May 6, 2022

Uncategorized

BIT 2303 DISTRIBUTED SYSTEMS1 KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2303 DISTRIBUTED SYSTEMS DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE: 30 MARKS (COMPULSORY) a) Define the terms Message Passing and Remote Procedure Call, highlighting at least one similarity and one difference. (6 marks) b) By the use of well labeled diagram define the terms a Distributed System and a Centralized System, highlighting the differences. (6 marks) c) Describe the components that make a Distributed System. (6 marks) d) Discuss any four security requirements in a Distributed System, highlighting the threat to each threat. (6 marks) e) Discuss the ring algorithms for conducting elections when the primary server fails (6 marks) QUESTION TWO: 20 MARKS a) By use of a well labeled diagram to describe the element of an RPC mechanism (8 marks) b) By use of diagrams, discuss the similarities between local procedure calls (lpc) and remote procedure calls (rpc) (6 marks) c) Define the term replication (2 marks) d) Discuss the following types of replication (4 marks) i) Active replication ii) Passive replication QUESTION THREE: 20 MARKS a) Differentiate between the NOS and DOS (4 marks) b) Discuss the similarities between Procedure Calls (PC) and Remote Procedure Calls (RPC). (4 marks) c) With the help a diagram illustrate what a message is explaining its structure 7 marks d) Describe the basic file replication protocol (5 marks ) QUESTION FOUR: 20 MARKS a) Define the term file service (2 marks) b) Discuss four properties that a DS resource sharing mechanism must have in order to provide concurrency transparency (8 marks) c) Define the following concept used in synchronization (4 marks) i) Skew ii) Clock drift iii) UTC iv) Internal synchronization d) Describe the Berkeley algorithm for achieving synchronization in clocks within Distributed Systems. (6 marks) QUESTION FIVE: 20 MARKS a) Using an appropriate example differentiate between the following terms used in IPC. (2 marks) i) Idempotent Operations ii) Non-idempotent Operation b) Explain briefly how non-idempotent operations are solved. (4 marks) c) Describe the following type of programmed threats in Distributed Systems and discuss how avert them. (6 marks) i) Trojan horses ii) Logic bombs iii) Trap iv) Viruses d) Using well labeled diagrams, differentiate between synchronous communication and asynchronous communication. (4 marks) e) Describe the following Distributed File Service requirements (4 marks) i) Concurrency ii) Heterogeneity iii) Efficiency iv) Security

BIT 2303 DISTRIBUTED SYSTEMS1 KCA Past Paper Read Post »

Uncategorized

BIT 2303 DISTRIBUTED SYSTEMS DISTANCE LEARNING KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2303 DISTRIBUTED SYSTEMS DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE a) Differentiate between the following: i) Blocking and non blocking semantics [2 marks] ii) Differentiate between RPC and RMI. [2 marks] iii) Multiprocessor and multicomputer [3 marks] iv) Tightly coupled systems and loosely coupled systems. [2 marks] b) Explain Higher-level and Lower-level protocols of the OSI models. [6 marks] c) Briefly explain threads as applied in distributed system. [3marks] d) Briefly explain the mechanisms for implementing Remote IPC. [6 Marks] e) Discuss the characteristic features of ATM technology that is expected to have an impact on future distributed systems. [6 Marks] QUESTION TWO a) Define process migration, explaining what it involves in a distributed system. [4marks] b) Briefly explain four desirable features of a good process migration mechanism. [4marks] c) Discuss the methods of achieving mutual exclusion in a distributed system. [6marks] d) Discuss the process migration mechanisms, giving the benefits and limitations of each mechanism. [6 marks] QUESTION THREE a) Briefly explain three metrics of a scalable system. [6 marks] b) Describe the issues in Concurrency and solutions to these concurrency problems. [6marks] c) Discuss the following distributed system models i) Three tier architecture [2marks] ii) Mobile code [3marks] iii) Mobile agent [3marks] QUESTION FOUR a) Briefly explain the following file models and accessing models i) Unstructured and structured files [2marks] ii) Mutable and immutable files [2marks] iii) Remote service model [2marks] iv). Data-caching model [2marks] b) Describe the benefits of file replication in a DFS. [7marks] c). Identify the file properties that influence fault tolerance. [5marks] QUESTION FIVE a) Discuss the algorithms used in clock synchronization. [6marks] b) Explain the Lamport timestamps, as used in process synchronization. [4marks] c) With the aid of a diagram discuss the relative benefits and limitations of three Commonly used models for configuring a distributed computing system. [10marks]

