April 21, 2022

Uncategorized

BIT2109  BAC2104  PROFESSIONAL ISSUES IN IT.

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2109/ BAC 2104: PROFESSIONAL ISSUES IN IT BCT 3104: COMPUTER LAW AND ETHICS FULL TIME/PART TIME/DISTANCE LEARNING DATE: APRIL, 2019 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE (Compulsory) a) When working with IT systems it is important that an organisation’s management has both legal and ethical policies in place. Explain BOTH the terms ‘Legal’ and ‘Ethical’. (6Marks) b) What action would you take if you suspected that software being developed by your company might be harmful because it had not been rigorously tested for reasons of minimising cost? (4 Marks) c) Briefly discuss whether technology determines society or if society determines technology (4 Marks) d) Describe the essential elements relating to conduct that identify a professional activity (4 Marks). e) Using relevant examples describe two ethical theories (4 Marks) f) How can information and information systems be used to gain power and, thereby create additional ethical issues? (4 Marks) g) Intellectual property refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Identify the key forms of intellectual property (4 Marks) QUESTION TWO a) The local council issue a questionnaire to all residents asking their opinions on replacing the existing waste disposal system with wheeley bins. As part of the questionnaire, they in addition ask questions about age, occupation, whether you are home owner or not and your sexuality. Comment on whether such a questionnaire might breach the DPA and discuss the appropriateness of each question listed above. (10 Marks) b) How can the issue of the inequity of the Internet economic model, where all payments flow from the underdeveloped countries towards the developed countries despite the fact that the information flows in both directions, be addressed. (10 Marks) QUESTION THREE a) Differences between countries may hinder attempts to regulate global computing activities. Explain using the headings below, with an example in EACH case, how a computer based activity that might be routinely accepted in one country might be unknown or unacceptable in another country (i) Legal differences between countries (4 Marks) (ii) Differences in technical capabilities between countries (4 Marks) (iii) Differences in cultural or social norms between countries (4 Marks) b) “Honest, upright, law-abiding citizens have nothing to fear from the distribution of their personal data.” Do you agree or not? Give at least three reasons for your position and one reasonable objection to it (8 Marks) QUESTION FOUR a) The manager of one of the best-known and most successful English football clubs writes a blog in which he regularly comments on the club’s recent matches. One week, after the club has lost a critical match through a controversial goal, he writes in the blog that the referee was obviously corrupt or incompetent. The referee threatens legal action for defamation against the internet service provider (ISP) that hosts the blog. What laws relate to the ISP’s liability in this situation and what should it do inorder to avoid being successfully sued? (10 Marks) b) Godan Games is a company that develops and markets high quality computer games set in the mythical past. It markets the games through the internet and has customers all over the world. It is becoming concerned at the possibility that competitors will try to pass off their low quality games as coming from Godan. What legal and technical mechanism would you advise Godan to use in order to protect itself and how, briefly, should it go about doing so. (10 Marks) QUESTION FIVE a) Discuss the statement “computer and information technology creates new possibilities for human behaviour” (10 Marks) b) Explain if Grey Hat is an ethical form of hacking or a person using his or her hacking abilities under the pretense of doing a good deed to extort companies out of money (6 Marks) c) As an IT professional working within the industry you will be expected to follow a code of ethical conduct through your working life. Each individual needs to have their own code which should cover conduct: Socially ,Legally and Professionally For any TWO of these categories give an example of an IT moral or ethical dilemma and an appropriate response to it. (4 Marks)

BIT2109  BAC2104  PROFESSIONAL ISSUES IN IT. Read Post »

Uncategorized

BIT2108  BBIT203  OBJECT ORIENTED PROGRAMMING.

