admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

What is entity integrity?

  • It ensures that each row has a unique and non-null primary key
Question Image
Give two reasons for connecting computers in a network.
Can share files/data Can share applications/software Can collaborate Can share peripherals (printers, speakers) Can share connectivity (Internet connection, hotspot) Can access files from any computer / hot desk Central control/management (security, software updates, backup, remote support, users, remote monitoring) Allows communication (email, social media, video conferencing, online meeting, collaborative games)
Question Image

Describe how the database can be recovered from a system failure

  • backups/dumps of files
  • copy of files on CD/tape streamer
  • file generations
Question Image

Give one advantage using a star network rather than a ring network.

  • star - if one computer goes down the others can still be used
  • ring - if one computer goes down the others can not be used
Question Image

What is meant by RAID technology?

RAID (Redundant Array of Independent Disks) technology refers to a method of combining multiple physical disk drives into a logical unit to improve performance, data availability, and data redundancy. RAID technology is commonly used in storage systems to provide fault tolerance, data protection, and increased storage performance.

The primary purpose of RAID is to create a more reliable and robust storage solution by spreading data across multiple drives and implementing various data redundancy techniques. This helps to mitigate the risk of data loss and system downtime in case of drive failures.

There are different levels or configurations of RAID, each offering different features and trade-offs. The most commonly used RAID levels are:

  1. RAID 0 (Striping): Data is split evenly across multiple drives, resulting in increased performance as data can be accessed from multiple drives simultaneously. However, there is no redundancy, so if one drive fails, data loss can occur.

  2. RAID 1 (Mirroring): Data is duplicated or mirrored across two drives, providing redundancy. If one drive fails, the other drive can still function and serve the data. RAID 1 offers data protection but does not offer increased performance.

  3. RAID 5 (Striping with Parity): Data and parity information are striped across multiple drives, providing both increased performance and fault tolerance. Parity information allows for the recovery of data in case of a single drive failure. RAID 5 requires a minimum of three drives.

  4. RAID 10 (Combination of Mirroring and Striping): RAID 10 combines elements of RAID 1 and RAID 0. It involves mirroring data across two sets of drives and then striping the mirrored sets for increased performance and fault tolerance. RAID 10 provides high levels of data redundancy and performance but requires a minimum of four drives.

Question Image

Give a reason why microwaves are commonly used for point-to-point communication

  • their small wavelength allows conveniently sized antennas to direct them in narrow beams, which can be pointed directly at the receiving antenna
Question Image

Explain why a developer, who is good at both low-level and high-level programming, would normally use high-level languages when writing programs.

  • High-level languages have built-in functions;
  • High-level languages have built-in libraries;
  • High-level languages have more support/help;
  • High-level languages have structures (such as selection and iteration);
  • High-level languages can be less machine-dependent/more portable;
  • It (usually) requires fewer lines of code to be written;
  • It is (usually) quicker to develop code in high-level languages;
  • It is easier to find mistakes in code;
  • The code is easier to maintain//understand;
  • It is easier to structure code in high-level languages;
Question Image

State the types of storage devices used in a computer

  1. Primary Storage (Memory):

    • Random Access Memory (RAM): This is a volatile memory used to store data and instructions that the CPU (Central Processing Unit) can access quickly. RAM is essential for running applications and the operating system. However, its contents are lost when the computer is powered off.
    • Read-Only Memory (ROM): ROM is a non-volatile memory that stores essential firmware and instructions necessary for the computer's boot-up process. It retains its contents even when the power is turned off.
    • Cache Memory: Cache is a small and fast memory located closer to the CPU. It stores frequently accessed data to speed up the processing.
  2. Secondary Storage (Mass Storage):

    • Hard Disk Drive (HDD): HDDs use magnetic storage to store data on rotating platters. They provide relatively large storage capacities and are commonly used in computers and laptops for long-term data storage.
    • Solid-State Drive (SSD): SSDs use NAND flash memory to store data, offering faster read and write speeds than HDDs. They are more durable and consume less power, making them increasingly popular in modern computers.
    • Optical Discs: CDs, DVDs, and Blu-ray discs are examples of optical storage media. They are mainly used for distribution of software, music, movies, and archival purposes.
    • USB Flash Drives: Also known as thumb drives or pen drives, these portable storage devices use flash memory to store data and can be easily connected to a computer's USB port.
    • Memory Cards: Memory cards, such as SD cards and microSD cards, are used in various devices like cameras, smartphones, and tablets to store data, photos, videos, etc.
    • External Hard Drives: These are HDDs or SSDs contained within an external enclosure, allowing users to expand their computer's storage capacity or create backups.
Question Image

Briefly describe three types of database models

  • Hierarchical model  - Records in the database can be related to one parent only but can have more children records
  • Network database model - a child record can be linked to  multiple parent records
  • Relational database model - organizes data into tables that can be linked or related based on data common to each.
Question Image

Convert the following:

(a) the binary number \(1111 1100_2\) to hexadecimal.

