ATIKA SCHOOL
  • Home
    • Atika School Advanced Search
    • News and Opinions
    • Echo
    • Academic Environment
    • How its Done
    • SITEMAP
    • About Us? >
      • About Us
      • Learn more about us
  • TUTORIALS
    • SECONDARY >
      • SCIENCES >
        • FOCUS MATHEMATICS TUTORIALS AND EXAMS FREE
        • KCSE BIOLOGY NOTES
        • FREE KCSE CHEMISTRY NOTES
        • KCSE PHYSICS NOTES, AUDIOVISUALS AND MORE
      • LANGUAGES >
        • ENGLISH >
          • English KCSE Set Books
          • ENGLISH GRAMMAR #KCSE
        • CHOZI LA HERI - MWONGOZO
        • KIGOGO - MWONGOZO
        • KCSE Kiswahili
      • TECHNICALS >
        • KCSE BUSINESS STUDIES NOTES
        • kcse Computer Studies Notes
        • KCSE AGRICULTURE NOTES, SYLLABUS, QUESTIONS, ANSWERS, SCHEMES OF WORK AND OTHERS
      • HUMANITIES >
        • KCSE History Notes Form 1 to 4
        • FREE KCSE CRE NOTES
        • KCSE GEOGRAPHY NOTES
        • IRE NOTES, AUDIOVISUAL, QUESTIONS AND ANSWERS
    • MASOMO VIDEOS
    • PRIMARY >
      • NOTES >
        • KISWAHILI
        • SOCIAL STUDIES >
          • STANDARD 4: SOCIAL STUDIES
        • SCIENCE
        • ENGLISH >
          • KCPE and Primary Level Compositions
        • MATHEMATICS >
          • KCPE Mathematics Notes
      • EXAMINATIONS >
        • DecaTurbo Online Series Examinations
        • TOP INSHA AND COMPOSITION QUESTIONS
        • CBC Kiswahili
        • FOCUS A365 SERIES K.C.P.E EXAMINATIONS FOR PRIMARY
        • Standard 8 (std) English Topical Questions
      • SYLLABUS >
        • Primary 8-4-4 based Syllabus, Objectives and Lessons
        • Primary Mathematics Syllabus
  • CURRICULUM
    • NEW CURRICULUM DESIGNS >
      • PRIMARY >
        • PRE PRIMARY ONE CURRICULUM WITH SYLLABUS
        • PRE PRIMARY TWO CURRICULUM WITH SYLLABUS
      • SECONDARY >
        • KNEC KCSE SYLLABUS AND COURSE OUTLINES
      • COLLEGE >
        • Regulations for the TIVET Craft and Diploma Business Examinations
  • PRODUCTS
    • All Categories
    • FREE DOCUMENTS
    • PRIMARY CBC BASED RESOURCES
    • PRIMARY 8-4-4 BASED RESOURCES >
      • STANDARD 8 RESOURCES
    • COLLEGE & VARSITY RESOURCES
    • HIGH SCHOOL RESOURCES
    • FREE NOVELS >
      • COURSE BOOKS
      • KCSE KISWAHILI SETBOOKS
    • Backed Up Files and Archives
  • EXAMINATIONS
    • PRIMARY EXAMS >
      • Primary Assorted Mocks
      • Assignments and Random Exams
      • 8-4-4 >
        • STANDARD 8 PAST PAPERS 8-4-4 BASED
      • CBC
    • TOP SCHOOLS EXAMINATIONS LATEST >
      • Assignments and Random Exams
    • KCPE >
      • KCPE PAST PAPERS AND ANSWERS
    • KCSE >
      • KCSE BY SUBJECT >
        • KCSE PAST PAPERS BY SUBJECT
        • Free KCSE Past Papers Mathematics
        • Free KCSE Biology Questions and Answers
      • KCSE BY YEAR >
        • KNEC KCSE PAST PAPERS, MARKING SCHEMES, QUESTIONS & ANSWERS
    • QUESTIONS & ANSWERS >
      • SECONDARY >
        • LANGUAGES >
          • ENGLISH POETRY QUESTIONS WITH ANSWERS FOR K.C.S.E CANDIDATES
        • TECHNICALS >
          • COMPUTER STUDIES >
            • COMPUTER STUDIES Q & A
            • kcse computer studies paper 2 AND 3 Questions & Answers
          • BUSINESS STUDIES QUESTIONS & ANSWERS
          • KCSE AGRICULTURE TOPICAL QUESTIONS
          • KCSE HOME SCIENCE DIRECT QUESTIONS AND ANSWERS
        • SCIENCES >
          • KCSE Mathematics Topical Questions
          • KCSE Biology Topical Questions and Answers
          • CHEMISTRY TOPICAL QUESTIONS AND ANSWERS
          • KCSE Physics Topical Questions
          • KCSE physics Practical Sample Quiz
        • HUMANITIES >
          • ISLAMIC RELIGIOUS EDUCATION (IRE) QUESTIONS AND ANSWERS
          • C.R.E (CRE) QUESTION AND ANSWERS
          • KCSE History Topical Questions and Answers
          • GEOGRAPHY TOPICAL QUESTIONS AND ANSWERS
      • PRIMARY >
        • Standard 4-8 Mathematics Topical Questions from Mocks and KCPE
        • Std 6 Mathematics Notes
  • HIGH INSTITUTIONS
    • EXAMINATIONS >
      • College and Varsity Past Papers online >
        • College and Varsity Past Papers online
    • TUTORIALS
  • PRICING
  • BLOGS
    • Contact
    • Help & Support
    • MPESA FORM
  • Search Free Documents (PDF)

