ATIKA SCHOOL
  • Start
    • SITEMAP
    • KNEC Portal
    • ZERAKI HELP AND SUPPORT
    • Academic Environment
    • KNEC KCSE PROJECT INSTRUCTIONS
  • BLOGS
    • About Us? >
      • Learn more about us
    • CUSTOMER CARE >
      • PRICING
      • Help & Support
    • News and Opinions
    • JOBS IN KENYA AND ABROAD FOR KENYANS AND BEYOND
    • How its Done
  • OUR PRODUCTS
    • All Categories >
      • MORE PRODUCTS >
        • SECONDARY CRE NOTES
        • COURSE BOOKS
        • KCSE KISWAHILI SETBOOKS
        • Backed Up Files and Archives
        • FREE DOCUMENTS
        • PRIMARY 8-4-4 BASED RESOURCES
        • STANDARD 8 RESOURCES
        • HIGH SCHOOL RESOURCES >
          • Biology Paper 3 Exams
          • Secondary Examinations
        • PRIMARY CBC BASED RESOURCES
        • COLLEGE & VARSITY RESOURCES
      • PRIMARY RESOURCES CBC
      • PRIMARY RESOURCES 8-4-4
      • SECONDARY RESOURCES
      • NOTES & TUTORIALS
      • COLLEGE RESOURCES
      • NOVELS and OTHER BOOKS
    • EXAMINATIONS >
      • MOCKS AND JOINT EXAMS >
        • FORM 1 QUESTION PAPERS, ANSWERS AND MARKING SCHEMES COLLECTIONS
        • FORM 2 QUESTION PAPERS, ANSWERS AND MARKING SCHEMES COLLECTIONS
        • FORM 3 EXAMINATIONS, QUESTION PAPERS AND ANSWERS
        • FORM 4 MOCKS PAST EXAMS BY REGION
        • TOP SECONDARY EXAMS ALL SUBJECTS
      • KPSEA NATIONAL EXAMS
      • KCPE >
        • KCPE PAST PAPERS AND ANSWERS >
          • KCPE 2020 RESULTS, REPORTS, QUESTIONS AND ANSWERS
          • KCPE PAST PAPERS 2019 REPORTS, RESULTS, QUESTIONS AND ANSWERS
        • KCPE PAST PAPERS PER SUBJECT
      • KCSE >
        • KCSE PAST PAPERS BY SUBJECT
        • KNEC KCSE PAST PAPERS, MARKING SCHEMES, QUESTIONS & ANSWERS
        • Free KCSE Past Papers Mathematics
        • Free KCSE Biology Questions and Answers
      • QUESTIONS & ANSWERS >
        • SECONDARY >
          • LANGUAGES >
            • Secondary English Questions and Answers
          • TECHNICALS >
            • COMPUTER STUDIES >
              • COMPUTER STUDIES Q & A
              • kcse computer studies paper 2 AND 3 Questions & Answers
            • BUSINESS STUDIES QUESTIONS & ANSWERS
            • KCSE AGRICULTURE TOPICAL QUESTIONS AND ANSWERS
            • KCSE HOME SCIENCE DIRECT QUESTIONS AND ANSWERS
          • SCIENCES >
            • KCSE Mathematics Topical Questions
            • KCSE Biology Topical Questions and Answers
            • CHEMISTRY TOPICAL QUESTIONS AND ANSWERS
            • KCSE Physics Topical Questions
            • KCSE physics Practical Sample Quiz
          • HUMANITIES >
            • C.R.E (CRE) QUESTION AND ANSWERS
            • ISLAMIC RELIGIOUS EDUCATION (IRE) QUESTIONS AND ANSWERS
            • KCSE History Topical Questions and Answers
            • GEOGRAPHY TOPICAL QUESTIONS AND ANSWERS
        • PRIMARY >
          • Standard 4-8 Mathematics Topical Questions from Mocks and KCPE
          • Std 6 Mathematics Notes
    • TUTORIALS >
      • SECONDARY >
        • SCIENCES >
          • FOCUS MATHEMATICS TUTORIALS AND EXAMS FREE
          • KCSE BIOLOGY NOTES
          • FREE KCSE CHEMISTRY NOTES
          • KCSE PHYSICS NOTES, AUDIOVISUALS AND MORE
        • LANGUAGES >
          • ENGLISH >
            • FATHER OF NATIONS STUDY GUIDE
            • A GUIDE TO SILENT SONG AND OTHER STORIES
            • English KCSE Set Books
            • ENGLISH POETRY QUESTIONS WITH ANSWERS FOR K.C.S.E CANDIDATES
            • ENGLISH GRAMMAR #KCSE
          • KISWAHILI >
            • Bembea ya Maisha
            • CHOZI LA HERI - MWONGOZO
            • KIGOGO - MWONGOZO
            • MASWALI NA MAJIBU YA TUMBO LISILOSHIBA
            • USHAIRI MASWALI NA MAJIBU
            • KCSE Kiswahili Fasihi
        • TECHNICALS >
          • HOME SCIENCE NOTES
          • KCSE BUSINESS STUDIES NOTES
          • COMPUTER STUDIES NOTES LATEST
          • kcse Computer Studies Notes
          • KCSE AGRICULTURE NOTES, SYLLABUS, QUESTIONS, ANSWERS, SCHEMES OF WORK AND OTHERS
        • HUMANITIES >
          • KCSE History Notes Form 1 to 4
          • FREE KCSE CRE NOTES
          • KCSE GEOGRAPHY NOTES
          • IRE NOTES, AUDIOVISUAL, QUESTIONS AND ANSWERS
      • PRIMARY >
        • STANDARD 4: SOCIAL STUDIES
        • NOTES >
          • KISWAHILI
          • SOCIAL STUDIES
        • EXAMINATIONS
        • DecaTurbo Online Series Examinations
        • KCPE Mathematics Notes
        • KCPE and Primary Level Compositions
      • Other Supportive Documents >
        • SYLLABUS >
          • Primary 8-4-4 based Syllabus, Objectives and Lessons
          • Primary Mathematics Syllabus
        • MASOMO VIDEOS
    • CURRICULUM >
      • NEW CURRICULUM DESIGNS >
        • PRIMARY >
          • PRE PRIMARY ONE CURRICULUM WITH SYLLABUS
          • PRE PRIMARY TWO CURRICULUM WITH SYLLABUS
        • SECONDARY >
          • KNEC KCSE SYLLABUS AND COURSE OUTLINES
        • COLLEGE >
          • Regulations for the TIVET Craft and Diploma Business Examinations
    • HIGH INSTITUTIONS >
      • EXAMINATIONS >
        • College and Varsity Past Papers online
      • TUTORIALS >
        • COLLEGE AND UNIVERSITY NOTES AND TUTORIALS
  • MEMBERS RESOURCES
    • Primary >
      • CBC AND 8-4-4 LATEST EXAMS
      • STANDARD 8 PAST PAPERS 8-4-4 BASED
      • CBC PROFFESSIONAL TOOLS
      • CBC NOTES PRIMARY
      • CBC KPSEA EXAMS
      • Standard 8 (std) English Topical Questions
      • KCPE MATHEMATICS TOPICAL QUESTIONS FROM 1989 TO LAST YEAR
    • Secondary >
      • FORM 1 EXAMS WITH ANSWERS
      • FORM 2 EXAMS WITH ANSWERS
      • FORM 3 EXAMS WITH ANSWERS
      • FORM 4 EXAMS WITH ANSWERS
      • KCSE 2020 QUESTIONS AND ANSWERS
      • NOTES SECONDARY
      • MOCKS SECONDARY >
        • kcse form 2 mathematics questions
    • Free Schemes of Work
    • FOCUS A365 SERIES K.C.P.E EXAMINATIONS FOR PRIMARY
    • ALL GROUPS PRODUCTS
    • PREMIUM PRODUCTS 2

