You are on page 1of 33
ne kasneb ATD LEVEL DCM LEVELT INFORMATION COMMUNICATION TECHNOLOGY TUESDAY: 31 August 2021. Time Allowed: 3 hours. Answer any FIVE questions. ALL questions carry equal marks. QUESTION ONE (@) Many organisations have embraced the concept of cloud computing. Required: Explain three disadvantages of cloud computing. (6 marks) (b) The management of ABC Ltd. is planning to install a Local Area Network in the organisation Outline five ways the company will benefit as a result of the new infrastructure. (5 marks) (©) Describe four factors that you would consider when determining the type of network topology to use. (4 marks) (4) Veronica bought a laptop with the following specifications: Windows 10 Pro, 11" Gen Intel®, HP Sure Shutler and HP Sure View Reflect Privacy Screen. Required: Explain each of the above specifications. (5 marks) (Total: 20 marks) QUESTION TWO (@) List four types of files extensions. (4 marks) (6) Explain four factors that you might consider when selecting an application software package. (4 marks) (©) Computers have become an integral part of life and work. Describe four suitable applications that investment groups could use if they computerise their operations. (8 marks) (4) _List wo examples of devices in each category below (i) Softcopy output device (2 marks) Gi) Hardeopy output device. (2 marks) (Total: 20 marks) QUESTION THREE @) (i) __ Describe four occupational diseases associated with people who spend a lot of time using computerised information system. (4 marks) (ii) Suggest the remedy available for each of the occupational diseases identified in (a) (i) above. (4 marks) (b) Using @ diagram, illustrate the relationship between information systems and organisation in terms of users, functional perspective and levels of management. (6 marks) (©) Summarise six guidelines that you would follow to evaluate the quality of an operating system. (6 marks) (Total: 20 marks) ADI4 & CD14 Page 1 Out of 2 QUESTION FOUR @) (b) © @ © Draw the following components used in a computer network: (MIF. (1 mark) (i) Server. (mark Gili) Wireless router. (mark) (iv) RU4S UTP cable. (1 mark) Describe four advantages of using wireless peripherals. (4 marks) Explain the relationship between data and information (4 marks) Summarise four business objectives of investing in information systems by a firm. (4 marks) State two advantages and two disadvantages of using application packages by a business firm. (4 marks) (Total: 20 marks) QUESTION FIVE, (a) () © @ QUESTION SIX (a) (b) (0) @ Outline four characteristics of a good storage system. (4 marks) State four categories of programming languages suggesting the basic reason behind their evolution. (6 marks) Using an illustration, explain three types of network topologies. (6 marks) State four physical security measures that could be put in place to protect an organisation’s hardware and software. (Toa: 20 marks Using illustrations, recommend two file access methods you could use during file design (4 marks) Explain three factors fostering growth of end user computing in modern computing environment, (6 marks) Explain four positive impacts of teleworking to each of the following: (@—— Anorganisation. (4 marks) Gi) The society. (4 marks) State three business reasons for using secondary storage devices. (2 marks) (Total: 20 marks) QUESTION SEVEN (a) () © (a) o} ‘Summarise four business strategic objectives of information systems, (5 marks) Benchmarking is one of the key steps during hardware acquisition. Explain the relevance of this step, (2 marks) Explain the following terms as used in emails: @® Ce. (mark) (i) Bee. (mark) (ii) Attachment. (1 mark) (iv) Backscatter. (mark) () Subject. (1 mark) Outline five ways to minimize errors in a computerized information system, (5 marks) Highlight three advantages of using SG network over 4G network. (3 marks) (Total: 20 marks) AD14 & CD14 Page 2 Out of 2 ag kasneb ATD LEVEL! DCM LEVEL 1 INFORMATION COMMUNICATION TECHNOLOGY TUESDAY: 18 May 2021. Time Allowed: 3 hours, Answer an FIVE questions, ALL questions carry equal marks, QUESTION ONE @ ) © @ Data processing methods have evolved over time in tandem with the technology advancement. {mn relation to the above statement. state three evolutionary data input technologies, citing one factor in each case that determines their application suitability (6 marks) Describe six ways that information communication technology could be used to prevent crime in the society today. (6 marks) ‘State two types of files needed to support different data processing system, 2 marks) Explain three trends of current information communication technology infrastructure, (6 marks) (Total: 20 marks) QUESTION TWO @ &) © @ One of the growing technologies is Radio Frequency Identification (RFID), a system for tagging and identifying mobile objects, (i) Identify three benefits of RFID over barcodi 6 marks) (ii) List two disadvantages of RFID over barcoding marks) (i) Highlight three disadvantages of a Wide Area Network (WAN), marks) (ii) State four advantages of intranet 4 marks) ‘Many businesses are now aware of the benefits derived through adoption and use of information communication technology (ICT) but there are many challenges which must be addressed Highlight four challenges that prevent ICT usage in businesses, (4 marks) Applications software are programs designed to help end users solve particular problems or perform specific tasks. ‘The end-user could either choose to use proprietary software or open-source software (Describe four barriers that you may encounter when using proprietary software, (2 marks) Gi) Outline four benefits associated with the use of open-source software, (2 marks) (Total: 20 marks) QUESTION THREE @ A member of staff in the human resource department reports to the IT service desk that they have found an unlabeled USB disk plugged into a spare port on their office desktop PC. Your organisation has strict rules regarding removable media and has banned them from the site Indicate the First five actions which you would take. (S marks) ADI4 & CD14 Page Out of 3 (b) The management of the organisation where you work has decided to set up a new computer server room. You have been asked to recommend where the new central computer server room in your organisation should be located. ‘The organisation is based