It helps the programmer visualise the steps in a program / find errors/bugs / check the algorithm gives the correct output (1) because they can see the value a variable holds at a given point in an algorithm (1)
Identify the type of software used to compress files.
Utility Software
State any four applications of electronic spreadsheets
Internet and E-mail Questions
Define the term internet 1mk
Explain the term web page 1mk
Explain the following internet address http://www.google.co.us in reference to the structure of a URL 3mks
What is the world wide web 1mk
Define the term browser 1mk
Explain the meaning of the word hyperlink 1mk
What is a search engine? 1mk
Explain the meaning of the term internet service provider 1mk
Identify three elements apart from a computer that is required for one to be connected to the internet 3mk
Define the term modem 1mk
What is a protocol? Write the following in full: TCP/IP, HTML, HTTP and FTP 5mks
What would you do if a website refused to load on the browser within the first attempt? 1mk
State three internet services 3mks
Define the term internet telephony 1mk
State three benefits of the internet in our society
Describe and give an example of one syntax and one logical programming error.
Syntax
• An error that occurs when a command does not follow the expected syntax of the language, e.g. when a keyword is incorrectly spelt
• Incorrect: IF A ADN B Then
• Correct: IF A AND B Then
Logical
• An error that causes a program to output an incorrect answer (that does not necessarily crash the program)
• An algorithm that calculates a person’s age from their date of birth, but ends up giving negative numbers
Explain why a software developer should be responsible for addressing ergonomic issues in software design.
Responsibilities of the software developer is to ensure that the ergonomics focuses on making software user-friendly, reduces repetitive motions or eyestrain and enables movements of users to promote comfort and efficiency.
Software can be designed with adjustable text sizes and screen brightness settings to prevent eye strain, offering users a way to customise their visual experience for better comfort during prolonged use.
Suggest two advantages of using robots, instead of humans, to build cars in the factory.
State what is meant by each of the following modes of data processing
(i) Batch processing.
(ii) Real-time processing.
(iii) Online processing.
(iv) Off-line processing.
(i) Jobs collected together for processing at a later time
(ii) Output produced quickly enough to affect the next input
(iii) User has direct contact with the processor
(iv) User cannot communicate directly with the processor
A company making televisions has introduced robots to replace the human work force.
(a) Describe three effects this would have on the work force
(b) Give two advantages to the company of introducing robots
(c) How could the robots be trained to assemble the televisions?
(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?
(a) Describe three effects this would have on the work force
(b) Give two advantages to the company of introducing robots
lower work force costs (no salaries to pay)
(c) How could the robots be trained to assemble the televisions?
(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?
Describe the principles of operation of laser printers and describe how they are applied in real-life scenarios
Steps
Briefly describe the following
Multitasking - the capability of an operating system to enable users to run two or more programs at once on a single computer
Real time processing - data processing system in which the time interval required to process and respond to inputs is so small that the response itself is useful for controlling the physical activity of a process
Time-sharing processing - a processing mode in which the central processor serves two or more users with different processing requirements (tasks)
On-line processing - is that type of processing where the result of data processing transaction is available immediately
Explain each of the strategies listed below.
(a) Phishing
(b) DoS
(a) Phishing
(b) DoS
5 Artificial intelligence is an emerging trend in computer science.
(a) Discuss the use of artificial intelligence by describing some of its characteristics, the ways in which it may be used and the ethical issues associated with its use.
Branch of computer science based on enabling computers to
behave like humans/mimic aspects of human intelligence
• AI is implemented in software.
• Combines psychology, biology, linguistics, mathematics, neuroscience,
and philosophy (ethics)
• AI is not the same as the general intelligence of human beings
Uses – Any of the following:
• Game playing (chess, quiz, video games)
• Analytics (analyse buying patterns, predicting behaviours, predictive
text, financial markets)
• Image processing (recognising objects/patterns)
• Logistics (scheduling, order fulfilment)
• Control systems (cars, manufacturing, weapons, navigation)
• Expert systems (medical, mechanical, electrical diagnosis)
• Neural networks (simulating neuron behaviours as in brains)
• Natural languages processing (chatterbots, chatbots, speech
recognition)
• Robotics (dangerous situations, help aged or disabled)
Ethical issues – Any of the following:
• Take the work of humans, thereby affecting employment rates
• Is a computer to be trusted to make decisions (life-death)?
• If a computer discovers something that humans can’t prove, should it be
accepted as truth?
• Do AI machines have rights?
• Will people be comfortable interacting with machines that are
considered intelligent?
What is block operation as used in Microsoft word?
An editing or formatting procedure that is carried out on a selected block of text in a word-processing document.
A formatting or editing operation that is applied to a block of text after selecting. The block of text can be a paragraph, line, word, page or the whole document. It is much easier to apply editing or formatting to a block of text than to apply it to every single character
Describe a typical situation that requires the use of:
(i) a high-level language
(ii) a low-level language.
High level languages are used in situations when:
Low level languages are used in situations when:
Distinguish between real-time and distributed operating systems (KCSE 2018)
- Filtering - Sorting - Input validation - Subtotals - Data entry forms
State three types of optical disks
When developing a network security policy, it is important to understand the threats that can be made against a network. ‘IP spoofing’ and ‘back doors’ are two techniques that can compromise the security of a network. Describe each of these techniques.
IP spoofing
A technique used to gain unauthorised access to a computer whereby an intruder sends messages to that computer from a false IP address
Back door:
An undocumented method of gaining access to a program, online service or an entire computer system
Describe overtype and insert modes as used in word processors