admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Internet and E-mail Questions

Define the term internet      1mk

  • The global interconnection of computer networks for purpose of communication and resource sharing

Explain the term web page    1mk

  • A hypertext  page prepared to display the content on the web

Explain the following internet address http://www.google.co.us in reference to the structure of a URL    3mks

  • HTTP- hypertext transfer protocol or simply protocol
  • WWW – subdomain
  • google – the name of the computer with the web content/domain name
  • .co – top level domain for commercial organization
  • .us- a TLD extension for the country US

 

What is the world wide web                                       1mk

  •  A virtual space on the internet that allows web pages and sites to be accessed

Define the term browser                                    1mk

  •  A software that used viewing of web content

Explain the meaning of the word hyperlink     1mk

  • A text or picture that is a link to another webpage on the internet

What is a search engine?     1mk

  • Is a special program that collects and stores links to information websites allowing users to search its database for them
  • A specialized web-based application that help the user to search for specific information on the internet.

Explain the meaning of the term internet service provider            1mk

  • A company that offers internet services to end-users

Identify three elements apart from a computer that is required for one to be connected to the internet    3mk

  • Modem
  • Internet software
  • Internet service provider
  • Telecommunication lines
  • TCP/IP protocols

 

Define the term modem 1mk

  • Stands for modulator-demodulator
  • A device that enables telecommunication to use telephone lines

What is a protocol? Write the following in full: TCP/IP, HTML, HTTP and FTP           5mks

  • Protocols – are special communication rules that govern sending and receiving of messages by computers on a network
  • Html – hypertext markup language
  • Hypertext transfer protocol
  • Transmission Control Protocol
  • Internet Protocol
  • File Transfer Protocol

What would you do if a website refused to load on the browser within the first attempt?   1mk

  • Click the refresh button on the toolbar

 State three internet services                         3mks

  • Instant messaging
  • E-mails
  • E-commerce
  • Social media and networks
  • E-learning

 

Define the term internet telephony      1mk

  • Transmission of voice data over the internet

State three benefits of the internet in our society

  • Provides a platform for conducting business and marketing
  • Provides many platforms such as social media through which people can contact each other
  • Cost saving
  • Efficient communication

Ahmed uses the Internet for some time and is puzzled by the terminology.
(a) Draw a line to match each description to the appropriate technical term.

  • a computer that responds to requests to provide information and services over the Internet - an Internet server
  • defines how messages are transmitted and formatted over the Internet-HTTP
  • software that enables users to access/view documents and other resources on the Internet - Browser     
  • numerical ID for each device on the Internet-IP address
  • unique ID for a network interface card  -MAC address

Ahmed sees the message “Set your browser to accept cookies”.
Explain why some websites make this request.

  • to enable logon information to be kept on his computer
  • to provide pages customised for Ahmed the next time he logs on
  • to implement shopping carts and one-click purchasing
  • to be able to distinguish between new and repeat visitors to the website

State three different methods that allow people to communicate using the Internet. In each case, give a different benefit for the stated method.

emails: fast delivery of messages (to recipient’s mail box)
able to send attachments
can store messages for later use
auto-translation no language problems
can open email at a convenient time
video conferencing/calling/chat:
removes need to travel (saves time and money)
allows face to face discussions
works in real time (only allow once)
VoIP: much cheaper than normal international calls
direct communication between people
works in real time (only allow once)
chat rooms/instant messaging:
instantaneous reply
anyone can join in
social networking:
can ensure only your “friends” are in communication
usually free to join and use
talk to (multiple) friends at the same time

Joe plays online games using the world wide web. A sequence of processes is required to open a web page. Describe this sequence of processes

  • URL is clicked/typed into a web browser address bar. The page is requested (by the web browser) so HTML and files are fetched from a web server and the browser collates the page, which is then displayed on the monitor.
  • OR
    URL is clicked/typed into a web browser address bar (1). The browser locates the IP address either in cache or using a DNS server and the browser sends a request to the web server with that IP address web server uses HTTP to send back the requested web page and the browser displays the content of the page .