in a five story modern office block on a business park close to a major town, with a stafT restaurant on part of the ground floor. There is space to locate the central computer server room in any of the five floors. Outline six factors that need to be considered when choosing an appropriate location for the new central server room (marks) (©) Operating system isthe most basic sofware in a computer system Explain (Thee advantages of time sharing operating system, G marks) (ii) Two disadvantages of time sharing operating system (2 marks) (4) Deseribe four major criteria for selecting file organization method (4 marks) (Total: 20 marks) QUESTION FOUR (@) Most computerised security systems make use of biometric analysis. Name three physical features of human beings that could be considered in this analysis. G marks) (&) —@_List four ways in which data integrity could be compromised. (4 marks) (ii) A technician recommended that a computer in the principal's office need a central processing unit (CPU) upgrade. ‘State two reasons that might have necessitated upgrading of the CPU. (2 marks) {c) (State three ways in which organisations manage system entropy. G marks) (ii) Explain three types of errors that could occur during data collection stage of data processing cycle. (GB marks) (4) @_ Explain the meaning of identification and authentication in computer access contro. (2 marks) (ii) State three benefits of telecommuting. (3 marks) (Total: 20 marks) QUESTION FIVE (2) Differentiate between “data” and “information” as used in computing (marks) (i) List four mouse technologies (marks) (ii) Outline three criteria used to classify computers 6 marks) (6) Name three non-electronic tools that were used before the invention of electronic computers. 6 marks) (©) Identity the keyboard keys represented by the symbols below and ther functions fo § @ Gi Git) G marks) (@) Identify three ways in which ICT could be used in industrial control (GB marks) (©) Ineach of the following, state an example of a popular application in the market (Word processing, (1 mark) (ii) Spreadsheet (mark) (iii) Presentation, (mark) (iv) Computerised accounting software. (1 mark) (Total: 20 marks) ADI4 & CDL4 Page 2 Out of 3 QUESTION SIX @ &) © @ © Explain the term “file organisation”. (2 marks) State the method of file access for the following file organisation methods: (Index sequential co) (iy) Seria, (1 mark) (i) Sequenta (1 marky (iv) Random, (1 marky Organisations use massive resources to develop information systems. (Define the term “information system”. (1 mark) i) Deseribe three elements of an information system, G marks) (iii) State the main purpose of an information system. (2 marks) Explain the use of BIOS in a computer system. (2 marks) (i) Explain two uses of forms in a database design. (2 marks) (ii) Differentiate between bound and unbound control inthe context of database applications. (2 marks) (iil) List wo components of a spreadsheet 2 marks) (Total: 20 marks) QUESTION SEVEN @) ) © @ © [Identify a reason for each of the following disk management techniques: (Disk partitioning (2 marks) il) Disk compression. (2 marks) Gi) Disk defragmentation @ marks) Highlight two reasons why a password may not be a reliable security control measure. 2 marks) Explain how the following data security measures function: (Audit tral (2 marks) Gi) Logfile (2 marks) Gil) Fire walls (2 marks) Givetwo disadvantage of sng ecommerce rather than the conventions method ofcaryingout busines. marks) (Define the term “email” (mark) (i) Outline three advantages of emails. 3 marks) (Total: 20 marks) ADI4 & CD14 Page 3 Out of 3 kasneb ATD LEVEL DCM LEVEL I INFORMATION COMMUNICATION TECHNOLOGY ‘TUESDAY: 24 November 2020. ‘Time Allowed: 3 hours. Answer any FIVE questions. ALL questions carry equal marks, QUESTION ONE (@) Describe four trends that have characterised the development of Information Communication Technology (ICT) infrastructure. (4 marks) (b) Explain the meaning of the following concepts of a computer file: i @ — Hitrate. (2 marks) Gi) Son. marks) Gil)_Append. marks) (iv) Sek 3 (@ marks) (© @__ State two functions of primary memory in a computer system. marks) i Recommend with a reason the major memory design constraint that must be given due consideration by the computer designer. (@ marks) @ Examine two performance metrics that could be applied by an organisation in assessing the investment in information technology (IT) infrastructure. (2 marks) (©) Recommend the suitable media forthe following file access methods: @ Random. (1 mark) Gi) Direct. (1 mark) (Total: 20 marks) QUESTION TWO (@)—@)_ Explain the term point-and-draw devices, (2 marks) i) List four: ‘commonly ‘used point-and-draw devices. (4 marks) (b) ‘State four components of an operating system. (4 marks) (c) Outline four classifications of optical media, (4 marks) (@ Highlight six strategic uses of internet by a software industry. (6 marks) (otal: 20 marks) ADI4 & CD14 Page 1 Out of 3 QUESTION THREE (@) Propose four relevant information systems that supports the different levels of an organisation giving examples in ‘each case. (8 marks) (b) State the electronic component used inthe following computer generations: First (1 mark) (ii) Second (mark) ii) Third, (1 mark (iv) Fourth. (1 mark) () Fifth. (1 mark) (©) Examine three measures that could be adopted by both software developers and client organisations to protect software from piracy. G marks) (@ Highlight four reasons for changing from manual to computerised systems. (4 marks) (Total: 20 marks) QUESTION FOUR @ State four business applications supported by a Desktop Publishing (DTP) package. (4 marks) (b) Citing two examples in each case, differentiate between “guided” and “unguided” data transmission media. (8 marks) (©) Describe three types of charts available in a spreadsheet program. (6 marks) (@ State two commonly used web browser in a web environment. (2 marks) F (Total: 20 marks) QUESTION FIVE (@) Sate four basic evaluation criteria fora flat panel monitor. (4 marks) (©) @_ Explain the term control as a component of a system. (marks) Gi) State two components in a computer system which influence its behaviour. (2 marks) (©) Examine three advantages and three disadvantages of electronic government. (marks) (@ Describe three hardware devices found in a local area network (LAN). (6 