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR DEGREE OF BACHELOR SCIENCE/BUSINESS INFORMATION TECHNOLOGY BIT 2108/BBIT 203: OBJECT ORIENTED PROGRAMMING MODE: FULL TIME/PART TIME/DISTANCE LEARNING ORDINARY EXAMINATIONS DATE: MARCH.2019 TIME: 2 HOURS INSTRUCTIONS: Award marks for Question ONE and any other TWO questions QUESTION ONE [30 MARKS] a) Differentiate between the following i. Object oriented and object based programming languages ii. Class and Object iii. Method overriding and method overloading iv. Constructor and destructor member methods 8 Marks b) Preprocessor are commands that are executed before any other statement in your program. Describe any two such preprocessors used in C++ programming. 4 Marks c) Discuss the major drawbacks of structured Languages that necessitated advancement of object oriented programming. 6 Marks d) Define what a pointer is and describe two operators associated with it operation. 3 Marks e) Create a structure person with members’ id, age, height and weight. Write a program that shows how this structure is implemented in main. In main, the programs also compute the Body Mass Index (BMI) given as weight (kg)/height2 (m2). The data is input by the user through program prompting and re-echo the same on the screen in an appropriate format. 9 Marks QUESTION TWO [20 MARKS] a). Describe the concept of inline function in C++. 3 Marks b). Write a C++ program to find the multiplication values and the cubic values using inline function. 8 Marks c). Write a program in C++ that calculates and displays the weekly salary for an employee who earns Kshs 2500 an hour, works 20 regular hours, 10 overtime hours, and earns time and one-half (wage * 1.5) for overtime hours worked. Create a separate method to do the calculation and return the result to be displayed. Your program should contain a class that holds the employee details indicated as well as the method to do the computation 9 Marks. QUESTION THREE [20 MARKS] a) Write a C++ program that displays an invoice of six items. It should contain the item name, quantity, price, and total cost for each item. It also contains methods to get and show item name, quantity, and price. Objects are created in main and invoices printed. 6 Marks b) Describe the concept of template classes in C++. Give an example. 5 Marks c) Describe the concept of function abstraction in object oriented programming. 3 Marks d) Describe how function abstraction can be realized in C++. 6 Marks. QUESTION FOUR [20 MARKS] a) Predict the output of the program below and explain your answer. #include <iostream> using namespace std; class vector{ public: double x,y; double surface (){ double s; s = x * y; if (s < 0) s = -s; return s; } }; int main (){ vector a; a.x = 3; a.y = 5; cout << “The surface of a: ” << a.surface() << endl; return 0; } 6 Marks b) Describe two advantages and two disadvantages of encapsulation in object oriented programming. 4 Marks c) Describe the concept of pure abstract class. Write a simple code in C++ to support your description. 6 Marks. d) Describe the four primary data types in C++. In your explanation highlight on maximum memory size, values stored, and range of the values. 4 Marks QUESTION FIVE [20 MARKS] a) Explain three ways in which the sub-classes extend existing classes in C++. 6 Marks b) Discuss three disadvantages of inheritance as used in object oriented programming. 6 Marks c) State with a reason whether the following statements are true or false. i. Function argument is a value returned by the function to the calling program. ii. When a function returns a value, the entire function can be assigned to variable. iii. When argument is passed by value the function works with the original arguments in the calling program. iv. When argument is passed by reference, a temporary variable is created in the calling program to hold the argument value. 8 Marks

BIT2108  BBIT203  OBJECT ORIENTED PROGRAMMING. Read Post »

Uncategorized

BIT2107  OBJECT ORIENTED ANALYSIS  DESIGN.

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT2107 OBJECT ORIENTED ANALYSIS & DESIGN APRIL 2019 TIME: 2 HOURS Instructions o Answer question ONE and any other TWO. o Question One carry 30 marks, others 20 marks each. QUESTION ONE. (COMPULSORY) (a) Give the meaning of the following terms in relations to Object Oriented field: (12 Marks) i. Object ii. Class iii. Association iv. Aggregation v. Encapsulation vi. Inheritance (b) Highlight any three limitations of the structured approach to software development. (3 Marks) (c) Define Unified Modeling Language (UML) in object orientation and describe its main building blocks. (4 Marks) (d) Define sequence diagram and show symbols used to draw them. (4 Marks) (e) Describe the three views used in UML and show all 7 diagrams (7 Marks) QUESTION TWO (a) Consider the following scenario. “Nurses work on a particular ward. Doctors are assigned a number of patients and during their rounds visit a number of different wards. If a doctor needs advice he/she may consult with a specialist consultant regarding a particular patient. The specialist may see the patient. Specialists are basically senior doctors.” Draw the class diagram to include any inheritance, aggregation or composition and multiplicities where possible. (12 Marks) (b) A student in KCA University intends to go for a class. Draw his possible activity diagram. Remember to include swim lanes, forks, and joins among others. (8 Marks) QUESTION THREE (a) In my local food kiosk, you find the following items: Maize, bananas, beans and Oranges. Draw a hierarchical class diagram to illustrate the kiosk. (4 Marks) (b) Study the scenario below and answer the questions that follow: When a student arrives at KCA University, Admission clerk register them at their desk. The registration is done by a way of entering the student details in the registry. Since admission clerk is interested in the student, academic level in the university among other details they records includes names, academic level, town, age and contacts. After registration, the student is handed over to the faculty. The faculty staff then helps the student to become a faculty member where they learn until the graduate. (i) Identify possible actors (3 Marks) (ii) Identify the possible use cases (3 Marks) (iii) Draw a use case diagram showing clearly how actors interact with the use cases as you have stated in (i) and (ii) above. (7m Marks) (iv) What is the significant of use cases in the Object oriented analysis and design (3 Marks) QUESTION FOUR (a) (i) What is a state diagram? (2 Marks) (ii) Create a state diagram for this scenario. (10 Marks) The washing machine has 2 major states : pause and runnable. A washing machine in the runnable state cycles around the following substates – stopped, filling, washing and spinning. The machine can only start running if the door is closed and the machine will pause immediately the door is opened. The washing machine runs to a program. The machine will restart the program each time it re-enters the runnable state (b) What do you understand by the following terms as used in Object oriented concepts? (i) Prototyping (2 Marks) (ii) Spiral Model (2 Marks) (iii) Inception (2 Marks) (iv) Transition (2 Marks) QUESTION FIVE (a) Discuss the following visibility types with the use of an appropriate symbol: (6 Marks) (i) Private (ii) Public (iii) Protected (b) (i) What do you understand with the term multiplicity? (2 Marks) (ii) Outline any four types of multiplicities (4 Marks) (c) Explain any two common uses of interaction diagrams (4 Marks) (d) Discuss any two situations where activity diagrams are suitable. (4 Marks)