BIT 2303 DISTRIBUTED SYSTEMS DISTANCE LEARNING KCA Past Paper Read Post »

Uncategorized

BIT 2303 DISTRIBUTED SYSTEMS  DISTANCE LEARNING KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2303 DISTRIBUTED SYSTEMS DISTANCE LEARNING DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE – COMPULSORY (TOTAL MARKS: 30) (a) Explain the following terms: a) distributed operating system [2 Marks] b) Middleware [2 Marks] (b) List and explain two types of services provided by a distributed file system. [4 Marks] (c) Define distributed transparency [2 Marks] (d) Explain three transparencies required for any distributed system [6 Marks] (e) Differentiate between the following terms as used with distributed systems i). Loosely coupled systems and tightly coupled systems [2 Marks] ii). Synchronous systems and asynchronous systems [2 Marks] (f) Describe four distribution transparencies that should be considered when designing distributed systems. [8 Marks] (g) Define binding. [2 Marks] QUESTION TWO – (TOTAL MARKS: 20) (a) Explain three (3) advantages of distributed systems [6 Marks] (b) Differentiate between dynamic and static binding. [4 Marks] (c) Describe the three (3) main causes of change in distributed systems. [6 Marks] (d) Define fault tolerance. [2 Marks] (e) List the two (2) approaches used in fault tolerance [2 Marks] QUESTION THREE – (TOTAL MARKS: 20) (a) Explain briefly the following types of faults [6 Marks] a) Transient faults b) An intermittent fault c) A permanent fault (b) Why is synchronization important in any distributed systems [2 Marks] (c) Explain the following terms as used in distributed system [6 Marks] a) Iterative name resolution b) Recursive name resolution c) A name (d) Why is RPC popular for developing distributed systems? What role does it play in distributed systems? [6 Marks] QUESTION FOUR – (TOTAL MARKS: 20) (a) Differentiate between Network Operating Systems and Distributed Operating System. [4 Marks] (b) Describe properties of distributed transactions [8 Marks] (c) What is middleware? Using diagrams indicate where it falls in OSI communication model [4 Marks] (d) What is fault tolerance, how is it enhanced in distributed system [4 Marks] QUESTION FIVE – (TOTAL MARKS: 20) (a) Define the term Distributed systems [2 Marks] (b) Discuss the four main strategies for handling deadlocks [8 Marks] (c) Describe any four features of a good Distributed File System [8 Marks]

BIT 2303 DISTRIBUTED SYSTEMS  DISTANCE LEARNING KCA Past Paper Read Post »

Uncategorized

BIT 2209 RESEARCH SKILLS KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2209 RESEARCH SKILLS DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE (30 MARKS) a) Explain the following Research Concepts; i) Research Project ii) Research Project Management iii) Research Process iv) Research Skills (10 Marks) b) Outline a typical Structure of a Research Proposal. (10 Marks) c) Explain the interplay between the following Research components  Time  Research Quality  Research Budget (10 Marks) QUESTION TWO (20 MARKS) a) Discuss Research Ethics (10 Marks) b) What are some of some of the unethical practices that you may encounter while doing Research? How can you avoid falling prey to these practices? (10 Marks) QUESTION THREE (20 MARKS) The object of research is to extend human knowledge beyond what is already known. Discuss this statement. QUESTION FOUR (20 MARKS) a) Why is a review of literature important in undertaking scientific research? (15 Marks) b) What is meant by the phrase “SMART Objectives” (5 Marks) QUESTION FIVE (20 MARKS) Using specific examples in computing and Information Technology research, discuss the following research approaches; a) Design and Creation b) Ethnographic Research c) Case Study research d) Action Research (20 Marks)

BIT 2209 RESEARCH SKILLS KCA Past Paper Read Post »

