Define the following
(a) Cookies
(b) Spyware
(c) Phishing
(d)Spam
(e) Pharming
(a) Cookies
(b) Spyware
(c) Phishing
(d)Spam
(e) Pharming
How many hard disks are required to implement RAID 10?
A school opted to use direct changeover approach when installing a new system. Explain three challenges that the school may face as a result of this approach (KCSE 2019)
Name two other input/output devices used at the POS terminal apart from keyboard and barcode reader and give a use for each device.
device: beeper/loud speaker
use: to indicate barcode correctly read/error in reading barcode
device: (LCD) screen/monitor
use: to show prices and other information about goods
device: touch screen
use: to show prices and other information about goods/to select items that need to be
weighed/identified
device: weighing machine
use: to find weight of loose items (e.g. fruit) to enable pricing
device: (magnetic) card reader/CHIP and PIN reader
use: to read customer’s debit/credit card/enable customer to pay for goods using a
credit or debit card
device: printer
use: to print receipts
Differentiate between object code and source code
One characteristic of a robot is its mechanical structure.
State two other characteristics of a robot
Aeroplanes now use Global Positioning Systems (GPS) to determine their location.
Describe how the computer on board the aeroplane uses GPS to find its exact location
Give two benefits of using GPS in this application
Describe how the computer on board the aeroplane uses GPS to find its exact location
– satellites transmit signals to onboard computers
– computers receive/interpret these signals
– system depends on very accurate timing/use of atomic clocks
– each satellite transmits data indicating location and time
– computer in aeroplane calculates location based on at least three satellites
– at least 24 satellites in operation at any one time
– position accurate to within one metre
– can also calculate altitude of aeroplane
– ref to “triangulation”:
Give two benefits of using GPS in this application
– safer as the known location is exact/more accurate
– reduces the possibility of pilot error
– allows accurate estimation of arrival time
– display and guide the pilot to the nearest airport in case of emergency
Explain the Fetch – Execute cycle and provide an example of a Central Processing Unit (CPU) component for each stage of the cycle
The Fetch – Execute cycle is a sequence of actions, performed by the processor as it fetches
a program instruction from its memory, determines what the instruction wants to do and
carries out those actions. The stages of the cycle are provided below.
A workshop has a lot of heavy machinery operating throughout the day and requires a cable to connect a workstation to a switch. Which of the following, unshielded twisted pair (UTP) or shielded twisted pair (STP) cable, would be the more suitable? Justify your response.
Shielded twisted pair cable:
A twisted pair cable is made up of four pairs of twisted copper wires, a shielded twisted pair cable applies a shield to each one of the pairs on a cable or to all of the pairs together. This shield can reduce EMI (electromagnetic interference), which would be emitted from heavy machinery. This increased data transmission quality in the workshop. STP can also reduce crosstalk.
List three types of errors that are likely to exist in a program (3 marks)
Syntax errors-Incorrect use of programming language
Logical errors- The program do not give the expected output
Runtime errors- Premature end of a program
Internet and E-mail Questions
Define the term internet 1mk
Explain the term web page 1mk
Explain the following internet address http://www.google.co.us in reference to the structure of a URL 3mks
What is the world wide web 1mk
Define the term browser 1mk
Explain the meaning of the word hyperlink 1mk
What is a search engine? 1mk
Explain the meaning of the term internet service provider 1mk
Identify three elements apart from a computer that is required for one to be connected to the internet 3mk
Define the term modem 1mk
What is a protocol? Write the following in full: TCP/IP, HTML, HTTP and FTP 5mks
What would you do if a website refused to load on the browser within the first attempt? 1mk
State three internet services 3mks
Define the term internet telephony 1mk
State three benefits of the internet in our society
Define Data Security
State three types of optical disks
Explain the term proofreading as used in word processing (2mks) [kcse 2017 Paper 1]
Give any three advantages of computer networks
State the difference between radio waves and microwave transmission
What is a source code as used in computer programming?
Data integrity in a database can be divided into three categories: referential integrity, domain integrity and entity integrity.
(a)Outline the meaning of each of the following.
(i) Referential integrity
(ii) Entity integrity
(b) Describe how data integrity can improve the process of database management. (2 marks)
(i) Referential integrity
(ii) Entity integrity
(b) Describe how data integrity can improve the process of database management. (2 marks)
IT technicians are setting up a new file server for a school. Describe the benefits and drawbacks of using a command line interface (CLI) rather than a graphical user interface (GUI) to set up a new file server. (4marks)
Benefits
Drawbacks
Describe four features of the operating system when providing a graphical user interface on a personal computer. Give a suitable example of each feature.
Windows for example a word processing application and a spreadsheet
Menus, for example, allow the user to perform operations or run applications such as right-click to create a new folder
Icons for example a picture of linked computers for networking
Pointers(mouse or touchscreen) for example to select items/trigger events
Shortcuts for example to frequently used applications for example having a shortcut to your mail client on your desktop
File navigation for example when searching the hard disc for a file/folder using a browser
copying / deleting / moving/sorting/naming/searching of files or folders for example copying of a file from the hard drive to a USB pen drive (File handling)
Desktop customisation for example changing the colours and background image
Copy and paste for example between applications e.g. copying a graph from a spreadsheet to a word processor
Error messages for example provide users with error/warning/help messages for example ‘printer out of paper’