ANALYSIS OF KCSE COMPUTER STUDIES TOPICAL QUESTIONS & REVISION KITS

This site is a creation of all possible KCSE computer studies questions and answers
Picture

Distinguish between a microwave transmission and a radio transmission.

15/1/2021

0 Comments

 


Distinguish between a microwave transmission and a radio transmission.

​(b) Figure 1 shows a computer, network topology. Use it to answer the questions that follow.
​(b) Figure 1 shows a computer, network topology. Use it to answer the questions that follow.
(i)Identify the type of topology.
(ii) State the function of each of the parts labelled A and B. 
(c) A computer laboratory experiences power supply problems. Describe three power related problems that should be addressed.
RESPONSES
(i)Identify the type of topology. (ii) State the function of each of the parts labelled A and B. (c) A computer laboratory experiences power supply problems. Describe three power related problems that should be addressed.
b) (i) Bus topology
(ii) A - The Bus cable
  • It is a core section of the bus topology network which has all the nodes connected to it and data pass through it.
B — Terminator
  • It destroys data that does not reach its destination so that it doesn’t cause echo back.
c) Problems related to power that should be addressed
  •  Blackout: This is unexpected discontinuation of power supply in the laboratory.
  •  Power sage: Sudden drop of voltage levels that lasts less than a second.
  •  Transients! surge: High voltage flowing.
  •  Brownout: Partial blackout where there’s low voltage flow.
  •  Short circuit: live wires touching each other’s
  •  Loose connection, which may cause tripping or total power failure

Read More






0 Comments

A school intends to install wireless media in their communication system. State three advantages of this mode of communication media.

15/1/2021

0 Comments

 


A school intends to install wireless media in their communication system. State three advantages of this mode of communication media.

  •  The school will find it easy to add or remove modes on the system.
  •  Incase of new building is put up, there will be no need of interfering with the communication media.
  •  Users will find it safer to move around as there are no wires around the rooms.
  •  Students will be able to roam as they access the network.
A school intends to install wireless media in their communication system. State three advantages of this mode of communication media.

Read More






0 Comments

Explain three ways in which an operating system provides data security in a computer system

14/1/2021

0 Comments

 


Explain three ways in which an operating system provides data security in a computer system

Access control:
  •  Deals with the problem of verifying /authenticating the identity of a user before permitting access to the request resource (e.g. use of passwords, user account);
Encryption
  •  Transforming data into an unreadable format so that they are safely transmitted;
Firewalls
  •  Filters out unwanted data and programs/criminals/hackers/malicoius persons;
Log files
  •  A means by which transactions in a computer system can be recorded thereby detering potential infiltrators;
  • Alerts
  •  Alerting a user when he/she is about to delete a file/folder.
(b)State two instances where observation is not a viable method of gathering data during system analysis stage. 
  •  When the analyst wants to collect confidential information,
  •  When there is a large group of people involved in the system,
  •  Where the people you want to gather information from are vastly dispersed
(c) (i) State the role of each of the following data communication devices:
I. repeater 
  •  A device used to re-construct data signal during data transmission to its original strength/amplify/boost/regenerate.
II. router. 
  •  It is a device used to facilitate movement of data or packets between two or more LANS of different configuration (expansion of networks).
  •  Delivers a packet/data directly to destination computers.
  •  Interconnects different networks/provides network services.
(ii) The figure below shows a network based on the bus topology.
(b)State two instances where observation is not a viable method of gathering data during system analysis stage. When the analyst wants to collect confidential information, When there is a large group of people involved in the system, Where the people you want to gather information from are vastly dispersed (c) (i) State the role of each of the following data communication devices: I. repeater A device used to re-construct data signal during data transmission to its original strength/amplify/boost/regenerate. II. router. It is a device used to facilitate movement of data or packets between two or more LANS of different configuration (expansion of networks). Delivers a packet/data directly to destination computers. Interconnects different networks/provides network services. (ii) The figure below shows a network based on the bus topology.
I. Identify the component labelled P.
  •  The component P is the terminator.
II. State the function of the component labelled P.
  •  Terminator in a backbone is used to prevent data signal from bouncing back/absorb signals.