Uncategorized

BIT 2209 RESEARCH SKILLS AND DESIGN KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2209 RESEARCH SKILLS AND DESIGN DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE a) You have been contacted by your university to conduct interviews with students about their attitudes towards Biometric system at entrance gate. i) State and explain any two advantages and limitation of interview method of data collection. [4 Marks] ii) Write any two hypothesis of the study [2 Marks] iii) Write two research questions of this study [2 Marks] b) In view of the above study define the population and explain sampling method you would use. Give reasons for each case. 4 Marks] c) By use of relevant examples distinguish between the following pair of research concepts. [8 Marks] i) Experiment and descriptive research ii) Qualitative and Quantitative research d) Define what is ‘Literature Review’ and discuss four benefits or purposes of conducting it in academic research. [10 Marks] QUESTION TWO a) Define what is a research proposal. [2 marks] b). You are required to conduct a research with any of the following titles: 1. “Internet access in KCA University ” 2. “Use of mobile phones to E-learning platform in KCA University ” 3. “Access to computer laboratories for internet access in KCA University” Choose one of the above title and a research proposal discusses the following subtopics: i) Problem statement of the study [2 Marks] ii) Main objective of the study [2 Marks] iii) Three specific objectives of the study [3 Marks] iv) Significance of the study [3 Marks] iv) An appropriate sampling method [3 Marks] v) An appropriate method of collecting the data in this study [3 Marks] vi) Target population of this study [2 Marks] QUESTION THREE a) By use of relevant examples distinguish between the following pair of research terms [8 marks] i) Sampling and taking a census ii) Sample and population b) Briefly explain characteristics of a good sample [4 marks] c) Write short notes on the following sampling techniques. Use examples for illustrating your answer in each case. i) Systematic Sampling [4 Marks] ii) Stratified Sampling [4 Marks] QUESTION FOUR a) Briefly explain the meaning of the term ‘ Data collection’ [2 marks] b) Explain four reasons for collecting data [4 marks] c) State and explain any five sources of research ideas to a prospective researcher, [5 Marks] d) Write the difference between ‘primary data’ and ‘secondary data’. Give one example for each case. [3 marks] e) Discuss two main types of primary data at the disposal of a researcher in the process of an investigation and methods that can be used to collect each type of data. Use examples to illustrate your answers. [6 Marks] QUESTION FIVE a) Write short notes about the concepts as used in final report. i) System requirements specifications [5 marks] ii) Research methodology [5 marks] b) Discuss ten elements of a good final report [10 Marks]

BIT 2209 RESEARCH SKILLS AND DESIGN KCA Past Paper Read Post »

