0% found this document useful (0 votes)
117 views137 pages

ICT Topical Revision Kit

The document provides a revision kit for the Information Communication Technology (ICT) Foundational Level exam, covering 11 topics related to ICT. It includes questions and detailed solutions for each topic, ranging from introductions to ICT and computer systems to emerging issues and trends in technology. The document aims to help exam candidates prepare for the ICT section of the Certified Public Accountant (CPA) and Certified Secretary (CS) exams administered by KASNEB.

Uploaded by

tajeuleseni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views137 pages

ICT Topical Revision Kit

The document provides a revision kit for the Information Communication Technology (ICT) Foundational Level exam, covering 11 topics related to ICT. It includes questions and detailed solutions for each topic, ranging from introductions to ICT and computer systems to emerging issues and trends in technology. The document aims to help exam candidates prepare for the ICT section of the Certified Public Accountant (CPA) and Certified Secretary (CS) exams administered by KASNEB.

Uploaded by

tajeuleseni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 137

KASNEBNOTES REVISION KIT - ICT

INFORMATION COMMUNICATION TECHNOLOGY

CPA
CS

FOUNDATIONAL LEVEL

REVISION KIT

KASNEBNOTES REVISIONKITS Page 1


KASNEBNOTES REVISION KIT - ICT

TABLE OF CONTENTS PAGE

QUESTIONS
Topic 1 Introduction to ICT 3
Topic 2 Computer systems 5
Topic 3 Computer hardware 8
Topic 4 Computer software 11
Topic 5 Introduction to operating systems 13
Topic 6 Computer files 15
Topic 7 An overview of application packages 17
Topic 8 An overview of information systems 20
Topic 9 Computer networks 24
Topic 10 The internet 28
Topic 11 Emerging issues and trends 30

SOLUTIONS
Topic 1 Introduction to ICT 31
Topic 2 Computer systems 38
Topic 3 Computer hardware 45
Topic 4 Computer software 56
Topic 5 Introduction to operating systems 61
Topic 6 Computer files 73
Topic 7 An overview of application packages 80
Topic 8 An overview of information systems 91
Topic 9 Computer networks 106
Topic 10 The internet 123
Topic 11 Emerging issues and trends 134

KASNEBNOTES REVISIONKITS Page 2


KASNEBNOTES REVISION KIT - ICT

TOPIC 1
INTRODUCTION TO ICT
QUESTION 1
(a) (i) Define the term "computerisation"'
(ii) Identify four benefits of computerisation to an organisation.

QUESTION 2
a) Explain three demerits of computerizationon
b) Outline five methods of entering data into a computer system

QUESTION 3
a) Demonstrate briefly how introduction of information technology could affect the following:
i. Products and services
ii. Production economics.
iii. Buyers.
iv. Suppliers.
v. Substitute products.
vi. Competitors.

QUESTION 4
a) (i) Briefly explain four approaches to computing in an organisation
(ii) Give one advantage and one disadvantage of each of the approaches explained in (b) (i)
above

QUESTION 5
a) Explain two ways in which the use of information communication technology (ICT) is
managed by organisations.
b) Information communication technology (ICT) can be categorized into two broad
products; traditional computer-based technologies and digital data communication
technologies.
Required
i. Using suitable examples highlight six traditional office applications of ICT.
ii. Briefly describe three specialized applications of ICT.
iii. Differentiate between "internal networks" and "external networks" as used in digital data
communication.

KASNEBNOTES REVISIONKITS Page 3


KASNEBNOTES REVISION KIT - ICT

QUESTION 6
Briefly describe the concepts of downsizing as used in computer technology.

QUESTION 7
Your managing director has requested you to assist in preparing a presentation on the impact of
information communication technology (ICT) in your country.

Required:
Identify how the development of ICT has impacted on any four industries in your country.

KASNEBNOTES REVISIONKITS Page 4


KASNEBNOTES REVISION KIT - ICT

TOPIC 2

COMPUTER SYSTEMS
QUESTION 1
Highlight six characteristics of a computer system

QUESTION 2
Briefly describe five characteristics of computer memory

QUESTION 3
(a) (i) Describe the specific technological developments in each of the five computer generations,
(ii) Highlight three devices that contributed towards evolution of computers

QUESTION 4
(a) Write the following acronyms in full:

i. HDD.
ii. Kbps.
iii. HDMI
iv. P2P

QUESTIONS 5
a) Describe four characteristics of fifth generation computers.

QUESTION 6
a) A computer was purchased with the following specification

A Intel ® Core™ 2Quad Q8200 (4MB L2, 2.33 GHZ)


B Genuine Windows Vista ® Home Premium Edition
C 20" HD Widescreen
D 16XDVD+/-RW Drive
E 3 GB DDR2 SDRAM at 800 MHZ
F 500GB Serial ATA

Required:
Match the appropriate letter with the corresponding description of the computer above:
i. Operating system
ii. Main memory.
iii. Optical storage.

KASNEBNOTES REVISIONKITS Page 5


KASNEBNOTES REVISION KIT - ICT

iv. Secondary storage.


b) Using the information provided in (a) above state the following:
i) Size of the monitor
ii) Processor speed
iii) Type of hard drive interface.
iv) Meaning of "RW" in specification D

QUESTION 7
Kepha Kaunda has installed a note book computer Y and a desktop computer X to form a local
area network (LAN) connecting to the internet through a 10 Megabite (MB) broadband
connection in his bedroom. The configurations on the computers are as follows
Notebook Y Desktop X
CPU Ml73 GHZ P43GHZ
2MB 2MB
RAM 256MB 512 MB
1011 00 LAN and 54 M 1011 00 LAN card
wireless card

Required .
i. Kepha Kaunda wants to connect an external digital video disk (DVD) writer to desktop X
State two different types of external DVD drives and briefly describe how Kepha Kaunda
could install DVD writer to each of the external DVD drives
ii. ' hr desktop X, the size of the cache is smaller than that of the random access memory
(RAM)
iii. Briefly explain what Kepha Kaunda should do to enhance the performance of desktop X
iv. Identify six factors that might affect the connectivity of desktop X and note book Y in the
LAN

QUESTION 8
A sales person will be giving a multimedia presentation to a large gffiup of people in an
exhibition using a laptop computer
Required
i. Briefly describe typical features of a laptop computer
ii. Highlight four extra devices that may be needed for presentation and state the purpose of
each

QUESTION 9
a) Describe three types of computers according to their structure speed and architecture.
b) Briefly explain the purpose of each of the following elements of a computer system:
i) The system bus.
ii) The motherboard.

KASNEBNOTES REVISIONKITS Page 6


KASNEBNOTES REVISION KIT - ICT

iii) The video card.


QUESTION 10
Define the term "computer system".

QUESTION 11
a) While reading a computer magazine, Mr. Luka Ongeri came across the following
specification of a personal compiler (PC) system: ■**
"Pentium IV 3.0 GHZ, 1GB RAM, 150 GB LID and 17" TFT Monitor".

Explain the meaning of the above specification.

KASNEBNOTES REVISIONKITS Page 7


KASNEBNOTES REVISION KIT - ICT

TOPIC 3

COMPUTER HARDWARE
QUESTION 1
A friend has approached you for advice on the purchase of a new computer. He wishes to use the
computer to edit video clips taken on his video camera, play games, email friends and family and
write his college work.
Required:
Advise the friend on:

a) The best specifications for the following hardware:

i. RAM.
ii. Processor.
iii. Secondary storage.
iv. Internet connection

b) Four items of commercial software that would be required in order to accomplish the
tasks described above.

c) Four types of input devices required, stating the role of each device.

QUESTION 2
Define the term "primary storage" in the context of computing.

QUESTION 3
Explain the following computer hardware and software specifications:

i. Intel ® Core (TM) is 650@ 3.20 GHz 3.33GHz


ii. 2.00GB (1.87 GB usable)
iii. TFT 17” Lenovo. -

QUESTION 4
(a) (i) Defme the term “optical storage media”.
(ii) Explain four types of optical storage media.

QUESTION 5
(a) Describe four output devices that could be found in a television broadcasting station

KASNEBNOTES REVISIONKITS Page 8


KASNEBNOTES REVISION KIT - ICT

QUESTION 6
a) Describe the following hardware devices:
(i) Memoiy stick.
(ii) Plotter.

QUESTION 7
a. (i) Explain the use of two equipment’s used during videoconferencing,
(ii) Highlight two advantages of videoconferencing to an organisation.

b. Briefly describe the following types of computer hardware:

i. Video graphic array splitter.


ii. System unit.
iii. Universal serial bus port.

QUESTION 8
a) Describe the following characteristics of computer "memory
i. Mutability
ii. Accessibility
iii. Addressability
iv. Volatility

QUESTION 9
a) Explain the two main reasons why the following types of memory are used for certain
functions in a computer:

i. Random access memory (RAM).


ii. Read only memory (ROM).
b) Identify three local area network (LAN) connecting devices.

c) Distinguish between "serial" and "parallel" processing.

d) Briefly explain three benefits of secondary storage.

QUESTION 10
a) Highlights six hardware devices found inside the computers’ system unit.
b) Briefly describe four classifications of printers based on their technology

KASNEBNOTES REVISIONKITS Page 9


KASNEBNOTES REVISION KIT - ICT

QUESTION 11
State three types of computer keyboards

QUESTION 12
Briefly explain the functions of the following peripheral devices of a computer system
i. Webcam
ii. Head set
iii. Joystick

QUESTION 13
a) Distinguish between the following terms in the context of information communication
technology (ICT):

i. Workstation and server.


ii. Light pen and digitizer.

b) Highlight the benefits of secondary storage in data management.

QUESTION 14
Examine five functions which are performed by computer hardware devices.

QUESTION 15
A personal computer (PC) uses a number of different connectors or ports to connect to peripheral
devices such as a printer.

Outline how each of the following connectors or ports work:


i. Serial port.
ii. Parallel port.

QUESTION 16
Discuss the factors that determine the processing power of a computer.

QUESTION 17
a) Printers can be classified as either impact or non-impact.
i) Briefly explain the differences between impact printers and non-impact printers.
ii) State die type of printer that an organisation which prints customer invoices would
prefer..
b) Highlight four factors which could be considered by an organisation when selecting a
data input device.

KASNEBNOTES REVISIONKITS Page 10


KASNEBNOTES REVISION KIT - ICT

TOPIC 4

COMPUTER SOFTWARE
QUESTION 1
Explain the following computer hardware and software specifications:

iv. LinuxMint II.


v. LibreOffice Impress

QUESTION 2
(ii) Systems software and applications-software.

QUESTION 3
a) Outline four examples of computer utility programs,
b) Briefly discuss four1 factors to be considered when, selecting open source software.

QUESTION 4
a) (!) Briefly explain the term "machine level programming language".
(ii) State two advantages and three disadvantages of a machine level programming language.

QUESTION 5
People who use modern general purpose computers usually observe three layers of computer
software performing a variety of tasks
Identify and briefly describe the three layers of computer software as usually observed by
general purpose computer users

QUESTION 6
The following diagram gives an overview of computer software:

KASNEBNOTES REVISIONKITS Page 11


KASNEBNOTES REVISION KIT - ICT

Required:
b) Identify two examples of each of the following computer software’s:
i. General purpose application programs.
ii. Application specific programs.
iii. System management programs.
iv. Systems development programs.
pro

QUESTION 7
A systems developer requires a range of software utilities.
Required:
Define the term "software utility" and describe three types of software utilities.

QUESTION 8
Mr. Charles Midika operates a computer bureau which specializes in preparing customers'
curriculum vitae (CVs) and in developing and printing organizations’annual reports.
Required:
Identify four features of computer software which would be suitable for Mr. Charles Midika's
bureau.

QUESTION 9
Fourth generation languages (4GL’s) consist of a variety of software tools which enable end
users to .develop software applications with minimal or no technical assistance or that enhance
the productivity of professional programmers.
Required:
Describe the features of 4GLs which make them to be preferred by programmers for application
development.

KASNEBNOTES REVISIONKITS Page 12


KASNEBNOTES REVISION KIT - ICT

TOPIC 5

INTRODUCTION TO OPERATING SYSTEMS


QUESTION 1
a) Define the following terms as used in computer networks

i. Unguided media.
ii. Router.
iii. Network interface card
iv. Hot Spot
v. Wi-Fi

b) Explain five hardware factors to consider when acquiring an operating system

QUESTION 2
i. Multitasking and single tasking operating system
ii. old booting and warm booting

QUESTION 3
Distinguish between the following terms as used in the context of information technology:

i) Closed source and-open source operating systems,


ii) Beta and integrated software,

QUESTION 4
Explain how operating systems create an impression of doing several jobs at the same time.

i) Define the term "real-time processing system".


ii) State two examples of real-time processing systems
iii) Define the term "backup media"
iv) Describe three examples of backup devices which are currently in use.

QUESTION 5
a) (i) State three activities that take place during computer booting process.
(ii) Identify three features of a Basic Input/output system,

QUESTION 6
Identify five activities of tin operating system in regard to file management

QUESTION 7
a) Briefly describe five types of operating systems.
b) Highlight ten tasks performed in the creative stage of systems development life cycle.

KASNEBNOTES REVISIONKITS Page 13


KASNEBNOTES REVISION KIT - ICT

QUESTION 8
a) Briefly explain six functional areas Served by a computer operating system.
b) Outline six activities undertaken during the information system implementation and
evaluation stage.
c) Highlight eight situations in a typical, office environment where connection between
computing devices might be required.

QUESTION 9
a) The operating system primarily provides services for running applications on a computer
system Briefly discuss the need for an operating system

QUESTION 10
The operating system acts as the resource manager of a computer system
Highlight four functions which are performed by an operating system in managing a computer
system's resources.

QUESTION 11
Briefly describe the following types of operating systems:

i) Real time operating systems.


ii) Multi-user operating systems.

QUESTION 12
Mr. Jackson Wabengo, the information communication manager of Vijana Enterprises Ltd.
intends to change the operating system platform in his organisation. He intends to embrace open
source platforms in order to save the cost of annual licenses.

Required:
i) Define the term "open source platform".
ii) Briefly explain three advantages of open source platforms.

QUESTION 13
In the context of a computerised environment:

i) Define the term "operating system".


ii) Describe four major functions of a computer operating system.

KASNEBNOTES REVISIONKITS Page 14


KASNEBNOTES REVISION KIT - ICT

TOPIC 6

COMPUTER FILES
QUESTION 1
Citing a suitable application in each case, briefly explain the following types of computer files
i. Master file.
ii. Transaction file.

QUESTION 2
Explain the following methods of organising computer file:

i. Sequential file organisation.


ii. Hash access file organisation.

QUESTION 3
Describe three file access methods

QUESTION 4
Explain three reasons why it is important to manage computer files

QUESTION 5
Identify five types of file extensions

QUESTION 6
Briefly explain four types of computer files.

QUESTION 7
a) Explain three types of computer files organisation.
b) List three advantages of direct file access method.

QUESTION 8
a) Describe four aspects of file design that should be considered for a file in which
performance has high priority.
b) Outline four differences between a file system and a database management system.

QUESTION 9
Highlight the criteria used to determine computer file organization

QUESTION 10
Briefly explain the features of the following- file system

i) Disk file system


ii) Network file system
iii) Flash file system
iv) Special purpose file system

KASNEBNOTES REVISIONKITS Page 15


KASNEBNOTES REVISION KIT - ICT

QUESTION 11
Describe the following methods of organizing computer files:

i) Sequential file organisation.


ii) Line-sequential file organisation.
iii) Indexed-sequential file organisation.
iv) Direct or hashed access file organisation

QUESTION 12
Briefly explain any three types of media used for data storage

KASNEBNOTES REVISIONKITS Page 16


KASNEBNOTES REVISION KIT - ICT

TOPIC 7

AN OVERVIEW OF APPLICATION PACKAGES


QUESTION 1
The screenshots shown below have been captured from various application packages.
Screenshot 1

Screenshot 2

Screenshot 3

Screenshot 4

KASNEBNOTES REVISIONKITS Page 17


KASNEBNOTES REVISION KIT - ICT

Required:
a) Identify the type of application package from which the screenshots 1 to 4 have been
captured.
b) Describe the application of each of the packages identified in (i) above.

QUESTION 2
Highlight two uses of each of the following application packages in business:

i) Presentation program,
ii) Database program,
iii) Spreadsheet program,

QUESTION 3
a) Outline four major steps/or mail merging a document in word processing.

a) Explain three advantages of a centralized database.

QUESTION 5
Briefly explain five features of a spreadsheet package.

QUESTION 6
a) (i) Define a presentation program.
(ii) Highlight two major components of a presentation program.

QUESTION 7
a) Outline six data processing operations in an organisation

QUESTION 8
a) State three common factors to consider in selecting a data processing method.
b) Briefly explain the five stages of data processing.

QUESTION 9
a) i) Define the term "data processing"
ii) Briefly describe four types of data processing methods

b) Identify six facilities which are required by data processing applications

QUESTION 10
Modern accounting software packages are designed to simplify and automate complex manual
financial management processes and improve the accessibility, accuracy and timelines of
financial data
Discuss the key features and capabilities of accounting software packages which enable
organizations to simplify and automate financial management processes

KASNEBNOTES REVISIONKITS Page 18


KASNEBNOTES REVISION KIT - ICT

QUESTION 11
A new database is being designed for Joka Enterprises

i) Outline five major steps that should be undertaken during the design process
ii) Identify any three advantages of databases over the traditional file systems

QUESTION 12
Data are raw facts which are further processed into useful information.
Required:

i) Identify data generated in a purchasing transaction.


ii) Briefly explain five main uses of information to a business organisation.

QUESTION 13
List seven application packages of a computer system,

QUESTION 14
Explain the meaning of the following terms in the context of computerised data processing:

i) End user computing.


ii) Electronic data interchange.
iii) Data warehouse.
iv) Information centers

KASNEBNOTES REVISIONKITS Page 19


KASNEBNOTES REVISION KIT - ICT

TOPIC 8

OVERVIEW OF INFORMATION SYSTEMS


QUESTION 1
(a) Management information systems are designed to provide information needed for decision
making at different levels of management. Enumerate six main characteristics of
management information systems.
(b) In relation to the following factors, argue the case for or against the use of online technology
in a business enterprise:

i. Cost.
ii. Security.
iii. Reliability.
iv. Time taken to complete transactions

(c) Citing examples explain the following key concepts of information security:
i. Confidentiality.
ii. Integrity.
iii. Availability.

QUESTION 2
Describe six guidelines for managing computer passwords.

QUESTION 3
(a) Distinguish between the following terms:

(i) Data security and systems security.

QUESTION 4
Discuss the evolution of information systems.

QUESTION 5
b) (i) Highlight four benefits of office automation systems.
(iii) Explain four characteristics of information that is suitable for decision making.

c) Briefly explain four applications of cloud computing.

QUESTION 6
a) (i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.

KASNEBNOTES REVISIONKITS Page 20


KASNEBNOTES REVISION KIT - ICT

QUESTION 7
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.

QUESTION 8
a) Outline three functions of an organisation that could be automated.
b) Briefly, describe how a computer system could be modified for use by physically challenged
persons

QUESTION 9
Briefly explain the following terms:

i. Uniform Resource Locator.


ii. Cloud computing.

QUESTION 10
a)
(i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company might face when implementing a new
knowledge management system

QUESTION 11
For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:

i. Operator error.
ii. Hardware malfunction,
iii. Software bugs.
iv. Data errors.
v. Accidental disclosure of information.
vi. Theft.
vii. Vandalism and sabotage. .

QUESTION 12
a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly explain six needs of the executive which an EIS is able to address.
c) Briefly describe four structural elements of a computer system.

QUESTION 13
Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based

KASNEBNOTES REVISIONKITS Page 21


KASNEBNOTES REVISION KIT - ICT

services. However, without adequate end point security practices in place, many enterprises
are exposed to both external and internal threats that could cripple their operations.

Identify the end point security threats to small and micro-business enterprises,

QUESTION 14
Explain four security concerns that personal computer users face in an organization

QUESTION 15
a) i) Define the term "information systems
ii) State five types of information systems

b) As the information system manager of a company whose operations are highly automated,
you have noticed that a large number of employees are suffering from occupational over-use
syndrome otherwise known as repetitive strain injury (RSI)

Identify four measures that you could adopt in order to minimize occupational over-use
syndrome

QUESTION 16
a) Organizations individual use different types of information systems for different purposes.
Describe the characteristics of the following information systems:

i) Transaction processing systems (TPS).


ii) Sales and marketing systems.

QUESTION 17
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.

QUESTION 18
a) Outline five types of information systems

QUESTION 19
a) Identify three vital services which information systems can provide to a business organization.

QUESTION 20
a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
a) Name six threats to an organization’s information system that could arise as a result of
computer crime.

QUESTION 21
a) Differentiate between information systems (IS) and information technology (IT).
b) Write short notes on the following types of information systems:

KASNEBNOTES REVISIONKITS Page 22


KASNEBNOTES REVISION KIT - ICT

i) Transaction processing systems.


ii) Decision support systems
iii) Knowledge management systems.
iv) Office automation systems,

QUESTION 22
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.

Required:
Describe five types of general information systems controls.

KASNEBNOTES REVISIONKITS Page 23


KASNEBNOTES REVISION KIT - ICT

TOPIC 9

COMPUTER NETWORKS
QUESTION 1
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.

QUESTION 2
(a) With the aid of diagrams, briefly explain the following computer network topologies:

(i) Star network topology.


(ii) Ring network topology.
(iii) Tree network topology.

b) State an advantage and a disadvantage of each of the network topologies in (a) above

QUESTION 3
(a) (i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices

QUESTION 4
ii) Explain three modes of data communication and their practical use,

QUESTION 5
a) (i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.

QUESTION 6
Briefly discuss four advantages of the virtual private network.

QUESTION 7
a) (i) State one end device used in computer networks.
(ii) Explain five intermediary devices used in computer networks.
.
QUESTION 8
a) (i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.

QUESTION 9
a) Distinguish between data privacy and data security,
a) Outline three countermeasures to information security threats,

KASNEBNOTES REVISIONKITS Page 24


KASNEBNOTES REVISION KIT - ICT

QUESTION 10
a) (i) Define the terra "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.

