KCSE 2014 COMPUTER STUDIES PAPER 1 QUESTIONS
- A computer student saved a document in My Documents; briefly describe how he would transfer this document to a new location named my ComputerA computer student saved a document in My Documents; briefly describe how he would transfer this document to a new location named my Computer Highlight the document when open/right click on the document Click the cut icon on the standard tool bar/ on the sidekick that appears. Get to my computer, right click it […]
- A programmer uses program design tools to design a program that can list the odd numbers between 0 and 100.A programmer uses program design tools to design a program that can list the odd numbers between 0 and 100. Write a pseudo code for this problem. Start Marks award Odd=1 * Start/ stop – 1 mk […]
- A school intends to purchase new software for exam analysis and financial management in the school accounts office. List TWO items that should accompany the softwareA school intends to purchase new software for exam analysis and financial management in the school accounts office. List TWO items that should accompany the software Documentation to provide the user with both technical and operational information about the software. Certificate of authenticity to avoid acquiring pirated copies which is an offence or may not […]
- A systems analyst has been asked by a doctor to computerize the records she keeps about her patients. He must first of all collect information about the existing system.A systems analyst has been asked by a doctor to computerize the records she keeps about her patients. He must first of all collect information about the existing system. Describe four methods he could use to collect this information. Observation Questionnaires Interviews Collecting documents/document review Virus-free.www.avast.com Post Views: 3 Related posts: Describe two methods used […]
- A systems analyst intends to study an existing system. State five reasons for this study.A systems analyst intends to study an existing system. State five reasons for this study. identify improvements that can be done identify weaknesses to be addressed to identify if there is need to change the existing system to study its effectiveness vis a vis performance so far. to study its cost verses new costs of […]
- Advantages of Windows Operating SystemsAdvantages of Windows Operating Systems. It is easy to open programs, find documents, and switch between programs. Windows provide facilities such as the Windows Explorer, which enable one to browse through & manage you files, folders, and drives easily. Windows can support long file names, making it easier to find and organize files. Windows […]
- After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated.After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated. to make sure user requirements have been met to identify any shortcomings to identify possible improvements Virus-free.www.avast.com Post Views: 2 Related posts: Describe two methods used to secure data in a database. Explain the meaning of the following […]
- An E-mail window is divided into folders. State the purpose of the following foldersAn E-mail window is divided into folders. State the purpose of the following folders Inbox This is where all incoming emails that you have received are stored. (1mk) Drafts contains emails that are being worked on and are not yet ready to be sent. (1mk) Post Views: 5 Related posts: List THREE causes of computer […]
- An organization is facing threats to data integrity. Explain three of how the threats can be minimized.An organization is facing threats to data integrity. Explain three of how the threats can be minimized. Backup data preferably on external storage media. Control access to data by enforcing security measures. Design user interface that minimize unauthorized access. Using error detection and correction software when transmitting data. Use devices that directly capture data from […]
- Below is an e-mail address,kerae@yahoo.com. Briefly explain what each component of the address meansBelow is an e-mail address kerae@yahoo.com. Briefly explain what each component of the address means kerae@yahoo.com kerae – username of the email recipient @ – a symbol for ‘at’ Gmail.com – name for the host computer on which the email a/c resides Virus-free.www.avast.com Post Views: 6 Related posts: Describe two methods used to secure […]
- COMPUTER STUDIES PAPER 1 REVISION KIT MODEL22042023 pdfCOMPUTER STUDIES PAPER 1 REVISION KIT MODEL22042023 pdf Post Views: 60 Related posts: What is noise in electronics? What is Multiplexing? What is Attenuation? List FOUR stages in data collection Distinguish between a line printer and a page printer An E-mail window is divided into folders. State the purpose of the following folders Mark wishes […]
- Currently there is a shift in technology towards digital from analog. State any THREE advantages of digital technology over analog technologyCurrently there is a shift in technology towards digital from analog. State any THREE advantages of digital technology over analog technology Advantages of digital technology over analog technology There is quality in the image being transmitted Digital transmission is cheaper than analog in terms of frequencies It requires less equipment for its operation (one can […]
- Define the term ‘search engine’ giving two examplesDefine the term ‘search engine’ giving two examples A search engine is a web based information retrieval tool that helps users when sourcing for information on the internet e.g. Google, Yahoo etc Virus-free.www.avast.com Post Views: 6 Related posts: Describe two methods used to secure data in a database. Explain the meaning of the following terms […]
- Define the term accreditation as used in educationDefine the term accreditation as used in education Accepted / recognized/confirmed by the grant of charters by state/accrediting bodies Registered The process of recognizing an institution as being able to offer degrees and diplomas. Virus-free.www.avast.com Post Views: 2 Related posts: Describe two methods used to secure data in a database. Explain the meaning of the […]
- Define the term network topologyDefine the term network topology Network topology: Refers to the way computers and other devices have been arranged on a network or how data passes from one computer to another on a network. refers to the physical arrangement of the network, especially the location of the computers, other devices and how the cables are run […]
