admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Explain why a software developer should be responsible for addressing ergonomic issues in software design.

Responsibilities of the software developer is to ensure that the ergonomics focuses on making software user-friendly, reduces repetitive motions or eyestrain and enables movements of users to promote comfort and efficiency.

Software can be designed with adjustable text sizes and screen brightness settings to prevent eye strain, offering users a way to customise their visual experience for better comfort during prolonged use.

Question Image

State three advantages of  biometric authentication

  • Protection against Password-related Vulnerabilities: Traditional password-based authentication methods are vulnerable to various risks, such as weak passwords, password sharing, or password theft.
  • Stronger Access Control: Biometric readers add an additional layer of access control to laptops. Even if someone gains physical possession of the laptop, they would still need the authorized user's biometric data to unlock it and access the data. This helps prevent unauthorized individuals from accessing sensitive information stored on the laptop,
  • Audit Trail and Accountability: Biometric authentication systems often come with built-in logging and auditing capabilities. This means that each time someone accesses the laptop using their biometric data, it can be recorded and associated with a specific user. This creates an audit trail, allowing organizations to track and monitor access to laptops and establish accountability in case of any security incidents or breaches.
Question Image

Distinguish between transcription and transposition types of errors and give an example of each  (4mks)

Transcription Errors: Transcription errors involve the incorrect entry of data due to mistakes made during the copying or typing process. These errors can occur when transferring information from one source to another.

Transposition Errors: Transposition errors specifically refer to errors where the order of characters or digits is accidentally reversed or swapped. This can happen during manual data entry or when processing information.

Question Image

What is utility software?

  • System software that analyses, configures, optimises and maintains a computer system
Question Image

Distinguish between an optical scanner and a magnetic ink scanner

  • Optical scanner is used read data by use a beam of light while a magnetic ink scanner is used to read data encoded/written using magnetic ink by magnetising the ink characters and translating them
Question Image

State two advantages of electronic databases over a flat file

  • Data Integrity: they provide ways or mechanisms for enforcing data integrity constraints, such as referential integrity. If a record in the parent table is deleted, related records in the child table also get deleted. This ensures accurthe acy and consistency of data stored in the database
  • Data Security
  • Concurrency control
  • Reduces data redundancy
  • Data retrieval and querying
  • Data indexing
  • Data consistency and acid transaction
  • Data backup and recovery
  • Data sharing and collaboration
  • Convenient data maintenance
Question Image

State and explain characteristics of an algorithm

Input : An algorithm can take 0 or more inputs well defined outputs

Finiteness: an algorithm must terminate in finite time and after finite number of steps. 

Definiteness : an algorithm must be clear and unambiguous. Each and every step of an algorithm must be clear and precise and it must have only one meaning

Feasibility: should be feasible with the available resources

 

Output : must produce at least one well defined output

Independent : should have a step-by-step directions which is independent of any programming language

Correctness: should solve the problem it is designed to solve

Efficiency: must take the shortest time possible to run and should require the least memory space. It should use a minimum number of computation steps and memory to produce the desired  output. takes little time and memory to run

Generality: should not be limited to a specific case. It should work for all the valid inputs. works for many possible inputs

Effectiveness : should statements that are relevant to the problem. Every step must be basic and essential. 

 

Question Image

A family has purchased a computer system with the following specification:

Processor speed 2200 MHz
RAM 512 Megabyte
Hard disk drive 120 Gigabytes
CD ROM
DVD writer
Modem 56k
Monitor 17"

(a) The computer has been purchased for buying goods and services over the Internet. Explain how each of these items of hardware would be used for this purpose.

Hard disk drive

RAM

DVD writer
Modem

Hard disk drive

  • to hold the operating system/communication and applications software/ISP software
  • for storing files/information/cookies on backing store

RAM

  • for data, computer programs and operating instructions which are moved into it/downloaded for data currently in use

DVD writer

  • Films/videos/pictures/music/multimedia data downloaded/purchased

Modem

  • link/dial up/establish communication with the Internet
  • Convert digital signals to analogue/audio tones (and vice versa) Which can travel across the telephone system
Question Image

 Describe four features of the operating system when providing a graphical user interface on a personal computer. Give a suitable example of each feature.

