0% found this document useful (0 votes)
5 views7 pages

Hims BRS? 07

The document consists of a series of multiple-choice questions and true/false statements related to inventory management, computer systems, data backup, malware, and health management information systems. It also includes sections for matching items, short answer questions, and easy questions regarding networking and chat. The content is structured to assess knowledge in these areas through various question formats.

Uploaded by

albertevalyne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views7 pages

Hims BRS? 07

The document consists of a series of multiple-choice questions and true/false statements related to inventory management, computer systems, data backup, malware, and health management information systems. It also includes sections for matching items, short answer questions, and easy questions regarding networking and chat. The content is structured to assess knowledge in these areas through various question formats.

Uploaded by

albertevalyne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

The following are the common inventory management application except…


A. Electronic logistic management information system
B. Zoho inventory
C. Hard drive (HD) { }
D. SellerCloud
E. Logiwa

2. Used for single sites where people need to share resources among themselves but not with the
rest of outside world …………………
A. Internet
B. Wifi
C. Networking
D. Local area network {LAN} { }
E. Stock management

3. Data backup ….
A. Is the result of copying or archiving hard disc for the purpose of being able to restore
them in case of data loss
B. Is the result of copying or archiving files and folders for the purpose of being able to
restore them in case of data loss. [ ]
C. Is the process of adjust Ram for the purpose of being able to restore them in case of
data loss.
D. Is the new viruses which attack computers every day
E. the result in which Trojan maintain the computer to perform

4. Software used to spy on computer users activation activities and collect personal information
but is not classified as virus………………
A. Trojan house
B. Blended Threat
C. Malware [ ]
D. Antivirus software
E. worm

5. The System designed to collect facility based health and health and health related data, compile,
store and retrieve for data analysis to produce report which in turn in form service providers,
health managers, decision markers/policy makers and public to make informed decision on
health planning, monitoring and evaluation and provision of services at all level of health care
delivery………………………………………………………………….

A.HIMS

B.CIBET
C.MTUHA ‘[ ]

D. NO ANSWER

E.A&C

6. WHO health management system information has many of component one of the following is the
example of that ………………………………………………………..

A. Outputs
B. STG
C. NEMLET [ ]
D. WINDOW
E. Electronic ordering

7 The program which targets one particular disease also known as ………………………

A. Vertical programme
B. World programme
C. City programme [ ]
D. Data programme
E. Shazam programme

8. The program that used in presentation

A. Microsoft word
B. Microsoft access
C. Microsoft power point [ ]
D. Microsoft publisher
E. Microsoft excel

9. THE program that allow you to create and manage data bases specifically, a rational data base.

A. Microsoft publisher
B. Microsoft excel [ ]
C. Microsoft word
D. Microsoft access
E. Microsoft edge

10. Definition of data base management system (DBMS)

A. Is a collection that collect the information in Microsoft excel


B. Is the collection of programs which enable its users through application to access data base,
manipulate data and produce report.
C. Is an organized collection of data [ ]
D. Is the collection program which inhibit user through application to disable data base.
E. Is an organized collection of data which help to minimize entry
SECTION B MULTIPLE TRUE AND FALSE

1. Importance about computer anti-viruses.


a. protect computer with viruses………….
b. speed up the computer system…………
c. Help computer files to become shortcut………
d. Two-way firewall…………….
e. Increase viruses in USB drive …………………..
2. DHSIS 2 features
A. Microsoft …………….
B. Charts………………
C. Wide………………
D.Events……………
E. Routine data……….
3. True about most popular viruses
A. Worm- is full of as much trickery as the mythological worm its named
after……………..
B. Blended- threats the threat also exploit vulnerabilities ………………………
C. Trojan house- do not reproduce by infecting other files, they self-
replicate…………………………
D. Malware-type of computer virus that affect local disk c mostly………………….
E. Melisa virus-this is the type of viruses which can most occur at ROM,………..
4. Vertical programs integrated into DHIS 2
A. National malaria control program (NMCP)……………………………….
B. National software control program (NSCP)……………………………….
C. Administration& HR Management department…………………………….
D. National health record and control program (NHRCP)………………………
E. National Microsoft control program…………………
5. Networks based on size are
A. Personal area network (PAN)…………………
B. Metropolitan area network (MAN)…………
C. General area network (GAN)…………
D. Public area network (PAN)………..
E. Last area network (LaN) ……………..