List four signs of a computer system invaded by a virus

12/2/2023

0 Comments

 

​List four signs of a computer system invaded by a virus 

  1. Unfamiliar graphics
  2. Programs taking longer than usual to load
  3. Disk accessing being excessive for simple tasks
  4. Less memory available than usual
  5. Mysterious disappearance of programs
  6. Change of disk volume 

Read More
0 Comments

​John is a first-year student at JKUAT. He is expected to login his student portal to access online assignments. Mention three ways in which he would prevent virus from infecting his computer.

30/4/2022

0 Comments

 

​John is a first-year student at JKUAT. He is expected to login his student portal to access online assignments. Mention three ways in which he would prevent virus from infecting his computer.

  • Scan removable storage devices before use.
  • Scan email attachments for virus before opening them.
  • Browse smart. 
  • Install antivirus and update regularly.

Read More
0 Comments

Explain the terms computer fraud and alteration.

16/11/2021

0 Comments

 

​Explain the following terms.           (2mks)

​(a) Computer fraud

​use of computer to conceal information or cheat other people with the intention of gaining money  or information
Explain the terms computer fraud and alteration
Explain the terms computer fraud and alteration

​(b) Alteration

​the legal charging of data or information with the intention of misinforming authorized users   or gaining

Read More
0 Comments

MENTION TWO SYMPTOMS OF A COMPUTER INFECTED WITH A VIRUS.