marks) (Total: 20 marks) QUESTION SIX (@ Explain the term “clock speed” stating its unit of measure, (2 marks) (b)* Besides operating system, explain giving an example in each, two other components of a system software. (4 marks) © @_ Outline five features of an accounting package. (5 marks) Gi) Explain three benefits of an accounting package. G marks) ii) List three examples of accounting packages. @ iarks) (@) Examine three operations done on a file by an operating system. G marks) (Total: 20 marks) ADI4 & CD14 Page 2 Out of 3 QUESTION SEVEN @ ) © @ © Identify three types of a computer mouse. marks) Categorise the following peripheral devices in terms of input, output and storage devices: Hard disk, sensor, speaker, flash memory, digital camera, bar code reader. (6 marks) Assess two positive and two negative impacts that information communication technology (ICT) has had on people. (4 marks) One of the biggest negative impacts of the internet is the “internet addiction disorder (IAD)”. Required: (Explain the meaning of LAD. (2 marks) (i) Identify three symptoms of IAD. (3 marks) List two limitations of computer files. ADI4 & CD14 Page3 Out of 3 Ng kasneb ATD LEVELT DCM LEVEL! INFORMATION COMMUNICATION TECHNOLOGY WEDNESDAY: 27 November 2019, ‘Time Allowed: 3 hours Answer any FIVE questions. ALL questions carry equal marks. QUESTION ONE (@) Examine five factors that could lead to the successful implementation of information communication technologies (ACT's) in small businesses. (S marks) (b) Highlight two ways that could be used to reduce the threats in a computer through emails. (4 marks) (© (Explain the term computer port. (2 marks) Gi)_List two types of computer ports. (2 marks) (@) Using examples differentiate between a search engine and a web browser (4 marks) (©) Explain the following components: (i) Network interface card (mark) Gi) Modem, + (1 marky (iii) Twisted pair cable (1 mark) (Total: 20 marks) QUESTION TWO (2) Suggest six actions which a company’ should take ona day-to-day basis to ensure as far as posible tht dota stored is secure and that processing ean take place without disruption (Gmarks) (©) Describe four types of microcomputers (4 marks) (©) Highlight four components of an information system, (4 marks) (© © Define the term peripheral device (1 mask) (i) Statean example of a peripheral device. (1 mark) (©) Using an example, distinguish between «field and a record as used in ile management (4 marks) (Total: 20 marks) QUESTION THRE! (a) Explain the following ypes of software (Malware (1 mark) (i) Freeware. (1 mark) Gi) Shareware (1 mack) (iv) Spyware, (1 mark) ADI4 & CD14 Page 1 Out of 3 (©) Printers could be classified as impact printers and non-impact printers. ‘State two examples in each class of the above types of printers. (4 marks) (©) Compare read only memory (ROM) and random access memory (RAM) based on the following criteria: Size ‘@marks) (i) Use (2 marks) (Differentiate between multiprogramming and multiprocessing. (marks) (©) Citing an example, explain the term firmware. (2 marks) (List wo components contained in a computer motherboard (2 marks) (Total: 20 marks) QUESTION FOUR (Cite four reasons why a programmer may be hesitant fo develop a program using first generation programming language (marks) (©) Explain four factors that might affect the method of file organisation (8 marks) (© Describe the folowing word processing features: (Prine preview. (marks) Gi) Watermark (marks) (ii) Indent marks) (© Statetwo reasons why a graphical user interface (GUI) is considered easier to use than a command driven interface. (2 marks) QUESTION FIVE (@) Describe the following file processing activi @ —Filemerging. (2 marks) Gi) File sorting, (2 marks) (b) Assess four potential impacts of an attack on information systems. (8 marks) (©) Outline six disadvantages associated with the use of internet (6 marks) (@) Explain the meaning of “knowledge workers” in the context of information systems, (2 marks) (Total: 20 marks) QUESTION SIX (@) Your organisation has invited an IT consultant to advice on the concept of cloud computing. The IT consultant ‘It is a great idea to embrate cloud computing but there are challenges associated with it” Required: (i) Justify the need to embrace cloud computing in an organisation, (S marks) Gi) Assess five challenges associated with cloud computing, (5 marks) (b) Explain the following types of operating systems: (Time sharing operating system. (2 marks) Gi) Real time operating system. (2 marks) (©) Enumerate six stages of data processing cycle, (6 marks) (Total: 20 marks) ADI4 & CD14 Page2 Out of 3 QUESTION SEVEN @ © © @ State three metis which could be used when evaluating hardware performance. marks) (State four automated data capture techniques that could be used by an organisation (4 marks) (ii) List four precautionary measures taken when using automated data input techniques (4 marks) enti four features of e-commerce. (4 marks) (Define the tem virtual private network (VPN) (mark) (ii) Explain four benefits that could accrue to an organisation as a result of deploying virtual private networks. (marks) (Total: 20 marks) ADI & CD14 Page 3 Out of 3 TUESDAY: 21 May 2019, Answer any FIVE questions. ug kasneb ATD LEVELI DCM LEVEL 1 INFORMATION COMMUNICATION TECHNOLOGY QUESTION ONE @ cy © @ © o @ wo Assess three negative impacts of e-waste on the environment Highlight two remedies that could be employed to address the e-waste menace, List three direct data entry (DDE) devices. Describe three characteristics of a computer operat stem. Outline two activities that might be performed when updating a file Classify printers using the following criteria: @ (ii) Highlight three factors considered when selecting an input device for a computer system. Speed. Characters printed per given time, QUESTION TWO Outline two festres ofan operating system in a computer @ wb) © @ o Gi Examine three uses of a presentation software. ‘fete yo examples of popular presentation software Time Allowed: 3 hours. ALL questions carry equal marks. (G marks) (marks) (G marks) (3 marks) (2 marks) 2 marks) (2 marks) (GB marks) (Total: 20 marks) (2 marks) (6 marks) (2 marks) Compare a “local area network (LAN)” and a “wide area network (WAN)” based on the following: @ Gi ii) Coverage Form of data transmitted ‘Transmission speed. Explain the following