|ANALYSIS OF KCSE COMPUTER STUDIES QUESTIONS & REVISION KITS|
|ANALYSIS OF KCSE COMPUTER STUDIES QUESTIONS & REVISION KITS|
dEFINITION OF dISTRIBUTED SYSTEMS
A distributed system is a collection of computers on the same network which process data independently and once data has been updated in one computer, other computers of the same system automatically update their database too.
A distributed system can also be defined as a collection of independent computers that appears to its users as a single coherent system
Distributed processing refers to the type of processing where computers in various geographical locations are interconnected via communication links for the purpose of local processing and data access and/or transfer.
In distributed processing data processing occurs on each of the computers, unlike a centralized processing system in which terminals are connected to a host computer that performs all of the data processing.
Advantages of distributed systems
Disadvantages of distributed system
Definition of Normalization
Normalization is the process of organizing data in a database by establishing relationships between tables according to rules designed both to protect the data and to make the database more flexible by eliminating redundancy and inconsistent dependency, insertion anomaly, update anomaly & deletion anomaly.
Objectives of Normalization
uSES OF COMPUTERS IN HEALTH SYSTEMS
01. KEEPING OF RECORDS
03. TRANSACTIONS SUCH AS HOSPITAL BILLS
05. DIAGNOSING PATIENTS
06. AUTOMATING LIFE SUPPORT MACHINES
07. LABORATORY ANALYSIS
08. PREPARING AND ANALYSING REPORTS
10. SUPPORTING HOSPITAL INFORMATION SYSTEMS
OPERATIONAL METHODS OF AN ORGANIZATION ENSURING THE SAFETY OF DATA
01. USE OF PASSWORDS AND PIN NUMBERS
A password is a secret code provided to a system to access its resources. Passwords and pin numbers are provided to an individual to deter any unauthorized access.
02. USER ACCESS LEVEL
This is a process by which the system administrator gives separate accounts with different access rights for each user to protect sensitive data from unwanted audience. Each user in the system is given a set of resources to access the system depending on his/her nature of the job he does. In most cases, the top management are given access to confidential data and employees are given access to filtered and limited data.
03. USING FILE ATTRIBUTES SUCH AS READ ONLY, HIDING ETC.
Most systems provide features such as hiding data or changing file properties to Read Only. This move ensures that original files are not tampered with or altered to change meaning.
04. DATA ENCRYPTION
Encryption is a secure process for keeping personal and confidential information private. It is a process by which bits of data are mathematically coded using a password key/encryption key. The encryption process makes the data unreadable unless or until decrypted using decryption key known only by the user.
05. USE OF BIOMETRIC SYSTEMS
A biometric system is an automatic identification system based on matching of biological features to authenticate a system to respond. Examples include: finger prints recognition, facial recognition, eye recognition, DNA recognition, voice recognition, palm recognition etc.
06. DATA BACKUP
Backing up data is making copies of data from the original file and saving it somewhere else which may be used to restore the original after a data loss event.
07. SECURITY QUESTIONS/STAMP
This is a data security measure that ensures the system authenticate after the visitor answers a number of questions correctly as was provided during signup.
08. SECOND LEVEL AUTHENTICATION PROCEDURES
This security measure lets the system authenticate after a secret code has been provided which is sent through a third party system such as email or SMS but belonging to the user as was provided during signup.
09. USE OF reCAPTCHA TECHNIQUE
This is a Technique in data security that tests whether the system user is human or bot.
10. USE OF ANTI-MALWARE/ANTI-VIRUS SOFTWARE
Installing anti-malware or antivirus ensures that the system is not corrupted from malicious software made by hackers to harm or eavesdrop information from the organization.
meaning of data privacy
Data privacy means that data or information belonging to an individual should not be accessed by or disclosed to other people. Its an individual's right to determine for themselves what should be communicated to others.
meaning of data security
Data security is the confidentiality, integrity and availability of data.
Confidentiality of data implies that sensitive data or information belonging to an organization or government should not be accessed by or disclosed to unauthorized people, such data includes office documents, chemical formula, employee's details, examinations etc.
Integrity of data implies that data should not be modified without owner's permission.
Availability of data implies that information must be available on demand.
DISSIMILARITY between data privacy and data security
Why should people resist computers in their work place?
Computers may lead to job replacement and displacement.
This means that computers may make a person lose his/her job or root for the transfer of a worker to another department. A condition like this one may make people resist computers at their work place.
Computers require skilled manpower.
Usage of computers requires the staff to be trained for necessary skills to handle them. For those who don't see training as a good idea, will resist its implementation in a work place.
Computers have adverse effects on our health.
It is believed that computers cause cancer, electromagnetic radiation, changes in brain activity, eye problems and sleeping patterns. However, scientists are still researching on these areas to establish elements of computers that are responsible for these problems and how they can be avoided.
Some people are just bureaucratic.
