admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Below is a labelled diagram of a star topology network.

(a) Other than the items labelled above state the hardware required by every computer to connect to a network

b) Describe how a packet is transmitted from computer A to computer D, including the role of the switch

 

(a)

  • Hardware required by each computer to connect to a network is a Network Interface Card / NIC / network adapter

(b)

  • Computer A adds computer D’s address to packet
  • Computer A sends packet to switch
  • Switch looks at address on packet  Switch compares to stored list of addresses on network
  • Switch forwards packet to computer D’s address
Question Image

State the function of a router in a network

  • connects different networks
  • transfer data packets from source to destination
  • allow hosts on different networks to communicate
Question Image

Why is 2's complement preferred over 1's complement?

  • two's complement has only one value for zero
Question Image

Describe what is meant by shareware.

 the trial version of software for a limited time/number of uses with limited features  free of charge

If a full version is required need to pay a fee/sign up

When the trial is over user is asked to pay/sign up

Protected by copyright

Type of software licence
 

Question Image

Give an example of where a PAN could be used

  • connecting wireless headphone to a phone
  • Using a wireless mouse, keyboard etc
  •  
Question Image

Describe two methods used to assist in finding program errors.

  • Use of debugging utilities
  • Use of test data
  • Dry run / Desk checking
Question Image

An organisation that supplies audiobooks over the internet is moving into a new office building.
 (a) One reason for networking devices is to provide access to the internet.
  (i) Give two other reasons for connecting devices to networks.
 

  • Share peripherals/devices (e.g. printers, scanners)
  • Communicate (e.g. email, instant messaging, play games)
  • Share data (e.g. files/music/videos/backups on servers)
  • Deploy/update applications
     
     

Explain the functions of the following parts of the CPU

Control Unit; Decodes instruction; Controls the fetching and writing of data;

Arithmetic Logic Unit/ ALU; Executes mathematical instructions;  Executes logical instructions; Compares values held in registers;

 Clock; Controls the number of instructions carried out each second;   allows the CPU to synchronize operations;

Question Image
What is social engineering?
The act of soliciting for sensitive information from unsuspecting users. According to study.com, it is the use of various forms of technology to deceive people into divulging private information:study.com
Question Image

Give one example of wireless technology

method of transmission e.g

  • blue tooth
  • radio
  • optical
  • satellite
  • infra-red
  • microwave

device e.g.

  • 3G (WAP) mobile phones/mobile phones/cell phone/remote
  • key pad/remote control/keyboard
  • infra-red mouse
  • multimedia mobile handsets/notebooks
  • GPRS (general packet radio service) mobiles
  • WLAN(or WiFi) hotspots sited in public areas - e.g. coffee
  • shops, railway stations, airports, motorway services
  • linked printers
  • PDA's (personal digital assistants)
  • GPS
Question Image

Give two reasons why hexadecimal is often used instead of binary in computer
science.

  • hexadecimal is easier (for humans) to read (than binary);
  • numbers are displayed in a more compact way (in hexadecimal than in binary);
  • it is quicker to type in (hexadecimal numbers than binary numbers);
  • it reduces the risk of typing errors (in hexadecimal numbers than binary numbers);
Question Image

When developing a network security policy, it is important to understand the threats that can be made against a network. ‘IP spoofing’ and ‘back doors’ are two techniques that can compromise the security of a network. Describe each of these techniques.

IP spoofing

A technique used to gain unauthorised access to a computer whereby an intruder sends messages to that computer from a false IP address

Back door:
An undocumented method of gaining access to a program, online service or an entire computer system

Question Image

(b) The computer needs an operating system and utility software.

(i) The operating system controls the scheduling of processes.

Describe how the operating system uses scheduling to allocate processor time.

 

  • All processes are held in a queue 
  • Processes are prioritised 
  • Processes are switched On each clock cycle
Question Image

A virus is a specific category of malware. Describe three other different categories of malware.