Read More






0 Comments

Explain why an intranet is a more secure way to share files within an organisation compared to the Internet.

12/1/2021

0 Comments

 


Explain why an intranet is a more secure way to share files within an organisation compared to the Internet.

  •  Intranet involves interconnection of computers within an organisation, in intranet it's easier to monitor the access and sharing of files since the users working in the organisation can be assigned accounts and passwords which will enable them access the files they are authorised to access unlike the internet where many people can access whatever is stored in the organisation website.
Explain why an intranet is a more secure way to share files within an organisation compared to the Internet.

Read More






0 Comments

Explain two ways in which the use of internet could make reporting of corruption easier

10/1/2021

0 Comments

 


Explain two ways in which the use of internet could make reporting of corruption easier

(b) Explain two circumstances under which the use of wireless communication would be preferred in data communication. 
(c) Figure 2 is an extract of a spreadsheet showing what the students had targeted to score and the actual score in a computer remedial class.
(b) Explain two circumstances under which the use of wireless communication would be preferred in data communication. (c) Figure 2 is an extract of a spreadsheet showing what the students had targeted to score and the actual score in a computer remedial class.
A performance factor is obtained by subtracting the target score from the actual score and dividing the difference by the target score.
Write a formula that uses cell references only that would be entered in cell:
(i) D2 to compute the performance factor. 
(ii) E2 to display the statement ‘more remedials’ if the performance factor is less than zero, ‘exempted’ if the factor is greater than zero and ‘optional remedials’ if otherwise. 
(iii) D8 to display the best performance factor. ​​
RESPONSES
(a) Ways ¡n which internet makes reporting of corruption easier.
  •  Interactiveness: the internet based technology enables real-time dialogue hence instantaneous reporting of cases;
  •  Outreach: the technology allows the coverage of wide areas/can be reported from anywhere;
  •  Social mobilisation: It is easy to use technology to create a network with people or organisations with similar concerns;
  •  Anonymity: With use of the technology, it has become easy to report corruption cases without being known;
  •  Security: The message sent reaches the destination with less risk of being intruded.
(b) Circumstances when wireless is preferred
  •  When the targetted recipients are many and diverse e.g. different  platforms, devices, geographical locations.
  •  When the sender or receiver is mobile and it in practical to use wired media.
  •  When there is no space or it is inconvenient to lay cables e.g in a congested town.
  •  When the distance of travel is very big e.g extraterestial communication.
A performance factor is obtained by subtracting the target score from the actual score and dividing the difference by the target score. Write a formula that uses cell references only that would be entered in cell: (i) D2 to compute the performance factor. (ii) E2 to display the statement ‘more remedials’ if the performance factor is less than zero, ‘exempted’ if the factor is greater than zero and ‘optional remedials’ if otherwise. (iii) D8 to display the best performance factor. ​​
  • Use of the 1F function
  • First selection & output
  • Second selection & output
  • Last selection & output
(iii) = Max (D2:D7)

Read More






0 Comments

State three functions of networking operating systems other than providing network security.

10/1/2021

0 Comments

 


State three functions of networking operating systems other than providing network security.

