Form 1 To 4 Computer Studies Notes
Form 1 To 4 Computer Studies Notes
Teachers will therefore use the book in their laptops to teach and even give students notes to read
online after revision.
The design of this book make it lively and interesting for both teachers and students as it take us
away from the monotony of black and white books. The book is divided into two parts: Theory
and Accounting.
We have past K.CSE questions at the end of every topic for further understanding and testing.
CHAPTER ONE
INTRODUCTION TO COMPUTERS
Specific Objectives
https://Teacher.co.ke/
• Handling of materials and equipment
• Fire
• Cabling
• Stable power supply
• Burglar proofing
• Ventilation
• Lab layout
• Dust/damp control
• Lighting
• Standard furniture
h.) Hands-on skills
- Start-up
- restarting and shut-down (Booting)
- Keyboard layout
- Practical keyboard and mouse skills
Introduction
Definition of a Computer
It is an electronic device that transforms data to information.
Data: Raw facts. Information:
Processed data.
A computer system is made up of two parts: Hardware and Software. Hardware
These are the physical parts of the computer e.g printers, keyboard etc. Software
These are the programs (sets of instructions) that are used to run the computer
e.g.Word processor, spreadsheet, database, presentation software etc.
Parts of hardware
Hardware consist of three parts as follows.
Input Devices
These are devices that are used to feed the computer with data for processing within.
https://Teacher.co.ke/
◦ Machine readable form- this is output that can only be read using the computer
e.g. information stored on disks.
The Central Processing Unit (CPU), motherboard, storage devices and other peripheral
devices.
Peripheral Devices
Devices connected directly or indirectly to the mother board.
Control Unit
The work of the CU is to take data from an input device, to the processor/memory, then
to an output device.
Memory
The work of memory is to store data before, during and after processing.
Classification of Computers
1. Size and Memory
2. Purpose
3. Functionality
Advantages of laptops
Portable
https://Teacher.co.ke/
Ruggedness: Designed to withstand travelers
Display active color screen
Power batteries serve as ups
Disadvantages
Less expansion options
They are easily stolen
Classification according Purpose
1. General computers
This computer can do or handle a variety of tasks when loaded with appropriate programs.
2. Special computers
They are designed to serve a specific purpose or to accomplish one particular
task.
3. Dedicated Computers
They can handle any task but it is a dedicated to one task.
Control unit:
Functions of the control unit are-
Development of Computers
https://Teacher.co.ke/
First Generation Computers (1940 - 1958)
Used thermionic valves or vacuum tubes
Advantages
Vacuum tubes technology made it possible with advent of electronic digital computers
It was the fastest calculating device that time.
Disadvantages
Too bulky
Unreliable
Had limited memory
Generated a lot of heat
Consumed a lot of power
Examples
IBM 650, UNIAC
lOMoARcPSD|17337118
Disadvantages
Required air condition for cooling
Required frequent maintenance
It was very expensive
Examples
IBM1401, Honeywall200, CDC1604 e.t.c.
Examples
IBM3033, Buroughs67700
Features of a Computer
Automation: Computers work with minimum human intervention once supplied with data
and instructions.
Accuracy: Computers are ever accurate but entirely depend on the data entered.
Speed: Performs tasks in very short period.
Storage: Computers can store large volumes of data and information.
Versatile: Ability of doing different tasks as per instructions.
Diligence: Work for a long period of time without getting bored
https://Teacher.co.ke/
Loss of information if not well managed
Advantages of a Computer
Stores large amount of information in a limited space
https://Teacher.co.ke/
Disadvantages
Computers are very expensive
Cuts down employment opportunities
Needs expertise which is expensive to hire and maintain
They create eye problem
Loss of information if not well managed.
https://Teacher.co.ke/
User seats must be comfortable and have straight back rest that allows
someone to sit upright to avoid muscle pains and aches.
8. Burglar proofing:
Fit strong metallic grills and locks on doors and windows
Don’t welcome strangers to computer room
Install security alarms at strategic access points to alert security personnel incase of break
in.
9. Stable power supply: Functions of Uninterrupted Power Supply (UPS)-
Regulate high voltage
Regulate low voltage
Provide temporary power
Notify when power goes off.
lOMoARcPSD|17337118
Keyboard Layout
1. Alphanumeric Keys
Comprises of numbers and all alphabets, symbols like @,!,$,%,^,&,*,(,),?,>,< e.t.c. Other keys
include Caps lock, Enter key, Tab, Spacebar, Back space.
a) Caps Lock: When on letters typed appear in uppercase and when of letters
appear in lowercase.
https://Teacher.co.ke/
Cursor Movement Keys
a) Arrow Keys: Used to move the cursor up, down, left and right.
b) Page up and page down keys: Moves the cursor one page up or
down.
c) Home and End keys: Pressing Home key moves the cursor to the
beginning of the current line. End key moves the cursor to the end of the
current line. Editing Keys
a) Insert key: It helps the user to insert or replace a character at the cursor position.
b) Delete (Del) key: This key deletes characters at the cursor position from left to right.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you understand before
going to sleep!
(ii) Program
https://Teacher.co.ke/
A computer program is a set of related instructions which specify how data is to be
processed
A set of instructions used to guide a computer through a process
(iv) Information
Data which has been refined summarized & manipulated in the way you want it, or into a
more meaningful form for decision- making
4. Explain the following input/ output terms as used in computer systems. Give an
example for each
(a) Read - To transfer data from an input device to the computer, e.g. the computer
reads data from a disk, a keyboard, etc
- To move or copy data from backing storage to the main
Storage
(b) Write - To transfer information from the computer to an output Device
e.g. the computer writes output on a printer or onto a disk.
- To move or copy data from the main storage to a backing storage
https://Teacher.co.ke/
This is the casing that houses the internal components of the computer such as the CPU and
storage devices
(b) List four devices located under the cover of the system unit
- Central processing Unit (CPU)
- Motherboard
- Power supply unit
- Main memory
- Hard disk
- Disk drives
- Battery
- Buses
- Input/ output ports
- Video card
- Expansion slots
(c) Give two differences between tower – style and desktop system units
- Tower style system unit is designed to stand alone or to be placed on the floor, desktop
units lie on the desk with the monitor placed on top
- Tower style units have more space for expansion than the typical desktop units
(2 mks)
https://Teacher.co.ke/
- Produced a lot of heat
- The computers constantly broke down due to the excessive heat generated;
hence were short- lived and were not very reliable - Their internal memory
capacity/ size was low
- Slow in processing data
- Very costly
- Used magnetic drum memories
- Cards were sued to enter data into the computers
https://Teacher.co.ke/
- Use advanced hard disks and optical disks for storage, e.g. DVDs - Use of
zip disks
- Use of multi user operating systems & advanced application programs
to
size
- PCs are becoming small and portable, e.g. personal Digital Assistant
(PDA).
(b) Give two reasons why smaller computers like Laptops tend to be more expensive
than Desktop computers
- The technology of producing smaller devices is expensive
- They are convenient because they are portable
- They have advanced power management capabilities (they consume less
power since a laptop can operate on rechargeable batteries
https://Teacher.co.ke/
- Bathroom scale
- Thermometer
- Speedometer
- Post- office scale
- A radio with a knob that slides in a slot to increase volume
15. State a specific example where each of the following types of computers can
be used
lOMoARcPSD|17337118
(a) Supercomputer
- Weather forecasting
- Petroleum research
- Defense and weapon analysis
- Aerodynamic design and simulation
17. Explain four reasons which make microcomputers suitable for personal
computing work
- Reduced cost, i.e. are cheaper than the minicomputers & mainframe
computers - Have high processing speed
- Are small in size (occupy less office space)
- Are more energy efficient (i.e. consume less power)
- Are more reliable in doing various functions than the early mainframe
computers
- Are versatile (i.e. can be used for many different tasks)
18. (a) Identify and explain five areas where computers are used to process data
( 10 mks)
Supermarkets
- For stock control i.e. records of what is in store, what has been sold,
and what is out of stock
- For calculating customer’s change
- For production of receipts
https://Teacher.co.ke/
- Better record keeping & processing of documents
- Provide electronic money transfer facilities
Homes
- Entertainment e.g. watching movies, playing music, playing
computer games
- For storing personal information/ documents
- For calculating & keeping home budgets
Industries
- To monitor and control industries processes through the use of robots
- For management control, i.e. to keep track of elders, bills and
transactions
- For advertisement purposes, which enable an industry to attack more
customers Police stations
- Matching, analyzing & keeping databases of fingerprints
- For taking photographs & other identification details
- For record keeping
- For face recognition, scene monitoring & analysis which help the
police carry out criminal investigations speedily Transport industry
lOMoARcPSD|17337118
https://Teacher.co.ke/
20. (a) Define the term ‘ computer laboratory’
( 2 mks)
- A computer laboratory is a room that has been specially prepared to facilitate installation
of computers, and provide a safe conducive environment for teaching & learning of
Computer studies.
(b) Give two factors to be considered when preparing a computer laboratory (2 mks)
- Security of computers
- Reliability of the source of power
- Number of computers to be installed and the amount of space available
- The maximum number of users that the laboratory can accommodate
21. List down three safety precautions one should observe when entering a
computer laboratory
(3 mks)
- Avoid smoking or exposing computers to dust
- Avoid carrying foods & drinks/ beverages to the computer room
- Avoid unnecessary movements as you may accidentally knock the
peripheral devices
- Only authorized people should enter the computer room
23. Explain why smoke and Dust particles are harmful to a computer
- Dust and smoke particles settle on storage devices and may scratch them
during read/ write operation
- It affects the cooling of the computer
24. Identify three facilities that will ensure proper ventilation in a room
25. Why must foods and beverages be kept out of the computer room?
- Food particles may fall into the moving parts of the computer and damage them. Liquids
https://Teacher.co.ke/
may spill into the computer parts causing rusting or electrical faults
26. Why would it not be good to install Powder or Water – based fire extinguishers in
the computer room?
- Powder particles settle on storage devices and may scratch them during read/
write operation
- Water causes rustling of metallic parts and short – circuits if used
27. (a) State one reason why a computer needs to be connected to a stable
power supply (1 mk)
- To prevent damage to the computer’s secondary storage media
- To avoid damage and loss of important data or information such as
application software stored on the media
- Prevent loss of data/ information that had not been saved before the
failure
(b) List down four functions of the uninterruptible Power Supply (UPS) (4 mks)
- It prevents sudden power surges that might destroy the computer
- It supplies power to the Computer during blackouts and brownouts
- It provides stable (clean) power supply
lOMoARcPSD|17337118
https://Teacher.co.ke/
- Regular cleaning of the laboratory
- Cover the computer devices with dust covers when cleaning the room
31. Name two main causes of fire in the computer laboratory and give the
precautions that should be taken to guard against them
- Inflammable chemical such as those used to clean the computer equipment
Keep the chemicals away in store after use
- Open wires/ cables
- Ensure that all electrical wires are properly insulated
- Ensure that the computer room has a gaseous fire extinguisher containing
carbon dioxide in case of any accidents
- Smocking
33. List three things that can spoil a printer if they are not of the correct specification,
and explain what damage may be caused
(i) Printer Paper: Different printers have different sensitivity to printing papers. Using the
wrong quality paper in a particular printer can make the paper get stuck
(ii) Cartridges & Ribbons: Printers are very specific to manufacture’s cartridges &
ribbons
Use of clones or imitations ( i.e., the wrong make & model) can damage the printer
mechanism
(iii) Refilling of cartridges or re- inking of ribbons: It can spoil the printer due to
leakage or use of poor quality materials
34. Explain three ways that computer technology could make office more
efficient (3 mks)
- There is easier & faster retrieval of data, i.e. they reduce the time and effort
needed to access and retrieve information - Increased accuracy of data
- Better presentation of data
- Ensure faster processing of data
35. (a) Explain the steps you would follow to set up a new computer
- Gently and carefully connect the interface cable of each device to the
correct port and to the device.
- Connect the computer to the source of power and switch it on.
- Observe boot up information on the screen to see whether Power-On Self
Test (POST) displays any error message. A successful boot means that the
https://Teacher.co.ke/
computer was properly setup. (b) Outline three reasons why it is
important to first shut down the computer before turning it off
- To avoid damaging storage devices that may still be in use
- To avoid damaging system and application files
- To avoid loss of data and information ( 3
mks)
36. A computer must go through the process of booting/ initialization before use
(a) Briefly explain the term “computer booting”.
Booting refers to the starting up of a computer. It is the entire process that makes the
computer ready for use.
(b) Explain what happens in the computer during the
booting process
When the power is switched on, internally, it first checks whether all the components are in
good working condition, i.e. the RAM, CMOS (BIOS), hard disk & floppy disk drive
controllers, and the keyboard. If no problem is found, it then loads the operating systems
(c) Give and explain two types of booting (i) Cold booting:
lOMoARcPSD|17337118
It happens when a computer which was originally off is switched on by pressing the power
button on the systems unit
The Computer starts by checking all its components to determine whether they are
functioning properly
https://Teacher.co.ke/
- Special PC keys (Ctrl, Shift, Alt, Ins, Enter, Spacebar, Caps
lock,
Num lock, etc)
- Editing keys (Del, Backspace, and spacebar)
(c) Name the keyboard keys that will help you: (2 mks)
(i) Type the upper character in a key - SHIFT Key
(ii) Execute a selected command - ENTER Key
CHAPTER TWO
COMPUTER SYSTEM
Specific Objectives
Content
a.) Description of a computer system
b.) Functional organization of the elements of a computer system
• Hardware
https://Teacher.co.ke/
• Software
• Live-ware
c.) Input devices e.g.
