the World Wide Web and describe its significance. 18. Explain the difference between a blog and a website. 19. How does email differ from fax in terms of transmission? 20. List three examples of instant messaging platforms. 21. Describe two advantages and two disadvantages of electronic commerce. 22. What is e-learning, and what are two advantages and disadvantages of this approach? 23. What are newsgroups, and how do they facilitate online communication? 24. Name three popular search engines and describe their functions. 25. Explain the process of browsing the web and what is required to do so. 26. What is the purpose of a web address, and what is it also known as? 27. Can you describe the general format of a web address (URL)? 28. Provide an example of a web address and explain each part of it. 12 | P a g e 29. What are hyperlinks, and how are they used in web browsing? 30. Explain the function of the back button on the navigation toolbar of a web browser. 31. How can you bookmark a web page for quick access later? 32. Describe the process of printing a web page. 33. What is electronic mail (e-mail), and what is required to create, receive, and send e-mails? 34. How do you create a new email account using Gmail? 35. Describe the standard format of an email message and its basic parts. 36. What is the purpose of the subject field in an email message? 37. How can you attach files, such as documents or images, to an email message? 38. Explain the function of the signature in an email message. 39. What are the components of the header information in an email message? 40. Can you provide an example of an email address and explain its different parts? 41. What types of files can be attached to emails as file attachments? 42. What is the maximum file size allowed for attachments in Gmail? 43. How can you attach files to an email in Gmail? 44. Why is it important to add contacts to the address book in email software? 45. What is the difference between social networks and social media? 46. Name three examples of social networks. 47. Describe two advantages of using social networking for global connections. 48. What is one disadvantage of social networking related to productivity? 49. How can social networking be used to advance political power? 50. Explain one disadvantage of social networking related to security and privacy. 51. What is a distributed system, and how does it differ from a centralized system? 52. Name two examples of distributed systems and briefly explain their functions. 53. Define distributed operating system and provide two examples of such systems. 54. What is a distributed application, and how does it utilize resources across multiple servers? 55. Explain the mechanism of load balancing in distributed systems and its significance. 56. Describe the concept of data access in distributed systems and provide an example illustrating its efficiency. 57. What role does hardware management and control play in distributed systems? 58. Discuss the importance of security and reliability in distributed systems, providing an example scenario. 59. Identify three benefits of distributed systems compared to centralized systems. 60. List three challenges or disadvantages associated with distributed systems. 61. Explain how scalability is achieved in distributed systems and its advantages. 62. Describe a scenario where poor network performance can affect the operation of a distributed application. 63. Discuss the security risks posed by poor implementation of distributed applications. 64. How does software complexity impact the management and troubleshooting of distributed applications? 65. In what ways do distributed applications facilitate efficient communication and resource sharing? 13 | P a g e LOW LEVEL QUESTIONS – TO TEST COMPREHENSION OF STUDENTS 1. What is a network application, and how does it help in communication between different hosts? 2. Can you explain the purpose of the World Wide Web (WWW) and its role in accessing information online? 3. What is the main function of a web browser, and can you name three commonly used web browsers? 4. Describe the structure of a URL (Uniform Resource Locator) and provide an example. 5. How does a search engine work, and what are its primary components? 6. What is a hypertext document, and how does it differ from a traditional document? 7. Name three examples of search engines and briefly explain what they are used for. 8. Describe the role of a web server and its function in delivering web content to users. 9. How do search engines index web pages, and why is this process important? 10. What is the purpose of a home page or index page on a website? 11. Explain the concept of hyperlinks and their significance in hypertext documents. 12. What is a search query, and how do users utilize it to find information online? 13. Describe the function of a spider or web crawler in the context of search engine operations. 14. Can you define the term "website" and explain how it relates to web pages? 15. How does a web browser help users navigate and view web pages on the Internet? 16. What is the purpose of the World Wide Web? 17. Can you name two examples of electronic commerce platforms? 18. What is the difference between email and fax? 19. How do newsgroups facilitate online interaction? 20. Name one advantage and one disadvantage of e-learning. 21. What are search engines used for? 22. Define the term "instant messaging" and give one example. 23. What does it mean to browse the web? 24. Describe one advantage of using a blog. 25. What are the two components required for sending and receiving emails? 26. What is the other name for a web address? 27. How do hyperlinks help users navigate web pages? 28. Describe the function of the back button on the navigation toolbar. 29. What is the purpose of bookmarking a web page? 30. Explain the process of printing a web page. 31. What is electronic mail, and what is needed to send and receive emails? 32. How can you create a new email account using Gmail? 33. What are the basic parts of an email message? 34. Describe the purpose of the subject field in an email. 35. How can you attach files to an email message? 36. Explain the function of the signature in an email. 37. What are the components of the header information in an email? 38. Describe the purpose of the @ symbol in an email address. 39. What is the purpose of the period (.) in an email address? 14 | P a g e 40. How do you compose and send an email message? 41. What is the purpose of inserting file attachments in emails? 42. Can you name three types of files that can be attached to emails? 43. What is the maximum size limit for file attachments in Gmail? 