![]()
0 Comments
![]()
![]()
(a) List and describe four strategies for converting from an old system to a new system. (4mks)
(b) (i) Distinguish between private data and confidential data (2mks)
(ii) What can be done to stop illegal access to a computer laboratory by unauthorized people (3mks)
(c) (i) List four areas that would be considered in the requirement specification. (4mks)
(ii) Name any two areas covered in feasibility report during system analysis and design. (2mks)
A computer diskette in drive A has folders for MEMOS for an administrator. Each of these folders is labelled according to the relevant months. The secretary created the folders for each month’s memo for each of access. Study the table below(a) Assuming that the secondary was working from the diskette, draw the corresponding tree structure (6mks)(b) (i) The secretary wanted to create a folder to store a memo in Fraud folder. State the path for that folder. (2mks)
A:/MEMO2/Fraud
(ii) Suggest how the secretary can ensure that the work in that diskette is not spoilt. (1mk)
(iii) The content of the file is not viewed by any other person apart from her. (1mk)
use of password
(c) (i) List any two devices under the control of the operating system. (2mks)
(ii) Explain how each one of these devices are controlled by the OS - Operating System
Input/output devices and ports
In most cases, the operating system controls all data input and information output tasks. Because most input/output devices are slower than the processor, the operating system has to control the flow of data from the time of input to the time the user receives it as information. It ensures that the right data reaches the processor at the right time. The operating system also defines the various input/output ports found on the computer e.g. printer port.
The processor
The processor is a scarce resource. It executes tasks called processes. At any one time several tasks may require processing hence creating competition. The operating system arranges the tasks according to priority and has the ability to stop a particular task to allow the processor to service another one.
Main memory(RAM)
At any one given time so many tasks may require the memory so that they can be accessed and processed by the computer.However,because memory is also a scarce resource,the operating system determines which task will remain in memory awaiting for execution and which one will be sent back to secondary storage to wait. Because the operating system is large and very important, it is usually installed on the hard disk but must be loaded to RAM during the booting process. Not all the operating system can fit in RAM so a small special part that contains the most necessary commands and procedures called the kernel is the one that is loaded.
Secondary storage devices
The operating system manages the storage and retrieval of data on secondary storage devices. It also utilizes the free space on hard disks to enhance the performance of the computer by temporarily holding tasks on it that were in RAM ready for processing but have to wait for sometime.
Communication devices and ports
Communication in this case refers to how the various devices and programs in and out of the computer system send and receive messages from one another and from the processor. The operating system controls the overall communication process between various tasks and computers. External communication can be achieved by connecting an external device to a communication port using a communication medium like cables or even wireless communication.
The information below is maintained by the sales lady at the school canteen. Study it and answer the questions that follow.(a) Describe the basic data types used in this spreadsheet (4mks)
(b) Provide a single formula that would be used to
|
complete_paper_1_computer_studies_form_3_term_2_jan.2021_with_marking_scheme..pdf | |
File Size: | 323 kb |
File Type: |
Marking Scheme
A school has been advised to employ a database administrator. State three responsibilities of this personnel in the school.
(c) Mary was advised to partition a hard disk for her computer. Explain two reasons that may have necessitated this.
(d) Explain a reason for conducting each of the following studies in systems development:
(i) Schedule feasibility;
(ii) Technical feasibility.
- Carrying out school database backups.
- Recovering of lost school data incase of system failure.
- Ensuring the security and integrity of the school system.
- Adding new users to the school system and managing the user’s accounts.
- Designing and developing database application for the school.
- Updating or maintaining database for the school.
- Use of GPS to track vehicles, flights etc.
- Bookings to different destinations can be done through the use of computers ( online booking).
- The computers can also be used to reduce the speed of vehicles and bring sanity in the industry.
- Managing human resource involved in the industry.
- For security purposes, incase one partition fails the second partition remains functional.
- If she requires backup copies to be stored in the same hard disk.
- If she intends to install more than one operating system.
- To determine if the proposed solution can be developed within the required time.
- To determine if the system can be supported by the available technology.
Categories
All
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2022
Analogue And Digital Systems
Applications Areas Of ICT
Areas-where-computers-are-used
Auxiliary Storage Devices
Basic-computer-set-up-and-cabling
Binary Addition
Binary Subtraction
Career Opportunities In ICT
Classification Of Computers
Classification-of-computers
Coaxial Cables
COMPACT DISK
COMPLETE PAPERS
Computer Crimes
Computer-files
Computer Memory
Computer Software
Computer Systems
COMPUTER VIRUS
Dashboard
Database
Data Collection
Data Communication
Data-integrity
Data Processing
Data Representation In A Computer
Data Security And Controls
Definition And Development Of Algorithm
Definition-of-a-computer
Desktop Publisher
Development-of-computers
DTP
DVD
Editing-and-formatting-a-word-document
Electronic Data Processing Modes
Elementary Programming Principles
Errors-in-data-processing
Evolution-of-computer-systems
Fibre Optic Cables
File Management Using An Operating System
File-organization-methods
Flowchart
Form 1 Level
Form 2 Level
Form 3 Level
Form 3 Mock Exams
Form 4 Level
Formatting Features
Hands On Skills
HARDCOPY OUTPUT DEVICES
Hardware
Impact Of Ict On Society
IMPACT PRINTERS
Information
Input Devices
Internet And Email
Introduction To Computers
Introduction To Networking And Data Communication
ISP
Levels-of-programming-languages
Midterm-exams
Mind-blowing-q-a
Mocks
Network-topology
NON-IMPACT PRINTERS
Octal
Operating Systems
Output-devices
Paper-1
Parts-of-a-computer
Printers
Processing-devices
Processors
Program-construction
Program-control-structures
Program-design
Program-development
Program-documentation
Protocols
Registers
Review Questions
Revision Kits
Secondary Storage Media
Section A
Section B
Security Threats And Control Measures
Software
Spreadsheets
Stages Of System Development
Storage Devices
Symbolic-representation
System-design
System Development
System-documentation
Term-1
TERM 2
The Computer Laboratory
The CPU
The Keyboard
Types Of Computer Files
Types-of-networks
User Interface
Uses-of-computers
Word Processors
Worksheet-formatting
Archives
December 2024
February 2023
November 2022
September 2022
April 2022
January 2022
December 2021
November 2021
July 2021
March 2021
February 2021
January 2021
December 2020
October 2020
April 2020
February 2020
October 2019
August 2019
July 2019
April 2019
March 2019
November 2018
August 2018
July 2018
December 2017
November 2017
October 2017
July 2017
August 2016
June 2016
January 2016
December 2015
November 2015