What is a source code as used in computer programming?
State the name of the storage space used by the operating system when there is insufficient RAM
State two advantages of electronic databases over a flat file
Website data is broken down into packets to be transmitted to a user. Describe the structure of a data packet.
It has a header
It has a payload
It has a trailer.
Explain the Fetch – Execute cycle and provide an example of a Central Processing Unit (CPU) component for each stage of the cycle
The Fetch – Execute cycle is a sequence of actions, performed by the processor as it fetches
a program instruction from its memory, determines what the instruction wants to do and
carries out those actions. The stages of the cycle are provided below.
Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access
State four threats that compromise data integrity and state ways that can be used to minimise these threats
State four threats that compromise data integrity
How threats to data integrity can be minimised:
Your friend wishes to install a wireless network in his office. Explain to him the difference between guided and unguided media
Describe and give an example of one syntax and one logical programming error.
Syntax
• An error that occurs when a command does not follow the expected syntax of the language, e.g. when a keyword is incorrectly spelt
• Incorrect: IF A ADN B Then
• Correct: IF A AND B Then
Logical
• An error that causes a program to output an incorrect answer (that does not necessarily crash the program)
• An algorithm that calculates a person’s age from their date of birth, but ends up giving negative numbers
Explain how the techniques of
(i) verification,
(ii) validation
are used to ensure that the stored data is as accurate as possible.
Dual input of data
Rules are given to the processor
Drop-down list/radio buttons
What is secondary storage?
Distinguish between microwave and a radiowave transmission and a microwave transmission (KCSE 2017 PP1)
Microwaves can cover shorter distances. On the contrary, radio waves can travel a long distance. Radio wave is usually propagated through sky mode while microwave uses the line of sight propagation.
Satellite services are used to provide broadband internet connectivity to regional and remote areas of Kenya. State one advantage and one disadvantage of using satellites for this purpose.
Advantages
Disadvantages
State the functions of the following utility programs
(a) Defragmentation software
(b) Disk contents analysis/repair software
(c) Disk formatter
(a) Defragmentation software - Reorganises files on a disk to improve efficiency
(b) Disk contents analysis/repair software - Scans a hard disk to identify bad sectors
(c) Disk formatter - Prepares a hard disk for first use
Describe the main characteristics that distinguish high-level programming languages from low-level languages.
The following are software classified according to the end user licence agreement. Briefly describe each of them:
open source software, freeware, shareware, and proprietary software
Open source : refers to software provided freely with its source code. The user can modify and redistribute the software.
Freeware: these are software that can be downloaded for free and distributed, buta the source code is hidden and cannot be altered.
Shareware: is software that is available for free within a given trial period, after which it must be bought.
Proprietary: software made for commercial purposes. The source code is hidden, and it can only be used after paying for a licence.
When a new student is enrolled, a new record is added to the file immediately. The examination grades of all students are updated twice a year. Discuss the processing implications of these two requirements.
Enrolment:
- Data input on line
- Individual records validated
- Speed mismatch implications
- Indexes updated immediately
Exam grades:
- Data input twice
- Off line
- Run as a batch
- At otherwise downtime
Give one difference between a compiled program and interpreted program
Name two other input/output devices used at the POS terminal apart from keyboard and barcode reader and give a use for each device.
device: beeper/loud speaker
use: to indicate barcode correctly read/error in reading barcode
device: (LCD) screen/monitor
use: to show prices and other information about goods
device: touch screen
use: to show prices and other information about goods/to select items that need to be
weighed/identified
device: weighing machine
use: to find weight of loose items (e.g. fruit) to enable pricing
device: (magnetic) card reader/CHIP and PIN reader
use: to read customer’s debit/credit card/enable customer to pay for goods using a
credit or debit card
device: printer
use: to print receipts
Give one application of each type of data transmission. Each application must be different
Parallel
Serial