44. Describe the process of attaching files to an email in Gmail. 45. How do you manage contacts in Gmail to avoid typing errors? 46. What are social networks used for? 47. Can you list two examples of social media content? 48. Explain the advantage of social networking in terms of global connections. 49. What is one disadvantage of social networking related to productivity? 50. How can social networking be used to enhance career opportunities and employment? 51. What is a distributed system? 52. How does a distributed system differ from a centralized system? 53. Can you provide examples of distributed systems? 54. What is a distributed operating system? 55. Name two examples of distributed operating systems. 56. What is a distributed application? 57. Can you give examples of distributed applications? 58. What are the mechanisms used to manage hardware in distributed systems? 59. What is load balancing, and why is it important in distributed systems? 60. How does data access work in distributed systems? 61. Explain the importance of security and reliability in distributed systems. 62. What are the benefits of distributed systems compared to centralized systems? 63. What challenges do distributed systems face? 64. How does scalability contribute to the advantages of distributed systems? 65. How do distributed applications facilitate communication and resource sharing? MEDIUM LEVEL QUESTIONS – TO TEST COMPREHENSION OF STUDENTS 1. How do network applications facilitate communication between different hosts, and what benefits do they offer to network operators? 2. Explain the difference between the Internet and the World Wide Web (WWW), highlighting their respective purposes and functionalities. 3. Compare and contrast the features of at least three popular web browsers, discussing their strengths and weaknesses. 4. Describe the components of a URL (Uniform Resource Locator) and their significance in accessing web resources. 5. How do search engines gather and index information from various websites, and what factors determine the ranking of search results? 6. Discuss the role of hypertext documents in web navigation, emphasizing their structure and the advantages they offer over traditional documents. 7. Evaluate the importance of web servers in delivering web content to users and maintaining the accessibility of websites. 15 | P a g e 8. Describe the process by which search engines generate search results based on user queries, highlighting the criteria used for ranking. 9. Explain how hyperlinks contribute to the interconnectedness of web pages and facilitate navigation within websites. 10. Analyze the functions of a home page or index page on a website and discuss strategies for designing an effective homepage. 11. Investigate the impact of web browsers on the user experience and discuss how browser choice can influence browsing efficiency. 12. Critically evaluate the role of spiders or web crawlers in search engine operations, considering their efficiency and potential limitations. 13. Assess the significance of search queries in retrieving relevant information from the web and discuss techniques for refining search queries. 14. Explore the relationship between websites and web pages, examining how multiple web pages are organized and linked together. 15. Investigate the evolution of search engine technology and its impact on information retrieval and web navigation over time. 16. Explain the concept of electronic commerce and provide two advantages and disadvantages of conducting business online. 17. How does instant messaging differ from email communication, and why might someone prefer one over the other in certain situations? 18. Describe the function of search engines on the Internet and provide examples of popular search engines. 19. Discuss the advantages and disadvantages of electronic learning (e-learning) compared to traditional classroom learning. 20. What are newsgroups, and how do they facilitate online interaction and information sharing among users? 21. Can you differentiate between a blog and a website? Provide examples of content typically found on each. 22. Explain the purpose of browsing the web and describe the basic steps involved in browsing. 23. Describe the role of a web portal and provide examples of specialized services they offer. 24. How do electronic mail (email) and fax transmission work, and what are the similarities and differences between them? 25. Discuss the addictive nature of the Internet and explain why users may find themselves continuously using it. 26. How does the format of a web address typically appear? 27. Explain the difference between a domain name and a top-level domain. 28. Describe the function of hyperlinks in web pages and provide an example. 29. What are the main buttons found on the navigation toolbar, and what are their functions? 30. How does bookmarking a web page facilitate revisiting it in the future? 31. Can you name at least three commonly used email software platforms? 32. Describe the steps involved in creating a new email account using Gmail. 33. What are the three basic parts of an email message, and how do they contribute to the overall structure? 16 | P a g e 34. How do you attach files to an email message, and why might you want to do so? 35. Explain the significance of the @ symbol in an email address. 36. Describe the process of composing and sending an email message. 37. How can you print a web page, and what factors might you consider before doing so? 38. Can you differentiate between the header information and the message body in an email? 39. What are the advantages of using electronic mail (email) as a means of communication? 40. How does creating a signature in an email message enhance communication? 41. How does the format of a web address (URL) typically look like? 42. What is the significance of the protocol in a web address? 43. Can you explain the purpose of the domain name in a web address? 44. What does the top-level domain in a web address indicate? 45. How do hyperlinks facilitate navigation between web pages? 46. Describe the functions of the navigation toolbar in Mozilla Firefox. 47. What steps would you follow to bookmark a web page in Firefox Mozilla? 48. How would you print a web page using Mozilla Firefox? 49. What is the purpose of electronic mail (e-mail)? 50. Name three examples of email software mentioned in the content. 51. How do you create a new email account in Gmail? 52. Explain the process of composing a new email message in Gmail. 53. What types of files can be attached to emails? 54. How do you manage contacts in Gmail to avoid typing errors? 