terms as used in social media: @ (i) Chat slang. Hash tag, (marks) @ macks) (2 marks) (2 marks) (2 marks) (Total: 20 marks) ADI4 & CD14 Page 1 Out of3 AIESTION THREE @ © © @ © Justify the use of a transaction file in an accounting department, (2 marks) State four reasons why mobile phones are regarded as computers. (4 marks) A data analyst intends to introduce an application software to make the analysis of data gathered by a sales man easy. Required: (Examine five factors that could be used to select an appropriate software. (5 marks) (ii) Identify the most suitable application software for the above type of work. (1 mark) Apart from a mouse, state two other input devices categorised as pointing devices. (2 marks) Compare between read only memory (ROM) and random access memory (RAM) based on the following criteria: (Capacity. (marks) (i) Readiwrite, (2 marks) (ii) Upgradability. (2 marks) (Total: 20 marks) QUESTION FOUR (a) (b) © @ © James bought a computer with the following specifications: Processor ~ dual core 2.4GHz (iS intel processor) RAM ~ 16GB Hard Drive ~ 256GB solid state hard drive Monitor ~23" widescreen LCD with Display Poru HDMI Operating system ~ Windows 10 Home edition Backup Device ~ External hard drive and USB Flash Drive Required: Explain the fllowing inthe context of computer hardware (23 widescreen Leb, (1 mark) (i) wDMt (1 mark) Gil) Processor ~ dual core 2.4GHz (1 mark) (iv) USB Mash disk (1 mark) Ourtine four benefits of mobile computing 4 marks) In each case, highlight hrc characteristics ofthe following information systems (Transaction processing system (TPS) ( marks) Gi) Executive support system (ESS). (6 marks) Sst the need of using hierarchical file structure in a computer (marks) Highlight four applications of computers in the banking sctr. (4 marks) (Total: 20 marks) QUESTION FIVE @ () Explain two benefits to an organisation of using Electronic Data Interchange (EDI). (4 marks) In today’s world, hacking of comput ised systems is a reality Required: Outline four safeguards you could take to protect your personal computer from hackers. (4 marks) ADI4 & CD14 Page 2 Out of 3 (©) Explain the functions supported by the following internet services: Newsgroups. (2 marks) Gi) Telnet. (2 marks) (4) Differentiate between the following computer network terms: (“Coaxial cable” and “twisted wite pairs cable” (4 marks) (i) Simplex mode” and “half-duplex mode”. (4 marks) (Total: 20 marks) QUESTION SIX (@) Explain the purpose ofthe following utility programs: (File compression wilt. (2 marks) (ii) Uninstall utes. 2 marks) (ii) Diagnostic wy marks) (©) Differentiate between “hard copy output" and “sof copy outpul’, marks) (©) Deseribe the following features ofa spreadsheet (Pivot table 2 marks) (i) What if analysis. (@ marks) ii) Soning (2 marks) (iv) Filtering 2 marks) (4) Decision support systems (DSS) and management information systems (MIS) both serve the management level of an organisation, Required: Describe two major differences between (4 marks) (Total: 20 marks) QUESTION SEVEN (@) Citing an example in each case, describe the following types of information systems: (i) Enterprise information system. (2 marks) Gi) Functional information system. (2 marks) (b) The internet has offered both benefits and challenges to businesses and their customers. Required: (Describe two business activities which could be done on the intemet. (2 marks) (ii) Highlight three positive impacts of internet technology to the business sector in your country. (3 marks) (©) Explain the following types of systems: () —_Cybemetie system, (2 marks) Gil) Soft system. (2 marks) Gi) Hard system. (2 marks) (4) Identify three advantages and two disadvantages ofa laser printer. (5 marks) (Total: 20 marks) ADI4 & CD14 Page 3 Out or3 © @ Explain the functions supported by the following internet services: (Newsgroups. (marks) (i) Telnet (mars) Differentiate between the following computer network terms (_*Coaxial cable” and “twisted wire pairs cable” (4 marks) ai implex mode” and “half-duplex mode”. (4 marks) 7 (Total: 20 marks) QUESTION six @ (by © @ Explain the purpose of the following utility programs: (i) File compression utility (2 marks) Gi) Uninstall utilities. (2 marks) Gil) Diagnostic utility (2 marks) Differentiate between “hard copy output” and "soft copy output’, (2 marks) Describe the following features of a spreadsheet @— Pivortabe (2 marks) (i) Whatitanayss, (2 marks) Gil) Sorting (2 marks) (iv) Firing (2 marks) Decision support systems (DSS) and management information systems (MIS) both serve the management level of an ‘organisation Required: Describe two major differences between DSS and MIS, (4 marks) (Total: 20 marks) QUESTION SEVEN @ O) © @ Citing an example in each case, describe the following types of information systems: (Enterprise information system. (2 marks) (ii) Functional information system, (2 marks) ‘The internet has offered both benefits and challenges to businesses and their customers. Required: (Describe two business activities which could be done on the intemet. (2 marks) ii) Highlight three positive impacts of internet technology to the business sector in your country. (3 marks) Explain the following types of systems: (©) Cyberetic system (2 marks) i) Softsystem. (2 marks) Gli) Hard system. (2 marks) dently tree advantages and two disadvantages of laser printer. (5 marks) (Total: 20 marks) ADI4 & CD14 Page3 Out of 3 ag kasneb ATD LEVELI DCM LEVEL | INFORMATION COMMUNICATION TECHNOLOGY TUESDAY: 27 November 2018, Time Allowed: 3 hours Answer any FIVE questions. ALL questions carry equal marks. QUESTION ONE (®) Oulline four advantages that might acerue to an organisation from the purchase of bespoke software. (4 marks) (b) List five computer embeded devices that might be used inthe home environment (5 marks) (©) State the five stages in the information technology infrastructure evolution. (5 marks) (4) Analyse the purpose ofthe following software utilities: (System satus utilities marks) (ii) Debuggers. (marks) Git) Dump wittes (2 marks) (Total: 20 marks) QUESTION TWO {@) Describe two collision detection methods used in data transmission (4 marks) (6) List four desirable features of notebook personal computers (marks) (© Contrast “optical characte recognition” and “optical mark recognition” based on the following crtri (© Application area (2 