admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

State the function of a router in a network

  • connects different networks
  • transfer data packets from source to destination
  • allow hosts on different networks to communicate

When data is transmitted it is subject to corruption. Explain how a parity check could be used to determine whether corruption has taken place.

  • Extra bit on each data-byte that
  •  Does not transmit data
  • Makes the number of ones in a byte always even or always odd
  • Error in the transmission of a bit will make the even/odd wrong
  • The problem of two errors in one byte not being found
  • Parity block

Explain, using examples where appropriate, the meaning of these computer terms

(a) byte ..................................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(b) compiler ............................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(c) handshaking .....................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(d) technical documentation ..................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(e) simulation .........................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2

(a) byte

  • fixed number of bits, 8 bits
  • represents a character


(b) compiler  program

  • converts/changes/translates high-level language into machine code/machine language/low-level language/object code
  • changes each high-level language instruction into machine code instructions
  • produces an independent program capable of being executed by itself
  • all (syntax errors) listed
  • converts the whole program before execution/in one go
  • converts source code to object code

(c) handshaking

  • exchanging of signals to establish communication between two devices/computers e.g. printer and computer, modem and computer

(d) technical documentation

  • documentation to ensure that the system can be maintained/updated/altered/developed/upgraded
  • trouble shooting/correcting errors/correcting faults
  • explanation of what the program does/how the system works
  • contains file structures
  • algorithms/flow charts/pseudo code
  • program listings
  • hierarchical chart

(e) simulation

  • studying the behavior of a system by using a model/represents real-life/mathematical representation
    e.g. flight simulator (or others), hazardous applications results can be predicted

Give one example of wireless technology

method of transmission e.g

  • blue tooth
  • radio
  • optical
  • satellite
  • infra-red
  • microwave

device e.g.

  • 3G (WAP) mobile phones/mobile phones/cell phone/remote
  • key pad/remote control/keyboard
  • infra-red mouse
  • multimedia mobile handsets/notebooks
  • GPRS (general packet radio service) mobiles
  • WLAN(or WiFi) hotspots sited in public areas - e.g. coffee
  • shops, railway stations, airports, motorway services
  • linked printers
  • PDA's (personal digital assistants)
  • GPS

Give one benefit and one disadvantage of the use of wireless technology.

Advantages

  • no wires
  • fast/high-speed wireless Internet access
  • WLAN is faster than a modem or mobile
  • WLAN for working at home one day a week/teleworkers
  • see internet content away on the move
  • create and send multimedia messages to mobiles or e-mail
  • picture messaging - send photos/pictures text/sound/recorded
  • greetings from mobiles to mobiles/PCs
  • instant transmission - no busy signals/no searching for phone jacks
  • download e-mail and file attachments on mobile
  • watch live webcast on mobile/hotspot
  • listen to streaming video on mobile/hotspot
  • news/weather/sport/games while on the move
  • access information from mobile anytime
  • send/receive/delete e-mail while on the move
  • wireless Inbox on mobile - to contacts and calendar
  • view business appointments while out of the office on mobile
  • send corporate e-mail while out of the office - even behind a firewall on mobile
  • wireless internet connection from chat rooms for discussions with colleagues while on the move
  • give visual demonstrations from mobile and colleagues watch back at the office

 disadvantages e.g.

  • WLAN speeds are slower than Net access at work/narrow band width
  • any one within the WLAN nodes range with an appropriate device can use your WLAN and broad band link
  • any one who walks past your house or WLAN linked into a corporate system can access sensitive information or credit card details
  • 3G phones not compatible with 2G phones
  • Blue tooth - has limited range
  • blocked signal/distorted signal/weak signal/lag
  • health problems from microwaves

State and explain four network communication devices

  • Repeaters : amplify data signal thereby extending the physical coverage of a network. It can connect two LANs locally.
  • Bridges: connect similar types of networks e.g a token ring to another token ring
  • Routers: link networks of different types
  • Gateway: allows computers in a network to connect regardless of their topology

What is a network server?

