admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

State ways in which a network manager can use to ensure that the network is secure

  • Encrypt network traffic
  • Use of Firewall(s)
  •  Anti-virus software
  • Password protect the database

Give four features of a Data Protection Act

  • data must be up to date
  •  data can only be read/used for the purpose for which it was collected
  • data must be adequate, relevant and not excessive
  • data must be accurate
  • data must be destroyed when no longer needed/don’t keep longer than necessary
  • data user must register what data stored
  • data must be used/collected fairly and lawfully
  • data must be held securely
  • data must be protected from accidental damage
  • only authorised personnel can have access to the data
  • fines are imposed for data mis-use
  • data should not be passed on to a third party without permission
  • a person can view data and have it changed/removed if incorrect

Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms.

Virus

  • - program/software that replicates/copies itself
  • – can delete or alter files/data stored on a computer
  •  – can make the computer “crash”/run slow

Pharming -

  • malicious code/software installed on a user’s hard drive/actual webserver
  •  – this code redirects user to a fake website (without their knowledge)
  •  – to obtain personal/financial information/data

Phishing

  • - legitimate-looking emails sent to a user
  • – as soon as the recipient opens/clicks on the link in the email/attachment …
  • – … the user is directed to a fake website (without their knowledge)
  • – To obtain personal/financial information/data

The data before encryption is known as .................................................. text.
To scramble the data, an encryption .................................................., which is a type
of .................................................., is used.
The data after encryption is known as .................................................. text.
Encryption prevents the data from being .................................................. by a hacker

The data before encryption is known as .......plain.................. text.
To scramble the data, an encryption ......................key.........................., which is a type
of ...................key............................, is used.
The data after encryption is known as ....................cipher............................. text.
Encryption prevents the data from being ......................understood...................... by a hacker

Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access

(The parent can) set criteria for the websites she is allowed to visit such as a whitelist/blacklist of websites. The firewall will examine the data/traffic incoming and outgoing from her computer. If data is sent from a website that is not allowed, it will be blocked

Explain one drawback to a user if the program is distributed as freeware

The user is not allowed to access the source code so, they cannot tailor the software to their needs and  they cannot fix any bugs in it

The software is still covered by copyright

The user must get the owner’s permission to do anything beyond using it

What is audit trail?

A record showing who has accessed a computer system and what operations he or she has performed during a given period of time

Explain the function of the protect sheet feature in the spreadsheet program

  • It is a feature used to prevent unwanted changes to be made on the data contained in a sheet by limiting the ability to make changes

State the formatting features used in Ms Excel

  • Font Formatting:

    • Font Style: You can change the font style (e.g., Arial, Times New Roman) for cell content.
    • Font Size: Adjust the size of the text within cells.
    • Bold, Italic, and Underline: Apply these formatting options to emphasize text.
    • Font Color: Change the color of the text.
  • Cell Formatting:

    • Number Formats: Apply various number formats, such as currency, percentage, date, and time.
    • Cell Borders: Add or remove borders around cells or cell ranges.
    • Fill Color: Change the background color of cells.
    • Text Alignment: Control how text is aligned within cells (left, right, center, top, bottom).
    • Text Wrapping: Allow text to wrap within a cell if it's too long to fit in one line.

State four data types used in MS Excel

  • Labels
  • Values
  • Formula
  • Functions

State any four applications of electronic spreadsheets

  • Financial accounting
  • Prediction and forecasting
  • Inventory keeping
  • Budgeting
  • Keeping records

Distinguish between a formula and a function as used in spreadsheets

  • A formula is a mathematical expression that returns a value
  • A function is an excel inbuilt formula that returns a value given a range of values or arguments

Explain the purpose of each of the following features of a spreadsheet chart (KCSE 2021, Q19 (a))

  • Legend
  • A data series

  • Data Marker

Legend

  • Legends are a small visual representation of the chart's data series to understand each without confusion.

A data series

  • is a row or column of numbers that are entered in a worksheet and plotted in your chart, such as a list of quarterly business profits
  • A group of related data points or markers that are plotted in charts and graphs

Data Marker

  • A symbol on the chart that represents a single value in the worksheet.
  • A column, dot, pie slice, or another symbol in the chart that represents a data value

What is an information system ?  (KCSE 2012))

Is an arrangement of people, data, processes, communication and IT that interact to support problem solving

 

Components of an information system

  • Hardware
  • Software
  • Data - information manipulated by software
  • people- all people involved
  • Processes - steps to accomplish a goal

A school opted to use direct changeover approach when installing a new system. Explain three challenges that the school may face as a result of this approach (KCSE 2019)

  • The users may not have gained enough confidence to run the new system
  • It may be very inconveniencing in case the new system fails or faces problems
  • The weaknesses of the old system may not be corrected or may still be transferred to the new system

Explain why the organization's management and the analyst need to work together to define the problem accurately during system development

  • College authorities are the experts in the problem
  • A system Analyst is an expert with computers
  • The two need to pool resources to come up with a clear definition
  • Agree on the outcomes so that when the system is , there are a set of criteria to judge it by

A company has decided to use a computer for stock control. Describe the process of systems development from the time the decision was made to proceed with computerisation until final testing.

specify output requirements
design documents/screen displays
data for input/storage
form design
storage devices
file structures/access/design
data security/back up files
systems flowchart etc.
implementation i.e. pilot/intermediate/parallel running
testing strategy
training
hardware/software
programming/algorithms
validation
user manual
technical documentation
entering data into system

State the reasons for system review and maintenance

  • user changes his mind
  • new government legalisation/company policy company changes
  • changes in hardware
  • changes in software/upgrades/new versions
  • improved operating efficiency/ease of use

What situations are likely to call for the use of Direct Changed Over?

  • where the new system is completely different from the old one
  • if there has been extensive testing of the system and the system analyst has confidence in its functionality
  • If the system is not critical

State a stage in system development where each of the following activities are carried out    (KCSE 2018)

(a) Identifying technologies that may be used in a proposed system

  • System Analysis/Information gathering/Problem recognition

(b) Identifying the shortcomings of the old system

  • Problem definition

(c) Prepares the software migration plan

  • Implementation stage