marks) Gi) Whats recognises 2 marks) (4) Distinguish between the following terms (“CRT monitor” and “LCD monitor” (4 marks) Gi) “Light pen” and “loystick” (4 marks) (Total: 20 marks) QUESTION THREE (@) Explain three reasons why a hotel might use M-commerce. (3 marks) (b) With the aid of diagram, illustrate the open systems interconnections model (OSI), (7 marks) 7 (i) Define the term “web browser”. (2 marks) Gil) State two commonly used web browsers. (2 marks) ADI & CD14 Page 1 Out of2 (8) Discuss the following e-payment methods: (Digital walter. (2 marks) Gi) Smart card, (2 marks) Gil) Stored value payment system. (2 marks) (Total: 20 marks) QUESTION FOUR (@) Explain four reasons why images are sed inthe design of human computer interface (HCD. (4 marks) (6) entity two examples ofeach ofthe following bass of classification of operating systems: ©) “Theservices hey provide (marks) (i) “The interface that makes them available to users and programs (2 marks) (©) _Describethree documents ereated during mail merging in word processing (6 marks) (4) Diseuss the fllowing methods used in computer memory allocation (Continuous allocation (2 marks) (i) Linked allocation (2 mars) (ii) Indexed allocation 2 marks) (Total: 20 marks) QUESTION FIVE, (@) Highlight four problems that might oceur fa software is not thoroughly tested before use (4 marks) (©) Explain four guidelines of setting up a strong computer password (4 marks) (©) Sungest four business processes that could be supported by spreadsheet software (4 marks) (4) (@_ State four external sources of information for use in a decision support system. (4 marks) Gi) Outline four types of reports produced by a decision support system. (4 marks) 20 marks) QUESTION SIX {@) Slate five precautionary measures taken to potest a compact dise from damage (S marks) (0) Identify five factors that you could consider when designing a method of ile organisation. (5 marks) (©) Analyse five factors that might determine the type of network topology tobe used by an organisation. (S marks) (8) List five types of cybercrime (5 marks) (Total: 20 marks) QUESTION SEVEN (@) State six basic types of desktop applications. (6 marks) (b) With the aid of diagrams, illustrate three types of charts that might be used to analyse business trends in spreadsheets, (6 marks) (©) Discuss four benefits that might accrue to banks from advancing loans through mobile phone platforms. __(8 marks) (Total: 20 marks) ADI4 & CD14 Page 2 Out of 2 kasneb ATD LEVEL T DCM LEVEL | INFORMATION COMMUNICATION TECHNOLOGY TUESDA 2 May 2018, Time Allowed: 3 hours. Answer any FIVE questions. ALL questions carry equal marks. QUESTION ONE (a) Identify six uses of information communication technology (ICT) in hospitals, (6 marks) (b) Citing an application of each in the context of the end user, distinguish between “information centre” and “help desk (6 marks) (©) Explain the meaning ofthe following terms used in reference 1 a computer file: ()— Hitrate (mars) (iy Son snacks) tii) Append (2 marks) Civ) Seek (2 marks) (Total: 20 marks) ION TWO. (@) Explain the main function of the following: (i) Memory card (2 marks) (ii) Sound card, (2 marks) (iii) Television tuner card (2 marks) (b) Distinguish between the following types of softw (3) "Closed source software” and “open source software", (4 marks) iy Ipha software” and “beta software”. (4 marks) (6) Describe the following characteristics of storage media: ®— Mutabiity (2 marks) Gi) Addressability (2 marks) Git) Volaility (2 marks) (Total: 20 marks) ADI4 & CD14 Page 1 Out of QUESTION THREE @ (Explain the term “conditional formatting” as used in spreadsheets. (2 marks) (il) Highlight wo benefits of electronic spreadsheets over manual worksheets (2 marks} (b) Technology used to make the processors of computers has evolved over time Required: Distinguish between a “second generation” and an “third generation” computers on the basis of the technology used to make their processors, (6 marks) (©) Discuss five types of operating systems, (10 marks) (Total: 20 marks) QUESTION FOUR (@) Distinguish berween “structured decisions” and “unstructured decisions” as used in information systems. (4 marks) (b) Describe the following types of management information system (MIS) reports (i) Summary report (2 marks) Gi) Exception report (2 marks) (ii) Statutoryscheduled report aks) (© @_Explainthe term “turnkey syst (2 marks) Gi) Summarise four advantages of twnkey systems (6 marks) (Total: 20 marks) QUESTION FIVE (a) Illustrate the following LAN topologies: Mesh. (2 marks) Gi) Tre. 2 marks) Git) Star. (2 marks) (b) Highlight six features of an accounting package (6 marks) (6) Describe four benefits of using wireless media in network connectivity. {8 marks) (Total: 20 marks) QUESTION SIX (@) (Explain the term “datavinformation privacy”. (2 marks) Gi) Highlight three internet-related computer technologies that might threaten data/information privacy. (3 marks) (Gli) Recommend three measures that could be used to protect data/information privacy G marks) (b) Describe six methods that could be used to prevent unauthorised access to information in a computer within a networked ‘environment (6 marks) (©) Explain the following web-related terms: (Web browser, (2 marks) Gi) Hyperlink. (2 marks) Gil) Hypertext document. (2 marks) (Total: 20 marks) ADI4 & CD14 Page 2 Out of3 QUESTION SEVEN @ Oo) © (i) Define the term “executive support system (ESS)”, (2 marks) (i) Explain four internal factors that might drive the need for an ESS in an organisation, (8 marks) Describe the following internet business models: (Information broker. (2 marks) Gi) Transaction broker. (2 marks) (ii) Content provider. (2 marks) Explain how the following factors affect the processing power of a computer: (Data bus. (2 marks) (i) RAMsize. marks) (Total: 20 marks) ADI4.