  • It refers to a computer that controls other computers in a network and monitors user's access to the shared resources.

Give one advantage using a star network rather than a ring network.

  • star - if one computer goes down the others can still be used
  • ring - if one computer goes down the others can not be used

Explain what is meant by the two terms download speed and upload speed

download speed :
– speed at which information/data is transferred FROM server/Internet
– speed at which information/data is transferred TO the user’s computer
upload speed :
– speed at which information/data is transferred FROM user’s computer
– speed at which information/data is transferred TO the Internet/server

Give two advantages of using broadband rather than dial-up

  • an use Internet connection and telephone at the same time
  • much faster data transfer speed
  • always “on”
  • charged for number of bytes/flat rate per month rather than actual time on line
  • more bandwidth

Give two different scenarios when a fast broadband connection is essential.

– when transferring large files/attachments with emails
– when streaming music/video files/bit streaming
– when using VoIP/video conferencing
– software updates
– online transactions
– Using VLE (Virtual Learning Environment)

Give one advantage of a star network when compared to a ring network.

if one station/cable fails, others are not affected
easier to identify faults when using star topologies
it is easier to expand this type of network
performance doesn’t deteriorate under load

Describe how a FRID works.

RFID stands for radio frequency identification. There is an RFID reader and tag.RFID is used in contactless credit and debit cards as well as in some hotel room cards. Inside an RFID tag is a chip that contains a small amount of memory. The chip is attached to a coil of wire which acts as an antenna. When an RFID tag is scanned, the reader emits radio waves which are picked up by the tag’s antenna. The power induced in the tag’s antenna from these waves is enough to power the chip which then uses its antenna to emit its own radio wave, which contains the information held on the chip. This wave is picked up by the reader which decodes the information and returns the information to a computer.

Website data is broken down into packets to be transmitted to a user. Describe the structure of a data packet.

It has a header

  • that contains the destination address
  • that contains the packet number
  • that contains the originator’s address

It has a payload

It has a trailer.

 

Give three characteristics of an IP address.

  • consists of values between 0–255 / 0–FFF
  • values are separated by full stops/colons
  • it is a unique address
  • can be static or dynamic
  • can be public or private
  • can be IPv4 / have four groups of digits
  • can be IPv6 / have eight groups of digits
  • in IPv6: can replace groups of zeros.

A workshop has a lot of heavy machinery operating throughout the day and requires a cable to connect a workstation to a switch. Which of the following, unshielded twisted pair (UTP) or shielded twisted pair (STP) cable, would be the more suitable? Justify your response.

Shielded twisted pair cable:
A twisted pair cable is made up of four pairs of twisted copper wires, a shielded twisted pair cable applies a shield to each one of the pairs on a cable or to all of the pairs together. This shield can reduce EMI (electromagnetic interference), which would be emitted from heavy machinery. This increased data transmission quality in the workshop. STP can also reduce crosstalk.

Outline a factor that can influence the performance of a network.

  • The different factors that can influence the performance of a network include: bandwidth, network design, data collisions, and excess broadcast traffic.
  • The bandwidth can influence through the method of transmission and medium used

Give one difference between a compiled program and interpreted program

  • A compiled program will only execute on a processor of specific type/family/with same instruction set
  • A program run using an interpreter can execute on a computer with any type of processor;

Give two reasons for connecting computers in a network.

Can share files/data Can share applications/software Can collaborate Can share peripherals (printers, speakers) Can share connectivity (Internet connection, hotspot) Can access files from any computer / hot desk Central control/management (security, software updates, backup, remote support, users, remote monitoring) Allows communication (email, social media, video conferencing, online meeting, collaborative games)

Give any three advantages of computer networks

  1. Enable resource sharing
  2. Facilitate remote communication
  3. Enable distributed processing
  4. Provide better data security and management