20/7/2021

0 Comments

 

CHARACTERISTICS OF A COMPUTER INFECTED WITH A VIRUS

  1. slows in processing
  2. programs start to behave abnormally
  3. corrupts files and folders
  4. pop up windows begin to show up
  5. changes default program setup in your computer for most programs
  6. computer crashes
  7. unknown program begin to show up in your computer
  8. passwords change
  9. send or receive mass emails to your account
  10. unknown programs attache themselves to the secondary and primary storage media jamming the RAM
  11. reject any other software installed in the computer especially anti-malware
  12. changes existing files type and properties


MENTION TWO SYMPTOMS OF A COMPUTER INFECTED WITH A VIRUS.
MENTION TWO SYMPTOMS OF A COMPUTER INFECTED WITH A VIRUS.
  • LEVEL: FORM 2
  • TOPIC: DATA SECURITY AND CONTROLS
  • SUB-TOPIC: Security threats and control measures

Read More
0 Comments

State two ways in which one can create a password which cannot be easily accessed by hackers.

15/1/2021

0 Comments

 


State two ways in which one can create a password which cannot be easily accessed by hackers.

Password which cannot be hacked.
  •  By including many characters in a password
  •  By combining different characters in a password
  •  Use password generator manager.
State two ways in which one can create a password which cannot be easily accessed by hackers.

Read More
0 Comments

Explain three ways in which an operating system provides data security in a computer system

14/1/2021

0 Comments

 


Explain three ways in which an operating system provides data security in a computer system

Access control:
  •  Deals with the problem of verifying /authenticating the identity of a user before permitting access to the request resource (e.g. use of passwords, user account);
Encryption
  •  Transforming data into an unreadable format so that they are safely transmitted;
Firewalls
  •  Filters out unwanted data and programs/criminals/hackers/malicoius persons;
Log files
  •  A means by which transactions in a computer system can be recorded thereby detering potential infiltrators;
  • Alerts
  •  Alerting a user when he/she is about to delete a file/folder.
(b)State two instances where observation is not a viable method of gathering data during system analysis stage. 
  •  When the analyst wants to collect confidential information,
  •  When there is a large group of people involved in the system,
  •  Where the people you want to gather information from are vastly dispersed
(c) (i) State the role of each of the following data communication devices:
I. repeater 
  •  A device used to re-construct data signal during data transmission to its original strength/amplify/boost/regenerate.
II. router. 
  •  It is a device used to facilitate movement of data or packets between two or more LANS of different configuration (expansion of networks).
  •  Delivers a packet/data directly to destination computers.
  •  Interconnects different networks/provides network services.
(ii) The figure below shows a network based on the bus topology.
(b)State two instances where observation is not a viable method of gathering data during system analysis stage. When the analyst wants to collect confidential information, When there is a large group of people involved in the system, Where the people you want to gather information from are vastly dispersed (c) (i) State the role of each of the following data communication devices: I. repeater A device used to re-construct data signal during data transmission to its original strength/amplify/boost/regenerate. II. router. It is a device used to facilitate movement of data or packets between two or more LANS of different configuration (expansion of networks). Delivers a packet/data directly to destination computers. Interconnects different networks/provides network services. (ii) The figure below shows a network based on the bus topology.
I. Identify the component labelled P.
  •  The component P is the terminator.
II. State the function of the component labelled P.
  •  Terminator in a backbone is used to prevent data signal from bouncing back/absorb signals.

Read More
0 Comments

Pesa Tele Company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

12/1/2021

0 Comments

 


Pesa Tele Company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

  •  Encryption.
  •  Firewalls.
  •  User profiles/passwords/user.
  •  Limit the number of log-in attempts.
  •  Audit trail/tracking.
  •  Physical protection of computers.
Pesa Tele Company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

Read More
0 Comments

A computer technician found it necessary to disable a firewall when working on a computer system. State two reasons that may have necessitated disabling of the firewall.

8/1/2021

0 Comments

 


A computer technician found it necessary to disable a firewall when working on a computer system. State two reasons that may have necessitated disabling of the firewall.

When firewall is disabled
  •  Testing the communication link;
  •  When upgrading the firewall;
  •  When there is a need to install an application and the firewall is preventing the operation;
  •  When the firewall prevents legitimate communication. 
A computer technician found it necessary to disable a firewall when working on a computer system. State two reasons that may have necessitated disabling of the firewall.

Read More
0 Comments

State two ways in which hardware failure is a threat to data security.

7/1/2021

0 Comments

 


State two ways in which hardware failure is a threat to data security.

  1. Insecurity arising from hardware failure
  2.  Data loss due to total system failure e.g. HD crash;
  3.  The experts called upon to repair can access critical/valuable information;
  4. Data recovery software may be used to make unauthorised backups.
State two ways in which hardware failure is a threat to data security.

Read More
0 Comments

​Peter has installed internet in his home computer in order to use it for browsing. State three ways in which he would prevent viruses from infecting the computer.