BIT2107  OBJECT ORIENTED ANALYSIS  DESIGN. Read Post »

Uncategorized

BIT2106   SOFTWARE ENGINEERING PRINCIPLES.

UNIVERSITY EXAMINATIONS: 2019/2020 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2106: SOFTWARE ENGINEERING PRINCIPLES BCT 2104: PRINCIPLES OF SOFTWARE ENGINEERING FULL TIME/PART TIME/DISTANCE LEARNING DATE: APRIL, 2019 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE a) Distinguish between systems engineering and software engineering (2 Marks) b) Define a software process and state FOUR key stages (6 Marks) c) Describe FOUR ethical issues in software engineering (8 Marks) d) Explain the need for managing risks in software engineering (4 Marks) e) State the challenges faced by a software engineer in managing software projects (6Marks) f) What is a critical system and give THREE examples (4 Marks) QUESTION TWO a) What is the difference between software validation and software verification (2 Marks) b) Using a suitable illustration describe the spiral model (10 Marks) c) State some of the challenges that a software engineer faces in the 21st century (8 Marks) QUESTION THREE a) Explain the importance of software evolution and the activities involved (6 Marks) b) Describe non-functional requirements and give THREE examples (5 Marks) c) State FOUR problems in incremental development (4 Marks) d) What are the benefits of software prototyping (5 Marks) QUESTION FOUR a) Why do we need to inspect and test systems? (4 Marks) b) Project planning is essential in software engineering. What are the types of plans that should form part of the documentation (7 Marks) c) Describe FIVE architectural design consideration decisions (5 Marks) d) State FOUR characteristics in object orientated design (4 Marks) QUESTION FIVE a) State THREE advantages and THREE disadvantages of software reuse (6 Marks) b) What is your understanding of the following i) Change management (4 Marks) ii) Configuration management (4 Marks) c) What has contributed mainly to software projects failure in the last 10 years (6 Marks)

BIT2106   SOFTWARE ENGINEERING PRINCIPLES. Read Post »

Uncategorized

BIT2105  APPLICATION PROGRAMMING.

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY/BUSINESS INFORMATION TECHNOLOGY/APPLIED COMPUTING BIT2105 APPLICATION PROGRAMMING FULL TIME/PART TIME/DISTANCE LEARNING DATE: APRIL, 2019 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE (30 MARKS) COMPULSORY (a) Explain the following terms as used in VB (i) Container controls (ii) Event driven programming (iii) Component tray (iv) Code window (v) Lasso method 5Marks (b) Differentiate between the name and text properties of controls in vb.net 4Marks (c) Briefly describe the terms below (i) Class (ii) Menu strip (iii) Tool Tip 6Marks (d) Differentiate between a check box and a Radio button 4Marks (e) VB has two different types of constants describe them using examples 4 Marks f) Describe the use of Globalization enumeration in VB.net using examples to illustrate 5 Marks QUESTION TWO (20 MARKS) a) Design the interface and write a program in VB.net that can be used to calculate the balance (change) to be given back to a customer after purchasing goods in store. The purchase should include at least 5 items. 15 Marks b) Differentiate between a group box and a picture box 5 Marks QUESTION THREE (20 MARKS) (a) i) Describe the term option explicit as used in VB.net 2 Marks ii) Expand the following statements in full and explain their use a) TotalSalesDecimal += SaleAmountDecimal 3Marks b) CountInteger -= 1 3Marks b) Describe the for loop used in VB.net 4 Marks (c) Define a module. Visual Basic stores code in three different modules. List and explain these modules. 8 Marks QUESTION FOUR (20MARKS) a) using an example to illustrate explain how you can code a button and a menu to perform the same function 4 Marks b) Briefly explain the importance of a good UI in a program. 4 Marks d) Briefly describe any TWO advantages of using an IDE in programing 4 Marks e) Describe the three control constructs used in VB.net 6 Marks f) Explain the use of hot keys in VB .net 2 Marks QUESTION FIVE (20 MARKS) a) Using examples to illustrate differentiate between the Parse method and the Globalization enumeration as used in vb.net 6 Marks b) Using vb.net to illustrate describe the input –process- output model of programming 9 Marks c) Explain why you would prefer using the VB.net intelligence for typing code to an ordinary text editor 5 Marks

BIT2105  APPLICATION PROGRAMMING. Read Post »

Uncategorized

BIT2104  DATABASE DESIGN AND DEVELOPMENT.