55. What is the difference between social networks and social media? 56. Describe the concept of load balancing in distributed systems and why it is essential. 57. Explain the role of distributed operating systems in coordinating hardware and software resources. 58. How do distributed systems enhance reliability and fault tolerance compared to centralized systems? 59. Discuss the benefits of using distributed applications in scenarios such as online flight reservations and video conferencing. 60. Can you elaborate on the mechanisms used to manage hardware in distributed systems, and how do they contribute to system efficiency? 61. Compare and contrast the internet and intranet as examples of distributed systems. 62. What are the main advantages of distributed systems over centralized systems, and how do they impact scalability and resource utilization? 63. Explain the concept of data access in distributed systems and how it differs from centralized data access. 64. Describe the challenges associated with implementing distributed applications, particularly regarding software complexity and network performance. 65. How do distributed systems ensure security and reliability, especially in scenarios like accessing bank account statements through ATM machines? 66. Discuss the advantages and disadvantages of distributed applications in terms of communication efficiency and resource sharing. 17 | P a g e 67. Can you provide examples of how distributed systems are used in real-world scenarios, such as social networks and online banking? 68. Explain why scalability is a significant factor in the benefits of distributed systems and how it affects system growth. 69. Describe the role of distributed applications in enhancing data sharing and device utilization, using examples like airline reservations and distributed cash dispensing machines. 70. How do distributed systems address the challenge of software complexity, particularly when running on different platforms? MEDIUM LEVEL QUESTIONS – TO TEST APPLICATION OF STUDENTS 1. Imagine you are starting a new business and need to communicate with suppliers and customers. Discuss how you would utilize email and fax communication to facilitate business transactions and correspondence. 2. You have been assigned a group project that requires collaboration with classmates. How could you use various internet services such as email, instant messaging, and web-based tools to coordinate tasks and communicate effectively with your team? 3. Suppose you want to access the Government of Malawi website. Describe the steps you would take to enter its web address correctly in the URL box of your web browser. 4. Imagine you need to bookmark a frequently visited web page. Walk through the process of bookmarking it using Mozilla Firefox. 5. If you encounter a problem while loading a web page and it fails to load completely, explain what action you would take using the navigation toolbar. 6. You want to send an email attachment containing a document to a colleague. Detail the steps you would follow to attach the file to your email message. 7. Assume you have received an email with an important document attached. Describe how you would save the attachment to your computer for future reference. 8. You are tasked with creating a new email account using Gmail for your friend. Outline the necessary information you would require from your friend to set up the account successfully. 9. Your colleague is struggling to print a web page from their browser. Explain the process of printing a web page and troubleshoot any potential issues they may encounter. 10. You want to compose an email message to your professor with an urgent query. Discuss the elements you would include in the email header to ensure it reaches the intended recipient promptly. 11. Suppose you need to navigate to a specific section on a web page using hyperlinks. Describe how you would identify and click on the appropriate hyperlink to reach your desired destination. 12. Imagine you want to revisit a web page you bookmarked a few weeks ago but cannot recall its exact title. Explain how you would access your bookmark list in Mozilla Firefox and locate the desired page. 13. You need to forward an important email to multiple recipients in your contact list. Discuss the steps you would take to select the recipients and forward the email message using your email software. 18 | P a g e 14. Suppose you receive an email with a suspicious attachment from an unknown sender. Outline the precautions you would take before opening the attachment to ensure the security of your computer. 15. You are collaborating on a project with classmates and need to share a large file with them via email. Describe the alternative methods you could use to share the file securely without exceeding email attachment limits. 16. Your friend is struggling to understand the concept of a domain name and a top-level domain. Provide real-life examples to illustrate the distinction between the two terms. 17. Imagine you want to find a specific piece of information on the Internet using a search engine. Explain how you would formulate an effective search query and evaluate the search results to find relevant information. 18. Suppose you need to access the Government of Malawi website. Walk me through the steps of typing the correct web address in the URL box. 19. Imagine you want to attach a document to an email in Gmail. Can you describe the steps you would take to accomplish this task? 20. You have received an email with an important attachment, but you're unsure how to download it. How would you proceed to download the attachment? 21. If you wanted to revisit a web page you bookmarked in Firefox Mozilla, what steps would you take to access your bookmarked pages? 22. Suppose you want to send an email to multiple recipients using Gmail. How would you go about adding multiple email addresses in the recipient field? 23. Imagine you're exploring a website and come across a hyperlink to another page that interests you. Describe how you would navigate to that linked page. 24. You've received an email with several attachments, including images and documents. How would you view and download these attachments? 25. Suppose you're composing an email in Gmail and want to format the text to make it more readable. Explain how you would apply formatting options such as bold, italics, or bullet points. 26. You've encountered a problem while printing a web page using Mozilla Firefox. Describe the troubleshooting steps you would take to resolve the issue. 27. You've been asked to send an email with a large attachment, exceeding 25MB. How would you address this limitation and ensure the successful delivery of the attachment? 