& CD14 Page 3 Out of 3 kasneb ATD LEVE! DCM LEVEL! INFORMATION COMMUNICATION TECHNOLOGY TUESDAY: 28 November 2017. ime Allowed: 3 hours. Answer any FIVE questions. ALL questions carry equal marks. QUESTION ONE G@) List four extemal storage devices that could be used to transfer information from one computer to another. (4 marks) (6) Differentiate between a“pocrto-poct” and a “cient server" network (4 marks) (©) Explain the fnetion ofthe following ina computer system (Motherboard (marks) (iy BIOS. (2 marks) (ii) RAM (2 marks) (i) ROM (marks) ©) CMos. marks) (i) Processor marks) (otal: 20 marks) QUESTION TWO {@) Outline four advantages of online data capture (4 marks) (6) Highlight four factors to consider when choosing an input device (4 marks) (©) State six reasons for using computer based advertising in an organisation (maths) (8) G)__Deserbe the tem “knowledge based systems” in the context of information systems (2 marks) Gi) Explain two benefits of knowledge based systems within an organisation, (4 marks) (Total: 20 marks) QUESTION THREE (@) State the main electronic component used in the following computer generations (First (1 mark) ii) Second. (1 mark) (ii) : (1 mark) ) (1 mark) ©) Fink (1 mark) ADI4 & CD14 Page 1 Out of2 () —(i)__Distinguish berween an “impact printer” and a “non impact printer” (4 marks) Gi) Outline two advantages of each ofthe printers in (b) (i) above. (4 marks) (©) Highlight seven safety measures that could be taken when using the social media, (7 marks) (Total: 20 marks) ON FOUR (@) Explain the following terms as used in information security (Hackers. (2 marks) Gi) Identify thet (2 marks) Git) Viruses (2 marks) (iv) Spam. (2 marks) (6) Describe three ways in which the intranet could be used in a college. (6 marks) (©) (i) Define the term “cloud computing” (2 marks) (i) Highlight (wo benefits of cloud computing to an organisation, (4 marks) 20 marks) QUESTION FIVE (2) Citing a suitable media in each case, explain the following file access methods: (Sequential (G racks) (i) Direct. (6 marks) (iil) Random (6 marks) (©) Outline five main features ofa spreadsheet program. (5 marks) (©) Deseribe thre benefits of using instant messaging in an organisation. (6 matks) (Total: 20 marks) QUESTION SIX (@) Distinguish between the following information communication technology terms: (i) “Digital divide” and “network coverage” (4 marks) (ii) Teleworking” and “video conferencing” (4 marks) (©) relation to information systems, differentiate between “structured” and “unstructured decisions (4 marks) (©) Highlight four factors that could lead to a poor management information system, (4 macks) (Outline four advantages of using fibre optic cables in eomputer networks (4 marks) (Total: 20 marks) QUESTION SEVEN (2) G)__State four automated data capture techniques that could be used by an organisation, (4 marks) (ii) Outline wo strengths and two limitations associated with automated data capture (4 marks) (b) Explain four main functions ofan operating system, (marks) (©) Distinguish between “productivity sottware™ and “sofware suite” (4 marks) (Total: 20 marks) ADI4 & CD14 Page? Out of2 KASNEB ATD LEVELT DCM LEVEL 1 INFORMATION COMMUNICATION TECHNOLOGY TUESDAY: 23 May 2017. Answer any FIVE lestions. QUESTION ONE @ () w «@ Explain the Following categories of personal computers: () Desktop computer Gi) Notebook computer. (iii) Tablet computer. Differentiate between “dynamic memory” and “static memory” as used! in a computer system, High Outline four benefits of using email as a means of come QUESTION TWO @ «b) © co) QUESTION THRE @ ) © @ {In the context of information systems, state five qualities of yood information, -xplain the meaning of the following concepts of a computer file: () Hicrate Gi) Volatility Gil) Growth Distinguish between a “modem” and a “multiplexer” as used in computer networks. Describe five sis ways in which the use oF computers could reduce operating cation in an or sctors to consider when selecting a computer programming language. Time Allowed: 3 hours. ALL questions carry equal marks, marks) (2 marks) (2 marks) (a marks) (6 tvarks) (4 marks) (otal: 20 marks) (S marks) (marks) (2 marks) (marks) (4 marks) (5 marks) (Total: 20 marks) Highlight four business processes that could be supported by the use of computerised accounting software in an Explain three functions ofa power supply unit in a computer system, Highlight four signs that could waen a user of an overheating computer. Describe each of the following multiuser computers (Server. Gi) Mainframe. ii) Supercomputer. (4 marks) (6 marks) (4 marks) (2 marks) (2 marks) (2 marks) (Total: 20 marks) ADI4 & CD14 Pi Out of2 QUESTION FOUR (@) Explain the following terms as used in information security () Malware marks) (ii) Spyware marks) (ii) Worn (2 marks) (iv) Trojan (2 marks) (b) Highlight four ways in which an operating system could be used to sort compute files (4 marks) (©) Describe four features ofeach of the following information systems: (i) Transaction Processing System (TPS) (4 marks) ay itive Support System ( (4 marks) : 20 marks) (Total QUESTION FIVE (a) Outline Four features that could determtine the choice of appropriate smartphone for intemet usaye. (4 marks) (b) Differentiate between the following types of internet connections: (i) “Dial (ii) “Digital subscriber line (DSL)" and “Satellite internet”. (4 marks) internet” and " sable internet (4 marks) (©) Identify two hardware devices in each case that could be used to produce the following output: (Soft copy. marks) (ii) Hard copy. marks) (4) Highlight four disadvantages ofa wide area network (WAN). (4 marks) (Total: 20 marks) QUESTION SIX fa) (i) Define the term “utility software" (2 marks) (ii) List three examples of utility software (3 marks) (b) Explain three factors that influence Garbage In, Garbage Out (GIGO) in the contest of data processing. (6 marks) (©) Gi)__Describe the role of a repeater in computer networki (2 marks) (i) Su work topology. ( marks) (@) Distinguish beween “switch user option” and “log ofT option” as used in graphical user interface (GUI) operating ystems. (4 marks) (Total: 20 marks) QUESTION SEVEN (a) Explain the meaning of the following wireless networking technologies: (i) Bluetooth, (marks) (i) Infrared (marks) (b) Outline wo advantages and two disadvantages of dat matix printers (4 marks) (©) Explain thre functions of contol sit oF a computer syst (marks) (4) Describe wo types of lat panel display monitor (4 marks) (©) _Listtwo examples of registers found within the central processing unit (CPU) of a computer. (marks) (otal: 20 marks) ADI4 & CD14 Page 2 Out of? KASNEB ATD LEVEL DCM LEVEL INFORMATION COMMUNICATION TECHNOLOGY ‘TUESDAY: 22 November 2016. ¢ Allowed: 3 hours. “Answer any FIVE questions. ALL questions carry equal marks. QUESTION ONE (@)_ Idemify four devices that could be used ina supermarket to