QUESTION 11
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse sales data but suspects that her home
computer might.be infected by computer viruses.

Required:
i) Illustrate any four unusual events that could alert Joyce Kubo of possible computer virus
infection.
ii) Suppose after completing her analysis, Joyce Kubo prepares her results in PDF file format
and posts them to the company's website.
Briefly explain two reasons why Joyce Kubo could prefer the PDF file format.
iii) Suppose Joyce Kubo intends to display her results using a presentation package.
Describe four precautions which Joyce Kubo should observe when putting text in
presentation.

QUESTION 12
a) i) Briefly explain the graphical user interface (GUI) %
ii) State two reasons why a GUI is considered easier to use than a command line interface

QUESTION 13
Identify nine basic computer network configurations

QUESTION 14
Outline five factors that determine the processing power of a computer.

QUESTION 15
a) Briefly describe three types of computer networks.
b) Distinguish between synchronous and asynchronous data transmission modes.

QUESTION 16
a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single website.

Required
i) Define the term “Protocol”
ii) Describe any four protocols used in the World Wide Web.
iii) Outline four ways of accessing web pages.

KASNEBNOTES REVISIONKITS Page 25


KASNEBNOTES REVISION KIT - ICT

QUESTION 17
Data can be communicated from one terminal to another or to the central computer through
different data communication media.

Briefly describe four data communication media.

QUESTION 18
Transmission of data over computer networks raises certain security concerns.

Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.

QUESTION 19
Describe the type of computer network topologies represented by the following diagrams;

KASNEBNOTES REVISIONKITS Page 26


KASNEBNOTES REVISION KIT - ICT

QUESTION 20
a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client

Required:

i) Identify four network devices that he would use in setting up the LAN.
ii) State six advantages of a LAN.

b) Expound the following acronyms as used in computing:

i) TCP.
ii) FTP.
iii) HTTP.
iv) HTML.
v) WWW.
vi) IP.

QUESTION 22
There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication systems over analog data
communication systems.

KASNEBNOTES REVISIONKITS Page 27


KASNEBNOTES REVISION KIT - ICT

TOPIC 10

THE INTERNET
QUESTION 1
(a) Briefly describe the flowing terms in relation to computer networking
i. Intranet. .
ii. Extranet,
iii. Global system for mobile (GSM) communication.
iv. Bluetooth.

(b) Explain the role of interface message processor (IMP) in a computer network.

QUESTION 2
In relation to internet technology, briefly describe the importance of each of the following:

i. Web server.
ii. Web browser.
iii. HTML.
iv. Cyber cafe

QUESTION 3
Highlight four functions of an internet service provider (ISP)

QUESTION 4
(a) Describe the following e-commerce terms:

i) Business to business (B2B)


ii) Business to government ( B2G)
iii) Customer to customer (C2C)

(b) Highlight four social-economic challenges brought about by the rapid advancements in
internet technology.

(c) "The practice of telecommuting has ensured that there exists a thin line between work,,
family and leisure". In relation to the above statement, evaluate the merits and demerits of
telecommuting.

QUESTION 5
Describe three resources which are necessary for connecting a computer to the internet.

QUESTION 6
Highlight four factors that determine the downloading speed of a We from a website

KASNEBNOTES REVISIONKITS Page 28


KASNEBNOTES REVISION KIT - ICT

QUESTION 7
a) (i) Highlight three roles of internet service providers (ISP).
(ii) State three examples of internet service providers in your country.

QUESTION 8
Explain four benefits of e-government.

QUESTION 9
Briefly explain the meaning of the following terms as used in the context of information sharing:
(i) Bandwidth.
(ii) Browsing.
(iii) User net newsgroup.
(iv) File transfer protocol.

QUESTION 10
The information and connectivity of the internet have unique characteristics.
Briefly explain four such characteristics.

QUESTION 11
You were recently employed by an internet service provider (ISP) company. Part of your work
involves training of users on internet applications
A new client has requested your company to conduct a research on internet applications and the
impact of the internet on people and society training programme. Your supervisor has assigned
you this task

Required
i) Outline five applications of the internet
ii) Briefly explain three impacts of internet on people as individuals and three impacts of
internet in society.

QUESTION 12
Electronic mail (e-mail) is one of the main applications of the internet.

Briefly describe three main types of e-mail services.

QUESTION 13
Examine the key factors which are essential to the success of a business to business (B2B) e-
commerce model.

QUESTION 14
The internet provides an array of capabilities for electronic communication that can help
companies reduce their communication costs.

Required:
Describe five internet services that could be used by companies for communication.

KASNEBNOTES REVISIONKITS Page 29


KASNEBNOTES REVISION KIT - ICT

TOPIC 11

EMERGING TRENDS IN INFORMATION


COMMUNICATION TECHNOLOGY
QUESTION 1
Briefly explain the use of virtual reality computing in the following fields:
(i) Military.
(ii) Education.
(iii) Medical.

QUESTION 2
Office automation and advancement in information communication technology are likely to have
a major impact on business efficiency and the working life of employees;-

i. Outline six types of office automation tools


ii. Examine five ways in which office automation may be used by management

KASNEBNOTES REVISIONKITS Page 30


KASNEBNOTES REVISION KIT - ICT

SUGGESTED SOLUTIONS

TOPIC 1
INTRODUCTION TO ICT
QUESTION 1

i. The definition of computerization involves the process of taking activities or tasks not
previously done on the computer and shifting them to being done on the computer.

ii. Benefits of computerisation in an organisation


 Response time is greatly reduced
 Very large data are stored for information and decision-making
 Accuracy of information is considerably improved, thereby improving the quality of
the decision
 Problems are handled more easily by using various operation research models
 The cost involved in the decision-making process is reduced
 More secrecy is observed as compared to manual file system

QUESTION 2

a) Demerits of computerisation

Unemployment

Different tasks are performed automatically by using computers. It reduces the need of people
and increases unemployment in society.

Wastage of time and energy

Many people use computers without positive purpose. They play games and chat for a long
period of time. It causes wastage of time and energy. Young generation is now spending a lot of
time on the social media websites like Facebook, Twitter etc or texting their friends all night
through smartphones which is bad for both studies and their health. And it also has adverse
effects on the social life.

KASNEBNOTES REVISIONKITS Page 31


KASNEBNOTES REVISION KIT - ICT

Data Security

The data stored on a computer can be accessed by unauthorized persons through networks. It has
created serious problems for the data security.

Computer Crimes

People use the computer for negative activities. They hack the credit card numbers of the people
and misuse them or they can steal important data from big organizations.

Privacy violation

The computers are used to store personal data of the people. The privacy of a person can be
violated if the personal and confidential records are not protected properly.

Health risks

The improper and prolonged use of computer can results in injuries or disorders of hands, wrists,
elbows, eyes, necks and back. The users can avoid health risks by using the computer in proper
position. They must also take regular breaks while using the computer for longer period of time.
It is recommended to take a couple of minutes break after 30 minutes of computer usage.

Impact on Environment

The computer manufacturing processes and computer waste are polluting the environment. The
wasted parts of computer can release dangerous toxic materials. Green computer is a method to
reduce tire electricity consumed and environmental waste generated when using a computer. It
includes recycling and regulating manufacturing processes. The used computers must be donated
or disposed off properly.

b) Methods of entering data into a computer system

 Typing
 By scanning
 Using voice recognition software
 Using digital cameras
 Using a Barcode readers

KASNEBNOTES REVISIONKITS Page 32


KASNEBNOTES REVISION KIT - ICT

QUESTION 3

How information technology could affect the following

Products and services: It improves the quality of products and services being rendered and
reduces cost of product and services,

Production economics; Speed up the production process because there is minimal time spent on
production reduces the wastage of raw materials.

Buyers; They are able to acquire knowledge of prices of products being offered by various
sellers hence enabling them to choose the most suitable product for their consumption in terms of
prices and quantity. Provides quick and convenient services to the buyers.

Suppliers: Due to introduction of Information Technology suppliers are now able to table out
the products offered and quoting the prices of each products in their website hence reducing the
cost of advertising in media and other sources interaction is enhanced between suppliers and
improves competition.

Substitute products: One is able to obtain the knowledge of how substitute products is doing in
the market and evaluate most appropriate time to deliver the substitute product in the market.

It may lead to production of counterfeit products.

Competitors: They are able to understand the activities of their competitors through their
websites as product prices hence coming up with a well-planned strategy that will outdo their
competitors in terms of profit or demand by the consumers. «•

Eliminates monopoly in the market,

QUESTION 4

a) i) Approaches of computing in an organisation

Convectional approach. This approach focuses on the information needs of individual


department on applications.

Data base approach. Single organised collection of structured data, stored within a minimum
duplicated data so as to provide a consistent control pool of data.

KASNEBNOTES REVISIONKITS Page 33


KASNEBNOTES REVISION KIT - ICT

ii) Advantages and disadvantages of the following approaches

Conventional approach

Advantage

Operational cost is low

Disadvantages

Lack of data security

Data base approach

Advantages

Ease in auditing

Disadvantages

Complex programmes environment

End User Computing

End User Computing (EUC) refers to systems in which non-programmers can create working
applications. EUC is a group of approaches to computing that aim at better integrating end users
into the computing environment

Advantages

User requirements are well captured.

Disadvantage

May not be applicable if the non-programmers do not have the programming knowledge

Work group computing

A workgroup is a collection of individuals working together on a task. Workgroup computing


occurs when all the individuals have computers connected to a network that allows them to send
e-mail to one another, share data files, and schedule meetings. Sophisticated workgroup systems
allow users to define workflows so that data is automatically forwarded to appropriate people at
each stage of a process.

KASNEBNOTES REVISIONKITS Page 34


KASNEBNOTES REVISION KIT - ICT

Advantages

Better decision making as there are many ideas

Disadvantages

Slow decision making due to many parties involves

QUESTION 5

a) Ways in which the use of information communication technology (ICT) is managed


organization
 Calculating Your Technology Budget - provides instructions for using a
downloadable Excel spreadsheet £ simple way to help you calculate your ICT
budget.
 Building Blocks of an IT Policy - explains briefly the elements and principles
which should underpin all decision IT
 Planning and Budgeting for IT Equipment - helps organizations plan for
equipment replacement and expel the importance of a purchasing plan

b) i) Six office application of ICT

Word processors: Write letters, reports, minutes, memos etc. e.g. MS Word

Presentation software: Making presentations either directly using a computer screen or data
projector etc. e.g MS PowerPoint.

Spread sheets: calculations, forecast models, graphs, analyse financial information e.g.
Microsoft Excel

Database management software: Managing data in many forms e.g. MS Access, Oracle,
Microsoft SQL Server

Communication software: Communication via email etc. e.g. MS Outlook

Desktop publishing: producing magazines, newsletters etc. e.g. Microsoft Publisher, Quark
Express.

Graphics software: Creating or editing images such as logos, drawings and picture used in
website or publications, develop graphs, illustration and drawings etc.' e.g. Adobe Photoshop and
Illustrator, Corel draw, Macromedia Freehand etc.

KASNEBNOTES REVISIONKITS Page 35


KASNEBNOTES REVISION KIT - ICT

ii) Three specialized applications of ICT

Computer Aided Design Application

Computer Aided Design (CAD) is the use of computers to assist the design process.-Specialized
CAD programs for many types of design: architectural, engineering, electronics, roadways

Accounting application

Manage an organization's accounts including revenues/sales, purchases, bank accounts etc. A


wide range of system available ranging from basic packages suitable for small businesses
through to sophisticated ones aimed at multinational companies, Packages for this include Sage,
Oracle, pastels and QuickBooks

Customer Relations Management (CRM) Application CRM software allows businesses to better
understand their customers by collecting and analyzing data on them as their product
preferences, buying habits etc. e.g. software applications that run

(iii) Difference between internal and external networks

 Internal networks

Usually referred to as a local area network (LAN) and it is a network in which computers and
peripheral devices are in close physical proximity. It is a collection of computers within a single
office or building that connect to a common electronic connection - commonly known as a
network backbone. This type of network typically uses microcomputers in a bus organization
linked with telephone, coaxial, or fibre-optic cable. A LAN allows all users to share hardware,
software and data on the network. Minicomputers, mainframes or optical disk storage

 External networks

Also referred to Wide Area Network (WAN), A WAN is a computer network that may be
countrywide or worldwide. It normally connects networks over a large physical area, such as in
different buildings, towns or even countries. The widest of all WANs is the Internet, which spans
the entire globs,

KASNEBNOTES REVISIONKITS Page 36


KASNEBNOTES REVISION KIT - ICT

QUESTION 6

Describing downsizing as used In computer technology

Downsizing is the creation of systems on a smaller platform than before. Although the term is
used very loosely, it essentially implies migration of a system or a set of systems from a
mainframe or minicomputer to a minicomputer or PC network respectively. This means that
downsizing is culturally in line with the business trend towards flatter, leaner organization.

QUESTION 7

How the development of (ICT) has impacted on any four industries

i. Information management: This is the management of information systems such as


planning, organizing controlling of system development methodologies: Organization
have benefited in areas such as acquiring customer information
ii. Communication: Time and cost saving e.g. use of email or messaging instead of post, use
of video conferencing instead of travelling to meetings.
iii. Trade: access to a larger and wider markets e.g. e-commerce, sale of goods via internet.
Website can be accessed from all parts of the world and orders can be taken and payment
processed by credit cards, bank transfer facility etc.
iv. Human resource: ICT has human resource systems that deal with recruitment, placement,
performance evaluation, compensation and career development of the firm's employees.
Such system are operational human resource information systems provide the manager
with data to support routine and repetitive human resource decisions and Tactical
information systems provide managers with support for decisions that emphasize the
allocation of resources

KASNEBNOTES REVISIONKITS Page 37


KASNEBNOTES REVISION KIT - ICT

TOPIC 2
COMPUTER SYSTEMS
QUESTION 1

Characteristics of a computer system

i. Input devices - components used for entry of data into the computer system such as
online terminals, scanners, plotters etc.

ii. Output devices - components used for display/output of processed data from the
computer system. These devices include VDU and printers

iii. Communication devices - components used for transmitting data between computers and
other electronic devices. They include such devises as modems

iv. Processing devices- components used to process data input into the system and transform
it into information. The CPU is the main processing component, which contains the ALU,
Control Unit and Registers. Primary memory can also be classified as a processing
component

v. Storage devices — components used for secondary storage of information such as tapes,
discs, CCD-ROMs, DVDs

QUESTION 2

Main characteristics of a computer memory

1. RAM (Random Access Memory) /RWM (Read Write Memory) - Also referred to as
main memory, primary storage or internal memory. Its content can be read and can be
changed and is the working area for the user. It is used to hold programs and data during
processing. RAM chips are volatile, that is, they lose their contents if power is disrupted.
Typical sizes of RAM include 32MB, 64MB, 128MB, 256MB and 512MB.

a. EDO - Extended Data Out

b. DRAM - Dynamic RAM

c. SDRAM - Synchronous

2. ROM (Read Only Memory) - Its contents can only be read and cannot be changed. ROM
chips is non-volatile, so the contents aren’t lost if the power is disrupted. ROM provides
permanent storage for unchanging data & instructions, such as data from the computer

KASNEBNOTES REVISIONKITS Page 38


KASNEBNOTES REVISION KIT - ICT

maker. It is used to hold instructions for starting the computer called the bootstrap
program.

ROM; chips, the contents, or combination of electrical circuit states, are set by the
manufacturer and cannot be changed. States are permanently manufactured into the chip.

PROM; the settings must be programmed into the chip. After they are programmed,
PROM behaves like ROM - the circuit states can’t be changed. PROM is used when
instructions will be permanent but they aren’t produced in large enough quantities to
make custom chip production (as in ROM) cost effective. PROM chips are, for example,
used to' store video game instructions.

Instructions are also programmed into erasable programmable read-only memory.


However, the contents of the clip can be erased and the chip can be reprogrammed.
EPROM chips are used where data and instructions don’t change often, but non-volatility
and quickness are needed. The controller for a robot arm on an assembly line is an
example of EPROM use.
1. PROM (Programmable Read Only Memory) - It is written onto only once using
special devices. Used mostly in electronic devices such as alarm systems.
2. EPROM (Erasable Programmable Read Only Memory) -Can be written onto more
than once.
3. Cache Memory - Cache memory is high-speed memory that a processor can
access more quickly than RAM. Frequently used instructions are stored in cache
since they can be retrieved more quickly, improving the overall performance of
the computer. Level 1 (LI) cache is located on the processor; Level 2 (L2) cache
is located between the processor and RAM.

QUESTION 3

(a) (i) Specific technological developments in each of the five computer generations.

First Generation Computers (1946 - 1957)

 Used vacuum tubes to construct computers.


 These computers were large in size and writing programs on them was difficult.
 The following are major drawbacks of First generation computers,
 The operating speed was quite slow.
 Power consumption was very high,
 It required large’space for installation,
 The programming capability was quite low.
 Cumbersome to operate - switching between programs, input and output

KASNEBNOTES REVISIONKITS Page 39


KASNEBNOTES REVISION KIT - ICT

Second Generation Computers (1958 - 1964)

 Replaced vacuum tubes with transistors.


 The transistor is smaller, cheaper and dissipates less heat than a vacuum tube.
 The second generation also saw the introduction of more complex arithmetic and logic
units, the use of high - level programming languages and the provision of system software
with the computer.
 Transistors are smaller than electric tubes and have higher operating speed. They have no
filament and require no heating. Manufacturing cost was also lower. Thus the size of the
computer got reduced considerably.
 It is in the second generation that the concept of Central Processing Unit (CPU), memory,
programming language and input and output units were developed. The programming
languages such as COBOL, FORTRAN were developed during this period.

Third Generation Computers (1965 - 1971)

 Had an integrated circuit.


 Although the transistor technology was a major improvement over vacuum tubes,
problems remained. The transistors were individually mounted in separate packages and
interconnected on printed circuit boards by separate wires. This was a complex, time
consuming and error-prone process.
 The early integrated circuits are referred to as small-scale integration (SSI). Computers of
this generation were similar in size, lower cost, larger memory and processing speed was
much higher.

Fourth Generation Computers (1972 - Present)

 Employ Large Scale Integrated (LSI) and Very Large-Scale Integrated (VLSI) circuit
technology to construct computers. Over 1,000 components can be placed on a single
integrated-circuit chip.

Fifth Generation Computers

 These are computers of 1990s


 Use Very Large Scale Integrated (VLSI) circuit technology to build computers. Over
10,000 components can be incorporated on a single integrated chip.
 The speed is extremely high in fifth generation computer. Apart from this it can perform
parallel processing. The concept of Artificial intelligence has been introduced to allow
the computer to take its own decision.

KASNEBNOTES REVISIONKITS Page 40


KASNEBNOTES REVISION KIT - ICT

(ii) Devices that contributed towards evolution of computers

 Microprocessor
 Storage devices
 Integrated Circuit

QUESTION 4

Write the following acronyms in full:

i) HDD.-Hard Disk.Drive

ii) Kbps- Kilobits Per Second

iii) HDM.I- High-Definition Multimedia Interface

iv) P2P- Peer-to-peer

QUESTION 5

Characteristics of fifth generation computers

 They are very fast and can be used for multiprocessing


 Use Very Large Scale Integrated (VLSI) circuit technology to build computers,
 Over 10,000 components can be incorporated on a single integrated chip.
 The speed is extremely high in fifth generation computer.
 It can perform parallel processing. The concept of Artificial intelligence has been
introduced to allow the computer to take its own decision.

QUESTION 6

a) Description of the computer specification

i) Operating system: B - Genuine Windows Vista (R) Home premium


ii) Main memory: E - 3GB, DDR 2 5D RAM at 800MHZ
iii) Optical storage: D -16x DVD +/- RW Drive ^
iv) Secondary Storage: F- 500GB Serial ATA

KASNEBNOTES REVISIONKITS Page 41


KASNEBNOTES REVISION KIT - ICT

b) State the following

i) Size of the memory: C - 20HD Wide Screen


ii) Processor Speed: A - Intel ® Core™ 2Quad Q8200 (4MB L2, 2.33 GHZ)
iii) Type of hard drive interface: F 500GB Serial ATA
iv) Meaning of RW in specification D: Rewritable

QUESTION 7

a) (i) Types of DVD drives

 DVD-R: Can write to a blank disc once and cannot be re-written. It is compatible with
most DVD players
 DVD-RW: Can be written and rewritten and is compatible with most DVD players
 DVD+RW: Can be written and rewritten to.

(ii) Since the cache memory cannot be increased, he can increase the size of RAM which
increases the size of the virtual memory.

(iii) Factors which may affect connectivity

- Incorrect software configuration


- Incompatible protocols
- Inadequate bandwidth allocation
- Large volume of data to be processed'
- System infection by viruses

QUESTION 8

i) Typical features of a laptop

- Keyboard on a laptop: The laptop’s keyboard is built into the body of the laptop unlike a
desktop where the keyboard is separate. It is smaller and the keys are closer together.
- Touchpad: laptops don’t have a mouse. They have a touch sensitive rectangular area in
front of the keyboard. One moves the fingers across the touch pad which causes the
cursor to move across the screen.
- Click button: There are two clickable buttons beneath or beside the laptop’s touchpad
which act like mouse buttons

KASNEBNOTES REVISIONKITS Page 42


KASNEBNOTES REVISION KIT - ICT

ii) Extra devices for presentation and purpose of each

- Audio and video cables: These are cables which connect the laptop and the projector
during presentation
- Projector and remote control;- The projector will project a video signal from the laptop.
- Remote control:- This is used to power the projector on and off and also used to navigate
through the various slides of the presentation
- Power Cords and power adapters which connects the projector and the laptop to the
power source .

QUESTION 9

a) Computer types

i) Supercomputers.

Supercomputers using custom CPUs traditionally gained their speed over conventional
computers through the use of innovative designs that allow them to perform many tasks in
parallel, as well as complex detail engineering.

They tend to be specialized for certain types of computation, usually numerical calculations, and
perform poorly at more general computing tasks. Their memory hierarchy is very carefully
designed to ensure the processor is kept fed with data and instructions at all times - in fact, much
of the performance difference between slower computers and supercomputers is due to the
memory hierarchy. Their 110 systems tend to be designed to support high bandwidth, with
latency less of an issue, because supercomputers are not used for transaction processing

The largest and most powerful. Used to process large amounts of data very quickly. Useful for
metrological or astronomical applications. Examples include Cray and Fujitsu

ii) Mainframe computers.

