admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

The Acme company stores data for a private scientific research group. It has recently upgraded its storage capacity and needs to dispose of its existing hard drives securely. Outline two methods for the secure disposal of the data on the hard drives.

Acme company needs to ensure that if they are reselling the drives they wipe the drive (this should be done regardless of the destruction of the drive) to the DoD standard.

  • Disassemble the drive by pulling it apart the drive so that the data would not be accessed
  • Destroy the metal disk either by drilling holes so it cannot be read
  •  Encrypt drives with passwords that are not accessible
  • Degaussing the hard drives
  • Use specialized overwriting software

This would ensure that any software cannot be used to locate files.

Question Image

A large comprehensive school has over 500 computers connected to their Local Area Network (LAN) with a connection to the Internet. (a) Describe, in detail, four disadvantages for the school of having a network of computers compared to stand alone computers

 A network manager may need to be employed  which might be expensive

Could be infected with a virus that could spread to all other computers

Security problems receive traffic from other networks

Hackers may gain access as the network only as secure as weakest point of entry to data and steal/destroy

 The server/switch could go down (main cable break) so all workstations on the network are affected

 Can be expensive to set up as Initial cost of servers, communication devices, switches, network software etc. 

 Substantial Initial disruption: drilling holes, fitting trunking, running cables between buildings etc… 

 Can have a slow response time  due to heavy network traffic so users cannot work as effectively

 Detecting network problems can be more difficult on a network i.e difficult to isolate

 Can be slow to log in to a network  As it slow to download software/check password

 Only limited storage space available on network while one has access to all hard disc drive on standalone computer

 Time and effort to set up users o Can just start a standalone and use computer

Question Image

State the functions of the following registers

Program counter // PC
Stores the address of the next instruction to be fetched
Memory address register // MAR
Stores the address where data/instruction is to be read from or saved to
Memory data register // MDR
Stores data that is about to be written to memory // Stores data that has just been read from memory
Current instruction register // CIR
Stores the instruction that is currently being decoded/executed

Question Image

State two data protection rules that should be obeyed by all staff in a hospital.

  • data must be accurate/up-to-date
  • personal data must be registered
  • data must be used for the purpose that is registered for
  • if data is to be used for another purpose the registrar must be notified/
  • subject gives consent
  • patients must be able to see the data and have it changed if it is incorrect
  • processed fairly and lawfully
  • kept no longer than needed
  • kept secure
  • not transferred to other countries without protection
Question Image

State a stage in system development where each of the following activities are carried out    (KCSE 2018)

(a) Identifying technologies that may be used in a proposed system

  • System Analysis/Information gathering/Problem recognition

(b) Identifying the shortcomings of the old system

  • Problem definition

(c) Prepares the software migration plan

  • Implementation stage
Question Image

The website has a uniform resource locator (URL).
An example of a URL is given.
https://www.google.co.ke/index.html
Complete the table to identify the name of each section of the URL.

https :  protocol

google.co.ke: domain name

/index.html: webpage/file name

 

Question Image

What is a web browser?

  • A software which can display a webpage on a user's computer screen
Question Image

Differentiate between a function parameter and a function argument

A parameter represents additional information that  a function requires to perform its task. Each parameter required by a function is specified in the function header

An argument the value supplied in the function call. When the function is called, the argument value is passed into the function parameter so that the function can perform its task

Question Image

Explain how virtual memory can compensate for the limited  RAM capacity in a computer.

  • VM is used when RAM is full  i.e part of the secondary storage used as (temporary) RAM/VM
  • Data from RAM is moved to the secondary storage/VM (to make space in RAM)
  • RAM can then be filled with new data
  • When data in VM is needed it is moved back to RAM
Question Image

Differentiate between bus topology and star topology of networks. What are the advantages and disadvantages of star topology over bus topology

  • Bus topology is characterised by common transmission media shared by all the connected nodes
  • Star topology is characterised by a central switching node connected directly to each of the multiple nodes in the network

Advantages of Star topology over Bus topology

  • Faster communication as compared to bus topology
  • Independent line of connection allows freedom of removing or adding nodes

Disadvantages of Star topology over Bus topology

  • Expensive as compared to the bus topology
  • Long cable length
Question Image

Give two examples of each of the following application packages       

a)Spreadsheets                                                                                                                               (2mks)

  • Microsoft Excel
  • Lotus 1-2-3
  • Google Sheets
  • OpenOffice Calc

                                           Any 2 @ 1mk

 

b) Word processors                                                                                                                          (2mks)

  • Microsoft Word
  • Wordpad
  • Corel WordPerfect
  • Lotus Word Pro

 

                                         Any 2 @ 1mk

Question Image

A computer is upgraded to a dual-core CPU.
Explain how the upgrade can affect the performance of the computer.

  • It can now process two instructions simultaneously (where suitable) increasing the performance.

 

Question Image

Define what is meant by a ‘network protocol

  • An agreement / set of rules / standard for how computers should communicate or how data is sent/received/transmitted on a network
  • Example of what could be agreed in the protocol (e.g. speed / error checking / etc.)
Question Image

Describe three other different categories of malware.

Trojan (horse); a program which misleads the user into thinking it is another

piece of software which, when run, executes another program;

Spyware; a program which records data such as usernames and passwords on

a host system and forwards the information to a third party;

Adware; code embedded or attached to program files which will persistently

show adverts (that attempt to generate revenue);

Worm; code which will run autonomously and replicates itself on a host system;

Ransomware; a program that encrypts user’s data to make it unreadable until

they pay for the key;

Remote Access Tool (RAT); allows access to control and monitor a computer

from a remote network location;

Rootkit; malware that has managed to gain ‘root’ admin privileges;

Bots/Zombies; a program installed on a computer that performs a job for the

remote owner of the bot/zombie such as sending spam or sending web requests

to perform a DOS or attacking a computer system;

Scareware; malware that tells you something is wrong with your system in an

attempt to get you to make a purchase;

Keylogger; a program that monitors/records a user’s keystrokes in order to steal

passwords/confidential details;

Name three of the stages in the system life cycle

fact finding
feasibility study
analysis
design
testing
documentation
implementation/changeover/installation
evaluation
maintenance

Question Image

Identify one component common to all computers.

  • Processor
Question Image

Describe what is meant by ‘RAID 10’.

  • RAID 10 is a combination of RAID 0 (zero) and RAID 1 (one)
Question Image

List three characteristics of Internet Protocol version 6 (IP6).

  • has a significantly larger address pool than previous version
  • features a client-side address assignment
  • has built-in encryption
  • enables one device to have many network addresses
Question Image

Describe what is meant by a MAC address.

  • used to identify a device
  • it is a unique (address)
  • it is a static address // it does not change
  • it is set by the manufacturer
  • the first part is the manufacturer ID/number / identifies the manufacturer
  • the second part is the serial number / ID.

 

Question Image

Outline any 2 Examples of wireless transmission media       (2marks)

  • Radio waves
  • Microwaves
  • Infrared waves
Question Image