28. Suppose you want to change the contact details of a recipient in your Gmail address book. Can you explain the process of editing contact information? 29. Imagine you want to share a link to a webpage on your social media profile. Describe how you would copy the URL of the webpage and share it on your social network. 30. You've received an email with a link to an online job posting. Explain how you would click on the link to view the job details and apply for the position. 31. Suppose you're concerned about your privacy while using social networks. Describe some strategies you could implement to safeguard your personal information. 32. You've encountered inappropriate content on a social networking site. Explain how you would report this content to the platform's administrators for review and removal. 19 | P a g e HIGH LEVEL QUESTIONS – TO TEST ANALYSIS OF STUDENTS 1. Compare and contrast the functionalities of different web browsers, such as Mozilla Firefox, Google Chrome, and Microsoft Edge, in terms of their navigation toolbars, bookmarking features, and compatibility with web standards. 2. Critically assess the importance of protocols like HTTP and HTTPS in ensuring secure and efficient communication between web servers and clients. Discuss the implications of using secure encryption protocols for protecting sensitive data transmitted over the Internet. 3. Analyze the impact of electronic learning (e-learning) on traditional education systems. Evaluate the effectiveness of online learning platforms in providing accessible and flexible educational opportunities for learners of all levels. 4. Assess the significance of email attachments in facilitating the exchange of files and documents in professional and personal communication. Discuss the challenges and security considerations associated with sending and receiving email attachments. 5. Evaluate the usability and user interface design of popular email software such as Outlook Express, Gmail, and Yahoo Mail. Discuss the features that enhance user experience and productivity in managing emails and attachments. 6. Analyze the role of bookmarks in organizing and accessing frequently visited web pages. Discuss strategies for effectively managing bookmark lists to improve navigation efficiency and information retrieval on the Internet. 7. Compare and contrast the advantages and disadvantages of using social networking for personal and professional purposes. 8. Analyze the potential impact of social networking on traditional forms of communication, such as face-to-face interactions and telephone conversations. 9. Evaluate the role of social networking in shaping global connections and fostering cross- cultural communication. 10. Critically assess the effectiveness of social networking as a tool for marketing and advertising goods and services, considering factors such as audience engagement and conversion rates. 11. Analyze the ethical considerations surrounding the collection and use of personal data by social networking platforms, including issues related to privacy, consent, and data security. 12. Examine the influence of social networking on societal norms and behaviors, particularly regarding the formation of online communities and the spread of viral content. 13. Investigate the impact of social networking on mental health and well-being, exploring topics such as addiction, cyberbullying, and self-esteem issues. 14. Critically evaluate the role of social networking in political movements and activism, considering its potential for both positive social change and manipulation. 15. Examine the relationship between social networking and employment opportunities, considering factors such as professional networking, recruitment strategies, and online reputation management. 16. Evaluate the effectiveness of social networking platforms in facilitating educational opportunities and online learning, including their role in providing access to educational resources and fostering collaborative learning environments. 20 | P a g e 17. Critically assess the impact of social networking on traditional media industries, such as journalism and broadcasting, examining both challenges and opportunities for adaptation and innovation. 18. Analyze the role of social networking in shaping public opinion and influencing political discourse, considering its impact on issues such as misinformation, polarization, and echo chambers. 19. Examine the ethical dilemmas faced by social networking companies in moderating user- generated content, balancing freedom of expression with the need to prevent harm and maintain community standards. 20. Evaluate the potential risks and benefits of using social networking platforms for professional networking and career advancement, considering factors such as privacy concerns, network diversity, and online reputation management. HIGH LEVEL QUESTIONS – TO TEST EVALUATION OF STUDENTS 1. Evaluate the effectiveness of electronic learning (e-learning) compared to traditional classroom-based learning methods. Consider factors such as student engagement, learning outcomes, accessibility, and cost-effectiveness to determine the suitability of e-learning for various educational contexts. 2. Assess the ethical implications of electronic commerce (e-commerce) practices, including issues related to consumer privacy, data security, intellectual property rights, and fair competition. Critically analyze current e-commerce regulations and industry standards to identify areas for improvement in protecting stakeholders' interests. 3. Evaluate the impact of instant messaging on interpersonal communication skills and social relationships. Compare and contrast the benefits and drawbacks of instant messaging platforms in facilitating real-time communication, collaboration, and relationship building in personal and professional contexts. 4. Critically evaluate the role of search engines in shaping information access and knowledge dissemination on the internet. Analyze the algorithms, biases, and ranking mechanisms used by search engines to prioritize search results and assess their implications for information equity, diversity, and accuracy. 5. Assess the role of web portals in providing specialized services and information access to internet users. Evaluate the usability, functionality, and value proposition of different web portal designs in meeting users' needs and preferences across diverse domains such as finance, sports, news, and entertainment. 