May 1, 2022

Uncategorized

BCT1204  MULTIMEDIA TECHNOLOGY. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BCT1204 MULTIMEDIA TECHNOLOGY BIT 3204A DISTRIBUTED MULTIMEDIA SYSTEMS BBIT MULTIMEDIA SYSTEMS APPLICATIONS FULL TIME/PART TIME/DISTANCE LEARNING DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) A video file has the following specifications Resolution 1920×930 Colour depth 16bits Framerate 30fps Duration 2 hours Calculate the bandwidth required to download the file in exactly 4 minutes for 10 users concurrently (6 Marks) b) Define the term Multimedia (2 Marks) c) State the FIVE quality of service parameters in multimedia systems (5 Marks) d) Explain the Open system Interconnection model (8 Marks) e) Distinguish between intra object synchronization and inter object synchronization (4 Marks) f) Using Lempel ZIv algorithm, encode the following text FAABBCFAXEBBDDFA (5 Marks) QUESTION TWO [20 MARKS] a) Describe videoconferencing systems, giving standards, supporting technologies and protocols that facilitate the application. (13 Marks) b) Explain the SEVEN Factors Contributing towards the development of Multimedia Technology (7 Marks) QUESTION THREE [20 MARKS] a) What is meant by the Quality of Service of a multimedia application? [2 Marks] b) What major factors affect the Quality of Service of a multimedia application? [8 Marks] c) Give a definition of Virtual Reality. [2 Marks] d) What specialized input and output devices have been developed for Virtual Reality? Describe each device briefly. [8 Marks] QUESTION FOUR [20 MARKS] a) Distinguish between HDTV and SDTV (4 Marks) b) What is a codec? (2 Marks) c) What are the issues in designing a (multimedia) information system architecture? Discuss the tradeos involved. (6 Marks) d) What are the issues in networked multimedia? (5 Marks) e) Explain the concept of Huffman coding with a suitable example. Also explain how does it achieve compression? (4 Marks) QUESTION FIVE [20 MARKS] a) Distinguish between i) hypertext and hypermedia (4 Marks) ii) interactive and realtime multimedia (4 Marks) b) List the THREE steps in digitizing audio (3 Marks) c) Describe the roles of the following organisations i) ITU-T ii) ISO (6 Marks) d) i) Why are standards important in open systems? (1 Marks) iii) Name TWO such standards in multimedia systems. (2 Marks)

BCT1204  MULTIMEDIA TECHNOLOGY. KCA Past Paper Read Post »

Uncategorized

BCT 3205 INFORMATION TECHNOLOGY AND SOCIETY. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE INFORMATION COMMUNICATION TECHNOLOGY BCT 3205 INFORMATION TECHNOLOGY AND SOCIETY FULL TIME/PART TIME DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE a) Discuss the use of ICT in daily life (8 Marks) b) Analyze the impact of ICT on the society (8 Marks) c) Explain the differences between ethics and law (8 Marks) d) Discuss the human aspects considered in implementing security measures (6 Marks) QUESTION TWO a) Discuss the four types of Intellectual property protection. (8 Marks) b) Discuss the ways in which computer technology threaten the privacy of our data? (12 Marks) QUESTION THREE a) Examine the various authentication methods implemented using ICT (6 Marks) b) A controversial content is information that causes disagreement in opinions and may cause the disruption of peace because different people or culture will have different views about the contents. Explain two such issues (6 Marks) c) Discuss the methods used to control access to internet (8 Marks) QUESTION FOUR a) Discuss the three types of computer security (12 Marks) b) Explain the ways in which software applications are used in various sectors (8 Marks) QUESTION FIVE a) Discuss the need for cyber laws (8 Marks) b) People around the world rely on computers to do so many things. They are from different backgrounds and are divided in 5 categories. Discuss these categories (12 Marks)

BCT 3205 INFORMATION TECHNOLOGY AND SOCIETY. KCA Past Paper Read Post »