​(b) Explain three ways in which an operating system provides data security in a computer system. 
(c) Explain three circumstances under which observation method may be preferred during data collection. 
(a) Functions of network operating systems
  •  Provide access to network resources;
  •  Supporting network services like protocols;
  •  Support communication;
  •  Respond to requests from applications;
(b) Ways in which an operating system provides data security
  •  Access control: Deals with the problem of verifying /authenticating the identity of a user before permitting access to the request resource (e.g. use of passwords, user account);
  •  Encryption - Transforming data into an unreadable format so that they are safely transmitted;
  •  Firewalls - Filters out unwanted data and programs/criminals/hackers/malicious persons;
  •  Log files - A means by which transactions in a computer system can be recorded thereby deterring potential infiltrators;
  •  Alerts - Alerting a user when he/she is about to delete a file/folder.
(c)Preference of observation during data collection
  •  When the subjects that are being observed need not be made aware of the fact;
  •  When there is need to directly see what subjects do rather than rely on what they tell you;
  •  When there is need to collect data without interfering with the working of the subjects;
  •  When nature of data can only be collected via observation e.g. traffic flow;
  •  When collecting data in situation that subjects may be unwilling to give information.
​(b) Explain three ways in which an operating system provides data security in a computer system. (c) Explain three circumstances under which observation method may be preferred during data collection.

Read More






0 Comments

State the role of each of the following data communication devices: repeater and router.

7/1/2021

0 Comments

 


State the role of each of the following data communication devices:repeater and router

​(b) Figure 3 shows a network based on the bus topology. (i) Identify the component labelled P. (ii) State the function of the component labelled P. (c) Students of Neema Secondary School formed an environmental club with a goal of taking part in environmental conservation activities. Outline three ways in which they can use the internet to achieve this goal. (d) (i) A company has three branches A, B and C where A is the headquarter. The local area network (LAN) at A is directly connected to the LAN at B and directly to the LAN at C. Explain two benefits of having the LAN at B also directly connected to the LAN at C. (4 marks) (ii) State three ways in which a company can protect its computer network from hackers.
​(b) Figure 3 shows a network based on the bus topology.
(i) Identify the component labelled P. 
(ii) State the function of the component labelled P. 
(c) Students of Neema Secondary School formed an environmental club with a goal of taking part in environmental conservation activities. Outline three ways in which they can use the internet to achieve this goal. 
(d) (i) A company has three branches A, B and C where A is the headquarter. The local area network (LAN) at A is directly connected to the LAN at B and directly to the LAN at C. Explain two benefits of having the LAN at B also directly connected to the LAN at C. (4 marks)
(ii) State three ways in which a company can protect its computer network from hackers. 
(a) (i) Repeater
  • A device used to re-construct data signal during data transmission to its original strength/amplify/boost/regenerate.
(ii) Router
  •  It is a device used to facilitate movement of data or packets between two or more LANS of different configuration (expansion of networks).
  •  Delivers a packet/data directly to destination computers.
  •  Interconnects different networks/provide s network service s.
(b) (i) The component P is the terminator.
(ii) Terminator in a backbone is used to prevent data signal from bouncing back/absorb signals.
(c) Use of internet in environmental conservation club
  •  Source of knowledge on environmental matters;
  •  Collaboration with peers from other schools or organisations;
  •  Dissemination of information on what the club is doing;
  •  Seeking for funding from sponsors.
(d) (i) Benefits of linking branch B and C
  •  Speed of communication between B and C is increased since the traffic between the two branches can be re-routed through the link BC;
  •  If either AC or AB is down, the three branches can still communicate;
  • If the HQ systems fail, the two branches B and C can communicate using this link.
(ii) Ways to protect company network from hackers
  •  Changing password frequently
  •  Use of encryption;
  • Use of data proxies;
  •  Use of firewalls to filter unwanted packets;
  •  User restriction e.g. passwords/biometrics.
  •  Use of complex password.

Read More






0 Comments

State three hardware devices that may be required to connect a computer to an existing local area network.

7/1/2021

0 Comments

 

​A) State three hardware devices that may be required to connect a computer to an existing local area network. (3 marks)

  •  A network adapter/network interface card
  •  Network medium/cable
  •  RJ45 connectors/BNC/ST connector/SC connectors/Fibre local connector
  •  Data points (sockets to plug in the cable)
  •  Switch/Hub
  •  Access point/TP link

​B) A publisher intends to use a desktop publishing programme to create a publication which is to have many graphics. State three ways in which the graphics may be acquired for this purpose. (3 marks)

  •  Using digital camera
  •  Scanning the graphics from other sources
  •  Downloading from the internet
  •  Drawing from scratch/Drawing tools
  •  Clip art
  •  Another file

​C) Interpret each of the following spreadsheet formula:

