State and explain four network communication devices
(iii) John von Neumann proposed the concept of a stored program.
State the two items he proposed to store in main memory.
Data
Instructions
State two functions of utility software
Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access
(The parent can) set criteria for the websites she is allowed to visit such as a whitelist/blacklist of websites. The firewall will examine the data/traffic incoming and outgoing from her computer. If data is sent from a website that is not allowed, it will be blocked
What is an information system ? (KCSE 2012))
Is an arrangement of people, data, processes, communication and IT that interact to support problem solving
Components of an information system
Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.
State the contents of a feasibility study report
What is entity integrity?
State the functions of the following features in word processors
Satellite services are used to provide broadband internet connectivity to regional and remote areas of Kenya. State one advantage and one disadvantage of using satellites for this purpose.
Advantages
Disadvantages
State the symptoms of a computer virus
Slow Performance: If your computer suddenly becomes significantly slower than usual, taking longer to boot up, open applications, or respond to commands, it could be a sign of a virus. Viruses can consume system resources, resulting in decreased performance.
Frequent Crashes: If your computer frequently crashes, freezes, or experiences sudden system reboots without any apparent reason, it could be due to a virus. Some viruses can interfere with system stability, leading to unexpected crashes or instability.
Unusual Pop-ups or Ads: If you start noticing an excessive number of pop-ups, advertisements, or banners appearing on your computer screen, especially when you're not browsing the internet, it might be an indication of adware or malware infection.
Unwanted Modifications: Viruses can modify system settings or configurations without your consent. If you observe changes in your default browser homepage, new toolbars appearing, unfamiliar icons on the desktop, or altered settings, it could be a sign of a virus.
Unusual Network Activity: If you notice excessive network traffic, unusual data transfers, or a sudden increase in data usage without any known reason, it could be an indication of a virus or malware actively communicating with external servers.
Missing or Modified Files: Viruses can delete, encrypt, or modify files on your computer. If you find missing files or encounter unexpected changes in file sizes, names, or extensions, it could be a result of a virus infection.
Disabled Security Software: Some viruses attempt to disable or circumvent antivirus or security software to avoid detection. If you notice that your antivirus program or firewall is deactivated, modified, or unable to update, it could be due to a virus compromising your security software.
Unexpected Email or Message Activity: Viruses can use infected computers to send spam emails or messages to contacts in your address book without your knowledge. If your friends or colleagues report receiving suspicious or unexpected emails or messages from you, it could be a sign of a virus.
Suggest two advantages of using robots, instead of humans, to build cars in the factory.
Explain the difference between how the IMAP (Internet message access protocol) and SMTP (simple mail transfer protocol) protocols are used
IMAP
SMTP:
When an image is inserted in a DTP document is selected, handles on its placeholders appear. State three uses of these handles
Describe the role of a repeater when used in a network.
a repeater will amplify a signal and resend it to overcome reduction in signal strength (attenuation) because over a distance network signals diminish in size/amplitude (are attenuated) due to characteristics of the media.
(ii) State what ROM and RAM store.
ROM stores BIOS / bootstrap / start-up
RAM stores currently executing programs and data
Differentiate between bus topology and star topology of networks. What are the advantages and disadvantages of star topology over bus topology
Advantages of Star topology over Bus topology
Disadvantages of Star topology over Bus topology
Explain a situation when each of the following Desktop Publishing programs features may be used when creating a document
(i) Crop - used when handling a graphic and there is a need to remove some of the portions in the graphic
(ii)Transparency - used when there is a need to make background of a graphic visible
Describe how the CPU and main memory work together.
Data and instructions are fetched from main memory, from addresses requested by the CPU on the address bus. (Data and instructions are sent) using the data bus. (Data and instructions are then) decoded and executed in the CPU.
Results of operations are sent back to the memory on the data bus
Name three of the stages in the system life cycle
– fact finding
– feasibility study
– analysis
– design
– testing
– documentation
– implementation/changeover/installation
– evaluation
– maintenance