State the functions of the following protocols

POP -Stands for post office protocol

  • used to download emails from email servers

SMTP- Simple Mail Transfer Protocol

  • used to send emails to email servers and transfer emails between servers

FTP - Stands for the file transfer protocol

  • handles file uploads and downloads
  • transfers data and programs and not viewable content

 

State the functions of the following protocols

POP -Stands for post office protocol

  • used to download emails from email servers

SMTP- Simple Mail Transfer Protocol

  • used to send emails to email servers and transfer emails between servers

FTP - Stands for the file transfer protoc

Define the following terms as used in the internet

HTTPS/HTTP: this is a protocol that is used to send data to web pages across the Internet

Uniform Resource Locator (URL):   a text-based version of a web address

Internet Service provider /ISP  - his is the company that provides a user with a connection to the Internet

browser - Software/application that allows users to view web pages / render HTML -

cookie - a text file (stored by a web browser) that contains data about a user’s browsing habits/details/preferences

State three features of the fifth generation computers (3mks)    [2017 paper 1]

  • Artificial intelligence
  • Parallel processing
  • Natural language processing
  • quantum computing

State three types of optical disks

  • compact disks
  • DVDs
  • Blue Ray

Clearly define a computer

  • A computer is an electronic device that operates (works) under the control of programs stored in its own memory unit
  • An electronic device that accepts data, as input and transforms it under the influence of a set of special instructions called programs, to produce the desired output (referred to as information)

What precaution would you take in a computer lab if humidity falls below normal for prolonged periods due to weather changes?

  1. Use a humidifier: Using a humidifier can help maintain a consistent level of humidity in the computer lab, which can prevent the negative effects of low humidity.

  2. Avoid dry air: Avoid creating a dry environment in the computer lab by opening windows or using fans to increase air circulation.

  3. Regular maintenance: Ensure that all computer components are properly maintained and cleaned to prevent damage due to static electricity.

  4. Backup data: Regularly backup all important data to avoid data loss in case of hardware failure caused by low humidity.

  5. Monitor humidity levels: Use a hygrometer to monitor the humidity levels in the computer lab and take corrective measures if the levels fall below a safe range.

  6. Use anti-static materials: Use anti-static mats or wristbands when handling computer components to prevent static electricity buildup.

Explain what happens in the computer during the booting process

The booting process is the sequence of events that occur when a computer is turned on or restarted. It involves a series of steps that allow the computer's operating system to initialize and become functional. Here's a simplified explanation of what happens during the booting process:

  1. Power-On Self-Test (POST): When the computer is powered on, the first thing it does is perform a Power-On Self-Test. During this step, the computer's hardware components, such as the CPU, memory, and storage devices, are checked for proper functioning. The POST verifies that all essential hardware components are present and operational.

  2. Bootloader: Once the POST is completed, the computer looks for the bootloader. The bootloader is a small program stored in the computer's firmware or on the bootable device (such as the hard drive or a USB drive). It is responsible for loading the operating system.

  3. Loading the Operating System: The bootloader locates the operating system's files and initiates the loading process. It may display a boot menu allowing the user to choose the operating system if multiple options are available. The selected operating system's core files are loaded into the computer's memory.

  4. Kernel Initialization: The operating system's kernel, which is the central component responsible for managing system resources, is initialized. The kernel sets up essential components such as device drivers, memory management, and process management.

  5. System Initialization: After the kernel is initialized, the operating system proceeds with system initialization. During this stage, various system services and processes are started, and hardware devices are initialized and configured. The operating system loads essential system files and prepares the environment for user interaction.

  6. Login/Graphical Interface: Once the system initialization is complete, the user is presented with a login prompt or a graphical user interface (GUI). The user can then log in with their credentials or interact with the GUI to access the computer's functionalities.

Explain one reason why a computer needs to be connected to a stable power source

System Stability: Computers require a consistent and stable power supply to function properly. Fluctuations or interruptions in the power source can cause various issues that can disrupt the computer's operation or lead to hardware damage.

a. Data Loss: Sudden power outages or voltage fluctuations can cause the computer to shut down abruptly, resulting in data loss if unsaved work is not properly stored. This can be particularly problematic when working on critical tasks or handling important files.

b. Hardware Damage: Power surges or inconsistent power supply can damage the computer's internal components, including the motherboard, CPU, memory, and storage devices. These damages can result in system instability, reduced performance, or even complete hardware failure.

c. Operating System Corruption: Abrupt power loss or inconsistent power supply can corrupt the operating system files, leading to system crashes, error messages, and instability. This may require system repairs or reinstallation of the operating system.

d. Component Lifespan: Inconsistent power supply can put unnecessary stress on computer components, shortening their lifespan. Frequent power fluctuations or surges can cause wear and tear on various parts, reducing their efficiency and overall longevity.

