IT technicians are setting up a new file server for a school. Describe the benefits and drawbacks of using a command line interface (CLI) rather than a graphical user interface (GUI) to set up a new file server. (4marks)
Benefits
Drawbacks
What is a utility software?
The following are some of the possible definitions:
It is system software designed to help the users to analyse, configure, optimize, or maintain a computer
System software that helps maintain the proper and smooth functioning of a computer system
Examples include antivirus software, Disk clean-up tools, disk defragmenters, backup software, etc
Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.
Blagging
Phishing
Shouldering
Give a reason why microwaves are commonly used for point-to-point communication
Xpat ICT has been tasked to construct a network for an organisation. Explain three factors that the company should consider when selecting the medium for the connectivity (KCSE 2021 Computer Studies Q19c)
Describe two differences between a switch and a repeater
KCSE 2016 COMPUTER STUDIES PAPER 1
State the function of each of the following keys on the computer keyboard : (2mks)
Backspace;
Insert
An organization intends to replace an existing system by carrying out the process in stages .
Name the implementation strategy ; (1mk)
Give two reasons why the organization is opting to use the implementation strategy in (a) above (2mks)
Explain why it is beneficial to get more RAM instead of relying on virtual memory.
6 Programmers write software that controls hardware and interacts with users. Some of this software ensures that networks function properly.
(a) Compilers and interpreters translate source code written in programming languages.
State four other features of a compiler.
A single executable file is produced
The executable program is portable between machines
The program source code is not available
Code can be optimised/made more efficient
Entire source code file is converted at once
No special environment is needed to execute the code
It creates object/machine code
Error report is provided at the end of the compilation
b) Give one benefit of each type of data transmission
Serial
A supermarket uses point of sale (POS) terminals at the checkout for scanning barcodes on the products.
(a) State two items of data that are stored on the barcode.
(b) Describe how the computer system checks that the barcode has been read correctly.
(c) State the type of file access that is used to get the price from the central computer.
(d) Explain how the system updates the file when an item has been sold.
(a) State two items of data that are stored on the barcode.
(b) Describe how the computer system checks that the barcode has been read correctly.
(c) State the type of file access that is used to get the price from the central computer.
(d) Explain how the system updates the file when an item has been sold.
State two functions of utility software
State the functions of the following:
Bridge: Joins together two networks that use the same base protocols.
Hub: Copies all packets of data to all devices on the network.
Router: Stores the addresses of computers on the network and transfers data between devices.
Switch : Analyses each data packet and sends it to the computer it was intended for.
The data before encryption is known as .................................................. text.
To scramble the data, an encryption .................................................., which is a type
of .................................................., is used.
The data after encryption is known as .................................................. text.
Encryption prevents the data from being .................................................. by a hacker
The data before encryption is known as .......plain.................. text.
To scramble the data, an encryption ......................key.........................., which is a type
of ...................key............................, is used.
The data after encryption is known as ....................cipher............................. text.
Encryption prevents the data from being ......................understood...................... by a hacker
State the uses of 3D printers
State the functions of the following utility programs
(a) Defragmentation software
(b) Disk contents analysis/repair software
(c) Disk formatter
(a) Defragmentation software - Reorganises files on a disk to improve efficiency
(b) Disk contents analysis/repair software - Scans a hard disk to identify bad sectors
(c) Disk formatter - Prepares a hard disk for first use
Interfaces enable computer users to interact with the operating system.
(a) State four advantages for using a graphical user interface in loading programs and files
(b) A vehicle assembly company has introduced robots to replace the human workforce. State two effects this would have on the workforce
State four advantages for using a graphical user interface in loading programs and files
Or any other correct response
Advantage @ 1 Mark
Total = 4 X 1 Mark
= 4 Marks
A vehicle assembly company has introduced robots to replace the human workforce. State two effects this would have on the workforce
Or any other correct response
Effect @ 1 Mark
Total = 2 X 1 Mark
= 2 Marks
What is block operation as used in Microsoft word?
An editing or formatting procedure that is carried out on a selected block of text in a word-processing document.
A formatting or editing operation that is applied to a block of text after selecting. The block of text can be a paragraph, line, word, page or the whole document. It is much easier to apply editing or formatting to a block of text than to apply it to every single character
Explain a situation when each of the following Desktop Publishing programs features may be used when creating a document
(i) Crop - used when handling a graphic and there is a need to remove some of the portions in the graphic
(ii)Transparency - used when there is a need to make background of a graphic visible
State two data protection rules that should be obeyed by all staff in a hospital.