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2104: DATABASE DESIGN AND DEVELOPMENT MODE: FULL TIME/PART TIME/DISTANCE LEARNING ORDINARY EXAMINATIONS DATE: APRIL.2019 DURATION: 2 HOURS INSTRUCTIONS: Answer question ONE and any other TWO QUESTION ONE [30 Marks] a) Discuss the concept of data modelling as used in database design. 3 Marks. b) Briefly explain the conceptual, logical and physical data models as used in database design. 6 Marks. c) Define the concept of a surrogate key and explain how different it is from a primary key. 4 Marks d) Briefly explain the significance of metadata during database design. 6 Marks e) Describe any three characteristics of database approach. 3 Marks f) Consider the scenario given below and construct a conceptual data model complete with cardinalities and optionalities using chen’s notation: A division operates many departments, but each department is operated by only one division. Each division must have at least one department and each department must belong to a division. A department employs many employees, but there may be a department with no employees. Majority of employees called “dept_emps” are employed by a department. However, there are also employees known as “free_lance_emps” who are not assigned to any department. A department may own many projects, but there may be a department with no projects. Each project is existentially and identification dependent on only one department. Both dept_emps and free_lance_emps can work on many projects, but there are employees who do not work on any project. A project has at least one employee working on it. One of dept_emps ménages a department. Each department must have a manager. One of the employees runs a division. Each division must have someone running it. 8 Marks. QUESTION TWO [20 MARKS] a) Define the concept of database normalization 2 Marks b) Differentiate between transitive dependency and partial dependency. 6 Marks c) Briefly outline any three anomalies that may occur in the table shown below. 6 Marks d) Describe the process of normalizing the table above up to 3NF. 6 Marks QUESTION THREE [20 MARKS] a) Discuss any FOUR advantages of using a stored procedure in a database. 8 Marks b) Discuss any THREE major differences between triggers and stored procedures. 6 Marks c) Consider the schema for table called bookings below and answer the questions that follow. i. Create a view to display all reservations made between 2/2/2019 and 2/3/2019. 3 Marks ii. Write a query to update details of a reservation record whose so that the check in time was changed from 1/4/2019 to 11/4/2019. 3 Marks QUESTION FOUR [20 MARKS] a) Almost every database system provides a mechanism for enforcing a password policy that has the following features: Complexity Failed attempts Expired passwords Password reuse Briefly describe each of the above features and explain how they help protect the database. (8 marks) b) State the emerging roles and responsibilities of a datawarehouse administrator (4 marks) c) A medical surgery keeps patients’ records in a database server located in a dedicated room. These records can be accessed remotely by the staff working at the surgery (doctors and office staff). (i) Describe an example of physical security control for protecting this database. (2 mark) d) (ii) Describe one way of preventing the office staff from viewing sensitive medical data about patients that should be viewed only by doctors. (2 marks) e) f) Using your own examples and/or suitable diagrams, explain the following transaction processing concepts and their role in enforcing data integrity and consistency… i) COMMIT (2 Marks) ii) ROLLBACK (2 Marks) QUESTION FIVE [20 MARKS] a) Database security aims to minimise the loss of: Data Confidentiality Data Integrity Data Availability Describe each of the above concepts (6 marks) b) Explain how each of the following mechanisms contribute to providing security for a database: Authorisation Views Backup and Recovery Encryption (8 marks) c) define the following database terms… i) ACID properties (2 Marks) ii) Isolation levels (2 Marks) iii) Locking levels (2 Marks)

BIT2104  DATABASE DESIGN AND DEVELOPMENT. Read Post »

Uncategorized

BIT2103  BBIT200  PRINCIPLES OF ARTIFICIAL INTELLIGENCE.