Explain why smoke and dust particles are harmful to a computer

  1. Overheating: Smoke and dust particles can accumulate inside the computer's casing, blocking airflow and hindering the cooling mechanisms of the computer. This can lead to overheating of the internal components, such as the CPU and graphics card. Overheating can cause system instability, performance degradation, and even permanent damage to the hardware.

  2. Component Malfunction: Smoke and dust particles can settle on electronic components, such as the motherboard, memory modules, and connectors. Over time, this accumulation can create a layer of debris, leading to poor electrical contact and interference with signal transmission. This can result in component malfunctions, intermittent failures, or even complete hardware failure.

  3. Short Circuits: If smoke or dust particles contain conductive materials, such as metal flakes or moisture, they can create a risk of short circuits. When conductive particles come into contact with exposed circuits or connectors, they can cause a direct electrical connection between two points that are not intended to be connected. Short circuits can damage components, disrupt data transmission, and even pose a fire hazard.

  4. Increased Maintenance Requirements: Smoke and dust particles can increase the frequency and complexity of computer maintenance. Accumulated dust can clog cooling fans, causing them to work less effectively or even fail. Additionally, smoke particles can leave behind sticky residues that further attract dust, making the cleaning process more challenging.

  5. Reduced Performance and Reliability: As smoke and dust particles accumulate within the computer, they can restrict the movement of mechanical components, such as fans or disk drives, affecting their performance and reliability. Dust particles can also hinder the reading and writing capabilities of optical drives or cause errors in data transmission.

What precautions would you take in a computer room in case a user complains of backache after long periods of using the computer?

  1. Ergonomic Chair: Ensure that each user has an ergonomic chair that provides proper lumbar support. The chair should be adjustable in terms of height and backrest angle.

  2. Adjustable Desk: Provide adjustable desks or workstations that can accommodate different user heights and allow for proper positioning of the keyboard, mouse, and monitor.

  3. Monitor Placement: Ensure that the computer monitors are positioned at eye level or slightly below to prevent users from straining their necks and shoulders. Consider using monitor stands or adjustable monitor arms for better positioning.

  4. Keyboard and Mouse: Encourage the use of ergonomic keyboards and mice that are designed to minimize strain on the wrists and hands. Provide wrist rests if needed.

  5. Proper Lighting: Ensure that the computer room is well-lit, with appropriate lighting levels to reduce eye strain. Avoid glare on the computer screens by using adjustable blinds or curtains.

  6. Regular Breaks: Encourage users to take regular breaks from prolonged computer use. Suggest the 20-20-20 rule: Every 20 minutes, look away from the screen at an object 20 feet away for at least 20 seconds.

  7. Stretching Exercises: Promote stretching exercises for the neck, shoulders, and back to help alleviate muscle tension and improve blood circulation. Display posters or provide resources on desk stretches and exercises.

  8. Correct Posture: Educate users about proper sitting posture, emphasizing the importance of maintaining a neutral spine position. Provide visual aids or ergonomic training materials to demonstrate the correct posture.

  9. Desk Organization: Encourage users to keep their workstations organized to minimize the need for reaching or straining. This includes keeping frequently used items within easy reach and arranging cables to prevent trip hazards.

  10. Individual Assessments: If the backache issue persists, consider offering individual ergonomic assessments for users. A specialist can evaluate the user's workstation setup and suggest personalized recommendations.

State two reasons for the increased use of computers in offices                      (2 marks)

  • They are small and fit in a small storage space
  • They are portable hence can be carried when need to be used outside the office
  • Low power consumption
  • Have rechargeable batteries

A computer laboratory experiences power supply problems. Describe three power related problems that should be addressed

Blackout: This is unexpected discontinuation of power supply in the laboratory.

Power sag: Sudden drop of voltage levels that lasts less than a second.

Transients/ surge: High voltage flowing.

Brownout: Partial blackout where there's low voltage flow.

Differentiate between modulation and demodulation as used in data communication

Modulation refers to the process of converting a digital signal to analog signal at the transmission end while demodulation is to converting analog signal to digital signal at the receiving end

State the differences between a hub and a switch

 

  • switches can send and receive data simultaneously - they are full duplex
  • a hub is half duplex- only one host can communicate at a time.
  • a hub broadcast signals to all computers connected in a network while a switch directs data to its intended destination

Explain the difference between
(i) serial and parallel,
(ii) simplex and duplex
modes of data transmission.

  • Serial is the transmission of data one bit at a time/through one wire
  • Parallel is the transmission of data more than one bit at a time/many wires
  • Simplex is the transmission of data in one direction only
  • Duplex is the transmission of data in both directions simultaneously