State ways in which a network manager can use to ensure that the network is secure
Give four features of a Data Protection Act
Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms.
Virus
Pharming -
Phishing
The data before encryption is known as .................................................. text.
To scramble the data, an encryption .................................................., which is a type
of .................................................., is used.
The data after encryption is known as .................................................. text.
Encryption prevents the data from being .................................................. by a hacker
The data before encryption is known as .......plain.................. text.
To scramble the data, an encryption ......................key.........................., which is a type
of ...................key............................, is used.
The data after encryption is known as ....................cipher............................. text.
Encryption prevents the data from being ......................understood...................... by a hacker
Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access
(The parent can) set criteria for the websites she is allowed to visit such as a whitelist/blacklist of websites. The firewall will examine the data/traffic incoming and outgoing from her computer. If data is sent from a website that is not allowed, it will be blocked
Explain one drawback to a user if the program is distributed as freeware
The user is not allowed to access the source code so, they cannot tailor the software to their needs and they cannot fix any bugs in it
The software is still covered by copyright
The user must get the owner’s permission to do anything beyond using it
What is audit trail?
A record showing who has accessed a computer system and what operations he or she has performed during a given period of time
Explain the function of the protect sheet feature in the spreadsheet program
State the formatting features used in Ms Excel
Font Formatting: Cell Formatting:
State four data types used in MS Excel
State any four applications of electronic spreadsheets
Distinguish between a formula and a function as used in spreadsheets
Explain the purpose of each of the following features of a spreadsheet chart (KCSE 2021, Q19 (a))
A data series
Data Marker
Legend
A data series
Data Marker
What is an information system ? (KCSE 2012))
Is an arrangement of people, data, processes, communication and IT that interact to support problem solving
Components of an information system
A school opted to use direct changeover approach when installing a new system. Explain three challenges that the school may face as a result of this approach (KCSE 2019)
Explain why the organization's management and the analyst need to work together to define the problem accurately during system development
A company has decided to use a computer for stock control. Describe the process of systems development from the time the decision was made to proceed with computerisation until final testing.
specify output requirements
design documents/screen displays
data for input/storage
form design
storage devices
file structures/access/design
data security/back up files
systems flowchart etc.
implementation i.e. pilot/intermediate/parallel running
testing strategy
training
hardware/software
programming/algorithms
validation
user manual
technical documentation
entering data into system
State the reasons for system review and maintenance
What situations are likely to call for the use of Direct Changed Over?
State a stage in system development where each of the following activities are carried out (KCSE 2018)
(a) Identifying technologies that may be used in a proposed system
(b) Identifying the shortcomings of the old system
(c) Prepares the software migration plan