Uncategorized

BIT 2204 JAVA PROGRAMMING KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2204 JAVA PROGRAMMING DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE a) Briefly explain the following versions of Java platform. [3 Marks] i) Java 2 Micro Edition (J2ME). ii) Java 2 Standard Edition (J2SE) iii) Java 2 Enterprise Edition (J2EE b) Write java code statements to accomplish the following. [5 marks] i) declares two variables: ‘Max and Min ii) Initializes the two variables with values 5 and 3 respectively iii) Determines which value is larger among the two iv) Prints results: v) Declare and initialize array c) Write a java program that compute the area of a rectangle and displays results. [4 marks] d) Explain the meaning of the following keywords. [2 marks] i) java compiler ii) Java interpreter [2 marks] e) Write a java code statements that uses While loop to print the following ten numbers [4 marks] 1234567910 f) Describe with examples the syntax of the following program flow controls and advice when to use them. [4 marks] i) do while ii) For Loop Write a well commented java program that requests the user to enter O-level results(e.g Mean grade) and implement the following pseudo code to determine which course programme the user can enroll for. [6 marks] if grade is greater than or equal to C+ Print “ Qualified for to enroll for Bachelor degree” else if grade is greater than or equal to “C” else if student’s grade is greater than or equal to C- Print “ Qualified for to enroll for Certificate ” else Print “Failed KCSE Exam. please Consider repeating QUESTION TWO a) Describe the meaning of the following terms. Draw a diagram that illustrates your answer. [4 marks] i) Array ii) Array index b) Briefly explain three characteristics of an array [3 Marks] c). Write a program the reads and prints the contents of the following array [5 marks] d) Write a Java program that Computes perimeter of a rectangle and prints results. [4 marks] e) Briefly explain the following java code [4 marks] public class PROG { public static void main(String[] args) { Int x,y,results,diff; x = 9; y = 4; sum = x + y; diff = x – y; System.out.println(“sum is ” + results); System.out.println(“diff is ” + diff); } } QUESTION THREE a) Briefly explain the meaning of the following terms as used in java programming. Give java code example for each case. [6 marks] i) Class ii) Variable iii) Syntax error: d) Computer programs are very closely tied to the specific hardware and operating system they run. A Windows program will not run on a computer that only runs DOS. A Mac application can’t run on a UNIX workstation. VMS code can’t be executed on an IBM mainframe, and so on. How does java resolve this platform problem? [2 Marks] e) Define what you understand by JVM and explain its importance in Java Programming Is. [4 Marks] e) Describe with explanation the structure of a Java program. [4 Marks f) Write a well commented java program that prints the following output. [4 marks] Age is 20 Name is peter Course is Bscit QUESTION FOUR a) Define the meaning of the term ‘comment’. Explain three sections of a program where comments can be used. [4 marks] b) What is the purpose of the following keywords as used Java Programming? Give examples to support your answer. [6 marks] i) extends ii) final iii) encapsulation d) Write a class named employee that instantiates a kcau_emp object from the class you created. Prompt the a user to enter personal details such as idno, name, occupation and then display all the values entered by the user. [6 marks] d) Descrie the meaning of the term ‘constructor’. Write a sample java code that implements a constructor. [4 marks] QUESTION FIVE a) Describe with examples the syntax of the following java programming terms i) Package [2 marks] ii) object [2 marks] iii) Polymorphism [2 marks] b) Consider the following java code instructions and explain the purpose of the single line statements appearing in bold. [4 marks] private static void createAndShowGUI() { JFrame frame = new JFrame(“Hi..”); frame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE); JLabel label = new JLabel(“Hello World”); frame.getContentPane().add(label); frame.pack(); frame.setVisible(true); } c) Briefly explain importance of using ‘LayoutManager’ when developing programs using n swing with graphical interface. Write a sample java code utilizing LayoutManager [4 marks] d) Define the term ‘multiple inheritance’. Describe how multiple Inheritance can be achieved in java programming language. Give the syntax used to implement concept. [4 marks] e) Describe the term interface as used in java programming language. [2 marks]

BIT 2204 JAVA PROGRAMMING KCA Past Paper Read Post »

Uncategorized

BIT 2203 STRATEGIC MANAGEMENT INFORMATION SYSTEMS KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2203 STRATEGIC MANAGEMENT INFORMATION SYSTEMS DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE (a) Information provides historical evidences, reduces uncertainty in decision making and provides mechanism for communication. The quality of information used by organizations in decision making cannot be over-emphasized. State any five qualities of good information. [5 Marks] (b) Management Information Systems (MIS) are constructed to serve various levels and aspects of management activities. (i) Using an illustration, identify three levels of organizational planning [3 Marks] (ii) Explain how each of the levels impact on the information availed for planning. [6 Marks] (c) The acquisition of new software is a strategic decision. Highlight the benefits of buying an integrated package (or a suite of packages) rather than making package by package decisions. [6 Marks] (d) Explain examples of potential risks associated with the loss of the following information system elements (i) Hardware (ii) Data and Information iii) Software (iii) Staff [10 Marks] QUESTION TWO The decision to use information technology as a tool for competitive advantage can either build or destroy an organization. (a) Explain the concept Business Process Re-engineering (BPR). [5 Marks] (b) Discuss the opportunities enabled by BPR to an organization [10 Marks] (c) Statistics have shown that 70% of BPR projects fail. Explain the reasons that lead to the high failure rate. [5 Marks] QUESTION THREE a) A manager under competitive pressure is considering a new application of IS that will displace 5 employees. The employees will not be able to find similar jobs elsewhere with their current skills. (i) Advise the organization on whether to proceed or withdraw the plan [6 Marks] (ii) Where the organization opts to proceed with the project, give two ethical measures the organization can undertake to mitigate on the negative impact on the employees lives. [4 Marks] (b) An IT project manager is expected to define time, cost and staff elements for a given project before it commences. Outline the significance of these elements. [10 Marks] QUESTION FOUR a) Define the term ‘An Information Systems strategy’ [4 Marks] b) A major problem in evaluating Information Technology is that many of its benefits are intangible, therefore not easy to accurately estimate their value. Discuss the tangible and intangible benefits of information systems. [8 Marks] c) Discuss the unique features that qualify organizations as systems. [8 Marks] QUESTION FIVE (a) State two (2) reasons why Information system maintenance is carried out. [4 Marks] (b) Briefly explain the role played by the following stakeholders of a system i) System Owners ii) Vendors [6 Marks] (c) Describe the two types of information systems listed below: i) Expert System [3 Marks] ii) Office Automation System [2 Marks] (d) List any two types of feasibility study and briefly explain them. [5 Marks]