Large computers in terms of price, power and size. Require a carefully controlled environment
and specialist staff to operate them used for centralized processing for large commercial
organizations. Manufacturers include International Business Machine (IBM).

iii) Minicomputers.

Their size, speed and capabilities lie somewhere between mainframes and microcomputers. Used
as departmental computers in large organizations or as the main computer in medium-sized
organizations

Manufacturers of mini computers include IBM and International Computer Limited (ICL).

KASNEBNOTES REVISIONKITS Page 43


KASNEBNOTES REVISION KIT - ICT

b) Purpose of the computer system elements

(i) System bus

Is a single computer bus that connects the major components of a computer system. The
technique was developed to reduce costs and improve modularity. It combines the functions of a
data bus to carry information, an address bus to determine where it should be sent, and a control
bus to determine its operation

(ii) Motherboard

Is the central printed circuit board (PCB) in many modern computers and holds many of the
crucial components of the system, providing connectors for other peripherals. The motherboard
is sometimes known as the main, board, system board, or, on Apple computers, the logic board.

(iii) Video card

Is an expansion card which generates output images to a display. Most video cards offer various
functions such as accelerated rendering of 3D scenes and 2D graphics, MPEG-2/MPEG-4
decoding, TV output, or the ability to connect multiple monitors (multi-monitor).

QUESTION 10

1) Define the term computer system

A complete, working computer. Computer systems will include the computer along with any
software and peripheral devices that are necessary to make the computer function. Every
computer system, for example, requires an operating system.

QUESTION 11

Meaning of the specification “Pentium IV 3.0 GHZ, 1GB RAM, 150 GB HD and 17"TFT
Monitor”

Pentium TV:'” Processor model


3.0GHZ: Processor speed
1GB RAM: Random Access Memory Size
150 GB HD: Size of the Internal Hard Disc
17 "TFT Monitor: Size of the monitor

KASNEBNOTES REVISIONKITS Page 44


KASNEBNOTES REVISION KIT - ICT

TOPIC 3

COMPUTER HARDWARE
QUESTION 1
(a) Best specifications for the following hardware

i. RAM
RAM (Random Access Memory) /RWM (Read Write Memory) - Also referred to as main memory,
primary storage or internal memory. Its content can be read, and can be changed and is the working area
for the user. It is used to hold programs and data during processing. RAM ■ chips are volatile, that is,
they loose their contents if power is disrupted. Typical sizes of RAM include 32MB, 64MB, 128MB,
256MB and 512MB.
a) EDO - Extended Data Out
b) DRAM - Dynamic RAM
c) SDRAM – Synchronous

ii. Processor
Front end communication processors
Are the hardware devices that connect all network communication lines to a central computer to relieve
the central computer from performing network control, format conversion and message handling tasks.

iii. Secondary storage


DVD-ROM (Digital Video Disks) - They are similar to CDs except that it has high quality sound and
high-resolution video. Has a normal capacity of 4.7 GB and up to 17 GB if double-sided with double
layering. Uses laser technology. They are a relatively new technology usually used, in the entertainment
industry.

iv. Internet connection


A modem is a hardware device that converts computer signals (digital signals) to telephone signals
(analog signals) and telephone signals (analog signals) back to computer signals (digital signals).
The process of converting digital signals to analog is called modulation while the process of converting
analog signals to digital is called demodulation.

(b) Items of commercial software that would be required to accomplish the tasks described
above

i. Green screen wizard software


ii. Quilled photo express 4.0 software
iii. Computer program e-frontier Manga studio 3.0 debut software
iv. Sew what - pro embroidery project manager software

KASNEBNOTES REVISIONKITS Page 45


KASNEBNOTES REVISION KIT - ICT

c) Types of input devices required and their roles

i. A camcorder (formally a video camera recorder) is an electronic device that combines a video
camera and a video recorder into one unit; typically for out-of-studio consumer video
recording.
ii. A portable media player (PMP), or digital audio player (DAP), is a consumer electronics
device that is capable of storing and playing digital media such as audio, images, video,
documents, etc. the data is typically stored on a hard drive, microdrive, or flash memory
iii. A webcam is a video camera that feeds its image in real time to a cpmputer or computer
network.
iv. A game controller is a device used with games or entertainment systems to provide input to a
video game, typically to control an object or character, in the game.
v. A gamepad (also called joypad or control pad), is a type of game controller held in two hands,
where the fingers (especially, thumbs) are used to provide input,
vi. A paddle is a game controller with a round wheel and one or more fire buttons, where the
wheel is typically used to control movement of the player object along one axis of the video
screen

QUESTION 2

a) Primary storage, also known as main storage or memory, is the main area in a computer in
which data is stored for quick access by the computer's processor.

QUESTION 3

Explain the following computer hardware and software specifications:

i. Intel © Core (TM) is 650 3.20 GHz -processing speed of the computer
ii. 2.00GB (1.87 GB usabIe)-Memory capacity of the hardware
iii. TFT 17” Lenovo. — It is and LCD panel that applies a voltage across an LCD material
changes the alignment and light-polarising properties of its molecules so that they can be
used in conjunction with polarising filters to create an electronic shutter that will either
let 1 ight pass or stop it passing. Thus, the LCD display works by allowing different
amounts of white backlight through an active filter:

KASNEBNOTES REVISIONKITS Page 46


KASNEBNOTES REVISION KIT - ICT

QUESTION 4

(a) (i) Definition of the term "optical storage media".

Optical storage is any storage method in which data is written and read with a laser for archival
or backup purposes. Typically, data is written to optical media, such as CDs and DVDs. For
several years, proponents have spoken of optical storage as a near-future replacement for both
hard drives in personal computers and tape backup in mass storage.

Optical media is more durable than tape and less vulnerable to environmental conditions. On the
other hand, It tends to be slower than typical hard drive speeds, and to offer lower storage
capacities.

(11) Types of optical storage media.

CD-ROM

CD-ROM is a read-only format that is optimized for read performance, CD-ROMs are ideal for
wide- scale distribution of programs and data. The CD-ROM data format is identical to the one
that is used with personal computers. This makes it possible to develop CD-ROMs for use in
both personal computers and the system. You can read CD-ROMs in either a CD-ROM or DVD
drive.

DVD-ROM

DVD-ROM is a read-only format that provides a higher capacity than CD-ROM. Like CD-ROM,
DVD-ROMs are excellent for wide-scale distribution of programs and data. You can only read
DVD-

ROMs in a DVD drive.

DVD-RAM

DVD-RAM' is writable optical media that is available in both double-sided (Type I) and single-
sided (Type II) formats, ranging from 2.6 GB per cartridge to 9.4 GB per cartridge, Both types
can be accessed in a RAM drive, and Type II media can be read in a DVD-ROM drive when the
media is removed from the catridge.

Write-Once Read-Many (WORM) optical cartridges

WORM storage is an economical way to archive data, yet still have it quickly and easily
accessible. WORM media is available in lx (650 MB), 2x (1.3 GB), 4x (2.6 GB), 8x (5.2 GB),

KASNEBNOTES REVISIONKITS Page 47


KASNEBNOTES REVISION KIT - ICT

and 14x (9.1 GB or 8.6 GB) capacities. It is also available in 30 GB Ultra Density Optical
(UDO).

Erasable optical cartridges

An erasable cartridge offers the most flexibility with similar capabilities as magnetic storage.
Erasable media is available in lx (650 MB), 2x (1.3 GB), 4x (2.6 GB), 8x (5.2 GB), and 14x (9.1
GB or 8.6 GB) capacities. It is also available in 30 GB Ultra Density Optical (UDO).

QUESTION 5

Output devices that could be found in a television broadcasting station.

 Speaker
 T.V Monitor
 Teleprompter
 Headsets/Headphones
 Lapel mics
 Talk back system

QUESTION 6

Describe the following hardware devices

i. Memory stick: Removable flash memory card


ii. Plotter: This is a computer printer for printing vector graphics

QUESTION 7

a) i) Explain use of equipment’s used during videoconferencing Microphone: used to transmit


vocal sound to the people connected

Speakers: They are used to produce sound being communicated to the people connected in the
conference.

ii) Advantages of videoconferencing

Fast hence time saving i.e. use of video conferencing instead of travelling to meetings.

Cost saving: Organizations today have eliminated the administration cost such as stationery cost,
hiring halls where the conferences are to be held, travelling cost etc.

KASNEBNOTES REVISIONKITS Page 48


KASNEBNOTES REVISION KIT - ICT

b) Describe the following types of computer hardware

i. Video graphic array splitter: hardware devices that allows you to display computers
video signal enabled with VGA
ii. System unit: The system unit houses the processing components of the computer
system.
iii. Universal serial bus port: is a serial communication physical interface through which
information transferring or out one bit at a time

QUESTION 8

Describe the following characteristic of computer memory

i. Mutability: It is the ability of a computer memory to read and write storage and comes in
the form of immutable and mutable memory types. Mutable storage can be overwritten
more than once and it is used for both secondary and primary storage e.g. ROM
ii. Accessibility: Found in both random access forms and sequential forms, hr random
access storage can be accessed in any location in about the same amount of time.
Sequential memory is slower and information is gathered and accessed in serial order.
Usually this type may be seen commonly with offline storage
iii. Addressability: This has three forms which are location, file and content. Location is
done by numerical memory address usually limited to primary storage and accessed
internally. File is done by file names with human readability. Content addressability
concerns itself with a selected hash value a short identifier with a number that point to the
memory, address for information
iv. Volatility: This is the frequency with which records are added to the file or deleted from
it. If the frequency is high, the file, is said to'be volatile. A file that is not altered is
“static”. If frequency is low, the file is said to be “semi-static”. .

QUESTION 9

a) Reasons why the following types of memory are used

(i) Random access memory: (RAM)-is a volatile memory and holds-data as long as the
power is on hence used as a temporary storage when inputting data
(ii) Read only memory:-ROM refers to a storage that can only be read from but not
written to or altered hence used to store valuable information to safeguard against
overwriting or deletion.

KASNEBNOTES REVISIONKITS Page 49


KASNEBNOTES REVISION KIT - ICT

b) Three local area Network (LAN) connecting devices

Modem: Converts data from digital form for the sending computer and also from analogue to
digital for the receiving computer

Gateway: Communication processor that connects different networks by providing transaction


from one set of protocol to another

Bridges: device that connects similar networks

c) Difference between ‘serial’ and ‘parallel5 processing

Serial processing is the processing that occurs sequentially, each process occurs one at a time
while parallel processing is the ability to carry out multiple operations or tasks simultaneously.

d) Benefits of secondary storage

- Secondary storage enables the data to be easily transported from one place to another
- Easily affordable and hence can be accessed by many people as compared to the main
memory which is very expensive
- They can be of high security when stored to secondary storage because it is not accessible
to all people

QUESTION 10

a) Hardware devices found inside the computer’s system unit

- The CPU (Central Processing Unit) controls the processing of instructions.


- Hard Disk: It is a storage device inside the computer
- C.D/DVD Drive: It is a device that is used to read data from the CD or DVD
- Memory card (RAM): It is the physical memory inside the computer and is used to store
data temporarily.
- Sound and video card: The sound card enables the computer to output the sound to the
audio devices and video card controls the display of the computer screen

KASNEBNOTES REVISIONKITS Page 50


KASNEBNOTES REVISION KIT - ICT

b) Classifications of Printers Based on their Technology

Dot matrix printers: Form characters from a matrix of dots produced by columns of pins in the
printing heard.

Ink Jet Printers. Print one character at a time,They form characters on paper by spraying in
from the tiny nozzles through an electrical field that arranges them to form characters on paper.

Band Printers. They utilize horizontal relating band containing characters and few harmers. The
characters are stripped by the hammer situated below the paper and the ribbon to create a line of
print.

Drum printers: Has a complex set of character engraved around circumference of each of the
printing position of the dram. The number of printing position across the drum equals the number
of position available across the page.

QUESTION 11

a) Types of computer keyboards

There are many types of computer keyboards. For instance, multimedia computer keyboard,
membrane computer keyboard, slim computer keyboard, etc... Different standards, different
results. We list the common classification of computer keyboards here.

Classification by function of extra keys

If there are multimedia/internet/office control buttons, we call it multimedia computer keyboard


internet computer keyboard, office keyboard. No extra function control buttons it is standard ' '
keyboard.

These keyboards are usually used with PC, not mobile device.

Classification by switch of keys

Membrane keyboard, Dome-switch keyboard, Scissor-switch keyboard, capacitive keyboard and


Mechanical-switch keyboard, Laser keyboard, roll-up keyboard are more and more popular.

Membrane keyboard are most popular because of its low price and high quality, takes up more
than 50% market. Scissor-switch is the next star. The latest apple wireless keyboard is scissor
switch keyboard.

Bucking-spring keyboard, hall-effect keyboard are less seen in nowadays.

KASNEBNOTES REVISIONKITS Page 51


KASNEBNOTES REVISION KIT - ICT

Classification by size

Standard keyboard, laptop-size keyboard, thumb-size keyboard and numeric keyboard.

Standard keyboards are used with PC, laptop-size keyboard come with laptop, not sale alone.
Thumb- size keyboard are small enough to be carried to anywhere.

Other types of computer keyboards

Some types of computer keyboards are hard to classify. We list them here: compact keyboard,
mini keyboard, slim keyboard..

QUESTION 12

Functions of the following devices

i. Webcam- A digital camera capable of downloading images to a computer for


transmission over the internet or other network, ~
ii. Headset- is headphones combined with a microphone, or one headphone with a
microphone. Headsets provide the equivalent functionality of a telephone handset with
hands-free operation
iii. Joystick- is an input device consisting of a stick that pivots on a base and reports its angle
or direction to the device it is controlling

QUESTION 13

a) Distinguish between the following

1. Work station and server

A workstation is a high-end microcomputer designed for technical or scientific applications.


Intended primarily to be used by one person at a time, they are commonly connected to a local
area network and run multi-user operating systems.

The term workstation has also been used to refer to a mainframe computer terminal or a PC
connected to a network, '

A server is a physical computer (a computer hardware system) dedicated to running one or more,
services (as a host), to serve the-needs of the-users of other computers #n the network.
Depending on the computing service that it offers it could be a database server, file server, mail
server, print server, web server, gaming server, or some other kind of server.

KASNEBNOTES REVISIONKITS Page 52


KASNEBNOTES REVISION KIT - ICT

A server is a machine which is dedicated to providing a particular function or service requested


.by a client. They include file server, print server, and fax servers.

2. Light pen and digitizer

Light pen;- Is a computer input device in the form of a light-sensitive wand used in conjunction
with a.computer's CRT display. It allows the user to point to displayed objects or draw on the
screen in a similar way to a touch_screen but with greater positional accuracy.

Digitizer: This device for converting analogue signals into digital signals.

b) The benefits of secondary storage in data management

e) Benefits of secondary storage

- Secondary storage enables the data to be easily transported from one place to another
- Easily affordable and hence can be accessed by many people as compared to the main
memory which is very expensive
- They can be of high security when stored to secondary storage because it is not accessible
to all people
- Can be used to back up data.

QUESTION 14

ii) Examine five functions performed by computer hardware devices

Keyboard: Keyboard is an input device that is used to give the input to the computer to process it

Mouse: Mouse is a pointing device that detects the motion of the mouse ball with the surface

Monitor or VDU: Monitor is a type of hardware device that is used to display the video signals

Motherboard: Motherboard is the hardware component inside the computer that provides the
platform for many devices such as RAM, hard disk, peripheral devices, PC cards and controllers.

Processor: Processor is the heart of the computer that processes the instructions that are given by
the user.

Memory Card (RAM): It is the physical memory inside the computer and it stores the data
temporarily.RAM is used by the processor and other devices to store the data temporarily. There
are two basic format memory cards of RAM namely SIMM and DIMM.

Video Card: Video card is an important component and it controls the display of the computer
screen.

KASNEBNOTES REVISIONKITS Page 53


KASNEBNOTES REVISION KIT - ICT

Sound Card: Sound card enables the computer to output the sound to the audio devices. Today
most of the computer systems have built in sound circuits in the motherboards.

LAN card or network adapter is communication componenet. Every computer in a network


must have a LAN card to communicate with each other. Every LAN card is configured
separately and a unique IP address is assigned to each LAN card.

Modem: Modem is a communication device that connects the computer with the internet.. There
are two types of modems internal and external.

Hard Disk: Hard disk is a storage device inside the computer. The common types of the hard
disks include IDE and SCSI. Hard disk

QUESTION 15

How the following connectors or ports work

(i) Serial port is a serial communication physical interface through which information
transfers in or out one bit at a time
(ii) Parallel port is a type of interface for connecting various peripherals. That is, several
bits sent simultaneously over separate wires.

QUESTION 16

Factors that determine the processing power of a computer

(i) Processor Speed: The faster the processor speed the more powerful the computer
(ii) Bus Width or Path: The larger the bandwidth, the more the instructions it can hold and
thus faster processing power •
(iii)Processor Instruction's "Set: The higher the instruction set the faster the computer
processing power'
(iv) Cache Memory': The higher the cache memory, the more the virtual memory and thus the
more powerful the computer is
(v) Bus Speed: The higher the speed the more powerful computer is

QUESTION 17

a) i) Differences between impact and non-impact printers

 Impact printers provide images that are relatively of poor quality, while non-
impact have high quality images and printouts

KASNEBNOTES REVISIONKITS Page 54


KASNEBNOTES REVISION KIT - ICT

 Impact printers print by the printing head element coming into contact with the
stationery against an ink ribbon while non-impact printers use thermal and laser
technology to print
 Impact printers are less costly compared to non-impact printers which are
expensive
 Impact printers are slow while the non-impact are fast

ii) An invoice has to be clear and properly visible. The organization should use non-impact
printer such Inkjet or LaserJet since they have excellent image quality.

b) Factors which could be considered by an organization when selecting a data input


devise

- Ensure that the specifications are compatible


- Consider the cost of purchasing the input hardware

KASNEBNOTES REVISIONKITS Page 55


KASNEBNOTES REVISION KIT - ICT

TOPIC 4
COMPUTER SOFTWARE
QUESTION 1

Explain the following computer hardware and software specifications:

i. Linux Mint II. - It’s in an operating system. Linux Mint is aimed at being a "modern,
elegant' and comfortable operating system which is both powerful and easy to use." Mint
provides full out-of-the-box multimedia support by including some proprietary software such as
Java and Adobe Flash. Mint's motto is "from freedom came elegance,

ii. Libre Office Impress- It’s a free and open source office suite. The LibreOffice suite
comprises programs to do word processing, spreadsheets, slideshows, diagrams, maintain
databases, and compose math formulae. It is designed to. be compatible with other major office
suites, including Microsoft Office, though some Microsoft Office layout features and formatting
attributes are handled differently or are unsupported.

QUESTION 2

a (ii) Difference between systems' software and applications software.

System software consists of programs that control operations of the computer and enable user to
make efficient use of computers. They coordinate computer activities and optimize use of
computers. They are used to control the computer and develop and run application programs
examples of jobs done by the system software are management of computer resources,
defragmentation etc.

Application software are programs for user to do their jobs e.g. typing, recording keeping,
production of financial statements, drawing, and statistics.

QUESTION 3

a) Examples of computer utility programs

These are system programs that provide a useful service to the user of the computer by providing
facilities for common tasks of a routine nature.

KASNEBNOTES REVISIONKITS Page 56


KASNEBNOTES REVISION KIT - ICT

Types of utility programs are

- Sort utilities: They are used to re-arrange file records in a specified sequence i.e.
numerically, alphabetically or chronologically
- Copy utility: Used to copy data from one media to another
- Tracing and debugging utilities.
- File maintenance

b) Factors to be considered when selecting an open source software

- Suitability: How suitable does it fit refitufements and how closely does it match the existing
procedure of the organization where relevant
- Configuration: What memory and peripherals are required to implement the desired features
and how portable will the system be in any future be in any future change of hardware
- Interface: How closely will the software link with systems which currently exists within an
organization
- System trials: If possible the programmes should be run through to access the timing
operating procedures, accuracy and performance etc.

QUESTION 4

a) i) Machine level language

Is a language in which a computer, actually does its processing it uses binary numbers i.e. series
of (0 and I)

ii) Advantages and disadvantages if machines level programming language.

Advantages Disadvantages
- Less time is spent during execution - They are machine dependant hence not portable
process since they do not require i.e. programmes depend on the processor chip.
translators.
- Machine- language programmes are error prone
- Programmes written in machine language due to use of binary system.
are secured since they are difficult to
alter. - Programmes written in machine language are
- Programmes written in machine language difficult to debug and understand.
occupy less storage space.

KASNEBNOTES REVISIONKITS Page 57


KASNEBNOTES REVISION KIT - ICT

QUESTION 5

Layers of computer software

— Application Layer

 Takes care of the needs of the specific application


 HTTP: send request, get a batch of responses from a bunch of different servers B Telnet:
dedicated interaction with another machine

— Transport Layer

 Makes sure data is exchanged reliably between the two end systems
 Needs to know how to identify the remote system and package the data properly

— Network Access Layer

 Makes sure data is exchanged reliably into and out of the computer.
 Concerns the physical connection to the network and transfer of information across this
connection
 Software here depends on physical medium used

QUESTION 6

Examples of each of the following computer software

(i) General purpose application programs

- Word processing - Create, edit and print text documents. E.g. MS Word, Word Perfect.
- Spreadsheets - Provide a wide range of built-in functions for statistical, logical, financial,
database, graphics, data and time calculations. E.g. Lotus 1-2-3, Excel, Quattro Pro.

(ii) Application specific programs

- Decision making software


- Educational software

(iii) System management programs

- Operating system- MAC OS, System/7Application software


- Utilities/service programs(iv) System development programs
- Linkers
- Debuggers
- Compilers

KASNEBNOTES REVISIONKITS Page 58


KASNEBNOTES REVISION KIT - ICT

QUESTION 7

Definition of software utility

These are system programs that provide a useful service to the user of the computer by providing
facilities for common tasks of a routine nature. Common types of utility programs, are sort
utilities, editors, file copying, dumping, file maintenance and tracing and debugging utilities.