6. Evaluate the effectiveness of different email service providers, such as Gmail, Yahoo Mail, and Outlook, in terms of user interface design, features, and security measures. Compare and contrast their strengths and weaknesses, and recommend the most suitable email client for specific user requirements, such as personal use, business communication, or academic purposes. 7. Critically assess the impact of electronic learning (e-learning) on traditional education systems, considering factors such as accessibility, flexibility, and learning outcomes. Analyze the advantages and disadvantages of e-learning compared to traditional classroom-based 21 | P a g e instruction, and propose strategies for integrating online learning technologies into existing educational frameworks. 8. Evaluate the ethical implications of email marketing practices, including issues related to privacy, consent, and data protection. Assess the ethical responsibilities of marketers and organizations in managing email subscriber lists, designing email campaigns, and complying with anti-spam regulations. Propose ethical guidelines and best practices for conducting email marketing campaigns in accordance with legal and ethical standards. 9. Assess the effectiveness of web browsers in providing a secure and reliable browsing experience, considering factors such as privacy features, malware protection, and browser compatibility. Evaluate the performance of popular web browsers such as Google Chrome, Mozilla Firefox, and Microsoft Edge in safeguarding user data and preventing security vulnerabilities. Recommend browser settings and extensions to enhance online security and privacy. 10. Evaluate the impact of hyperlink navigation on user experience and website accessibility, considering factors such as link placement, link labeling, and navigation hierarchy. Analyze the usability and effectiveness of hyperlinks in facilitating website navigation and information retrieval, and propose design improvements to enhance user engagement and interaction with web content. 11. Assess the impact of electronic mail (e-mail) on communication patterns and interpersonal relationships in professional and personal contexts. Evaluate the advantages and disadvantages of email communication compared to other forms of communication, such as face-to-face meetings, phone calls, and instant messaging. Discuss strategies for managing email overload, improving email etiquette, and fostering effective communication practices in diverse organizational settings. 12. Evaluate the effectiveness of electronic commerce (e-commerce) platforms in facilitating online transactions and digital commerce activities. Analyze the user experience, security features, and payment options offered by popular e-commerce platforms such as Amazon, eBay, and Shopify. Assess the impact of e-commerce on consumer behavior, market dynamics, and business competitiveness in the digital economy. 13. Critically evaluate the role of bookmarks in web browsing and information management, assessing their usability, organization, and synchronization features. Analyze the benefits and limitations of bookmarking systems in storing and retrieving web content, and propose strategies for optimizing bookmark management across different web browsers and devices. Discuss the impact of browser extensions and cloud-based bookmarking services on user productivity and workflow efficiency. 14. Evaluate the evolution of web-based communication technologies, such as instant messaging, video conferencing, and social media platforms, in facilitating global connectivity and digital collaboration. Assess the impact of these technologies on interpersonal communication, social interaction, and community engagement in the digital age. Discuss the challenges and opportunities associated with the use of web-based communication tools in various social, cultural, and organizational contexts. 15. Evaluate the effectiveness of social networking platforms in facilitating global connections, considering factors such as user engagement, diversity of interactions, and cultural sensitivity. 22 | P a g e 16. Assess the impact of social networking on organizational marketing strategies, comparing the advantages and disadvantages of various platforms in reaching target audiences, driving conversions, and building brand loyalty. 17. Critically analyze the ethical implications of data privacy and security breaches on social networking platforms, evaluating the adequacy of current regulations and industry practices in protecting user rights and mitigating risks. 18. Evaluate the role of social networking in shaping political discourse and public opinion, examining instances of misinformation, echo chambers, and algorithmic bias, and proposing strategies for promoting transparency and accountability. 19. Assess the influence of social networking on mental health and well-being, synthesizing research findings on topics such as social comparison, cyberbullying, and addiction, and proposing interventions to mitigate negative effects. 20. Evaluate the societal impact of social networking, considering its role in fostering social cohesion, promoting activism, and facilitating civic engagement, as well as its potential for exacerbating social divisions and amplifying extremist ideologies. 21. Assess the role of social networking in advancing educational objectives, analyzing its potential for knowledge dissemination, collaboration, and personalized learning experiences, and identifying challenges and opportunities for educational institutions. 22. Evaluate the economic implications of social networking, analyzing its impact on industries such as advertising, e-commerce, and media, and assessing the potential risks and benefits of platform monopolies and data-driven business models. 23. Critically evaluate the role of social networking in promoting diversity and inclusion, examining efforts to combat discrimination, harassment, and hate speech, and proposing strategies for creating more inclusive online environments. 23 | P a g e USING DATABASES LOW LEVEL QUESTIONS – TO TEST KNOWLEDGE OF STUDENTS 1. What is a database? 2. Why is managing data important for organizations? 3. List three ways in which organizations use data stored in databases. 4. Name the two main types of databases. 5. What is a manual database? 6. Provide three examples of a manual database. 7. What are some problems associated with a manual database? 8. Explain what redundancy means in the context of databases. 9. What is an electronic database? 10. How does an electronic database differ from a manual one in terms of accessibility? 11. Define Database Management System (DBMS). 12. List three functions provided by a DBMS. 13. Name two examples of DBMS software. 