- Describe each of the following data processing methods and give an example of where used.Describe each of the following data processing methods and give an example of where used. Online processing – Data is processed immediately it is received e.g.internet banking, online payment system using credit card. Batch processing – Data is accumulated as a group then it is processed as one/ a group. E.g in payroll system Real-time […]
- Describe THREE impacts of ICT on employment protection agency (EPA)Describe THREE impacts of ICT on employment protection agency (EPA) Impacts of ICT on employment protection agency (EAP) Job creation – new employment opportunities that never existed before Job replacement – computer/literate people have been replaced with those who have desired computer skills Displacement – employees moved to another department where computer skills are not […]
- Describe two methods used to secure data in a database.Describe two methods used to secure data in a database. Password protection. User and group permissions. User – level security. Data encryption. Virus-free.www.avast.com Post Views: 8 Related posts: Explain the meaning of the following terms as used in DTP. Make a clear difference between a Website and Web portals. State one advantages of using wireless […]
- Dickitoto visited a computer shop and noted stickers (labels) on desktop and laptop computers with the following information:-Dickitoto visited a computer shop and noted stickers (labels) on desktop and laptop computers with the following information:- Intel core-i 3- processor type 3.0 GHz- processor speed Windows 10 ® – THE OS 4 GB RAM- PRIMARY STORAGE 500GB SATA HDD – The hard drive secondary storage. Identify the : processor speed; 3.0 GHz primary […]
- Differences between Ms-Windows & Disk Operating SystemDifferences between Ms-Windows & Disk Operating System Ms-Windows There are icons Uses both the Mouse & Keyboard as Input devices. There is use of Menus. User-friendly. Windows fully supports networking. Requires a computer with high memory size. Windows can support DOS, i.e. it is possible to run DOS-based programs in Windows. Uses Multi-coloured screen. […]
- Differentiate between buffers and registers with reference to special purpose memoriesDifferentiate between buffers and registers with reference to special purpose memories Buffers are special memories that are located in the input/output devices and can hold more than one piece of data at a time. Registers are located inside the CPU and hold one piece of data at a time. Virus-free.www.avast.com Post Views: 7 Related posts: […]
- Differentiate between data security and data privacyDifferentiate between data security and data privacy Data security is the protection of data and information against computer criminals while Data privacy is the protection of private and confidential data and information against misuse or unauthorized access Virus-free.www.avast.com Post Views: 10 Related posts: Describe two methods used to secure data in a database. Explain […]
- Differentiate between hard system and soft systemDifferentiate between hard system and soft system Soft systems human activity systems (goals& objectives keep on charging). Hard systems systems whose goals and objectives are clearly defined and outcome is predictable. Post Views: 17 Related posts: List THREE causes of computer data loss. What is Attenuation? State any TWO functions of a network administrator […]
- Differentiate between hard system and soft systemDifferentiate between hard system and soft system Soft systems human activity systems (goals& objectives keep on charging). Hard systems systems whose goals and objectives are clearly defined and outcome is predictable. Post Views: 2 Related posts: List THREE causes of computer data loss. What is Attenuation? State any TWO functions of a network administrator […]
- Differentiate between the following pairs of terms as used in computingDifferentiate between Storage device and storage media Storage device A computer hardware that facilitates writing and reading of information in the storage media in a format that the computer is able to understand and manage/manipulate. Storage media This is the actual surface where data is stored. The storage patterns and technology will differ from one […]
- Differentiate between the process of moving text and copying textDifferentiate between the process of moving text and copying text Copying text – creating a duplicate of the text in a new location while the original remains Moving text – Changing the position or location of the text Virus-free.www.avast.com Post Views: 11 Related posts: Describe two methods used to secure data in a database. […]
- Differentiate Database administrator and web administrator.Differentiate Database administrator and web administrator. Database administrator is responsible for updating and maintaining records in an database system and ensure data is organized in a way for easy access retrieval and update. Web administrator is responsible for designing, updating and maintaining the organizations website. Virus-free.www.avast.com Post Views: 0 Related posts: Describe two methods used […]
- Differentiate the function SUM and SUMIF as used in spreadsheet.Differentiate the function SUM and SUMIF as used in spreadsheet. SUM Adds values in a range of cells and returns the results SUMIF Adds values in a range of cells that meets the specified condition and returns the results. Virus-free.www.avast.com Post Views: 5 Related posts: Describe two methods used to secure data in a database. […]
- Distinguish between a line printer and a page printerDistinguish between a line printer and a page printer A page printer prints document page by page and it is very fast while a line printer prints documents line by line and is slower. Post Views: 8 Related posts: List THREE causes of computer data loss. What is Multiplexing? What is Attenuation? State any TWO […]
- Explain how the following resources are controlled by the operating systemExplain how the following resources are controlled by the operating system Processor The OS assign tasks one by one to avoid competition Main memory OS determine which task should occupy the main memory at any given time Input and output devices the OS controls data input and information output Post Views: 3 Related posts: List […]
- Explain one reason for use of binary in digital technology.Explain one reason for use of binary in digital technology. It is easier to develop devices that understand binary language. Device a designed using binary logic are simple more reliable and consume the energy. Virus-free.www.avast.com Post Views: 0 Related posts: Describe two methods used to secure data in a database. Explain the meaning of the […]