Uncategorized

BCT 3204  COMPUTER FORENSICS . KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION AND COMMUNICATIONS TECHNOLOGY BCT 3204 COMPUTER FORENSICS FULL TIME/PART TIME/DISTANCE LEARNING DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) i) What is the importance of Hashing in Computer Forensics? (3 Marks) ii) Name 2 hashing algorithms that can be utilized in computer forensics. Give an example of their application in Digital Forensics. (4 Marks) b) i) Describe the purpose of a write block protection device? (3 Marks) ii) Provide and describe two types of write blockers. (6 Marks) c) Compare and contrast two advantages each of volatile versus non-volatile information? (8 Marks) d) Describe the content of the e-mail headers. How is the e-mail header information useful to an investigator? (6 Marks) QUESTION TWO [20 MARKS] a) Write down 6 types of computer forensic investigations that can be conducted at a computer Forensics lab. (6 Marks) b) To preserve the integrity of digital evidence, name or describe at least 3 things a digital forensic investigator must do. ( 3 Marks) c) Discuss the concerns a forensic investigator must take into consideration when collecting, analyzing and presenting evidence collected from a live system acquisition. (8 Marks) d) Why is proper chain of custody such an important principle in any forensic investigation? (3 Marks) QUESTION THREE [20 MARKS] In hacking, attackers can use a number of techniques to compromise a system. SQL injection may be the most common Web attack. It is based on inserting SQL commands into text boxes, often the username and password text fields on the logon screen a) How does this crime affect the Forensics Process? (10 Marks) b) Describe a networking tool you would use to uncover a vulnerability that could be exploited by an SQL injection attack. (5 Marks) c) List 5 other types of computer crimes. (5 Marks) QUESTION FOUR [20 MARKS] a) Describe three general cryptanalysis techniques used to recover encrypted data. (6 Marks) b) Identify a type of cipher which each technique is most effective upon. (6 Marks) c) What is Steganography and how is this useful in the investigation of a Digital Crime? (4 Marks) d) Compare and contrast 2 points on the difference between compression versus encryption of data in Digital Forensics (4 Marks) QUESTION FIVE [20 MARKS] a) Explain what Slack space is. (4 Marks) b) What is a file on a hard disk that is used to provide space for programs that have been transferred from the processor’s memory? (2 Mark) c) Provide four types of non-volatile memory information that a computer forensics investigator might collect (4 Marks) d) Walk through the steps you would use to gather information in slack. (6 Marks) e) i) Name 2 types of Volatile memory (2 Marks) ii) Name 2 types of Non-volatile memory (2 Marks)

BCT 3204  COMPUTER FORENSICS . KCA Past Paper Read Post »

Uncategorized

BCT 3202 ADVANCED NETWORK MANAGEMENT . KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE INFORMATION AND COMMUNICATIONS TECHNOLOGY BCT 3202 ADVANCED NETWORK MANAGEMENT FULL TIME/PART TIME DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) Describe the functions of the following software troubleshooting tools: (i) Protocol Analyzers 4 Marks (ii) Network Management Station (NMS) 4 Marks b) The KCAU corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. (i) What will be the affect of this change? 2 Marks (ii) If a host on a network has the address 192.168.10.40/28, what is the address of the subnetwork to which this host belongs? 2 Marks (iii) How many hosts per subnet have been created by the addressing scheme above? 2 Marks c) Discuss the steps involved in building a network baseline 6 Marks d) Discuss the guidelines for choosing the right troubleshooting methodology. 4 Marks f) When planning the installation of LAN cabling, there are physical areas to consider. Discuss each of the following areas: (i) Work Areas 3 Marks (ii) Telecommunications Room 3 Mark QUESTION TWO [20 MARKS] a) (i) Two buildings on the Ruaraka campus of KCA University must be connected to use Ethernet with a bandwidth of at least 100 Mbps. Our main concern is about possible problems from voltage potential differences between the two buildings. Explain which media type should be used for the connection 2 Marks (ii) You are installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers and what technology should be implemented on this device? 2 Marks b) Discuss the benefits and drawbacks of using Network Address Translation (NAT). 6 Marks c) Describe the functions of the following hardware troubleshooting tools: (i) Cable analyzers 2 Marks (ii) Portable Network Analyzers 2 Marks d) Networks must support a wide range of applications and services, as well as operate over many different types of physical infrastructures. In this regard discuss the following concepts: (i) Fault Tolerance 3 Marks (ii) Scalability 3 Marks QUESTION THREE [20 MARKS] a) State four major benefits of VLANs. 4 Marks b) Explain the following : (i) Storage Area Networks (SAN). 2 Marks (ii) Virtual Private Network (VPN). 2 Marks c) Discuss briefly Network Management under the following headings: (i) Network Documentation 4 Marks (ii) Network Security 5 Marks d) What factors would you take into account when choosing between a layer 3 switch and a router? 3 Marks QUESTION FOUR [20 MARKS] a) Describe any four major benefits associated with hierarchical network designs. 8 Marks b) Explain briefly four benefits of Virtual Private Networks (VPNs). 4 Marks c) What five issues were considered during the development of IPv6? 5 Marks d) State the three major characteristics of WANs. 3 Marks QUESTION FIVE [20 MARKS] a) With the aid of a clearly labelled diagram, explain how the structured cabling is implemented between the work areas and the equipment rooms (wiring closets). 6 Marks b) Explain the following switch operations: (i) Learning 2 Marks (ii) Flooding 2 Marks (iii) Selective forwarding 2 Marks (iv) Filtering 2 Marks c) Explain the steps to be followed in connecting to a router or switch for device management using terminal emulation 6 Marks