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY /BACHELOR OF BUSINESS IN INFORMATION TECHNOLOGY / BACHELOR OF APPLIED COMPUTING BIT2103 & BBIT200 PRINCIPLES OF ARTIFICIAL INTELLIGENCE FULL TIME/PART TIME/DISTANCE LEARNING DATE: APRIL, 2019 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE (a) . Define the term “Intelligence” [2 Marks] (b) Describe any three types of human intelligence. Explain which tools for improving each type of intelligence and potential careers [9 Marks] (c) State and explain three branches of artificial intelligence [6 Marks] (d) Briefly explain the meaning of the following artificial intelligence terms and give one example for each case (i) Knowledge representation [2 Marks] (ii) Forward chain inferencing [2 Marks] (iii) Heuristics [2 Marks] (iv) Backward chain reasoning [2 Marks] (e) Answer the following questions by indicating whether the statements are True (T) or False (F). [4 Marks] 1. informed searching algorithms are efficient 2. Depth-first search is an example of un informed searching method. 3. Breadth first algorithm is optimal. 4. Greedy search algorithm is complete QUESTION TWO (a) Describe five characteristics of a good knowledge representation technique [5 Marks] (b) Translate the following statements into predicate logic [3 Marks] i. Everything in the garden is lovely ii. John likes chocolate iii. Every book has an author (c) Give that P is true, Q is false and R true, use truth table to determine the truth value of the following Expression [2 Marks] (d) Consider the following knowledge that describes properties of specific animals cats, bears and whales are mammals. Bears and cats have fur while whales and fish lives in water. Both mammals and fish are animal. (i) Draw a semantic network to represent the above knowledge [3 Marks] (ii) Convert the semantic network drawn in (i) into a hierarchy of frames [3 Marks] (iii) Use the above scenario to write a collection of facts and rules using predicate logic that can be stored in a knowledgebase. [2 Marks] (iv) Write a query can be typed at the prompt of prolog to test if there is such an animal as a cat among the collection of facts and rules written in (i). [1 mark] (iii) Write a query that can search collection of facts and rules written in (i) and output all the animals that have fur [1 mark] QUESTION THREE (a) Describe the meaning of the term “Intelligent agent” [2 Marks] (b) State and explain four types of agents’ environments [4 Marks] (c) State and explain any three types of intelligent agents [4 Marks] (d) Describe any four properties of an intelligent agent [4 Marks] (e) Briefly explain the following elements of intelligent agents: (i) Percepts [2 Marks] (ii) Sensors [2 Marks] (iii) Actuators [2 Marks] QUESTION FOUR (a) Briefly explain the meaning of the following terms as used in searching methods (i)Solution (1 Mark) (ii) Path cost (1 Mark) (b) Briefly describe two characteristics for each of the following search methods. Give one example in each case i. Informed search methods (3 Marks) ii. Un informed searching Methods (3 Marks) (c) Consider the following figure i) Use depth-first search to find a path from B to F (4 Marks) ii) Use breadth-first search method to find a path from B to F (4 Marks) (d) Describe four properties of a good searching method (4 Marks) QUESTION FIVE (a) Briefly explain the following terms as used in artificial intelligence (i) Expert systems [2 Marks] (ii) Inferencing [2 Marks (b) Outline four properties of an expert system [4 Marks] (c) State and explain five participants of developing expert systems [5 Marks] (d) Describe seven components of an expert system. [7 Marks]

BIT2103  BBIT200  PRINCIPLES OF ARTIFICIAL INTELLIGENCE. Read Post »

Uncategorized

BIT1309  FINANCIAL MANAGEMENT FOR IT .

