Give a reason why HMTL is not regarded as a programming language
Interfaces enable computer users to interact with the operating system.
(a) State four advantages for using a graphical user interface in loading programs and files
(b) A vehicle assembly company has introduced robots to replace the human workforce. State two effects this would have on the workforce
State four advantages for using a graphical user interface in loading programs and files
Or any other correct response
Advantage @ 1 Mark
Total = 4 X 1 Mark
= 4 Marks
A vehicle assembly company has introduced robots to replace the human workforce. State two effects this would have on the workforce
Or any other correct response
Effect @ 1 Mark
Total = 2 X 1 Mark
= 2 Marks
Jane has noticed the following problems with her computer (2mks)
State three possible causes of these problems and how they can be solved (3mks)
There could be several possible causes for the issues Jane is experiencing with her computer keyboard, including:
1. Software Issues
- Cause: Outdated or corrupt system files, drivers, or operating system.
- Solution:
- Ensure the operating system and drivers are up-to-date.
- Run a system file checker to repair any corrupted system files (e.g., on Windows, run "sfc /scannow" from the Command Prompt).
- Consider reinstalling the operating system if issues persist.
2. Hardware Issues:
- Cause: Physical damage or malfunction in the keyboard hardware.
- Solution:
- Check for physical damage or debris under the keys and clean the keyboard if necessary.
- If cleaning doesn't help, consider replacing the keyboard with a new one.
3. Resource Overload:
- Cause: The computer may be running too many background processes or lacking sufficient hardware resources.
- Solution:
- Close unnecessary background applications and processes to free up system resources.
- Consider upgrading the computer's RAM, CPU, or storage if it's outdated and unable to handle current software demands.
- Use task manager or activity monitor to identify and terminate resource-intensive processes.
4. Malware or Viruses:
- Cause: Malicious software can slow down a computer, cause hanging, and delay startup.
- Solution:
- Perform a full system scan using reputable antivirus or anti-malware software to remove any threats.
- Ensure that the operating system's security patches are up-to-date.
5. Disk Fragmentation:
- Cause: Fragmented files can slow down the loading of applications and overall system performance.
- Solution:
- Run a disk defragmentation tool (e.g., Windows' built-in tool) to optimize file storage on the hard drive.
- Consider upgrading to a solid-state drive (SSD) for faster application loading times.
6. Insufficient Storage:
- Cause: If the hard drive is nearly full, it can cause slow performance.
- Solution:
- Free up space by deleting unnecessary files and programs.
- Consider upgrading to a larger capacity hard drive or SSD if storage space remains an issue.
7. Background Processes and Startup Items:
- Cause: Too many unnecessary programs running in the background or starting up with the computer.
- Solution:
- Disable or remove unnecessary startup items and background processes to improve startup time.
- Use the Task Manager or System Preferences (on macOS) to manage startup items.
It's important to diagnose the specific cause of the issues Jane is facing by troubleshooting each potential problem one by one. In some cases, a combination of these solutions may be necessary to fully resolve the problems with her computer keyboard.
State the advantages and disadvantages of the command-line interface
Advantages
Disadvantages
Differentiate between active matrix and passive matrix LCDs
Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.
Blagging
Phishing
Shouldering
Describe each of the following types of a program errors, giving an example in each case.
(i) Syntax error.
(ii) Logic error.
(iii) Arithmetic error/runtime error
(i) Incorrect use of language, e.g. PLINT instead of PRINT
(ii) A mistake in the structure of the solution, e.g. a jump goes to the wrong line
(iii) Inappropriate arithmetic is used, e.g. division by 0 is attempted
KCSE 2003 COMPUTER STUDIES
SECTION A (40 MARKS)
Answer all the questions in this section
1.Computer systems are built from three types of physical components: processors,memories and 1/O devices.
a) State two tasks of a processor (2 mks)
b)State function of 1/O devices (1 mk)
2. Threats to the safety of computer systems take many forms such as: white-collar crime, natural disasters, vandalism and carelessness.Give on way as to how each of these forms of threats can be controlled. 2 mks)
3.a) Explain the term nibbles as used in data representation in computers
b)Perform the following binary arithmetic giving the answers in decimal notation. (3 mks)
i)1110.01111 + 11010001 .011
ii) 1001011.011 - 111.111
4 a) Distinguish between machine and assembly language (2mks)
b) State the type of translator necessary for a program written in: (2mks)
i) High level language
ii)Assembly language
5. Briefly explain the purpose of the following types of program documentation: (3mks)
a) User manual
b) Reference guide
c) Quick reference guide
6. State any two features of a user-friendly program. (2mks)
7 a) Distinguish between labels and formulae with respect to spreadsheets (2mks)
b) Consider the entries in the cells below.