Some people in work places are just difficult to change, they follow excessively complicated administrative procedures that demands things to be done they way they used to be.
Examples of these bureaucrats are school heads who demand professional records to be handwritten rather than being typed and printed. They think that handwritten records are more original than the printed ones. These are the kind of people who will never tolerate computer changes in their institutions.
Attitude problems leading to computer-phobia
There are certain personalities who just hate computers because they either acquired this attitude myth or had previous shallow experience with computers.
These people may likely resist the introduction of computers in their workplace and if it is introduced, they will blame it for everything bad that happens.
Fear of increased work in their workplace
Computers sometimes increases the amount of work in a work place. This is especially if new programs and applications are added to be used by the system. And if there will be no addition of manpower, handling them on top of your normal tasks can sometimes be overwhelming, in this case, people tend to resist them in their work places for fear of additional tasks.
Fear of increased initial costs
Introduction of computers require high initial costs however their benefits outweigh the costs (cost effectiveness). Some people may oppose implementation of computers in their workplace simply because they fear the initial costs.
Poor communication skills/strategies
Bad communication skills from the top management to workers below them may trigger workers to resist technology change. Communication breakdown, misinformation or inaccurate communication can be a recipe on why people may opt to resist technological change.
Changes that are mandated with little or no communication, on the other hand, are often poorly received, since employees may feel that the change is being shoved down their throats. When it comes to change management there’s no such thing as too much communication.
If there is no immediate information to communicate during the change, telling employees that there is no update regarding the ongoing change is communication! Don’t just keep quiet; this is also the time to maintain an open door policy regardless of where you are placed in the organization.
The Rapid Pace of Change
People often reject technology because it presents changes, big or small, to their immediate world, a world to which they have worked hard to adjust.
People usually resist to anything that disturbs their social order and if done rapidly, change may never be taken seriously, this can lead to drastic opposition and resistance.
This is another viable reason why employees resist introduction of computers at work. Change must be introduced when there are no other major initiatives going on. Sometimes it is not what a leader does, but it is how, when and why she or he does it that creates resistance to change! Undue resistance can occur because changes are introduced in an insensitive manner or at an awkward time.
What it means by printing multiple copies
Printing multiple copies implies that two or more papers are printed at the same time by only one printer. This is only possible by the use of impact printers such as a dot-matrix and a daisy wheel printer because they have special hammers that produce characters on a piece of paper. And behind every paper, there is a coupon copy that produces characters on another paper.
This type of printing is majorly done where monetary transactions are carried out such as a bank.
For example; when paying school fees through a bank, the bank produces three copies of receipts (whitish, blueish and pinkish) in color. One copy for the bank, another for the school and the last one for your own records. To produce these receipts (vouchers/slips), the bank prints them in multiple copies using impact printers.
What it means by printing multiple pages
Printing multiple pages is a situation where printers automatically make characters on a piece of paper (one paper at a time) but automatically pulls the next paper in a series once the current is over, this process repeats until the printing task is accomplished.
Printing multiple pages depends on the printing mechanism of the printer. There are those printers that can only print one side of the page at a time and others reverse the page to print on the other side. It is called back to back printing. Any type of printer can handle multiple page printing, however the desk-jet printer and laser-jet printers are preferred for this job because of their printing speed.
Images courtesy of Pinterest
FORMATTING FEATURES OF WORD PROCESSORS
wHAT ARE FORMATTING FEATURES?
These are word processor enhancements that makes user's work appealing to the eye.
What are these formatting features?
Font color is used to change text color
Makes text look like it was highlighted by a marker pen.
Apply a visual effect to the selected text such as shadow, glow or reflection
Superscript creates a small text above the normal line of text.
Subscript creates a small text below the normal line of text.
Draws a line through the middle of the selected line
Bolding makes text thicker and darker
Italics make text slant forward
Underline is a feature that puts a line below selected text
this is a feature used to change text font themes
this is a feature used to increase
or decrease the size of text
Numbered list is a feature that index items in numbered style e.g.
Increasing indent pushes text away from the page margin
Decreasing indent pushes text closer to the page margin
this is a formatting feature used to increase or decrease spaces between lines of text and paragraph
WHAT ARE ELECTRONIC SPREADSHEETS?
WHAT ARE TYPEWRITERS?
WHAT ARE THE MERITS OF SPREADSHEETS OVER TYPEWRITERS?
Images courtesy of Pinterest
STATE REASONS WHY IS RECOMMENDED TO HAVE STANDARD FURNITURE IN THE COMPUTER LABORATORY
What it means by standard furniture
These are tables, chairs and shelves that have the quality required to set them up in the computer laboratory for use of computers and computer users.
There are two common types of furniture that can be found in the computer laboratory namely:
Why standard furniture?
Image Source: Pinterest
P.O Box 1189 - 40200
Tel: 0728 450 424
Tel: 0738 619 279
Tel: 0763 450 425
E-mail - firstname.lastname@example.org