​(i) = countif(D2:D9, “>“&B4) (2 marks)
​(ii) sumif(B3 :B 11, “4M”, D3 :D11) (2 marks)
 (i) = Countif (D2 : D9, “>“ & B4)
  • Count those value in the range D2 :D9 with values greater than the value in cell B4). 
(ii) = Sumif (B3 : B11, “4M” D3 : D11)
  • Sum the values in the cell range D3 : D11 for records whose
  • corresponding values in cell range B3 : B11 equals to “4M”

​(D) The following are the fields of products table in a database created to store records of products manufactured in a factory:

  • product number
  • product name
  • price
  • product description
I. State the appropriate data type for each field. (2 marks)
II. State three properties to be put in place during table design to ensure integrity of the data entered. (3 marks)
I) Product Number — Number/Autonumber/Text
  • Product Name — Text/string
  • Price — Currency/Number
  • Product Description — Memo/Text/String
(II) Properties that can be set in the table design
  •  Data type
  •  Validation/Validation rule
  •  Input mask
  •  Setting required/null value status
  •  Field size
  •  Caption
​(D) The following are the fields of products table in a database created to store records of products manufactured in a factory:

Read More






0 Comments

State four outcomes that may result from using incorrect requirement specifications during systems development.

7/1/2021

0 Comments

 

​A) State four outcomes that may result from using incorrect requirement specifications during systems development. (4 marks)

  • The system will be delivered later than schedule
  • The system will not meet the user’s expectation
  • The cost of maintaining and enhancing the system may be excessively high.
  •  The system may be unreliable and prone to errors and downtime.
  •  The system will not meet legal requirements.

B) A school opted to use direct change over approach when installing a new system.
​ Explain three challenges that the school may face as a result of this approach. (6 marks)

  •  If something went wrong in the new system, there will be no fall back has the business has to stall till the problem is sorted.
  •  There will be a period of time where no system is available because the old one is switched off and the new one is being switched on.
  • There will be a period of upheaval while the system is brand new and the school staff are finding their way around it.
  • There is a possibility of sabotage by staff since there is no time to monitor and manage resistance to the new system.

​C) State three reasons that may lead an organization to install an intranet. (3 marks)

  • Used to isolate the organizational resources from the internet/security.
  • Used to provide communication and collaboration among individual within the  control.
  • Used to publish and share valuable information among the users easily, inexpensively and effectively via portals and intranet website/resource sharing.
  •  Used to run critical applications that support business decision making.
  •  Distributed processing facilities.
  •  Cost Effectiveness.
  •  Protects signal distortion.
  •  Protects signal inteferance.

​D) The figure below shows a coaxial cable. State the function of the part labelled A. (2 marks)

The figure below shows a coaxial cable. State the function of the part labelled A
  • Used for blocking electromagnetic fields from entering the cable and producing noise.
  •  Provides insulation.

Read More






0 Comments

The topology below ¡s formed by combining two types of topologies.

6/1/2021

0 Comments

 


The topology below is formed by combining two types of topologies.

The topology below ¡s formed by combining two types of topologies.

(a) Give one name for the combined topology in figure 2. 

  •  Hybrid topology/tree/hierarchical

(b) Name the two topologies forming the combined topology in figure 2.

  • Star and Bus topologies (line/linear)

Read More






0 Comments

State three techniques used by a network administrator to detect and prevent computer crimes.

5/1/2021

0 Comments

 


State three techniques used by a network administrator to detect and prevent computer crimes.

​(b) A company in town wishes to link its offices together. The linking may be through wireless or fibre optic network media.
(i) State two benefits that the company would gain from the use of metropolitan area network (MAN).
(ii) State three advantages of using wireless over fibre optic network media.
(iii) State two limitations of wireless communication. 
(iv) State two transmission media used in wireless transmission. 
(c) State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media.

RESPONSES

(a) Audit trail
  •  Use of antimalware software
  •  Data encryption
  •  Log files
  •  Firewall
  •  Intruder detection
  •  User access levels
  •  Password/Biometrics
(b)(i) High speed communication
  •  Reduce data transfer charges
  •  Provides a secured network .
  •  Allow remote access
  •  Media cannot be vandalised easily
(ii) No cumbersome cabling needed between sites.
  •  Support multi-channel transmissions.
  •  Wireless supports un-directed signals therefore allowing many recipients.
  •  Do not require access rights on the land between the buildings.
(iii)Line of sight requirement.
  •  Expensive towers required/high initial cost.
  •  Subject to interference such as passing radio waves and weather conditions.
  •  Very difficult to restrict access if it is un-directed.
  •  Hard to secure
  •  Easy to hack 
(iv) Satellite
  •  Microwave
  •  Radio waves/blue-tooth/infrared
(e) Firewalls
  •  Antivirus
  •  Policy formulation on the usage of internet/password/security
  •  Using email instead of storage devices to transfer document files.
  •  Use genuine/authentic/unpirated software
State three techniques used by a network administrator to detect and prevent computer crimes.