14. What are the benefits of using a database management system? 15. Describe what tables are in a database. 16. What is a database model, and why is it essential in database management? 17. List the five types of database models and briefly explain each one. 18. Describe the hierarchical database model and explain why it is rarely used in modern database systems. 19. Compare and contrast the network model with the hierarchical model in terms of their data organization structures. 20. Explain the characteristics of the relational database model and why it is the most popular type of database model. 21. Define the object-relational model and discuss its significance in database management. 22. Describe the object-oriented database model and explain why it is not widely used in the market. 23. Define a database schema and explain its role in database design. 24. Differentiate between a field, a record, a table, and a database in the context of database structures. 25. Explain the purpose of a field in a database table and provide an example. 26. Define a record in a database and describe its components. 27. Discuss the characteristics of a database table and its role in organizing related records. 28. Define a database and explain how it is different from a table. 29. Explain the importance of considering factors such as data volume and user requirements before creating a database. 30. Describe the steps involved in designing a database before its creation, including estimating data volume and normalizing fields. 31. What are the five main tabs available in the Microsoft Access application window? 32. How do you create a new database in Microsoft Access 2016? 33. Describe the process of customizing the default Table1 in Microsoft Access. 34. What is a primary key, and why is it important in database design? 24 | P a g e 35. How do you set a field as the primary key in Microsoft Access? 36. Explain the purpose of indexes in a database table. 37. Can you name two types of field data types used in Microsoft Access? 38. Describe the characteristics of the Short Text data type in Microsoft Access. 39. What is the difference between the Long Text and Short Text data types in Microsoft Access? 40. What is a calculated field, and how is it used in Microsoft Access? 41. Explain the purpose of the Date/Time data type in a database. 42. How do you set a field as required in Microsoft Access? 43. What is the significance of the Allow Zero Length property in Microsoft Access field properties? 44. Describe the validation rule and validation text properties in Microsoft Access. 45. How do you create an index on a field in Microsoft Access? 46. What are the three main actions involved in manipulating a database? 47. How can you add new records to a database table directly in datasheet view? 48. What symbols appear in the row headers when entering records in datasheet view? 49. How can you delete a record from a database table? 50. What is the process for editing the content of a cell in a database table? 51. How do you search for specific records within a database table? 52. What commands can you use to copy or move records within a database? 53. Describe the difference between sorting and filtering records in a database. 54. How can you adjust the column width and row height in a database table? 55. Explain the process of reordering table fields in a database. 56. What precautions should you take before modifying the structure of a database table? 57. What is a form in the context of database management, and how is it useful? 58. What controls can you place on a form design, and where are they found? 59. Describe the difference between a bound control and an unbound control on a form. 60. How can you create a form using the Form Wizard? LOWLEVEL QUESTIONS – TO TEST COMPREHENSION OF STUDENTS 1. How does managing data impact organizational decision-making? 2. Compare and contrast manual and electronic databases. 3. What are some challenges organizations face with manual databases as they grow? 4. Explain why redundancy is a problem in manual databases and how it can be addressed. 5. In what ways does an electronic database offer advantage over a manual one? 6. Can you name two functions provided by a Database Management System (DBMS)? 7. Describe the purpose of queries in a database and the language commonly used to write them. 8. How do forms facilitate data entry and user interaction in a database system? 9. What is the significance of reports generated from a database for decision-making? 10. How do tables organize data in a database, and what do rows and columns represent? 11. Provide an example of a situation where lack of flexibility in a manual database could pose a problem. 12. Explain the importance of data sharing in an organizational context. 13. How does a Database Management System ensure the security and integrity of data? 14. Describe one benefit of using a database management system for statistical analysis. 25 | P a g e 15. Can you name one example of DBMS software and explain its significance in database management? 16. What is the purpose of a database model in database management? 17. Can you name the five types of database models mentioned in the text? 18. Explain the hierarchical database model and why it is considered outdated. 19. How does the network model differ from the hierarchical model in terms of data organization? 20. Why is the relational database model the most popular among database models? 21. Define the object-relational model and its significance in database management. 22. What is the object-oriented database model, and why is it not widely used in the market? 23. What is a database schema, and what role does it play in database design? 24. Differentiate between a field, a record, a table, and a database in the context of database structures. 25. Explain the importance of fields in a database table with an example. 26. Define a record in a database and list its components. 27. Describe the characteristics of a database table and its function in organizing related records. 28. What distinguishes a database from a table? 29. Why is it essential to consider factors like data volume and user requirements before creating a database? 30. Outline the steps involved in designing a database before its creation, including the normalization of fields. 31. What is Microsoft Access commonly used for? 32. Can you list the five main tabs found in the Microsoft Access application window? 33. How do you create a new database in Microsoft Access? 34. Describe the purpose of a primary key in a database table. 35. What is an index, and what is its role in a database table? 