Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Hsc 2107: Information Communication Technology Question Paper

Hsc 2107: Information Communication Technology 

Course:Bachelor Of Communication And Journalism

Institution: Multimedia University Of Kenya question papers

Exam Year:2012



MULTIMEDIA UNIVERSITY COLLEGE OF KENYA

FACULTY OF MEDIA AND COMMUNICATION

BACHELOR OF MASS COMMUNICATION

HSC 2107: INFORMATION COMMUNICATION TECHNOLOGY

YEAR 1, SEM 2

DATE: AUGUST 17TH, 2012 TIME: 11:00-1:00PM


INSTRUCTIONS

ANSWER QUESTION ONE AND ANY OTHER TWO QUESTIONS

Question one: (30 marks)

i) Explain the five characteristics of ICTs. (10 marks)
ii) Determine any two uses, two advantages and one disadvantage of using ICTs in the following sectors:
A)Communication (5 marks)
B)Commerce (5 marks)
C)Agriculture (5 marks)
D)Health (5 marks)

Question two: (20 marks)

i. The diffusion of Innovations theory by Everret Rogers is one of the most useful theories in the adoption of innovations.
a) Write brief notes on the four elements in the diffusion of innovations. (8 marks)
b) With the aid of a diagram, illustrate the five step process through which diffusion of an innovation occurs. (12 marks)

Question three: (20 marks)

i)Define the term convergence as used in media technology. (5 marks)
ii)Explain how media convergence has affected the following:
a) Newspapers (5 marks)
b) Mobile phones (5 marks)
c) Digital cameras (5 marks)

Question four: (20 marks)

i) The general characteristics of information should suggest the qualities of good information. Identify the qualities of good information as it relates to communication technology. (10 marks)
ii)The goal of information processing is to produce meaningful information. Explain the steps that are taken in processing data into information. (10 marks)

Question five: (20 marks)

i)Explain the term Computer security. (4 marks)
ii) Discuss any five of the various attacks that can be made against a computer system. (10 marks)
iii) Illustrate why it is difficult to respond forcefully to attempted computer security breaches. (6 marks)






More Question Papers


Popular Exams



Return to Question Papers