Types of software utilities

- Web utilities: These are programs that work with' a browser to increase your speed,
productivity and capabilities
- Backup Utilities: Backup utility is a data backup tool used to cepy all the information
when needed, for example in the problem of disk failure or corruption. Such utilities are
Netback up, Norton Ghost, Windows Home Server Computer Backup are a few examples
of software backup utilities.
- Antivirus Software: Is software that allows you to eliminate the threat of viruses on your
computer. There are many antivirus tools available on the market such as Kaspersky,
McAfee, Norton Antivirus, Windows Live OneCare, ESET NOD32, Ad-Aware Pro are
some examples of Antivirus Software.
- System Profiler:- System Profiler works to provide users with clear information about
the applications installed and also that connect hardware devices to the system. Local
SekChek, Belarc, HwiNF032, Lavalys EVEREST Ultimate Edition, CPU Speed and
Sisoft Sandra Pro are some examples of System Profiler

QUESTION 8

Features of computer software which would be suitable for Mr Charles Midika’s bureau

i) Compatibility of the software: how the software integrates with other software particularly
the operating system and the user programs

ii) Requirements of the user: the selected software or package should fit user requirement as
closely as possible

Processing time: these involves the response time e.g. if the response time is slow the user
might consider the software or package as unsuccessful ^

iii) Controls: the software should have in-built controls which may include password options,
validation checks, audit trails or trace facilities etc

iv) The software should support printing of documents

KASNEBNOTES REVISIONKITS Page 59


KASNEBNOTES REVISION KIT - ICT

QUESTION 9

Features of 4GLs which make them to be preferred by programmers for application


development

1. 4GLs are non-procedural and as such, program functions are not produced by the user but
the 4GL itself. Users simply request for the data processing result or output instead of
providing the detail physical and logic used. This helps to come up with applications
more quickly and cheaply with minimal errors. This aspect is critical in the case of
program development and results to increased programmers productivity.
2. 4GLs are problem oriented in that programs are designed to solve particular problems
using English like structures. Being problem oriented makes the language more
productive to specific applications. This is vital in the case of information system
development since it ensures quality and productivity of applications developed.
3. 4GLs enhance user creativity and productivity. Unlike procedural languages, 4GL tends
to promote user computing spirit and skills. User acceptance acknowledgement and
understanding will enhance reduction of technophobia: thus more quality and reliable
systems.
4. The system maintenance and flexibility is enhanced. 4GL facilitate a continuous process
of application development. The rigid requirement and the technical requirement
involved in system development life cycle is reduced. Change in user requirements can
always be incorporated in the systems design from time to time.
5. 4GLs enhance end user computing and so limiting the use of IT staff.
6. They help the organisation to top over creativity thus new information systems I will be
of higher quality.
7. 4GLs help in the diffusion of information technology throughout the organisation.

KASNEBNOTES REVISIONKITS Page 60


KASNEBNOTES REVISION KIT - ICT

TOPIC 5
INTRODUCTION TO OPERATING SYSTEMS
QUESTION 1

(a) Definition of the following terms as used in computer networks

i. Unguided media.

The unguided media is the wireless media. It simply transports electromagnetic waves without
using any physical conductor. Signals are normally broadcast through the air and thus are
available to anyone who has the device capable of receiving them. Unguided signals can be
travelled from source to the destination in several ways. These ways include ground propagation,
sky propagation and line of sight propagation,

ii. Router.

A router is a device that forwards data packets between computer networks, creating an overlay
internetwork. A router is connected to two or more data lines from different networks. When a
data packet comes in one of the lines, the router reads the address information in the packet to
determine its ultimate destination. Then, using information in its routing table or routing policy,
it directs the packet to the next network on its journey, Routers perform the "traffic directing"
functions on the Internet. A data packet is typically forwarded from one router to another through
the networks that constitute the internetwork until it reaches its destination node.

iii. Network interface card

A network interface card (NIC) is a computer circuit board or card that is installed in a computer
so that it can be connected to a network. Personal computers and workstations on a local area
network (LAN) typically contain a network interface card specifically designed for the LAN
transmission technology, such as Ethernet or token ring. Network interface cards provide a
dedicated, full-time connection to a network. Most home and portable computers connect to the
Internet through as- needed dial-up connection. The modem provides the connection interface to
the Internet service provider.

iv. Hot Spot

A hot spot is a site that offers Internet access over a wireless local area network (WLAN)
through the use of a router connected to a link to an Internet service provider. Hotspots typically
use Wi-Fi technology. Hotspots may be found in coffee shops and various other public
establishments in many developed urban areas throughout the world

KASNEBNOTES REVISIONKITS Page 61


KASNEBNOTES REVISION KIT - ICT

v. Wi-Fi

It is a popular technology that allows an electronic device to exchange data or connect to the
internet wirelessly using radio waves. A device that can use Wi-Fi (such as a personal computer,
video-game console, smartphone, digital camera, tablet or digital audio player) can connect to a
network resource such as the Internet via a wireless network access point. Such an access point
(or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors.
Hotspot coverage can comprise an area as small as a single room with walls that block radio
waves or as large as many square miles — this is achieved by using multiple overlapping access
points.

(b) Hardware factors to consider when acquiring an operating system

 CPU

There are two CPU brands that you need to choose from: Intel or AMD. Intel CPUs are more
expensive, but deliver on performance and reliability. AMD microprocessors are, cheaper, but
aren't as fast and generally heat up quicldy-thus the need for additional cooling systems when
overclocking.

 RAM

The more the RAM is always better, but if you're using the 32-bit Windows 7, anything above
4GB is useless. In fact, if you're using Windows 7 Starter, the limit is only 2GB. If you want a
good gaming or media rig, don't go lower than 8GB, as long as your budget permits it.

 Storage capacity

If you plan on using the computer for video or picture editing, don’t go anywhere lower than
1TB, but otherwise, 500GB is good for desktops, while 250GB should be ample for laptops.

If you want drastic speed gains then look into solid-state hard drives, but beware their price.

 Video card

If you won't do any major gaming or video editing on the computer, then you-'ll manage with
integrated graphics, which are still capable of handling Window 7's visual effects and any HD
video. If you're editing giant-sized textures, then you need discrete video cards, which come in
low, medium and high-end flavours.

KASNEBNOTES REVISIONKITS Page 62


KASNEBNOTES REVISION KIT - ICT

 Optical media

If you plan on putting together a Blu-ray library and use the computer as your media centre Then
you'll need a Blu-ray drive. Otherwise, stick with your standard DVD drive.

QUESTION 2

(i) Multitasking and single tasking operating system.

In a computer operating system, multitasking is allowing a user to perform more than one
computer task (such as the operation of gg application program) at a time. The operating system
is able to keep track of where you are in these tasks and go from one to the other without losing
information. Microsoft Windows 2000, IBM's OS/390, and Linux are examples of operating
systems that can do multitasking (almost all of today's operating systems can). When you open
your Web browser and then open word at the same time, you are causing the operating system to
do multitasking.

Single tasking operating system is an operating system is designed to manage the computer so
that one user can effectively do one thing at a time. The Palm OS for Palm handheld computers
is a good example of a modern single-user, single-task operating system.

(ii) Cold booting and warm booting

The difference between cold boot and warm boot of your computer's operating system are
different methods of restarting your personal computer. A warm boot is a reboot with the
computer power placed in the on position. A cold boot is a reboot with the computer power being
off. A cold boot is better because it completes the boot-up sequence. Having had the power off,
your computer has cleaned out

QUESTION 3

Difference between

i) Closed source operating system and open source operating system

Closed source operating systems are those that are developed in house by the user and they are
not common whereas open source operating systems are those systems that have already been
developed and are ready to use.

KASNEBNOTES REVISIONKITS Page 63


KASNEBNOTES REVISION KIT - ICT

ii) Beta and integrated software

After an initial round of j-n-house testing, software publishers often release new programs to be
tested by the public. These pre-release versions are called beta software .

Integrated software is software for personal computers that combines the most commonly used
functions of many productivity software programs

QUESTION 4

a) How operating systems creates an impression of doing several jobs at the same time

An operating system is an organised collection of a suite of programs which controls and


supervises computer system hardware and provides services to programmers and users of a
computer system. Operating systems have such features as; it performs control oriented tasks
such as multiprogramming, multi-processing and batch processing, allow 'for time-sharing such
that multiple users can access a single computer system at one time and allows for concurrent
execution of programs so as to enhance speedy processing of data.

b) i) Define the term : “real time processing system” A real-time operating system is an
operating system that guarantees a certain capability within a specified time constraint. A key
characteristic of an RTOS is the level of its consistency concerning the amount of time it takes to
accept and complete an application task,

ii) Examples of real-time processing systems

Anti-missile defense systems, airplane landing control system, flight simulation systems,
electronic fund transfer systems, and tickets reservation systems.

QUESTION 5

a) i) Activities of an operating system in regard to file management

- Basic Input Output system (BIOS)


- Power of self-test (POST)
- Loading of the boot start
- Loading of the operating system,

ii) Features of a Basic Input/output system

Basic Input/output system is a chip located on all motherboards that contain instructions and
setup for how your system should boot and how it operates.

KASNEBNOTES REVISIONKITS Page 64


KASNEBNOTES REVISION KIT - ICT

The BIOS includes instructions on how to load basic computer hardware and includes a test
referred to as a POST (Power On Self Test) that helps verify the computer meets requirements to
boot up properly. If the computer does not pass the POST, you will receive a combination of
beeps indicating what is malfunctioning within the computer.

In most PCs, the BIOS has 4 main features or functions as mentioned below.

1. POST - Test the computer hardware and make no errors exist before loading the
operating system. Additional information on the POST can be found on our POST and
Beep Codes page
2. Bootstrap Loader - Locate the operating system. If a capable operating system is located,
the BIOS will pass control to it.
3. BIOS drivers - Low level drivers that give the computer basic operational control over
your computer's hardware.
4. BIOS or CMOS Setup - Configuration program that allows you to configure hardware
settings including system settings such as computer passwords, time, and date.

QUESTION 6

Five activities of an operating system in regard to file management

Files security and management

Through the use of passwords and file attributes the operating system prevent unauthorised
user/access to computer files.

Maintaining a log of events

The server’s operating system has an event log file that keeps an record of all event that took
place in a computer systems.

Job scheduling

In multi user multi programming systems the computer usually has several job to execute at any
one time for effective comparison of the results.

Error reporting and correction

The operating system handle operator’s errors by reporting the errors and promoting how errors
can be solved.

Loading of programmes and sub-programmes

The operating system allows loading of programmes into the main memory for the hard disk
drive so that the programme can be extended.

KASNEBNOTES REVISIONKITS Page 65


KASNEBNOTES REVISION KIT - ICT

QUESTION 7

a) Types of operating systems

1) Microsoft DDS (Disc Operating System)

- Single tasking operating system


- Single user system
- Networking capability

2) Operating system 2

- It has two multi-tasking capability


- If offers multimedia application support
- It has graphical user interface.

3) Macintosh

- If has graphical user interface


- It has multi networking capability

4) Windows NT server

- It has multi user capability


- It supports a number of protocols
- It has graphical user interface as well as command line interface.

5) Windows NT Working station

- It has advanced security facility


- It has graphical user interface.
- It has multi-tasking capability
- It is a single user operating system.

b) Tasks performed on the creative stage

i) Economic feasibility to measure the cost and benefits of new system.

ii) technical feasibility to ensure that the organisation has sufficient hardware, software
and personnel resources to develop and support the proposed system.

iii) Operational feasibility the willingness and ability of management users the proposed
information.

KASNEBNOTES REVISIONKITS Page 66


KASNEBNOTES REVISION KIT - ICT

iv) Evaluating the systems staffs in the organisation to build and use the proposed
systems.

v) Identifying the size and complexity of the new system and the .skills and
availability of user and information system staff.

vi) Identifying the potential risk to the organisation in developing the system.

vii) Evaluating the maintenance cost of the new system

QUESTION 8

a) Functional areas served by a computer operating system

Backing storage management

The operating system uses device drive to control the operations of storage devices.

Processor time management

The operating system allocates processor time to the tasks executed in the main memory

Interrupt handling

An interrupt is an event that alters the sequence in which a computer can execute instructions.
An output is usually generated by computer hardware.

Job scheduling

In multi user multi programming system the computer usually has several jobs to execute at any
one time for effective companion of the results.

They are commonly put in a queue which creates and maintained by t^e operating system.

Main memory space management

All computers have limited memory space and the operating system controls the usage of the
memory space to ensure that it is optimized. The operating system takes some of the space and
most of the reminder is taken up by the operating programme.

Input/output device management

The operating system manager’s input/output devices by maintaining controlled input or output
processing some memories space is allocated for input data while some location hold data
received from particular input/output devices,

KASNEBNOTES REVISIONKITS Page 67


KASNEBNOTES REVISION KIT - ICT

b) Activities undertaken during the information system implementation and evaluation


stage

The following activities are performed as part of the Implementation Phase.

All affected users and organizations affected are notified of the implementation. Additionally, it
is good policy to make internal organizations not directly affected by the implementation aware
of the schedule so that allowances can be made for a disruption in the normal activities of that
section. The notification should include:

 The schedule of the implementation


 A brief synopsis of the benefits of the new system
 The difference between the old and new system
 Responsibilities of end user affected by the implementation during this phase
 The process to obtain system support, including contact names and phone
numbers

Typically, implementation includes converting existing data for use in the new system. The tasks
for this effort are two-fold: data input and data verification. When replacing a manual system,
hard copy data is entered into the automated system. Some sort of verification that the data is
being entered correctly should be conducted throughout this process. This is also the case in data
transfer, where data fields in the old system may have been entered inconsistently and therefore
affect the integrity of the new database. Verification of the old data becomes imperative to a
useful computer system.

One of the ways verification of both system operation and data integrity can be accomplished is
through parallel operations. Parallel operations consist of running the old process or system and
the new system simultaneously until the new system is certified. In this way if the new system
fails in any way, the operation can proceed on the old system while the bugs are worked out.

To ensure that the system is fully operational, install the system in a production environment.

During this phase, the documentation from all previous phases, is finalized to align it with the

Prior to the Operational Readiness Review, the Authority to Operate must be obtained and a
System of Record Notice published.

Final versions of the following documents are prepared during the Implementation Phase, and
are required before the project proceeds to the Operations and Maintenance Phase:

 Business Product
 Project Completion Report
 Service Level Agreements (SLAs) and Memoranda of Understanding (MOU)

KASNEBNOTES REVISIONKITS Page 68


KASNEBNOTES REVISION KIT - ICT

 Contingency/Disaster Recovery Plan ..


 Operations and Maintenance (O&M) Manual
 Systems Security Plan
 Security Risk Assessment
 Training Plan
 Training Materials
 User Manual

c) Situations in a typical office environment where connection between computer devices


might be required.

 Monitoring activities
 Controlling
 Communication
 Producing reports
 Decision making
 Updating records
 Storage of records
 Summarizing data

QUESTION 9

Need for an operating system

1. Memory Management: - The memory management module of an Operating System takes


care of the allocation reallocation of memory space to the various program in need of this
resource.

2. File Management: This includes physical storage location, file permission and file access.
Keeping track of all different files & maintaining the integrity data stored in the files
including file directory structure.

3. Device Management: Accept input and store data on disks and send data to output devices

4. Security: Control access to system resources by Protection against unauthorized access by


use of logins and passwords

5. Job Control: - When the user wants to run an application program, he must communicate
with the Operating System telling it what to do. He does this using Operating System job
control language or JCL. JCL consists of a number of Operating Systems commands, called
system commands that control the functioning of the Operating System.

KASNEBNOTES REVISIONKITS Page 69


KASNEBNOTES REVISION KIT - ICT

QUESTION 10

Functions of operating system in managing computer system resources

 Hardware functions: i.e. Accept input and store data on disks and send data to output
devices
 Provide a user interface
 Provide hardware independence
 Manage system memory
 Manage processing
 Control access to system resources i.e.Protection against unauthorized access Logins and
passwords • Manage files
 Physical storage location File permissions File access

QUESTION 11

Describe the following types of operating system

i) Real time operating systems

A real-time operating system (RTOS) is an operating system that guarantees a certain capability
within a specified time constraint. A key characteristic of an RTOS is the level of its consistency
concerning the amount of time it takes to accept and complete-an application task.

ii) Multi user operating systems

A multi-user operating system is a computer operating system (OS) that allows concurrent access
by multiple users of a computer. These programs are often quite complicated and must be able to
properly manage the necessary tasks required by the different users connected to it.

QUESTION 12

i) Open source platform definition

A social media platform created and developed by an online community of developers that
members can build on and change for their specific purposes. Open source software is usually
developed as a public collaboration and made freely available.

KASNEBNOTES REVISIONKITS Page 70


KASNEBNOTES REVISION KIT - ICT

(ii) Advantages of open source platform

 Availability of source code where everybody has the right to modify. This means the
code can be implemented in other pieces of software and adapted to changing
environments. This enables the unlimited tuning and improvement of a software
product. It also makes it possible to port the code to new hardware, to adapt it to
changing conditions, and to reach a detailed understanding of how the system works.
 Many people have access to the code and this means that there are a large number of
sources for support.
 It is completely free i.e. it is free to use, free to distribute, and free to modify. To the
general public this means that they do not have to pay anything for the product.
 The right to redistribute modifications and improvements to the code, and to reuse other
open source code, permits all the advantages due to the modifiability of the software to
be shared by large communities. This is usually the point that differentiates open source
software licences from "nearly free" ones.

QUESTION 13

In the context of a computerized environment

(i) Define of an operating system: An operating system (OS) is a set of programs that
manage computer hardware resources and provide common services for application software.
The operating system is the most important type of system software in a computer system. A
user cannot run an application program on the computer without an operating system, unless the
application program is self-booting

(ii) Function of an operating system:

Backing storage management

The operating system uses device drive to control the operations of storage de vices.

Processor time management

The operating system allocates processor time to the tasks executed in the main memory

Interrupt handling

An interrupt is an event that alters the sequence in which a computer can execute instructions.
An output is usually generated bf computer hardware.

KASNEBNOTES REVISIONKITS Page 71


KASNEBNOTES REVISION KIT - ICT

Job scheduling

In multi user multi programming system the computer usually has several jobs to execute at any
one-time for effective companion of the results.

They are commonly put in a queue which creates and maintained by the operating system.

Main memory space management

All computers have limited memory space and the operating system controls the usage of the
memory space to ensure that it is optimised. The operating system takes some of the space and
most of the reminder is taken up by the operating programme.

Input/output device management

The operating system manager’s input/output devices by maintaining controlled input or output
processing some memories space is allocated for input data while some location hold data
received from particular input/output devices.

KASNEBNOTES REVISIONKITS Page 72


KASNEBNOTES REVISION KIT - ICT

TOPIC 6
COMPUTER FILES
QUESTION I

Types of computer file and their suitable application

i) Master file

A master file is a permanent file which holds relatively static data relating to things that exist
(entities) e.g. customer file, employee file. It usually contains important corporate data which can
be accessed sequentially or directly. They are usually multi-user files,

ii) Transaction file

Transaction files are temporary files which hold data relating to events or activities e.g. payments
received, deposits and withdrawals. Their purpose is usually that if updating a master file. They
are usually accessed sequentially and normally are single-user files.

QUESTION 2

Methods of organising computer files

i, Sequential organization

■ Records are organised in ascending sequence according to a certain key

■ Sequential files are accessed sequentially, one record after the next

* Suitable

o for master files in a batch processing environment o where a large percentage of records (high
hit-rate) ar€*to be accessed

* Not suitable for online access requiring a fast 'response as file needs to be accessed

sequentially -

ii. Hash File Organization

In a hash file, records are not stored sequentially in a file instead a hash function is used to
calculate the address of the page in which the record is to be stored.

KASNEBNOTES REVISIONKITS Page 73


KASNEBNOTES REVISION KIT - ICT

The field on which hash function is calculated is called as Hash field and if that field acts as the
key of the relation then it is called as Hash key. Records are randomly distributed in the file so it
is also called as Random or Direct files. Commonly some arithmetic function is applied to the
hash field so that records will be evenly distributed throughout the file.

QUESTION 3

(ii) File access methods

Hashed

In hashed files each new record is placed at the record number calculated by the hash function,
the record is then stored in that calculated slot. This method should be used for RMS files that
are static in nature and in which few additions and deletions of records need to be made.

Sequential

In sequential files, each new record is placed at the end of the file in the first unoccupied slot.
Sequential files are not typically used for data entry files but are used as temporary work files for
programs.

Indexed

Indexed files are often referred to as ISAM (indexed sequential access method) files. Each new
record is placed at the end of the file in the first unoccupied slot. The value of the record's
primary key and the record's location are then added to the RMS index file. In most cases,
indexed files are sufficient for data entry files and are the normal choice when creating RMS
definition files.

QUESTION 4

Importance of managing computer files

 A well-managed, carefully arranged, files make it easy to obtain data for business
decisions in an organization.
 It also provides the users with timely, accurate and relevant information.
 It reduces costs, and there is flexibility in information processing.

KASNEBNOTES REVISIONKITS Page 74


KASNEBNOTES REVISION KIT - ICT

QUESTION 5

Types of file extension

 Outlook Mail Message


 Rich Text Format File
 Log File
 PowerPoint Presentation
 Keynote Presentation

QUESTION 6

Types of computer files

(i) Master files: They are files that store fairly permanent information of long term
value to an organization and are used regularly in the organization key systems
e.g. stock master file
(ii) Transaction files: They had incoming data relating to business activity such as
sales purchases order etc.
(iii)Reference files: They contains reference data which is in frequently altered
(iv) Archive files: They contain information for long term storage e.g. details of
payment made • by customers over the past years
(v) Backup files: They store duplicated copies for existing operational files
(vi) Scratch files: They are files no longer needed in the systems

QUESTION 7

a) Types of computer file organization

i) Serial: This is where records are arranged continuously one after the other in particular
sequence but in the order in which they come into the file.

ii) Sequential: Form the serial organisation since records are'arranged one after the other
but in the order of key field; Key field is a unique field in every record e.g. stock code.

iii) Random: Records are arranged anyhow with no particular order i.e. there is no
relationship between where and how a particular record is stored compared with other.

iv) Index Sequential: Records are arranged in a sequence of key field and additional feature
known as index that arouse for selective access. An index is particular portion where

KASNEBNOTES REVISIONKITS Page 75


KASNEBNOTES REVISION KIT - ICT

records are stored in groups allowing by passing a group or records that are not required
in a particular process.

b) Advantages of direct file access method.