BCT 3202 ADVANCED NETWORK MANAGEMENT . KCA Past Paper Read Post »

Uncategorized

BCT 2305   NETWORK SUPPORTED MULTIMEDIA TECHNOLOGIES. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE INFORMATION COMMUNICATION TECHNOLOGY BCT 2305 NETWORK SUPPORTED MULTIMEDIA TECHNOLOGIES FULL TIME/PART TIME DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE a) State the Nyquist sampling theorem (2 Marks) b) Distinguish between lossy and lossless methods in data compression giving TWO examples of each (6 Marks) c) Explain the meaning of network multimedia operating system (2 Marks) d) Define Quality of service as used in networked multimedia (3 Marks) e) Identify THREE classes of multimedia networking applications and give TWO examples of each (9 Marks) f) What is jittering in networks (2 Marks) g) How should the Internet evolve to better support multimedia? (6 Marks) QUESTION TWO a) Describe Real time Control Protocol (RTCP) (5 Marks) b) A network has the following specifications Resolution 2580×1940 Colour depth of 24bits Duration 2 hours Frame rate of 30fps 800 users Required: Calculate the required bandwidth to stream a video showing your working clear and state any assumptions (15 Marks) QUESTION THREE a) Describe the OSI model using a suitable diagram (9 Marks) b) Explain the THREE steps in digitizing audio (6 Marks) c) Describe Real time reservation Protocol (RSVP) (5 Marks) QUESTION FOUR a) Distinguish the streaming of multimedia over UDP and TCP (8 Marks) b) Explain the following losses i) Network loss ii) Delay loss (4 Marks) c) What is a content distribution network and give two examples (6 Marks) d) Give the ranges of IP addresses for multicasting (2 Marks) QUESTION FIVE a) State FOUR scheduling policies in network supported multimedia (8 Marks) b) List TWO policing mechanisms (2 Marks) c) Describe i) Real time Protocol(RTP) (5 Marks) ii) Session Initiation Protocol(SIP) (5 Marks)

BCT 2305   NETWORK SUPPORTED MULTIMEDIA TECHNOLOGIES. KCA Past Paper Read Post »

Uncategorized

BCT 2204   IT GOVERNANCE. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE INFORMATION COMMUNICATION TECHNOLOGY BCT 2204 IT GOVERNANCE FULL TIME/PART TIME DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE a) Define Internet Governance and describe two main players (6 Marks) b) Explain the process of deleting a domain as outlined in the expired domain deletion policy. (6 Marks) c) Explain THREE classification of cybercrimes (6 Marks) d) State SIX general principles that are the cornerstone of policy on global e-commerce (6 Marks) e) Explain the key policy elements Internet co-operation for Assigned Names & Numbers (ICANN) Board of Directors ratified that governs the allocation of IPV6 Address. (6 Marks) f) Define the following as applicable to Registry Services Evaluation Policy. (6 Marks) (i) Registry Services (ii) Security (iii) Stability QUESTION TWO a) Explain the guiding principles of Information Technology Governance highlighting the common practices in each. (10 Marks) b) All Internet co-operation for Assigned Names & Numbers (ICANN) registrars must comply with Whois Data Reminder Policy (WDRP).Explain what WDRP notice must include and give an example of WDRP . (10 Marks) QUESTION THREE a) A sound understanding of appropriate roles and responsibilities is essential to an effective IT governance framework. Identify FIVE main players and highlight their key roles and responsibilities (10 Marks) b) Explain the Add Grace Period (AGP) Limits policy. (10 Marks) QUESTION FOUR a) Explain the internet governance policy as relate to social cultural basket. (10 Marks) b) Explain FIVE principles related to Net Neutrality. ( 10 Marks) QUESTION FIVE a) Explain emerging issues in internet governance such as policies related to social networks and cloud computing. (12 Marks) b) Explain FOUR main actors in internet governance highlighting their roles and processes. (8 Marks)