• Keying devices
• Pointing devices
• Scanning devices
• Speech recognition devices
• Other digital devices
d.) Central Processing Unit (CPU)
• Control Unit
• Arithmetic and Logic Unit (ALU)
• Memory
• Processors (i) types
(ii) clock speeds
e.) Output Device
i) Visual display unit - Liquid Crystal Display (LCD), flat panel, cathode tube (CRT)
ii) Sound output iii) Light emitting
• Hard copy output devices e.g.
https://Teacher.co.ke/
software
iii) Operating system
iv) utilities
- Application software
• Acquisition
(i) standard software
(ii) user developed (in-house)
j.) Criteria for selecting a computer system (specifications)
- Hardware considerations
Introduction
https://Teacher.co.ke/
3. Execution phase-execution of commands
Main memory
It forms an integral element of the processor. It’s tasks are;
Holds data awaiting processing
Holds data being processed
Holds data that has been processed awaiting to be output
Characteristics of ROM
The content cannot be changed unless written in a special type.
Non-volatile: data cannot be lost when the computer is switched off.
Types of DRAM
1) Fast Page Mode (FPM)
2) Extended Data Out (EDO): improvement on FPM
3) Extended Correcting Code (ECC): Special DRAM, corrects errors, and used on
savers.
https://Teacher.co.ke/
DRAM in system unit on memory chamber of laptops
1) Dual-inline Package (DIP)
2) Single-inline Memory Module (SIMM)
3) Dual Inline Memory Module (DIMM)
4) Small Outline DIMM (SODIMM)
5) Micro DIMM
Characteristics of RAM
Information can be accessed at any time (random)
Data can be changed Special Purpose in RAM
1. Buffers: They provide temporary storage for finished tasks so that the CPU is set free
to carry out other activities instead of waiting for all data to be entered in information
to be output.
2. Registers: They hold a piece of data at a time and they are inside the CPU. Examples
a)An accumulator: temporarily holds the result of the last step of the Arithmetic and
Logic Unit.
b) An address register: Temporarily holds the next piece of data waiting to
be processed.
c)Instruction register: Temporarily holds an instruction just before it is
interrupted into a form that the CPU can understand.
d) Storage register: It temporary holds a piece of data that is on its way to and from
the CPU and the main memory.
Cache Memory
It helps the processor to access data and instructions faster due to incorporation of small high-
speed type of Static RAM than it would have taken to fasten it from the relatively slow
Dynamic RAM.
https://Teacher.co.ke/
the brain of the PC.
5. Microcomputer system: This refers to computer set of devices require using and
operating the computer. This includes peripheral devices.
Input Devices
Devices that accept data from external environment and encode it into a form understandable to
the computer for processing.
Optical scanners
1. Optical Mark Recognition (OMR): Detects marks made on a piece of paper using a
soft pen or pencil.
Advantages
Low error rates
Conspicuous errors are corrected
Minimize manual work
Disadvantages
Relatively slow
Difficult verification of worked data
Not widely used in business
Application
Making of multiple choice exams
Market research questionnaires
Payroll entry
Traffic surveys
2. Optical Bar Recognition (OBR): Used to read bar codes.
https://Teacher.co.ke/
frequently
Applications
On labels and on shelves for stock taking
Printed on shop goods e.g. supermarkets
In libraries
3. Optical Character Recognition (OCR): Not only does it scan characters but also can
scan real objects, pictures and drawings
Advantages
Limited errors
Early methods
Document design is less complicated
Character can be read by people
Disadvantages
Expensive or costly
May require redesigning quite frequent
Only certain font is applicable
Magnetic scanners
1. Magnetic Ink Character Recognition (MICR): Allows special devices to
read magnetic characters written in a special format.
Advantages
Fast, accurate and automatic
Codes are both machine and human readable
Reduces forgery
Disadvantages
Limited to only 14 characters
Based on magnetism and can easily
Application
Banking industry for cheques
https://Teacher.co.ke/
Keying devices
1. Traditional Keyboard
2. Flexible keyboard: can be folded
3. Ergonomic Keyboard: designed to provide comfort and allocate wrist strain.
4. Keypad: Miniature keyboard used in PDAs, laptops and mobile phones.
5. Braille keyboard: designed for the blind.
Pointing devices
Mouse
1. Standard mouse: has a ball underneath, two buttons and optical scroll button located
between left and right buttons.
2. Optical mouse
3. Cordless/ wireless mouse: battery powered mouse that uses radio or infrared waves
instead of being physically connected to the system unit
lOMoARcPSD|17337118
Trackball
It’s advantage over mouse is that it neither requires an extra space nor a flat surface for
movement.
Joystic
An input device like a car gear that can be moved sideways, upwards or downwards to control
the position of the cursor.
Speech Recognition/ Voice input: This is where microphone is used to enter data/information
or spoken words into a computer. Situations for speech recorgnition:
Where hands are busy handling documents
Due to movement
Disability e.g. blind without hands
Uses
i. Electronic fund transfer ii. House/ vi. Automated
car security i.e. voice activated locks material
iii. Offer security for room access iv. handling
Voice activated toys and scanners
v. Quality control and automation in
factories vii. ComputerAid
Design
Limitations
i. ii.
Existence of homophones
https://Teacher.co.ke/
Touch screen, Digitizers and Cameras
Touch screen: Use touch sensitive screen where the computer detects the position of the finger
on the screen and responds accordingly.
Digitizers: Almost similar to light pen but has a graph tablet on which user writes using
a pen like device called a style Cameras: Store images in digital form.
Mode of operation
Appropriateness
Outputs Devices
Devices that accept information from internal environment and then decodes it in a form
understandable to user
https://Teacher.co.ke/
Classification of Output Devices
1. Soft copy: includes monitors/ VDU and the speakers 2.
Hard copy: Printers and plotters
3. Microfiche: Computer Output on Microform (COM)
Types
a) Monochrome- Display images and text in only one colour
b) Color- Display in multiple colours
Printers
How printers are classified
a) Speed
b) How the produce the print; character, line or page printers
c) How they provide prints on the stationery; impact or non-impact
printers Types
a) Impact printers: Dot matrix, daisy wheel, golf ball and chain printers.
b) Non-impact printers: Thermal, inkjet, electrostatic and laser printers
Impact Non-impact
Slow Fast
Noisy Quiet
Printers Consideration
1. Printers initial price, subsequent maintenance cost and cost of
consumable items.
2. Volume of printing expected.
3. Nature of report to be generated.
4. Range of capability for the selected printer.
5. Interface with computer at hand on for family particular make.
lOMoARcPSD|17337118
Plotters
They are used to produce graphical output e.g. maps and diagrams.
1. Flatbed plotters: Has a flat surface which the stationery is placed for the pen to be
moving over it in all directions to produce graphical output.
2. Drum plotters: Has a drum onto which stationery is placed for the drawing to be
possible.
plotter: Produces big charts e.g. maps, pictures and drawings. Used for printing
geographical, architectural and engineering drawings e.g. maps, advertisements posters to
be placed on bill boards, machinery parts etc.
Computer Bus
Communication medium within a computer that allow different elements of the computer to
communicate with one another.
1. Address bus: Pathway used to locate storage position in memory for the data to be
executed.
2. Data bus: Pathway where the actual data transfer takes place.
3. Control bus: Pathway for all timings and controlling functions sent by the control
unit to the parts of the system
Auxiliary/secondary storage
Factors to consider when choosing a storage device
Volume of data to be stored
The cost
The quantity or size of data it can hold
Magnetic Tapes
These are sequential access devices. Implies that information is at the end of tape the
program will have to read almost entire tape which may take time to read. Data recorded as
series of magnetic dots across tracks on the tape cassette when characters are stored serially
down the length of the tape.
Sequential access medium: Data is stored across magnetic tape
Serial access medium: data is stored along the media
Advantages Slow since they are
Light and easy to carry sequential access media
Effective for batch Gaps between (called Inter
applications since they are Record Gap,
cheaper IRG) waste storage
Disadvantages space.
Magnetic Disks
Floppy Disks (Diskettes)
Information is recorded on number of concentric circles called tracks. Tracks are divided
into sectors. Sectors and tracks have same storage capacity because inner tracks have a
high density. Diskettes are direct access storage medium (DASM) and access time is made
up of 3 parameters.
1. Seek time: Time taken by the read/write (R/W) head to locate right track that contains
content.
2. Rotational delay time: Time taken by drive mortar to spin the diskette past R/W head.
3. Data transfer time: Time taken by the R/W head to interpret content and send it
ascomputer input.
Advantages
1. Exchangeable and easy to carry
Disadvantages
1. Slower than hard disk
2. Less storage capacity
3. Damaged by light, magnet and dirt
Zip Disks
Come with portable external drive and are slightly large and thicker in size and has a capacity of
up to 250MB
lOMoARcPSD|17337118
Jaz Disks
Come with portable external drive and have a capacity of 1GB to 2GB and have high access
speeds.
e.) Keep them away from dust, moisture and high humidity.
CD-ROM and CD-R are referred to as WORM (Write Once Read Many) since you cannot write
the second time but you can read many times
Optical Tapes
They resemble magnetic tapes but they use optical technology
Hard disk
Advantages
1. They offer cheap storage
2. They are well protected since they are housed in the CPU
3. Fast in terms of access retrieval and saving of data Care for the
Hard disk
a) Keep them away from smoke and dust.
b) Use the right procedure to switch of the computer to allow the R/W head
to move from the disk surface to avoid scratching on rotating surface
c) Exposure to magnetic property
Minimal Requirements for a multimedia computer
A Video Graphic Array (VGA)/ Super Video Graphic Array (SVGA) card and monitor.
A sound card
128MB RAM or higher
CD or DVD drive
FM/TV card
Ports
Power and Interface Cables
Power cables are used to connect the computer to main power outlet.
Interface cables connect all peripherals to the motherboard and transmit data signals. Power
supply unit supplies power to motherboard and other internal device
2. Serial ports: They transmit one bit at a time. They are slower than parallel ports but they
support two way communications. They are 25 pin and 9 pin. COM 1 and COM2. Used by
the serial printers.
4. Small Computer System Interface (SCSI) - Use parallel method but faster than parallel
cables. The port connects up to 8 peripheral devices.
-pin-D: monitors
Utility Software
A special program that performs commonly used services that make certain computing aspects
go on smoothly e.g. sorting, copying, disk management etc. There are two types:
1. System level: Help user to work with the operating system and its function. It tells
whether the command entered is wrong and give suggestion on how the error can be
corrected.
Network software
Establish communication between two or more computers by linking them using a
communication channel like cables to create a computer network e.g. Novell Netware
Programming Software
Used to create programs that behave like software
Disadvantages
Easily pirated
Do not meet all user requirements
Hardware Considerations
a) Processing speed: For faster data processing the speed of the processor must be
relatively high.
b) Memory capacity: At least 128MB RAM. There are also factors to be considered when
buying a memory module-The type of module supported by motherboard
-Whether there is an empty slot on the motherboard
-Compatibility of the module with the existing one
-Module capacity
c) Warranty: Arrangement between the buyer and the seller whereby incase the product
fails during the agreed period of time it is taken care by the seller free of charge or for
an agreed fee. Things to consider in a warranty –The scope of cover
-Call out response and liability agreement -
Regular preventive maintenance
d) Cost: The cost is determined by the processor, size, and the memory capacity.
e) Upgradability and compatibility: Whether the hardware chosen can be easily
upgraded to accommodate emergent technologies.
f) User’s needs: Can it meet the unique needs like for the disabled?
g) Monitor: Always consider the size, resolution and the technology involved.
h) Multimedia capability: It should have speakers, CD/DVD drive, sound card, VGA or
SVGA card.
Software Requirements
a) Authenticity: Always consider genuine, valid and legitimacy and
developers license.
b) Documentation: Manual from the developers that guide the user on
installation, usage and maintenance. –User guides
-License
-Manual guide
-Installation process
-Quick reference
-Warranty
c) Reliability and security: Consider whether the software offers good
security to confidential and private information.
d) User friendliness: How easily the user can interact with the software.
e) Compatibility and system configuration: Consider whether the software
can work with the computer at hand.
f) Cost: Always consider the cost and whether it serves the purpose.
g) Users’ needs: The purpose of the software.
h) Portability: Consider whether it can be installed in different computers.
End of topic
(i) System
A collection of independent entities that collectively work together to achieve a desired goal
A collection of entities that work together to process and manage information using
computers
lOMoARcPSD|17337118
A collection of hardware software and live- ware all working together in data
inputting, processing and production of required output from a computer
2. Differentiate between a computer and a computer system
A computer is made up of both hardware and software, while a computer system integrates
hardware, software and user
Hardware
They are the physical & tangible devices that make up a computer systems, e.g system unit, input
devices, output devices and storage devices
Software
These are programs & data used in a computer system that enable it perform a number of specific
functions, e.g. operating systems, application programs, utility programs, programming
languages & device drives
(b) Draw a well – labeled diagram showing the functional units of computer
hardware
lOMoARcPSD|17337118
4.
