admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Give two reasons for connecting computers in a network.
Can share files/data Can share applications/software Can collaborate Can share peripherals (printers, speakers) Can share connectivity (Internet connection, hotspot) Can access files from any computer / hot desk Central control/management (security, software updates, backup, remote support, users, remote monitoring) Allows communication (email, social media, video conferencing, online meeting, collaborative games)
Question Image

What is the difference between a logical file and a physical file?

  • A physical file contains the original data whereas a logical file does not contain any data
  • A physical file contains one record format while a logical file can contain up to 32 record formats
  • A physical file can exist without a logical file while a logical file cannot exist without a physical file
Question Image

Describe the principles of operation of  laser printers and describe how they are applied in real-life scenarios

  • A laser printer makes use of powdered ink and static electricity to print
  • Unlike inkjet printers which print line-by-line, laser printers print the whole page in one go

Steps

  • The data from the  file to be printed is sent to a printer driver
  • The printer driver checks that the data is in an understandable format
  • The printer driver checks if the printer is able to carry out the print job
  • The data is sent to the printer and is stored in a printer buffer
  • A printing drum in the printer is given a positve charge. A laser beam removes the positive charge in some areas. This leaves negatively charged areas which matches the characters/images to be printed
  •  
Question Image
  • Explain the purpose of an operating system
  • provides an interface between the computer user and the hardware
  • Manages the allocation and deallocation of the CPU to processes.
  • manages Input-output devices by use of drivers

Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.

  • All nodes ‘listen’ for traffic to sense when the network is idle.
  • When a node wishes to transmit, it transmits a ‘request to send’ frame’ (RTS)
  • The intended receiving device will transmit a ‘clear to send’ (CTS) frame if it is available.
  • All other nodes ‘sense’ the network is busy and wait a random amount of time before trying to transmit
Question Image

Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.

Blagging

  • This is where a victim is tricked/persuaded by a fraudster to give their details or payment information for a false reason/purpose;

Phishing

  • This is where the victim receives and responds to communication that appears to be from a valid or known source but is in fact fraudulent. (It allows the fraudster to capture private information before the victim realises);

Shouldering

  • This is where someone watches and records\remembers a victim entering their pin or security information such as passwords. (They can then use this information to gain access to a system)
Question Image

Factors to consider when choosing DTP software. (4 marks)

  1. Availability in the market
  2. Initial and maintenance cost
  3. User friendliness
  4. Compatibility
  5. User needs

Describe how the CPU and main memory work together.

Data and instructions are fetched from main memory, from addresses requested by the CPU on the address bus. (Data and instructions are sent) using the data bus. (Data and instructions are then) decoded and executed in the CPU.
Results of operations are sent back to the memory on the data bus

Question Image

Explain one drawback to a user if the program is distributed as freeware

The user is not allowed to access the source code so, they cannot tailor the software to their needs and  they cannot fix any bugs in it

The software is still covered by copyright

The user must get the owner’s permission to do anything beyond using it

Question Image

Identify four events that take place during the fetch-execute cycle

  • An instruction is retrieved from the memory
  • The instruction is decoded
  • The instruction is executed
  • the program counter is incremented
Question Image

State three advantages of  biometric authentication

  • Protection against Password-related Vulnerabilities: Traditional password-based authentication methods are vulnerable to various risks, such as weak passwords, password sharing, or password theft.
  • Stronger Access Control: Biometric readers add an additional layer of access control to laptops. Even if someone gains physical possession of the laptop, they would still need the authorized user's biometric data to unlock it and access the data. This helps prevent unauthorized individuals from accessing sensitive information stored on the laptop,
  • Audit Trail and Accountability: Biometric authentication systems often come with built-in logging and auditing capabilities. This means that each time someone accesses the laptop using their biometric data, it can be recorded and associated with a specific user. This creates an audit trail, allowing organizations to track and monitor access to laptops and establish accountability in case of any security incidents or breaches.
Question Image

A computer operates as a binary digital device. Explain why binary is used to represent computer data.

  • Binary can represent two states because computer circuits use transistors, which can either be on or off
Question Image
Give two uses of spreadsheets in a government office concerned with carrying out national census
Tallying population size Establishing demographic trends Drawing pie charts to show population share by gender Doing census budgets

A company has a website that is stored on a web server.
(a) The website data is broken down into packets to be transmitted to a user.
Describe the structure of a data packet.

  • it has a header that contains the destination address, the packet number, and the originator’s address
  • it has a payload
  • it has a trailer.

 

Question Image

Explain the function of the protect sheet feature in the spreadsheet program

  • It is a feature used to prevent unwanted changes to be made on the data contained in a sheet by limiting the ability to make changes
Question Image

Describe what is meant by a MAC address.

  • used to identify a device
  • it is a unique (address)
  • it is a static address // it does not change
  • it is set by the manufacturer
  • the first part is the manufacturer ID/number / identifies the manufacturer
  • the second part is the serial number / ID.

 

Question Image

Joe plays online games using the world wide web. A sequence of processes is required to open a web page. Describe this sequence of processes

  • URL is clicked/typed into a web browser address bar. The page is requested (by the web browser) so HTML and files are fetched from a web server and the browser collates the page, which is then displayed on the monitor.
  • OR
    URL is clicked/typed into a web browser address bar (1). The browser locates the IP address either in cache or using a DNS server and the browser sends a request to the web server with that IP address web server uses HTTP to send back the requested web page and the browser displays the content of the page .
Question Image

State any four applications of electronic spreadsheets

  • Financial accounting
  • Prediction and forecasting
  • Inventory keeping
  • Budgeting
  • Keeping records
Question Image

Name three of the stages in the system life cycle

fact finding
feasibility study
analysis
design
testing
documentation
implementation/changeover/installation
evaluation
maintenance

Question Image

Describe one way developers ensure that their software addresses inclusivity issues.

Incorporate language support features in their software, which allows users to select their preferred language. This can be achieved through multi-language user interfaces and providing translation capabilities. By doing so, developers address language barriers and make the software accessible to a broader audience, demonstrating a commitment to cultural inclusivity.

Gender inclusivity – use gender-neutral language in examples

Cultural/Racial inclusivity – use a variety of ethnicities in photos

Ability inclusivity – represent awareness of disability in some examples

Sexual preference inclusivity – use language that is supportive of LGBTQI+ people

Question Image