admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

State the seven layers of the OSI model

  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data link
  7. Physical

Explain the difference between main memory and secondary storage.

  • Main memory is transitory/temporary/volatile, secondary storage is (semi-)permanent
  • The processor can only use data/instructions that are in the main memory
  • Main memory is directly accessible to the processor, secondary storage is not directly accessible to the processor 

(iii) John von Neumann proposed the concept of a stored program.
   State the two items he proposed to store in main memory.

 Data

Instructions

Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.

Blagging

  • This is where a victim is tricked/persuaded by a fraudster to give their details or payment information for a false reason/purpose;

Phishing

  • This is where the victim receives and responds to communication that appears to be from a valid or known source but is in fact fraudulent. (It allows the fraudster to capture private information before the victim realises);

Shouldering

  • This is where someone watches and records\remembers a victim entering their pin or security information such as passwords. (They can then use this information to gain access to a system)

Mikal has been employed as a computer trainer in an organisation. State three roles that she is likely to play in the organisation

  • Developing training materials
  • Training computer users
  • Conducting ICT examinations
  • Managing the learning and examination process
  • Developing guidelines for using the computer lab
  • Planning the course content
  •  

State two functions of utility software

  • Repairing files
  • Compression
  • Defragmentation
  • Back up
  • Anti-virus / anti-spyware / anti-malware
  • Firewall
  • Managing application updates
  • Format disks/drives
  • System analysis tools

Describe each of the following storage devices

DVD - optical media which use one spiral track; red lasers are used to read and write data on the media surface; makes use of dual-layering technology to increase the storage capacity

ROM - non-volatile memory chip; contents of the chip cannot be altered; it is often used to store the start-up routines in a computer (e.g. the BIOS)

SSD/ Solid State Drive/memory (SSD)

non-volatile memory device that uses NAND flash memories (which consist of millions of transistors wired in series on single circuit boards)

Blue Ray -  optical media that uses blue laser technology to read and write data on the media surface; it uses a single 1.1 mm polycarbonate disc

The operators who enter the data into the files sit at keyboards to do their work.
Discuss

(i) the potential health hazards of this type of work,
(ii) the ways that management can help to overcome the effects of the health hazards.

(i) the potential health hazards of this type of work,

  • backstrain due to long periods of immobility
  • eye strain due to long periods of staring  at the screen
  • RSI- continual use of the same muscle group

(ii) the ways that management can help to overcome the effects of the health hazards.

  • Move around regularly
  • use ergonomic chair
  • use anti-glare screen
  • use of wrist pads

State a circumstance under which dry-run testing is performed when developing a program (2mks)

  • To detect and remove errors
  • To confirm if the program produces the expected output

Describe each of the following types of program errors, using an example.

Syntax error

Logical error

Run-time error

Syntax error

  • An error in the source code of a program like pront("Hello, " + name) instead of print
  • These are errors that emanate from improper use of language rules such as spelling mistakes,improper use of variables and misuse of reserved words

Logical error

  • A mistake in a program's source code that results in incorrect or unexpected behaviour like if age == 65: print("Eligible for a discount.") instead of using if age >= 65: print("Eligible for a discount.")
  • These are errors that occur due to imperfect comparisons

Run-time error

  • An error which occurs when a program is asked to do something that it cannot, resulting in a ' crash'9. For example, asking a number to be divided by 0 such as 72/0.
  • An error that results in a sudden halt of an executing program

 

Describe two health risks associated with the increased use of computers.

  • RSI in wrists or fingers from prolonged typing or repeated clicking of mouse button
  • headaches/eyestrain/dry eye from staring at a monitor for long periods of time/glare from monitor
  • back ache/strain from sitting in the  same position for a long time/using chair with no adjustment

State and explain four network communication devices

  • Repeaters : amplify data signal thereby extending the physical coverage of a network. It can connect two LANs locally.
  • Bridges: connect similar types of networks e.g a token ring to another token ring
  • Routers: link networks of different types
  • Gateway: allows computers in a network to connect regardless of their topology

What is a source code as used in computer programming?