BIT 2203 STRATEGIC MANAGEMENT INFORMATION SYSTEMS KCA Past Paper Read Post »

Uncategorized

BIT 2201 SIMULATION AND MODELING KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2201 SIMULATION AND MODELING DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE: 30 MARKS (COMPULSORY) a) It is not always possible to experiment and study with real systems hence the need for modeling. Discuss three reasons why that is so. (3 marks) b) Discuss five applications of simulation and modeling in real life (5 marks) c) Using the mid- square method obtain the random variables using Z0= 1009 until the cycle degenerates to zero. (7 marks) d) Discuss any five desirable features of a good simulation software (5 marks) e) Using the banking systems as an example describe the components of a discreteevent system. (10 marks) QUESTION TWO: 20 MARKS a) Every system exists with an environment. Activities in the system’s environment cause changes in the state of the system. These activities are classified into two categories: Endogenous and Exogenous. Differentiate between the two. (2 marks) b) Discuss four reasons why it is necessary to use animation during the process of modeling and simulation. (4 marks) c) State and briefly explain four properties of a good arithmetic random number generator. (4 marks) d) Describe five common statistics included in the output report of a simulation programming system. (10 marks) QUESTION THREE: 20 MARKS a) There are two fundamental types of animation; concurrent and post-processed Differentiate between the two types of animation. (2 marks) b) Describe the following terms giving examples from the communication systems. (5 marks) i) State of a System ii) State Variables iii) Entity iv) Attribute v) Activity c) Discuss four drawbacks simulation and modeling. (4 marks) d) Using the Linear Congruential Generator (LCG) with a=5, m=16, c=3 and seed Z0 = 7 to generate the first FIVE random variates on [0,1]. (5 marks) e) Discuss the two short comings of the mid-square method as a random number generator. (4 marks) QUESTION FOUR: 20 MARKS a) Define the terms verification and validation in the context of modeling. (4 marks) b) Not all simulation and modeling exercises are a success. Discuss five common pitfalls to successful simulation. (5 marks) c) Consider a single server queuing system in the bank. The system starts at time t=0. The arrival time of customers is: 0.4, 1.6, 2.1, 3.8, 4.0, 5.6, 5.8, and 7.2. The departure times are: 2.4, 3.1, 3.3, 4.9, and 8.6. Time is in minutes. The first in first out queuing discipline is followed. Simulate this system for six clients and estimate: i) The expected average delay in the queue (3 marks) ii) The expected average number of clients in the in the at any time t (6 marks) iii) The expected utilization of server. (2 marks) QUESTION FIVE: 20 MARKS a) Differentiate between the following types of models (6 marks) i) Deterministic Vs Stochastic Models ii) Discrete Models Vs Continuous Models b) Discuss any five advantages of simulation (5 marks) c) The table below shows the probability distribution of a container arrivals per day at Mombasa port. The offloading rate per day follows the probability distribution given below. NB: Offloading is done on FCFS basis. Offloading rate Probability Suppose the following are the random numbers of arrivals and random numbers of unloading. Arrival Random No. 52, 06, 50, 88, 53, 30, 10, 47, 99, 37, 66, 91, 35, 32, 00 Offload Random No. 37, 63, 28, 02, 74, 35, 24, 03, 29, 60, 74, 85 90, 73, 59 Required: simulate a fifteen day analysis and determine: i) The average number of container delayed (3 marks) ii) The average number of arrivals per day (3 marks) iii) The average number of containers offloaded each day (3 marks)

