admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Define Data Security

  • Is the protection of programs and data in computers and communications systems against unauthorized modification, access or disclosure
  •  

State the role of an ISP.

  • To provide access to the Internet

A company has a website that is stored on a web server.
(a) The website data is broken down into packets to be transmitted to a user.
Describe the structure of a data packet.

  • it has a header that contains the destination address, the packet number, and the originator’s address
  • it has a payload
  • it has a trailer.

 

Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access

  • Websites any inappropriate websites ie pornography, drugs, guns,
  • terrorism etc. e.g. is it acceptable for the organisation to allow access to this
  • sort of material when you can’t control who is accessing the service?
  • Time limit amount of time, they may not want to provide indefinite access
  • or may want to charge for access after the time limit has expired.
  • Preventing file sharing and illegal sharing\use of copyrighted materials.
  • Accountability identification of users and actions on a network by
  • preventing anonymous access.
  • Prevention of illegal activities such as terrorism and fraud.
  • The responsibility to keep children safe and protected.
  • Responsibility to keep users (customers) data safe and secure.
  • Spoofing of websites, phishing. Responsibility of organisation to put some kind of protection in place, eg filtering of known fraudulent sites.
  • Recording of private messages or details if not encrypted.
  • Recording of usernames and passwords that the user may also use to access other systems.
  • Responsibility of organisation to secure their systems from possible attack.
  • Sales and marketing providing sales leads to market products.

Explain why a developer, who is good at both low-level and high-level programming, would normally use high-level languages when writing programs                                                                                    [4 marks]

  • High-level languages have built-in functions;
  • High-level languages have built-in libraries;
  •  High-level languages have more support/help;
  • High-level languages have structures (such as selection and iteration);
  • High-level languages can be less machine-dependent/more portable;
  • It (usually) requires fewer lines of code to be written;
  • It is (usually) quicker to develop code in high-level languages;
  • It is easier to find mistakes in code;
  • The code is easier to maintain//understand;
  • • It is easier to structure code in high-level languages;

State advantages of batch processing

  • once instructions are given, the processing runs automatically hence requiring little supervision
  • tasks are processed as a group hence reducing the cost
  • It is faster since the since runs automatically
  • there is increased output since the processor works without any interruption

Computer Studies Paper 1 2021  KCSE Prediction Section B Qs. 17,18 and 19

17. a) i) Explain the term search as used in the Internet.                                            [2]

A web based application that locates items or information from the World Wide Web

ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download.                                           [3]

  • Size of the video/format
  • The bandwidth of the media/speed of network/network traffic
  • Type of browser software
  • Background activities running in the computer
  • Restrictions enforced in the computer/firewall/antivirus
  • Speed of the computer/CPU speed
  • Size of RAM

b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system.                                                                                  [4]

  • Poor network/lack of connection
  • Software failure in the system
  • Hardware failure
  • Lack of access rights
  • System overload/hanging
  • Lack of skills/disability/illiteracy
  • Lack of power supply

c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:

i. Cropping                                                                                                               [2]

Applies to graphics – used to trim/remove/hide some portions in the graphics

ii. Transparency                                                                                                         [2]

Used to make background of a graphic to be clear/visible

d. List two areas where infrared waves are used in data communication.                             [2]

18. a) List four activities of the planning stage of systems development.                             Ignore this question, marks redistributed elsewhere

b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.

i. Technical                                                                                                               [3]

Done to determine whether technology exists to support the proposed solution

 

ii. Economic                                                                                                              [3]

Done to determine whether the proposed solution is economically viable

 

iii. Schedule                                                                                                               [3]

Done to determine whether the proposed system can be done within an acceptable time.

c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.

Table 1

Dept Code

Dept Name

001

Computer

002

Aviation

003

Engineering

 

Table 2

DeptID

Student Registration No.

Student’s Name

002

St01

Alex Too

003

St02

Naomi Komi

002

St03

Peter Kengo

 

i. Identify the appropriate primary key for each table.                    [2]

Table 1 – Dept code, Student Registration No

ii. Explain two benefits of enforcing referential integrity in the database. [4]

  • No record can be added in Table 2 if its corresponding record in Table 1 does not exist
  • No record in Table 1 can be deleted without first deleting the corresponding record in Table 2
  • Reduces data redundancies/ensures integrity
  • Prevents deletion of related table

19. a) Describe each of the following validation checks as used in data processing.

i. Preserve check                                                                                                      [2]

Ignore this question, marks redistributed elsewhere

ii. Data type check                                                                                                    [2]

Ensure correct type of data is entered for the field

iii. Check digit                                                                                                           [2]

This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.

b. Write each of the following abbreviations in full:

i) BCD                                                                                                                                    [1½]

Binary Coded Decimal

ii) EBCD                                                                                                                                 [

This question was thrown out and marks redistributed elsewhere

iii) ASCII                                                                                                                    [1½]

American Standard Code for Information Interchange

c) Using 10-bits binary number system, perform the following decimal operation using two’s complement.                                                                                                                                   [6]

12910 - 12810

+129 = 00 1000 0001

128 = 00 1000 0000

-128 = 11 0111 1111 (ones complement)

                            +1

          11 1000 0000 (Twos complement)

129- 128

     00 1000 0001

+ 11 1000 0000

 100 0000 0001

Hence = 00 0000 00012 or 12 (the overflow bit is ignored)

State two reasons for carrying out software updates

  • To get the latest features
  • To update security features

Differentiate between distributed data processing and time-sharing.

  • Distributed data processing is where computers located in physically separate location transmit data after processing to a server computer that updates the master file. Time-sharing on the other hand is where various terminals transmit data to be processed by a central computer's CPU. Each terminal's tasks are allocated a time slice of the CPU


(i) Give three advantages and disadvantages of using a touch-sensitive interface.