7/1/2021

0 Comments

 

​Peter has installed internet in his home computer in order to use it for browsing. State three ways in which he would prevent viruses from infecting the computer. (3 marks)

  1. Install anti-virus software / anti-malware
  2. Turn on firewall protection tool
  3. Avoid browsing suspicious websites
  4. Avoid clicking on pop-up windows and ads with very nice deals
​Peter has installed internet in his home computer in order to use it for browsing. State three ways in which he would prevent viruses from infecting the computer. (3 marks)

Read More
0 Comments

A worker is unable to travel to the office but may still be able to do the office work through telecommuting.

6/1/2021

0 Comments

 


A worker is unable to travel to the office but may still be able to do the office work through telecommuting.

​(a) Explain why the worker may use each of the following:
(i) email; 
(ii) fax; 
(iii) digital camera;
(iv) firewall. 
(b) The worker needs to make regular backups of documents sent to the office.
State three reasons for this. 
(c) Explain two benefits that the employer will get by allowing this worker to do the office work through telecommuting.
RESPONSES
(a) E-mail: - used to send and receive electronic documents to/from the office.
Receive instructions from the supervisor or co-workers.
Fax: - Used to send documents which are in non-electronic format
Digital camera - Used to capture images in picture form/video conferencing.
Firewall - Used to prevent intrusion to the home computer because telecommuting involves connection to the internet.
(b)  Communication systems may fail/communication channel may fail.
  •  The document sent may get lost due to sending to wrong address.
  •  The documents may be re-used or updated.
  •  Malfunctioning of either sending/ receiving computers (failure of DTE
(c)  Employer will only pay for work done.
  •  The working time is not limited to official working hours/office available 24 hours.
  •  Employer saves on office space.
  • Does not have to pay for commuter allowance.
  •  Employer may not require permanent employees.
  •  Employer may outsource expert skills that are not available locally.
A worker is unable to travel to the office but may still be able to do the office work through telecommuting.

Read More
0 Comments

State three techniques used by a network administrator to detect and prevent computer crimes.

5/1/2021

0 Comments

 


State three techniques used by a network administrator to detect and prevent computer crimes.

​(b) A company in town wishes to link its offices together. The linking may be through wireless or fibre optic network media.
(i) State two benefits that the company would gain from the use of metropolitan area network (MAN).
(ii) State three advantages of using wireless over fibre optic network media.
(iii) State two limitations of wireless communication. 
(iv) State two transmission media used in wireless transmission. 
(c) State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media.

RESPONSES

(a) Audit trail
  •  Use of antimalware software
  •  Data encryption
  •  Log files
  •  Firewall
  •  Intruder detection
  •  User access levels
  •  Password/Biometrics
(b)(i) High speed communication
  •  Reduce data transfer charges
  •  Provides a secured network .
  •  Allow remote access
  •  Media cannot be vandalised easily
(ii) No cumbersome cabling needed between sites.
  •  Support multi-channel transmissions.
  •  Wireless supports un-directed signals therefore allowing many recipients.
  •  Do not require access rights on the land between the buildings.
(iii)Line of sight requirement.
  •  Expensive towers required/high initial cost.
  •  Subject to interference such as passing radio waves and weather conditions.
  •  Very difficult to restrict access if it is un-directed.
  •  Hard to secure
  •  Easy to hack 
(iv) Satellite
  •  Microwave
  •  Radio waves/blue-tooth/infrared
(e) Firewalls
  •  Antivirus
  •  Policy formulation on the usage of internet/password/security
  •  Using email instead of storage devices to transfer document files.
  •  Use genuine/authentic/unpirated software
State three techniques used by a network administrator to detect and prevent computer crimes.

Read More
0 Comments

A student saved a document in a diskette. Later on, the student found that the diskette could not open arid therefore the work got lost. Give three precautions the student should have taken to ensure the work was not lost.

5/1/2021

0 Comments

 


A student saved a document in a diskette. Later on, the student found that the diskette could not open arid therefore the work got lost.Give three precautions the student should have taken to ensure the work was not lost.

  1. Should have kept a back-up.
  2.  Store the diskette safely e.g. in a disk bank.
  3.  Use more reliable storage media.
  4. Regular scanning.
  5.  Avoid ejecting disk while in use.
A student saved a document in a diskette. Later on, the student found that the diskette could not open arid therefore the work got lost. Give three precautions the student should have taken to ensure the work was not lost.

Read More
0 Comments

One way in which an organisation enforces security of its computer systems is by restricting the use of removable media such as floppy disks and flash memories. Give two reasons for this.

4/1/2021

0 Comments

 


One way in which an organisation enforces security of its computer systems is by restricting the use of removable media such as floppy disks and flash memories. Give two reasons for this.

  •  To minimise/control spread of viruses.
  •  To control access to data/programs.
  •  To control movement of data.
  •  To control unauthorized access to data/information.
One way in which an organisation enforces security of its computer systems is by restricting the use of removable media such as floppy disks and flash memories. Give two reasons for this.

