The Acme company stores data for a private scientific research group. It has recently upgraded its storage capacity and needs to dispose of its existing hard drives securely. Outline two methods for the secure disposal of the data on the hard drives.
Acme company needs to ensure that if they are reselling the drives they wipe the drive (this should be done regardless of the destruction of the drive) to the DoD standard.
This would ensure that any software cannot be used to locate files.
A large comprehensive school has over 500 computers connected to their Local Area Network (LAN) with a connection to the Internet. (a) Describe, in detail, four disadvantages for the school of having a network of computers compared to stand alone computers
A network manager may need to be employed which might be expensive
Could be infected with a virus that could spread to all other computers
Security problems receive traffic from other networks
Hackers may gain access as the network only as secure as weakest point of entry to data and steal/destroy
The server/switch could go down (main cable break) so all workstations on the network are affected
Can be expensive to set up as Initial cost of servers, communication devices, switches, network software etc.
Substantial Initial disruption: drilling holes, fitting trunking, running cables between buildings etc…
Can have a slow response time due to heavy network traffic so users cannot work as effectively
Detecting network problems can be more difficult on a network i.e difficult to isolate
Can be slow to log in to a network As it slow to download software/check password
Only limited storage space available on network while one has access to all hard disc drive on standalone computer
Time and effort to set up users o Can just start a standalone and use computer
State the functions of the following registers
Program counter // PC
• Stores the address of the next instruction to be fetched
Memory address register // MAR
• Stores the address where data/instruction is to be read from or saved to
Memory data register // MDR
• Stores data that is about to be written to memory // Stores data that has just been read from memory
Current instruction register // CIR
• Stores the instruction that is currently being decoded/executed
State two data protection rules that should be obeyed by all staff in a hospital.
State a stage in system development where each of the following activities are carried out (KCSE 2018)
(a) Identifying technologies that may be used in a proposed system
(b) Identifying the shortcomings of the old system
(c) Prepares the software migration plan
The website has a uniform resource locator (URL).
An example of a URL is given.
https://www.google.co.ke/index.html
Complete the table to identify the name of each section of the URL.
https : protocol
google.co.ke: domain name
/index.html: webpage/file name
What is a web browser?
Differentiate between a function parameter and a function argument
A parameter represents additional information that a function requires to perform its task. Each parameter required by a function is specified in the function header
An argument the value supplied in the function call. When the function is called, the argument value is passed into the function parameter so that the function can perform its task
Explain how virtual memory can compensate for the limited RAM capacity in a computer.
Differentiate between bus topology and star topology of networks. What are the advantages and disadvantages of star topology over bus topology
Advantages of Star topology over Bus topology
Disadvantages of Star topology over Bus topology
Give two examples of each of the following application packages
a)Spreadsheets (2mks)
Any 2 @ 1mk
b) Word processors (2mks)
Any 2 @ 1mk
A computer is upgraded to a dual-core CPU.
Explain how the upgrade can affect the performance of the computer.
Define what is meant by a ‘network protocol
Describe three other different categories of malware.
Trojan (horse); a program which misleads the user into thinking it is another
piece of software which, when run, executes another program;
Spyware; a program which records data such as usernames and passwords on
a host system and forwards the information to a third party;
Adware; code embedded or attached to program files which will persistently
show adverts (that attempt to generate revenue);
Worm; code which will run autonomously and replicates itself on a host system;
Ransomware; a program that encrypts user’s data to make it unreadable until
they pay for the key;
Remote Access Tool (RAT); allows access to control and monitor a computer
from a remote network location;
Rootkit; malware that has managed to gain ‘root’ admin privileges;
Bots/Zombies; a program installed on a computer that performs a job for the
remote owner of the bot/zombie such as sending spam or sending web requests
to perform a DOS or attacking a computer system;
Scareware; malware that tells you something is wrong with your system in an
attempt to get you to make a purchase;
Keylogger; a program that monitors/records a user’s keystrokes in order to steal
passwords/confidential details;
Name three of the stages in the system life cycle
– fact finding
– feasibility study
– analysis
– design
– testing
– documentation
– implementation/changeover/installation
– evaluation
– maintenance
Identify one component common to all computers.
Describe what is meant by ‘RAID 10’.
List three characteristics of Internet Protocol version 6 (IP6).
Describe what is meant by a MAC address.
Outline any 2 Examples of wireless transmission media (2marks)