Advantages

  •  A touch screen is very intuitive
  • Easy to use as the user simply touches what they see on the display
  • Save space as no keyboard or mouse is required.
  • Touch monitors can even be mounted on the wall.
  • Touching a visual display of choices requires little thinking and is a form of direct manipulation that is easy to learn.
  • Touch screens are the fastest pointing devices.
  • Touch screens have easier hand-eye coordination than mice or keyboards.
  • No extra workspace is required as with other pointing devices.
  • Touch screens are durable in public access and in high volume usage

Disadvantages

  • Difficult for people with accessibility issues, e.g no feedback, disability
  • Can be easily damaged/scratched
  • Damaged/scratched screen prevent the interface from functioning as it should
  • Dirty screens difficult to read
  • Users must be within arm’s reach of the display
  • It is difficult to select small items
  • User's hand may obscure the screen
  • Screens need to be installed at a lower position and tilted to reduce arm fatigue
  • Some reduction in image brightness may occur
  • They cost more than alternative devices

State five functions of network operating system

  • allowing the network to share resources like files and software for printers and computers
  • support the network's implementation of security features
  • controls user accounts
  • supplies network administrators with network monitoring tools.

Give one reason why use of video-conferencing has increased over the last ten years.

– faster communications now widely available
– safety reasons, e.g. increase in terrorist attacks on international flights
– reduced transportation/accommodation/hardware costs
– environmental issues, e.g. reduced carbon footprint
– increase in multinational working

Explain how virtual memory can compensate for the limited  RAM capacity in a computer.

  • VM is used when RAM is full  i.e part of the secondary storage used as (temporary) RAM/VM
  • Data from RAM is moved to the secondary storage/VM (to make space in RAM)
  • RAM can then be filled with new data
  • When data in VM is needed it is moved back to RAM

Distinguish between firmware and device drivers as used in computers.                  (2mrks)

  • Firmware is a software program permanently etched into a hardware device such as a keyboards, hard drive, BIOS, or video cards.
  • Device drivers are operating system-specific and hardware-dependent. A device driver acts as a translator between the hardware device and the programs or operating systems that use it. 
  • Firmware is a software that controls a system, and firmware's functionality ranges from performing basic tasks like minimal I/O controls to full-fledged software system running with simple or no OS, with scheduler, memory management, etc. 
  • driver, on the other hand, is usually part of the operating system that performs the specific task of controlling a hardware component like a display or USB controller, etc., and gives an interface to use the hardware by Operating system and applications.

Explain one reason why a computer needs to be connected to a stable power source

System Stability: Computers require a consistent and stable power supply to function properly. Fluctuations or interruptions in the power source can cause various issues that can disrupt the computer's operation or lead to hardware damage.

a. Data Loss: Sudden power outages or voltage fluctuations can cause the computer to shut down abruptly, resulting in data loss if unsaved work is not properly stored. This can be particularly problematic when working on critical tasks or handling important files.

b. Hardware Damage: Power surges or inconsistent power supply can damage the computer's internal components, including the motherboard, CPU, memory, and storage devices. These damages can result in system instability, reduced performance, or even complete hardware failure.

c. Operating System Corruption: Abrupt power loss or inconsistent power supply can corrupt the operating system files, leading to system crashes, error messages, and instability. This may require system repairs or reinstallation of the operating system.

d. Component Lifespan: Inconsistent power supply can put unnecessary stress on computer components, shortening their lifespan. Frequent power fluctuations or surges can cause wear and tear on various parts, reducing their efficiency and overall longevity.

Name two other input/output devices used at the POS terminal apart from keyboard and barcode reader and give a use for each device.

device: beeper/loud speaker
use: to indicate barcode correctly read/error in reading barcode
device: (LCD) screen/monitor
use: to show prices and other information about goods
device: touch screen
use: to show prices and other information about goods/to select items that need to be
weighed/identified
device: weighing machine
use: to find weight of loose items (e.g. fruit) to enable pricing
device: (magnetic) card reader/CHIP and PIN reader
use: to read customer’s debit/credit card/enable customer to pay for goods using a
credit or debit card
device: printer
use: to print receipts

Explain the function of the protect sheet feature in the spreadsheet program

  • It is a feature used to prevent unwanted changes to be made on the data contained in a sheet by limiting the ability to make changes

Explain the term website as used in the internet

  • A collection of related webpages under the same domain name

Define the following terms as used in the internet

HTTPS/HTTP: this is a protocol that is used to send data to web pages across the Internet

Uniform Resource Locator (URL):   a text-based version of a web address

Internet Service provider /ISP  - his is the company that provides a user with a connection to the Internet

browser - Software/application that allows users to view web pages / render HTML -

cookie - a text file (stored by a web browser) that contains data about a user’s browsing habits/details/preferences

State three advantages of  biometric authentication

  • Protection against Password-related Vulnerabilities: Traditional password-based authentication methods are vulnerable to various risks, such as weak passwords, password sharing, or password theft.
  • Stronger Access Control: Biometric readers add an additional layer of access control to laptops. Even if someone gains physical possession of the laptop, they would still need the authorized user's biometric data to unlock it and access the data. This helps prevent unauthorized individuals from accessing sensitive information stored on the laptop,
  • Audit Trail and Accountability: Biometric authentication systems often come with built-in logging and auditing capabilities. This means that each time someone accesses the laptop using their biometric data, it can be recorded and associated with a specific user. This creates an audit trail, allowing organizations to track and monitor access to laptops and establish accountability in case of any security incidents or breaches.