Read More
0 Comments

Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

4/1/2021

0 Comments

 


Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

  1. Encryption.
  2.  Firewalls.
  3.  User profiles/passwords/user.
  4. Limit the number of log-in attempts.
  5.  Audit trail/tracking.
  6.  Physical protection of computers.
Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

Read More
0 Comments

State two measures that can be put in place to control piracy of software.

4/1/2021

0 Comments

 


State two measures that can be put in place to control piracy of software.

  1.  Enactment of relevant laws to compact the vice.
  2.  Stiff penalties for those found in possession of pirated software.
  3. Sensitize the public on the harm of using pirated copies.
  4.  Making software affordable/cheaper.
  5.  Certificates to identify the original software.
  6.  Use of keys, passwords to secure software products.
  7.  Restrict the number of installations.
  8. Solution
State two measures that can be put in place to control piracy of software.

Read More
0 Comments

Explain how data in a computer system is secured using:

3/1/2021

0 Comments

 


Explain how data in a computer system is secured using:

(i) password;
(ii) user access level.
(b) State three characteristics of a suitable password. 
(c) State two characteristics of a computer that is infected by computer viruses.
(d)(i) The figure below shows how data is transmitted through a public telephone line.
Picture
Name A, B, C and D. ​
​(ii) State two advantages of using fibre optic cables over satellite in data communication. 
(a) (i) Password
  •  It’s a string of characters entered by a user to verify his or her identity.
  •  The system compares the code against a stored list of authorized users. If the user is legitimate then the system allows the user access.
(ii) User level access
  •  It’s a mechanism for limiting access to certain items of information or to certain control based on user identities and their membership in various predefined groups.
(b) Characteristics of a suitable password
  •  Easy to remember
  • Should have appropriate length
  •  Hard/difficult to guess
(c)
  • Slow or not booting.
  •  Files not opening.
  •  Functionality of some application failing.
  •  Files or data getting lost.
(d) (i) Naming the parts
  • A — Sender/terminal
  • B — Digital waveform
  •  C-Modem
  •  D — Analogue waveform.
(ii) Advantages of fibre optic over satellite
  • Cost.
  • Supports broadband communication.
  • Signal is directed and therefore e secure.
  • It’s minimal to raise interference e.g. noise.

Read More
0 Comments

Copyright laws are laws granting authors the exclusive privilege to produce, distribute, perform or display their creative works. It is a legal framework for protecting the works such as book publishing, motion-picture production and recording. State two

3/1/2021

0 Comments

 


Copyright laws are laws granting authors the exclusive privilege to produce, distribute, perform or display their creative works. It is a legal framework for protecting the works such as book publishing, motion-picture production and recording. State two challenges that are posed to these laws by ICT’.

  • Easy of communication .
  • Easy of duplication
  • Enforcing is still a problem  e.g. officers are not computer literate.
  • Lack of capacity for people enforcing the law. 
Copyright laws are laws granting authors the exclusive privilege to produce, distribute, perform or display their creative works. It is a legal framework for protecting the works such as book publishing, motion-picture production and recording. State two challenges that are posed to these laws by ICT’.

Read More
0 Comments

Give two reasons why the use of finger prints and voice input can be used as reliable forms of security in computer systems.

3/1/2021

0 Comments

 


Give two reasons why the use of finger prints and voice input can be used as reliable forms of security in computer systems.

They cannot be:
  • faked
  • guessed
  •  hacked
  • delegated.
Give two reasons why the use of finger prints and voice input can be used as reliable forms of security in computer systems.

Read More
0 Comments

Explain why an intranet is a more secure way to share files within an organisation compared to the internet.

3/1/2021

0 Comments

 


Explain why an intranet is a more secure way to share files within an organisation compared to the internet.

  • Intranet is a company’s internal network to which outsiders cannot get access to while Internet allows outsiders to access company network if proper security measures are not implemented.
Explain why an intranet is a more secure way to share files within an organisation compared to the internet.

Read More
0 Comments

Give a reason for each of the following

31/12/2020

0 Comments

 


Give a reason for each of the following

(a)Changing a password regularly 

  • To ensure that no one else / unauthorized person has access to the password/system 

(b)Typing and re- typing a new password when changing it 

  • To ensure certainty of the chosen password
Give a reason for each of the following

Read More
0 Comments

December 31st, 2020

31/12/2020

0 Comments

 

​Distinguish between the following  pairs of terms

(i) Data verification and data validation
Data Validation
  • Consistency and integrity of data e.g. if input field is numeric then it must only receive numerals. Anything else is considered invalid
Data verification
  • Ensuring that data entered is the same as in the source documents

Read More
0 Comments

State two ways in which each of the following can be prevented: software errors; and computer fraud.

31/12/2020

0 Comments

 


State two ways in which each of the following can be prevented: software errors; and computer fraud.