BCT 2204   IT GOVERNANCE. KCA Past Paper Read Post »

Uncategorized

BCT 1306  SYSTEMS AND SYSTEMS THEORY. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION COMMUNICATION TECHNOLOGY BCT 1306 SYSTEMS AND SYSTEMS THEORY FULL TIME/PART TIME DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE (30 MARKS) a) Using system theory explain why a drug abuse is a complex problem in society (7 Marks) b) Explain the term systems approach and give suitable examples (3 Marks) c) Define a Boundary as used in system theory given an example of search in business firm (3 Marks) d) Identify a FIVE pioneer system theorist (5 Marks) e) Do you believe a human being is a system? Why (4 Marks) f) Distinguish between feed forward and feedback giving suitable examples (4 Marks) g) Explain why control mechanism is important in a system (4 Marks) QUESTION TWO (20 MARKS) a) Explain how a fire alarm system works by using your knowledge of systems theory. (6 Marks) b) Universities must establish industry linkages to remain relevant Give reasons for this argument. (6 Marks) c) Why should there be coupling between judicial systems and law enforcement systems for a growing economy such as Kenya? (8 Marks) QUESTION THREE (20 MARKS) a) Explain the following terms (10 Marks) i) Entropy ii) Decoupling iii) Homeostasis iv) Synergy v) Differentiation b) Discuss why a system whose survival is threatened must change (5 Marks) c) Why is systems modeling critical in business or engineering (5 Marks) QUESTION FOUR (20 MARKS) a) Designing of a user interface in computer systems is essential. (8 Marks) b) Identify the essential components in a feed and controls system and explain their functions (12 Marks) QUESTION FIVE (20 MARKS) a) Distinguish between decision making and problem solving (4 Marks) b) Describe the Just in Time(JIT) system from the system theory perspective (4 Marks) c) Radicalization of the youth is a simmering problem in society. With your known of systems theory how will you address the phenomenon? (12 Marks)

BCT 1306  SYSTEMS AND SYSTEMS THEORY. KCA Past Paper Read Post »

Uncategorized

BCT 1204  MULTIMEDIA TECHNOLOGY. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BCT 1204: MULTIMEDIA TECHNOLOGY BIT 3204A: DISTRIBUTED MULTIMEDIA SYSTEMS BBIT: MULTIMEDIA SYSTEMS APPLICATIONS FULL TIME/PART TIME/DISTANCE LEARNING DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) A video file has the following specifications Resolution 1920×930 Colour depth 16bits Framerate 30fps Duration 2 hours Calculate the bandwidth required to download the file in exactly 4 minutes for 10 users concurrently (6 Marks) b) Define the term Multimedia (2 Marks) c) State the FIVE quality of service parameters in multimedia systems (5 Marks) d) Explain the Open system Interconnection model (8 Marks) e) Distinguish between intra object synchronization and inter object synchronization (4 Marks) f) Using Lempel ZIv algorithm, encode the following text FAABBCFAXEBBDDFA (5 Marks) QUESTION TWO [20 MARKS] a) Describe videoconferencing systems, giving standards, supporting technologies and protocols that facilitate the application. (13 Marks) b) Explain the SEVEN Factors Contributing towards the development of Multimedia Technology (7 Marks) QUESTION THREE [20 MARKS] a) What is meant by the Quality of Service of a multimedia application? [2 Marks] b) What major factors affect the Quality of Service of a multimedia application? [8 Marks] c) Give a definition of Virtual Reality. [2 Marks] d) What specialized input and output devices have been developed for Virtual Reality? Describe each device briefly. [8 Marks] QUESTION FOUR [20 MARKS] a) Distinguish between HDTV and SDTV (4 Marks) b) What is a codec? (2 Marks) c) What are the issues in designing a (multimedia) information system architecture? Discuss the tradeos involved. (6 Marks) d) What are the issues in networked multimedia? (5 Marks) e) Explain the concept of Huffman coding with a suitable example. Also explain how does it achieve compression? (4 Marks) QUESTION FIVE [20 MARKS] a) Distinguish between i) hypertext and hypermedia (4 Marks) ii) interactive and realtime multimedia (4 Marks) b) List the THREE steps in digitizing audio (3 Marks) c) Describe the roles of the following organisations i) ITU-T ii) ISO (6 Marks) d) i) Why are standards important in open systems? (1 Marks) iii) Name TWO such standards in multimedia systems. (2 Marks)