- Fast to access
- Instant retrieval and prompt action in the information
- Increase the speed of processing the file in case of low hit rate.

QUESTION 8

Aspects of file design that should be considered for a file in which performance has high
priority.

Growth

It is the increase or decrease in number of records in the file or it is the percentage increase
or decrease of records in relation to the existing records.

Volatility

This is the frequency with which records are added or deleted from the files.

Hit rate

The rate of processing master file in items of active records

Storage media available

If the media available is a tape, serial or sequential method would be appropriate.

Response time requirement

If first access method is required would be appropriate.

KASNEBNOTES REVISIONKITS Page 76


KASNEBNOTES REVISION KIT - ICT
File System Database management system
- Data redundancy, there is duplication of - Redundancy control, data items within the
data; this makes it expensive to store and database are stored only once therefore there is
update such Files. reduced duplication of data.
- Lack, of data integrity, since the files are - Improved data integrity. Data items are shared
stored /maintained separately data about ideally once, when it is updated everyone using
one record may have consistent values the database gets up to date data therefore there
thus leading to accurate reporting. is no inconsistency in the data stored.
- Lack of data security, every department - Improved data security since data is contrary
uses its own data and therefore it is not managed by the data base administrator it is easy
easy to control the data as an to monitor and control access and the uses of the
organisation results. This makes it data done by use of passwords, user names etc
possible to be useful to fraud. - Data sharerability; data in the
- Lack of data share reliability. Since the database is widely available to all users.
files in the database are not easily related
it is not possible to share a common data
item.

QUESTION 9

Criteria used to determine computer file organisation

i. Fast access to single record or collection of related records


ii. Easy record add.ing/update/removal, without disrupting (i)
iii. Storage efficiency
iv. Security of files

QUESTION 10

Describe the following file systems

i. Disk file system

Disk file systems are file systems which manage data on permanent storage devices. As magnetic
disks are the most common of such devices, most disk file systems are designed to perform well
in spite of the seek latencies inherent in such media.

ii. Network file system

Network File System (NFS) is a distributed file system protocol originally developed by Sun
Microsystems, in 1984, allowing a user on a client computer to access files over a network in a
manner similar to how local storage is accessed. NFS, like many other protocols, builds on the
Open Network Computing Remote Procedure Call (ONC RPC) system. The Network File
System is an open standard defined in RFCs, allowing anyone to implement the protocol.

KASNEBNOTES REVISIONKITS Page 77


KASNEBNOTES REVISION KIT - ICT

iii. Flash file system

A flash file system is a file system designed for storing files on flash memory devices. These are
becoming more prevalent as the number of mobile devices is increasing, the cost per memory
size decreases, and the capacity of flash memories increases.

iv. Special purpose file system

A special file system is a system that presents non-file elements of an operating system as files
so they can be acted on using file system.

QUESTION 11

Describe the following methods of organizing computer files Computer file organization

i) Sequential file organization

- Records are organized in ascending sequence according to a certain key


- Sequential files are accessed sequentially, one record after the next
- Suitable for master files in a batch processing environment and where a large percentage
of records (high hit-rate) are to be accessed

ii) Line sequential file organization

- Line-sequential files are like sequential files, except that the records can contain only
characters as data.
- Line-sequential files are maintained by the native byte .stream files of the operating
system.

iii) Indexcd-sequential file organization

- File is organized sequentially and contains an index


- Used on direct access devices
- Used in applications that requires sequential processing of large numbers of records but
occasional direct access of individual records

iv) Direct or hashed access file organization

- A Direct file provides the fastest possible access to records.


- It also provides users with direct access to individual records.
- Direct file is typically the best when access time is critical and when batch processing is
not necessary.

KASNEBNOTES REVISIONKITS Page 78


KASNEBNOTES REVISION KIT - ICT

QUESTION 12

Types media used for data storage

 Flash Memory: Flash memory is a non-volatile memory in computer technology which


can be electrically programmed or erased. Flash memory devices commonly used today
include USB flash drives and memory cards.
 USB Flash Drive;- USB flash drive is a type of memory storage device that consists of
NAND-type flash memory, integrated with Universal Serial Bus (USB) interface. The
USB flash drives are removable as well as rewritable, o Compact Disc:
 Compact disc, more commonly referred to as a CD, is an optical disc used to store digital
data. There are CD-ROM, CD-R, CD-RW, VCD, SVCD and Enhanced CD. CD-ROM
and CD-Rare widely used in the field of computers. A standard CD having a diameter of
120 mm can hold up to 700 MB data,
 Digital Versatile Disc: Digital versatile disc, more commonly referred to as DVD, is an
optical storage device used for data storage in computer technology. Although they share
the same dimensions as the CDs, DVDs have the capacity to store six times more data
than the compact discs. DVD-video is used to store video content while DVD-audio is
used to store audio content.

KASNEBNOTES REVISIONKITS Page 79


KASNEBNOTES REVISION KIT - ICT

TOPIC 7
AN OVERVIEW OF APPLICATION PACKAGES

QUESTION 1

i) Types of application package from which the screenshots 1 to 4 have been captured.

Screenshot 1-Spreadsheet applications


Screenshot 2- Word processing applications
Screenshot 3- Database software
Screenshot 4- Presentation software

ii) Describe the application of each of the packages identified in (i) above.

Screenshot 1- Spreadsheet software permits performance of an almost endless variety of


quantitative tasks such as budgeting, keeping track of inventory, preparing financial reports, or
manipulating numbers in any fashion, such as averaging each of ten departmental monthly sales
over a six-month period. A spreadsheet contains cells, the intersection of rows and columns.
Each cell contains a value keyed in by the user. Cells also contain formulas with many
capabilities, such as adding, multiplying, dividing, subtracting, averaging, or even counting. An
outstanding feature is a spreadsheet's ability to recalculate automatically. If one were preparing a
budget, for example, and wanted to change a variable such as an increase in salary or a change in
amount of car payments, the formulas would automatically recalculate the affected items and the
totals. Example: Excel, Lotusl-2-3 etc.

Screenshot 2- Writing tasks previously done on typewriters with considerable effort can now be
easily completed with word-processing software. Documents can be easily edited and formatted.
Revisions can be made by deleting (cutting), inserting, moving (cutting and pasting), and
copying data. Documents can be stored (saved) and opened again for revisions and/or printing.
Many styles and sizes of fonts are available to make the document attractive. Example: MS
Word, Word Pad

Screenshot 3- A database contains a list of information items that are similar in format and/or
nature. An example is a phone book that lists a name, address, and phone number for each entry.
Once stored in a database, information can be retrieved in several ways, using reports and
queries. For example, all the names listed for a given area code could be printed out and used for
a commercial mailing to that area. Examples of database software include Ms Access, Dbase,
Oracle etc.

KASNEBNOTES REVISIONKITS Page 80


KASNEBNOTES REVISION KIT - ICT

Screenshot 4- It allows users to create visual presentation A speaker may use presentation
software to organize a slide show for an audience. Text, graphics, sound, and movies can easily
be included in the presentation. An added feature is that the slide show may be enhanced by
inclusion of handouts with two to six slides printed on a page. The page may be organized to
provide space for notes to be written in by the audience as the presentation ensues. An example
of this is Power Point. Preparation of the software is simplified by the use of' wizards that walk
the riser through the creation of the presentation.

QUESTION 2

Uses of each of the following application packages

i) Presentation program

- Used in advertising by businesses


- Used in seminars or conferences

ii) Database program

- Used to manage business files


- Used when auditing the systems in the organization

iii) Spreadsheet program

- Provide a wide range of build in functions for calculation


- Used for preparing financial records such as balance sheet, cash flows analysis etc.

QUESTION 3

Major steps for mail merging document in a word processing.

Click on mail merge and then scroll down to Step by Step Mail Merge Wizard. Follow the steps
in the task pane to navigate your way through the Mail Merge process.

Choose a document type. This document contains the information that will remain the same in
each version, such as the return address or company logo. If you’ve already created this
document, you can click the USE CURRENT DOCUMENT. Otherwise, dick Start from a
template or Start from existing document, and then locate the template or document that you
want to use.

KASNEBNOTES REVISIONKITS Page 81


KASNEBNOTES REVISION KIT - ICT

Connect to the data source. The information that you want to merge into your documents will be
stored in the data source, and can be found in your Outlook contacts or in an existing file. If you
have- not yet created this information, select Type a New List to begin creating.

Indicate what records you want to include by checking or un-checking the subsequent box.
Indicate what records you want to include by checking or un-checking the subsequent box,

Add fields to your document. Think of a “field” as that information that is unique to each letter.
For example, it might be the address of each recipient. You could also choose More Items. This
will allow you to add any specific information that you had included in your data file.

Preview and complete the merge. To preview, you can scroll through each merged document,
making sure that there are no mistakes. You can also search for a specific recipient, exclude a
recipient or edit the entire recipient list. After previewing the merged information, click next and
your merge will be complete. You can print, transmit, save all or save just a portion of the
document you created.

QUESTION 4

Advantages of a centralized database

Data Integrity - The single greatest benefit of centralizing an assn’s data management is data
integrity. One of the cardinal rules of database design is that no redundancy is allowed. That is,
no piece of data should ever be repeated within the database. When an organization is operating
multiple databases for the same group of people (for example, a membership database with a
separate meeting registration database), they are by definition breaking this rule.And this leads to
major data integrity issues. A centralized database means that each member has one primary
record, with primary contact information. Thus when there is a change required (like a new
phone number or email address), there is only one place to look to make these changes.

Valuable broad marketing info/history - With all the information centralized, it is much easier
to develop reports that show the broad range of activities that your members are engaged in.
With multiple databases, records need to be matched, de-duping needs to occur, and the
opportunity for duplicate records is greatly increased.

Ease of training (it’s the same system for everything) - Another benefit of a centralized
system is that the learning curve for users is greatly reduced. If all processes (membership,
meetings, products, etc.) are in the same database, then users need only learn one system, not
multiple systems.

Support - With a centralize system, support is focused on one product. With many databases,
even if they are built on the same platform, separate support is required for each.

KASNEBNOTES REVISIONKITS Page 82


KASNEBNOTES REVISION KIT - ICT

QUESTION 5

Features of spreadsheet package

Columns and Rows

 A spreadsheet is a grid consisting of columns and rows. Rows are labeled with numbers,
and columns are labeled with letters, giving each cell a unique address consisting of a
number and a letter. If you are familiar with the old game "Battleship", you'll be quite
comfortable with cell addressing.
 A cell may contain labels or values. A label is a text entry, such as TOTAL, that cannot
be manipulated by the spreadsheet. A value can be a number, a date, a formula, or the
answer of a formula.
 A single "grid", or page, is usually referred to as a worksheet.

Formulas

 Formulas are used to express mathematical relationships between cells. For example,
C1=A1+B1 would calculate and display the sum of cells. Al and B1 into cell Cl. It could
also be a simple mathematical formula, such as (100 * 3) / 40. Formulas are not displayed
on spreadsheets. What you see in the cell is the result of the formula.
 Don’t forget about order of operations; anything inside parenthesis happens first,
followed by multiplication and division, followed by addition and subtraction. When in
doubt, use parenthesis to say exactly what you mean.

Functions

Functions are used as shortcuts when performing .mathematical calculations. They are pre-
programmed formulae that give power and flexibility to spreadsheet calculations. They prevent
the user from having to continually enter long and cumbersome expressions. Some examples are
SUM, AVERAGE, MAX, and MIN. Ranges A range is a block of cells. Formulas can act on
single cells or be directed to act on a range of cells. For example, the range A1:D1 includes the
cell Al, Bl, Cl and D1. Any calculation performed in Al will also be performed in Bl, Cl and Dl,
Graphs and charts

 Data in spreadsheets can be displayed in a graphic form. Spreadsheets allow the£


numerical' data in the cells to be displayed as a graph or chart. These graphics, which
illustrate the meaning of the numbers in the spreadsheet in different ways, can be used to
stimulate interest and help make a point.
 There are several different types of graphs that can be made. Area graphs, bar and
column graphs, line graphs, pie charts, scatter plot diagrams and 3-D graphs are some
examples.

KASNEBNOTES REVISIONKITS Page 83


KASNEBNOTES REVISION KIT - ICT

QUESTION 6

a) i) Presentation program;

- Application software used to display information informs of slide e.g. Microsoft


PowerPoint.

ii) Major components of a presentation program:

- Slide show engine: Used to display the designed slide content


- An Editor: Which allows text to be inserted and formatted

QUESTION 7

Six data processing operations in an organisation

 Data collection
 Classifying of data
 Data sorting
 Merging
 Summarising
 Validation

QUESTION 8

a) Common factors to consider in selecting a data processing method

 The optimisation of the processing time control over the resources e.g. Files, input/output
devices.
 Necessity of data communication equipment and the cost involved.
 Time factor for decision making by the management

b) Stages of data processing

 Data input- this is the process of data capture into the computer system for processing.
Input devices are used.
 Storage - This is an intermediary stage where input data is stored within the computer
system or on secondary storage awaiting processing or output after processing. Program
instructions to operate on the data are also stored in the computer.
 Processing - The central processing unit of the. computer manipulates data using
arithmetic and logical operations.
 Data control- This is where data is managed

KASNEBNOTES REVISIONKITS Page 84


KASNEBNOTES REVISION KIT - ICT

 Data output - The results of the processing function are output by the computer using a
variety of output devices.

QUESTION 9

a)

(i) Data processing is defined as those activities, which are concerned with the systematic
recording, arranging, filing, processing and dissemination of facts relating to the physical events
occurring in the business.

b) Data processing methods

Real Time Processing: This technique has the ability to respond almost immediately to various
signals in order to acquire and process information.

Batch Processing: This is a method where the information to be organized is sorted into groups
to allow for efficient and sequential

Online Processing: This is a method that utilizes Internet connections and equipment directly
attached to a computer; it is used mainly for information recording and research.

Distributed Processing: This method is commonly utilized by remote workstations connected to


one big central workstation or server,

b) Facilities required by data processing application

- Record navigation facility


- Sorting facility
- Finding/search facility
- Record saving facility
- Data validation
- Record deleting facility

KASNEBNOTES REVISIONKITS Page 85


KASNEBNOTES REVISION KIT - ICT

QUESTION 10

Features and capabilities of accounting packages

Most of the accounting software applications on the market provide the following features and
capabilities, to improve all facets of financial planning, management, control, and analysis. The
most basic features include:

General Ledger Management

This module enhances visibility into virtually all standard financial transactions such as
accounts, receivable, accounts payable, payroll, and sales orders. Additionally, accounting
software packages allow finance professionals to quickly and easily conduct consolidations by
dynamically combining multiple ledgers (such as those from different departments or business
units) into a single, complete financial statement.

Controlling and Budget Management

With an accounting software solution, financial teams can achieve and maintain tighter control
over departmental and corporate budgets, and conduct more rapid and accurate internal and time
accounting, cost accounting, product costing/cost of goods sold assessment, and more.

Cash Management

Many businesses struggle to correctly anticipate their cash flow requirements. Accounting
software applications, and their cash management capabilities, can help a business more
accurately assess both their current and future cash needs. Additionally, it can automate
reconciliations, as well as the processing, execution, and Lacking of all transactions that directly
impact available cash levels.

Financial Forecasting

Effective financial management is about more than just analyzing past trends, it’s about using
that insight to enhance future planning. With an accounting software system, a business can more
accurately predict and estimate potential profits and pending losses, revenue and cash flows, and
other important financial events. They can then use this information to define and implement
more successful corporate strategies.

Fixed Asset Management

Tracking a fixed capital asset portfolio can be a complex process, particularly for those
businesses that own an extensive amount of real estate or capital equipment. But, with an

KASNEBNOTES REVISIONKITS Page 86


KASNEBNOTES REVISION KIT - ICT

accounting software solution, the evaluation, acquisition, operation, maintenance, and valuation
of all types fixed assets is dramatically simplified.

Compliance Management

Because financial regulations have become much more stringent in the last several years, most
accounting software applications provide complete transaction audit trails, as well as rules-based
controls and advanced reporting capabilities that help facilitate compliance with Sarbanes-Oxley,
BASEL II, and other laws and guidelines.

Advanced Financial Planning

In the past, most companies have created their financial and business plans by analyzing
historical data, to uncover patterns and trends that may provide some indication of future events.
However, that approach provides only a portion of the insight needed. That’s why some
accounting software packages have incorporated advanced planning tools that simulate potential
business scenarios, such as mergers and acquisitions. This can help a business better predict how
major decisions will impact their financial standing.

QUESTION 11

Steps during database design process

1. Determine the purpose of your database - This helps prepare you for the remaining steps.
2. Find and organize the information required - Gather all of the types of information you
might want to record in the database, such as product name and order number.
3. Divide the information into .tables - Divide your information items into major entities or
subjects, such as products or Orders. Each subject then becomes a table.
4. Turn information items into columns - Decide what information you want to store in each
table. Each item becomes a field, and is displayed as a column in the table. For example,
an Employees table might include fields such as Last Name and Hire Date.
5. Specify primary keys - Choose each table's primary key. The primary key is a column
that is used to uniquely identify each row. An example might be Product ID or Order LD.
6. Set up the table relationships - Look at each table and decide how the data in one table is
related to the data in other tables. Add fields to tables or create new tables to clarify the
relationships, as necessary.
7. Refine your design - Analyze your design for errors. Create the tables and add a few
records of sample data.
See if you caii get the results you want from your tables. Make adjustments to the design,
as needed.
8. Apply the normalization rules - Apply the data normalization rules to see if your tables
are structured correctly, make adjustments to the tables

KASNEBNOTES REVISIONKITS Page 87


KASNEBNOTES REVISION KIT - ICT

(ii) Advantages of databases over traditional file systems

- Ease of sharing resources


- Improved data integrity
- The information is easy to access at any time,
- There is data independence
- Many people can access the same database at the same time.
- Improved data security.
- Reduced data entry, storage, and retrieval costs

QUESTION 12

a) Data generated in a purchasing transaction

- Purchasing power of customer


- Purchasing trends and patterns
- Most purchased commodities
- Effect of changes of prices on different commodities
- Distribution of customers

b) Main uses of information to business organization

Businesses and other organisations need information for many purposes: we have summarised
the five main uses in the table below.

Use Description
To plan properly, a business needs to know what resources it has (e.g. cash, people,
Planning machinery and equipment, property, customers). It also needs information about the
markets in which it operates and the actions of competitors. At the planning stage,
information is important as a key ingredient in decision-making.

Information about each transaction or event is needed. Much of this is required to


Recording be collected by law - e.g. details of financial transactions. Just as importantly,
information needs to be recorded so that the business can be properly managed.

Once a business has produced its plan it needs to monitor progress against the plan -
controlling and control resources to do so. So information is needed to help identify whether
things are going better or worse than expected, and to spot ways in which corrective
action can be taken

Performance must be measured for a business to be successful. Information is used


measuring as the main way of measuring performance. For example, this can be done by
collecting and analysing information on sales, costs and profits

KASNEBNOTES REVISIONKITS Page 88


KASNEBNOTES REVISION KIT - ICT

QUESTION 13

Application packages of a computer system

1. Data management package

These are packages, which help the creation and maintenance of data for enquiry and reporting
purposes. Microsoft Access etc

2. Graphics packages

These are packages, which provide facilities that allow users to make presentations using
overheads. They include Microsoft PowerPoint, Harvard graphics etc.

3. Spreadsheet packages

These are computer packages which deal with computations involving inter-related rows and
columns of data. Spreadsheets can be based to perform calculations on the value displayed in the
rows and columns. Spreadsheets are important to organisations in that: -they contain numerous
cells thus can handle a lot of data, and they contain chart facilities such as pie charts and bar
charts which can be used in information analysis. Examples are MS Excel and Lotus 123.

4. Word processing packages

These are special purpose packages used for the production of documents such as letters, reports
and contracts. They are Word perfect, Microsoft word etc

5. Desktop Publishing

DTP’S main function is to enable the page to be seen as the artwork image for editing and
production. Some common DTP packages include: PageMaker, Illustrator, Corel Draw, and
Photoshop

6. Communication software e.g. MS Outlook

7. Web Browsers: Provide an easy to way surf the Internet; The mostly used web browsers are
Microsoft internet explorer and Mozillan Firefox.

KASNEBNOTES REVISIONKITS Page 89


KASNEBNOTES REVISION KIT - ICT

QUESTION 14

a)

i) End user computing

This refers to an approach to systems development where some types of information systems can
be developed by end users with little or no formal assistance from technical specialists. Users
develop their own systems with the aid of user friendly software e.g. application generators.

ii) Electronic data interchange

EDI is an electronic means for transmitting business transactions between organizations. The
transmissions use standard formats such as specific record types and field definitions.

The EDI process is a hybrid process of systems software and application systems. EDI system
software can provide utility services used by all application systems. These services include
transmission, translation and storage of transactions initialized by or destined for application
processing. EDI is an application system in that the functions it performs are based on business
needs- and activities. The applications, transactions and trading partners supported will change
over time and the co-mingling of transactions, purchase orders, shipping notices, invoices and
payments in the EDI process makes it necessary to include application processing procedures
and controls in the EDI process.

iii) Data warehouse

A data warehouse is a subject-oriented, integrated, time-variant, non-volatile collection of data in


support of management's decision-making process. It may also be defined as a database with
reporting and query tools, that store current and historical data extracted from various operational
systems and consolidated for management reporting and analysis.

iv. Information center

Information Resource Centers co-ordinate all information activities within their areas of interest
and expertise. Information within that area is analysed, abstracted arid indexed for effective
storage, retrieval and dissemination.