(a)
- Accepts data & instructions from the user and sends them into the CPU. V
- Converts data into a form that the computer can understand (i.e., machine-
Sensible/readable form)
Keying device.
- Keyboard,
- Keypad.
Pointing device.
- Mouse.
- Trackball.
- Light pen
- Joystick.
- Microphone.
Printing device.
- Printer.
- Plotter.
- It is a faster input device because it involves just pointing on the screen and
selecting options.
These are devices that enter (capture) data into the computer directly.
(i). To capture prices of goods at points of sale terminals in supermarkets and superstores.
Barcode reader
8. Mr. Otieno a French teacher used speech method to store students’ oral answers to
an exam into a computer
lOMoARcPSD|17337118
It is a type of input where a microphone connected to a computer system is used to enter data in
form of spoken words into the computer
(b) State two advantages and two disadvantages of using this method of data input (4
mks)
Advantages
- Its suitable for people with special needs especially those with impaired
hands
Disadvantages
- Voice input does not take care speech related problems such as accents,
tone etc
- Emergency situations
- For house/ office or car security where voice activated locks are used for
access control
9. Name two examples of scanning (data capture) devices used at point of scale
terminals in supermarkets
- Barcode reader
- Light pen
- Cash registers
These are documents produced as output and which can be re-used as input by the
computer
(b) Name any two data capture techniques that make use of turnaround documents
( 2 mks)
11. List five factors one would consider when selecting a data input device (4
mks)
lOMoARcPSD|17337118
- Input speed
- Cost, i.e. the initial cost of the input device & cost of using the
device on a day – to – day basis.
- Accuracy required
- Availability of space
(ii) System control- it controls the sequence of operations within the computer
https://Teacher.co.ke/
(iii) It gives commands to all parts of the computer
(iv) It controls the use of the Main Memory in storing of data & instructions
(v) Storage of data- It provides temporary storage (RAM) & permanent storage
(ROM)
13. Explain the functions performed by each of the following central processing
unit elements
- Interpreting instructions
- Issuing control instructions to the operating system
(iii) Registers
- Holds data and instructions temporarily just before and after processing
https://Teacher.co.ke/
(v) The system clock
14. In reference to ALU, explain the meaning of logic operations and give an
example of this processing operation
Logic operation is the ability to compare two quantities or numbers to determine which is greater
than, less than, equal to, or not equal to the other.
It also involves the testing for existing of a condition encountered during the processing of an
application & altering the sequence of instructions accordingly.
- Accumulator
lOMoARcPSD|17337118
- Instruction
- Address register
- Storage register
16. (a) Name the basic unit used to measure the processing speed of a computer
( 1 mk)
Hertz (Hz)
(b) A computer processor speed is measured in Hertz. What fraction of a second is the
following?
(i) 1. Nanosecond
(ii) 1. Microsecond
https://Teacher.co.ke/
1 = 1________
A communication path/ medium within the computer that connects the basic
computer components. It allows different elements or sections of the computer to
communicate with each other.
A parallel collection of conditions that carry data & control signals from one element
to another
b. State the functions of each of the following computer bus ( 3 mks) Data bus-
carries data from the processor to memory during the write operations and from
memory to the processor during the read operations
Address bus- it conveys addresses, i.e it carries the address of the memory location or
device to be acted on by the processor
Control bus- it carries the timing & control signals necessary to coordinate the
activities of the entire system
This is the electronic board where all electronic components such as processor, memory chips,
BIOS, bus connections etc are assembled
- Processor (CPU)
- SIMM/DDR sockets
- Memory chips
https://Teacher.co.ke/
- BIOS
- Interface chips
- Buses
A drive is a computer device for reading data from or writing data into a storage media, e.g. a
tape or disk
(b) State any two types of computer drives, giving an example of a storage device used by
each ( 3 mks)
20. (a) Give two reasons why there are many forms of computer storage devices
( 2 mks)
- Permanency of storage
- Cost of implication
- Cassette tapes
- Hard disk
- Zip disks
https://Teacher.co.ke/
- Jazz disks
- Flash disks
- Punched cards
- Optical discs (e.g., Compact Disks LS- 120 super disks, optical
card, optical tape)
Primary storage devices are accessed directly by the CPU, while secondary storage is not
Fixed disks are mounted inside the computer system unit, e.g. Hard disk.
Removable disks are not hosed inside the system unit & are portable, e.g. floppy disk, Jazz disk,
Zip disk, flash disk, CD- R, CD – RW, DVD
A high capacity plug-in portable storage device. Usually attached at the USB port of the
computer
23. (a) Compare a floppy disk and zip disk in relation to size ( 2 mks)
A floppy disk is physically small in size and capacity, while a zip disk is slightly large in size and
has large storage capacity.
https://Teacher.co.ke/
(b) Give three disadvantages of floppy disks as storage devices
- Not reliable
24. (a) State three advantages of using hard disks as medium of storage
(b) Describe three precautions you would take to avoid damaging the hard disk
( 3mks)
https://Teacher.co.ke/
(c) Describe the structure of a hard disk in reference to cylinders, tracks and
sectors
The surface of hard disk is divided into circles called Tracks. Parallel tracks on several platters
are called cylinders
The tracks are further subdivided into sectors. Several sectors can be grouped to form clusters.
25. State two reasons why Magnetic tapes are not commonly used as computer
data storage medium today
- Are slow when retrieving data. This is because of the linear storage
of data o the tape.
- Do not fully use their recording surface due to inter- record Gaps
A microcomputer is a computer whose Central Processing Unit (CPU) has been implemented
with a microprocessor
A microprocessor is a small computer processor, mainly a combination of the ALU & CU
manufactured on a single chip.
RAM is a temporary and rewritable memory, while ROM is a permanent and read only memory.
https://Teacher.co.ke/
In magnetic storage media, data is recorded using magnesium, while in optical storage media
data is recorded using a beam of light (laser)
Hardcopy is printed copy, e.g. printout on paper such as letters while softcopy is intangible
information e.g. screen display or music.
MICR uses magnetic technology to read magnetic characters, while OCR uses laser/ light
technology to read characters
- Keep magnetic away from excessive heat. This is because heat energy weakens the
ability of the magnetic media to store data.
- Store the media in their cases when not in use in order to protect/ safeguard their
recording surfaces against environmental influences such as dust, touch, direct sunlight,
radiations, etc
- Never bring them near moving or strong magnetic bodies. Such bodies might
demagnetize the recording surfaces making recording in terms of magnetism impossible
- When mounting the media into its reading/ writing unit, avoid brushing the recording
surfaces against the mechanical components of the drive
- Put on the power before mounting the media and off after removing the media from the
drive.
= 12 sectors
https://Teacher.co.ke/
If 1 sector = 512 bytes
1,000,000 bytes 1 MB
6,144
1,000,000 = 0.006144 MB
(b) A double – sided disk contains 40 tracks on each side. The tracks are divided into 9
sectors of 512 bytes each. What is the total capacity of the disk in megabytes? ( 2mks)
Total tracks = (40 x 2) = 80
Total sectors = (80 x 9) = 720
Total bytes (720 x 512) = 368, 640 bytes
368, 640
1,048, 576
= 0.352 MB
( 3 mks)
https://Teacher.co.ke/
4. It is expensive per bit of memory 4. Secondary storage devices are cheap
dues to the technology involved
5. it has high storage capacity
6. It is volatile & therefore it is used E.g. punched cards, magnetic tapes, floppy
to store temporary programs & data disks, hard disks, etc
30. (a) State four functions of Read – Only Memory (ROM) It stores Firmware
(bootstrap instructions) - the essential files the computer uses while booting/ starting
up.
It stores the system data & instructions that are necessary for the normal
functioning of the computer hardware e.g. the Kernel / supervisor of the OS
It can only be read, but cannot be written to (i.e., the user can only read the
information in the ROM, but cannot write on it unless it is a special type of
ROM).
- Masked ROM
- Stores data & programs temporarily during the times when they are needed in the
https://Teacher.co.ke/
Main Memory (or during execution).
- Provides “read & write facilities” i.e. it allows instructions to be written, read out
& to be changed at will.
- The contents in RAM are user – defined, i.e. the user dictates what is to be
contained in the RAM
- It is a volatile memory
(b) Name the two types of RAM clearly starting their differences (3 mks)
A static RAM can retain its data/ content as long as power is provided to the memory
chips, i.e. it does not need to be re- written periodically
- Dynamic RAM can only hold its content for a short while even when power is
on.Therefore, in order to maintain its content/ data, a DRAM must undergo the refreshing
process (i.e. it must be re- written continually)
- SRAM chips are physically large & much more expensive than DRAM chips
- Dynamic RAM has a much higher packing density than SRAM, i.e., a DRAM chip is
able to store more information than a SRAM chip of the same size.
Flash Disk
(ii) List down two advantages of this device over a floppy disk in storage ( 2 mks)
- Optical card
- Optical tape
https://Teacher.co.ke/
34. (a) State the two types/ forms of computer output
- Softcopy
- Hardcopy
- Monitors
- Printers
- Plotters
- Sound cards
Digital projectors
- Storage devices
- Used to display the results of all the data that has been processed from the
computer
- It converts machine- coded outputs results from the processor into a form that can
be understood by people
(b) Show two differences between a CRT monitor and a flat- panel display
not.
- Flat panel displays are light & easily portable, while CRT’s are
heavy
- The screen of a flat panel is much thinner & smaller than that of
a CRT
- Gas plasma
Pixels (picture elements) are dots on the screen that form characters and images
https://Teacher.co.ke/
(b) What role do pixels play in screen display?
(c) Give two advantages of the higher number of pixels per square
centimeter (2 mks)
Are usually low- speed printers that print one character at a time?
- Dot matrix
- Thermal
Daisy wheel
- Inkjet
- Golf ball
38. Distinguish between impact and non impact printers and give two examples
of each
Non- impact printers print either by laser, ink or thermal transfer mechanism & are silent, e.g.
Laser, Inkjet, thermal printer, electrostatic and xerographic
https://Teacher.co.ke/
39. (a) Distinguish between a line printer and a page printer
A page printer prints documents page by page, while a line printer prints documents line by line
- Economical in maintenance
- It is very silent
40. Highlight four factors one should consider when purchasing a printer (4 mks)
- Cost involved i.e. the printer’s buying price, cost of maintenance & cost
of consumable items like printing papers, ribbons/ cartridges
- Ease of maintenance
- Documentation
- Availability
https://Teacher.co.ke/
- One can receive the output even when a few meters away from the
computer
43. George connected new multimedia speakers to his computer and tried to play
his favorite music CD, but no sound came out. Suggest two problems that
might have occurred ( 2 mks)
(a) Port
A special kind of socket found at the back of a computer used to connect an external peripheral
device such as a printer, monitor, mouse, scanner, modem, flash disk, etc to the interface cards
inside the computer
These are special cables that connect all the peripheral devices to the motherboard and the CPU.
They transmit data signals and information to and from the devices
46. State the function of the power supply unit found in the system unit
(1 mk)
https://Teacher.co.ke/
47. (a) Name any two peripheral devices which get their power supply through ports
- Keyboard
- Mouse
(b) State the type of port that would commonly be used to connect the following devices
- Serial ports have 9 pins, while parallel ports have holes for 9 or 25 pins
- Parallel cables transmit several bits of data simultaneously, while serial cables
https://Teacher.co.ke/
transmit
- Serial cables allow for 2 ways communication (i.e. communication to and from the
computer and the device connected to it) while parallel cables usually offer 1- way
communication.
(b) Give two major advantages of a USB interface cable over other cables in the computer
- The USB port can be used to connect a wide range of peripheral devices due to its
common universal interface
49. Outline three precautions one should take when assembling a computer
- Disconnect all diverts from the power source before starting to work on them
- Never work alone because you may need help in ease of energy
- Discharge ant static electricity that might have built up on the hands by touching
an earthed metallic object and wearing an anti- static wrist member.
50. State six factors which you would consider when selecting computer hardware for an
organization
https://Teacher.co.ke/
- Portability (light to carry)
- User needs
- Multimedia capability
51. List down any four hardware components you can add or upgrade in a computer system
(4 mks)
- Processor (CPU)
- RAM memory
- Expansion slots
A warranty is an agreement between the buyer and the seller that spells out terms and conditions
of after selling a product in case of failure or malfunction.
A warranty is usually the duration in which your computer is supposed to work without any
problem.
In order to negotiate on sensitive items like duration, after sales services etc.
https://Teacher.co.ke/
- Duration (scope of cover)
- How comprehensive is the warranty- good warranty should cover all the parts of
the Computer.
- Liability agreement e.g. how long should the supplier take to repair a fault or
replace the product, and if he/ she delays, who bears the cost.
53. What are clones with reference to computers and what is their disadvantage?
Disadvantages
- They are not as reliable as their brand names like IBM, Compaq, Hewlett Packard (HP),
Dell, Gateway etc.
These are programs that are uniquely designed & written by the user or a software house under
contract, to meet the specific needs of a particular user or organization.