BCT 1204  MULTIMEDIA TECHNOLOGY. KCA Past Paper Read Post »

Uncategorized

BCT 1201 DATA COMMUNICATIONS PRINCIPLES. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION COMMUNICATION TECHNOLOGY BCT 1201 DATA COMMUNICATIONS PRINCIPLES FULL TIME/PART TIME SPECIAL/SUPPLEMENTARY EXAMINATION DATE: JULY, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) Differentiate between the following terms. (4 Marks) i. Data communication ii. Telecommunication b) Explain the following modes of transmission . (4 Marks) i. Half-duplex ii. Full-duplex transmission c) With help of a diagram explain the basic communication model. (5 Marks) d) What are the benefits of having computer networks (5 Marks) e) Explain four performance parameters of computer network transmission media. (4 Marks) f) With the help of appropriate diagrams describe the characteristics of the sound wave/analog signal. (6 Marks) QUESTION TWO [20 MARKS] a) Describe the following types of networks. (6 Marks) i. Metropolitan Network (MAN) ii. Wide Area Network (WAN) iii. Virtual Private Network (VPN) b) Define the ISO OSI reference Model (2 Marks) c) Discuss three benefits of OSI reference model (3 Marks) d) In the OSI reference model, explain the concept of data encapsulating and de-encapsulation. (4 Marks) e) Explain what happens to a piece of data at the presentation layer of the OSI reference model (3 Marks) f) At the data link layer a trailer is added. What does it contain and what is its use. (2 Marks) QUESTION THREE [20 MARKS] a) Differentiate between terms (4 Marks) i. Encoding and Modulation. ii. Digital signaling and Analog signaling b) With the help of diagrams, illustrate the following encoding schemes. (4 Marks) a. Non-Return to Zero-Level (NRZ-L) b. Non-Return to Zero Inverted (NRZI) c) Explain the following types of errors, stating what causes them and how to prevent them. (4 Marks) i. Crosstalk ii. Attenuation d) Describe how the following error detection techniques work. (4 Marks) i. Checksum ii. CRC e) Automatic Repeat reQuest (ARQ) is a mechanism for error correction by retransmission for errors that occur during data transmission. By use of appropriate diagrams describe the following types ARQ: (4 Marks) i. Stop-and-wait ARQ ii. Continuous ARQ QUESTION FOUR [20 MARKS] a) Explain any four features of TCP/IP that make it popular (4 Marks) b) Discuss any four advantages of digital transmission over analog transmission. (4 Marks) c) Using diagrams illustrate the following digital data analog signal modulation techniques. (6 Marks) i. Amplitude Shift Keying (ASK) ii. Frequency Shift Keying (FSK) iii. Phase Shift Keying (PSK) d) Differentiate between logical and physical network topologies. (2 Marks) e) By the help a diagrams, describe the following types of multiplexing techniques (4 Marks) i. Frequency Division Multiplexing(FDM) ii. Time Division Multiplexing (TDM) QUESTION FOUR [20 MARKS] a) With the help of a diagram, describe the following circuit configuration. (4 Marks) i. Point-to-point ii. Multipoint b) By use a diagrams, differentiate between the single-mode and multi-mode fiber optic cable in their features and functionality. (6 Marks) c) Giving examples, briefly explain the components of a computer network. (7 Marks) d) Explain the following network devices stating the OSI layer in which they operate. i. Network Interface Card (NIC) (1 Mark) ii. Router (1 Mark) iii. Bridge (1 Mark)