KASNEBNOTES REVISIONKITS Page 90


KASNEBNOTES REVISION KIT - ICT

TOPIC 8
AN OVERVIEW OF INFORMATION SYSTEMS
QUESTION 1

a) Characteristics of management information systems

 MIS professionals usually design MRS rather than end users- using life cycle oriented
development methodologies.
 They are large and complex in terms of the number of system interfaces with the various
users and databases.
 MRS are built for situations in which information requirements are reasonably well
known and are expected to remain relatively stable. This limits the informational
flexibility of MRS but ensures that a stable informational environment exists.
 They do not directly support the decision making process in a search for alternative
solutions to problems. Information gained through MRS is used in the decision making
process.
 They are oriented towards reporting on the past and the present, rather than projecting the
future. Can be manipulated to do predictive reporting.
 MRS have limited analytical capabilities. They are not built around elaborate models, but
rather rely on summarisation and extraction from the databases according to the given
criteria.

b) Case for and against the use of online technology in a business enterprise

i) Cost

Case against

The cost for installation of the online technology devices like computers, computer networks are
very expensive, training of workers to use such devices and cost of maintenance is also very high
thus an disadvantage to the organisation

Case for

In the long-run the benefits accrued to online technology would outweigh the cost incurred e.g.
in advertisement it is cheaper to advertise online than on media, bill boards and other form of
advertisements.

KASNEBNOTES REVISIONKITS Page 91


KASNEBNOTES REVISION KIT - ICT

ii) Security Case for

Online technology has enhanced security of documents as it prevent access of unauthorised users
through passwords and encryptions hence an organisation can maintain its confidential
information without leaking to public thus an advantage to the organisation.

Case against

Through online technology important information of business strategies can leak to its
competitors through hacking of the business systems

iii) Reliability Case against

Information on online technology i.e. internet is not that reliable as information posted might be
misleading or provide false information thus making business decision at times relying on
internet might not be suitable thus an disadvantage

iv) Time taken to complete transaction Case for

Using of online technology is very advantageous to the organisation because its transaction will
be done veiy fast e.g transaction between two companies in different countries is done very
easily and quick online.

c) Concepts of information system security

i) Confidentiality - protect information value and preserve #5e confidentiality of sensitive


data. Information should not be disclosed without' authorization. Information the release of
which is permitted to a certain section of the public should be identified and protected
against unauthorized disclosure.

ii) Integrity - ensure the accuracy and reliability of the information stored on the computer
systems. Information has integrity if it reflects some real world situation or is consistent,
with real world situation. Information should not be altered without authorization. Hardware
designed to perform some functions has lost integrity if it does not perform those functions
correctly. Software has lost integrity if it does not perform according to its specifications.
Communication channels should relay messages in a secure, manner to ensure that
.integrity. People should ensure the system functions according to the specifications.

iii) Availability - ensure the continued availability of the information system and all its assets to
legitimate users at an acceptable level of service or quality of service. Any event that
degrades performance or quality of a system affects availability

KASNEBNOTES REVISIONKITS Page 92


KASNEBNOTES REVISION KIT - ICT

QUESTION 2

a) Guidelines for managing computer passwords.

 Do not share your password with anyone for any reason


 Change your password periodically
 Consider using a passphrase instead of a password: A passph!“ase is a password made up
of a sequence of words with numeric and/or symbolic characters inserted throughout. A
passphrase could be a lyric from a song or a favorite quote. Passphrases typically have
additional benefits such as being longer and easier to remember.
 Do not write your password down or store it in an insecure manner
 Avoid reusing a password
 Avoid using the same password for multiple accounts
 Do not use automatic logon functionality

QUESTION 3

(a) Distinguish between the following terms:

(i) Data security and systems security.

Data security refers to protective digital privacy measures that are applied to prevent
unauthorized access to computers, databases and websites, Data security also protects data from
corruption. Data security is the main priority for organizations of every size and genre. Data
security is also known as information security (IS) or computer security.

System security is control of access to a computer system's resources, especially its data and
operating system files.

QUESTION 4

Discuss the evolution of information systems.

Until the 1960s, the role of most information systems was simple. They were mainly used for
electronic data processing (EDP) purposes such as transactions processing, record-keeping and
accounting. EDP is often defined as the use of computers in recording, classifying, manipulating,
and summarizing data. It is also called transaction processing systems,-(TPS), automatic data
processing, or information processing.

In the 1960s, another role was added to the use of computers: the processing of data into useful
informative reports. The concept of management information systems (MIS) was born. This new

KASNEBNOTES REVISIONKITS Page 93


KASNEBNOTES REVISION KIT - ICT

role focused on developing business applications that provided managerial end users with
predefined management reports that would give managers the information they needed for
decision-making purposes.

By the 1970s, these pre-defined management reports were not sufficient to meet many of the
decision making needs of management. In order to satisfy such needs, the concept of decision
support systems (DSS) was born. The new role for information systems was to provide
managerial end users with ad hoc and interactive support of their decision-making processes.

In the 1980s, the introduction of microcomputers into the workplace ushered in a new era, which
led to a profound effect on organizations. The rapid development of microcomputer processing
power (e.g. Intel’s Pentium microprocessor), application software packages (e.g. Microsoft
Office), and telecommunication networks gave birth to the phenomenon of end user computing.
End users could now use their own computing resources to support their job requirements instead
of waiting for the indirect support of a centralize corporate information services department. It
became evident that most top executives did not directly use either the MIS reports or the
analytical modelling capabilities of DSS, so the concept of executive information systems (EIS)
was developed.

Moreover, breakthroughs occurred in the development and application of artificial intelligence


(AI) techniques to business information systems. With less need for human intervention,
knowledge workers could be freed up to handle more complex tasks. Expert systems (ES) and
other knowledge management systems (KMS) also forged a new role for information systems.
ES can serve as consultants to users by providing expert advice in limited subject areas.

QUESTION 5

a) Benefits of office automation system

Office automation entails the use of information technology to collect, process, store, manipulate
and disseminate information.

Benefits are:

- Cost reduction such as the cost of purchasing stationeries


- Greater speeds, volumes and accuracy in routine processing.
- Improved quality of management information.
- Increased productivity
- Better customer service

KASNEBNOTES REVISIONKITS Page 94


KASNEBNOTES REVISION KIT - ICT

b) Application of cloud competing

- Cloud computing is the use of computing resources (hardware and software) that are
delivered as a service over a network (typically the Internet).
- The first is backup and recovery. Clearly, it is more efficient to make use of a cloud
computing service to provide backup and recovery.
- Software-as-a-Service (SaaS) is a form of cloud computing. Whether it’s a payroll or
customer relationship management (CRM) system, there are times when delivering those
applications as a service makes sense. A lot of times, the internal IT organization does
not have the expertise required to run a particular application or that application may not
be strategic enough to justify committing limited IT resources to managing it.
- Developing of more specialized application services which are able to meet the specific
needs

QUESTION 6

a) i) Define the terra Management Information system :

These are information systems at the management level of an organization that serve the
functions of planning, controlling and decision making by providing routine summary and
exception reports.

ii) Advantages of Management information systems to the banking sector

 Convenience: Online banking sites never close; they're available 24 hours a day, seven
days a week, and they're only a mouse click away.' m
 Ubiquity: If you're out of state or even out of the country when a money problem arises,
you can log on instantly to your online bank and take care of business.
 Transaction speed: Online bank sites generally execute and confirm transactions at or
quicker speed.
 Efficiency: You can access and manage all of your bank accounts, even securities, from
one secure site.
 Effectiveness: Many online banking sites now offer sophisticated tools, including
account aggregation, stock quotes, rate alerts and portfolio managing programs to help
you manage all of your assets more effectively. Most are also compatible with money
managing programs such as Quicken and Microsoft Money.

KASNEBNOTES REVISIONKITS Page 95


KASNEBNOTES REVISION KIT - ICT

QUESTION 7

Explain authentication techniques that could enhance security of information systems in an


organisation

- Management support and commitment - management should approve and support formal
security awareness and training.
- Access philosophy - access to computerized information should be based on a
documented need-to-know, need-to-do’ basis.
- Compliance with relevant legislation and regulations
- Access authorization - the data owner or manager responsible for the accurate use and
reporting of the information should provide written authorisation for users to gain access
to computerized information.
- Reviews of access authorization - like any other control, access controls should be
evaluated regularly to ensure they are still effective.
- Security awareness - all employees, including management, need to be made aware on a
regular basis of the importance of security.

QUESTION 8

a) Functions of an organization that could be automated

 Accounting and finance


 Sales and marketing
 human resource function
 Banking

b) How a computer system could be modified for use by physically challenged person

- Screen reader software application: This reads the information displayed on the screen
aloud, menus selections, and graphical icons on the desktop. It reads aloud the text within
a document, dialog boxes and also reads errors
- Screen magnification software: This enlarges the viewing area of a computer monitor
display. The magnification levels are measured in power levels such as 2x,4\.16x
- Optical character recognition

KASNEBNOTES REVISIONKITS Page 96


KASNEBNOTES REVISION KIT - ICT

QUESTION 9

a) Explain

i) Uniform resource locator: Unique address for a file that is accessible to the internet.

ii) Cloud computing: delivery of computing as a service rather than a product whereby shared
resources, software and information are provided to computers and other devices

QUESTION 10

a) i) Knowledge management system. Computer based system description of efforts' and


techniques to hold an organisation identify, capture, store, share and exploit thinks that it knows.

ii) Benefits of knowledge management system

 Knowledge management system improves decision making


 Knowledge management system improves customer services
 Knowledge management system enhances employees skills
 Knowledge management system enables the organisation to maximize its profits.

iii) Problems faced when implementing a new knowledge management system

- Lack of the required technology skills


- Cost of implementation
- Challenge of ensuring the quality of the knowledge that a system contains
- Putting knowledge in a format that people can easily access from the system

QUESTION 11

a) Conditions that might increase the vulnerability of the information systems security

i) Operator error:

- Unskilled operators Careless handling

ii) Hardware malfunction:

- Power surge or failure


- Overheating due to overworking of the hardware

KASNEBNOTES REVISIONKITS Page 97


KASNEBNOTES REVISION KIT - ICT

iii) Software bugs:

- Software that has not been scanned


- Computer viruses and worm

iv) Data errors

- Inconsistence in data
- Missing error

v) Accidental disclosure of information

- Failure to log out on information


- Saving passwords on Shared computer which causes exposes

vi) Theft

- Access by un trusted or unauthorized staff


- Poor security measures

vii) Vandalism and sabotage

- Permeable firewall
- Access by unauthorized personnel

QUESTION 12

a) Needs of the executive which an EIS is able to address

- EIS provide a generalized computing and communication environment to senior


managers to support strategic decisions. :
- Evaluation of the date of ret. m of a project and measuring it against the company’s cost
of capital.
- They draw data from the management information system and allow communication
with external sources of information.
- EIS are designed to facilitate senior managers access to information quickly and
effectively. ESS has menu-driven user-friendly interfaces, interactive graphics to help
visualization of the situation and communication capabilities that link the senior
executives to the external databases he requires.
- Top executives need ESS because they are busy-and want information quickly and in
an easy to read form.
- There is and want their computer set-up to directly communicate with others.

KASNEBNOTES REVISIONKITS Page 98


KASNEBNOTES REVISION KIT - ICT

- Provide summarized data from organization system since they want structured forms
for viewing and want summaries rather than details.
- Direct access to information from high level of information to low levels of information
- they have the facilities which allow the executives to drill down their information.

b) Structural elements of a computer system

Memory data register

All data and instructions pass in and out of the processor through the memory data register.

Memory buffer register

Before the fetch execute cycle between the memory and the other device the source and the
destination address being accessed in the memory must be specified by loading these address
form the sequence control register to the memory address register.

Sequence control register

It keeps track of memory address of the next instruction to be performed and this address is
transferred to the memory address register.

QUESTION 13

a) End point security threats are;

- Disclosure: Where messages and data traversing internet can be seen by other machines
including e-mail files, passwords and in some cases key-strokes as they are being entered
in real time.

- Unauthorized access: since many internet software packages can render system subject
to attack. Lack of proper configuration can result to unauthorized access incidents. The
perimeter can be protected with firewalls

- Theft or alteration of corporate information: where information can be intercepted and


contents changed, this can have disastrous effect.

- Viruses and worms: this can be from from e-mail attachments. An email anti-virus
gateway to filter incoming email messages can be used for protection.

- Disruption of network devices and services- Set up an authentication server on the


network and equip remote users with authentication tokens.

KASNEBNOTES REVISIONKITS Page 99


KASNEBNOTES REVISION KIT - ICT

QUESTION 14

a) Security concern that a personal computer user faces

- Unauthorized access resulting in a loss or leaking of confidential information


- Unauthorized disclosure - information revealed without authorization
- Theft or destruction especially with respect to hardware and software
- Interference with system operation due to viruses and worms

QUESTION 15

a) Define

(i) Information system is a set of interrelated components that collect, manipulate, process and
transform data into information and provide feedback to meet a specified objective.

(ii) Types of information systems

1. Transaction Processing Systems (TPS)


2. Management Information Systems (MIS) .
3. Decision Support Systems (DSS)
4. Executive Support Systems (ESS)
5. Expert Systems

b) Measures to minimize occupational over-use syndrome


- Ensuring that the work area is arranged so that materials, equipment and controls can
be easily reached without stretching or twisting. . :
- Providing training and information to employees about safe working practices, for
example correct work methods and postures and the correct use of tools, machinery
and other equipment.
- Providing appropriate equipment and workstations for the job, such as ergonomically
designed, adjustable furniture, chairs, desks and computers.
- Ensuring that hand tools for repetitive tasks are a comfortable size, shape and weight,
are well- balanced with a comfortable grip and require no more than reasonable force
to operate.
- Ensuring that equipment is regularly maintained and replaced as needed and that new
equipment is assessed on health and safety grounds before purchase.

KASNEBNOTES REVISIONKITS Page 100


KASNEBNOTES REVISION KIT - ICT

QUESTION 16

a) Characteristics of

i) Transaction processing system

 TPS are large and complex in terms of the number of system interfaces with the various
users and databases and usually developed by MIS experts.
 TPS’s control collection of specific data in specific formats and in accordance with rules,
policies, and goals of organisation- standard format
 They accumulate information from internal operations of the business.
 They are genera] in nature—applied across organisations.

ii) Sales and Marketing system •Attach supporting documentation

 Sellers and buyers are connected by four flows: Communication, Products/services;


Money; and Information.
 The sellers send products, services, and communications to the market; in return, they
receive money and information.
 Manage activities for conversion to sale

QUESTION 17

a) Role of information system in an organization

1. Transaction processing: Transaction processing systems process and record transactions


as well as update records. They automate the handling of data about business activities
and transactions.
2. Management reporting: This is the function involved in producing outputs for users.
These outputs are mainly as reports to management for planning, control and monitoring
purposes.
3. Decision support: This supports managers in day-to-day decision-making by use of
models, which can easily be understood and used by managers for decision making
purposes.

b) Components of an information system include:

i. People - These use the system to fulfill their informational needs. They include end users
and operations personnel such as computer operators, systems analysts, programmers
information systems management and data administrators.

KASNEBNOTES REVISIONKITS Page 101


KASNEBNOTES REVISION KIT - ICT

ii. Computer Hardware - Refers to physical computer equipment and devices, which
provide for five major functions.
i. Input or data entry
ii. Output
iii. Secondary storage for data and programs
iv. Central processor (computation, control)
v. Communication
iii. Computer Software - Refers to the instructions that direct the operation of the computer
hardware. It is classified into system and application software.
iv. Telecommunication System/Communication network
v. Databases - Contains all data utilized by application software. An individual set of stored
data is referred to as a file. Physical storage media evidences the physical existence of
stored data, that is: tapes, disk packs, cartridges, and diskettes.
vi. Procedures - Formal operating procedures are components because they exist in physical
forms as manuals or instruction booklets. Three major types of procedures are required.
a) User instructions - for application users to record data, to use a terminal for data
entry or retrieval, or use the result.
b) Instructions for preparation of input by data preparation personnel.
c) Operating instructions for computer operations personnel.

QUESTION 18

a) Types of information systems

i. Transaction processing systems (TPSs): These are systems that perform and record
daily routine transactions necessary to conduct the business. An example is a point of
sale system.

ii. Management Information Systems (MISs): These are information systems at the
management level of an organization that serve the functions of planning, controlling
and decision making by providing routine summary and exception reports.

iii. Decision Support System (DSSs): These are information systems at the organization’s
management level that combine data and sophisticated analytical models or data
analysis tools to support non-routine decision making.

iv. Executive Support Systems: These are information systems at the organization’s
strategic level designed to address unstructured decision making through advanced
graphics and communication.

v. Expert Systems - An artificial intelligence system which capture the knowledge of


experts and stores the knowledge in the knowledge base.

KASNEBNOTES REVISIONKITS Page 102


KASNEBNOTES REVISION KIT - ICT

QUESTION 19

a) Services provided by information systems

(i) Accounting: These are systems that maintain records concerning the flow of funds in
the firm and produce financial statements, such as balance sheets and income
statements. They are among the earliest systems to be computerized.

(ii) Sales and marketing: These are systems that support the sales and marketing function
by facilitating the movement of goods and services from producers to customers.

(iii) Banking: Some of the information systems implemented by banks include

(iv) Human resource: These are systems that deal with recruitment, placement,
performance evaluation, compensation and career development of the firm’s
employees.

QUESTION 20

a) Controlling the spread of computer viruses

 Ensure you have an update ant-virus software and scanning definitions frequently
 Allow no disk to be used until it has been scanned on a stand-alone machine that is used
for no other purpose and is not connected to the network.
 Ensure that the network administrator uses workstation and server anti-virus software
•Insist that field technicians scan their disks bn a test machine before they use any of their
disks on the system
 Enforce a rule of not using shareware without first scanning the shareware thoroughly for
a virus '
 Build any system from original, clean master copies. Boot only from original diskettes
whose write protection has always been in place.
 Write-protect all diskettes with EXE or COM extensions

b) Threats due to computer crime

- Sabotage - some perpetrators are not looking for financial gain. They merely want to
cause damage due to dislike of the organization or for self-gratification

- Financial loss - these losses can be direct, through loss of electronic funds or indirect,
through the costs of correcting the exposure.

- Legal repercussions - Not having proper security measures could expose the
organization to lawsuits from investors and insurers if a significant loss occurs from a

KASNEBNOTES REVISIONKITS Page 103


KASNEBNOTES REVISION KIT - ICT

security violation. Most companies also must comply with industry-specific regulatory
agencies.

- Loss of credibility or competitive edge - many organizations, especially service firms


such as . banks, savings and loans and investment firms, need credibility and public
trust to maintain a competitive edge. A security violation can severely damage this
credibility, resulting in loss of business and prestige.

- Blackmail/Industrial espionage - by gaining access to confidential information, a


perpetrator can extort payments or services from an organization by threatening to
exploit the security breach.

QUESTION 21

a) An information system (IS) is a set of interrelated components that collects, processes,


stores, and analyses and disseminates data into information for a specific purpose and provide
feedback to meet a specified objective.

Information technology (IT) refers to the technological aspect of information systems. It is an


inclusive term which describes a Collection of several IS within an organization. IT basically
represents the modern merger of computer technology with telecommunications technology

b)

(i) Transaction processing systems

These are computerized systems that perform and record daily routine transactions necessary to
conduct the business. An example is a point of sale system. Transaction processing systems serve
the operational level of an organization. The inputs to a TPS are transactions and events. The
processing consists of listing, sorting, merging, and updating. The outputs are detailed reports,
lists and ' summaries. TPSs specifically serve operational personnel and supervisors. They enable
supervisors to make structured decisions by the reports they provide e.g. a decision to restock
based on the stock levels report.

(ii) Decision Support System

These are information systems at the organization’s management level that combine data and
sophisticated analytical models or data analysis tools to support non-routine decision making.
The information inputs to a DSS include low-volume data or massive databases optimized for
data analysis, analytical models and data analysis tools. The processing consists of interactive
simulations and analysis. Tim output consists of special reports, decision analyses and responses
to queries. DSSs specifically serve professionals and staff managers. They enable them to make
unstructured decisions e.g. business contract analysis, corporate planning and forecasting.

KASNEBNOTES REVISIONKITS Page 104


KASNEBNOTES REVISION KIT - ICT

(iii) Knowledge management systems

Knowledge Management System (KM System) refers to a system for managing knowledge in an
organization for supporting creation, identify, capture, store, share, exploit and disseminate
information.

The idea of a KM system is to enable employees to have ready access to the organization's
documented base, of facts, sources of information, and solutions. Examples are Document based
i.e. any technology that permits creation, management, sharing of formatted documents such as
Lotus Notes, Share Point, web, distributed databases etc.

(iv) Office Automation Systems

Office automation systems support general office work for handling and managing documents
and facilitating communication. Text and image processing systems evolved as from word
processors to desktop publishing, enabling the creation of professional documents with graphics
and special layout features. Spreadsheets, presentation packages like PowerPoint, personal
database systems and note- taking systems (appointment book, notepad, card file) are part of
OAS.

In addition OAS includes communication systems for transmitting messages and documents (e-
mail) and teleconferencing capabilities.

QUESTION 22

a) Types of general information systems controls

- Administrative controls: They ensure that the organization activities are properly
executed by definition of recovery procedures and job rotation
- Computer operations control: To oversee the work of computer users and to ensure that
user activities are consistent with the organization policies
- Software controls: They ensure that the computer software and data are safe from
unauthorized accessibility and computer viruses ^
- Hardware controls: They ensure that the computer hardware is secure from theft and
damage
- Implementation controls: Ensure that information systems are developed and
implemented as per the initial specification

KASNEBNOTES REVISIONKITS Page 105


KASNEBNOTES REVISION KIT - ICT

TOPIC 9
COMPUTER NETWORKS
QUESTION 1

a) Modes of communication with reference to cost, speed of transmission and reliability

i) Serial transmission

In serial transmission, bits flow in a continuous stream. It is the way most data is sent over
telephone lines. It is used by external modems typically, connected to a microcomputer through a
serial port. The technical names for such serial ports are RS-232C connector or asynchronous
communications port. .

ii) Parallel mode

In parallel transmission, bits flow through separate lines simultaneously (at the same time).
Parallel transmission is typically limited to communications over short distances (not telephone
lines). It is the standard method of sending data from a computer’s CPU to a printer.

