State THREE reasons why binary is used in developing digital electronic systems (3marks)
The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set.
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space
Describe three other different categories of malware.
Trojan (horse); a program which misleads the user into thinking it is another
piece of software which, when run, executes another program;
Spyware; a program which records data such as usernames and passwords on
a host system and forwards the information to a third party;
Adware; code embedded or attached to program files which will persistently
show adverts (that attempt to generate revenue);
Worm; code which will run autonomously and replicates itself on a host system;
Ransomware; a program that encrypts user’s data to make it unreadable until
they pay for the key;
Remote Access Tool (RAT); allows access to control and monitor a computer
from a remote network location;
Rootkit; malware that has managed to gain ‘root’ admin privileges;
Bots/Zombies; a program installed on a computer that performs a job for the
remote owner of the bot/zombie such as sending spam or sending web requests
to perform a DOS or attacking a computer system;
Scareware; malware that tells you something is wrong with your system in an
attempt to get you to make a purchase;
Keylogger; a program that monitors/records a user’s keystrokes in order to steal
passwords/confidential details;
The Acme company stores data for a private scientific research group. It has recently upgraded its storage capacity and needs to dispose of its existing hard drives securely. Outline two methods for the secure disposal of the data on the hard drives.
Acme company needs to ensure that if they are reselling the drives they wipe the drive (this should be done regardless of the destruction of the drive) to the DoD standard.
This would ensure that any software cannot be used to locate files.
Give three examples of how data can be damaged accidentally
Describe the query criteria given below
(a) Like "*kenya*"
(b) Like "*ina"
(c) Like U*
(d) Not Like U*
(e) >= "Mexico"
(f) Like "[A-D]*"
(g) "USA" Or "UK"
Differentiate between action query and select query
An action query is used to modify, add, or delete data in a database whereas a select query is used to retrieve data from a database based on specified criteria but does not make any changes to the data.
State two advantages of electronic databases over a flat file
Data integrity in a database can be divided into three categories: referential integrity, domain integrity and entity integrity.
(a)Outline the meaning of each of the following.
(i) Referential integrity
(ii) Entity integrity
(b) Describe how data integrity can improve the process of database management. (2 marks)
(i) Referential integrity
(ii) Entity integrity
(b) Describe how data integrity can improve the process of database management. (2 marks)
What is entity integrity?
What is a referential integrity constraint?
Define Domain integrity
Domain integrity - ensures that all data in a field contain valid values
What is a primary key?
State three ways of transforming a picture embedded in a DTP program in order to fit on a designated space on a document (kcse 2019 paper 1)
Explain a situation when each of the following Desktop Publishing programs features may be used when creating a document
(i) Crop - used when handling a graphic and there is a need to remove some of the portions in the graphic
(ii)Transparency - used when there is a need to make background of a graphic visible