Read More






0 Comments

The figure shows a network design. Use it to answer the questions that follow

4/1/2021

0 Comments

 

​(a) The figure shows a network design. Use it to answer the questions that follow.

The figure shows a network design. Use it to answer the questions that follow

Read More






0 Comments

Explain the term search engine as used in the Internet

4/1/2021

0 Comments

 

​​(a) (1) Explain the term search engine as used in the Internet. (2 marks)

(i) Search-engine
It is a web-based application used to locate for an item or information from world wide web.
(ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download. (3 marks)
Factors that affects duration of download
  1. The size of the video
  2. The band width of the media used
  3. Availability of network
  4. Other activities that may be running in the computer.
  5. Other restrictions enforced in the computer
  6. The restrictions by the ISP
  7. Speed of computer
Picture

Read More






0 Comments

Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

4/1/2021

0 Comments

 


Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

  1. Encryption.
  2.  Firewalls.
  3.  User profiles/passwords/user.
  4. Limit the number of log-in attempts.
  5.  Audit trail/tracking.
  6.  Physical protection of computers.
Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.

Read More






0 Comments

Explain how data in a computer system is secured using:

3/1/2021

0 Comments

 


Explain how data in a computer system is secured using:

(i) password;
(ii) user access level.
(b) State three characteristics of a suitable password. 
(c) State two characteristics of a computer that is infected by computer viruses.
(d)(i) The figure below shows how data is transmitted through a public telephone line.
Picture
Name A, B, C and D. ​
​(ii) State two advantages of using fibre optic cables over satellite in data communication. 
(a) (i) Password
  •  It’s a string of characters entered by a user to verify his or her identity.
  •  The system compares the code against a stored list of authorized users. If the user is legitimate then the system allows the user access.
(ii) User level access
  •  It’s a mechanism for limiting access to certain items of information or to certain control based on user identities and their membership in various predefined groups.
(b) Characteristics of a suitable password
  •  Easy to remember
  • Should have appropriate length
  •  Hard/difficult to guess
(c)
  • Slow or not booting.
  •  Files not opening.
  •  Functionality of some application failing.
  •  Files or data getting lost.
(d) (i) Naming the parts
  • A — Sender/terminal
  • B — Digital waveform
  •  C-Modem
  •  D — Analogue waveform.
(ii) Advantages of fibre optic over satellite
  • Cost.
  • Supports broadband communication.
  • Signal is directed and therefore e secure.
  • It’s minimal to raise interference e.g. noise.

Read More






0 Comments
<<Previous

    Categories

    All
    1998
    1999
    2000
    2001
    2002
    2003
    2004
    2005
    2006
    2007
    2008
    2009
    2010
    2011
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    Applications Areas Of Ict
    Areas-where-computers-are-used
    Basic-computer-set-up-and-cabling
    Career Opportunities In Ict
    Classification Of Computers
    Classification-of-computers
    Computer-files
    Computer Systems
    Dashboard
    Database
    Data Communication
    Data-integrity
    Data Processing
    Data Representation In A Computer
    Data Security And Controls
    Definition And Development Of Algorithm
    Definition-of-a-computer
    Desktop Publisher
    Development-of-computers
    Dtp
    Editing-and-formatting-a-word-document
    Electronic-data-processing-modes
    Elementary Programming Principles
    Errors-in-data-processing
    Evolution-of-computer-systems
    File-management-using-an-operating-system
    File-organization-methods
    Form 1
    Form 2
    Form 3
    Form 3 Mock Exams
    Form 4
    Hands On Skills
    Hardware
    Impact Of Ict On Society
    Information
    Input Devices
    Internet And Email
    Introduction To Networking And Data Communication
    Intro To Computers
    Levels-of-programming-languages
    Midterm-exams
    Mind-blowing-q-a
    Mocks
    Network-topology
    Operating Systems
    Output Devices
    Paper 1
    Parts-of-a-computer
    Processing-devices
    Processors
    Program-construction
    Program-control-structures
    Program-design
    Program-development
    Program-documentation
    Registers
    Revision-kits
    Secondary-storage-media
    Section A
    Section B
    Software
    Spreadsheets
    Stages Of System Development
    Storage Devices
    Symbolic-representation
    System-design
    System Development
    System-documentation
    Term-1
    The Computer Laboratory
    The-computer-laboratory
    The-cpu
    Types-of-networks
    User Interface
    Uses-of-computers
    Word Processors
    Worksheet-formatting