|
Cell |
B2 |
B3 |
C10 |
C11 |
C13 |
|
Entry |
200 |
100 |
B2 |
B3 |
C10 |
State the value displayed in cell C13 (2 mks)
8.List three differences between wide area Networks (WAN) and Local Area Networks (LAN) (3mks)
9. Study the flowchart segment below and state the last value printed from the flowchart. (2 mks)
10. a) What is an expert system (1mk)
b)State any two components of an expert system (2mks)
11. give two reasons why optical disks are better storage media compared to floppy diskettes (2mks)
12.What are the Dos commands used for the following? (2mks)
a) Changing directories
b) Viewing directories
c) Renaming directories
d) Deleting a directory
13. Distinguish between copying and moving text (2mks)
14. a) Name two methods of paper orientation (1mk)
b)Name two keys used to delete text in a document (1 mk)
15.Name two features a Database package (2mks)
SECTION B (60 MKS)
Answer question and any other three questions from this section
16. Study the flowchart below and answer the questions that follow.
a)Write a high-level language program for the above flowchart (7mks)
b)List the outputs of the flowchart above (5 mks)
c) Modify the flowchart so that it adds up all its outputs and displays the sum obtained (3mks)
17. A computer specification has the following details:
a) What is meant by
i) 1.44 MB floppy disk drive?
ii)20 GB hard disk?
iii) 17” SVGA monitor
b) Which operating system might be pre-installed in this computer and why? (2mks)
c) List three multimedia components (3 mks)
d) i) what is meant by computer aided manufacture? (2 mks)
ii) Give two examples of computer aided design software. (2mks)
18. a)Give three examples of network software (3mks)
b)List any three items that may be referred to as data terminal equipment in a network (3 mks)
c)Briefly explain the following terms as used in networking (4mks)
i) Remote communication
ii)Distributed processing
d) State three advantages and two disadvantages of mesh network topology. (5mks)
19. a) a company has decided to computerize their operations. They have decided to purchase package instead of developing their own programs. Give three advantages and two disadvantages of this approach. 5mks)
b) i) explain why a value such as 611233444555 may be displayed as ######### When typed in a cell of a spreadsheet (2mks)
ii) How can the problem in b (i) above be corrected? (2mks)
c) With reasons, briefly describe the most appropriate type of printer output device for the output of: (6mks)
i) Customer invoices on multi-part stationery
ii) Letters to customers
iii)Detailed engineering designs
20. a) Distinguish between the following pair of terms (6mks)
i) Data verification and data validation
ii)Data encryption and passwords
List Three file organisation methods in a computer
Define the following
(a) Cookies
(b) Spyware
(c) Phishing
(d)Spam
(e) Pharming
(a) Cookies
(b) Spyware
(c) Phishing
(d)Spam
(e) Pharming
Explain why a developer, who is good at both low-level and high-level programming, would normally use high-level languages when writing programs.
Explain the function of the protect sheet feature in the spreadsheet program
State Examples of utility programs
Encryption software
Defragmentation s/w
(Data) compression s/w
Anti-virus / anti-malware s/w
Disk analysis and repair s/w
Auto-update
Firewall
...over a network/external source
Ochieng manages a network for an organisation.
(a) Two computers are assigned the same IP address.
Explain why Ochieng must change the IP address of one of the computers.
(b) Identify the network topology that requires a server.
Ochieng manages a network for an organisation.
(a) Two computers are assigned the same IP address.
Explain why Ochieng must change the IP address of one of the computers.
(b) Identify the network topology that requires a server.
(b) The computer needs an operating system and utility software.
(i) The operating system controls the scheduling of processes.
Describe how the operating system uses scheduling to allocate processor time.
A computer game involves driving a racing car around a track. State which two modes of data processing would be appropriate, justifying your answers
A protocol is used to securely transmit the data for the website to the browser.
(i) State the name of this protocol.
(ii) Identify how this protocol changes the data to transmit the data securely.
(i) State the name of this protocol. HTTPS
(ii) Identify how this protocol changes the data to transmit the data securely.
The following are software classified according to the end user licence agreement. Briefly describe each of them:
open source software, freeware, shareware, and proprietary software
Open source : refers to software provided freely with its source code. The user can modify and redistribute the software.
Freeware: these are software that can be downloaded for free and distributed, buta the source code is hidden and cannot be altered.
Shareware: is software that is available for free within a given trial period, after which it must be bought.
Proprietary: software made for commercial purposes. The source code is hidden, and it can only be used after paying for a licence.
Distinguish between one to one and one to many relationships as used in relational databases
One to one - Each record in the parent table has exactly one related record in the child table, and vice versa.
One to Many - Each record in the parent table can have multiple related records in the child table, but each record in the child table is related to only one record in the parent table
Identify one component common to all computers.