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT1309 FINANCIAL MANAGEMENT FOR IT FULL TIME/PART TIME/DISTANCE LEARNING DATE: APRIL 2019 TIME 2 HOURS INSTRUCTIONS: Answer Question One and ANY OTHER TWO questions QUESTION ONE (30 MARKS) The following balances are taken from the books of George Anderson at the end of his first year trading on 31 December 2018. The following additional information is available: Inventory at 31 December 2014 was valued at Kshs4500. Required: (a) Prepare income statement for the year ended 31 December 2018. (10 Marks) (b) Prepare a statement of financial position as at 31 December 2018. (10 Marks) (c) Discuss five specific users of accounting information. (10 Marks) QUESTION TWO (20 MARKS) a) From the following transactions prepare a two column cash book and post entries therefore to ledger accounts. (12 Marks) Year: 2019 Jan. 01: Opening balance of cash Kshs4,500. Jan. 03: Received cash from R & Co. Kshs3,880 and allowed them a discount of Kshs20. Jan. 05: Paid cash to H & Co. Kshs3,590 and received a discount of Kshs10. Jan. 07: Merchandise purchased for cash Kshs940. Jan. 09: Received interest on investment Kshs365. Jan. 12: Purchased machinery for cash Kshs4,100. Jan. 15: Cash sales for the first half of the month Kshs6,500. Jan. 17: Paid cash for stationary Kshs635. Jan. 20: Paid for office furniture Kshs710. Jan. 21: Paid to H & Co. Kshs970 and received a cash discount of Kshs30. Jan. 28: Cash received from R & Co. Kshs670 and allowed them a discount of Kshs30. Jan. 31: Cash sales for the second half of the month Kshs7,600. Jan. 31: Paid for salaries Kshs1,250. b) Discuss components of internal control system. (8 Marks) QUESTION THREE (20 MARKS) a) Accounting is universally applicable irrespective of the type of business and or organisation. Identify and explain any FIVE accounting principles that ensures standardization in accounting practise. (10 Marks) b) Discuss FIVE accounting errors and how they can be corrected in the pursuit of ensuring accuracy in accounting information. (10 Marks) QUESTION FOUR (20 MARKS) a) Creative Advertising, owned by Miss Abida Masood, provides advertising consulting services. During January 2019, the following events occurred: Jan. 2 Owner contributed Rs. 50,000 and a new computer costing Rs. 20,500 to start her business. Jan. 4 Office supplies were purchased on account for Rs. 4,000. Jan. 10 Creative Advertising obtained 12% 5-year loan of Rs. 20,000 from the bank. Jan. 12 Creative Advertising paid the utility bills for Rs. 2,750. Jan. 15 Paid the Rs. 3,000 in Accounts Payable from the purchase of office supplies on Jan. 4. Jan. 24 Advertising services completed in January were billed to clients Annies’ Flowers at Rs. 18,300. Jan. 27 Creative Advertising received Rs. 5,500 from Annies’ Flowers, a client, as payment on account. Jan. 30 Miss Abida Masood withdrew Rs. 6,000 of cash for personal use. Requirement: You are required to prepare general ledger account and make a trial balance (15 Marks) b) The elements of financial statements are the general groupings of line items contained within the statements. Identify and explain any five of such elements of financial statements. (5 Marks) QUESTION FIVE (20 MARKS) a) Define books of prime entry. (2Marks) b) Identify and state the use of any SIX books of prime entry (3Marks) c) Discuss the causes of depreciation. (3 Marks) d) Prepare general journal entries for the following transactions of a business called Pose for Pics in 2018: (12 Marks) Aug. 1: Hashim Khan, the owner, invested Kshs. 57,500 cash and Kshs. 32,500 of photography equipment in the business. 04: Paid Kshs. 3,000 cash for an insurance policy. 07: Services are performed and clients are billed for Kshs. 10,000. 13: Purchased office supplies for Kshs. 1,400. Cash paid Kshs. 400 and remaining outstanding. 20: Received Kshs. 2,000 cash in photography fees earned. 24: The client immediately pays Kshs. 15,000 for services to be performed at a later date. 29: The business acquires photography equipment. The purchase price is Kshs. 100,000.

BIT1309  FINANCIAL MANAGEMENT FOR IT . Read Post »

Uncategorized

BIT1305  BBIT103  COMPUTER NETWORKS  COMPUTER NETWORKS AND MANAGEMENT.

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY /BACHELOR OF BUSINESS INFORMATION TECHNOLOGY BIT 1305/BBIT 103: COMPUTER NETWORKS/ COMPUTER NETWORKS AND MANAGEMENT FULL TIME/PART TIME/DISTANCE LEARNING DATE: APRIL, 2019 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) State the IEEE 802 standards for the following (i) CSMA/CD 1 Mark (ii) LLC 1 Mark (iii) Token Bus 1 Mark (iv) Token Ring 1 Mark (v) WLAN 1 Mark 1 Mark b. Explain the encapsulation sequence through the seven layers of the OSI model. 5 Marks c) Discuss the following: (i) The limitations of Layer 1 devices 2 Marks (ii) How Layer 2 devices solve the problems faced by Layer 1 devices 2 Marks (iii) How Layer 3 devices solver the problems of layer 2 devices. 2 Marks d. Discuss how WANs differ from LANs in terms of ownership, costs, distance, protocols and the OSI layers of operation. 10 Marks e. Discuss how peer-to-peer networks operate and their pros and cons. 4 Marks QUESTION TWO [20 MARKS] a) Study the diagram below very carefully: The computer connected to SF has data to send to the computer connected to LA. Explain in detail how the data packet is addressed in terms of source MAC address, destination MAC address, source IP address and destination IP address at each router interface it passes through until it reaches the destination. 8 Marks b) WANs use numerous types of devices that are specific to WAN environments. Describe any five of these devices 5 Marks c) LAN technologies account for virtually all deployed LANs and specify cabling and signalling at the physical and data link layers of the OSI reference model. With reference to the Token Ring Architecture, explain the process of token passing. 7 Marks QUESTION THREE [20 MARKS] a) State two advantages and two disadvantages of client/server networks. 4 Marks b) Intermediary devices connect the individual end devices to the network and can connect multiple individual networks to form an internetwork. State any five functions performed by intermediary devices. 5 Marks c) TCP/IP protocols had several important features that allowed them to meet the need for worldwide data communication. Explain briefly any three of these features. 6 Marks d) State five major reasons why computers are networked. 5 Marks QUESTION FOUR [20 MARKS] a) Explain briefly the key features of the following core editions of Windows Server 2012: (i) Windows Server 2012 Datacenter 3 Marks (ii) Windows Server 2012 Standard 2 Marks b) State any five factors to consider in defining network topology selection 5 Marks c) List four (4) functions that are performed by a Network Interface Card (NIC). 4 Marks d) Describe how the following operations are executed in CSMA/CD: (i) Collision detection 3 Marks (ii) Jam signal and random backoff. 3 Marks QUESTION FIVE [20 MARKS] KCA University has decided that you are the contractor to design and implement their network at Ruaraka Campus. With your limited knowledge, you are expected to make some initial decisions before you commence on the detailed design of the network. a) Between the OSI reference model and the TCP/IP reference model, which model would you consider to be more useful and why? 2 Marks b) What factors would you consider before you decide what type of network operating system to use on your network? 4 Marks c) What attributes must your network have in order for it to be considered a well-designed network? 4 Marks d) How will you determine how to choose which networking devices to use in your network? 4 Marks e) What factors will you consider before choosing the type of media to use? 4 Marks f) How will you determine which LAN technology to implement in your network? 2 Marks

