July 29, 2024

Uncategorized

Manage Database Systems March/April 2023 Past Paper

INSTRUCTIONS TO CANDIDATE Maximum marks for each question are indicated in brackets ( ). This paper consists of TWO sections: A and B. Answer questions as per instructions in each section. You are provided with a separate answer booklet. Candidate should answer the questions in English. Section A: (20 marks) Answer ALL the questions in this section. 1. ____________ is an attribute that uniquely identifies an entity in a relational database system. (1 mark) A. Unique key B. Primary key C. Foreign key D. Null key 2. Which of the following is not an output of the query h??d? (1 mark) A. head B. heed C. Heard D. Hoed 3. Another name for a row in a relational database table is a ______. (1 mark) A. Tuple B. Domain. C. Degree. D. Cardinality 4. Which command activates the current query when executed? (1 mark) A. Show table B. List box C. Cross tab D. Run. 5. A data type used when inserting images into a table is a ___________. (1 mark) A. OLE B. Memo C. Picture D. Look up 6. ________ is not a source of data for a report. (1 mark) A. Form. B. Table. C. View. D. Query. 7. “…”at the end of a field property box represents ______________. (1 mark) A. Make button. B. Continuation. C. Expression builder. D. Open button. 8. __________ is not a property of number data type. (1 mark) A. Allow zero length. B. Format C. Caption. D. Input mask. 9. A _________ view allows addition of controls to a form. (1 mark) A. Datasheet. B. Form. C. Design. D. Wizard. 10. Which of the relationships cannot be implemented by a relational DBMS? (1 mark) A. one to many. B. many to many C. many to one. D. one to one. 11. In MS Access, the maximum length of characters for a text data type is ________. (1 mark) A. 64 B. 256 C. 128 D. 255 12. A collection of related files is called a _____________. (1 mark) A. Database B. Table C. Record D. Form 13. Microsoft Access 2007 saves files using _______ file extension. (1 mark) A. .mdb B. .xlsx C. .accdb D. ,docx 14. A primary key included in another table is referred to as a_______ key. (1 mark) A. Foreign B. Super C. Candidate. D. Source. 15. A data type that stores logical value in MS Access is a ___________. (1 mark) A. True/False. B. OR C. Yes/No D. On/ Off. 16. A _______ is used to add logic to a database and automate repetitive tasks to create a more usable interface. (1 mark) A. Macro. B. Module. C. Query. D. Form. 17. Which of the following is not a characteristic of a primary key? (1 mark) A. Unique B. Not null. C. Required. D. Redundant. 18. The following are parts of a query design window except ________. (1 mark) A. Data type. B. Field C. Condition. D. Table. 19. An operator that returns records if only one of two or more given conditions is true is called a _____. (1 mark) A. OR. B. NOT C. XOR. D. NAND. 20. Which one of the following is not a database operation? (1 mark) A. Insert. B. Transform. C. Update. D. Select. Section B (40 marks) Answer ALL the questions in this section. 21. Define the term index as used in databases. (2 marks) 22. Outline four functions of a Database Management System Software (DBMS). (4 marks) 23. Duke uses a hierarchical model for data storage. Explain two challenges he is likely to encounter with this database. (4 marks) 24. Mary created a form for her database. Outline four uses of this form. (4 marks) 25. Andrew has been hired as a database administrator in a company. Explain five roles he is likely to play. (5 marks) 26. Explain each of the following types of queries: a) Update (2 marks) b) Append. (2 marks) 27. Distinguish between bound and unbound controls in a database form. (2 marks) 28. Describe two components of a database system. (4 marks) 29. James created a report using design view. Describe two sections of the report where he could have added controls. (4 marks) 30. Table 1 shows data stored by a car selling company. Use it to answer the questions that follow: (a) Write a statement entered in the criteria row of a query used to select all white cars. (2 marks) (b) Write a statement entered in the criteria row of a query used to select all cars whose make start with letter ‘m’. (2 marks) 31. Classify each of the following DBMS software as either server or desktop software. MS Access, Paradox, Wamp, MySQL, FoxPro, Oracle (3 marks) Section C (40 marks) Answer any TWO questions in this section 32. (a) Explain the function of a sub form in a database system. (4 marks) (b) Differentiate between an atomic and a multivalued attribute. (4 marks) (c) Janet created a one to many relationships between two tables. Describe three constraints she could have enforced to ensure consistency of data. (6 marks) (d) You have been contracted to create a library system for a certain college. In this system, a student is identified by a Student number and name. A student can borrow a maximum of three books. Each book is identified by an ISBN and BookName. Many students can borrow many books. Every borrow transaction is recorded using StudentNo, Date Borrowed and Return date. Identify the entities in this system and the respective attributes. (6 marks) 33. a) David intends to design a database system. Describe three models he is likely to design. (6 marks) b) A student intends to implement table 1 using MS Access. i) Identify the most appropriate data type for each attribute. (5 marks) ii) Name the most appropriate attribute for a primary key. (1 mark) c) FunTech company is replacing an existing file-based system with a database system. i) Explain two demerits of the current