They are usually customized (tailored) to perform a specific job or solve only specific processing
tasks in one organization
- The user gets well tested program, which he/ she is able to use with confidence
- The program provides all the facilities required to solve a particular problem
- The purchaser has direct control over the package, as he/ she is involved in its
https://Teacher.co.ke/
Production
- The user is able to quickly implement the results obtained from the use of the
package
- They can easily be modified to meet specific user’s needs without involving
expert programmers.
- Single – purpose software is developed for only one purpose, while integrated software is
a suite of more than one program and can be used to carry out a variety of tasks
(i) Authenticity
It is the genuineness, validity or legitimacy of software. The copy of the software you buy should
be accompanied by the license and certificate of authenticity of the developer.
(ii) Portability
It refers to whether a program can be copied or installed in more than one computer
In hardware, the computer device should be sufficiently small & light to carry
In software, portability refers to whether a program can be copied from one computer to another
or installed in more than one computer.
58. (a) Explain why documentation is necessary for any software package
s, Exams, and Past Papers Visit
https://Teacher
For free KCSE
It contains details on how to install use and maintain the software. It also shows the purchaser how
the program can be used to solve particular problem as well as provide the user with assistance on
using the program.
(b) A firm intends to purchase new software. List three items of documentation that should
accompany the software
- A license
- Installation guide
- Reference manual
- Warranty
- Upgrades
- Service pack
CHAPTER THREE
OPERATING SYSTEM
ast Papers Visit
• Number of tasks
i) single tasking ii)
multi tasking
• Interface
i) command line ii)
menu driven interface
iii) Graphical user interface (GUI)
• Functions of files
Past Papers Visit
Application packages
Introduction
SE Notes, Exams, and Past Papers Visit
https:/
For fr
MS Windows, UNIX, LINUX, Macintosh (Mac OS) and OS/2.
- Loads application programs from an external storage into the available locations in the
Main memory (RAM)
- It keeps track (monitors) of the parts of the memory that are in use, and those which are
free
It schedules & loads programs in order to provide a continuous sequence of processing. This is
necessary when more than one application program is occupying the main storage
Management of CPU time In a multi- taking system where several user programs share the
computer resources, the processing is done according to the job priorities allocated and in a
continuous process until all the jobs in the queue within the memory are executed. This ensures
The OS controls the allocation of I/O devices and tries to resolve any conflicts that arise. It also
monitors the state of each I/O device and signals any faults detected
OS is concerned with the logical organization of the files in the computer & provides ways for https://Teacher.co.ke/
sorting, retrieving & sharing of the files
It also provides a means of protecting the data files & programs against unauthorized access and
corruption.
It controls the selection & operation of the hardware devices used for input, output & storage
It interfaces the user to the system’s hardware, i.e. it provides a quick means of communication between
the computer user and his programs
The OS keeps records (internal logs) on how the computer resources (e.g. CPU time, memory,
peripherals) are being used
It also keeps a complete record of all what happens during processing (usually in the form of a
printed log)
https://Teacher.co.ke/
2. Multitasking operating system: It allows a single CPU to execute more than one
program at a time
Classification according to number of user
1. Single user operating system: Can only be used by one application at a time e.g.
Windos95/98, MS DOS.
2. Multi-user/ multi-access operating system: can be used by more than one use at a time
e.g. UNIX, LINUX, Windows NT/2000/XP/VISTA, and Novell. Human
Computer Interface (HCI)
This is a method of interaction between the user and the computer.
1. Command line interface: The user interacts with the computer by typing the
command in the command prompt then pressing the enter key for execution.
2. Menu driven interface: They give the use a list of options to select from 3.
Graphical user interface: It represents commands in form of graphics or icons.
https://Teacher.co.ke/
Two types of Windows
1. Application Window: Screen that appears when an application program is opened. 2.
Document window: this represents the work area File
Common storage unit in a computer where
Types of files
System files: files that contain information required for the operation of the computer
Application files: Files that hold programs or start an application.
File Extensions
Importance
Examples
DAT- data
TXT- text
DOC- document
XLS- excel
SYS- system files
COM- command file
BAK- back up
PPT- PowerPoint
BAT- batch file
Folder/ directory: A named storage area created for storing files for easy access.
Subfolder: divided folder
Windows desktop: This is the first screen after successful booting.
Desktop Elements
Icons: This is the graphical/ pictorial representation of items.
Taskbar: It allows the user to switch between different files and
programs. Start button: It displays the start menu.
Task manager: Display buttons of the current running tasks.
System tray: Has icons of tasks running in the background but not displayed on the screen.
Restore/ maximize: It stretches a window to cover the entire screen or return to the original
screen. Close button: Exits the document but not the application. Menu bar: provides a list of
commands inform of buttons. Toolbar: represents shortcuts to menu commands.
Work area/ document window: Where data is being entered.
https://Teacher.co.ke/
Disk management
Formatting: Preparing a disk for use by imprinting tracks and sectors.
Scanning: -scanning for virus
-scanning for errors: SCANDISK: Check up for minor storage problems e.g. lost storage location
or damaged surface
Defragmenting: Re-arranging scattered folders to speed up access and retrieval.
Compressing: Squeezing disk contents to free space on the media.
Backing up data: Creating duplicate copies of data on separate storage device for security
purposes.
Boot up (start-up)/ system disk: System disk created to start the system in case the components of
starting up fail or when the hard disk is seriously damaged. The booting instructions are copied
on the disk.
Portioning: Subdividing a large physical disk into two or more partions called logical drives.
Reasons for disk partioning:
https://Teacher.co.ke/
2. Insufficient system memory
3. Problems with hard disk boot sector may be due to virus infection
4. Corrupted window registry system
5. Due to interrupt request conflicts
End of topic
A set of computer programs that normally reside in the main memory and used to control
the basic computer hardware resources & the operation of the entire system
The main program that controls the execution of user applications, and enables the user
to access the hardware & software resources of the computer
2. Name the two latest operating systems from Microsoft corporation(2 mks)
- Windows XP
https://Teacher.co.ke/
- Windows Vista
In a multi- taking system where several user programs share the computer resources, the processing is
done according to the job priorities allocated and in a continuous process until all the jobs in the queue
within the memory are executed. This ensures that the CPU does not remain idle at any given time.
4. What is an interrupt?
An interrupt is break from the normal sequential flow of instructions processing in a program
https://Teacher.co.ke/
The number of users they handle
The number of tasks they execute concurrently
Human computer interface
6. Giving an example in each case, explain the following types of operating systems
(a) Single – user / single tasking
A system that allows only one user to run one user program at a time in an interactive, conversational
mode. E.g. Ms- DOS, PC- DOS.
7. A computer user may interact with a computer either through Graphical User Interface
(GUI) or though typed commands
(a) Give one advantage of using GUI based operating system over a command line interface
( 1 mk)
User friendliness
Easy to learn & use even by those who do not have much knowledge about them
(b) Window
https://Teacher.co.ke/
A rectangular area on a computer screen in which text, graphical images or the contents of a folder or disk
may be displaced
(c) Icon
A little picture on the computer screen representing a program, disk file folder or any other item
(d) Sidekick menu
A submenu that appears either on the right or left of a main menu
(e) Taskbar
A long bar/ strip that runs across the desktop and displays the start button and any other active tasks.
(f) Task
Any activity taking place in windows and is displayed on the taskbar, e.g. running program
(3 mks)
11. State two differences between Disk Operating System (DOS) and Windows operating
system ( 2 mks)
DOS Windows
(i) Single - tasking (i) Multi- tasking
(ii) Single- user (ii) Multi- user
(iii) Command driven interface (iii) Graphical User Interface
(iv) Not easy to use (iv) User friendly
12. Identify three factors you would consider when choosing an operating system for use in a
computer ( 3 mks)
(i) Hardware configuration of the computer, e.g. RAM memory size, Hard disk capacity, type of
processor, etc
(ii) Basic design of the computer – It is an IBM compatible, or apple computer?
(iii) Hardware compatibility
(iv) User (type of work to be done), i.e. the applications intended for the computer
https://Teacher.co.ke/
method of operating the computer
13. Explain how windows organizes information in reference to files and folders
It stores related data & information records into files, and related files into folders & subfolders
14. (a) Distinguish between systems files and application files ( 2 mks)
System files hold critical system information while application files hold programs data
(b) State the extensions used signifying the following file types (2 mks)
(i) Driver or system file - DLL, SYS, INI
(ii) Batch file – BAT
15. (a) List and explain down the three parts of the windows Taskbar ( 3
mks)
(b) Outline the procedure of renaming a file or folder using windows operating system
(3 mks)
Method 1:
In an explorer window, right- click the file/ folder you want to rename
Choose Rename from the shortcut menu that appears
Type the new name, then press Enter
https://Teacher.co.ke/
that you can turn on or off. When the checkbox is selected, a selected, a checkbox ( or
)appears in the box
Radio button – a round button that can either be blank or can contain a dot. If the button
contains a dot, it is selected.
Pull down menu – A box with a downward – pointing triangular button at its right end
(). When the triangular button is clicked, it displays a menu. Command button- A
button that can click to carry out or cancel the selected action. E.g.
The F2 directory has the files: classlist.doc, Districts.xls, and the tribe.mdb. Write down the path of
accessing the Districts. xls file.
(ii) Explain two methods you can use in windows to back up data into a storage device
(2 mks)
- Using copy and paste commands on the Edit Menu
- Using the send to command on the file menu
- Using the backup facility to compress the data into another disk
(b) Identify two reasons why a user needs to know the space available for data storage in the hard
disk
- To know the amount of data that can be stored in the hard disk
- To know how much space is left in the hard disk in case a new programs needs to be installed -
To detect the likelihood of a virus infection
20. Name the command one would use to repair cross- linked files in graphical user interface
software ( 1mk)
Scandisk
21. (a) Explain the team Disk Defragmenter, and give two advantages of this feature ( 3 mks)
Disk defragmenter is a tool that is used to re- arrange scattered files & folders on a storage media
Advantages
- Rearranges scattered folders & files on storage media
- Reduces the time by the read / write head to locate files or folders on the storage media this speed
up access to files & folders, hence, makes files to open more quickly
- Consolidates related data close to each other, hence, frees space on the storage media
24. A Form four computer student is attempting to print a programming documentation. The
printer is not responding to the print command. Explain three possible causes for the anomaly.
(3 marks)
- The printer may not be installed.
- The printer may not have been set as the default printer.
- The data interface cable to the printer could be loose. Make sure it is firm at the ports.
- The printer could still be off. Switch it on, and it will start printing.
- The wrong printer could have been selected. Select the right printer in the print dialog box and
send the print job again.
CHAPTER FOUR
APPLICATION PACKAGES
Application packages include the following:
Word processors
Spreadsheet
Database
Desktop publishing
Specific Objectives
Content
i. Creating a document
ii. Saving iii.
Retrieving iv. Closing
v. Exiting
• Proof-reading
i. Spelling and grammar checking ii. Thesaurus iii. Auto-correct iv. Undo and
redo For free KCSE Notes, Exams, and Past Papers Visit
• Formatting a document
a) Text formatting
b) Paragraph formatting
c) Page formatting
Layout
i) columns
iii) headers/f
ters
Setup
i) Margins
ii) Orientations iii) Paper size
iv) Tabs
• Create a table
i) Rows ii)
Columns
• Enter data
• Editing tables
• Formatting tables
For free KCSE Notes, Exams, and Past Papers Visit
• Table conversions
i) Converting text to table ii) Converting table to text iii) Importing
• Arithmetic calculations
https://Teacher.co.ke/
i) Perform calculation
ii) Insert formulae
• Sorting
• Types of graphics
i) Drawing ii)
Pictures iii)
Charts
• Inserting
i) importing ii)
drawing
ast Papers Visit
Introduction
Definition
This is the creation of long document, reports, memos etc.
Main types of Word Processors
1. Dedicated: This word processor is the only program in the computer.
2. Non-dedicated: the word processor is among other programs installed in that computer.
Hyphenation: The way the word processor detects if the last word on a certain line will fit if not
it adds hyphenation after the first words then part of word in argument is pushed at the beginning
of the next line.
Indentation: Way lines(s) start and end from the normal starting or ending point by the use of
https://Teacher.co.ke/
Tab key indent tools from format command in the main menu. Ways of indenting;
Indenting a paragraph from the left margin
Indenting the first line of a paragraph from the left margin
Hanging indent
Indenting a paragraph from the right margin
Bolding: Increasing the intensity of text such that when printed it appears darker than normal
text.
Blocking: Separating part of text by highlighting so that any issued command affects the
highlighted text.
Orphan: The last line in the last paragraph of a page that becomes the first line on the next
page after the first page is filled up.
Widow: First line in the last paragraph of a page that becomes the last line on that page while
the other part is moved to the next page after the first page is filled up.
Softcopy: Document that is in computer memory or the screen where changes are applicable.
Soft return: Situation where the cursor automatically moves to the next line before it reaches the
end of the current line.
Hard return: Situation where the user forces the cursor to move to the beginning of the next
Soft page: Automatic page ending as per the settings that comes when one page is filled up.
Hard page: Forced page ending before the current page is filled up.
Continuous stationery: Situation where the printer uses rolls of papers therefore one does not
need to keep on inserting a paper after the other.
https://Teacher.co.ke/
Preprinted stationery: One needs to insert a paper after the other is printed.