36. Name three examples of field data types used in Microsoft Access. 37. Explain the significance of the Short Text data type in database fields. 38. What is the difference between Long Text and Short Text data types? 39. What is a calculated field, and how is it useful in database design? 40. What does the Date/Time data type represent in a database? 41. How do you set a field as required in Microsoft Access? 42. Describe the Allow Zero Length property in Microsoft Access field properties. 43. What is a validation rule, and why is it used in database fields? 44. What is the purpose of validation text in Microsoft Access? 45. How do you create an index on a field in Microsoft Access? 46. What are the main actions involved in manipulating a database? 47. How can you add new records to a database table? 48. What symbols appear in the row headers when entering records in datasheet view? 49. How do you delete a record from a database table? 50. Describe the process of editing the content of a cell in a database table. 51. How can you search for specific records within a database table? 52. What commands can you use to copy or move records within a database? 53. Explain the difference between sorting and filtering records in a database. 54. How do you adjust the column width and row height in a database table? 26 | P a g e 55. What is a form, and how is it used in database management? 56. What controls can you place on a form design? 57. Differentiate between a bound control and an unbound control on a form. 58. How can you create a form using the Form Wizard? 59. What is a query, and what types of queries exist in databases? 60. Describe the steps involved in creating a query using the Query Wizard. MEDIUM LEVEL QUESTIONS – TO TEST COMPREHENSION OF STUDENTS 1. How does managing data impact organizational decision-making? 2. Compare and contrast manual and electronic databases. 3. What are some challenges organizations face with manual databases as they grow? 4. Explain why redundancy is a problem in manual databases and how it can be addressed. 5. In what ways does an electronic database offer advantages over a manual one? 6. Can you name two functions provided by a Database Management System (DBMS)? 7. Describe the purpose of queries in a database and the language commonly used to write them. 8. How do forms facilitate data entry and user interaction in a database system? 9. What is the significance of reports generated from a database for decision-making? 10. How do tables organize data in a database, and what do rows and columns represent? 11. Provide an example of a situation where lack of flexibility in a manual database could pose a problem. 12. Explain the importance of data sharing in an organizational context. 13. How does a Database Management System ensure the security and integrity of data? 14. Describe one benefit of using a database management system for statistical analysis. 15. Can you name one example of DBMS software and explain its significance in database management? 16. Compare and contrast the hierarchical and network database models, highlighting their respective advantages and disadvantages. 17. Discuss the key features of the relational database model and explain how it differs from the object-relational model. 18. Analyze the reasons why the object-oriented database model is not widely adopted in the market, despite its ability to handle complex data objects. 19. Evaluate the role of a database schema in database design and management, and discuss its importance in ensuring data integrity and consistency. 20. Design a hypothetical scenario where a relational database model would be the most appropriate choice for storing and managing data, citing specific examples of tables and relationships. 21. Assess the benefits and challenges of using an object-relational database model compared to a pure relational database model in handling complex data structures and relationships. 22. Propose a database design for a university course registration system using the relational model, including tables for students, courses, and enrollments, and explaining the relationships between them. 23. Critically analyze the factors that organizations should consider when choosing between different database models, such as scalability, flexibility, and ease of maintenance. 24. Explain the process of customizing a table in Microsoft Access. 27 | P a g e 25. What are the steps involved in setting a field as the primary key in Microsoft Access? 26. Describe the differences between the Number and Currency data types in Microsoft Access. 27. How do you create a calculated field in Microsoft Access, and what are some common use cases for calculated fields? 28. Discuss the significance of the Date/Time data type in a database, providing examples of scenarios where it might be used. 29. Explain the concept of field properties in Microsoft Access and how they are used to define the characteristics of data fields. 30. Describe the purpose of validation rules in Microsoft Access, and provide an example of when you might use one. 31. How does indexing improve the performance of database queries in Microsoft Access? 32. Discuss the role of indexes in maintaining data integrity in a database table. 33. Explain the significance of the Allow Zero Length property in Microsoft Access field properties, providing an example of when it might be used. 34. Describe the steps involved in creating an index on a field in Microsoft Access. 35. Discuss the advantages and disadvantages of using the AutoNumber data type in Microsoft Access. 36. How does Microsoft Access handle data types such as OLE Object and Attachment? 37. Explain the purpose of the Default Value property in Microsoft Access, providing an example of its use. 38. Discuss the importance of field size in Microsoft Access, particularly in relation to text and numeric fields. 39. Explain the difference between appending and editing records in a database table. 40. When typing directly into datasheet view, how is a new record saved automatically? 41. Describe the process of deleting a record from a database table. 42. How can you modify the structure of a database table, and why is it important to do so carefully? 43. Discuss the importance of sorting and filtering records in a database and provide examples of when each might be useful. 44. What are some common methods for adjusting column width and row height in a database table? 45. Explain the purpose of reordering table fields in a database and how it can be accomplished. 46. Describe the steps involved in modifying the structure of a database table, including adding or removing fields. 