Defining blocking of text as used in word processing
Differentiate between a compiled and an interpreted program
Describe one task that is commonly undertaken during the first phase of system development life cycle
Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.
State a stage in system development where each of the following activities are carried out (KCSE 2018)
(a) Identifying technologies that may be used in a proposed system
(b) Identifying the shortcomings of the old system
(c) Prepares the software migration plan
Briefly describe three types of database models
What is a utility software?
The following are some of the possible definitions:
It is system software designed to help the users to analyse, configure, optimize, or maintain a computer
System software that helps maintain the proper and smooth functioning of a computer system
Examples include antivirus software, Disk clean-up tools, disk defragmenters, backup software, etc
What is the difference between a logical file and a physical file?
Give one advantage of a star network when compared to a ring network.
– if one station/cable fails, others are not affected
– easier to identify faults when using star topologies
– it is easier to expand this type of network
– performance doesn’t deteriorate under load
When developing a network security policy, it is important to understand the threats that can be made against a network. ‘IP spoofing’ and ‘back doors’ are two techniques that can compromise the security of a network. Describe each of these techniques.
IP spoofing
A technique used to gain unauthorised access to a computer whereby an intruder sends messages to that computer from a false IP address
Back door:
An undocumented method of gaining access to a program, online service or an entire computer system
Define patch as used in the operating system
Refers to a small piece of software designed to update, fix, or improve a specific part of the operating system or an application.
NB: Patches are typically released by the software's developer or the operating system vendor to address security vulnerabilities, software bugs, or to add new features or enhancements
(ii) The organisation has chosen wireless connectivity over wired connectivity for its new office building. There is no significant difference in the cost of installing either.
Give three reasons why the organisation might prefer wireless connectivity.
May not have space for cables to be installed
Employees and visitors can move around the building without disconnecting
Adding new users just means giving out the SSID and password
What is data encryption?
(a) Name two pieces of hardware needed to enable video-conferencing to take place using a standard computer system.
(b) State one piece of specialist software needed to carry out video-conferencing.
(a)
– webcam
– speakers
– microphone
– broadband modem
(b)
– use of CODEC (converts/compresses analogue data into digital data)
– echo cancellation s/ware (allows talking in real time/keeps everything in sync)
– compression s/ware for video/audio
– s/ware to access broadband/networking
Explain why it is not always true that a computer which has a quad-core processor runs twice as fast as a computer with a dual-core processor
State two reasons why the data in fields such SEX field in a database should be coded.
What are the likely causes of data and program loss in a computer (2 marks)
Distinguish between a client-server and a peer-to-peer network
Computer Studies Paper 1 KCSE 2021 Prediction
Section A
1.State two reasons for the increased use of laptop computers in government offices. [2]
They are small and fit in a small storage space
They are light weight hence can be carried to areas where their services are required
The monitor, system unit, keyboard units are integrated together
Easy to share
Have rechargeable battery
Have low power consumption
2.Computer network technicians prefer to use command-line based operating systems when configuring networks. State three reasons for the preference. [3]
Do not take up a lot of memory
Have direct access to most hardware devices/provide complete control during configuration
Cheaper to acquire as some are freeware/shareware
Faster to execute commands
Difficult to hack/more secure
More stable
3.State three measures that should be put in place in a computer laboratory to safeguard users’ health. [3]
4.State three ways in which barcode readers may be used in schools. [3]
Take inventory of items
Transactions in the school library
Keep track of movement of goods
Track students in and out of school
Used to register roll call
5.State three advantages of flat panel monitors over cathode ray tube monitors as used in computers. [3]
6.State three possible reasons for the extinction of daisy wheel printers in the market. [3]
7.State three ways in which an operating system secures a computer system. [3]
8.A law firm prefers to use hard copy output when handling documents for legal matters. State two reasons for this preference. [2]
9.State the function of each of the following feature in a word processor
a. Thesaurus [1]
Feature that suggests words with similar or opposite meanings to the selected word
b. Comments [1]
Feature that allows a user to attach remarks
10. With the aid of an example, explain the term multi-level list as used in word processing. [3]
Formatting style that shows listed items at different level instead of using one line
11. Distinguish between real-time operating system and distributed operating system. [3]
Accept answers based on data processing concept
12. Explain the function of protect sheet feature in a spreadsheet program. [2]
A tool/feature that prevents unwanted changes to the spreadsheet. Requires a user to key in a password inorder to make changes
13. State four computer based careers introduced as a result of computerized data processing method at the airport. [2]
NB/ Accept any computer based career
14. In a spreadsheet, the formula = If(A1>10,A1*77,A1*50) is entered in a cell. Interpret the results. [3]
Checks the value in cell A1if it is more than 10, if the comparison is true then the outcome of the value in cell multiplied by 77 is displayed, else if it is false the results of the value in cell A1 multiplied by 50 are displayed.
15. State a stage in systems development cycle where each of the following activities are carried out:
a. Identifying the technologies that may be used in a proposed system. [1]
Accept any sub stage within system analysis e.g. requirement specification, problem definition, information gathering, etc
b. Identifying shortcomings of a system. [1]
All stages of system development
c. Preparing the system migration plan. [1]
Implementation stage