(a)  software errors​
  •  Use of anti-virus software.
  •  Update system frequently.
  •  Purchase software from authentic sources.
  •  Test the software before implementation.
  •  Test syntax/logic.
  •  Proper training.
  •  Proper enactment of laws.
(b) computer fraud.​
  •  Data encryption.
  •  Password protection.
  •  Audit trail.
  •  Surveillance system.
State two ways in which each of the following can be prevented: software errors; and computer fraud.

Read More
0 Comments

Identify three public Universities and three National polytechnics in Kenya where further computer training is offered, In case state the highest level of qualification that can be acquired in computer training.

30/12/2020

0 Comments

 

(a) Identify three public Universities and three National polytechnics in Kenya where further computer training is offered, In case state the highest level of qualification that can be acquired in computer training. 

Picture

Read More
0 Comments

You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:

29/12/2020

0 Comments

 

You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:

a) Forgetting the password

  • Compose password from a hintable phrase.

 b) Hacking

  • Use both alphabets and numerical in the password
You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:

Read More
0 Comments
<<Previous
    COMPUTER STUDIES QUESTIONS AND ANSWERS

    Categories

    All
    1998
    1999
    2000
    2001
    2002
    2003
    2004
    2005
    2006
    2007
    2008
    2009
    2010
    2011
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2022
    Analogue And Digital Systems
    Applications Areas Of ICT
    Areas-where-computers-are-used
    Auxiliary Storage Devices
    Basic-computer-set-up-and-cabling
    Binary Addition
    Binary Subtraction
    Career Opportunities In ICT
    Classification Of Computers
    Classification-of-computers
    Coaxial Cables
    COMPACT DISK
    COMPLETE PAPERS
    Computer Crimes
    Computer-files
    Computer Memory
    Computer Software
    Computer Systems
    COMPUTER VIRUS
    Dashboard
    Database
    Data Collection
    Data Communication
    Data-integrity
    Data Processing
    Data Representation In A Computer
    Data Security And Controls
    Definition And Development Of Algorithm
    Definition-of-a-computer
    Desktop Publisher
    Development-of-computers
    DTP
    DVD
    Editing-and-formatting-a-word-document
    Electronic Data Processing Modes
    Elementary Programming Principles
    Errors-in-data-processing
    Evolution-of-computer-systems
    Fibre Optic Cables
    File Management Using An Operating System
    File-organization-methods
    Flowchart
    Form 1 Level
    Form 2 Level
    Form 3 Level
    Form 3 Mock Exams
    Form 4 Level
    Formatting Features
    Hands On Skills
    HARDCOPY OUTPUT DEVICES
    Hardware
    Impact Of Ict On Society
    IMPACT PRINTERS
    Information
    Input Devices
    Internet And Email
    Introduction To Computers
    Introduction To Networking And Data Communication
    ISP
    Levels-of-programming-languages
    Midterm-exams
    Mind-blowing-q-a
    Mocks
    Network-topology
    NON-IMPACT PRINTERS
    Octal
    Operating Systems
    Output-devices
    Paper-1
    Parts-of-a-computer
    Printers
    Processing-devices
    Processors
    Program-construction
    Program-control-structures
    Program-design
    Program-development
    Program-documentation
    Protocols
    Registers
    Review Questions
    Revision Kits
    Secondary Storage Media
    Section A
    Section B
    Security Threats And Control Measures
    Software
    Spreadsheets
    Stages Of System Development
    Storage Devices
    Symbolic-representation
    System-design
    System Development
    System-documentation
    Term-1
    TERM 2
    The Computer Laboratory
    The CPU
    The Keyboard
    Types Of Computer Files
    Types-of-networks
    User Interface
    Uses-of-computers
    Word Processors
    Worksheet-formatting

    Archives

    December 2024
    February 2023
    November 2022
    September 2022
    April 2022
    January 2022
    December 2021
    November 2021
    July 2021
    March 2021
    February 2021
    January 2021
    December 2020
    October 2020
    April 2020
    February 2020
    October 2019
    August 2019
    July 2019
    April 2019
    March 2019
    November 2018
    August 2018
    July 2018
    December 2017
    November 2017
    October 2017
    July 2017
    August 2016
    June 2016
    January 2016
    December 2015
    November 2015

