admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

State the primary function of the Dynamic Host Configuration Protocol (DHCP) protocol.

  • it generates and/or allocates an IP address

Confidential information about the students is to be stored on the computer system. Explain the measures that can be taken to ensure that such information remains confidential.

- Passwords
- Hierarchy
- Only allow some staff to access student files
- Only some machines able to access
- Physical location of these machines
- Physical lock on machines
- Encrypted data in files
- Firewall if connected to the Internet

Interfaces enable computer users to interact with the operating system.

(a) State four advantages for using a graphical user interface in loading programs and files

(b) A vehicle assembly company has introduced robots to replace the human workforce.  State two effects this would have on the workforce

State four advantages for using a graphical user interface in loading programs and files

  • User friendly
  • No need to know command language as commands are executed by clicking on icons
  • Allows multitasking as several programs open at the same time therefore easier to switch between applications
  • Selecting an item using a mouse is easier and faster than entering commands

Or any other correct response

Advantage @ 1 Mark

Total = 4 X 1 Mark

= 4 Marks

 

A vehicle assembly company has introduced robots to replace the human workforce.  State two effects this would have on the workforce                

  • Unemployment
  • Need to retrain
  • No longer need to do hazardous or tedious jobs
  • Employment of skilled staff who will manipulate the robots

Or any other correct response

Effect @ 1 Mark

Total = 2 X 1 Mark

= 2 Marks

Distinguish between microwave and a radiowave transmission and a microwave transmission  (KCSE 2017 PP1)

Microwaves can cover shorter distances. On the contrary, radio waves can travel a long distance. Radio wave is usually propagated through sky mode while microwave uses the line of sight propagation. 

Differentiate between Physical and logical topologies

  • Physical topology deals with the placement of nodes
  • Logical topology deals with the data flow  in the network

COMPUTER STUDIES 2016 PAPER 1

  1. Identify any computer output device suitable for each of the following tasks:
  1. Generating receipts where carbon copies are required  (1mk)
  • Impact printers e.g dot matrix

     b) an architectural drawing where precision is required         (1mk)

  • Plotter

(c ) producing document output for a visually impaired person (1mk)

  • Braille/speakers
  1. Pesa Tele has offices in Nairobi and Kampala connected in a network . the management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem (3mks)
  • Encryption
  • Firewall
  • Audit trail/tracking
  • Use of passwords
  • Limit the number of log-in attempts
  1. Explain two ways in which the use of internet could make reporting of corruption easier (4mks)
  • Interactive: the internet based technology enables real-time dialogue hence instantaneous reporting of cases
  • Outreach: the technology allows the coverage of wide areas
  • Social mobilization : it easy to create a network of people with similar concerns
  • Anonymity : it is easier to report corruption without being  known
  • Security: the message sent reaches destination without being intruded
  1. State ways in which software errors can be prevent during program development
  • Use of antivirus software
  • Performing system update frequently
  • Testing the software before implementation
  • Proper training

What is a computer keyboard?

A computer keyboard is an input device used to enter text, characters, and various commands into a computer or other digital devices.

Explain a reason necessitating  governments to enact data protection laws

  • To provide legal backing so that it is possible to seek redress if the rights are violated
  • To observe copyright for those who create original works
  • To protect the confidentiality of information kept  about an individual