QUESTION 2

a) Computer network topologies

i) Star network

In a star network there are a number of small computers or peripheral devices linked to a central
unit called a main hub. The central unit may be a host computer or a file server. All
communications pass through the central unit and control is maintained by polling. This type of
network can be used to provide a time-sharing system and is common for linking
microcomputers to a mainframe.

KASNEBNOTES REVISIONKITS Page 106


KASNEBNOTES REVISION KIT - ICT

ii) Ring network

In a ring network each device is connected to two other devices, forming a ring. There is no
central file server or computer. Messages are passed around the ring until they reach their
destination. Often used to link mainframes, especially over wide geographical areas. It is useful
in a decentralized organization called a distributed data processing system.

b) Advantage and disadvantage of the topologies mentioned above Star network topology
Advantages:

 It is easy to add new and remove nodes


 A node failure does not bring down the entire network
 It is easier to diagnose network problems through a central hub

Disadvantages:

 If the central hub fails the whole network ceases to function


 It costs more to cable a star configuration than other topologies (more cable is required
than for a bus or ring configuration).

Ring network topology

Advantages:

 Ring networks offer high performance for a small number of workstations or for larger
networks where each station has a similar work load
 Ring networks can span longer distances than other types of networks
 Ring networks are easily extendable m

Disadvantages

 Relatively expensive and difficult to install


 Failure of one component on the network can affect .the whole network

KASNEBNOTES REVISIONKITS Page 107


KASNEBNOTES REVISION KIT - ICT

 It is difficult to troubleshoot a ring network


 Adding or removing computers can disrupt the network

QUESTION 3

(a) (i) Definition of "mobile computing”

Mobile Computing is a variety of wireless devices that has the mobility to allow people to
connect to the internet, providing wireless transmission to access data and information from
where ever location they may be.

Mobile computing has three aspects: mobile communication, mobile hardware, and mobile
software. The first aspect addresses communication issues in ad-hoc and infrastructure networks
as well as communication properties, protocols, data formats and concrete technologies. The
second aspect is on the hardware, e.g., mobile devices or device components. The third aspect
deals with the characteristics and requirements of mobile applications.

(ii) Limitations of mobile computing devices

Insufficient bandwidth

Mobile Internet access is generally slower than direct cable connections, using technologies such
as GPRS and EDGE, and more recently PISDPA and HSUPA 3G networks. These networks are
usually available within range of commercial cell phone towers. Higher speed wireless LANs are
inexpensive but have very limited range.

Security standards

When working mobile, one is dependent on public networks, requiring careful use of VPN.
Security is a major concern while concerning the mobile computing standards on the fleet. One
can easily attack the VPN through a huge number of networks interconnected through the line.

Power consumption

When a power outlet or portable generator is not available, mobile computers must rely entirely
on battery power. Combined with the compact size of many mobile devices, this often means
unusually expensive batteries must be used to obtain the necessary battery life.

Transmission interferences

Weather, terrain, and the range from the nearest signal point can all interfere with signal
reception. Reception in tunnels, some buildings, and rural areas is often poor.

KASNEBNOTES REVISIONKITS Page 108


KASNEBNOTES REVISION KIT - ICT

Potential health hazards

People who use mobile devices while driving are often distracted from driving are thus assumed
more likely to be involved in traffic accidents. (While this may seem obvious, there is
considerable discussion about whether banning mobile device use while driving reduces
accidents or not. Cell phones may interfere with sensitive medical devices. There are allegations
that cell phone signals may cause health problems.

Human interface with device

Screens and keyboards tend to be small, which may make them hard to use. Alternate input
methods such as speech or handwriting recognition require training.

QUESTION 4

(a) Modes of data communication and their practical use.

Simplex

Data travels in one direction (from A to B). An example of a simplex link would be scoreboards
such as those used in hockey, basketball, or other sports. The information is entered at a console
by the. score/timekeeper and sent serially to large displays that everybody can see.

Half-duplex

Data travels in one direction (from A to B) and then the other direction (from B to A) but not at
the same time. The RS-485 is half-duplex.

Full-duplex

Data can travel in both directions at the same time.

QUESTION 5

(a) (i)Definition of the term "protocol" in the context of computer networks.

Protocol is the special set of rules that end points in a telecommunication connection use when
they communicate. Protocols specify interactions between the communicating entities. Protocols
exist at several levels in a telecommunication connection. For example, there are protocols for
the data interchange at the hardware device level and protocols for data interchange at the
application program level

KASNEBNOTES REVISIONKITS Page 109


KASNEBNOTES REVISION KIT - ICT

(b)Types of wireless media necessary when setting up a network

 Wireless Personal Area Networks (WPANs)


 Wireless Local Area Network (WLAN)
 Wireless Mesh Network
 Wireless Metropolitan Area Networks
 Wireless Wide Area Networks

QUESTION 6

a) Advantages of the virtual private network

A virtual private network (VPN) is a technology for using the Internet or another intermediate
network to connect computers to isolated remote computer networks that would otherwise be
inaccessible. A VPN provides security so that traffic sent through the VPN, connection stays
isolated from other computers .on the intermediate network. VPNs can connect individual users
to a remote network or connect multiple networks together.

Advantages

1. Cost Savings - By leveraging third party networks, with VPN, organizations no longer
have to use expensive leased or frame relay lines and are able to connect remote users to
their corporate networks via a local Internet service provider (ISP) instead of via
expensive 800- number or long distance calls to resource-consuming modem banks.

2. Security - VPNs provide the highest level of security using advanced encryption and
authentication protocols that protect data from unauthorized access.

3. Scalability - VPNs allow corporations to utilize remote access infrastructure within ISPs.
Therefore, corporations are able to add a virtually unlimited amount of capacity without
adding significant infrastructure.

4. Compatibility with Broadband Technology - VPNs allowmobile workers, telecommuters


and day extenders to take advantage of high-speed, broadband connectivity, such as DSL
and Cable, when gaining access to their corporate networks, providing workers
significant flexibility and efficiency.

5. VPNs enable you to create secure, business-critical communication links over the
Internet.

6. Give telecommuters and mobile workers secure access to your LAN

7. Share resources with partners.

KASNEBNOTES REVISIONKITS Page 110


KASNEBNOTES REVISION KIT - ICT

QUESTION 7

a) One end device used in computer network

Printer: a devise used to produce text and graphics on paper or hardcopy

QUESTION 8

a) i) Logical topology as used in computer networks: Refers to how data is transmitted between
the network component or in a physical topology (physical topology refers to physical layout of
networks).

ii) Types of logical topologies

- Shared media topology. All systepis have the ability to access the physical layout
whenever they are needed.
- Token based topology. Works by using a token to produce access to the physical media.

QUESTION 9

d) Difference between data privacy and data security

Data privacy is the protection of data from unauthorised access by use of password e.g.
encryptions usernames etc. whereas Data security is the protection of data system from loss
damage or theft by either using physical security such as employing security personnel.

e) Counter measures to information security.

 Appointment of security officer he should be responsible for preparation of the original


security plan, implementation of the plan and controlling daily activities of security
measures.
 Security software, A utility programme that should monitor access to file and authorised
access to file
 Back up plans. Back up means making a copy in anticipation of future failure or
corruption, backup copy of a file is a duplicate copy kept separately from the main
system and only used if the original fails, stolen, lost etc.

KASNEBNOTES REVISIONKITS Page 111


KASNEBNOTES REVISION KIT - ICT

QUESTION 10

a) i) Define the term “network firewall”

A firewall is a barrier between two networks, an internal network (trusted network) and an
external network (untrusted network). Here the external network is the Internet, Firewalls
examine incoming and outgoing packets and according to a set of rules defined by an
administrator, either let them through or block them out.

ii) Advantages and disadvantages of adopting hardware firewall

Hardware firewall is peripheral devices of a computer that checks information coming from the
internet or a network then allows it or blocks it to pass through the computer.

Advantages Disadvantages

1. Speed: hardware firewalls have high 1. Hardware firewalls are costly: that is the
response rate thus enabling transmission of cost of purchasing and installing them is
information to be easier. very expensive hence not easily affordable.

2. Security: Hardware firewalls reduces the 2. Hardware firewalls are difficult to install
security risks of data and information in the and upgrade that is before installation it
computer by allowing required information will need knowledge of an expert and on
to pass in the computer and blocks the one upgrading because of the technology
that may be seem to be threat in the changing environment is going to be
computer. difficult.

3. Hardware firewalls have no interference to 3. Hardware firewalls takes up a large area


other applications in the computer. (physical space in the organisation and
involves a lot of wiring which might be
risky during breakdown

QUESTION 11

a) i) Unusual events that could alert Joyce Kubo of possible computer virus infection

- New icons and files that she did not create


- Antivirus program becomes disabled.
- The computer runs slower than usual and disks and disk drive become inaccessible
- The computer stops responding or locks up frequently

KASNEBNOTES REVISIONKITS Page 112


KASNEBNOTES REVISION KIT - ICT

- Double extension on recently opened documents ii) Reasons why Joyce Kubo prefers
PDF file format

ii) Reasons why Joyce Kubo prefers PDF file format

- Supports high levels of data encryption and security and provides an easy and secure
approach for data
- Preserves all visual element which have been created in another document such as word,
or excel document when saving as a PDF file
- Allows file compression from raw data file such as PowerPoint. It is useful in graphics
laden documents since PDF can achieve effective reduction.
- With the necessary software to read PDF file, PDF documents are portable and can be
easily accessed

iii) Precaution Joyce Kubo should observe when putting text in a presentation

- Ensure the presentation should be precise


- Make use of graphics and other visual styles
- Ensure the fonts are large and well visible
- Ensure information is well arranged in the slides and there is a flow of the information
being passed across

QUESTION 12

(i) Explain Graphical User Interface (GUI): refers to the interaction between end users
and the computer based upon a graphical display. These are tools which are designed to enhance
persona] computing work. They are mostly fitted on work stations or personal computers with
graphical adaptors able to support high resolution graphics.

(ii) Reasons why GUI is easier to use than command line interface

- Graphical symbols are more easily recognized and memorized than text.
- Direct manipulation, for example by pointing and clicking on graphical objects with a
mouse, reduces learning time for users and gives them a greater feeling of control over
the HCI.
- Make computer operations more intuitive and thus easier to use and learn.
- Provide users with immediate, visual feedback about the effect of each action.

KASNEBNOTES REVISIONKITS Page 113


KASNEBNOTES REVISION KIT - ICT

QUESTION 13

a) Basic computer network configurations

 Star.
 Bus
 Ring
 Hierarchical (hybrid)
 Completely connected (mesh)
 Peer-To-Peer
 Client-Server

QUESTION 14

a) Factors determining processing power of a computer

i) Processor Speed: The faster the processor speed the more powerful the computer

ii) Bus Width or Path; The larger the bandwidth, the more the instructions it can hold and
thus faster processing power

iii) Processor Instructions Set: The higher the instruction set the faster the computer
processing power

iv) Cache Memory; The higher the cache memory, the more the virtual memory and thus the
more powerful the computer is

v) Bus Speed; The higher the speed the more powerful computer is.

QUESTION 15

a) Types of computer networks

A computer network is a communications system connecting two or more computers that work
to exchange information and share resources (hardware, software and data).

Local Area Network (LAN)

A LAN is a computer network in which computers and peripheral devices are in close physical
proximity. An example of a local area network would be the network inside a particular company
or the network at our home

KASNEBNOTES REVISIONKITS Page 114


KASNEBNOTES REVISION KIT - ICT

Metropolitan Area Network (MAN)

A MAN is a computer network that may be citywide. This type of network may be used as a link
between office buildings in a city. The use of cellular phone systems expands the flexibility of a
MAN network by linking car phones and portable phones to the network.

Wide Area Networks (WAN)

A WAN is a computer network where the networks and the hosts are very widely distributed
geographically. It normally connects networks over a large physical area, such as in different
buildings, towns or even countries.

Personal Area network (PAN)

It is a proprietary open wireless technology standard for exchanging data over short distances
using short wave lengths radio transmissions from fixed and mobile devices, creating personal
area networks.

b) Distinguish asynchronous and synchronous transmission

Asynchronous transmission - data is sent and received one byte at a time. Used with
microcomputers and terminals with slow speeds.

Synchronous transmission — data is sent and received several bytes (blocks) at a time. It
requires a synchronized clock to enable transmission at timed intervals.

QUESTION 16

a) World Wide Web

This refers to a system with universally accepted standards for storing, formatting and displaying
information in a networked environment. Information is stored as electronic “pages” that contain
text, graphics, animations, sound and video.

b)

i) Protocol:

It refers to a set of communication rules for exchange of information. Protocols define speeds
arid modes for connecting one computer with another computer. An example of communication
protocols is the Open System Interconnection (OSI) set of communication protocols which are
used to identify functions provided by any network and to separate each network function into
seven ‘layers’ of communication roles. . '

KASNEBNOTES REVISIONKITS Page 115


KASNEBNOTES REVISION KIT - ICT

ii) Protocols used in World Wide Web

Simple Mail Transfer Protocol (SMTP)-used with the TCP/IP suite. It has traditionally been
limited to the text-based electronic messages.

Transmission Control Protocol/Internet Protocol - are the rules for communicating over the
internet, a message is broken down into small parts called packets before it is sent over the
Internet. HyperText Transfer Protocol-HTTP defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to various
commands FTP (File Transfer Protocol) - allows you to copy files on the Internet or download
where you copy a file from an internet to your computer

(iii) Ways of accessing web pages

1. Search tools: Search tools developed for the Internet help users locate precise
information. The search tools can be accessed from the web.

2. Indexes: These are web directories that have organized information which is in
categories such as education, health etc. the categories are further organization into sub
categories where one can search further until the desired document appears. Such
indexes are Yahoo, Ask etc.

3. Applets and Java: Web pages contain links to special programs called .applets written in
a programming language called Java. Java applets are widely used to add interest and
activity such as interactive games, graphics, animation etc. to a website.

Search engines: This are organized like a database and are also known as web spiders or web
crawlers. These databases are maintained by special programs called agents, bots or spiders.
Widely used search engines are Google, AltaVista and HotBot.

QUESTION 17

a) Data communication media

Telephone lines (Twisted Pair)

Telephone line cables made up of copper wires called twisted pair. A single twisted pair.
Culminates in a wall jack where you plug your phone. Telephone lines have been the standard
communication channel for both voice and data.

KASNEBNOTES REVISIONKITS Page 116


KASNEBNOTES REVISION KIT - ICT

Coaxial cable

Coaxial cable is a high-frequency transmission cable that replaces the multiple wires of
telephone lines with a single solid copper core. It is often used to link parts of a computer system
in one building.

Fibre-optic cable

Fibre-optic cable transmits data as pulses of light through tubes of glass. Fibre-optic cables are
immune to electronic interference and more secure and reliable.

Microwave

Microwaves transmit data as high-frequency radio waves that travel in straight lines through air.
They can only be transmitted over short distances.

Satellite

Satellites are used to amplify and, re lay microwave signals from one transmitter on the ground
to another. Bluetooth

It is a proprietary open wireless technology standard for exchanging data over short distances
using short wave lengths radio transmissions from fixed and mobile devices, creating personal
area networks.

QUESTION 18 '

a) Possible causes of data security and mitigations that could be taken to secure data

 Unauthorized access: since many internet software packages can render system subject to
attack. Lack of proper configuration can result to unauthorized access incidents. The
perimeter can be protected with firewalls
 Viruses and worms: this can be from e-mail attachments. An email anti-virus gateway to
filter incoming email messages can be used for protection.
 Corporate network intrusion - protect the perimeter with firewalls. If you want remote
users to access sensitive internal data, set up an authentication server on the network and
equip remote users with authentication tokens or smart cards.

KASNEBNOTES REVISIONKITS Page 117


KASNEBNOTES REVISION KIT - ICT

QUESTION 19

Describe the following computer network topologies

a) Bus topology

In a bus network each device handles its communications controls. There is no host computer;
however there may be a file server, all communications travel along a common connecting cable
called a bus. It is a common arrangement for sharing data stored on different microcomputers. It
is not as efficient-as star network for sharing common resources, but is less expensive. The
distinguishing feature is that all devices (nodes) are linked along one communication line - with
endpoints - called the bus or backbone.

Advantages:

- Reliable in very small networks as well as easy to use and understand


- Requires the least amount of cable to connect the computers together and therefore is less
expensive than other cabling arrangements.
- Is easy to extend, Two cables can be easily joined with a connector, making a longer
cable for more computers to join the network
- A repeater can also be used to extend a bus configuration

Disadvantages:

- Heavy network traffic can also slow a bus considerably. Because any computer can
transmit at any time, bus networks do not coordinate when information is sent.
Computers interrupting each other can use a lot of bandwidth
- Each connection between two cables weakens the electrical signal
- The bus configuration can be difficult to troubleshoot, A cable break or malfunctioning
computer can be difficult to find and can cause the whole network to stop functioning,

b) Ring Topology

In a ring network each device is connected to two other devices, forming a ring. There is no
central file server or computer. Messages are passed around the ring until they reach their
destination. Often used to link mainframes, especially over wide geographical areas. It is useful
in a decentralized organization called a distributed data processing system.-

Advantages:

- Ring networks offer high performance for a small number of workstations or for larger
networks where each station has a similar work load
- Ring networks can span longer distances than other types of networks
- Ring networks are easily extendable

KASNEBNOTES REVISIONKITS Page 118


KASNEBNOTES REVISION KIT - ICT

Disadvantages

• Relatively expensive and difficult to install

• Failure of one component on the network can affect the whole network

• It is difficult to troubleshoot a ring network

• Adding or removing computers can disrupt the network

c) Star topology

In a star network there are a number of small computers or peripheral devices linked to a central
unit called main hub. The central unit may be a host computer or a file server. All
communications pass through the central unit and control is maintained by polling. This type of
network can be used to provide a time-sharing system and is common for linking
microcomputers to a mainframe. .

Advantages:

• It is easy to add new and remove nodes

• A node failure does not bring down the entire network

• It is easier to diagnose network problems through a central hub

Disadvantages:-

• If the central hub fails the whole network ceases to function

• It costs more to cable a star configuration than other topologies (more cable is required
than for a bus or ring configuration).

d) Mesh topology

Is a network topology in which devices are connected with many redundant interconnections
between network nodes.

Advantages:

- Yields the greatest amount of redundancy (multiple connections between same nodes) in
the event that one of the nodes fails where network traffic can be redirected to another
node
- Network problems are easier to diagnose

KASNEBNOTES REVISIONKITS Page 119


KASNEBNOTES REVISION KIT - ICT

Disadvantages

- The cost of installation and maintenance is high (more cable is required than any other
configuration)

e) Hybrid topology

A hierarchical network consists of several computers linked to a central host computer. It is


similar to a star. Other computers are also hosts to other, smaller computers or to peripheral
devices in this type of network. It allows various computers to share databases, processing
power, and different output devices. It is useful in centralized organizations.

Advantages:

• Improves sharing of data and programs across the network

• Offers reliable communication between nodes Disadvantages:

• Difficult and costly to install and maintain

• Difficult to troubleshoot network problems

QUESTION 20

a) (i) Devices for setting up a LAN

 Gateway: A gateway can be hardware or software and it acts as a bridge between two
networks. A gateway is an entrance point of a network, e.g. a router or computer server
which acts as a gateway device in a network. A gateway computer is usually attached
with the router and switch.
 Hub: This is where a number of computers or peripheral devices are linked to a central
unit. It is a networking device
 LAN Card: This is a network Interface card which is used to join the computers in a
network.
 Switch: Ali tire computers in a wired network are directly connected with the switch
through Ethernet cable. They transmit the data towards its destination based on the IP
address.
 Repeater; A repeater is a network device that is used to retransmit the weaker signals in a
network. A repeater receives the. signals on the'electromagnetic or optical transmission
mediums.

KASNEBNOTES REVISIONKITS Page 120


KASNEBNOTES REVISION KIT - ICT

(ii) Advantages of LAN

- Users can access the same files


- Messages can be sent between users
- Expensive hardware can be shared e.g. Laser printer Network software is cheaper than
buying individual packages
- A single internet connection can be shared among many users

QUESTION 21

a) Expound Acronyms

i) TCP: Transmission Control Protocol: These are standard protocol for the Internet and
they are the rules for communicating over the Internet.

ii) FTP-File Transfer Protocol. FTP allows you to copy files on the Internet he.
downloading or uploading

iii) HTTP-Hypertext Transfer Protocol. HTTP defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to
various commands

iv) HTML- Hypertext Markup Language. HTML is a special command code used to
structure text and multimedia documents and to set up hypertext links between
documents, used extensively on the World Wide Web.

v) WWW-World Wide Web; A system of Internet servers that support specially formatted
documents, The documents are formatted in a markup language called HTML
(HyperText Markup Language) that supports links to other documents, as well as
graphics, audio, and video files.

vi) IP- Internet Protocol which are the rules for communicating over the Internet; it is the
primary protocol that establishes the Internet.

QUESTION 22

a) Advantages of digital over analog

- Extra information can be added to digital signals so that errors can either be detected or
corrected.
- Digital data tends not to degrade over time

KASNEBNOTES REVISIONKITS Page 121


KASNEBNOTES REVISION KIT - ICT

- Processing of digital information is relatively easy, either in real-time or non-real-time A


single type of media can be used to store many different types of information (such as
video, speech, audio and computer data can be stored on tape, hard-disk or DVD/CD-
ROM).
- A digital system has a more dependable response, whereas an analogue system’s
accuracy depends on parameters such as component tolerance, temperature, power supply
variations, and so on. Analogue systems thus produce a variable response and no two
analogue systems are identical.
- Digital systems arc more adaptable and can be reprogrammed with software, Analogue
systems normally require ft change of hardware for any functional changes.

