State any four applications of electronic spreadsheets
What is a network server?
A company making televisions has introduced robots to replace the human work force.
(a) Describe three effects this would have on the work force
(b) Give two advantages to the company of introducing robots
(c) How could the robots be trained to assemble the televisions?
(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?
(a) Describe three effects this would have on the work force
(b) Give two advantages to the company of introducing robots
lower work force costs (no salaries to pay)
(c) How could the robots be trained to assemble the televisions?
(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?
Give a reason why microwaves are commonly used for point-to-point communication
State three documents that are used during mail merging in word processing
Explain two computer hardware features that may be considered when selecting a laptop computer to be used in developing a KCSE computer studies project (4mks)
Multimedia Capability - A laptop with strong multimedia capabilities is essential for a computer studies project submitted on CD-RW. This ensures that the laptop can efficiently handle multimedia content, providing a seamless experience in creating and presenting project materials.
Processor Speed - Opting for a laptop with a high processor speed is crucial. This feature enables the smooth execution of multiple applications simultaneously, enhancing overall project efficiency and reducing processing delays.
Hard Disk Capacity - Consider a laptop with ample hard disk capacity, as the Microsoft Office suite used in computer projects requires significant space for the installation and storage of project files. A spacious hard drive ensures that there is sufficient room for data and applications.
Main Memory Capacity - Given that students often work with multiple programs concurrently during a project, it's important to choose a laptop with an adequate main memory size. A smaller main memory may result in performance issues, hindering the seamless operation of various software applications during project development.
What is a Uniform Resource Locator?
Explain the following terms
(a) Disk mirroring
(b) Encryption
(c) Backup
(a) Disk mirroring- Data is written on two or more disks simultaneously.
(b) Encryption - Contents are scrambled so they cannot be understood without a decryption key
(c) Backup - A copy of the data is taken and stored in another location
Explain, using examples where appropriate, the meaning of these computer terms
(a) byte ..................................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(b) compiler ............................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(c) handshaking .....................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(d) technical documentation ..................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(e) simulation .........................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2
(a) byte
(b) compiler program
(c) handshaking
(d) technical documentation
(e) simulation
Describe two effects on society of an increase in the use of the Internet for e-commerce.
State two reasons for the increased use of computers in offices (2 marks)
What is secondary storage?
Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access
(The parent can) set criteria for the websites she is allowed to visit such as a whitelist/blacklist of websites. The firewall will examine the data/traffic incoming and outgoing from her computer. If data is sent from a website that is not allowed, it will be blocked
Differentiate between a compiled and an interpreted program
Give two other uses of hexadecimal in computer science.
Differentiate between a function parameter and a function argument
A parameter represents additional information that a function requires to perform its task. Each parameter required by a function is specified in the function header
An argument the value supplied in the function call. When the function is called, the argument value is passed into the function parameter so that the function can perform its task
What is a computer system ?
A computer system refers to computer components that collectively function as a single unit to achieve the desired goal. It can also be defined as a collection of hardware, software, and liveware that work together to receive, process, and manage data
What is meant by RAID technology?
RAID (Redundant Array of Independent Disks) technology refers to a method of combining multiple physical disk drives into a logical unit to improve performance, data availability, and data redundancy. RAID technology is commonly used in storage systems to provide fault tolerance, data protection, and increased storage performance.
The primary purpose of RAID is to create a more reliable and robust storage solution by spreading data across multiple drives and implementing various data redundancy techniques. This helps to mitigate the risk of data loss and system downtime in case of drive failures.
There are different levels or configurations of RAID, each offering different features and trade-offs. The most commonly used RAID levels are:
RAID 0 (Striping): Data is split evenly across multiple drives, resulting in increased performance as data can be accessed from multiple drives simultaneously. However, there is no redundancy, so if one drive fails, data loss can occur.
RAID 1 (Mirroring): Data is duplicated or mirrored across two drives, providing redundancy. If one drive fails, the other drive can still function and serve the data. RAID 1 offers data protection but does not offer increased performance.
RAID 5 (Striping with Parity): Data and parity information are striped across multiple drives, providing both increased performance and fault tolerance. Parity information allows for the recovery of data in case of a single drive failure. RAID 5 requires a minimum of three drives.
RAID 10 (Combination of Mirroring and Striping): RAID 10 combines elements of RAID 1 and RAID 0. It involves mirroring data across two sets of drives and then striping the mirrored sets for increased performance and fault tolerance. RAID 10 provides high levels of data redundancy and performance but requires a minimum of four drives.