KNEC KCSE Sorted

KNEC KCSE Computer Studies Questions - KNEC Series sorted to users' comfort

To easily get questions faster, click "sort" to arrange into your needs


Showing 34 items
YEARTOPICQUESTIONANSWERLINK- FOR GRAPHIC QUESTIONS
Sort 
 
Sort 
 
Sort 
 
Sort 
 
Sort 
 
YEARTOPICQUESTIONANSWERLINK- FOR GRAPHIC QUESTIONS
1998 NETWORKING Define local area network (2mk) This is the connection of computers within a small geographical area  
1998 PROGRAMMING PRINCIPLES Explain two uses of an uninterruptible power supply unit (2mks) 1. Eliminates power quality defects 2. To reduce power line noises through line conditioners  
1998 DATABASES Define a primary key field (3mks) This is a unique record identifiers in each database table  
1998 ICT CAREERS State two roles of a system analyst (2mks)  1. Review the current manual or redundant information and making recomendations on replacement 2. Working with programmers to construct and test the system 3. Co-ordinating training for users of the new system  
1998 SPREADSHEETS State two advantages of electronic spreadsheets over manual worksheets (2mks) 1. Inbuilt formulae 2. Have powerful editing and formatting features 3. Produce neat work 4. Provide large virtual sheet and memory space 5. Are more accurate and efficient  
1998 DATA SECURITY Explain the meaning of backup (2mks) Making of copies of data or programs incase the originals are corrupted or lost  
1998 DATABASES State three functions of database management systems (3mks) Ability to update and retrieve data, Support concurrent updates, Recovery of data, Security, Data integrity, either: 1. Saving 2. Sorting 3. Filtering 4. Retrieving 5. Displaying 6. Searching 7. Collecting See More! 
1998 OPERATING SYSTEMS Define an operating system (2mks) This is a software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.  
1998 NETWORKING State any two components of a local area network (2mk) 1. Interface card 2. Server 3. Workstation 4. Network Cables/Transmission Media  
1998 DATA REPRESENTATION For each of the following file organization methods, state an appropriate storage medium: (i) Serial (ii) Random (2mks) Serial: text files can be stored in Hard disk, Diskette or CD Random: binary files can be stored in Hard Disk, Diskette or CD  
1998 INTRODUCTION TO COMPUTERS State two requirements of computer program testing (2mks) Dubugging program and compiler to check the whole program if there are any errors  
1998 COMPUTER SYSTEMS State in which memory the monitor program would be stored (1mk) monitor program would be stored in Read Only Memory  
1998 INTRODUCTION TO COMPUTERS Explain the difference between Random Access Memory and Read Only Memory (2mks) RAM: temporarily stores data. its content can be read, written and deleted ROM: provides permanent or semi-permanent storage only. its content can be read but cannot be rewritten during normal computer operations  
1998 INTRODUCTION TO COMPUTERS Explain the difference between digital and analogue computers (2mks) digital computers have two state or binary system while analogue computers are used for special purposes  
1998 COMPUTER SOFTWARE Explain the difference between a system software and application programs (2mks) system software manages the operation of the computer itself while application software handles the end user needs. the manufacturer of the computer usually supplies system software but not application software. user must purchase application software package or write application software by using programming languages.  
1998 COMPUTER SYSTEMS State three functions of the CPU-Central processing unit (3mks) 1. store and control of information 2. processing and manipulation of data into useful information 3. manages the execution of instructions  
1998 APPLICATION AREAS OF ICT State a situation where real-time processing would be appropriate (1mk) Air booking system, Banking institutions, stock exchange, nuclear control stations etc.   
1998 COMPUTER SYSTEMS State two types of computer output devices (2mks) Softcopy and Hardcopy - printer, screen, speaker, LED, Plotter  
1998 SYSTEM DESIGN State any three advantages of distributed systems (3mks)   
1998 SYSTEM DESIGN What is a distributed system? (1mk)   
1998 COMPUTER SYSTEMS List three types of secondary storage media (3mks)   
1998 COMPUTER SYSTEMS State one advantage and one disadvantage of a laser printer (2mks) Advantages: Fast in printing, produce neat work Disadvantage: Expensive to acquire and mantain,   
1998 SPREADSHEETS Briefly Explain the following terms (i) cell (ii)range (iii) label (iv) value (v) function (5mks) A cell- is an intersection between a row and a column. A range is a group of cells. A label- this is non-numeric data in a worksheet. A value is data in a cell that can be manipulated mathematically. A function is a predefined formula used to perform a calculation  
1998 SPREADSHEETS A spreadsheet has the following entries: ..........  See Answer 
1998 OPERATING SYSTEMS State any four criteria for choosing an operating system (4mks) Hardware configuration, Size and make of the computer, Operating system intended for the computer, User friendliness, Availability of documentation, cost of OS, Reliability and Security, The number of processors it can support, Number of users it can support, Capacity it can occupy in the harddisk  
1998 INTRODUCTION TO COMPUTERS Match the computergeneration with the technology used to make the processor...  Answer 
1998 COMPUTER SYSTEMS Draw a blolck diagram showing the functional units of computer hardware. Name the units (6mks)  Answer 
1998 PROGRAMMING PRINCIPLES Using a program flowchart explain the "WHILE...DO" interaction construction (3mks)  WHILE ... DO 
1998 INTRODUCTION TO COMPUTERS State any three reasons why people may resist the introduction of computers at their place of work (3mks) Loss of jobs, computers require skilled man power, computers have adverse effect on health  
1998 DATA SECURITY Explain the difference between data privacy and data security (4mks) in data privacy, data needs only to be accessed by authorized persons and in data security makes sure that data is correct, confidential and protected   
1998 DATA SECURITY State two operational methods of an organization ensuring the security of data (2mks) 1. Use of passwords 2. data encryption 3. attribute like read only 4. hiding   
1998 DATABASES Define Normalization (2mks) Normalization is the process of organizing data in a database. This includes creating tables and establishing relationships between those tables according to rules designed both to protect the data and to make the database more flexible by eliminating redundancy and inconsistent dependency.  
1998 INTRODUCTION TO COMPUTERS Explain the use of computers in health care (6mks) Diagnosis, security, life support, lab technician, keeping of records, research, consultations, communication, air conditioning, transactions  
1998 DATABASES State three objectives of normalization (3mks) Performance, Controlled Data Manipulation, Data Integrity see more 
Showing 34 items