Manage Database Systems March/April 2023 Past Paper Read Post »

Uncategorized

Computer Networking March/April 2023 Past Paper

INSTRUCTIONS TO CANDIDATES: Maximum Marks for each question are indicated in the brackets. The paper consists of THREE sections: A, B and C. Answer questions as per instructions in each section. You are provided with a separate answer booklet. Candidate should answer the questions in English. Section A (20 marks) Each question carries one mark. 1. Which among the following is an IP address that can be used for testing the internal protocol stack on a computer? (1 Mark) A. 192.168.100.1 B. 10.10.10.1 C. 127.0.0.1 D. 172.16.16.1 2. Most operating systems offers some means for a user to interact with the hardware parts and other resources. Which among these operating systems is usually deployed on networks to host applications that support multiple real-time access? (1 mark) A. Windows 11 B. Windows 7 Ultimate Edition C. Ubuntu Server Edition D. Android 11 3. Kelvin wanted to install a new printer to be shared by ten computers in a room. Which other network device might Kelvin need in his set up in order for the printer to work properly? (1 Mark) A. Device driver B. Repeater C. Switch D. Firewall 4. The term IANA stands for? (1 Mark) A. Internet Assigned Numbers Authority B. Internal Assigned Numbers Authority C. Internet Associative Numbers Authoritative D. Internal Associative Numbers Authority 5. Which among the following devices is considered to be a layer 3 device in networking? (1 Mark) A. Switch B. Router C. Network Interface Card D. Extender 6. ___________ is the name given to the type of data unit exchanged at the network layer in the OSI network model. (1 Mark) A. Packet B. Bit C. Frame D. Data 7. Which of the following commands in a windows computer is used to check the pathway that network data takes from source to destination? (1 Mark) A. PING B. TRACERT C. ARP -A D. PATH 8. The type of media used while setting up a network greatly affects its performance. Which among the following would be the most suitable medium to use in an environment which has got a lot of electric motors and damp conditions like a factory floor? (1 Mark) A. UTP Cables B. Coaxial cables C. Fibre Optic cables D. Wireless radio 9. Which of the following is an example of software that can be used for capturing network data for analysis during network testing? (1 Mark) A. Ping B. LAN Speed Test C. Telnet D. Wireshark 10. Identify the type of connector that is used to terminate a coaxial cable when networking. (1 Mark) A. RJ45 B. BNC C. SFP D. RJ11 11. _________________ is a type of cable termination that allows devices of different types, such as a computer and a printer, to interconnect and exchange communication. (1 Mark) A. Crossover B. Straight through C. Rollover D. Cross through 12. Which device from the list below, allows two different types of networks to interconnect and exchange communication? (1 Mark) A. Hub B. Switch C. Server D. Router 13. Which email application protocol allows one to retrieve copies of emails from the mail server without completely deleting them? (1 Mark) A. POP3 B. IMAPv4 C. SMTP D. HTTP 14. Agnes intends to configure her computer with a new IPv4 address. After assigning her computer with a new IP address, she proceeds to use the default subnet mask address 255.255.0.0. To which class does her computer’s IP address belong? (1 Mark) A. B. B. A C. D D. A 15. You have just installed Windows 10 on your computer and now are attempting to access your favourite networking support website. When you load the website’s address, you get an error that your computer is offline. What is your best next step? (1 Mark) A. Install a new copy of Windows 10. B. Download network rivers. C. Check the computer’s connection to the ethernet cable or Wi-Fi. D. Update the installed Windows 10. 16. What is the abbreviation given to the types of networks that are mostly found to operate within a town or city only? (1 Mark) A. PAN B. MAN C. WAN D. LAN 17. What is the maximum number of valid network hosts or nodes that a class C IPv4 default subnet mask can support? (1 Mark) A. 128 B. 16 C. 256 D. 254 18. While configuring a small office network, Ogutu decided to set up access security for all the wireless devices that needed connection to the office’s wireless router. Which type of wireless access authentication protocol would offer best security for the devices? (1 Mark) A. Password B. WEP C. WPA2 D. WPA 19. _________________ is the protocol used by computers on a network to resolve IP addresses to hostnames on the internet. (1 Mark) A. DNS B. HTTP C. SNMP D. TCP 20. In order to prepare a category 5e ethernet cable, Isaac had to use a certain tool. What is the name given to this tool that allowed him to properly terminate the cable in its connector? (1 Mark) A. Cable slicer B. Crimping tool C. Cable tester D. Voltmeter Section B (40 marks) Answer ALL questions in this section 21. In reference to network topologies, what is the major difference between a logical and a physical topology? (2 Marks) 22. Explain each of the following terms as used in computer networking: (3 Marks) a. Bandwidth b. Throughput c. Network 23. Give two features or characteristics that are coherently unique to local area networks. (2 Marks) 24. Outline three factors that determine the performance of any network that has been set up and is operational. (3 Marks) 25. Outline any three advantages that one would derive from setting up a network using a star physical topology. (3 Marks) 26. Using a well labelled diagram, describe parts of a fibre optic cable? (4 Marks) 27. Give the four layers of the TCP/IP network reference model starting from the highest o the lowest layer. (2 Marks) 28. Kiliwi intends to connect his customer to internet