Toggle switch: How word processor behaves depending whether certain keys are on or off like
Insert and the Caps Lock keys.
Paper Orientation
Portrait
Landscape
Editing a Document
Deleting text
There are many ways to accomplish this operation highlighting the text then right click the
highlighted text and choose delete or press delete key.
Backspace Key: Deletes text on the left side of the cursor position.
Delete key: Deletes text on the right side of the cursor position.
Find and replace: Fast way to search for a word in the document and if necessary replacing it
with another word.
Spelling and grammar: Press F7 or go to Spell checker to correct wrongly spelled words and
incorrect grammar
Thesaurus: Used to search for words with similar meaning (synonyms) or with opposite
meaning (antonyms).
Autocorrect and autotext: Autocorrect automatically corrects wrongly spelled word during
data entry while autotext completes words when the user types in the first letters of a word.
Undo and Redo: Undo (CTRL+Z) automatically cancels the last action done by the user while
Redo (CTRL+Y) automatically reverses the last command or action undone by the user.
Formatting Document
Text Formatting
Changing the font type, size and colour
Changing the case
Uppercase: automatically changes the highlighted text into capital letters.
Lowercase: automatically changes the highlighted text into small letters.
Sentence case: automatically makes the fast letter of a sentence to a capital letter.
Toggle case: automatically changes capitalized letters to small letters and vice versa.
Superscript and subscript
Press (CTRL+SHIFT++) for superscript option or (CTRL+=) for subscript option.
Paragraph Formatting
Alignment or Justification
Full: All lines in a paragraph start at the same point and end at the same point.
Left: All lines in a paragraph start at the same point but end at different point.
Right: All lines in a paragraph start at different points but end at the same point.
Centres: All lines in a paragraph are centered along the page.
Line spacing
Tab setting and Indents
Indenting a paragraph from the left margin
Indenting the first line of a paragraph from the left margin
Hanging indent
Indenting a paragraph from the right margin
Indenting from both margins
ms, and Past Papers Visit
The Word 2013 program window, displaying a document and the standard program window
elements.
The Backstage view, where you can manage files and customize the program.
End of topic
-Microsoft word
-WordPerfect
-Lotus WordPerfect
-WordStar
-WordPad
2. Give three comparisons of the traditional method of typing a document on a
s://Teacher.co.ke/
4. Explain the difference between overtypes and insert mode in word processing
(2mks)
Type over deletes the current text at cursor position and inserts new text.
Inserting pushes the old text away as new text is inserted at cursor position.
5. Veronica tried to retrieve a document file following all the steps correctly. The
filename did not appear in file list box. State three causes for this. (3mks)
- The file may not have been saved
- The file may have been deleted
For free KCSE Notes, Exams, and Past Papers Visit
- The file may be located in a different folder from the one she was trying to
retrieve from (or may have been moved).
- The file may have been destroyed by a computer virus.
6. Mwikali selected a paragraph in word processing. Explain what happened after pressing
the following keys on the keyboard: (3mks)
https://Teacher.co.ke/
i) CTRL + B -Changes the paragraph to bold/removes bold from paragraph ii) CTRL
+A -the whole document is selected iii) CTRL+ U -the selected text is
underlined/removes underline from the selected text.
7. Precisely explain the role of the following editing features of a word processor;
(3mks)
i) Find and replace -To find words that you want replaced by others ii) Undo and redo- Undo
reverses the previous/latest action, while redo does the undone action
iii) Thesaurus -It gives suggestion of words or phrases with similar meaning (synonyms),
and sometimes antonyms to the selected word.
iv) Autocorrect-It checks for wrongly spelled words, and automatically replaces them with
the correct ones as set by the user.
8. Give the steps you would use to find and replace the occurrence of a particular word in
Microsoft Word. (4mks)
- Click on edit, select find (or replace)
- Type the word you want to replace with in the replace with box
- Click replaces or Replace all if you want to replace all the occurrences of that word in
your document at once.
9. Name and explain the use of any three buttons found in a spell-check dialog box (6mks)
Change: Accepts the current selection in the suggestions box
Ignore Once: Leaves the highlighted error unchanged (if the highlighted
word is a valid word) & finds the next spelling or grammar error
Ignore all: retains all the occurrences of the same word or phrase in the document from another
language, e.g. a Kiswahili.
Add: Adds the highlighted word in the Suggestions box to the Custom dictionary.
10. Clearly explain the meaning of the following terms as used in word processing:
(7mks)
19. Give a reason why it may be necessary to merge cells in a table. (1mk)
To create larger cells in a table without increasing the height or width of the existing cells.
23. Outline any three main features that make word processors popular
programs.
(3mks)
• Saving of documents for future reference
• Printing of multiple documents after editing
• formatting of documents into required form
• Mailing features such as mail merging of standard document with another saved
file.
http
For
Spreadsheet
Specific Objectives
By the end of the topic, the learner should be able to: a) Define a spreadsheet;
b) Describe the components of a spreadsheet;
c) State the application areas of a spreadsheet;
d) Create and edit a worksheet;
e) Explain different cell data types;
f) Apply cell referencing;
g) Apply functions and formulae;
h) Apply worksheet formatting;
i) Apply data management skills; j ) Apply charting and graphing skills; k) Print worksheet and
graph.
Content
a.) Definition of a Spreadsheet
b.) Components of a spreadsheet
i. Worksheet
ii. Database
iii. graphs
c.) Application areas of a spreadsheet
• Statistical analysis
• Accounting
• Data management
• Forecasting (what i f analysis)
• Scientific application
d.) Creating a worksheet/workbook
• Getting started
• Worksheet layout
• Running the program
i. Creating a worksheet
• select printer
• selection
• worksheet/workbook
• orientation
• pages and copies
v) Printing
Introduction
Definition
An essentially large sheet that lets you enter, edit and manipulate numerical data.
Types of Spreadsheet
Manual
Electronic
Examples of Spreadsheet
Lotus 123
VisiCalc MS-Excel VP Planner
Components of a Spreadsheet
1. Worksheet: where data is entered. It consists of cells, columns and rows.
2. Database: Does the actual management of data e.g. filtering records, using forms, calculating
subtotals, data validation, pivot tables, pivot charts and reports.
3. Graph and charts: Pictorial representation of the base data in a worksheet.
Types of charts
Line, bar, column, pie, scattered, histogram,
Legend: A key that explain what each colour or pattern of data representation in a chart means.
2. Accounting: Recording daily transactions and keeping of financial records. Also in; 3.
Track the value of assets overtime (Depreciation and Appreciation).
4. Calculate profits
5. Prepare budgets.
6. Data management: Sorting, filtering data, calculating subtotals, and using forms.
7. Forecasting/ What if analysis: Changing values of a cell or argument in a formula to see the
difference the change would make to the calculation results.
Worksheet Layout
Cell: Intersection between a row and column.
Rows: Horizontal arrangement of cells.
Columns: Vertical arrangement of cells.
Range: A group of rectangular cells that can be manipulated as a block.
Cell Referencing
Identifies a cell or range of cells on the worksheet and shows MS-Excel where to look for the
values or data needed to be used in a formula.
1. Relative cell referencing: The formula keeps on changing automatically depending on the
position on the worksheet.
2. Absolute: Cell reference that is always referring to a cell in a specified location of the
worksheet even if they are copied from one cell to another.
number.
A1 style R1C1
B2 R2C2
C2 R10C3
E20 R20C5
Data Management
1. Sorting
2. Filtering data: Quick and efficient method of finding and working with a subset of data in a
list.
3. Auto filter: Uses simple criteria and include filter by selection
Logical Functions
1. If: Returns a specified value if a condition is executed and found to be true and another
value if it is false.
2. Count if: Counts a number of cells within a specified range that meet the given condition of
criteria. Example A10:E10 contain eggs, in cell 6, 5 and 2 =COUNTIF (A10:E10,”eggs”)
will return 3.
3. Sum If: Adds values in the specified cells by giving a condition or criteria. Example
A10:E10 contain 10, 50, 60, 30, 70 sum all values greater than 50 =SUMIF
(A10:E10,”50”) returns 180.
Mathematical Functions
1. Sum: Adds values in a range of cells as specified and returns the result in a specified cell.
2. Product: Multiplies values in a range of cells as specifies and returns result in a specified
cell.
Order of execution
End of topic
An electronic spreadsheet;
- Has a large worksheet for data entry & manipulation as compared to manual
worksheet
- Has inbuilt formulae (called functions) that are non-existent in manual worksheets
- Uses the power of the computer to quickly carry out operations
- Has better document formatting & editing qualities than a manual worksheet
- Utilizes the large storage space available on computer storage devices to save &
retrieve documents.
- Can easily be modified, while manual spreadsheets involve a lot of manual
calculations & are very difficult to amend
- The user can very quickly & efficiently perform complicated computations using
the information stored in an electronic spreadsheet.
- Enables the user to produce neat work
- Offers graphical representation of data leading to comprehensive decisions.
- It is accurate in its calculations & allows automatic recalculation on formulae.
For a manual worksheet, changing one value means rubbing the result & writing
the correct one again.
4. Explain five application areas where spreadsheet software can be used.
(5mks)
i) Accounting: - spreadsheet software can be used by accountants to record
their daily transactions & also keep financial records, e.g. they can record
sales & purchases, produce invoices, compile financial statements, calculate profits, prepare
budgets, etc.
ii) Data management: - a spreadsheet enables data & information to be
arranged neatly in tables, produced easily and also kept up-to-date, e.g. one can edit, save , sort,
filter, use forms to enter and view records, and worksheet data.
iii) Scientific applications: - spreadsheets can be used by scientists &
researchers to compile and analyze their results.
iv) Statistical analysis: - spreadsheets provide a set of statistical
Functions/tools that can be used to develop complex statistical or engineering analyses, e.g.,
teachers can compile their students’ marks and produce results.
v) Forecasting: - using the ‘what if’ analysis technique, spreadsheets can be
used to find out the effect of changing certain values in a worksheet on the
other cells. This helps in financial forecasting, budgeting, etc.
5. State five features of spreadsheets that are useful in financial modeling. (5mks)
Have inbuilt functions & formulae which can be used to perform most mathematical statistical,
trigonometric or financial calculations
• Allows automatic recalculation on formulae
• #have ability to perform ‘what if’ analysis, which can be used to find out the
effect of changing certain values in a worksheet on the other cells
• Have the ability to sort & filter data
• Have a data validation facility, which ensures that the correct data is entered into
the spreadsheet.
• Have a chart facility that can be used to draw Line graphs, Bar charts, Pie charts,
Histograms, etc.
• Some spreadsheets have a SOLVER facility that is used to uncover the best uses
of scarce resources so that desired goals such as profit can be maximized, or
undesired goals such as cost can be minimized.
• They enabled printing of entire worksheets, portions of a worksheet or several
worksheets within the shortest time possible
• Have the ability to summarize data using Consolidation and Pivot tables.
i) Columns
These are the fields that make up the worksheet of a spreadsheet, and are identified
by letters.
They run vertically from top downwards
ii) Rows
These are the records that form a worksheet, and are identifies by numbers. They
run horizontally from left to right.
iii) Cell
A box formed when a row & a column intersect in a worksheet where the data is entered 7.
Explain the following concepts as used in spreadsheets: (4mks)
i) Automatic recalculation
This is whereby an electronic spreadsheet will adjust the result of a formula automatically when
the values are changed, so that they correspond with the different input.
b) For each of the following, state the type of cell reference. (4 mks)
i) A5 Relative reference
ii) $F$5 Absolute row reference (only the row reference is absolute) iii) H$21
Absolute column reference (only the column reference is absolute)
Database
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define a database;
b) Explain the concepts of a database,
c) Explain data organization in a database;
d) Create a database;
e) Edit a database;
f) Design a form;
g) Apply basic concepts of queries;
h) Create report and labels;
i) Print queries, forms and reports.
Content
a.) Definition of Database
b.) Database concepts
• Traditional filing methods (manual flat files)
• Functions of databases
• Types of database models
• Database software
• Features of a database (e.g. data structures,
report generating, querry language,modules)
Introduction
Definition of Database
Collection of structured and related data items organized to produce a consistent and controlled
access to the items.
NB: Database Management Software (DBMS) facilitates the creation, organizing and
management of databases.
3. Data can be shared- data requirement can be satisfied even without necessary creation of a
new file.
4. Offers security by restricting unauthorized access.
5. Data integrity is maintained- the accuracy of data.
6. Data independence: the immunity of the application to changes in storage and access
strategy.
Database Models
1. Flat files: They hold only one set of data and is not any different from the manual files.
Example is the library catalog.
2. Hierarchical models: Arranged in hierarchical (text) form i.e. To access level two data one
has to first access level one data items.
3. Networking models: Links or paths are used to express the relation between different data
items forming a network of items.
4. Relational model: Related data items are stored together in structures called relations or
tables.
Relationships created between records of different tables.
5. Object Oriented Model: Database is a complete program built to hold a collection of objects
which have both properties and behavior.
Field Properties
1. Field size: Allows user to set the number of characters in a field.
2. Format: Determines how information appears on screen and when printed.
3. Decimal places: Used for number or currency fields, and to specify the number of
decimal places.