KASNEBNOTES REVISIONKITS Page 122


KASNEBNOTES REVISION KIT - ICT

TOPIC 10
THE INTERNET
QUESTION 1

a) (i) Intranets

a) Intranets are in-house, tailor-made networks for use within the organization and provide
limited access (if any) to outside services and also limit the external traffic (if any) into the in
tran etc An intranet might have access to the Internet but there will be no access from the
Internet to the organization’s intranet

The main elements of an Intranet are:

• Intranet server hardware

• Intranet server software

• TCP/IP stack software on the clients and servers

• WWW browsers

• A firewall

(ii) Extranets

Extranets (external Intranets) allow two or more companies to share parts of their Intranets
related to joint projects. For example two companies may be working on a common project, an
Extranet would allow them to share files related with the project.

 Extranets allow other organizations, such as suppliers, limited access to the


organization’s network.
 The purpose of the extranet is to increase efficiency within the business and to reduce
costs

(iii) Global system for mobile( GSM) communication

Global system for mobile communication (GSM) is a wide area wireless communications system
that uses digital radio transmission to provide voice, data, and multimedia communication
services. A GSM system coordinates the communication between a mobile telephones (mobile
stations), base stations (cell sites), and switching systems.

KASNEBNOTES REVISIONKITS Page 123


KASNEBNOTES REVISION KIT - ICT

(iv) Bluetooth

Bluetooth technology is a wireless protocol that connects electronic devices while they are close
to each another.

Bluetooth technology was designed primarily to support simple wireless networking of personal
consumer devices and peripherals, including cell phones and wireless headsets. Wireless signals
transmitted with Bluetooth cover short distances, typically up to 30 feet (10 meters).

(c) Role of interface message processor (IMP} in a computer network;

 To transfer the message from the host network to other branches within the network
 To defragment the message in the network to protect it from threats such as viruses

QUESTION 2

a) Important of each of the following in relation to the internet technology

i) Web server program

Is software that runs on the web site hosting Server computer. Its main purpose is serving web
pages, which means it waits for requests from web browsers (also known as clients) and
responds by sending the required data back.

ii) Web browser

Is a software program that allows you to browse, search, and receive various types of
information such as: websites, videos and audio files, images, and other documents on the Web.

The primary functions of a web browser are to retrieve or fetch information to the user, allow
them to view it, and access information.

in) HyperText Markup Language (HTML)

Is the main markup language for creating web pages and other information that can be displayed
in a web browser.

HTML elements form the building blocks of all websites. HTML allows images and objects to
be embedded and can be used to create interactive forms. It provides a means to create structured
documents by denoting structural semantics for text such as headings, paragraphs, lists, links,
quotes and other items.

KASNEBNOTES REVISIONKITS Page 124


KASNEBNOTES REVISION KIT - ICT

iv) Internet cafe or cybercafe

Is a place which provides internet access to the public, usually for a fee.

Assist those who cannot afford the computer to access internet.

Global system for mobile communication (GSM) is a wide area wireless communications system
that uses digital radio transmission to provide voice, data, and multimedia communication
services. A GSM system coordinates the communication between a mobile telephones (mobile
stations), base stations (Tell sites'), and switching systems,

QUESTION 3

a) Functions of internet service providers

An Internet Service Provider (also known as an ISP or even as an LAP, internet access provider)
is a firm-that offers subscribers access to the internet

1) A basic Internet Service Provider (ISP) will buy a connection and bandwidth to an internet
backbone in bulk and move that connection over one (or more) of many different data
transport mediums, such as coaxial cable ("Broadband cable"), phone line (Dial-up, ISDN,
DSL, etc), UTP, or fiber optic, to name a few.

2) They provide e-mail, DNS, Newsgroup and other services to entice customers to join.
Some services, such as e-mail and DNS, are so common, they are considered to be part of
the "bare minimum" that an ISP should provide.

3) Educate their customer on services that can improve their lives accessible to the internet

4) This internet service provider maintains large runs of cabling and maintains network
services in order to transfer and deliver web content to those paying the subscription fee.

QUESTION 4

a) Description of the following E-commerce terms

i) Business-to-business (B2B) describes commerce transactions between businesses, such as


between a manufacturer and a wholesaler, or between a wholesaler and a retailer.

KASNEBNOTES REVISIONKITS Page 125


KASNEBNOTES REVISION KIT - ICT

ii) Business-to-government (B2G)

This is a business model that refers to businesses selling products, services or


information to governments or government agencies.

B2G networks or models provide a way for businesses to bid on government projects or
products that government might purchase or need for their organizations. This can
encompass public sector organizations that propose the bids. B2G activities are
increasingly being conducted via the Internet through real-time bidding.

B2G is also referred to as public sector marketing:'

iii) Consumer-to-consumer (C2C) (or citizen-to-citizen) electronic commerce -

it involves electronically facilitated transactions between consumers through some third


party. A common example is the online auction, in which a consumer posts an item for
sale and other consumers bid to purchase it; the third party generally charges a flat fee or
commission. The sites are only intermediaries, just there to match consumers. They do
not have to check quality #f the products being offered,

b) Social economic challenges brought about by the rapid advancement in internet


technology.

i) Moral degradation

Internet technology has led to increase of immorality in the society this is because of certain sites
in the internet which displays pornographic videos which is later brought in the'society.

ii) Unemployment

Due to internet technology most of the people have been rendered jobless as most of the jobs
which were previously done manually have been computerized and are being done online e.g.
advertisements, mailing of letters to mention but a few.

iii) Data insecurity

As a result of internet technology most of the organization tend to lose most of their important
information or manipulation of the information due to hacking,

iv) Cost

Purchase cost, maintenance cost and training cost of the and the use of the devices of internet
technology is very high thus small organization or poor family cannot afford e.g computers.

KASNEBNOTES REVISIONKITS Page 126


KASNEBNOTES REVISION KIT - ICT

c) Definition:

Telecommuting is a work arrangement in which the employee works outside the office, often
working from home or at a location close to home (including coffee shops, libraries, and various
other locations).

Rather than travelling to the office, the employer “travels” via telecommunication links, keeping
in touch with coworkers and employers via telephone and email.

Advantages of Telecommuting:

• No Commuting. Depending on your current commute, this can save you anywhere
from minutes to hours every day, which you can spend doing things you enjoy, like
sleeping, spending more time with your kids or spouse, going to the dog park, or any
other activity you’d like to have more time for.

• Increased Independence. Working from home puts the onus on you to complete your
work without constant reminders, which some people absolutely love. No office
politics, no boss breathing down your neck, no distracting coworkers — telecommuting
can be glorious. And yet, it’s veiy easy to get distracted by things in your home —
television, laundry, a comfy bed for napping — some days these seem like a much
better alternative to actually doing work. Having a high degree of self-control and self-
discipline is essential to being a productive telecommuter.

• Increased Savings. Most people who work from home have very little need for
professional clothing, which not having to buy can save lots of money every year.
Other things you’ll find less need for: gas or public transit passes for commuting,
lunches out, dry cleaning, and child care (depending on your situation). And most
people who work from home are able to save on their taxes each year because of the
tax-deductible expenses associated with working from home.

• More Flexibility. Again this depends on the type of job you’ll have at home, but many
work- from-home jobs allow for a flexible schedule, so if you need to go grocery
shopping or do a load of laundry in the middle of the day, it’s simple: you can. Or, if
you’re a morning person or a night owl, you can adjust your work schedule
accordingly.

• Fewer sick days. Working in a traditional office exposes you to many people’s germs,
but if you work from home, you have less exposure to people, and therefore, to their
germ's. Also, if you are feeling under the weather, it’s much easier to pamper yourself
and still get some work done when you’re at home, meaning you’ 11 probably take
fewer sick days.

KASNEBNOTES REVISIONKITS Page 127


KASNEBNOTES REVISION KIT - ICT

Disadvantages of Telecommuting

 Decreased human interaction


If you’re the sort of person who thrives on interactions with other people, working from
home can feel isolating. It’s possible to remedy this feeling with e-mail, phone calls,
instant messaging, and video conferencing, but it’s no substitute for face- to-face
interaction. Some telecommuters find that working from a coffee shop or library satisfies
their people fix, but others prefer the office environment to solitude. A co-working space
might solve this problem by allowing you to telecommute and work from an office
setting.

 Blurring Work and Personal Life.


When you work from home, you can’t always shut out your personal life while you’re
working, or turn off your work life while you’re “off the clock.” Having a separate work
space from the rest of your home can help, but some people find it difficult to stop
working when they know it’s only a few feet away.

 Difficulty Demonstrating Workload.


If you’re a telecommuter working for a company with a traditional office, your office-
bound coworkers might perceive you as doing less work simply because you’re at home.
It’s important to showcase your workload to demonstrate to managers and coworkers that
you are accomplishing as much, if not more, as you would if you were in a cubicle down
the hall.
 Poor staff relationship
Unfortunately, telecommuting interferes negatively with the relationship between
teleworkers and non-teleworkers.

Career Stagnation

Working from home makes it difficult for a manager to monitor the performance of
teleworkers, and people who adopt this work arrangement often find it hard to gain
recognition for their efforts through promotions or performance reviews, Some
telecommuters do not get clear performance goals because their managers consider
employees who are often ■ in the office to be harder workers. In such a situation, the
affected teleworker can opt to work both in the office and at home.

KASNEBNOTES REVISIONKITS Page 128


KASNEBNOTES REVISION KIT - ICT

QUESTION 5

(a) Resources which are necessary for connecting a computer to the internet.

• A computer

You cannot connect to the internet without a computer.

• A modem and telephone line (if you are using dial up access) or a data line of some
sort (if you are not using dial up access).

A modem is necessary if you are using a telephone line to access the Internet. It translates the
language that computers talk into a language that can travel across the phone lines, and vice
versa.

• An Internet browser (software) and software to connect you to the ISP

You need two types of software to connect to the Internet. The first is the software that connects
you to your ISP. This is different for each ISP. Some ISP’s will give you a disk with the
connection software on it. Other ISP’s will use the connecting software that comes with the
operating systems Windows 95, OS7 and OS8. They will give you the settings to put into this
software.

The second type of software you need is a browser. Browsers go and get web pages and display
them on your computer. The two most popular and commonly used browsers are iVIozilla and
Microsoft Internet Explorer. These browsers also provide the software for e-mail and to read
Usenet newsgroups. If you have a browser that is just a browser, you will also need software for
e-mail and for reading newsgroups.

• An account with an Internet Service Provider (ISP) Souvenirs

The ISP is your gateway to the Internet. You access the ISP over the phone line, and the ISP will
connect you to the Internet, The ISP provides you with e-mail and access to the Internet. It does
this through many hardware and software, which the average user cannot afford. You will have
an account with the ISP - you will pay some amount of money per month in return for accessing
the Internet through the 1ST. This account will come with a user name and a password that you
use to log on to the Internet

KASNEBNOTES REVISIONKITS Page 129


KASNEBNOTES REVISION KIT - ICT

QUESTION 6

(a) Factors that determine the downloading speed of a file from a website

Web design

• Design of the web page - number of graphics and their size, use of frames and tables

• Size of the web page - overall length of page.

• Having valid, compliant html/css coding on your website will allow your browser to
render the page much more quickly

Your browsing history

 Whether or not you have ever accessed the site before. If you have accessed it recently, the
files may be in your cache and the site will load more quickly the second and subsequent
times.
 How full your web browser cache is - you may need to clear your cache if you've set it to
only reserve a small amount of space.

Your computer configuration and settings

 How much memory you have in your computer - the more RAM the better.
 The size of your network buffer - most overlooked setting, have your IT staff review the
settings.
 How fragmented the data on your hard drive is - you may need to run a defrag program.
 The number of programs you have running simultaneously while downloading. Running
multiple programs hogs valuable RAM space.
 Cookies should be cleared regularly (bi-weekly or monthly) to help reduce the load on
your browser thus slowing down your performance.

The network used to access the site

i) Speed of your connection to the Internet - your modem/cable/DSL/wireless speed.


ii) Quality of your telephone/broadband line - bad connections mean slower
transmissions..
iii) Access speed on the server where the site is hosted - if the site is hosted on a busy
server, it may slow down access speed.
iv) Plow much traffic there is to the site at the same time you are trying to access it.
v) The load on the overall network at your ISP - how busy it is.

KASNEBNOTES REVISIONKITS Page 130


KASNEBNOTES REVISION KIT - ICT

QUESTION 7

a)

i) Roles of internet services providers (ISP)

- To provide internet connectivity devices to their subscribers.


- To educate their subscribers on how to access the internet.
- To update their subscribers on any development arising in their products or internet
connectivity device.
- To solve any queries arising in the use of internet to their subscribers.

ii) Examples of in internet service providers

- Orange
- Airtel
- Safaricom
- Equitel

QUESTION 8

a) Benefits of e-government

E-government is the activity or process by which the government organizes, controls and
monitors its activities through the computer networks-and the following are the
advantages/benefits

i) Better services delivery to the customers, this enables the government to reach the
citizens within a short period and fast hence improving the service to customers.

ii) Reduce cost of getting information: The government is. able to acquire information from
the citizens online without necessarily conducting survey through questionnaires and
other forms of collection of data which are very expensive in terms of paying for people
conducting the survey, cost of stationary and other facilities required.

iii) More information is accessible 24 hours a day, online communication enables or allows
citizens to inquire about government queries throughout the day compared to manual
where offices are closed early.

KASNEBNOTES REVISIONKITS Page 131


KASNEBNOTES REVISION KIT - ICT

iv) Increase efficiency - the government is able to run it activities more effectively because
there is less monitoring of its activities.

v) Help the public to see the government as a positive force in their fives rather than a
burden.

QUESTION 9

a) Explain the meaning of the following:

i. Bandwidth: bandwidth is the bits-per-second (bps) transmission capability of a


communication channel. It also refers to the amount of data that can be transmitted in a
fixed amount of time. There are three types namely Voice band, Medium band and
Broadband
ii. Browsing: The process of looking for Information or documentation the internet or
website
iii. User internet newsgroup: Electronic discussion forum on the worldwide web
respiratory within the user net system for messages posted for many users in different
locations.
iv. Tile transfer protocol: Standard network protocol that allows you to copy files on the
internet i.e. uploading and downloading

QUESTION 10

a) Characteristics of information, and connectivity of the internet

- It is single standard
- The cost of connecting is minimal
- Information is easily accessible
- The information is worldwide

QUESTION 11

a) i) Applications of the internet

- Library Websites: Many Library websites have plenty to offer for any information needed
- Blogging: A blog is used as a communication platform to interact with people, The owner
of the blog can create the blog about anything of their preference.
- Online shopping: You can find anything to buy on the Internet. I here are many books
and all other types of educational materials.

KASNEBNOTES REVISIONKITS Page 132


KASNEBNOTES REVISION KIT - ICT

- Networking: Social network service creates online communities of people who share
interests and/or activities, or who are interested in exploring the interests and activities of
others
- Current events: Everyone can know what is going on in the world despite their
geographical ' location and time difference,
- Email: Electronic mail or E-Mail is an electronic way of keeping in touch with someone.
E-mails can be read anywhere and sent from anywhere,
- Electronic Books: Reading is now-just a click away. There are number of books online
and for all different ages. Children's Storybooks Online

KASNEBNOTES REVISIONKITS Page 133


KASNEBNOTES REVISION KIT - ICT

TOPIC 11

EMERGING TRENDS IN INFORMATION


COMMUNICATION TECHNOLOGY

QUESTION 1

Use of virtual reality computing in the following fields

Virtual reality or virtual realities (VR), which can be referred to as immersive multimedia or
computer-simulated reality, replicates an environment that simulates a physical presence in
places in the real world or an imagined world, allowing the user to interact with that world.
Virtual realities artificially create sensory experience, which can include sight, touch, hearing,
and smell.

Most up-to-date virtual realities are displayed either on a computer screen or with an HD VR
special stereoscopic displays, and some simulations include additional sensory information and
focus on real sound through speakers or headphones targeted towards VR users. Some advanced
haptic systems now include tactile information, generally known as force feedback in medical,
gaming and military applications. Furthermore, virtual reality covers remote communication
environments which provide virtual presence of users with the concepts of telepresence and
telexistence or a virtual artifact (VA) either through the use of standard input devices such as a
keyboard and mouse, or through multimodal devices such as a wired glove or omnidirectional
treadmills. The immersive environment can be similar to the real world in order to create a
lifelike experience—for example, in simulations for pilot or combat training—or it can differ
significantly from reality, such as in VR games.

i. Military

The usage of VR in a training perspective is to allow professionals to conduct training in a


virtual environment where they can improve upon their skills without the consequence of failing
the operation.

VR plays an important role in combat training for the military. It allows the recruits to train
under a controlled environment where they are to respond to different types of combat situations.
A fully immersive virtual reality that uses Head-mounted display (HMD), data suits, data glove,
and VR weapon are used to train for combat. This setup allows the training's reset time to be cut
down, and allows more repetition in a shorter amount of time. The fully immersive training
environment allows the soldiers to train through a wide variety of terrains, situations and
scenarios.

KASNEBNOTES REVISIONKITS Page 134


KASNEBNOTES REVISION KIT - ICT

VR is also used in flight simulation for the Air Force where people are trained to be pilots. The
simulator would sit on top of a hydraulic lift system that reacts to the user inputs and events.
When the pilot steer the aircraft, the module would turn and tilt accordingly to provide haptic
feedback. The flight simulator can range from a fully enclosed module to a series of computer
monitors providing the pilot's point of view. The most important reasons on using simulators
over learning with a real aircraft are the reduction of transference time between land training and
real flight, the safety, economy and absence of pollution. By the same token, virtual driving
simulations are used to train tank drivers on the basics before allowing them to operate the real
vehicle. Finally, the same goes for truck driving simulators, in which Belgian firemen are for
example trained to drive in a way that prevents as much damage as possible. As these drivers
often have less experience than other truck drivers, virtual reality training allows them to
compensate this. In the near future, similar projects are expected for all drivers of priority
vehicles, including the police.

Medical personnel are able to train through VR to deal with a wider variety of injuries. An
experiment was performed by sixteen surgical residents where eight of them went through
laparoscopic cholecystectomy through VR training. They then came out 29% faster at
gallbladder dissection than the controlled group.

VR application was used to train road crossing skills in children. It proved to be rather
successful. However some students with autistic spectrum disorders after such training might be
unable to distinguish virtual from real. As a result, they may attempt quite dangerous road
crossings.

ii. Education

Strides are being made in the realm of education, although much needs to be done. The
possibilities of VR and education are endless and bring many advantages to pupils of all ages.

Few are creating content that may be used for educational purposes, with most advances being
made in the entertainment industry, but many understand and realize the future and the
importance of education and VR.

iii. Medicine

virtual reality is used in many areas of healthcare which range from diagnosis, treatment, e.g.
surgery, rehab and counselling. it is also used to train the next generation of doctors, paramedics
and other medical personnel and has shown a range of benefits from doing so.

so what are the advantages of virtual reality in healthcare? there are several which are related to
medical/surgical training, preventative medicine, counselling and architectural design of new
hospitals.

KASNEBNOTES REVISIONKITS Page 135


KASNEBNOTES REVISION KIT - ICT

virtual reality medical training

let’s start with virtual reality as a means of training healthcare professionals. it is used in medical
schools and other similar settings as a means of education and instruction. it enables medical
students to acquire knowledge and understanding about the human body by means of interaction
within a virtual environment.

medical students can perform ‘hands on’ procedures but in a safe and controlled setting. they are
able to make mistakes – and learn from them but in an environment where there is no risk to the
patient. they interact with a virtual patient and as a result of this, learn skills which they can then
apply in the real world.

virtual reality dentistry

but virtual reality isn’t only confined to medical schools. dentistry is another area in which it
plays a part. for example, there is a system known as ‘haptel’ which is based upon haptics (greek
for touch) in order to train new dentists. this virtual dental chair includes a training scenario in
which the student is shown a 3d set of teeth that they work on.

they perform a range of procedures, e.g. a filling using a virtual drill which replicates the
movement and pressure of a real drill by means of force feedback. this feedback takes the form
of subtle changes of pressure which enables the student to adjust their technique accordingly.

this is discussed further in our virtual reality in dentistry article.

virtual reality and paramedic training

it is also used to train paramedics and other similar personnel who need to learn life saving skills
but without placing themselves and their patients at risk. they are able to do this by interaction
with a simulated accident or emergency in a virtual environment but with minimal risk. these
scenarios are realistic and enable them experience a high pressure situation and respond
accordingly.

virtual reality preventative medicine

virtual reality is used to educate patients about positive lifestyle choices, such as stopping
smoking, moderate alcohol intake, healthy eating and exercise. there is an emphasis on educating
people to make positive changes about their health which will reduce the risk of illnesses, many
of which are preventative.

both desktop and fully immersive cave systems can be used to demonstrate the effects of
negative lifestyle choices, e.g. smoking on health with the aim of changing people’s behaviour.

KASNEBNOTES REVISIONKITS Page 136


KASNEBNOTES REVISION KIT - ICT

virtual reality counselling

counselling is another area where virtual reality has been utilised. a classic example is phobia
treatment, for example a fear of public speaking where the sufferer is able to learn skills and
build up their confidence in a virtual environment.

this is discussed in greater detail in our virtual reality in phobia treatment article.

it also used to treat people who have developed post traumatic stress disorder (ptsd) as a result of
a life threatening situation. one example is that of soldiers who have served on the front line in
afghanistan and have become traumatised as a result. they are taught a range of techniques for
dealing with the symptoms of their condition using virtual reality. this takes the form of a pair of
virtual reality glasses or head mounted display (hmd), data glove and input device, e.g. joystick.

QUESTION 2

Office automation refers to the varied computer machinery and software used to digitally create,
collect, store, manipulate, and relay office information needed for accomplishing basic tasks and
goals. Raw data storage, electronic transfer, and the management of electronic business
information comprise the basic activities of an office automation system.

Generally, there are three basic activities of an office automation system: data storage of
information, data exchange, and data management. Within each broad application area, hardware
and software combine to fulfill basic functions.

i. Types of office automation tools

1. Computers hardware
2. Computer software
3. Digital copiers
4. Scanners
5. Fax machines
6. Printers
7. Digital storage equipments

ii. ways in which office automation may be used by management

1. Office automation can be used to get many tasks accomplished faster.


2. Can be used to eliminates the need for a large staff.
3. They can use it to reduce storage of data.
4. Multiple people can update data simultaneously in the event of changes in schedule

KASNEBNOTES REVISIONKITS Page 137

You might also like