BCT 1201 DATA COMMUNICATIONS PRINCIPLES. KCA Past Paper Read Post »

Uncategorized

BBIT102  BAC1101  BIT1109 COMPUTER ORGANISATION  ARCHITECTURE, COMPUTER ORGANISATION  APPLICATIONS. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BBIT102 BAC1101 BIT1109 COMPUTER ORGANISATION & ARCHITECTURE, COMPUTER ORGANISATION & APPLICATIONS PART TIME/DISTANCE LEARNING DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) Explain Moore’s law (2 Marks) b) i) What is an interrupt? (2 Marks) ii) What are the uses of interrupts? (4 Marks) c) Differentiate between RISC and CISC (6 Marks) d) What, in general terms, is the distinction between computer organization and computer Architecture? (4 Marks) e) What are the four main functions of a computer? (4 Marks) f) List and briefly define the main structural components of a processor. (8 Marks) QUESTION TWO a) What risks do organization face under virus attack (4 Marks) b) How would you mitigate the risks in 4(c) (4 Marks) c) Describe FOUR access methods on storage devices (8 Marks) d) State TWO latencies associated with magnetic disks (4 Marks) QUESTION THREE a) Define pipelining. (2 Marks) b) What do the following acronyms mean in disk controllers (6 Marks) i) SCSI ii) IDE iii) SATA QUESTION FOUR a) Perform the following operations(showing your workings) i) Hexadecimal :B47F+A29C (4 Marks) ii) Octal: 456+333 (2 Marks) b) Define i) control bus (2 Marks) ii) word length (2 Marks) iii) Hertz (2 Marks) c) What are the steps required for a superscalar processor to process the instruction? (8 Marks) QUESTION FIVE a) Distinguish between a compiler and an interpreter giving an example of each (4 Marks) b) Describe SIX functions of the operating system (6 Marks) c) List FOUR topologies in networks (4 Marks) d) Explain cache memory. (2 Marks) e) What are virtual and logical addresses? (4 Marks)

BBIT102  BAC1101  BIT1109 COMPUTER ORGANISATION  ARCHITECTURE, COMPUTER ORGANISATION  APPLICATIONS. KCA Past Paper Read Post »

Uncategorized

BBIT 309 BUSINESS PROCESS RE-ENGINEERING. KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017 EXAMINATION FOR THE DEGREE OF BACHELOR OF BUSINESS IN INFORMATION TECHNOLOGY BBIT 309 BUSINESS PROCESS RE-ENGINEERING FULL TIME/PART TIME/DISTANCE LEARNING DATE: AUGUST, 2017 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) Define business process redesign [2Marks] b) Distinguish between the following; i. Employing IT to automate work and using them to re-engineer business processes. [3Marks] ii. Revenue focussed BPR and Competitive advantage BPR [3Marks] iii. Process improvement and BPR [3Marks] c) Discuss the five goals of reengineering. [5Marks] d) Briefly explain six factors that contribute to the failure of the BPR effort. [6Marks] e) Traditionally, U.S organizations have looked to past performance and to historically close competitors to gauge how they are doing and to set performance objectives. However, in a global economy with continuously improving competitors, these insular and backwardlooking practices are increasingly inadequate. Benchmarking turns the focus outward toward the “best in class”. Discuss the benefits of benchmarking. [8Marks] QUESTION TWO [20 MARKS] a) Describe “partnering” as it relates to BPR. Why is it described as a “middle ground” between outsourcing and “pure” BPR? [6Marks] b) Discuss each of the various cooperative strategies and their relationships. [9Marks] c) Explain the architectural characteristics of a business process. [5Marks] QUESTION THREE [20 MARKS] a) Discuss the performance indicators of a business process. [6Marks] b) A consolidated methodology was developed to provide a structured approach to facilitate understanding of BPR. List and describe the five processes in the methodology [8Marks] c) Discuss the enabling role IT in the reengineering process. [6Marks] QUESTION FOUR [20 MARKS] a) Describe the three basic types of benchmarking. [6Marks] b) According to many in the BPR field, reengineering should focus on processes and not be limited to thinking about the organizations, after all organizations are only as effective as their processes, discuss. [6Marks] c) Describe the common total quality management mistakes that make it impossible for organizations to achieve process quality improvement. [8Marks] QUESTION FIVE [20 MARKS] a) In today’s changing environments, organizational design must take into account the fact that business processes are incomplete by nature and that they should be managed in such a way that they do not restrain human intervention. Discuss [6Marks] b) In order to restructure and improve processes in all functional areas in a corporation, three alternative approaches are always suggested. List and describe the approaches [6Marks] c) The biggest benefit of synergy effects in a global business can only be obtained when all different (sub) systems within the business are viewed as a system. Use systems dynamics and BPR to explain this concept. [8Marks]