input data atthe point of sale. (4 marks) (b) Highlight four disadvantages of using the internet asa research too (4 marks) (©) Explain three factors that a company could consider when choosing an online data storage (6 marks) (@) Outline three differences between “first generation computers” and “second generation computers” (6 marks) (Total: 20 marks) QUESTION TWO (a) Explain the meaning of the following terms as used in word processing software: (i) Mail merge. (marks) Gi) Thesaurus, (2 marks) (iii) Spell checker. (2 marks) (iv) Zoom. (2 marks) (b) Describe six ways that information communication technology could be used to prevent crime. (6 marks) (©) Citing an example in each case, differentiate between “wired” and “wireless” data transmission media, (6 marks) (Total: 20 marks) QUESTION THRE (@) Outline our areas where lash memory cards could be used (marks) (6) State three functions of primary memory in a computer. (mans) (© (Describe Four heath problems associated with profonged use of computers. (amarks) Gi) Explain how each problem in ei) above could be prevented (4 marks) (6) Highligh fve ways that could be used to prevent unauthorised access o information in a computer within a networked nganisation, (S marks) (Total: 20 marks) QUESTION FOUR (@) Highlight four differences between a hard disk and a CD ROM. (4 marks) (b) State an example of an information system used in the following levels of management (Strategie (1 mark) Gi) Tactical (1 mark) iil) Operational (0 mark) (6) Explain three roles of information systems in each of the levels of management stated in (bY()+if) above. (9 marks) (@) State four elements of a computer file (4 marks) (Total: 20 marks) ADI4 & CD14 Page t Out of 2 QUESTION FIVE (a) Highlight two similarities between a “compiler” and an “interpreter” as used in computer programming. (4 marks) (b) Explain three reasons for using a Graphical User Interface (GUI) rather than a Command Line Interface (CLI) (6 marks) (©) Identify four functions of a router in a computer network (4 marks) (4) State three advantages and three disadvantages of online shopping to @ company. (6 marks) (Total: 20 marks) QUESTION SIX (@) State two functions of Power On Self Test (POST) during the booting process of a computer. (2 marks) (b) Distinguish between the following terms as used in computer files: (“Fite sorting” and “File merging” (4 marks) (i) “Transaction file” and “Backup file” (4 marks) (c) Differentiate between “Animation” and “Transition” as used in presentation software. (4 marks) (6) Describe three types of chars available ina spreadsheet program (6 marks) (Total: 20 marks) QUESTION SEVEN (@) Identify four uses of extranet in an organisation, (4 marks) (b) Giving an example in each case, distinguish between “physical access control” and “logical access control” in the context of information systems. (6 marks) (©) Explain the effect of variation in the following on computer system performance: © Clock rt. (2 maris) (id) Cache sie (2 mars) Gi) Word size (2 marks) (Describe four imitations ofa computer. (4 marks) (Total: 20 marks) ADI4 & CD14 Page 2 Out of 2 KASNEB ATD LEVELI DCM LEVEL! INFORMATION COMMUNICATION TECHNOLOGY TUESDAY: 24 May 2016, ‘Time Allowed: 3 hours. Answerany FIVE questions, ALL questions carry equal marks. QUESTION ONE (a) State four pointing devices used in computer systems, (b) Explain three benefits that might acerue to a business from using the internet. (©) Differentiate between “data” and “information” in the context of information system. (a) Describe three goals of networking computers in an organisation, QUESTION TWO. (a) Explain the following classes of computers: (i) Analog. Gil) Digital, ily Hybrid. (b) Outline six functions of an operating system. (©) Highlight four factors that could influence the design ofa computer file. (4) (Define the term “web browser Gil) State two commonly used web browsers. QUESTION THREE (@) Distinguish between “cold booting” and “warm booting! as used in computer systems. (b) Highlight six causes of computer failures. (©)__Deseribe five basic operations of a computer system. QUESTION FOUR (4 marks) (6 marks) (4 marks) (6 marks) 10 marks) (2 marks) (2 marks) 2 marks) (6 marks) (4 marks) (2 marks) (2 marks) 0 marks) (4 marks) (6 marks) (10 marks) 1: 20 marks). (@) Outline two advantages of laser printers (2 marks) (b) Highlight four characteristics of fifth generation computers. (4 marks) (c) Differentiate between “assembly language” and “high level language” in the context of programming, (4 marks) (@)__ Explain two reasons for using auxiliary storage devices in computer systems. (©) Describe three components of the central processing unit (CPL) of a computer. (4 marks) (6 marks) 0 marks) ADI & CD14 Page 1 Out of2 QUESTION FIVE a) Explain four factors 10 eons ler when buying a computer (8 marks) (b) With the aid of diagram, describe the following types of network topologies: Bus. G marks) i) Star (GB marks) iii) Ri G marks) (iv) Mesh, marks) 0 marks) QUESTION SIX (a) Highlight four uses of information communication technology (ICT) in the health sector. (4 marks) tb) (2)__List four types of paragraph alignment used in a presentation program. (4 marks) ii) State three ways of iting overflowing word processing content on a single page. (3 marks) (Gil) Highlight five advantages of using word processor. (5 marks) (©) Outline four computing tools designed to facilitate online personal interaction, (4 marks) (Total: 20 marks) QUESTION SEVEN (@)_— Highlight six reasons for changing from manual to computerised systems, (6 marks) (b) Distinguish between “count function” and "sum function” as used in a spreadsheet (4 marks) (©) Explain five components of an information system. (10 marks) (Total: 20 marks) ADI4 & CD14 Page 2 Out of 2 KASNEB ATD LEVEL DCM LEVELI INFORMATION COMMUNICATION TECHNOLOGY WEDNESDAY: 18 November 2015. ‘Time Allowed: 3 hours. ‘Answer any FIVE questions. ALL questions carry equal marks. QUESTION ONE (@) List four household appliances that use computer control system. (4 marks) (b) Highlight six uses of information communication technology (ICT) in the entertainment industry. (6 marks) (©) _ Distinguish between “serial port” and “parallel port” computer interfaces, (4 marks) (d) Explain three disadvantages of having computers networked in an organisation. (6 marks) (Total: 