BIT1305  BBIT103  COMPUTER NETWORKS  COMPUTER NETWORKS AND MANAGEMENT. Read Post »

Uncategorized

BIT1303A BBIT105  PROGRAMMING METHODOLOGY.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE IN BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY/ BACHELOR OF BUSINESS INFORMATION TECHNOLOGY BIT1303A BBIT105 PROGRAMMING METHODOLOGY MODE: FULL TIME/PART TIME/DISTANCE LEARNING ORDINARY EXAMINATIONS DAY: MARCH.2019 DURATION 2 HOURS INSTRUCTION: Answer question ONE and any other THREE questions QUESTION ONE [30 MARKS] a) Define the following terms as used in programming methodology. i. Pseudocode. ii. Algorithm. iii. Programming paradigms. iv. Structured programming. 4 Marks b) State TWO advantages of structured programming. 2 Marks c) State and explain the stages of program development lifecycle(PDLC). 6 Marks d) Name and explain THREE programming errors. 6 Marks e) Write a pseudo code for a program that calculate the area and perimeter of a rectangle once given length and width values. 6 Marks f) With an aid of a C program explain how conditional operators work. 6 Marks QUESTION TWO [20 MARKS] a) State two reasons for the shift from machine language to assembly language. 4 Marks b) Explain two advantages of modular approach in programming. 2 Marks c) Distinguish between reserved words and identifiers as used in programming. 4 Marks d) Write a C program that accepts the name of a student. The program then outputs the name and the message “Welcome to C Programming” on the same line. 6 Marks e) Briefly explain any four programming tools. 4 Marks QUESTION THREE [20 MARKS] a) Write a C program that will prompt a student to enter the score obtained in a particular subject. If the score is 1 or 2 the program outputs Distinction. If the score is 3 or 4 the program outputs Credit. If the score is 5 or 6 the program outputs Pass. If the score is 7 the program outputs Referred otherwise the program outputs Fail. Use case control structure. 6 Marks b) State any FOUR rules of creating variables in C programming. 4 Marks c) Describe the use of the following string functions in C language. i. strlen () ii. strcpy () iii. strcat () iv. strcmp () v. strlwr() vi. strupr() 6 Marks d) Explain FOUR different primary data types used in C language. In in your explanation, indicate maximum memory size for each type, values stored and the range of values. 4 Marks QUESTION FOUR [20 MARKS] a) The table below shows the charges applicable to different amounts of water consumed by clients in a particular town. The volume consumed is in cubic meters(M3). In addition to the consumption, the amount of the water bill will consist of a standing charge of Ksh 200 and a sewerage fee equivalent to 20% of the consumption. Write a C program that prompts a user to enter the volume of water consumed. The program then computes and outputs the amount of the water bill. Use if…else control structure. 8 Marks b) Explain is the difference between the constants 6,’6’ and “6”. 6 Marks c) List and explain any FOUR format specifier in C language. 4 Marks d) Explain the main difference between structure and union. 2 Marks QUESTION FIVE [20 MARKS] a) Differentiate argument and parameters as used in C functions. 2 Marks b) Write a C program to receive ten integers, store them in an array then sort the elements in an ascending order then display the sorted elements onscreen. 8 Marks c) Explain FOUR features of the C language. 4 Marks d) In C language, a pointer is a pointer is a variable or type that refers to the address of a value. Explain any THREE uses of pointers. 6 Marks

BIT1303A BBIT105  PROGRAMMING METHODOLOGY. Read Post »

Uncategorized

BIT1303A  BBIT105  INTRODUCTION TO PROGRAMMING  PROGRAMMING METHODOLOGY.