4. Input Mask: Automatically formats field entry into specified format.
5. Caption: A more descriptive name for a field to be used in a table.
6. Default value: A value that will automatically appear in datasheet if nothing is entered.
7. Validation rule: Logical expression that restricts the value to be entered in a field.
8. Validation text: Message that appears when the validation rule is violated.
9. Required: Determines if an entry must be made in a field before you proceed to the next
field.
10. Allow zero length: Allows the users to proceed without making any entry in fields set
as zero length.
11. Indexed: Facilitates the organization of records for easy search.
12. Primary key: Enforces uniqueness in a table so that one record isn’t entered twice.
13. Index: Used to speed up search and sort operations in a table.
14. Foreign Key: A key in a child table which is a primary key in a parent table.
Input mask
Caption
2. Referential integrity: Governs the nature of records in a one to many relationship between
tables in the database.
-All foreign keys in child tables must have a matching field in a parent table.
a) Restricted database- the system deletes or updates a parent record if there are no
matching records. A parent record has a primary key and a child record has a foreign
key of the relationship in the second table.
b) Cascades database- deletes or updates all matching child records when the parent
record is deleted or updated.
3. Domain integrity: Ensures no field takes on a value outside the range of valid values. Format
Validation rule
Validation text
Indexed
Query Criteria
Relational operations: >, <, <=, >=, <>, and =.
Wildcards: *(asterisk) and #.
Logical operators: AND, OR and NOT.
LIKE and BETWEEN: relate or display values within a range.
End of topic
If not ask a teacher, friends or anybody and make sure you understand before going to
sleep!
2. State the components of a Database hierarchy in ascending order. (2mks) Character (alphabets,
numbers and special characters)
Sorting involves arranging of records in a logical order in the database. It can either be in
Ascending or descending order.
8. Differentiate between:
i) Primary key and relationship (2mks)
Primary key is a field or a set of fields that can be used to uniquely identify each individual
record in a table. It is used to relate a table to the foreign keys in other tables.
9. State three types of relationships that can be used to link tables in databases.
(3 mks)
• One-to-One
• One-to-many
• Many –to-Many
10. Explain how ‘parents’ and ‘child’ tables are related in relational database. (4mks)
A parent table is the one that has the primary key of the relationship, while a child table is the
one that has the foreign key of the relationship.
Parent and child tables are related through a common field that links the two tables. Records in a
child table relate to one record in a parent table.
11. a) Describe four major shortcomings of the conventional (paper )file structures
that are being addressed by the database approach. (4mks)
• Unnecessary duplication of data
• Boredom & time wastage especially when searching for a particular item
• In order to carry out any file processing task(s), all the related files have to be
processed
• Misleading reports due to poor data entry and organization
• Difficulty in sorting, retrieving & updating records
• Security: no protection of files against unauthorized access and corruption
Sharing of files is difficult
• Some information resulting from several files may not be available.
12. The following car details are to be entered in a database: Make, Date-ofmanufacture,
colour, and cost.
a) Prepare a suitable database structure showing field names and their field data types
(5 mks)
Field name Data type
ID (Primary key) Auto Number
Make text
Date of manufacture Date/time
Colour Text
Cost Currency
b) Explain how you index the data such that cars of the same make and colour are together.
(2mks)
Create a query to show same make and colour
c) Write a statement that can be used to select cars of colour green. (2mks) Create
a query. In the colour field, and in the Criteria row, write “green” d) Give an instruction
that would:
i) Select cars whose cost is between 500,000/= and 1,000,000/= (3mks)
Create a query. In the cost field, and in the criteria row, write “.>500000 and
<1000000”
ii) Determine the average cost of all cars. (3mks)
Create a query. Choose average of costs “Avg” option in the total section.
Specific Objectives
By the end of the topic, the learner should be able to: a)
Define desktop publishing;
b) State the purpose of DTP;
c) Identify types of DTP software;
d) Design a publication;
e) Edit a publication;
f) Format a publication;
g) Print a publication.
Content
a.) Definition of Desktop publishing
b.) Purposes of DTP
• Graphic design
• Page layout design
• Printing
c.) Types of DTP software
• Graphical based
• Layout based
d.) Designing a publication
Introduction
Definition
This is the production of publication work within the computer framework of art and design
They are used to develop, edit and format graphical objects. Examples of graphical
based software are: Adobe Photoshop, Corel Draw, Harvard Graphics e.t.c
Layout based software
Examples are Adobe PageMaker, MS-Publisher.
h
other.
Layering
The process of placing objects, text and graphical objects on one another.
Importance of Layering
To have presentable levels
publication
End of topic
b) Give any three examples of desktop publishing software available in the market
today. (3mks)
- Adobe PageMaker
- Adobe Photoshop
- Adobe illustrator
- Ventura
- Microsoft Publisher
- CorelDraw
- Harvard graphics
2. Identify four different types of publications that can be produced using desktop publishing
software. (4mks)
- Newsletters
- Newspapers
- Calendars
- Advertisements/Posters
- Magazines
- Certificates
- Notices
- Catalogues
- Pamphlets
- Books
- Brochures
3. Differentiate between the following:
Pasteboard is where text & objects are placed for editing before transferring them to the printable
area; Printable page refers to the area enclosed in margin guides.
(2mks)
Margins mark text areas on the page along the edges, while column guides divide
the page into several fields. They are used to define the printable area.
Change case is changing text from upper to lower case, sentence, title, or toggle case, while drop
cap refer to making the first character in a line bigger and drops down to occupy the space in the
lines that follow.
Tracking refers to changing the visual denseness or openness of characters in aline, while
Kerning is fixing particular pairs of letters that are too close or too far apart from each other. e)
A stroke refers to a line style, while a fill refers to applying background pattern such as shading
to a graphical object.
5. What commands are used in place of portrait and landscape page orientation in
PageMaker? (1mk)
i. Portrait-tall; ii.
Landscape-
wide
i. Rotating ii.
Skewing
iii. Reflecting
Text wrap is controlling the flow of text over or around a graphical object.
• Make the text jump the object to the next page or column
• Allow to text to jump over the object and continue on the same page Create a
Specific Objectives
By the end of the topic, the learner should be able to: a)
Define internet;
b) Explain the importance of internet;
c) Describe internet connectivity;
d) Identify internet services;
e) Access internet;
f) Use e-mail facilities;
g) State the moral, social and spiritual issues that may emerge through access to the internet.
Content
a.) Definition of internet
b.) Development of internet
c.) Importance of internet
d.) Internet connectivity
• Telecommunication facilities
• Modems
• Internet services providers (ISP)
• Internet software
e.) Internet services e.g.
• World Wide Web (www)
• Electronic mail (e-mail)
• Electronic Commerce (e-commerce)
• Electronic Learning (e-learning)
Introduction
Importance of Internet
Research activities
News and information dissemination
Leisure
Communication
Business transactions
Protocols
A set of rules that governs how two computers can send and receive data on the network.
Types of protocols are:
Transmission Control Protocol (TCP): Governs how data is transferred from one
computer to the next.
Internet Protocol (IP): Determines the addressing system on the internet.
Internet Architecture
Internet Services
6. News group
7. Searching: Google, Opera Mini, Yahoo, Excite, Alta Vista.
8. World Wide Web (www): Vast virtual space on internet where information pages called
websites is installed.
Website: Group of related web pages or other resources located on a web server.
Web portal: It offers specialized services like search, email, sports updates, financial news
and links to selected websites.
Blog: Website containing information that can be easily updated. It acts as resume diary
and may be used for business, advocacy and campaigns.
Multimedia: contains photos, movies, music, web TV, and internet radio.
E-mail Facilities
1. Mails
2. File attachment
3. Online meeting
4. Telephone messaging
5. Contact management
Advantages of Emails over Letters
End of topic
1. The first computer Network was set up by ARPA in the United States of
America. What is the full meaning of the acronym ARPA (1mk)
Advanced Research Projects Agency
2. Your manager wishes to be connected to the Internet. He already has a powerful personal
Computer (PC), a printer, and access to a Telephone line. However, he understands that
he will need a Modem.
State why a modem is required to connect him to the internet. (2mks)
A modem enables one to connect to the Internet and access information by transmitting data from
one computer to another across telephone lines.
3. The Internet connects millions of computers and telecommunication devices that have
different hardware and software configurations. For these incompatible devices to be
able to communicate, a protocols? (1mk)
A protocol is a set of rules that govern how tow computers can send and receive data on a
network
Special communication rule that government sending and receiving of messages by computers on
a network
b) Name the two most common protocols for the Internet, and state their functions.
(3mks)
Transmission control Protocol (TCP); - It governs how data is transferred from one place to
another
Internet Protocol (IP); - It is used to provide routing from one network to another (i.e. it enable
data to be sent& received by the different computers on a network)
4. a) Explain the following terms as used in internet:
i) Website ( ½ mk)
A collection /group of related Web pages belonging to an organization or
individual
ii) Browse/Surf the web. ( ½ mk)
Moving around and between the Web pages
5. a) What is meant by the term e-learning? (1mk)
This is learning through interaction with special programs on the computer.
b) A school intends to set-up an e-learning system. List three problems that are
likely to be encountered. (3mks)
- Lack of capital
- Lack of skilled manpower (required technology to run & support the e-learning
system)
- Spread of computer viruses
- Availability of pornographic material & literature to the students from the
internet.
A B C D
7. Discuss four advantages and two disadvantages that electronic mails have over
regular mails. (6mks)
Advantages
i) Cheap & economical: -It costs almost nothing to transmit and e-mail message
over the network. There is no need for stamps, envelopes, etc
ii) Secure;-Access to a user’s mailbox can be restricted by use of a password
iii) Faster: - The delivery of an e-mail message normally takes seconds or minutes
depending on the distance to the receiver.
iv) Efficient:- A message prepared only once can be sent to several people v)
Convenient: - with e-mail, one can send his/her messages when it is
convenient for him/her & the recipients can respond at their convenient times.
vi) Cheaper in preparing the message: - Most e-mail users accept less well-formatted
messages and slight typing errors are overlooked, unlike in business letters which are
expected to be error-free and formatted according to certain standards.
Disadvantages
- the initial installation cost is higher
- Messages may be lost before they can be read due to virus infection
- Messages may not be kept for future reference due to the high cost of storage
(2mks)
iii) Inadequate infrastructure: - Lack of infrastructures such as telephone services in rural areas
also hinders growth of internet access. Lack of electricity discourages people from installing
internets in their offices. iv) lack of awareness of the existence of such services by the public.
CHAPTER FIVE
Specific Objectives
Content
• Threats e.g.
i) virus ii) unauthored access iii) computer errors and accidents iv) theft
i) anti-virus
software ii)
password iii)
iv) backups
i) trespass
ii) hacking
iii)
tapping
iv)
cracking
i) audit trail ii) data encryption iii) log fries iv) firewalls
Introduction
Data and Information Security involves
Protection of data and information against unauthorized access.
Denial of data and information to unauthorized access. Provision
of data and information to authorized users.
2. Unauthorized Access
Types
1. Eavesdropping: Tapping into communication channels to get information.
2. Surveillance: Gathering information and use it for illegal purpose
3. Espionage: Spying to get information to use it to counter or finish another computer.
4. Theft
Control measures Employ guards
Burglar proofing
Reinforce weak access points
Install backup storages preferably out of the computer room
5. Computer Crimes
1. Trespass: Gaining access to information without permission.
2. Cracking: Guess work till one discovers weakness in security.
3. Hacking: Intentional breaking of codes and passwords to gain access.
4. Tapping: Sending an intelligent program to the host computer to get information.
5. Piracy: Making illegal copies of copyrighted software.
6. Fraud: Use of computers to cheat people with the intention of gaining money or information.
7. Sabotage: Illegal destruction of data and information with the aim of crippling service
delivery or causing great loss to an organization.
8. Alteration: Illegal changing of data and information without permission with the aim of
gaining ormisinforming the authorized users.
Concerns related to collection and use of private and confidential data are:
Spreading information without the owners consent or awareness
Spreading inaccurate information
Eavesdropping and taping of information from a communication line
Secretly recording and reporting user activities by using normal recording devices, spyware
and copiers
End of topic
Data security – the protection of data & information from accidental or intentional disclosure to
The use of computer hardware or software for illegal activities, e.g., stealing,
b) Explain the meaning of each of the following with reference to computer crimes.
(7mks)
i) Cracking – use of guesswork over and over again trying to look for
weak access points in software in order to get access to data & information
without permission with the aim of gaining or misinforming the authorized users.
3. Outline four ways of preventing piracy with regard to data and information.
(4mks)
- Enact & enforce copyright laws and other regulatory frameworks that
(2 mks)
Controlling the movement of storage media (e.g. floppy disks, flash disk, etc) in
Disabling the floppy disk drives ii) Explain how each of the two ways listen in b (i)
viruses. (2mks)
Antivirus software helps to detect and remove the viruses from the computer
controlling the movement of floppy disks ensures that infected disks are not
5. Computer systems need maximum security to prevent an unauthorized access. State six
• Lock the doors, (i.e. keep the computers in a strong room, which should remain
• Use of special voice recorders that would be able to analyse the voice of a
trespasser & check against the database containing the voice patterns of valid
users
• Enforce data & information access control policies on all employees to control
access to data
• Use file passwords to prevent any person from getting access to the electronic
files
6. Give four rules that must be observed in order to keep within the law when
- Should be collected, used & kept for specified lawful purposes (e.g., data should
- The owner of the data has a right to know what data is held by the person
- permission
- Do not collects irrelevant and overly too much information for a purpose.