BIT 2201 SIMULATION AND MODELING KCA Past Paper Read Post »

Uncategorized

BIT 2109 PROFESSIONAL ISSUES IN IT KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2109 PROFESSIONAL ISSUES IN IT DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE (Compulsory) a) The IT industry is increasingly aware of its own environmental impact. Describe at least three environmental problems to which the industry contributes and how, as an IT professional, you can help to solve this problem. (6 marks) b) Using relevant examples describe at least four ethical principles (4 marks) c) Offer the best argument either for the institution of proprietary software, or for the institution of free software (6 marks) d) Describe the essential elements relating to conduct that identify a professional activity (4 marks) e) Using relevant examples describe at least four ethical principles (4 marks) f) Intellectual property refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Identify the key forms of intellectual property (4 marks) g) Differentiate between ethics and morality (4 marks) QUESTION TWO a) Is it an ethical obligation of hosts of social networking sites to prevent posting of malicious and false stories about people on members’ sites? (6 marks) b) Explain what globalization is and how it has been supported by developments in information technology. (6 marks) c) Suppose you are a middle-school or high-school teacher presenting information technology in a social-studies course. You are to explain the impact of IT in society is. Draw from both your own prior knowledge and what you have learnt in this course, to put together a narrative of the concepts you would present in that learning unit . (8 marks) QUESTION THREE a) Discuss the morality of creating machines capable of making human labour obsolete. (8 marks) b) Explain what globalization is and how it has been supported by developments in information technology. (6 marks) c) Discuss whether the Internet brings people together, or they are isolated as they all sit in front of their computers? (6 marks) QUESTION FOUR a) China and North Korea place severe restrictions on Internet access within their countries, much of it ideologically based; should the Kenyan government place any restrictions on Internet information available to its citizens especially in the advent of the use of social media to spread hate speech. (8 marks) b) Discuss how to prevent the following health issues while using ICT (12 marks) i) Eye strain ii) Repetitive Strain Injury iii) Back problems iv) Stress QUESTION FIVE a) Recently in the US and Europe, technologies for human enhancement have attracted public and scientific debate. While enhancement of human abilities has always been a goal for technology development, new technologies now directly intervene in human sensory and cognitive apparatus. Scientific input from neuroscience, nanotechnology (e.g. the development of devices and materials) as well computer science are fuelling the development of these emerging technologies. A major application of these technologies is neural implants and other brain-machine interface devices. Some of them are dedicated to medical purposes, e.g., to reconstruct visual and auditory sensory abilities (retina and cochlea implants). Other implants have direct consequences for language production and self control (deep brain stimulation for patients suffering from Parkinson’s disease). Enhancement technologies can also be non-invasive like pharmaceuticals aiming at improving cognitive abilities but also regulating emotions. In some countries, the use of these substances has already produced concern about societal consequences. Part of this debate is also the increasing potential of neuroscience in analysing brain activity patterns by which thoughts and brain states can be identified. In the future, this can, for example, enhance possibilities to detect liars. These research results have triggered debate about the increasing control potential of these technologies, but also about the nature of the intervention in the “human condition” that is supposed to be altered. Based on the case study above answer the following questions i) Discuss the main arguments and legitimisation efforts of for or against human enhancement (10 marks) ii) Discuss the societal consequences of use of enhancement technologies (5 marks) b) Discuss ways in which IT influences cultural life (5 marks)

BIT 2109 PROFESSIONAL ISSUES IN IT KCA Past Paper Read Post »