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN SOFTWARE DEVELOPMENT/ BACHELOR OF SCIENCE IN APPLIED COMPUTING/ BACHELOR OF SCIENCE IN INFORMATION SECURITY AND FOENSICS/BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY/ BACHELOR OF BUSINESS INFORMATION TECHNOLOGY BIT 1303A/BBIT 105: INTRODUCTION TO PROGRAMMING / PROGRAMMING METHODOLOGY FULL TIME/PART TIME/DISTANCE LEARNING DATE: APRIL, 2019 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) Define the following terms as used in programming methodology. i. Pseudocode. ii. Algorithm. iii. Programming paradigms. iv. Structured programming. 4 Marks b) State TWO advantages of structured programming. 2 Marks c) State and explain the stages of program development lifecycle(PDLC). 6 Marks d) Name and explain THREE programming errors. 6 Marks e) Write a pseudo code for a program that calculate the area and perimeter of a rectangle once given length and width values. 6 Marks f) With an aid of a C program explain how conditional operators work. 6 Marks QUESTION TWO [20 MARKS] a) Using examples, discuss various types of operators in programming 8Marks b) Write a program that allows entering of students Marks and then determining the grade category 12Marks QUESTION THREE [20 MARKS] a) Write a program that use factorial function in a recursive form 8Marks b) Write a program that reads the noon day temperature for each day of a month and then reports the month’s average temperature, as well as its hottest and coolest days. 8Marks c) Discuss two types of variables 4Marks QUESTION FOUR [20 MARKS] a) Write a program that demonstrate the bubble sort 8Marks b) Using Nested ‘for’ statements, write a program to Calculate the averages of several different lists of number 8Marks c) Discuss two classifications of functions 4Marks QUESTION FIVE [20 MARKS] a) Write a program to find the largest element in an array 5 Marks b) Write a simple program that uses a for statement to print the numbers 1 through 20 4 Marks c) Write a C program to reverse a string using pointers 6 Marks d) Using integer and modulus operator write a c program to find out sum of digit of given number 5 Marks

BIT1303A  BBIT105  INTRODUCTION TO PROGRAMMING  PROGRAMMING METHODOLOGY. Read Post »

Uncategorized

BIT1302A  BUSS208  E-COMMERCE .

UNIVERSITY EXAMINATIONS: 2018/2019 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY, BACHELOR OF BUSINESS INFORMATION TECHNOLOGY BIT1302A BUSS208 E-COMMERCE FULL TIME /PART TIME DATE: APRIL, 2019 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE (a) Describe the following attributes of e-commerce. [4 Marks] i. Richness ii. Universal standards iii. Ubiquity iv. Personalization and customization (b) Discuss FIVE areas in the Kenyan context where E-commerce has witnessed growth. [10 Marks] (c) Explain giving a valid example eight benefits of e-commerce to the customers/ consumers[8 Marks] (d) Using diagrams describe the models of B2B e-commerce [8 Marks] QUESTION TWO (a) E-commerce can be defined from different perspectives. Define it from the perspective of the following. [6 Marks] i. Seller’s perspective ii. Buyer’s perspective (b) Describe TWO modes of e-payment giving two advantages and two disadvantages for each[8 Marks] (c) Define the term e-marketing. [2 Marks] (d) Suppose you are hired as an e-marketing director. Describe any four activities that you would engage in. [4 Marks] QUESTION THREE (a) Briefly describe the following different types of e-commerce systems. [4 Marks] i. e-bay ii. you tube iii. Skype iv. NASDAQ-. (b) Describe four application processes supported by B2B e-commerce. [8 Marks] (c) Using diagrams, illustrate the difference between secret-key cryptography and public-key cryptography. [8 Marks] QUESTION FOUR (a) E-commerce has witnessed a rapid growth in the global market. Explain how e-commerce has impacted on the following, giving an appropriate example from the Kenyan context: [6 Marks] i. Banking ii. Stock trading iii. E-learning (b) When designing the e-commerce web site it is important to make sure the site is adhesive to visitors and customers as well. Discuss three site adhesion characteristics. [6 Marks] (c) Discuss the Three-tier architecture of E – Commerce. [6 Marks] (d) Define the following terms as used in e-commerce. [2 Marks] i. Shopping cart ii. Virtual mall iii. Hyperlink iv. Web server QUESTION FIVE (a) State and explain the various taxes that can be charged on e-commerce. [6 Marks] (b) After the design and implementation of the website there are four web hosting options available to the merchant. Discuss the web hosting options that exist. [6 Marks] (c) Explain six characteristics of a successful e-payment method [6 Marks] (d) Explain two types of cyber attacks commonly used in contemporary society. [2marks]

BIT1302A  BUSS208  E-COMMERCE . Read Post »

Scroll to Top