  • It is a program written in a high level langauage

Computer Studies Paper 1 2021  KCSE Prediction Section B Qs. 17,18 and 19

17. a) i) Explain the term search as used in the Internet.                                            [2]

A web based application that locates items or information from the World Wide Web

ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download.                                           [3]

  • Size of the video/format
  • The bandwidth of the media/speed of network/network traffic
  • Type of browser software
  • Background activities running in the computer
  • Restrictions enforced in the computer/firewall/antivirus
  • Speed of the computer/CPU speed
  • Size of RAM

b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system.                                                                                  [4]

  • Poor network/lack of connection
  • Software failure in the system
  • Hardware failure
  • Lack of access rights
  • System overload/hanging
  • Lack of skills/disability/illiteracy
  • Lack of power supply

c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:

i. Cropping                                                                                                               [2]

Applies to graphics – used to trim/remove/hide some portions in the graphics

ii. Transparency                                                                                                         [2]

Used to make background of a graphic to be clear/visible

d. List two areas where infrared waves are used in data communication.                             [2]

18. a) List four activities of the planning stage of systems development.                             Ignore this question, marks redistributed elsewhere

b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.

i. Technical                                                                                                               [3]

Done to determine whether technology exists to support the proposed solution

 

ii. Economic                                                                                                              [3]

Done to determine whether the proposed solution is economically viable

 

iii. Schedule                                                                                                               [3]

Done to determine whether the proposed system can be done within an acceptable time.

c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.

Table 1

Dept Code

Dept Name

001

Computer

002

Aviation

003

Engineering

 

Table 2

DeptID

Student Registration No.

Student’s Name

002

St01

Alex Too

003

St02

Naomi Komi

002

St03

Peter Kengo

 

i. Identify the appropriate primary key for each table.                    [2]

Table 1 – Dept code, Student Registration No

ii. Explain two benefits of enforcing referential integrity in the database. [4]

  • No record can be added in Table 2 if its corresponding record in Table 1 does not exist
  • No record in Table 1 can be deleted without first deleting the corresponding record in Table 2
  • Reduces data redundancies/ensures integrity
  • Prevents deletion of related table

19. a) Describe each of the following validation checks as used in data processing.

i. Preserve check                                                                                                      [2]

Ignore this question, marks redistributed elsewhere

ii. Data type check                                                                                                    [2]

Ensure correct type of data is entered for the field

iii. Check digit                                                                                                           [2]

This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.

b. Write each of the following abbreviations in full:

i) BCD                                                                                                                                    [1½]

Binary Coded Decimal

ii) EBCD                                                                                                                                 [

This question was thrown out and marks redistributed elsewhere

iii) ASCII                                                                                                                    [1½]

American Standard Code for Information Interchange

c) Using 10-bits binary number system, perform the following decimal operation using two’s complement.                                                                                                                                   [6]

12910 - 12810

+129 = 00 1000 0001

128 = 00 1000 0000

-128 = 11 0111 1111 (ones complement)

                            +1

          11 1000 0000 (Twos complement)

129- 128

     00 1000 0001

+ 11 1000 0000

 100 0000 0001

Hence = 00 0000 00012 or 12 (the overflow bit is ignored)

Explain why a firewall improves network security.

  • It prevents unauthorised access into the network (by checking IP/MAC address/packet content);
  •  It prevents unauthorised transmissions from inside the network to external locations;
  •  It monitors network traffic;
  • It makes sure that only the right/authorised traffic is allowed;
  • It opens/closes ports as necessary;

Ahmed sees the message “Set your browser to accept cookies”.
Explain why some websites make this request.

  • to enable logon information to be kept on his computer
  • to provide pages customised for Ahmed the next time he logs on
  • to implement shopping carts and one-click purchasing
  • to be able to distinguish between new and repeat visitors to the website

Define Domain integrity

Domain integrity - ensures that all data in  a field contain valid values

Describe what is meant by a clock speed of 3.8 GHz.

  • The number of FDE cycles run per given time/second
  • the frequency that the clock ‘ticks’
  • 3.8 billion cycles/instructions per second

(a)Explain why programmers prefer to represent instruction in hexadecimal rather than in binary

  • A larger number of values can be represented using fewer characters.
  • the shorter length and more characters make the pattern easier to read and understand
  • recognisable character codes can be used for debugging

(b) Give two other uses of hexadecimal

  • HMTL color codes representing RGB spectrum in the web development
  • representation of MAC and IP addresses allowing a larger combination of unique addresses

(a)Explain why programmers prefer to represent instruction in hexadecimal rather than in binary

  • A larger number of values can be represented using fewer characters.
  • the shorter length and more characters make the pattern easier to read and understand
  • recognisable character codes can be used for debugging

(b) Give two other uses of hexadecimal

  • HMTL color codes representing RGB spectrum in the web development
  • representation of MAC and IP addresses allowing a larger combination of unique addresses

Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.

  • All nodes ‘listen’ for traffic to sense when the network is idle.
  • When a node wishes to transmit, it transmits a ‘request to send’ frame’ (RTS)
  • The intended receiving device will transmit a ‘clear to send’ (CTS) frame if it is available.
  • All other nodes ‘sense’ the network is busy and wait a random amount of time before trying to transmit