Computer Networking March/April 2023 Past Paper Read Post »

Uncategorized

Use the Internet March/April 2023 Past Paper

INSTRUCTIONS TO CANDIDATES This paper consists of TWO sections: A and B. Answer ALL questions in Section A and Section B in the answer booklet provided. Maximum marks for each part of the question are as indicated in brackets (). Candidate should answer the questions in English. SECTION A (10 marks) Answer ALL the questions in this section 1. A program that is used to view websites is called a? A. Browser B. Web viewer C. Spreadsheet D. Word processor 2. Which statement correctly defines the term internet? A. A worldwide network of computers B. An interconnected network of computers C. A local computer networks D. A worldwide interconnected computers which use a common protocol to communicate with one another 3. The process of connecting to the internet account is referred as? A. Sign in B. Sign out C. Login D. Logout 4. Sending an E-mail is similar to manually_________. A. Sending a package B. Talking on Phone C. Writing and send a letter D. Drawing a picture 5. URL is an acronym which refers to? A. Unique reference label B. Uniform reference label C. Uniform resource locator D. Unique resource locator 6. The process of getting information from the internet and saving it to a local disk is known as? A. downloading B. uploading C. highlighting D. computing 7. Which of these statements indicate how to properly avoid becoming a victim of social engineering? A. Research facts B. Reject requests for help C. Delete any request for financial information or passwords D. Don’t use a computer at all 8. Which of the following statement correctly describes phishing? A. Sending out malicious software that copies sensitive information from the computer system B. Sending fake emails to a person or group, causing the victims to knowingly reveal personal information which will be stolen. C. Sending deceptive emails to internet users that delete sensitive information from their computers. D. Sending deceptive emails to a person or group, causing the victims to knowingly reveal personal information which will be used maliciously. 9. Hypertext documents web pages editors work on ________ principle. A. WWW B. HTML C. WYSIWYG D. WYGWYSI 10. _________ is shared on the Internet as web pages. A. Program B. Cable C. Hypertext document. D. Protocol SECTION B: (40 marks) Answer ALL questions. 11. Tom correctly answered an examination question about a number of Internet terms. SIX different terms have been used from Tom’s answer. Complete the sentences in Tom’s answer, using the given terms below. (Not all terms in the list need to be used.) (6 Marks) Browser Connection Domain name Server (DNS) Internet Internet Service Provider (ISP) IP address Network Protocol Uniform resource locator (URL) Webpages Hypertext markup Language (HTML) A……… (a)………is a program that allows a user to view…………(b)………… An………(c)….is a company that provides a connection to access the ………… (d)… The main …… (e)…… That governs the transmission of data using the internet is http. The …… (f)……. Is provided by the network and given to each device on the network. 12. Social network has changed the way people interact with each other in this era of technology. Giving TWO examples, explain what a social network is. (4 marks) 13. Kimutai, a student in Oloitoktok TTI would like to connect to the Internet. List FOUR basic components he must have in order to achieve his objective. (4 marks) 14. Privacy is one of the factors which a user must consider when connecting to the internet. As an internet user, explain THREE privacy measures you could take. (6 marks) 15. VoIP is a technology which is being adopted by many businesses. With an appropriate example, explain the term VoIP. (2 marks) 16. Explain THREE features that assist in navigating through the web. (6 marks) 17. John wanted to use the Internet to get some information using google as a search engine. Describe a search engine giving another example. (2 marks) 18. Internet has a variety of application in the modern world, briefly explain THREE areas of its application. (6 marks) 19. Internet has had a variety of impacts on our society. Outline: i. THREE positive impacts (3 marks) ii. TWO negative impacts. (2 marks) 20. A web page and a website are two commonly used terminologies when accessing the internet. Differentiate between the TWO. (3 marks)

