Describe biometric securityRefers to the science of identifying an individual through their body characteristics such as face geometry, hand geometry, iris or rental scans or voice patterns.
0 Comments
Distinguish between Logical file structure and physical file structure.
List four ways in which data integrity can be compromised
(a) List and describe four strategies for converting from an old system to a new system. (4mks)
(b) (i) Distinguish between private data and confidential data (2mks)
(ii) What can be done to stop illegal access to a computer laboratory by unauthorized people (3mks)
(c) (i) List four areas that would be considered in the requirement specification. (4mks)
(ii) Name any two areas covered in feasibility report during system analysis and design. (2mks)
A computer diskette in drive A has folders for MEMOS for an administrator. Each of these folders is labelled according to the relevant months. The secretary created the folders for each month’s memo for each of access. Study the table below(a) Assuming that the secondary was working from the diskette, draw the corresponding tree structure (6mks)(b) (i) The secretary wanted to create a folder to store a memo in Fraud folder. State the path for that folder. (2mks)
A:/MEMO2/Fraud
(ii) Suggest how the secretary can ensure that the work in that diskette is not spoilt. (1mk)
(iii) The content of the file is not viewed by any other person apart from her. (1mk)
use of password
(c) (i) List any two devices under the control of the operating system. (2mks)
(ii) Explain how each one of these devices are controlled by the OS - Operating System
Input/output devices and ports
In most cases, the operating system controls all data input and information output tasks. Because most input/output devices are slower than the processor, the operating system has to control the flow of data from the time of input to the time the user receives it as information. It ensures that the right data reaches the processor at the right time. The operating system also defines the various input/output ports found on the computer e.g. printer port.
The processor
The processor is a scarce resource. It executes tasks called processes. At any one time several tasks may require processing hence creating competition. The operating system arranges the tasks according to priority and has the ability to stop a particular task to allow the processor to service another one.
Main memory(RAM)
At any one given time so many tasks may require the memory so that they can be accessed and processed by the computer.However,because memory is also a scarce resource,the operating system determines which task will remain in memory awaiting for execution and which one will be sent back to secondary storage to wait. Because the operating system is large and very important, it is usually installed on the hard disk but must be loaded to RAM during the booting process. Not all the operating system can fit in RAM so a small special part that contains the most necessary commands and procedures called the kernel is the one that is loaded.
Secondary storage devices
The operating system manages the storage and retrieval of data on secondary storage devices. It also utilizes the free space on hard disks to enhance the performance of the computer by temporarily holding tasks on it that were in RAM ready for processing but have to wait for sometime.
Communication devices and ports
Communication in this case refers to how the various devices and programs in and out of the computer system send and receive messages from one another and from the processor. The operating system controls the overall communication process between various tasks and computers. External communication can be achieved by connecting an external device to a communication port using a communication medium like cables or even wireless communication.
The information below is maintained by the sales lady at the school canteen. Study it and answer the questions that follow.(a) Describe the basic data types used in this spreadsheet (4mks)
(b) Provide a single formula that would be used to
|
Categories
All
Archives
January 2025
|
Primary Resources
College Resources
Can't find what you want? Use this Search box. |
Secondary Resources
|
Contact Us
Manyam Franchise
P.O Box 1189 - 40200 Kisii Tel: 0728 450 424 Tel: 0738 619 279 E-mail - sales@manyamfranchise.com |