State the seven layers of the OSI model
Explain the difference between main memory and secondary storage.
(iii) John von Neumann proposed the concept of a stored program.
State the two items he proposed to store in main memory.
Data
Instructions
Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.
Blagging
Phishing
Shouldering
Mikal has been employed as a computer trainer in an organisation. State three roles that she is likely to play in the organisation
State two functions of utility software
Describe each of the following storage devices
DVD - optical media which use one spiral track; red lasers are used to read and write data on the media surface; makes use of dual-layering technology to increase the storage capacity
ROM - non-volatile memory chip; contents of the chip cannot be altered; it is often used to store the start-up routines in a computer (e.g. the BIOS)
SSD/ Solid State Drive/memory (SSD)
non-volatile memory device that uses NAND flash memories (which consist of millions of transistors wired in series on single circuit boards)
Blue Ray - optical media that uses blue laser technology to read and write data on the media surface; it uses a single 1.1 mm polycarbonate disc
The operators who enter the data into the files sit at keyboards to do their work.
Discuss
(i) the potential health hazards of this type of work,
(ii) the ways that management can help to overcome the effects of the health hazards.
(i) the potential health hazards of this type of work,
(ii) the ways that management can help to overcome the effects of the health hazards.
State a circumstance under which dry-run testing is performed when developing a program (2mks)
Describe each of the following types of program errors, using an example.
Syntax error
Logical error
Run-time error
Syntax error
Logical error
Run-time error
Describe two health risks associated with the increased use of computers.
State and explain four network communication devices
What is a source code as used in computer programming?
Computer Studies Paper 1 2021 KCSE Prediction Section B Qs. 17,18 and 19
17. a) i) Explain the term search as used in the Internet. [2]
A web based application that locates items or information from the World Wide Web
ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download. [3]
b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system. [4]
c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:
i. Cropping [2]
Applies to graphics – used to trim/remove/hide some portions in the graphics
ii. Transparency [2]
Used to make background of a graphic to be clear/visible
d. List two areas where infrared waves are used in data communication. [2]
18. a) List four activities of the planning stage of systems development. Ignore this question, marks redistributed elsewhere
b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.
i. Technical [3]
Done to determine whether technology exists to support the proposed solution
ii. Economic [3]
Done to determine whether the proposed solution is economically viable
iii. Schedule [3]
Done to determine whether the proposed system can be done within an acceptable time.
c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.
Table 1
|
Dept Code |
Dept Name |
|
001 |
Computer |
|
002 |
Aviation |
|
003 |
Engineering |
Table 2
|
DeptID |
Student Registration No. |
Student’s Name |
|
002 |
St01 |
Alex Too |
|
003 |
St02 |
Naomi Komi |
|
002 |
St03 |
Peter Kengo |
i. Identify the appropriate primary key for each table. [2]
Table 1 – Dept code, Student Registration No
ii. Explain two benefits of enforcing referential integrity in the database. [4]
19. a) Describe each of the following validation checks as used in data processing.
i. Preserve check [2]
Ignore this question, marks redistributed elsewhere
ii. Data type check [2]
Ensure correct type of data is entered for the field
iii. Check digit [2]
This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.
b. Write each of the following abbreviations in full:
i) BCD [1½]
Binary Coded Decimal
ii) EBCD [
This question was thrown out and marks redistributed elsewhere
iii) ASCII [1½]
American Standard Code for Information Interchange
c) Using 10-bits binary number system, perform the following decimal operation using two’s complement. [6]
12910 - 12810
+129 = 00 1000 0001
128 = 00 1000 0000
-128 = 11 0111 1111 (ones complement)
+1
11 1000 0000 (Twos complement)
129- 128
00 1000 0001
+ 11 1000 0000
100 0000 0001
Hence = 00 0000 00012 or 12 (the overflow bit is ignored)
Explain why a firewall improves network security.
Ahmed sees the message “Set your browser to accept cookies”.
Explain why some websites make this request.
Define Domain integrity
Domain integrity - ensures that all data in a field contain valid values
Describe what is meant by a clock speed of 3.8 GHz.
(a)Explain why programmers prefer to represent instruction in hexadecimal rather than in binary
(b) Give two other uses of hexadecimal
(a)Explain why programmers prefer to represent instruction in hexadecimal rather than in binary
(b) Give two other uses of hexadecimal
Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.