- Name
- Date of birth
- ID. Number
- Residence
- Address
- Phone number
CHAPTER SIX
Specific Objectives
By the end of the topic the learner should be able to:
Content
a.) Concepts and Reasons of data representation
b.) Definition of terms: bit, byte, nibble and word
c.) Types of data representation.
• Number Systems and their representation of integral values
i) Decimal ii) Binary iii) Octal iv) Hexadecimal
'A
• Symbolic representation
i) Binary Coded Decimal Code (BCD) ii) Extended Binary Coded Decimal Interchange Code
(EBCDIC) iii) American Standard Code for Information Interchange Code (ASCII)
d.) Conversion between binary and decimal
e.) Binary arithmetic operations • Binary addition
• Binary subtraction
(i) ones complement
(ii) twos complement
Introduction
In this topic we will focus on the classification of computers according to their functionality:
1. Analog
2. Digital
3. Analog
In digital computers, the user input is first converted then transmitted as electrical pulses
called periodic that can be represented by two distinct states ON and OFF. The ON state may
be represented by a “1” and OFF state by a “0”. The sequence of the two states results to an
electrical signal that the computer can understand.
Digital
Signal Analog signal
In order for data to be exchanged via network the data is first converted to analog signals
during transmission (modulation) then the analog signals are converted to digital
(demodulation).
Base Conversion
Decimal to binary
Divide by 2 noting the remainder from bottom. For fractional part multiply by 2 while noting
the remainder from top.
Example
Convert the decimal number 7.562510 into its binary equivalent
Solution
Convert the two parts separately
Integral part
2 7
2 3R1
2 1R1
0R1 7 is equivalent to 1112
Fractional part
Read this digits
0.5625 x 2 = 1.125
0.125 x 2 = 0.250
0.250 x 2 = 0.500
0.500 x 2 = 1.000
Since the product of the last step of the fractional part is zero. We stop here.
0.5625 x 2 = 0.10012
7.5625 = 111.10012
Binary to decimal:
The integral part
First write the place values starting from the right hand side.
Write each digit under its place value.
Multiply each digit under its corresponding place value i.e. 2^ (from
0, 1). Add up the products. The answer will be the decimal number in
base 10. The fractional part
Multiply each digit under its corresponding place value i.e. 2^ (from -1).
Decimal to octal
Divide by 8 noting the remainder from bottom. For fractional part multiply by 8 while noting
the remainder from top. The answer is to base 8.
Octal to decimal
The method is similar to converting binary to decimal but using 8 instead of 2.
Binary to octal
Divide the binary numbers in pairs of three from the right side. Then multiply each digit by its
place value i.e. 2^. The answer is to base 8.
Octal to Binary
Divide each digit by 2.
Decimal to Hexadecimal
Just like the process done in converting decimal to binary but using 16. The answer is to base
16.
Hexadecimal to decimal
Like binary to decimal conversion but using 16^. The answer is to Base 10.
Binary to Hexadecimal
Divide into four parts, then multiply each digit by the place value of 2^, answer to base 16.
Hexadecimal to Binary
Divide each digit by 2. Answer to base 2.
4
Only 64 or (2 ) characters can be represented.
3. Signed Magnitude
In decimal numbers, signed number has a prefix “+” for a positive number and (-) for negative
number may be represented by prefixing a digit ‘1’ to the number while a positive number may
be represented by prefixing a ‘0’ ie.
1710 100012 (unsigned)
-1710 To indicate it’s a negative number we add an extra bit (1) 100012
+1710 To indicate the positive number we add an extra bit (0)100012
Binary Arithmetic
Binary Addition
Binary addition rules
A+B SUM CARR
0+0 0 Y 0+1
1 0
1+0 1 0
1+1 0 1
1+1+1 1 1
Binary Subtractions
Rules
A-B DIFFERENCE BORROW
0-0 0 0
0-1 1 1
1-1 1 0
1-1 0 0
1 1
000000012
000001102
End of topic
signal. (2mks)
(4mks)
value.
iv) word - The total number of bits that a single register of a particular
.co.ke/
https://Tea
For free K
machine can hold
- Devices designed using binary logic are simple, more reliable & consume less
energy.
5. Distinguish between Binary and Octal number systems, and give an example of each.
(2mks)
Binary (base 2) system has just two states usually called “ON” and “OFF” or “0” and
“1”, Octal (base 8) system has eight different characters, I.e, 01234567.
6. Perform the following computer arithmetic. In each case, show how you arrive at your
answer.
i) 4510 (2mks)
2 45 Rem
2 22 1
2 11 0
2 5 1
2 2 1
2 1 0
1 1
4510 = 1011012
2 4 Rem
2 2 0
2 1 0
1 1
=0.112
0.75 x 2 = 1.50 1
0.50 x 2 = 1.00 1
= 1002 = 100.112
(7x81) + (7x80)
56 + 7 = 6310
2 63 Rem ` =1111112
2 31 1
2 31 1
2 15 1
2 7 1
2 3 1
1 1
2 4 Rem
2 2 0
2 1 0
1 1
410 = 1002
1002
112 +
1112 1112
3 Rem
2 1 1
1 1
310 = 112
= 1407F16
7 6 7
7x82 + 6 x 81 + 7 x 80
448 + 48 + 7 = 50310
16 31 7
16 1 15
1 1
8. Use One’s compliment to solve the following the following sum: - 5 10 (2mks)
2 5 Rem
2 2 1
2 1 0
1 1
2 34 Rem
2 17 0
34 10 =1000102 (2mks)
2 8 1
2 4 0
2 2 0
2 1 0
b) 7.125 10 to binary
1 1 (2mks)
2 7 Rem
2 3 1
2 1 1
1 1
=1112
0.12 x2 0.250 0
= 0.0012
= 111.0012 (1mk)
25 24 23 22 21 20
1 0 1 1 0 1
=32 + 8 + 4+ 1
=4510
=2+0½+¼
7 0 2
= 32.12310
7 A B
22 21 20 21 20 21
000 111 0 11 . 0 1 0
=73.28
8 57 Rem
8 7 1
8 7 1
2 7 7
0.4 x 8 = 3.2 3
=718 71.318
11100111
00101110 +
101012
1102
11112
000010002 - 000001012
Step 2: Add the binary equivalent of the first value to the Two’s complement of
11111011 +
12. 16Convert
2+ 161 160 7AE
(2mks)
7 A E
Step 1
2 1008 0
Step 2 504 0 2
2 252 0
2 126 0
2 63 0
2 31 1
2 15 1
2 7 1
2 1 1
1 1
403310 = 1111110000012
iii) ASCII -American Standard Code for information Interchange iv) EBCDIC
CHAPTER SEVEN
DATA PROCESSING
Specific Objectives
Content
• Data collection
• Data input
• Processing
• Output
c.) Description of errors in data processing e.g.
• Transcription errors
• Transposition
• Manual/conventional
• Mechanical
• Electronic
• Accuracy
• Timeless
• Relevance
• Master
• Transaction
• Report
• Sort
• Backup
• Reference
• Sequential
• Random/direct
• Serial
• Indexed sequential
• On-line
• Distributed
• Time-sharing
• Batch processing
• Multi-processing
• Multi programming/multi-tasking
• Interactive processing
• Real-time
Introduction
Definition
This is the process of transforming data into a meaningful output i.e. information.
Data Processing Cycle
Data Collection
Processing
Data Output
This is the final activity of data processing cycle which produces the information. Ways
of data dissemination
Electronic presentation over media or television
Distribution of hard copies
Broadcasting the message over the internet Mobile
phones
Data Integrity
The accuracy and completeness of data intended in a computer or received from the
information system. Data integrity is determined by;
1. Accuracy: whether the data is true or false.
2. Timeliness: This relays the availability of data in time or whether it is already outdated.
3. Relevance: Consider whether the expected output meets the processing cycle
requirements, the daily operations and the decision making.
4. Audibility (Verifiability): Ability of the user to check the accuracy and completeness of
information.
Computer Files
Definition: A collection of related records that give a complete set of information about a
certain data item.
Advantages of a computer files
Information takes less time than manual system
Enhances integrity and reduces item duplication
Offers faster data access and retrieval
It’s much easier to update and modify easier
Entire file must be accessed even when the activity rate is very low.
Random enquiries are impossible to handle. Data redundancy is typically high.
Advantages
Resources can be accessed sequentially or randomly
Records are not duplicated
Accessing of records can be fast if done randomly
Disadvantages
Storage media is rather expensive
Accessing records sequentially is time consuming
Processing records sequentially introduce redundancy
Application Banking
Stock exchange
Stock control
Water/electricity billing
Advantages
Files are maintained up to date.
Information is readily available for current decisions.
Files enquiries are possible through terminals (workstations).
Disadvantages
Systems are complex to develop.
Costly in terms of hardware, software, storage media e.t.c.
2. Real-time: Process incoming data as soon it occurs, updating transaction file and
giving immediate results.
Application
Air reservation
Hotel reservation
Chemical plant processing
Advantages
Information is readily available for instant decision making.
Provides immediate control.
Fast and reliable information.
Disadvantages
Requires complex and expensive operating system.
Aren’t easy to develop.
Require Front End Processors (FEPs) to relieve the central processor.
3. Distributed: Divides processing task to two or more computers on separate sites
connected by data transmission media.
Application
Banks where customers can be served from different branches but information is
updated at head branch.
Advantages
Less risk to system breakdown.
Incase of data loss, only a small portion of data is lost.
Reduces the load on the host computer hence faster processing.
Disadvantages
Requires more expensive CPUs.
Operating system is complex and more difficult to operate.
4. Timesharing: Terminals are connected to the central computer are given access to the
CPU apparently the same time.
Application Bureau
Companies
Learning institutions
Advantages
Better services to users, for information/ output are fast.
File enquiries possible since files are held online.
User interaction possible through terminals.
Disadvantages
User has no control over the central computer.
Not reliable with regard to data security.
Response time is slow wher there are many tasks.
5. Batch: Data is accumulated as a group (batch) over a specified period of time then
processed
Application
Payroll processing
Advantages
Simple to develop
Timing reports is not a necessity
Advantages
Increase productivity of computer reducing CPU idle time
Reduces incidence of peripheral bound operations
Disadvantages
Requires more expensive CPUs
More sophisticated software is required to maintain data integrity.
End of topic
Data
Data Input
Data
Output of
• Data collection involves getting the data/facts needed for processing from the
point of its origin to the computer
• Data collection involves getting the original data to the ‘processing centre’,
transcribing it, converting it from one medium to another, and finally getting it
into the computer.
• Data creation
• Data transmission
• Data preparation
• Input validation
• Sorting
4. a) Explain the relevance of the term garbage in garbage out (GIGO) in reference to errors
in data processing. (1mk)
The accuracy of the data entered in the computer directly determines the accuracy of the
information given out.
b) Give and explain two transcription and two computational errors committed during data
processing. (8mks)
• Misreading errors: -they occur when the user reads source document incorrectly,
thus entering wrong values, e.g. a user may confuse 5 in the number 586 with S,
and type S86 instead.
Data integrity refers to the dependability, timeliness, availability, relevance, accuracy &
completeness of data/information
• Designing user interfaces that minimize chances of invalid data being entered.
• Hotel reservations
• Banking systems
Advantages
• Fast &reliable
• Real time systems usually use 2 or more processors to share the workloads, which is
expensive.
7. Differentiate between CPU bound jobs and I/O bound jobs. (2mks)
CPU bound jobs require more of the CPU time to process these jobs. Most of the work the I/O
devices perform is on the Input; and Output; hence, they require very little CPU time.
8. Most companies are now shifting from the use of geographically distributed personal
computers. This method of data processing is known as Distributed Data Processing
(DDP)
Required:
i) Name any threes computing resources that can be distributed. (3mks) -CPU (Processors)
time
-Files
-Application software
-Data/information/messages
ii) Name four examples of industries and business organizations that extensively use
• Banks
iii) List down two benefits and three risks that might be associated with the distributed
data processing system. (5mks)
Benefits
The use of low cost minicomputers minimizes the cost in data processing
The design & implementation of the system is less complex due to decentralization
Risks
• Data duplication is very common
• Security threats, i.e. the data & information sent one the network from one place
to
A Multi-programming system allows the user to run 2 or more programs, all of which are in the
computer’s main memory, at the same time.
10. State at least four advantages of storing data in computer files over the manual filing
system (4mks)
Cheaper
Enhances data integrity (i.e. accuracy and completeness)
• A logical file is viewed in terms of what data items it contains and what
processing operations may be performed on the data
• A physical file is viewed in terms of how the data items found in a file are
arranged on the storage media and how they can be processed.
12. Arrange the following components of the information system data hierarchy in ascending
order of complexity:
13. In a computer based information system, state the purpose of the following files, and give
one example where such a file may be required in a school.
(8mks)
i) Report file- It contains a set of relatively permanent records extracted from the data in a
master file.