Uncategorized

BIT 2109  PROFESSIONAL ISSUES OF INFORMATION TECHNOLOGY DISTANCE LEARNING KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2109 PROFESSIONAL ISSUES IN IT DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE (Compulsory) a) The IT industry is increasingly aware of its own environmental impact. Describe at least three environmental problems to which the industry contributes and how, as an IT professional, you can help to solve this problem. (6 marks) b) Using relevant examples describe at least four ethical principles (4 marks) c) Offer the best argument either for the institution of proprietary software, or for the institution of free software (6 marks) d) Describe the essential elements relating to conduct that identify a professional activity (4 marks) e) Using relevant examples describe at least four ethical principles (4 marks) f) Intellectual property refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Identify the key forms of intellectual property (4 marks) g) Differentiate between ethics and morality (4 marks) QUESTION TWO a) Is it an ethical obligation of hosts of social networking sites to prevent posting of malicious and false stories about people on members’ sites? (6 marks) b) Explain what globalization is and how it has been supported by developments in information technology. (6 marks) c) Suppose you are a middle-school or high-school teacher presenting information technology in a social-studies course. You are to explain the impact of IT in society is. Draw from both your own prior knowledge and what you have learnt in this course, to put together a narrative of the concepts you would present in that learning unit . (8 marks) QUESTION THREE a) Discuss the morality of creating machines capable of making human labour obsolete. (8 marks) b) Explain what globalization is and how it has been supported by developments in information technology. (6 marks) c) Discuss whether the Internet brings people together, or they are isolated as they all sit in front of their computers? (6 marks) QUESTION FOUR a) China and North Korea place severe restrictions on Internet access within their countries, much of it ideologically based; should the Kenyan government place any restrictions on Internet information available to its citizens especially in the advent of the use of social media to spread hate speech. (8 marks) b) Discuss how to prevent the following health issues while using ICT (12 marks) i) Eye strain ii) Repetitive Strain Injury iii) Back problems iv) Stress QUESTION FIVE a) Recently in the US and Europe, technologies for human enhancement have attracted public and scientific debate. While enhancement of human abilities has always been a goal for technology development, new technologies now directly intervene in human sensory and cognitive apparatus. Scientific input from neuroscience, nanotechnology (e.g. the development of devices and materials) as well computer science are fuelling the development of these emerging technologies. A major application of these technologies is neural implants and other brain-machine interface devices. Some of them are dedicated to medical purposes, e.g., to reconstruct visual and auditory sensory abilities (retina and cochlea implants). Other implants have direct consequences for language production and self control (deep brain stimulation for patients suffering from Parkinson’s disease). Enhancement technologies can also be non-invasive like pharmaceuticals aiming at improving cognitive abilities but also regulating emotions. In some countries, the use of these substances has already produced concern about societal consequences. Part of this debate is also the increasing potential of neuroscience in analysing brain activity patterns by which thoughts and brain states can be identified. In the future, this can, for example, enhance possibilities to detect liars. These research results have triggered debate about the increasing control potential of these technologies, but also about the nature of the intervention in the “human condition” that is supposed to be altered. Based on the case study above answer the following questions i) Discuss the main arguments and legitimisation efforts of for or against human enhancement (10 marks) ii) Discuss the societal consequences of use of enhancement technologies (5 marks) b) Discuss ways in which IT influences cultural life (5 marks)

BIT 2109  PROFESSIONAL ISSUES OF INFORMATION TECHNOLOGY DISTANCE LEARNING KCA Past Paper Read Post »

Uncategorized

BIT 2108 OBJECT ORIENTED PROGRAMMING I KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2109 PROFESSIONAL ISSUES OF INFORMATION TECHNOLOGY DISTANCE LEARNING DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE (30 MARKS) a) Explain the following terminologies [8 Marks] i) Information Technology ii) Plagiarism iii) Confidentiality iv) Professional Ethics b) Discuss the categories of Private and Personal information in the context of Professional Issues in IT. [6 Marks] c) What is software piracy and how can this problem be addressed? [10 Marks] d) Outline the benefits of adopting codes of conduct in the field of computing and information systems. [6 Marks] QUESTION TWO (20 MARKS) a) The Internet allows for free exchange of knowledge, a chaotic electronic freeway that now girdles the Earth. Discuss the ethical and legal considerations of Internet use. [10 Marks] b) Explain the exclusive rights accorded to the owners of a copy right. [6 Marks] c) Discuss the law of confidence intellectual property right. [4 Marks] QUESTION THREE (20 MARKS) a) Describe the types of discrimination that are prohibited by anti-discrimination legislation in the UK. [8 Marks] b) Describe the way in which each of these mechanisms might be used to protect the IP of a software company. [6 Marks] i) copyright ii) trade marks iii) patents. c) Explain the difference between a public limited company (plc) and a private Limited Company. [6Marks] QUESTION FOUR (20 MARKS) a) Discuss how information systems have affected everyday life. [8 Marks] b) Discuss the purpose of professional bodies and using examples show how they can contribute to professional practice in organisations. [6Marks] c) Explain possible ways in which the security of personal data / personal identification information can be enhanced. [6 Marks] QUESTION FIVE (20 MARKS) a) Discuss the ethical and legal considerations of Internet use [8 Marks] b) Discuss factors that have contributed to the digital divide. [6Marks] c) Discuss the ICT characteristics that have Ethical and Moral implications. [6 Marks]