Use the Internet March/April 2023 Past Paper Read Post »

Uncategorized

APPLY MS OFFICE TOOLS MARCH/APRIL 2023 PAST PAPER (L4)

INSTRUCTIONS TO CANDIDATE This paper consists of TWO sections: A and B. Answer ALL the questions from section A and B. Candidates should answer the questions in English. SECTION A (10 MARKS) (Answer all the questions in this section. Each question contains 1 mark) 1. Which among the following cell references shows absolute cell referencing as used in Microsoft Excel? A. = G10 B. = $G10 C. = $G:10 D. = $G$10 2. ____________________ is a way sending an email copy while keeping the email addresses hidden from the rest of the recipients. A. To: B. Cc: C. Bcc: D. Subject: 3. Kelvin wanted to send an email to five (5) of his classmates. Which application would he use? A. Microsoft Excel B. Microsoft Word C. Mozilla Firefox D. Microsoft Outlook 4. While entering data in an Excel worksheet, Lina noticed that she had wrongly entered 69 as 96 five times. Which command should she use to rectify the error at once? A. Find and Save B. Find and Replace C. Go To and Replace D. Sort and Filter 5. Identify the object that is used for data entry in Microsoft Access. A. Cell B. Report C. Form D. Field 6. ___________ is a method of sorting data in Microsoft Excel from the largest to the smallest value. A. Ascending B. Descending C. Largest D. Custom 7. From the diagram below, which option can one select in order to save a typed Microsoft Word document using a password? 8. _____________ is a power point view used to display each slide as a thumbnail and rearranges slides: A. Slide Master B. Slide Show C. Notes Page D. Slide Sorter 9. Which of the following formats best suits the date (_ _/_ _/ _ _ _ _)? A. General date B. Short date C. Medium date D. Long date 10. Select the section that does not exist in a slide layout from the list below: A. Pictures B. Titles C. Animations D. Charts SECTION B: (40 MARKS) Answer all the questions. Marks for each question is indicated in brackets 11. Differentiate between primary and foreign keys as used in databases. (2 Marks) 12. Explain the function of each of the following parts of a worksheet: (4 Marks) i. Name box; ii. Formula bar. 13. The fees balance of students in a college is entered in a worksheet from cell D3 to D10. Write a formula that would be used to calculate the number of candidates whose fees balance is more than 20,000. (2 Marks) 14. Describe TWO types of relationships that are used to manipulate data in Microsoft Access. (4 Marks) 15. Using an example, describe mixed cell referencing as used in Microsoft Excel. (2 Marks) 16. Explain the function of the following action queries used in databases: i. Update; ii. Append. (4 Marks) 17. Differentiate between bound and unbound controls as used in Microsoft Access. (2 Marks) 18. A student intends to create a document. After proper consideration on which  application to use, he decided to use a word processor. Outline three advantages of his choice. (3 Marks) 19. Figure 1 shows icons found on the standard toolbar of a word processor program. Describe the function of the icons labeled 1, 2 and 3. (3 Marks) 20. The following are features of Microsoft Word: Indent, strikethrough, thesaurus and sort. Classify them as either editing or formatting features. (4 Marks) 21. Using a suitable example, outline THREE parts of an email. (4 Marks) 22. Alice would like to apply slide transition to her presentation. List THREE examples of transition effects she could use. (3 Marks) 23. Atieno would like to create a PowerPoint presentation. List THREE ways she could achieve this. (3 Marks)

