admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

IT technicians are setting up a new file server for a school. Describe the benefits and drawbacks of using a command line interface (CLI) rather than a graphical user interface (GUI) to set up a new file server.  (4marks)

Benefits

  • The user is not restricted to the predetermined options//the GUI uses icons and set menus
  • The user has more control over the computer settings//in GUI computer settings are protected from the user
  • Uses less memory than GUI
  • Requires less processing power for the interface
  • More processing power is made available for the task

Drawbacks

  • The commands used have to be learnt
  • The commands used have to be remembered
  • The commands used have to be typed in/entered exactly
  • Have to remember the exact path/correct name of application
  • More prone to errors on data entry Commands have to be typed in//in a GUI can use touchscreens/mice
  • Tends to be used by specialist people//GUI is more user-friendly and can be used by non-experts

What is a utility software?

The following are some of the possible definitions:

It is system software designed to help the users to analyse, configure, optimize, or maintain a computer

System software that helps maintain the proper and smooth functioning of a computer system

Examples include antivirus software, Disk clean-up tools, disk defragmenters, backup software, etc

Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.

Blagging

  • This is where a victim is tricked/persuaded by a fraudster to give their details or payment information for a false reason/purpose;

Phishing

  • This is where the victim receives and responds to communication that appears to be from a valid or known source but is in fact fraudulent. (It allows the fraudster to capture private information before the victim realises);

Shouldering

  • This is where someone watches and records\remembers a victim entering their pin or security information such as passwords. (They can then use this information to gain access to a system)

Give a reason why microwaves are commonly used for point-to-point communication

  • their small wavelength allows conveniently sized antennas to direct them in narrow beams, which can be pointed directly at the receiving antenna

Xpat ICT has been tasked to construct a network for an organisation. Explain three factors that the company should consider when selecting the medium for the connectivity (KCSE 2021 Computer Studies Q19c)

  • Security
  • Installation cost
  • bandwidth the medium can support
  • Flexibility e.g wireless media
  • Distance

Describe two differences between a switch and a repeater

  • a repeater is a two-port device that amplifies a signal from one port to another
  • a switch is a multiport device that uses a table of addresses to send a signal through the correct port

KCSE 2016 COMPUTER STUDIES PAPER 1

State the function of each of the following keys on the computer keyboard :  (2mks)

Backspace;

  • Deletes characters to the left of the cursor

Insert

  • Add characters at the cursor position
  • Toggles between overtype and insert modes

An organization intends to replace an existing system by carrying out the process in stages .

Name the implementation strategy ;  (1mk)

  • Phased change-over

Give two reasons why the  organization is opting to use the implementation strategy  in (a) above (2mks)

  • Gives employees time to learn
  • Organizations can revert to the old system in case of failure
  • Reduces resistance by the employee
  • It is easier to find system errors as you are dealing with only one part at a time
  • Accessing parts of the old system is still is possible in case of failure of the new system

Explain why it is beneficial to get more RAM instead of relying on virtual memory.

  • More RAM will improve the performance of the computer 
  • More RAM will speed up the access to data
  • Excessive use of VM can cause disk thrashing which decreases performance
  • VM is slower to access than RAM direct (because it has to go back to RAM first)
  • Moving data between RAM and VM takes processor time

6 Programmers write software that controls hardware and interacts with users. Some of this software ensures that networks function properly.

(a) Compilers and interpreters translate source code written in programming languages.
  State four other features of a compiler.

 A single executable file is produced 

The executable program is portable between machines

The program source code is not available

Code can be optimised/made more efficient 

Entire source code file is converted at once

No special environment is needed to execute the code 

It creates object/machine code

Error report is provided at the end of the compilation

b) Give one benefit of each type of data transmission

Serial

  • -more accurate/fewer errors over a longer distance
  • -less expensive wiring  
  • less chance of data being skewed/out of synchronization/order

A supermarket uses point of sale (POS) terminals at the checkout for scanning barcodes on the products.

(a) State two items of data that are stored on the barcode.

(b) Describe how the computer system checks that the barcode has been read correctly.

(c) State the type of file access that is used to get the price from the central computer.

