subject

4a b
Give the function of the following toolbox tools as used in Power point
(i) Slide background (ii) Slide effect (iii) Inserting Image (iv) Scroll tags (v) Title Slide.
(10 mks
Mention the shortcut Icon required to perform the following action in Ms-word : (i) Relocating TEXT
(ii) Changing FONT SIZE (iii) changing FONT STYLE (iv) TEXT BOLDING
( 10 ml
5a
(5mks
(10 mk
(i) Define computer System and its constituents elements
(ii) List the key differences between word processing and desktop publishing.
List the areas of application of the following packages:
(i) Ms-word, (ii) Ms-Paint, (iii) MS-ppt.(iv) Ms- Excel (v) Ms-Publishing
b
(5 mks
ба
(10 m
Give the function of the following Ms-Excel software tools as used in data analysis
(i) Inserting Table (ii) IF conditional statement (iii) Cell formating (iv) The use of Formula (v)
Briefly explain the following menu as used in Ms-word:
(i) copy (ii) paste (iii) cut (iv) icon (v) Edit
b
(10 n

Differentiate between the following pairs:
(i) Space bar and Tab keys (ii) Return key and Word wrap
(iii) Del key and BKSP key (iv) system software and application software
(v) List two ways by which a user can acquire application software
Give the function of the following computer keyboard combinations:
(i) CTRL+H (ii) CTRL+C (iii) CTRL+Z (iv) ALT+F4 (v) CTRL+S
(10r
b
(10

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 00:30
Jenny wants to look at row 345 and compare it to row 17. what can she do if she wanted to easily adjust to see both at once?
Answers: 3
question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
question
Computers and Technology, 23.06.2019 17:00
The more powerful, 60 volt cables and the main power shut off on an hev are both colored orange
Answers: 1
question
Computers and Technology, 23.06.2019 18:00
While inserting images, the picture command is usually used to insert photos from a digital camera, and the clip art command is usually used to a.edit the sizes and other characteristics of photos that have been inserted. b.take a screenshot of an image and copy it to the clipboard for pasting. c.search for drawings or other images from a library of prepared pictures. d.make illustrations using lines and shapes that are easy to manipulate.
Answers: 1
You know the right answer?
4a b
Give the function of the following toolbox tools as used in Power point
(i) Slide ba...
Questions
question
Business, 05.03.2021 21:40
question
Social Studies, 05.03.2021 21:40
question
Mathematics, 05.03.2021 21:40
question
Mathematics, 05.03.2021 21:40
Questions on the website: 13722360