APPLY MS OFFICE TOOLS MARCH/APRIL 2023 PAST PAPER (L4) Read Post »

Uncategorized

Repair and Maintain a Computer March/April 2023 Past Paper L(4)

INSTRUCTIONS TO CANDIDATE This paper consists of TWO sections: A and B. Answer ALL the questions in section A and B. Candidates should answer the questions in English. SECTION A (10 MARKS) Answer all the questions in this section. Each question contains 1 mark. 1. Which of the following is not a network hardware device? A. Network interface card B. Hub C. Bridge D. Processor 2. The main printed circuit board which contains sockets that accept additional boards is the ………board A. Sound board B. Video board C. Motherboard D. Surf board 3. The power protection device that includes a battery and provides a few minutes of power is referred to as: A. Surge suppressor B. Line conditioner C. Generator D. UPS 4. Which of the following storage devices can be connected to a USB port? A. The CD and DVD B. diskette C. Flash disks D. Local disk (C:) 5. Hardware devices that are connected to the computer are collectively referred to as ___________ devices A. Peripherals B. Storage C. Input D. Output 6. Which of the following would be a logical first step in troubleshooting a computer? A. Check the computer CMOS B. Define the circumstances of the problem C. Call the vendor D. Define what applications are being used 7. When troubleshooting a faulty monitor, which of the following would be a first step? A. Check its connections to the computer system unit and power source. B. Use a meter to check the CRT and internal circuitry for continuity. C. Power down the monitor, then turn it on again to see if that corrects the problem. D. Power down the computer, then turn it on again to see if that corrects the problem. 8. On a leased line installation, a functional external modem was not showing a carrier detect light. Where is the problem most likely to be? A. In the modem. B. In the phone line. C. In the computer. D. In the DTC equipment. 9. The following is a list of controllers, which one supports an external CD-ROM drive? A. ESDI. B. ARLL. C. MFM. D. SCSI. 10. Which of the statements below best describes a fragmented hard disk? A. The platters are bad. B. Data files are corrupted. C. Clusters of data are damaged. D. Files are not stored in consecutive clusters. SECTION B (40 MARKS) Answer all the questions. Marks for each question is indicated in brackets () 11. (a) James was working on a computer which had a lot of dust inside. Outline TWO ways of cleaning it. (2 marks) (b) List TWO other essential tools found in a computer repair workshop. (2 marks) 12. Outline FIVE major steps followed when installing a hard Disk in a computer. (5 marks) 13. Primary memory is a working storage that can be accessed directly by the processor. Outline TWO types of this memory. (2 marks) 14. (a) Differentiate between CD- RW and CD-R storage devices. (4 marks) (b) Explain each of the following terms as used in computer repair and maintenance. (i) Troubleshoot. (2 marks) (ii) Upgrade. (2 marks) (iii) Assemble. (2 marks) 15. (a) The following is a list of ports used to connect computer devices. Identify the port and name the most appropriate device that be connected to each port: (6 marks) (b) Moraa an ICT trainer inserted a flash disk into a computer to print out a stored document but the error message “usb not recognized” appeared on the computer screen. Outline the possible causes of this error message. (3 marks) 16. An ICT technician bought a refurbished computer and realized it was taking too long to boot. Identify THREE possible causes of this problem. (3 marks) 17. Overheating of a computer is an indication of a fault in a computer system. (i) Explain the type of fault; (2 marks) (ii) Outline THREE measures to be undertaken to rectify this fault. (3 marks) 18. Mr. Alfred went to a computer repair shop to upgrade his RAM. He noticed that the technician wore some gloves when upgrading the memory. Outline TWO functions of the gloves. (2 marks)