    RSS Feed

Click to set custom HTML


Primary Resources
  • K.C.P.E Past Papers
  • ​Pri - Primary 1 Level
  • Pri  - Primary 2 Level
  • Grade 1
  • Grade 2
  • Grade 3
  • Grade 4
  • Standard 5
  • Standard 6
  • Standard 7
  • Standard 8
  • English
  • Kiswahili
  • Social Studies
  • Science
  • Mathematics
  • Kenya Sign Language
  • I.R.E
  • ​H.R.E
  • Notes
  • Termly Questions
  • Mocks
  • K.C.P.E Past Papers
College Resources
  • E.C.D.E
  • P.T.E
  • D.T.E
  • Technical Diploma
  • Technical Certificate
  • Business Diploma
  • Business Certificate
  • Higher Diploma
  • K.A.S.N.E.B Resources
  • K.M.T.C Resources
  • Varsity Resources
Secondary Resources
  • K.C.S.E Past Papers
  • Form 1
  • Form 2
  • Form 3
  • Form 4
  • Term 1
  • Term 2
  • Term 3
  • English
  • Geography
  • History
  • C.R.E
  • I.R.E
  • ​H.R.E
  • Home Science
  • Computer Studies
  • Business Studies
  • Agriculture
  • Chemistry
  • Biology
  • Physics
  • Mathematics ALT A
  • Mathematics ALT B
  • Kiswahili
  • French
  • Germany
  • Arabic
  • Aviation
  • Art & Design
  • Drawing & Design
  • Building & Construction
  • Metal Works
  • Wood Work
  • Music
  • Kenya Sign Language
  • Electricity
Other Useful Links
  • Academic Environment
  • How its Done
  • News and Opinions
  • Manyam Franchise Support
  • About
  • SITEMAP
  • FOCUS A365 SERIES
  • Membership Details (KCPE/KCSE)
  • Secondary Mocks
  • SYLLABUS
Contact Us
Manyam Franchise
P.O Box 1189 - 40200 Kisii
Tel: 0728 450 424
Tel: 0738 619 279
Tel: 0763 450 425
E-mail - sales@manyamfranchise.com
Photos used under Creative Commons from wwarby, JoshMacDonald, Visual Content, wuestenigel, Homini:), Wonderlane, Mike Licht, NotionsCapital.com, The Official CTBTO Photostream, Nabor Garrido, picsaf.com, OER Africa, Jemimus, andronicusmax, Christoph Scholz, cyanocorax, matsuyuki, Mark Hodson Photos, cathyse97, tompagenet, ToGa Wanderings, crstnksslr, machernucha, panpot, ePublicist
  • Start
    • SITEMAP
    • KNEC Portal
    • ZERAKI HELP AND SUPPORT
    • Academic Environment
    • KNEC KCSE PROJECT INSTRUCTIONS
  • BLOGS
    • About Us? >
      • Learn more about us
    • CUSTOMER CARE >
      • PRICING
      • Help & Support
    • News and Opinions
    • JOBS IN KENYA AND ABROAD FOR KENYANS AND BEYOND
    • How its Done
  • OUR PRODUCTS
    • All Categories >
      • MORE PRODUCTS >
        • SECONDARY CRE NOTES
        • COURSE BOOKS
        • KCSE KISWAHILI SETBOOKS
        • Backed Up Files and Archives
        • FREE DOCUMENTS
        • PRIMARY 8-4-4 BASED RESOURCES
        • STANDARD 8 RESOURCES
        • HIGH SCHOOL RESOURCES >
          • Biology Paper 3 Exams
          • Secondary Examinations
        • PRIMARY CBC BASED RESOURCES
        • COLLEGE & VARSITY RESOURCES
      • PRIMARY RESOURCES CBC
      • PRIMARY RESOURCES 8-4-4
      • SECONDARY RESOURCES
      • NOTES & TUTORIALS
      • COLLEGE RESOURCES
      • NOVELS and OTHER BOOKS
    • EXAMINATIONS >
      • MOCKS AND JOINT EXAMS >
        • FORM 1 QUESTION PAPERS, ANSWERS AND MARKING SCHEMES COLLECTIONS
        • FORM 2 QUESTION PAPERS, ANSWERS AND MARKING SCHEMES COLLECTIONS
        • FORM 3 EXAMINATIONS, QUESTION PAPERS AND ANSWERS
        • FORM 4 MOCKS PAST EXAMS BY REGION
        • TOP SECONDARY EXAMS ALL SUBJECTS
      • KPSEA NATIONAL EXAMS
      • KCPE >
        • KCPE PAST PAPERS AND ANSWERS >
          • KCPE 2020 RESULTS, REPORTS, QUESTIONS AND ANSWERS
          • KCPE PAST PAPERS 2019 REPORTS, RESULTS, QUESTIONS AND ANSWERS
        • KCPE PAST PAPERS PER SUBJECT
      • KCSE >
        • KCSE PAST PAPERS BY SUBJECT
        • KNEC KCSE PAST PAPERS, MARKING SCHEMES, QUESTIONS & ANSWERS
        • Free KCSE Past Papers Mathematics
        • Free KCSE Biology Questions and Answers
      • QUESTIONS & ANSWERS >
        • SECONDARY >
          • LANGUAGES >
            • Secondary English Questions and Answers
          • TECHNICALS >