6. In the computer data can be lost the following are the causes of data loss except.
A. Deleting files accidentally……………..
B. Theft of computer………………………
C. Using of Kaspersky anti-virus………..
D. Power failures……………..
E. Fire accidents and explosion…………
7. About data backup storage media.
A. Off-site data protection……………..
B. SSD/Solid state storage ……………….
C. Magnetic tape………………..
D. Optical storage…………….
E. Near-line storage…………..
8. True about malware virus
A. Technically, is not classed as virus………………………..
B. Is a software used to spy on computer users activities………………………………….
C. More commonly is known as “spyware”…………………………………….
D. It’s more use full to delete file in the computer …………………………..
E. It propagates using multiple method…………………………………..

9. Common inventory management software.


A. Electronic logistic management information………………………
B. Zoho inventory ……………………………………….
C. District health information software 2……………………………………….
D. Cin7……….
E. Cr7……………

10. True about filling and application of security to data.


A. Retrieval-appropriate access level should be given based on needs of the staff
member to perform their job……………………………
B. Hybrid system-this can be accomplished through a record check out
system……………………….
C. Filling – is using electronic system record consider if part of the electronic health
………………….
D. Manage system- is the process of control computer system ………………………………………
E. Objectivity –maintain an unbiased and open mind about the case
…………………………………..

SECTION C

MATCHING ITEM QUESTION (10MARKS)

Match the basic principle of good report writing

s/n Colum A s/n Colum B


1 Conciseness A Explain why certain information is
lacking or incomplete
2 accuracy B Avoid ambiguous sentences and vague
statement.
3 impartiality C Report information gained from physical
senses, example. Sight, smell, taste and
touch.
4 Completeness D Avoid unrelated extraneous, incidental,
and non essential information and
detail.
5 Clarity and report formatting E Avoid formulating preconceived ideas
about the guilt of the accused

Colum A 1 2 3 4 5
Colum B

MATCH THE COMPUTER SHORTCUT

PART B

SN COLUM A SN COLUM B
1 Create a new folder A Ctrl+D
2 Select all contents of the page B Ctrl+G
3 Find and replace options C Ctrl+F
4 Open find box D Ctrl+shift+n
5 Front option E Ctrl+A

COLUM A 1 2 3 4 5
COLUM B

SECTION D

SHORT ANSWER QUESTIONS (40 MARKS)

1. List procedure of searching information on the internet. (4maks)


A…………………………….b………………………………..c……………………………………….d………………………………
e……………………
2. Define the following (@2 marks)
A. Primary key …………………………………………………………………………………………………………………
B. Foreign key………………………………………………………………………………………………………………..
3. Write five importance of PMIS in vertical programmes (@2maks)
I. …………………………………………………………………………………………………………………………
II. ………………………………………………………………………………………………………………………..
III. …………………………………………………………………………………………………………………………….
IV. …………………………………………………………………………………………………………………………..

4. Mr. Nando computer is attacked sophisticated and affected into the system and network then
computer became slow. What is the type of computer virus attack Nando’s computer and
advice to him……………………………………………………………………………..…………………………. (3maks)
5. Demonstrate procedure for electronic and selling (4maks)
I. ……………………………………………………………………………………………
II. ………………………………………………………………………………………………….
6. List procedure to insert table in Microsoft word 2007. (3maks)
………………………………………………………………………………………………………………..
7. Briefly explain 3 importance of health management information system. (6maks)
I. …………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………..
II. …………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
.
III. …………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
8. Write methodological of report writing (@ 1.5)
A. …………………………………………..
I. ………………………………………………
II. …………………………………………………….
III. ………………………………………………………
IV. ……………………………………………………………
V. ……………………………………………………………….
VI. ………………………………………………………………….
VII. ……………………………………………………………………….
VIII. …………………………………………………………………….
IX. …………………………………………………………………..

B. …………………………………………………………….

SECTION E
Easy question section (20maks)
1. Define networking , describe four importance of networking used in disseminating
pharmaceutical information.10 marks
2. Define chat, explain type of chat and when should use it. 10 marks

You might also like