Repair and Maintain a Computer March/April 2023 Past Paper L(4) Read Post »

Uncategorized

Install Computer Software March/April 2022 Past Paper (L 4)

INSTRUCTIONS TO CANDIDATE This paper consists of TWO sections: A and B. Answer ALL the questions in section A and B. Candidates should answer the questions in English. SECTION A (10 MARKS) (Answer all the questions in this section. Each question contains 1 mark) 1. Which of the following software is not an application software? A. Computer Aided design B. MS-DOS C. Spreadsheet D. Word processing 2. A program in execution is called? A. Process B. Instruction C. Procedure D. Function 3. Windows, Linux, Android, Macintosh etc. are examples of ……………. A. Hardware B. Utility programs C. Operating systems D. Application software 4. A computer program that installs files, such as applications, drivers, or other software, into a computer is called? A. Windows B. Setup program C. Defragmenter D. Word processing 5. Every computer must have at least one …….………. to run other programs. A. Keyboard B. Mouse C. CPU D. Operating system 6. System software that controls a particular type of device installed in computer is called? A. Device driver B. Operating system C. Windows D. RAM 7. Which of the following is NOT a method of acquiring software in an organization? A. Freeware B. Off-the-shelf package C. Tailor made D. Cracking 8. ……………… is a file included in the installation package that contains instructions on how to install a program. A. README B. Product key C. Setup D. Exe 9. Removing a program and its associated files from a computer hard drive is called? A. Deleting B. Uninstalling C. Scanning D. None of the above 10. A ………… is required after the installation process to enable the system to update or change the relevant files. A. Rest B. Log off C. Sleep D. Restart SECTION B (40 MARKS) Answer ALL the questions in this section. 11. Explain the term computer software. (2 Marks) 12. System software performs a variety of fundamental operations that avail computer resources to the user. List THREE types of such software. (3 Marks) 13. Joshua was tasked to install Microsoft Office 2013 software during a practical lesson. Outline FOUR software installation sources he might use to achieve this. (4 Marks) 14. Outline FOUR Advantages of standard software over in- house developed software. (4 Marks) 15. An ICT company was testing a new software installed on their computers. Explain THREE benefits of testing their software after installation. (6 Marks) 16. Explain the following terms as used in computer software. (6 Marks) i) Software documentation ii) Software upgrade iii) Software update 17. When a company acquires a new software, end-user training is often necessary. Identify FIVE benefits of this training. (5 Marks) 18. Outline THREE factors that one would consider before performing a software update. (3 Marks) 19. Software licenses can have a significant impact on the choice of software to acquire. Explain TWO main types of such licenses. (4 Marks) 20. You have been tasked to install an operating system in a new computer. Outline THREE installation requirements you will consider before starting the task. (3 Marks)

Install Computer Software March/April 2022 Past Paper (L 4) Read Post »

Scroll to Top