Trojan (horse); a program which misleads the user into thinking it is another
piece of software which, when run, executes another program;
Spyware; a program which records data such as usernames and passwords on
a host system and forwards the information to a third party;
Adware; code embedded or attached to program files which will persistently
show adverts (that attempt to generate revenue);
Worm; code which will run autonomously and replicates itself on a host system;
Ransomware; a program that encrypts a user’s data to make it unreadable until
they pay for the key;
Remote Access Tool (RAT); allows access to control and monitor a computer
from a remote network location;
Rootkit; malware that has managed to gain ‘root’ admin privileges;
Bots/Zombies; a program installed on a computer that performs a job for the
remote owner of the bot/zombie such as sending spam or sending web requests
to perform a DOS or attack a computer system;
Scareware; malware that tells you something is wrong with your system in an
attempt to get you to make a purchase;
Keylogger; a program that monitors/records a user’s keystrokes in order to steal
passwords/confidential details

Question Image

List three types of errors that are likely to exist in a program                             (3 marks)

Syntax errors-Incorrect use of programming language

Logical errors- The program do not give the expected output

Runtime errors- Premature end of a program

Question Image

Define the following terms as used in the internet

HTTPS/HTTP: this is a protocol that is used to send data to web pages across the Internet

Uniform Resource Locator (URL):   a text-based version of a web address

Internet Service provider /ISP  - his is the company that provides a user with a connection to the Internet

browser - Software/application that allows users to view web pages / render HTML -

cookie - a text file (stored by a web browser) that contains data about a user’s browsing habits/details/preferences

Question Image

Give one application of each type of data transmission. Each application must be different

Parallel

  • sending data from a computer to a printer
  •  internal data transfer (buses)

Serial

  • connect a computer to a modem
Question Image

Explain two computer hardware features that may be considered when selecting a laptop computer to be used in developing a KCSE computer studies project (4mks)

Multimedia Capability - A laptop with strong multimedia capabilities is essential for a computer studies project submitted on CD-RW. This ensures that the laptop can efficiently handle multimedia content, providing a seamless experience in creating and presenting project materials.

Processor Speed - Opting for a laptop with a high processor speed is crucial. This feature enables the smooth execution of multiple applications simultaneously, enhancing overall project efficiency and reducing processing delays.

Hard Disk Capacity - Consider a laptop with ample hard disk capacity, as the Microsoft Office suite used in computer projects requires significant space for the installation and storage of project files. A spacious hard drive ensures that there is sufficient room for data and applications.

Main Memory Capacity - Given that students often work with multiple programs concurrently during a project, it's important to choose a laptop with an adequate main memory size. A smaller main memory may result in performance issues, hindering the seamless operation of various software applications during project development.

 

Give two benefits for the supermarket manager of using point of sale (POS) terminals.

  • more accurate/improved stock control/recording system/automatic
  • reordering/automatic updating of stock file
  • less staff/wages needed
  • sales statistics now available
  • faster throughput
  • itemised receipt
  • records every transaction
  • records staff work rates
  • less pilfering by staff/easier to identify pilfering
  • less errors
  • faster calculations
  • links to EFTPOS

Explain one reason why a computer needs to be connected to a stable power source

System Stability: Computers require a consistent and stable power supply to function properly. Fluctuations or interruptions in the power source can cause various issues that can disrupt the computer's operation or lead to hardware damage.

a. Data Loss: Sudden power outages or voltage fluctuations can cause the computer to shut down abruptly, resulting in data loss if unsaved work is not properly stored. This can be particularly problematic when working on critical tasks or handling important files.

b. Hardware Damage: Power surges or inconsistent power supply can damage the computer's internal components, including the motherboard, CPU, memory, and storage devices. These damages can result in system instability, reduced performance, or even complete hardware failure.

c. Operating System Corruption: Abrupt power loss or inconsistent power supply can corrupt the operating system files, leading to system crashes, error messages, and instability. This may require system repairs or reinstallation of the operating system.

d. Component Lifespan: Inconsistent power supply can put unnecessary stress on computer components, shortening their lifespan. Frequent power fluctuations or surges can cause wear and tear on various parts, reducing their efficiency and overall longevity.

Question Image