admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

List three electronic data processing modes used in computers

  • Realtime processing
  • Batch processing
  • Timesharing
  • multiprogramming
  • Online
  • Batch
  • Distributed
Question Image

(ii) State what ROM and RAM store.

 

ROM stores BIOS / bootstrap / start-up 

RAM stores currently executing programs and data

Question Image

Differentiate between uploading and downloading a file

Uploading a file  refers to the process of transferring a file from a local computer to a remote webserver while downloading a file refers to the process of transferring or copying a file from a remote webserver to a local machine

Question Image

She lost all her photographs when her computer crashed.
(i) What is meant by the term crashed?
(ii) How could she have avoided losing all her photographs?

  • the computer appears to “freeze”/”hang”
  • computer won’t respond
  • failure of hardware (stops computer normal functioning)
  • failure of software (stops computer normal functioning)
Question Image

State ways in which an OS secures a computer system

  • Access Controls: Authentication of users in order to access files
  • Performing regular patches of updates
  • creating secure accounts with required privileges
  • scrutinizes all incoming and outgoing packets of data through a firewall
  • encryption of data, during transmission
  • Log files to detect any breach
Question Image

Peter has installed internet on his home computer in order to use it for browsing. State three ways in which he would prevent viruses from infecting his computer.                                                        (3 marks)

  • Installing the latest versions of antivirus software
  • Avoiding downloads from untrusted sites
  • Scanning removable storage media for viruses before use
  • Scanning attachments for viruses before opening or downloading
Question Image

The operators who enter the data into the files sit at keyboards to do their work.
Discuss

(i) the potential health hazards of this type of work,
(ii) the ways that management can help to overcome the effects of the health hazards.

(i) the potential health hazards of this type of work,

  • backstrain due to long periods of immobility
  • eye strain due to long periods of staring  at the screen
  • RSI- continual use of the same muscle group

(ii) the ways that management can help to overcome the effects of the health hazards.

  • Move around regularly
  • use ergonomic chair
  • use anti-glare screen
  • use of wrist pads
Question Image

IT technicians are setting up a new file server for a school. Describe the benefits and drawbacks of using a command line interface (CLI) rather than a graphical user interface (GUI) to set up a new file server.  (4marks)

Benefits

  • The user is not restricted to the predetermined options//the GUI uses icons and set menus
  • The user has more control over the computer settings//in GUI computer settings are protected from the user
  • Uses less memory than GUI
  • Requires less processing power for the interface
  • More processing power is made available for the task

Drawbacks

  • The commands used have to be learnt
  • The commands used have to be remembered
  • The commands used have to be typed in/entered exactly
  • Have to remember the exact path/correct name of application
  • More prone to errors on data entry Commands have to be typed in//in a GUI can use touchscreens/mice
  • Tends to be used by specialist people//GUI is more user-friendly and can be used by non-experts
Question Image

Compare and contrast CLI and GUI

CLI

  • Commands have to be typed in full with no mistakes
  • Requires memorization of commands
  • Uses less memory

GUI

  • Due to graphics, GUI uses a lot of memory
  • GUI is more user friendly
  • Cannot operate properly if memory is low

Comparison

  • Both carry out file management
  • Both are operating systems
  • Both control software and hardware
Question Image

Explain three ways a computer can store negative numbers                                            (3 marks)

Prefixing an extra sign bit- A negative number is representes by prefixing a digit 1 to the number

Ones complement- This is flipping the binary equivalent of the number

Twos complement- this involves getting the ones complement and then adding a 1

Question Image

1. State two ways in which a computer may be used in a healthcare  sector other than record keeping

  • Patient monitoring
  • Used to control medical equipment e.g ultra sound
  • medical research and studies
  • communication and telemedicine
Question Image

Differentiate between action query and select query

An action query is used to modify, add, or delete data in a database whereas a select query is used to retrieve data from a database based on specified criteria but does not make any changes to the data.

Question Image

Identify one component common to all computers.

  • Processor
Question Image

What situations are likely to call for the use of Direct Changed Over?

  • where the new system is completely different from the old one
  • if there has been extensive testing of the system and the system analyst has confidence in its functionality
  • If the system is not critical
Question Image

Below is a labelled diagram of a star topology network.

(a) Other than the items labelled above state the hardware required by every computer to connect to a network

b) Describe how a packet is transmitted from computer A to computer D, including the role of the switch

 

(a)

  • Hardware required by each computer to connect to a network is a Network Interface Card / NIC / network adapter

(b)

  • Computer A adds computer D’s address to packet
  • Computer A sends packet to switch
  • Switch looks at address on packet  Switch compares to stored list of addresses on network
  • Switch forwards packet to computer D’s address
Question Image

State a stage in system development where each of the following activities are carried out    (KCSE 2018)

(a) Identifying technologies that may be used in a proposed system

  • System Analysis/Information gathering/Problem recognition

(b) Identifying the shortcomings of the old system

  • Problem definition

(c) Prepares the software migration plan

  • Implementation stage
Question Image

A computer operates as a binary digital device. Explain why binary is used to represent computer data.

  • Binary can represent two states because computer circuits use transistors, which can either be on or off
Question Image

Describe and give an example of one syntax and one logical programming error.

Syntax
An error that occurs when a command does not follow the expected syntax of the language, e.g. when a keyword is incorrectly spelt
Incorrect: IF A ADN B Then
Correct: IF A AND B Then

Logical
An error that causes a program to output an incorrect answer (that does not necessarily crash the program)
An algorithm that calculates a person’s age from their date of birth, but ends up giving negative numbers

Question Image

Describe the input, processing and output from a computerised traffic-control system.

input

  • from sensors
  • from camera images [Max 2]

processing

  • analyse data from sensors
  • calculate average traffic flow/speed
  • send signals to adjust change lights/timing

output

  • change lights at the junction
  • change timing plan
Question Image

Explain why a firewall improves network security.

  • It prevents unauthorised access into the network (by checking IP/MAC address/packet content);
  •  It prevents unauthorised transmissions from inside the network to external locations;
  •  It monitors network traffic;
  • It makes sure that only the right/authorised traffic is allowed;
  • It opens/closes ports as necessary;
Question Image