    Archives

    January 2025
    March 2021
    February 2021
    January 2021
    December 2020
    October 2020
    April 2020
    February 2020
    October 2019
    August 2019
    July 2019
    April 2019
    March 2019
    November 2018
    August 2018
    July 2018
    December 2017
    November 2017
    October 2017
    July 2017
    August 2016
    June 2016
    January 2016
    December 2015
    November 2015

    RSS Feed

atika school app
Download our Android App

Primary Resources
  • K.C.P.E Past Papers
  • ​Pri - Primary 1 Level
  • Pri  - Primary 2 Level
  • Grade 1
  • Grade 2
  • Grade 3
  • Grade 4
  • Standard 5
  • Standard 6
  • Standard 7
  • Standard 8
  • English
  • Kiswahili
  • Social Studies
  • Science
  • Mathematics
  • Kenya Sign Language
  • I.R.E
  • ​H.R.E
  • Notes
  • Termly Questions
  • Mocks
  • K.C.P.E Past Papers
College Resources
  • E.C.D.E
  • P.T.E
  • D.T.E
  • Technical Diploma
  • Technical Certificate
  • Business Diploma
  • Business Certificate
  • Higher Diploma
  • K.A.S.N.E.B Resources
  • K.M.T.C Resources
  • Varsity Resources
Secondary Resources
  • K.C.S.E Past Papers
  • Form 1
  • Form 2
  • Form 3
  • Form 4
  • Term 1
  • Term 2
  • Term 3
  • English
  • Geography
  • History
  • C.R.E
  • I.R.E
  • ​H.R.E
  • Home Science
  • Computer Studies
  • Business Studies
  • Agriculture
  • Chemistry
  • Biology
  • Physics
  • Mathematics ALT A
  • Mathematics ALT B
  • Kiswahili
  • French
  • Germany
  • Arabic
  • Aviation
  • Art & Design
  • Drawing & Design
  • Building & Construction
  • Metal Works
  • Wood Work
  • Music
  • Kenya Sign Language
  • Electricity
Other Useful Links
  • Academic Environment
  • How its Done
  • News and Opinions
  • Manyam Franchise Support
  • About
  • SITEMAP
  • FOCUS A365 SERIES
  • Membership Details (KCPE/KCSE)
  • Secondary Mocks
  • SYLLABUS
Contact Us