Windows for example a word processing application and a spreadsheet
 
Menus, for example, allow the user to perform operations or run applications such as right-click to create a new folder  
 
Icons for example a picture of linked computers for networking
 
Pointers(mouse or touchscreen)  for example to select items/trigger events  
 
Shortcuts for example to frequently used applications for example having a shortcut to your mail client on your desktop
 
File navigation for example when searching the hard disc for a file/folder using a browser
 
copying / deleting / moving/sorting/naming/searching of files or folders for example copying of a file from the hard drive to a USB pen drive (File handling)
 
Desktop customisation for example changing the colours and background image
 
Copy and paste for example between applications e.g. copying a graph from a spreadsheet to a word processor
 
Error messages for example provide users with error/warning/help messages for example ‘printer out of paper’ 

Question Image

 State two components of the CPU

Any two from:

  • Registers
  • Clock
  • CU
  • ALU
Question Image

Ahmed sees the message “Set your browser to accept cookies”.
Explain why some websites make this request.

  • to enable logon information to be kept on his computer
  • to provide pages customised for Ahmed the next time he logs on
  • to implement shopping carts and one-click purchasing
  • to be able to distinguish between new and repeat visitors to the website
Question Image

Identify and describe four roles of the operating system when managing the resources of a personal computer.

Manages memory (RAM)

  •  Allocates memory to programs currently executing 

Ensures programs/data do not corrupt each other

  • Ensures all programs and data including itself is stored in correct memory locations

Manages processes

  • Ensures different processes can utilise the CPU and do not interfere with each other or crash  

Allows the user to run programs 

  • On a multitasking operating system, it ensures that all tasks appear to run simultaneously 

Other roles

  • Allocates time slices
  • Scheduling of programs
  • Handles interrupts
  • Allows the user to configure hardware
Question Image

Defining  blocking of text as used in  word processing

  • Refers to selecting a group of text eg word, sentence or even a paragraph in order to work with it as a whole
Question Image

Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access

(The parent can) set criteria for the websites she is allowed to visit such as a whitelist/blacklist of websites. The firewall will examine the data/traffic incoming and outgoing from her computer. If data is sent from a website that is not allowed, it will be blocked

Question Image

Identify two advantages to a programmer of using a high-level language instead of a low-level language.

  • it is easier / quicker to read/write/understand
  • it is easier / quicker to debug
  • code is portable.

 

Question Image

Ochieng manages a network for an organisation.
(a) Two computers are assigned the same IP address.
Explain why Ochieng must change the IP address of one of the computers.

  • Devices must have a unique IP address because otherwise, a switch would not know which of the two was the correct device to send packets to

(b) Identify the network topology that requires a server.

  • Star topology

Ochieng manages a network for an organisation.
(a) Two computers are assigned the same IP address.
Explain why Ochieng must change the IP address of one of the computers.

  • Devices must have a unique IP address because otherwise, a switch would not know which of the two was the correct device to send packets to

(b) Identify the network topology that requires a server.

  • Star topology
Question Image

Which files are backed up in an incremental backup scheme?

  • Any new or changed files since the last backup
Question Image

KCSE 2021 Computer Studies Paper Prediction 1                SECTION B

Answer question 16 and any other three questions from this section in the spaces provided.

16. a) With the aid of a flow chart, describe a loop control structure as used in programming. [4]  

A control structure that allows statement(s) to be repeatedly executed until a certain condition is met                                                                                                      2mks

NB. Accept any other looping construct

Question Image

Peter has installed internet on his home computer in order to use it for browsing. State three ways in which he would prevent viruses from infecting his computer.                                                        (3 marks)

  • Installing the latest versions of antivirus software
  • Avoiding downloads from untrusted sites
  • Scanning removable storage media for viruses before use
  • Scanning attachments for viruses before opening or downloading
Question Image

List three other types of software license.

  • Network
  • Commercial
  • Enterprise
  • Proprietary
Question Image