(d) Explain how the system updates the file when an item has been sold.

(a) State two items of data that are stored on the barcode.

  • check digit
  • product number/item number/code
  • country of origin
  • manufacturers number/code
  • weight
  • price

(b) Describe how the computer system checks that the barcode has been read correctly.

  • check digit calculation is performed on the check digit, remainder = 0 if the barcode has been read correctly
  • weights and modulus 11 and use remainder
  • or subtractions and addition and use answer


(c) State the type of file access that is used to get the price from the central computer.

  • random/direct/online

(d) Explain how the system updates the file when an item has been sold.

  • search file/master file using barcode number/product code and decrease number in stock/increase quantity sold

State two functions of utility software

  • Repairing files
  • Compression
  • Defragmentation
  • Back up
  • Anti-virus / anti-spyware / anti-malware
  • Firewall
  • Managing application updates
  • Format disks/drives
  • System analysis tools

State the functions of the following:

  1. Hub
  2. Router
  3. Switch
  4. Bridge

Bridge: Joins together two networks that use the same base protocols.

Hub: Copies all packets of data to all devices on the network.

Router: Stores the addresses of computers on the network and transfers data between devices.

Switch : Analyses each data packet and sends it to the computer it was intended for.

The data before encryption is known as .................................................. text.
To scramble the data, an encryption .................................................., which is a type
of .................................................., is used.
The data after encryption is known as .................................................. text.
Encryption prevents the data from being .................................................. by a hacker

The data before encryption is known as .......plain.................. text.
To scramble the data, an encryption ......................key.........................., which is a type
of ...................key............................, is used.
The data after encryption is known as ....................cipher............................. text.
Encryption prevents the data from being ......................understood...................... by a hacker

State the uses of 3D printers

  • Making prosthetic limbs for patients
  • Making items which allow precise reconstructive surgery
  • Making light-weight plane wings
  • Making sculptures

State the functions of the following utility programs

(a) Defragmentation software

(b) Disk contents analysis/repair software

(c) Disk formatter

(a) Defragmentation software   -   Reorganises files on a disk to improve efficiency

(b) Disk contents analysis/repair software - Scans a hard disk to identify bad sectors

(c) Disk formatter -  Prepares a hard disk for first use

Interfaces enable computer users to interact with the operating system.

(a) State four advantages for using a graphical user interface in loading programs and files

(b) A vehicle assembly company has introduced robots to replace the human workforce.  State two effects this would have on the workforce

State four advantages for using a graphical user interface in loading programs and files

  • User friendly
  • No need to know command language as commands are executed by clicking on icons
  • Allows multitasking as several programs open at the same time therefore easier to switch between applications
  • Selecting an item using a mouse is easier and faster than entering commands

Or any other correct response

Advantage @ 1 Mark

Total = 4 X 1 Mark

= 4 Marks

 

A vehicle assembly company has introduced robots to replace the human workforce.  State two effects this would have on the workforce                

  • Unemployment
  • Need to retrain
  • No longer need to do hazardous or tedious jobs
  • Employment of skilled staff who will manipulate the robots

Or any other correct response

Effect @ 1 Mark

Total = 2 X 1 Mark

= 2 Marks

What is block operation as used in Microsoft word?

An editing or formatting procedure that is carried out on a selected block of text in a word-processing document.

A formatting or editing operation that is applied to a block of text after selecting. The block of text can be a paragraph, line, word, page or the whole document. It is much easier to apply editing or formatting to a block of text than to apply it to every single character

Explain a situation when each of the following Desktop Publishing programs features may be used when creating a document

(i) Crop - used when handling a graphic and there is a need to remove some of the portions in the graphic

(ii)Transparency - used when there is a need to make background of a graphic visible

State two data protection rules that should be obeyed by all staff in a hospital.

  • data must be accurate/up-to-date
  • personal data must be registered
  • data must be used for the purpose that is registered for
  • if data is to be used for another purpose the registrar must be notified/
  • subject gives consent
  • patients must be able to see the data and have it changed if it is incorrect
  • processed fairly and lawfully
  • kept no longer than needed
  • kept secure
  • not transferred to other countries without protection