admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

1. State two ways in which a computer may be used in a healthcare  sector other than record keeping

  • Patient monitoring
  • Used to control medical equipment e.g ultra sound
  • medical research and studies
  • communication and telemedicine

Identify one component common to all computers.

  • Processor

State the contents of a feasibility study report

  • Recommendation on whether to continue or abandon the project
  • Methods used to collect data
  • benefits and limitations expected
  • the technology required to develop and maintain the project
  • Installation and running cost
  • Time limit

A sound engineer is recording a singer. Describe why the sound must be converted to a digital format before it can be stored on a computer system

  • Computer systems use binary/ones and zeros/voltage on or off;
  • Sound is analogue/continuous;
  • Computers use digital data/discrete values

KCSE 2016 COMPUTER STUDIES PAPER 1

A manager wishes to replace the current manual system with a computerized one. Describe three areas that must be evaluated to justify the replacement  (6 marks)

  • Technical feasibility
  • Does the current technology suffice
  • Economic feasibility
  • Benefits outweigh costs/ whether the project is cost effective
  • Schedule feasibility
  • Can it be done within the schedule

Headache, back and neck pain may result from the use of computers. State how each of them can be minimized (2mks)

  • Proper lighting
  • Regular breaks
  • Use of antiglare
  • Correct position of the screen
  • Ergonomic furniture

Students of a school intended to elect their school Captain by secret ballot.  State three ways in which computers can be used to improve the election process                           (3mks)

  • Registrations of voters
  • Voter identification
  • Actual voting
  • Tallying

State two reasons for the increased use of computers in offices                      (2 marks)

  • They are small and fit in a small storage space
  • They are portable hence can be carried when need to be used outside the office
  • Low power consumption
  • Have rechargeable batteries

Describe the role of a repeater when used in a network.

a repeater will amplify a signal and resend it to overcome reduction in signal strength (attenuation) because over a distance network signals diminish in size/amplitude (are attenuated) due to characteristics of the media.

Explain why it is beneficial to get more RAM instead of relying on virtual memory.

  • More RAM will improve the performance of the computer 
  • More RAM will speed up the access to data
  • Excessive use of VM can cause disk thrashing which decreases performance
  • VM is slower to access than RAM direct (because it has to go back to RAM first)
  • Moving data between RAM and VM takes processor time

When an image is inserted in a DTP document is selected, handles on its placeholders appear.  State three uses of these handles

  • Used to resize the image
  • Used to rotate the image
  • Used to move the image


Interfaces enable computer users to interact with the operating system. State three advantages of using a graphical user interface (GUI) for loading programs and files.

  • novice can use the system right away
  • user-friendly/easy to select
  • click on icons/picture to select
  • easier to input/words are replaced with icons
  • no need to know command language to use the system/remember
  • command language
  • selecting item using mouse is faster than entering commands
  • avoids typing errors
  • no need to type
  • no need to remember commands
  • no need know the different commands for the different software
  • multitasking (several programs open at the same time therefore easier
  • /faster to switch
  • easier/faster switching between files, folders etc.

A computer game involves driving a racing car around a track. State which two modes of data processing  would be appropriate, justifying your answers

  • Real time  E.g. turning the wheel must turn the car immediately
  • On line - Otherwise system cannot be real time

Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access

  • Websites any inappropriate websites ie pornography, drugs, guns,
  • terrorism etc. e.g. is it acceptable for the organisation to allow access to this
  • sort of material when you can’t control who is accessing the service?
  • Time limit amount of time, they may not want to provide indefinite access
  • or may want to charge for access after the time limit has expired.
  • Preventing file sharing and illegal sharing\use of copyrighted materials.
  • Accountability identification of users and actions on a network by
  • preventing anonymous access.
  • Prevention of illegal activities such as terrorism and fraud.
  • The responsibility to keep children safe and protected.
  • Responsibility to keep users (customers) data safe and secure.
  • Spoofing of websites, phishing. Responsibility of organisation to put some kind of protection in place, eg filtering of known fraudulent sites.
  • Recording of private messages or details if not encrypted.
  • Recording of usernames and passwords that the user may also use to access other systems.
  • Responsibility of organisation to secure their systems from possible attack.
  • Sales and marketing providing sales leads to market products.