BIT 2108 OBJECT ORIENTED PROGRAMMING I KCA Past Paper Read Post »

Uncategorized

BIT 2107 OBJECT ORIENTED ANALYSIS AND DESIGN  KCA Past Paper

UNIVERSITY EXAMINATIONS: 2014/2015 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 2107 OBJECT ORIENTED ANALYSIS AND DESIGN DISTANCE LEARNING DATE: APRIL, 2015 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE (30 Marks) (a) Differentiate between the following object oriented terms: (4 Marks) (i) object vs class (ii) model vs diagram (b) (i) Outline any four characteristics of the object oriented approach to systems development. (4 Marks) (ii) Highlight any three limitations of the structured approach to software development. (6 Marks) (c) Explain the steps followed in the analysis and design stages of the object-oriented approach to systems development. (6 Marks) (d) State significance of the Unified Modeling Language (UML) in object orientation and describe its main building blocks. (6 Marks) (e) A class declaration in object oriented programming is said to illustrate both the concepts of data hiding as well as abstraction. Using C++ syntax, show how these two concepts can be illustrated. (4 Marks) QUESTION TWO (20 MARKS) (a) Differentiate between a model and a diagram. (2 Marks) (b) (i) Using suitable symbols, describe the main parts of a use case diagram. (6 Marks) (ii) Describe the following use case relationships, giving an example scenario of each one of them. (6 Marks) 1. Includes 2. Extends 3. Uses (iii) Draw a suitable use case diagram based on the description given below: (6 Marks) You are asked to model a system for a video library. The librarian stocks both DVDs and video tapes. When a potential client visits the shop, the librarian checks in the database to establish whether the client is registered or not. If the client is not registered, he/she is advised by the librarian to register with the library first before any services could be rendered. Once a client has been registered, he/she is eligible to borrow at most one library item per week. The item borrowed must be returned before any other item can be borrowed. If the client does not return the item within a month, he/she is surcharged a certain amount per day up to the time he/she returns the item. QUESTION THREE (20 MARKS) (a) The terms visualization and documentation are some of the elements achieved via the use of UML. Explain the meaning of these two terms. (4 Marks) (b) (i) Explain the benefits of the Unified Software Development Process (USDP). (4 Marks) (ii) Using a diagram explain the main phases of USDP. (10 Marks) (c) State the difference between a product and a project in software development. (2 Marks) QUESTION FOUR (20 MARKS) (a) Sequence and collaboration diagrams are the two main types of interaction diagrams. Using suitable diagrams distinguish between these two types of diagrams. (6 Marks) (b) (i) Explain two advantages of inheritance as used in object orientation. (2 Marks) (ii) Write a suitable program using C++ to illustrate the concept of inheritance. (6 Marks) (c) Explain the following types of models, giving an example diagram for each one of them: (i) static models (ii) behavioural models (iii) dynamic models QUESTION FIVE (20 MARKS) (a) (i) Systems analysis is a term commonly used in the systems development. Compare and contrast this term as used in both the structured and the object oriented approaches. (6 Marks) (ii) In the context of analysis, discuss the concept of robust analysis. (3 Marks) (b) (i) State what you understand by a class diagram. (2 Marks) (ii) Using a suitable diagram, explain the parts of a class diagram. (5 Marks) (c) (i) State what you understand by the term multiplicity as used in UML (1 Mark) (ii) Explain any three types of such multiplicities. (3 Marks) (6 Marks)

BIT 2107 OBJECT ORIENTED ANALYSIS AND DESIGN  KCA Past Paper Read Post »

Scroll to Top