    Send Us a Message

    Max file size: 20MB
Submit
Manyam Franchise
P.O Box 1189 - 40200 Kisii
Tel: 0728 450 424
Tel: 0738 619 279
Tel: 0763 450 425
E-mail - sales@manyamfranchise.com
Photos used under Creative Commons from wwarby, JoshMacDonald, Visual Content, wuestenigel, Homini:), Wonderlane, Mike Licht, NotionsCapital.com, The Official CTBTO Photostream, Nabor Garrido, picsaf.com, OER Africa, Jemimus, andronicusmax, Christoph Scholz, cyanocorax, matsuyuki, Mark Hodson Photos, cathyse97, tompagenet, ToGa Wanderings, crstnksslr, machernucha, panpot, ePublicist
  • Home
    • Atika School Advanced Search
    • News and Opinions
    • Echo
    • Academic Environment
    • How its Done
    • SITEMAP
    • About Us? >
      • About Us
      • Learn more about us
  • TUTORIALS
    • SECONDARY >
      • SCIENCES >
        • FOCUS MATHEMATICS TUTORIALS AND EXAMS FREE
        • KCSE BIOLOGY NOTES
        • FREE KCSE CHEMISTRY NOTES
        • KCSE PHYSICS NOTES, AUDIOVISUALS AND MORE
      • LANGUAGES >
        • ENGLISH >
          • English KCSE Set Books
          • ENGLISH GRAMMAR #KCSE
        • CHOZI LA HERI - MWONGOZO
        • KIGOGO - MWONGOZO
        • KCSE Kiswahili
      • TECHNICALS >
        • KCSE BUSINESS STUDIES NOTES
        • kcse Computer Studies Notes
        • KCSE AGRICULTURE NOTES, SYLLABUS, QUESTIONS, ANSWERS, SCHEMES OF WORK AND OTHERS
      • HUMANITIES >
        • KCSE History Notes Form 1 to 4
        • FREE KCSE CRE NOTES
        • KCSE GEOGRAPHY NOTES
        • IRE NOTES, AUDIOVISUAL, QUESTIONS AND ANSWERS
    • MASOMO VIDEOS
    • PRIMARY >
      • NOTES >
        • KISWAHILI
        • SOCIAL STUDIES >
          • STANDARD 4: SOCIAL STUDIES
        • SCIENCE
        • ENGLISH >
          • KCPE and Primary Level Compositions
        • MATHEMATICS >
          • KCPE Mathematics Notes
      • EXAMINATIONS >
        • DecaTurbo Online Series Examinations
        • TOP INSHA AND COMPOSITION QUESTIONS
        • CBC Kiswahili
        • FOCUS A365 SERIES K.C.P.E EXAMINATIONS FOR PRIMARY
        • Standard 8 (std) English Topical Questions
      • SYLLABUS >
        • Primary 8-4-4 based Syllabus, Objectives and Lessons
        • Primary Mathematics Syllabus
  • CURRICULUM
    • NEW CURRICULUM DESIGNS >
      • PRIMARY >
        • PRE PRIMARY ONE CURRICULUM WITH SYLLABUS
        • PRE PRIMARY TWO CURRICULUM WITH SYLLABUS
      • SECONDARY >
        • KNEC KCSE SYLLABUS AND COURSE OUTLINES
      • COLLEGE >
        • Regulations for the TIVET Craft and Diploma Business Examinations
  • PRODUCTS
    • All Categories
    • FREE DOCUMENTS
    • PRIMARY CBC BASED RESOURCES
    • PRIMARY 8-4-4 BASED RESOURCES >
      • STANDARD 8 RESOURCES
    • COLLEGE & VARSITY RESOURCES
    • HIGH SCHOOL RESOURCES
    • FREE NOVELS >
      • COURSE BOOKS
      • KCSE KISWAHILI SETBOOKS
    • Backed Up Files and Archives
  • EXAMINATIONS
    • PRIMARY EXAMS >
      • Primary Assorted Mocks
      • Assignments and Random Exams
      • 8-4-4 >
        • STANDARD 8 PAST PAPERS 8-4-4 BASED
      • CBC
    • TOP SCHOOLS EXAMINATIONS LATEST >
      • Assignments and Random Exams
    • KCPE >
      • KCPE PAST PAPERS AND ANSWERS
    • KCSE >
      • KCSE BY SUBJECT >
        • KCSE PAST PAPERS BY SUBJECT
        • Free KCSE Past Papers Mathematics
        • Free KCSE Biology Questions and Answers
      • KCSE BY YEAR >
        • KNEC KCSE PAST PAPERS, MARKING SCHEMES, QUESTIONS & ANSWERS
    • QUESTIONS & ANSWERS >
      • SECONDARY >
        • LANGUAGES >
          • ENGLISH POETRY QUESTIONS WITH ANSWERS FOR K.C.S.E CANDIDATES
        • TECHNICALS >
          • COMPUTER STUDIES >
            • COMPUTER STUDIES Q & A
            • kcse computer studies paper 2 AND 3 Questions & Answers
          • BUSINESS STUDIES QUESTIONS & ANSWERS
          • KCSE AGRICULTURE TOPICAL QUESTIONS
          • KCSE HOME SCIENCE DIRECT QUESTIONS AND ANSWERS
        • SCIENCES >
          • KCSE Mathematics Topical Questions
          • KCSE Biology Topical Questions and Answers
          • CHEMISTRY TOPICAL QUESTIONS AND ANSWERS
          • KCSE Physics Topical Questions
          • KCSE physics Practical Sample Quiz
        • HUMANITIES >
          • ISLAMIC RELIGIOUS EDUCATION (IRE) QUESTIONS AND ANSWERS
          • C.R.E (CRE) QUESTION AND ANSWERS
          • KCSE History Topical Questions and Answers
          • GEOGRAPHY TOPICAL QUESTIONS AND ANSWERS
      • PRIMARY >
        • Standard 4-8 Mathematics Topical Questions from Mocks and KCPE
        • Std 6 Mathematics Notes
  • HIGH INSTITUTIONS
    • EXAMINATIONS >
      • College and Varsity Past Papers online >
        • College and Varsity Past Papers online
    • TUTORIALS
  • PRICING
  • BLOGS
    • Contact
    • Help & Support
    • MPESA FORM
  • Search Free Documents (PDF)