admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

(b) The computer needs an operating system and utility software.

(i) The operating system controls the scheduling of processes.

Describe how the operating system uses scheduling to allocate processor time.

 

  • All processes are held in a queue 
  • Processes are prioritised 
  • Processes are switched On each clock cycle

 Describe four features of the operating system when providing a graphical user interface on a personal computer. Give a suitable example of each feature.

Windows for example a word processing application and a spreadsheet
 
Menus, for example, allow the user to perform operations or run applications such as right-click to create a new folder  
 
Icons for example a picture of linked computers for networking
 
Pointers(mouse or touchscreen)  for example to select items/trigger events  
 
Shortcuts for example to frequently used applications for example having a shortcut to your mail client on your desktop
 
File navigation for example when searching the hard disc for a file/folder using a browser
 
copying / deleting / moving/sorting/naming/searching of files or folders for example copying of a file from the hard drive to a USB pen drive (File handling)
 
Desktop customisation for example changing the colours and background image
 
Copy and paste for example between applications e.g. copying a graph from a spreadsheet to a word processor
 
Error messages for example provide users with error/warning/help messages for example ‘printer out of paper’ 

State ways of identifying illegal copies of an operating system

  • No licence agreement as a certificate of authenticity
  • Prices that are extremely cheap
  • No documentation manual
  • when one connects to the internet for authentication, the report from the manufacturer indicates that the user may be a victim of software counterfeiting
  • frequent runtime or occurrence of fatal errors when using the machine

Describe how the database can be recovered from a system failure

  • backups/dumps of files
  • copy of files on CD/tape streamer
  • file generations

Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.

Blagging

  • This is where a victim is tricked/persuaded by a fraudster to give their details or payment information for a false reason/purpose;

Phishing

  • This is where the victim receives and responds to communication that appears to be from a valid or known source but is in fact fraudulent. (It allows the fraudster to capture private information before the victim realises);

Shouldering

  • This is where someone watches and records\remembers a victim entering their pin or security information such as passwords. (They can then use this information to gain access to a system)

List two types of disaster recovery tools.

  • online storage
  • incremental backup
  • full backup
  • RAID (level 0, 1, 10)
  • uninterruptible power supply (UPS)

What is data encryption?

  • Refers to the scrambling of data into unreadable form before transmission over a telecommunication media  OR
  • transformation of data from plaintext to ciphertext

Briefly describe the information Security principles or CIA triads

  • confidentiality - The principle of protection from unauthorized access or disclosure
  • Integrity - the principle of ensuring that unauthorized or undetected changes to data or system configurations do not occur.
  • Availability - the principle of ensuring that data and services remain accessible to authorized users at all times

 

Confidential information about the students is to be stored on the computer system. Explain the measures that can be taken to ensure that such information remains confidential.

- Passwords
- Hierarchy
- Only allow some staff to access student files
- Only some machines able to access
- Physical location of these machines
- Physical lock on machines
- Encrypted data in files
- Firewall if connected to the Internet

State two effects of a computer virus

  • memory used up/slows down computer/alters setting/systems failure
  • erases files/erases data/corrupts data/data needs restoring
  • infects other computers on the network
  • production loss/financial loss

State two ways of protecting computers against viruses.

  • do not allow outside floppy disks/CD’s/DVD’s
  • use disk free work stations
  • download/install and use anti virus software
  • scan hard disks regularly
  • update the anti virus program regularly
  • do not open file attachments from unknown sources/download
  • doubtful software from the Internet
  • do not use files that come from unknown sources
  • buy original software/do not buy pirated software
  • use firewalls

Define Data Security

  • Is the protection of programs and data in computers and communications systems against unauthorized modification, access or disclosure
  •  

State two data protection rules that should be obeyed by all staff in a hospital.

  • data must be accurate/up-to-date
  • personal data must be registered
  • data must be used for the purpose that is registered for
  • if data is to be used for another purpose the registrar must be notified/
  • subject gives consent
  • patients must be able to see the data and have it changed if it is incorrect
  • processed fairly and lawfully
  • kept no longer than needed
  • kept secure
  • not transferred to other countries without protection

Describe how the database can be recovered from a system failure

  • mirrored hard disk/hot standby/second computer
  • re-run the old master file with the transaction file

What is a computer virus?

A computer virus is a program designed to damage other programs or causes irregular behaviour in a computer system.

State the symptoms of a computer virus

  • Unfamiliar graphics or quizzical messages appear on the screen
  • Programs taking longer than usual to load
  • Less memory allowance than usual
  • Unusual error messages occurring more frequently

A virus is a specific category of malware. Describe three other different categories of malware.

Trojan (horse); a program which misleads the user into thinking it is another
piece of software which, when run, executes another program;
Spyware; a program which records data such as usernames and passwords on
a host system and forwards the information to a third party;
Adware; code embedded or attached to program files which will persistently
show adverts (that attempt to generate revenue);
Worm; code which will run autonomously and replicates itself on a host system;
Ransomware; a program that encrypts a user’s data to make it unreadable until
they pay for the key;
Remote Access Tool (RAT); allows access to control and monitor a computer
from a remote network location;
Rootkit; malware that has managed to gain ‘root’ admin privileges;
Bots/Zombies; a program installed on a computer that performs a job for the
remote owner of the bot/zombie such as sending spam or sending web requests
to perform a DOS or attack a computer system;
Scareware; malware that tells you something is wrong with your system in an
attempt to get you to make a purchase;
Keylogger; a program that monitors/records a user’s keystrokes in order to steal
passwords/confidential details

Give three features of a data protection act.

  • data shall only be used for the specific purpose for which it was collected
  • data shall be adequate/relevant/not excessive
  • data shall be accurate/up to date
  • data shall not be kept any longer than necessary
  • individuals have the right to see data about them (and have it changed if inaccurate)
  • sufficient means taken for security/integrity of data
  • data shall not be transferred to a country with lower protection laws
  • data users must be registered

Explain why a firewall improves network security.

  • It prevents unauthorised access into the network (by checking IP/MAC address/packet content);
  •  It prevents unauthorised transmissions from inside the network to external locations;
  •  It monitors network traffic;
  • It makes sure that only the right/authorised traffic is allowed;
  • It opens/closes ports as necessary;

State three advantages of  biometric authentication

  • Protection against Password-related Vulnerabilities: Traditional password-based authentication methods are vulnerable to various risks, such as weak passwords, password sharing, or password theft.
  • Stronger Access Control: Biometric readers add an additional layer of access control to laptops. Even if someone gains physical possession of the laptop, they would still need the authorized user's biometric data to unlock it and access the data. This helps prevent unauthorized individuals from accessing sensitive information stored on the laptop,
  • Audit Trail and Accountability: Biometric authentication systems often come with built-in logging and auditing capabilities. This means that each time someone accesses the laptop using their biometric data, it can be recorded and associated with a specific user. This creates an audit trail, allowing organizations to track and monitor access to laptops and establish accountability in case of any security incidents or breaches.