47. How can you create a form using the Form Wizard, and what are the benefits of doing so? 48. Compare and contrast the design process for creating a form using the Form Wizard versus designing a form in Design View. 49. Explain the purpose of form navigation buttons and how they are used. 50. Discuss the steps involved in modifying the design of a form, including formatting field controls. 51. How can you print forms from a database, and what considerations should be made when doing so? 52. Describe the process of creating a query using the Query Wizard and the options available during this process. 53. Explain the concept of specifying query criteria and provide examples of how it can be used to retrieve specific data from a database. 28 | P a g e MEDIUM LEVEL QUESTIONS – TO TEST APPLICATION OF STUDENTS 1. Explain the concept of data redundancy and its implications in database management. 2. Describe the differences between a table and a query in a database, providing examples of each. 3. Discuss the importance of data integrity in a database and explain how it can be maintained. 4. Explain the role of forms and reports in a database management system, and how they facilitate data interaction and analysis. 5. Describe the purpose of a Database Management System (DBMS) and provide examples of popular DBMS software. 6. Discuss the benefits of using an electronic database over a manual one, citing specific advantages for organizations. 7. Describe the features of a Database Management System (DBMS) that ensure data security and privacy. 8. Discuss the role of database administrators (DBAs) in managing and maintaining database systems within organizations. 9. Explain the difference between primary keys and foreign keys in database tables, providing examples to illustrate their usage. 10. Describe the steps involved in creating a database schema and designing tables to represent different types of data. 11. Discuss the impact of poor database design on organizational efficiency and decision-making, providing examples to support your explanation. 12. Explain the concept of data warehousing and its significance in enabling business intelligence and analytics. 13. Develop a database application using Microsoft Access to track inventory for a retail store, including forms for data entry, queries for inventory management, and reports for sales analysis. 14. Using Microsoft Access, create a new database named "Inventory" and specify its location on your computer. 15. Design a table in Microsoft Access called "Employees" with the following fields: EmployeeID (AutoNumber, Primary Key), FirstName (Short Text), LastName (Short Text), and HireDate (Date/Time). 16. Add two records to the "Employees" table you just created, including details for each field. 17. Create a new table named "Products" with the fields: ProductID (AutoNumber, Primary Key), ProductName (Short Text), UnitPrice (Currency), and QuantityInStock (Number). 18. Populate the "Products" table with at least three records, providing details for each field. 19. Establish a relationship between the "Employees" and "Products" tables in Microsoft Access. 20. Create a query in Microsoft Access to display all the products with a Unit Price greater than $50. 21. Generate a report in Microsoft Access that lists all employees hired after January 1, 2023, including their full names and hire dates. 22. Design a form in Microsoft Access for entering new product information into the "Products" table, including fields for Product Name, Unit Price, and Quantity in Stock. 23. Use Microsoft Access to create a calculated field in the "Products" table that calculates the total value of each product in stock (Unit Price * Quantity in Stock). 24. Write a validation rule in Microsoft Access to ensure that the Unit Price of a product is always greater than zero. 29 | P a g e 25. Create an index on the "ProductName" field in the "Products" table to improve search performance. 26. Apply conditional formatting to the "QuantityInStock" field in the "Products" table to highlight any values less than 10 in red. 27. Use Microsoft Access to import data from an Excel spreadsheet into a new table named "SalesData." HIGH LEVEL QUESTIONS – TO TEST ANALYSIS OF STUDENTS 1. Analyze the potential risks associated with using a manual database system for storing sensitive customer information in a financial institution, and propose strategies to mitigate these risks. 2. Evaluate the efficiency of a database management system in a healthcare setting for maintaining patient records, considering factors such as data accuracy, accessibility, and privacy compliance. 3. Evaluate the effectiveness of data quality management practices, such as data profiling, cleansing, and validation, in ensuring the accuracy, completeness, and consistency of data stored in a database, and propose quality assurance measures. 4. Analyze the potential impact of using AutoNumber as the primary key data type in a database table. What are the advantages and disadvantages compared to using other data types? 5. Compare and contrast the benefits and limitations of using Short Text and Long Text data types for storing textual information in a database. When would you choose one over the other? 6. Critically evaluate the effectiveness of indexing multiple fields in a database table. Discuss the scenarios where multi-field indexing would be advantageous and when it might not be necessary. 7. Analyze the implications of setting validation rules on database fields. How do validation rules contribute to data integrity and usability? Provide examples to support your analysis. 8. Assess the impact of applying calculated fields in a database table. Discuss the advantages and potential challenges of using calculated fields, particularly in complex database systems. 9. Evaluate the role of relationships in database design, focusing on the significance of enforcing referential integrity. How does enforcing referential integrity contribute to data consistency and accuracy? 10. Analyze the importance of normalization in database design. Discuss the benefits of normalization in terms of data organization, storage efficiency, and query optimization. 11. Critically evaluate the use of input masks in Microsoft Access. Discuss how input masks enhance data entry accuracy and usability, and identify potential drawbacks or limitations. 12. Analyze the role of field properties in database design and management. Discuss how field properties contribute to data validation, formatting, and user experience in database applications. 30 | P a g e

Use Quizgecko on...
Browser
Browser