Describe one difference between system software and application software

  • System software manages the computer hardware/application software
  • application software is for end-user tasks

Give a reason why microwaves are commonly used for point-to-point communication

  • their small wavelength allows conveniently sized antennas to direct them in narrow beams, which can be pointed directly at the receiving antenna

A car park uses a number plate recognition system. Identify the reason why unsigned integers should be used to record the number of cars entering and leaving the car park, rather than signed integers

  • Unsigned integers store more positive values

(iv) Identify the part of the CPU that sends signals to the other components.

 

 Control unit

Describe two different functions performed by an operating system

Memory management

  • Manage the computer’s memory;
  • It can control which parts of the memory are being used by which process

Processor management

  • Manage the computer’s processor(s)CPU;
  • Schedules of which processes are to be executed;

Input/output management

  • Manages input/output devices;
  • Interacts with/manages/handles the (automatic) installation of device drivers;
  •  Handles peripheral device interrupts;
  • the computer can communicate with the outside world;
  • Control network communication;
  • Allow devices to send and receive data;

Managing storage

  • Manage secondary storage devices;
  • Loading data and programs into the computer’s memory;
  • Storage space management (disk quotas);
  • To ensure that storage space is allocated fairly and efficiently to specific tasks\users;

Managing security

  •  User authentication;
  • To make sure that users must prove who they are to access the system;
  • Protect against malware;
  • Block access to specific vulnerable operations or system areas. For example, software can only be installed with admin access;

Managing applications

  • Control access to applications;
  • Prevent users or processes from using unauthorised programs // allow users or
  • processes to use authorised programs;
  • Control application access;
  • Prevent/allow an application access to data (or devices);


 

The data before encryption is known as .................................................. text.
To scramble the data, an encryption .................................................., which is a type
of .................................................., is used.
The data after encryption is known as .................................................. text.
Encryption prevents the data from being .................................................. by a hacker

The data before encryption is known as .......plain.................. text.
To scramble the data, an encryption ......................key.........................., which is a type
of ...................key............................, is used.
The data after encryption is known as ....................cipher............................. text.
Encryption prevents the data from being ......................understood...................... by a hacker

Internet and E-mail Questions

Define the term internet      1mk

  • The global interconnection of computer networks for purpose of communication and resource sharing

Explain the term web page    1mk

  • A hypertext  page prepared to display the content on the web

Explain the following internet address http://www.google.co.us in reference to the structure of a URL    3mks

  • HTTP- hypertext transfer protocol or simply protocol
  • WWW – subdomain
  • google – the name of the computer with the web content/domain name
  • .co – top level domain for commercial organization
  • .us- a TLD extension for the country US

 

What is the world wide web                                       1mk

  •  A virtual space on the internet that allows web pages and sites to be accessed

Define the term browser                                    1mk

  •  A software that used viewing of web content

Explain the meaning of the word hyperlink     1mk

  • A text or picture that is a link to another webpage on the internet

What is a search engine?     1mk

  • Is a special program that collects and stores links to information websites allowing users to search its database for them
  • A specialized web-based application that help the user to search for specific information on the internet.

Explain the meaning of the term internet service provider            1mk

  • A company that offers internet services to end-users

Identify three elements apart from a computer that is required for one to be connected to the internet    3mk

  • Modem
  • Internet software
  • Internet service provider
  • Telecommunication lines
  • TCP/IP protocols

 

Define the term modem 1mk

  • Stands for modulator-demodulator
  • A device that enables telecommunication to use telephone lines

What is a protocol? Write the following in full: TCP/IP, HTML, HTTP and FTP           5mks

  • Protocols – are special communication rules that govern sending and receiving of messages by computers on a network
  • Html – hypertext markup language
  • Hypertext transfer protocol
  • Transmission Control Protocol
  • Internet Protocol
  • File Transfer Protocol

What would you do if a website refused to load on the browser within the first attempt?   1mk

  • Click the refresh button on the toolbar

 State three internet services                         3mks

  • Instant messaging
  • E-mails
  • E-commerce
  • Social media and networks
  • E-learning

 

Define the term internet telephony      1mk

  • Transmission of voice data over the internet

State three benefits of the internet in our society

  • Provides a platform for conducting business and marketing
  • Provides many platforms such as social media through which people can contact each other
  • Cost saving
  • Efficient communication

Describe how the database can be recovered from a system failure

  • backups/dumps of files
  • copy of files on CD/tape streamer
  • file generations