20 marks) QUESTION TWO (@) (i) Describe the purpose of a search engine. (2 marks) i) State two examples of popular internet search engines. (2 marks) (b) Highlight two disadvantages of @ multi-user operating system. (4 marks) (©) Explain the following terms as used in information security ()Ficewal (2 marks) co) (2 marks) (@ Giving an example in each case, distinguish between “system software” and “application software" (6 marks) (2) State two commonly used computer input devices. (2 marks) otal: 20 marks) QUESTION THREE (a) State two advantages of using a memory stick as a data storage device, (2 marks) (b) Differentiate between “hardware” and "software" as used in computer systems, (4 marks) (©) Giving an example in each case, state three criteria of classifying operating systems. (6 marks) (@) Explain three advantages of secondary storage devices of a computer. (6 marks) (©) Identify (vo limitations of a computer. (2 marks) (Total: 20 marks) QUESTION FOUR (@) Highlight four security threats to an information system. (4 marks) (b) Distinguish between “open source software” and “proprietary software". (4 marks) (©) Outline four benefits of using e-commerce in a business. (4 marks) ADI4 & CD14 Page 1 Out of 2 @ © 0 Explain two ways in which the size of a file could influence the choice of the file processing method. Outline three characteristics of microcomputing technology. Highlight three access permissions that could be assigned to file QUESTION FIVE (@) Highlight four benefits of using social networking sites as a means of communication, (b) Describe the three buses in a computer system unit, (©) List four advantages of a presentation software. (® Differentiate between “word processor” and “spreadsheet” applications. (©) Outline two data formats available in spreadsheets QUESTION six (@) Highlight four symptoms of @ computer infected by a virus. (b) Explain three roles of internet service providers (ISPs). (©) Outline three disadvantages of star topology network. (2) Describe three advantages of computerised accounting software, (©) Differentiate between “absolute referencing” and “relative referencing” as used in a spreadsheet QUESTION SEVEN @ ©) © @ Explain the function ofthe following devices in Information Communication Technology (ICT (Optical Character Reader (OCR). Gil) Magnetic Ink Character Reader (MICR). (iii) Barcode reader, (2 marks) (3 marks) (3 marks) (Total: 20 marks) (4 marks) (6 marks) (4 marks) (4 marks) (2 marks) (Total: 20 marks) (4 marks) (6 marks) (3 marks) (3 marks) (4 marks) (Total: 20 marks) (2 marks) (2 marks) (2 marks) Explain three disadvantages associated with outsourcing of Information Communication Technology (ICT) services Highlight four reasons for backing up data Distinguish between “Wi-Fi" and “Hotspot” as used in computer networks, Abt Out (6 marks) (4 marks) (4 marks) (Total: 20 marks) 4 & CD14 Page 2 of? KASNEB ATD LEVEL DCM LEVELI INFORMATION COMMUNICATION TECHNOLOGY PILOT PAPER September 2015. ‘Time Allowed: 3 hours. Answer any FIVE questions. ALL questions carry equal marks. QUESTION ONE (@) Using a well labelled diagram, describe the flow of data, instructions and commands in a computer system, (7 marks) (©) Highlight five factors that determine the processing power of a computer. (5 marks) (©) Distinguish between an “application sofware” anda “system softwar marks) (6) Identify two characteristics of (First generation computes. (2 marks) it) Second generation computes. (marks) (ili) Third generation computers (marks) (Total: 20 marks) QUESTION TWO (@) Outline five functions of an operating system. (5 marks) (©) Distinguish between: (“DVD-RAM and “CD-RW” (4 marks) (ii) “Viral memory” and “eache memory” (4 marks) (6) Outline three methods of e-payments marks) (2) State fouradvantages of using a database system rather than conventional file approach (4 marks) (Total: 20 marks) QUESTION THREE (a) Describe three types of messaging systems. (3 marks) (b) Outline four models of e-commerce. (4 marks) (©) Explain the meaning of the following expressions: (i) Assembly language is machine oriented. (2 marks) Gi) High level languages are problem oriented. (2 marks) ii) Fourth generation languages are non-procedural languages. (2 marks) (d) List the characteristics of the following information systems: (i) Transaction processing systems. G marks) ADI4 & CD14 Pilot Paper Page I Out of 3 Gi) Decision support systems. (2 marks) Git) Executive support systems. (2 marks) (Total: 20 marks) QUESTION FOUR (2) Explain the controls listed below as used in computer systems: @ Audit ural. (2 marks) Gil) Biometric controls. (2 marks) (ii) Encryption, 2 marks) Civ) Digital signature. (2 marks) () Back-up. (2 marks) (b) Outline five features of an accounting software. (S marks) (©) Highlight five reasons why an organisation may opt to set up @ computer network. (5 marks) (Total: 20 marks) QUESTION FIVE (@) Describe two features of each of the following application softwares: (Word processing (marks) (ii) Spreedsheets. (2 marks) (ii) Database package marks) (b) Outline four factors ro consider when choosing/designing the methods of file organisation, 4 marks) (6) Highlight two factors to consider when acquiring a computer software. (2 marks) (4) Examine three ways in which the intemetcan be useful toa business. Grmarks) (c) __ Identify five factors to consider in the selection of data transmission media. (5 marks) (Total: 20 marks) QUESTION six (a) Distinguish between the following terms: (Internet and intranet. (4 marks) (i) Internet browser and protocol. (marks) (b) List two advantages of teleworking to an employee. (2 marks) (©) In the context of computer files, explain the relationship between hit rate, method of file orgar and type of storage media, (6 marks) (4) Describe the purpose of the following computer network devices: (Frontend processor. (2 marks) Gi) Multiplexer (2 marks) (Total: 20 marks) ADI4 & CD14 Pilot Paper Page 2 Out of 3 QUESTION SEVEN @ () © @ Outline four factors to consider in the acquisition of an operating system. Describe two utility softwares. (marks) (4 marks) Describe three benefits which would accrue to a company as a result of having a computerised stock control system. Distinguish between data workers and knowledge workers. (6 marks) (6 marks) ADI4 & CD14 Pilot Paper Page 3 Out of 3

You might also like