Define Data Security
State the role of an ISP.
A company has a website that is stored on a web server.
(a) The website data is broken down into packets to be transmitted to a user.
Describe the structure of a data packet.
Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access
Explain why a developer, who is good at both low-level and high-level programming, would normally use high-level languages when writing programs [4 marks]
State advantages of batch processing
Computer Studies Paper 1 2021 KCSE Prediction Section B Qs. 17,18 and 19
17. a) i) Explain the term search as used in the Internet. [2]
A web based application that locates items or information from the World Wide Web
ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download. [3]
b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system. [4]
c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:
i. Cropping [2]
Applies to graphics – used to trim/remove/hide some portions in the graphics
ii. Transparency [2]
Used to make background of a graphic to be clear/visible
d. List two areas where infrared waves are used in data communication. [2]
18. a) List four activities of the planning stage of systems development. Ignore this question, marks redistributed elsewhere
b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.
i. Technical [3]
Done to determine whether technology exists to support the proposed solution
ii. Economic [3]
Done to determine whether the proposed solution is economically viable
iii. Schedule [3]
Done to determine whether the proposed system can be done within an acceptable time.
c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.
Table 1
|
Dept Code |
Dept Name |
|
001 |
Computer |
|
002 |
Aviation |
|
003 |
Engineering |
Table 2
|
DeptID |
Student Registration No. |
Student’s Name |
|
002 |
St01 |
Alex Too |
|
003 |
St02 |
Naomi Komi |
|
002 |
St03 |
Peter Kengo |
i. Identify the appropriate primary key for each table. [2]
Table 1 – Dept code, Student Registration No
ii. Explain two benefits of enforcing referential integrity in the database. [4]
19. a) Describe each of the following validation checks as used in data processing.
i. Preserve check [2]
Ignore this question, marks redistributed elsewhere
ii. Data type check [2]
Ensure correct type of data is entered for the field
iii. Check digit [2]
This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.
b. Write each of the following abbreviations in full:
i) BCD [1½]
Binary Coded Decimal
ii) EBCD [
This question was thrown out and marks redistributed elsewhere
iii) ASCII [1½]
American Standard Code for Information Interchange
c) Using 10-bits binary number system, perform the following decimal operation using two’s complement. [6]
12910 - 12810
+129 = 00 1000 0001
128 = 00 1000 0000
-128 = 11 0111 1111 (ones complement)
+1
11 1000 0000 (Twos complement)
129- 128
00 1000 0001
+ 11 1000 0000
100 0000 0001
Hence = 00 0000 00012 or 12 (the overflow bit is ignored)
State two reasons for carrying out software updates
Differentiate between distributed data processing and time-sharing.
(i) Give three advantages and disadvantages of using a touch-sensitive interface.
Advantages
Disadvantages
State five functions of network operating system
Give one reason why use of video-conferencing has increased over the last ten years.
– faster communications now widely available
– safety reasons, e.g. increase in terrorist attacks on international flights
– reduced transportation/accommodation/hardware costs
– environmental issues, e.g. reduced carbon footprint
– increase in multinational working
Explain how virtual memory can compensate for the limited RAM capacity in a computer.
Distinguish between firmware and device drivers as used in computers. (2mrks)
Explain one reason why a computer needs to be connected to a stable power source
System Stability: Computers require a consistent and stable power supply to function properly. Fluctuations or interruptions in the power source can cause various issues that can disrupt the computer's operation or lead to hardware damage.
a. Data Loss: Sudden power outages or voltage fluctuations can cause the computer to shut down abruptly, resulting in data loss if unsaved work is not properly stored. This can be particularly problematic when working on critical tasks or handling important files.
b. Hardware Damage: Power surges or inconsistent power supply can damage the computer's internal components, including the motherboard, CPU, memory, and storage devices. These damages can result in system instability, reduced performance, or even complete hardware failure.
c. Operating System Corruption: Abrupt power loss or inconsistent power supply can corrupt the operating system files, leading to system crashes, error messages, and instability. This may require system repairs or reinstallation of the operating system.
d. Component Lifespan: Inconsistent power supply can put unnecessary stress on computer components, shortening their lifespan. Frequent power fluctuations or surges can cause wear and tear on various parts, reducing their efficiency and overall longevity.
Name two other input/output devices used at the POS terminal apart from keyboard and barcode reader and give a use for each device.
device: beeper/loud speaker
use: to indicate barcode correctly read/error in reading barcode
device: (LCD) screen/monitor
use: to show prices and other information about goods
device: touch screen
use: to show prices and other information about goods/to select items that need to be
weighed/identified
device: weighing machine
use: to find weight of loose items (e.g. fruit) to enable pricing
device: (magnetic) card reader/CHIP and PIN reader
use: to read customer’s debit/credit card/enable customer to pay for goods using a
credit or debit card
device: printer
use: to print receipts
Explain the function of the protect sheet feature in the spreadsheet program
Explain the term website as used in the internet
Define the following terms as used in the internet
HTTPS/HTTP: this is a protocol that is used to send data to web pages across the Internet
Uniform Resource Locator (URL): a text-based version of a web address
Internet Service provider /ISP - his is the company that provides a user with a connection to the Internet
browser - Software/application that allows users to view web pages / render HTML -
cookie - a text file (stored by a web browser) that contains data about a user’s browsing habits/details/preferences
State three advantages of biometric authentication