(b) the denary number \(138_{10}\) to hexadecimal.

(c) the hexadecimal number \(5D_{16}\) to denary.


(a) \(F C_{16}\)

(b) \(8 A_{16}\)

(c) \(93_{10}\)

Question Image

State two computer-based careers  that have arisen as a result of  computer-based data processing in a factory    (2 marks)

System analyst

Web designers

Network administrators

Database administrators

Programmers

Computer technicians

Question Image

State the functions of the following utility programs

(a) Defragmentation software

(b) Disk contents analysis/repair software

(c) Disk formatter

(a) Defragmentation software   -   Reorganises files on a disk to improve efficiency

(b) Disk contents analysis/repair software - Scans a hard disk to identify bad sectors

(c) Disk formatter -  Prepares a hard disk for first use

Question Image

Distinguish between operating system software and an application software

  • OS controls operation of system/hardware
  • Applications software allows the system to do something useful
Question Image

Define the following terms as used in the internet

HTTPS/HTTP: this is a protocol that is used to send data to web pages across the Internet

Uniform Resource Locator (URL):   a text-based version of a web address

Internet Service provider /ISP  - his is the company that provides a user with a connection to the Internet

browser - Software/application that allows users to view web pages / render HTML -

cookie - a text file (stored by a web browser) that contains data about a user’s browsing habits/details/preferences

Question Image

Explain the function of the protect sheet feature in the spreadsheet program

  • It is a feature used to prevent unwanted changes to be made on the data contained in a sheet by limiting the ability to make changes
Question Image

Explain one reason why a computer needs to be connected to a stable power source

System Stability: Computers require a consistent and stable power supply to function properly. Fluctuations or interruptions in the power source can cause various issues that can disrupt the computer's operation or lead to hardware damage.

a. Data Loss: Sudden power outages or voltage fluctuations can cause the computer to shut down abruptly, resulting in data loss if unsaved work is not properly stored. This can be particularly problematic when working on critical tasks or handling important files.

b. Hardware Damage: Power surges or inconsistent power supply can damage the computer's internal components, including the motherboard, CPU, memory, and storage devices. These damages can result in system instability, reduced performance, or even complete hardware failure.

c. Operating System Corruption: Abrupt power loss or inconsistent power supply can corrupt the operating system files, leading to system crashes, error messages, and instability. This may require system repairs or reinstallation of the operating system.

d. Component Lifespan: Inconsistent power supply can put unnecessary stress on computer components, shortening their lifespan. Frequent power fluctuations or surges can cause wear and tear on various parts, reducing their efficiency and overall longevity.

Question Image

Using an example, explain a difference between a primary key and a foreign key in a relational database.

A primary key is a table field that uniquely identifies each record and ensures that duplicate entries are not allowed

A foreign key is primary key of a parent table placed in a child table to ensure that any record added to a child table is related to the one in parent table.


A foreign key is a field (or a set of fields) in one table that refers to the primary key of another table. It is used to establish and enforce a link between the data in the two tables, ensuring referential integrity.

Question Image

State ways in which an OS secures a computer system

  • Access Controls: Authentication of users in order to access files
  • Performing regular patches of updates
  • creating secure accounts with required privileges
  • scrutinizes all incoming and outgoing packets of data through a firewall
  • encryption of data, during transmission
  • Log files to detect any breach
Question Image

At which stage of the system development life cycle does the changeover to a new system take place?

  • Implementation
Question Image

Mikal has been employed as a computer trainer in an organisation. State three roles that she is likely to play in the organisation

  • Developing training materials
  • Training computer users
  • Conducting ICT examinations
  • Managing the learning and examination process
  • Developing guidelines for using the computer lab
  • Planning the course content
  •  
Question Image