            • COMPUTER STUDIES >
              • COMPUTER STUDIES Q & A
              • kcse computer studies paper 2 AND 3 Questions & Answers
            • BUSINESS STUDIES QUESTIONS & ANSWERS
            • KCSE AGRICULTURE TOPICAL QUESTIONS AND ANSWERS
            • KCSE HOME SCIENCE DIRECT QUESTIONS AND ANSWERS
          • SCIENCES >
            • KCSE Mathematics Topical Questions
            • KCSE Biology Topical Questions and Answers
            • CHEMISTRY TOPICAL QUESTIONS AND ANSWERS
            • KCSE Physics Topical Questions
            • KCSE physics Practical Sample Quiz
          • HUMANITIES >
            • C.R.E (CRE) QUESTION AND ANSWERS
            • ISLAMIC RELIGIOUS EDUCATION (IRE) QUESTIONS AND ANSWERS
            • KCSE History Topical Questions and Answers
            • GEOGRAPHY TOPICAL QUESTIONS AND ANSWERS
        • PRIMARY >
          • Standard 4-8 Mathematics Topical Questions from Mocks and KCPE
          • Std 6 Mathematics Notes
    • TUTORIALS >
      • SECONDARY >
        • SCIENCES >
          • FOCUS MATHEMATICS TUTORIALS AND EXAMS FREE
          • KCSE BIOLOGY NOTES
          • FREE KCSE CHEMISTRY NOTES
          • KCSE PHYSICS NOTES, AUDIOVISUALS AND MORE
        • LANGUAGES >
          • ENGLISH >
            • FATHER OF NATIONS STUDY GUIDE
            • A GUIDE TO SILENT SONG AND OTHER STORIES
            • English KCSE Set Books
            • ENGLISH POETRY QUESTIONS WITH ANSWERS FOR K.C.S.E CANDIDATES
            • ENGLISH GRAMMAR #KCSE
          • KISWAHILI >
            • Bembea ya Maisha
            • CHOZI LA HERI - MWONGOZO
            • KIGOGO - MWONGOZO
            • MASWALI NA MAJIBU YA TUMBO LISILOSHIBA
            • USHAIRI MASWALI NA MAJIBU
            • KCSE Kiswahili Fasihi
        • TECHNICALS >
          • HOME SCIENCE NOTES
          • KCSE BUSINESS STUDIES NOTES
          • COMPUTER STUDIES NOTES LATEST
          • kcse Computer Studies Notes
          • KCSE AGRICULTURE NOTES, SYLLABUS, QUESTIONS, ANSWERS, SCHEMES OF WORK AND OTHERS
        • HUMANITIES >
          • KCSE History Notes Form 1 to 4
          • FREE KCSE CRE NOTES
          • KCSE GEOGRAPHY NOTES
          • IRE NOTES, AUDIOVISUAL, QUESTIONS AND ANSWERS
      • PRIMARY >
        • STANDARD 4: SOCIAL STUDIES
        • NOTES >
          • KISWAHILI
          • SOCIAL STUDIES
        • EXAMINATIONS
        • DecaTurbo Online Series Examinations
        • KCPE Mathematics Notes
        • KCPE and Primary Level Compositions
      • Other Supportive Documents >
        • SYLLABUS >
          • Primary 8-4-4 based Syllabus, Objectives and Lessons
          • Primary Mathematics Syllabus
        • MASOMO VIDEOS
    • CURRICULUM >
      • NEW CURRICULUM DESIGNS >
        • PRIMARY >
          • PRE PRIMARY ONE CURRICULUM WITH SYLLABUS
          • PRE PRIMARY TWO CURRICULUM WITH SYLLABUS
        • SECONDARY >
          • KNEC KCSE SYLLABUS AND COURSE OUTLINES
        • COLLEGE >
          • Regulations for the TIVET Craft and Diploma Business Examinations
    • HIGH INSTITUTIONS >
      • EXAMINATIONS >
        • College and Varsity Past Papers online
      • TUTORIALS >
        • COLLEGE AND UNIVERSITY NOTES AND TUTORIALS
  • MEMBERS RESOURCES
    • Primary >
      • CBC AND 8-4-4 LATEST EXAMS
      • STANDARD 8 PAST PAPERS 8-4-4 BASED
      • CBC PROFFESSIONAL TOOLS
      • CBC NOTES PRIMARY
      • CBC KPSEA EXAMS
      • Standard 8 (std) English Topical Questions
      • KCPE MATHEMATICS TOPICAL QUESTIONS FROM 1989 TO LAST YEAR
    • Secondary >
      • FORM 1 EXAMS WITH ANSWERS
      • FORM 2 EXAMS WITH ANSWERS
      • FORM 3 EXAMS WITH ANSWERS
      • FORM 4 EXAMS WITH ANSWERS
      • KCSE 2020 QUESTIONS AND ANSWERS
      • NOTES SECONDARY
      • MOCKS SECONDARY >
        • kcse form 2 mathematics questions
    • Free Schemes of Work
    • FOCUS A365 SERIES K.C.P.E EXAMINATIONS FOR PRIMARY
    • ALL GROUPS PRODUCTS
    • PREMIUM PRODUCTS 2