BBIT 309 BUSINESS PROCESS RE-ENGINEERING. KCA Past Paper Read Post »

Uncategorized

BBIT 307 INFORMATION SYSTEMS MANAGEMENT  AUDITING  KCA Past Paper

UNIVERSITY EXAMINATIONS EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BBIT 307 INFORMATION SYSTEMS MANAGEMENT & AUDITING FULLTIME/PART TIME/ DISTANCE LEARNING AUGUST 2017 TIME: 2 Hours Instructions o Answer question ONE and any other TWO. o Question One carry 30 marks, others 20 marks each. QUESTION ONE a) Distinguish between financial audit and IS audit. [2 Marks] b) Describe why a banking organization should employ a skilled IS auditor. [2 Marks] c) Discuss the following types of IT audit. i. Integrated Audit ii. Compliance Audit [2 Marks] d) Describe the following types of illegal activities which an IS auditor may be interested in unearthing. i. Phishing ii. Packet sniffers [2 Marks] e) Explain the following in relation to audit risks. i. Detection risk ii. Operational risk [2 Marks] f) Distinguish between circumstantial and direct types of evidence. i Direct evidence ii Indirect evidence [2 Marks] g) Discuss the concept of IT governance and explain any two of its functions. [3 Marks] h) Explain two main data collection methods popular with the auditors. Show their strengths when used in the audit discipline. [4 Marks] i) As an IT auditor discuss the main interests you would have in the following phases of systems development. i. Analysis ii. Development phase [2 Marks] j) Explain the following types of controls indicating the technical, administrative and physical mechanisms which would be used to realize them in server platforms. i. Preventative ii. Detective iii. Corrective [9 Marks] QUESTION TWO a) Discuss the following in relation to audit sampling. Attribute sampling Discovery sampling Variable sampling [3 Marks] b) Distinguish the terms Computer forensics and information forensics. [2 Marks] c) With the aid of a suitable diagram discuss the general IT audit evidence life cycle which may be adopted when auditing systems. [8 marks] d) Explain the importance of ISACA in IT auditing [1 Mark] e) Briefly describe the structure of the COBIT framework. [6 Marks] QUESTION THREE a) Explain the term Computer Assisted Auditing Techniques (CAATs). [1 Mark] b) Explain the main software tools and techniques available in most CAATs. [5 marks] c) Discuss any three main types of CAATs used in IS auditing procedures. [6 Marks] d) You have been given the task of evaluating the evidence collected by a peer auditor. Discuss the main principle characteristics you would consider when grading the objectivity of the evidence. e) [4 Marks] f) Briefly explain the functions of the following online CAATTs. i. SCARF ii. BEAST [4 Marks] QUESTION FOUR a) Distinguish between dead and live data analysis. [2 Marks] b) Discuss the following terms used in business criterion in COBIT. i. Compliance ii. Integrity iii. Efficiency [3 Marks] c) Explain the concept of CSA. [2 Marks] d) Outline what an IT auditor should focus on especially when examining information systems processes. [5 Marks] e) Explain the term work papers and state their relevance in IS auditing. [2 Marks] f) Discuss four indicators which may prompt an auditor attention towards irregular/illegal activity in an organization. [6 Marks] QUESTION FIVE (a) Describe and give an example of each of the following: Contingency planning, Incident response, Disaster Recovery and Business Continuity [4 marks] With a well labeled diagram, relate the three given above [4 marks] b). Discuss in detail the information system audit process. [10 Marks] c) An Information system auditor encounters several computer forensic scenarios in the course of his work. Discus two common scenarios in the field [2 marks]

BBIT 307 INFORMATION SYSTEMS MANAGEMENT  AUDITING  KCA Past Paper Read Post »

Scroll to Top