They are used to prepare reports, which can ve printed at a later date, e.g. report on student’s
class performance in the term, extract of students who have not cleared their school fees, report
on absentees.
ii) Backup file- Used to backup data or to hold duplicate copies of data/information from
the computer’s fixed storage or main file for security purposes e.g. a copy of all the students
admitted in a school fees, report on absentees
iii) Reference file - Used for reference purposes. It contains records that are fairly permanent
or semi-permanent, e.g. Deductions in caution money, wage rates, tax deductions, employees
address, price lists etc.
iv) Sort file – used to sort/rank data according to a given order, e.g. ranking position in a
class of students.
It is the way records are arranged (laid out) within a particular file or any secondary storage
device in a computer
In sequential file organization, records are stored in a sorted order using a key field, while in
serial; the records are stored in the order they come into the file, and are not sorted in any way.
In random file organization, records are stored in the file randomly and accessed directly, while
in indexed –sequential, the records are stored sequentially but accessed directly using an index.
CHAPTER EIGHT
Specific Objectives
a) Define Programming;
b) Describe the various levels of programming languages;
c) State the advantages and disadvantages of each level of the programming language;
d) Define the terms assembler, compiler, interpreter, source program and object program;
e) Describe the stages of program development;
f) Describe the program control structures;
g) Define and develop algorithm, pseudo-code and flowchart.
Content
a.) Definition of Programming
b.) Levels of programming languages • Low level language
i) Machine
ii) Assembly
i) assembler ii)
compiler
iii) interpreter iv)
source program v)
object program
e.) Program development •
problem recognition
• problem definition
• program design
• program coding
• program testing • implementation
f. ) Program Control Structure
• Sequence
• Selection
• Iteration (looping)
f. ) Definition and development of Algorithm
• Pseudo-code • Flow chart
Introduction
Program: A set of instructions
Programming: The process of developing computer instructions used to solve a particular task.
Programming language: Special list of symbols that can be translated into machine readable
form by a computer when in a particular sequence or order.
a Translates program code eachtime time it Object code can be saved on a storage
is run hence slower the media and run as required hence
Translator: Language processor that converts source program into object code. Assembler:
Translates assembly language into machine language that computer can understand.
Interpreter: Translates source program line by line allowing CPU to execute one line before
translating
Compiler: Translates the entire source program into object code.
Encapsulation: Process of having data and functions that operate on the data within an object.
executed faster
Levels of Programming
Low Level
They were easy, understandable and hardware oriented hence not portable.
st
1. First Generation Language (1 GLs)/ Machine Language: they are written using
binary logic.
nd
2. Second Generation Language (2 GLs)/ Assembly Language: used
MNEMONICS (symbolic operation codes, shortened two or three words)
High Level
They are very close to human language and are machine independent, hence they are portable
rd
1. 3 GLs (Structured procedural): Pascal, Formula Translator (Fortran),
COBOL,BASIC, Ada.
th
2. 4 GLs: They present programmers with programming tools. Examples; Visual Basic,
Visual Delphi, Visual COBOL.
th
3. 5 GLs: They depict human like intelligence- PROLOG, MERCURY, LISP and
OCCAM.
4. Object Oriented Programs (OOP): Simula, C++, Java and Small Talk.
5. Web scripting: Java, php (hypertext preprocessor), Visual Basic Script.
2. Processed faster
3. Stable and hard to crash
Disadvantages
1. Difficult and cumbersome to use and learn
2. Require highly trained personnel
3. Debugging is difficult
4. Machine dependent
1. Easily crash
Problem recognition
Reasons for development of a computerized program:
Problem or undesirable situation that prevents an individual from achieving their goals.
Opportunity to improve the current system.
A new directive, given by the management requiring a change in status quo.
Problem analysis
Determining or defining the likely input, processing activities and the expected output.
Program Design
Actual development of program’s processing or problem solving logic called the algorithm.
Program Coding
Process of converting a designed model into its equivalent program using programming
language.
Types of errors:
a) Syntax errors: Arise from the improper use of language rules e.g. punctuation and
spelling.
b) Logic errors: They are not detectable by translator but halt the program when running it.
Program Documentation
Writing of support materials explaining how program can be used by users, installed by experts
by operations and modified by programmers:
1. User oriented- enables the user to use the program easily and quickly.
2. Operator oriented: help to install and maintain the program.
3. Programmer oriented: provide necessary technical information for future modification
of programmers.
Algorithm Development
Pseudocode
Guidelines for designing a good Pseudocode
1. The statement must be short, clear and reliable
2. The statements must not have more than one meaning i.e. should be unambiguous
3. The Pseudocode lines should be clearly outlined and indented clearly
4. A Pseudocode should show clearly the start and stop of executable statements and the
control structures (to be discussed later in the section).
5. The input, output and processing statements should be clearly stated using keywords like
PRINT, READ, INPUT etc.
Program Flowcharts
Common symbols used in drawing program flowcharts are:
output
Start/ Stop
Process
Input/
Advantages of Flowcharts
Gives programmer good visual reference of program function.
Selection
Execution of statement depends on a condition that returns true or false. There are four types
IF…THEN
Only one IF option is available. All others are ignored during program execution.
General format: IF <condition> THEN
Statement;
END IF
IF…THEN…ELSE
Only two Ifs are the available option. The general
format: IF <condition> THEN
Statement;
ELSE
Statement;
END IF
Nested IF selection
There two or more If options and statements to be conditioned to make a selection.
General format; IF <condition> THEN
Statement
ELSE
IF <condition>
THEN Statement
ELSE
Statement
END IF
END IF
Case Selection
An alteration to Nested If especially where there are several options to choose from. The
flowchart not different from Nested IF.
CASE X OF
Label 1: statement 1
Label 2: statement 2
Label 3: statement 3
.
.
.
Label n: statement n- 1
ELSE Statement n
END CASE
Iteration/ Looping
Repetition designed to execute the same block of code again and again till a certain condition
if fulfilled.
The WHILE…DO loop
General format
Pseudocode Flowchart
End Loop
Repeat
Statement Statements
Until <condition>
Yes
Condition ?
No
End Loop
Statement
No
Condit
ion?
Yes
C ondit ion?
Statem
No
ent
Yes
End of topic
(2mks)
i) Syntax -these are rules that govern the arrangement of commands in a particular
language
ii) Semantic - the meaning attached to every command in a particular language.
3. a) What are low-level languages? Give their features. (4mks)
These are the basic programming languages, which can easily be understood by the computer
directly, or which require little effort to be translated into computer understandable form.
Features:
• They are machine hardware-oriented
• They are not portable, i.e. , a program written for one computer cannot be
installed and used on another computer of a different family
• They use Mnemonic codes
• They frequently used symbolic addresses.
vii) Popularity: - the language selected should be suitable and /or successful in the market
with respect to the problems to be solved.
viii) Documentation: - It should have accompanying documentation (descriptions on how to
use the language or maintain the programs written in the language
ix) Availability of skilled programmers: - The language selected should have a pool of
readily available programmers to ease the programming activity, and reduce development time.
11. a) State any four rules/guidelines that should be followed when drawing program
flowcharts. (4mks)
• A flowchart should have only one entry (starting point) and one exit point
• The flowchart should be clear, neat and easy to follow
• Use the correct symbol at each stage in the flowchart
• The flowchart should not be open to more than one interpretation
• Avoid overlapping the lines used’ to show the flow of logic as this can
• create confusion in the flowchart
• Make comparison instructions simple, i.e , capable of Yes/No answers
• The logical flow should be clearly shown using arrows Ensure that the
flowchart is logically correct & complete
b) Give one advantage of pseudo codes over flowcharts (1mk)
• Pseudo codes are easier to write and understand
• They are convenient especially for long algorithms which span over
several pages.
16. a)
Modules or sub-routines
Use of control structures in problems solving
Boolean
Stop
Expression
Counter
Selection control
structure, e.g. If – then –else
Continuation of program
b) IF...THEN…ELSE
selection
(2mks)
c) REPEAT…UNTIL loop (4mks)
21.
a) With aid of a pseudo code and a flowchart, design an algorithm that would:
• Prompt the user to enter two number X and Y
START
PRINT (“Enter two numbers, X and Y”) Input X, Y
IF Y=0 THEN
PRINT ‘Error: division by zero’
ELSE
Quotient = X/Y
PRINT X, Y, Quotient
ENDIF
STOP
Flowchart
b)
Write down the assignment statement used in the algorithm above. (2mks) Quotient=x/Y
22. Draw a flowchart for a program that is to prompt for N numbers, accumulate the sum
and them find the average. The output is the accumulated totals and the average.
23. Write a pseudo code that reads temperature for each day in a week, in degree
Celsius, converts the celcius into Fahrenheit and then calculate the average weekly
temperatures. The program should output the calculated average in degrees Fahrenheit.
START
INPUT temperature in 0C
SET Initial day to 0
WHILE Initial day <=6 DO
F = 32 + (9c/5)
INPUT temperature in 0C
Initial day = Initial day + 1
Cumulative = Cumulative + 0F
END WHILE
Average = Cummulative/7
PRINT average
Stop
24. Michael deposits 1,000 in a bank at an interest rat of 10% per year. At the end of
each year, the interest earned is added to the amount on deposit and this becomes the
new deposit for the next year.
Develop a pseudo code to determine the year in which the amount accumulated first
exceeds 2,000. Also for each year, print the year (starting from 1), the deposit, the
Interest earned, and the total accumulated at the end of the year.
START
Input initial deposit, Interest rate, and Target deposit
Set Deposit to 1000
Set Year to 0
REAPEAT
Year= Year + 1
Interest = Deposit x 10%
Total = Deposit +Interest
Deposit = total
UNTIL Deposit > 2000
PRINT Deposit, Year
STOP
25. Study the flowchart diagram below and answer the questions that follow:
R Term Sum
0 0x20 0 + 0=0
1 1x21 = 2 0+2=2
2 2x22 = 8 2 +8 =10
3 3x23 = 24 10 + 24 = 34
26. Mwalimu savings society (MSS) Pays 5% interest on shares exceeding 100,000 shillings and 3%
on shares that do not meet this target. However, no interest is paid on deposits in the member’s
MSS bank account
a) Design a pseudo code for a program that would:
i) Prompt the user for shares and deposit of particular members ii) Calculate the interest and total
savings iii) Display the interest and total savings on the screen for particular members of the
society. (7mks)
START
PRINT “Enter member Name, share and Deposit”
INPUT Name, Shares, Deposit
IF shares > 100,000 THEN
Interest = 0.05 x Shares
ELSE
Interest = 0.03 x Shares
ENDIF
Total savings =Deposit + shares +Interest
PRINT Name, Total savings, Interest
STOP
27.
a) Study the flowchart below and answer the questions that follow:
b) What will be the output if the statement in the decision box is changed to?
(3mks)
i) M100
Only one value, 11 will be printed 1
iii) M = 100
values starting with 11 to infinity, i.e. , 11, 22, 44,………. 1
c) Modify the flowchart to print the sum of all the outputs. (9mks)
28. The
gross salary
of employees of
Mutson Chemist is based on the Basic and additional benefits. Employees with more
than 10 year’s experience get an additional pay of 10% of their basic salary. Bonuses
are given as per employees’ sales of the month as:
>200,000 15%
100,000 – 200,000 10%
Below 100,000 5%
Draw a flowchart for the program that will calculate Gross salary and output each employee’s
Basic salary, gross salary and all benefits. (15 mks)
CHAPTER NINE
Specific Objectives
a) Describe a system;
b) Define an information system;
c) State the purpose of an information system;
d) Identify the stages of system development;
e) Develop a system using a case study;
f) Write a report on the case study.
Content
a.) Description o f a system
b.) Definition of an Information System
c.) Purpose of an Information System
d.) Stages of system development
• Problem recognition and definition • Information gathering eg
i) investigation . ii) observation iii) interviews
iv) questionnaires
Introduction
Definition of System Development
Organization of components which interact in a given environment and within a specified
boundary to achieve collective goals and objectives that are emergent.
Description of a system
A system is described as either hard or soft system
Soft System
Their boundaries may be fluid or keep on changing.
Their goals and objectives usually conflict and may not be captured clearly because they are
human based.
It is difficult to precisely define exact measure of performance for them. Examples: sales
tracking and predicting systems, political system,
Hard systems
They are systems whose goals and objectives are clearly defined and the outcome from the
system process are predictable and can be modeled accurately.
Characteristics of Systems
1. Holistic thinking: Combination of various components to create a complex whole.
2. Subsystems: A system doesn’t exist in solitude but may be a component of a large
system.
3. Boundary and environment: An external element whose changes in attitudes, behavior
and property affect respectively.
4. Processor: Transform or processes data from one state to another.
5. System entropy: The decaying or becoming useless because of the improvement in
technology, new management policies or the change in user requirements.
6. Inputs and outputs: The system communicates to its environment by receiving inputs
and giving outputs.
7. Open and Close: The open system receives input from and gives output to the
environment while the closed system uses input as its own benefit thus building itself
from the output.
8. Purpose: The objectives that a system is supposed to achieve enable system developers
to measure the performance of a system during its operation.
9. Control: This is the method by which the system adapts to changes in the environment
in order to give the expected output or to perform to the expected level.
Input
Output
System
Processes System Processes
Control Feedback
Signal
Control
Information System
An arrangement of people, data processes and information that works together to support and
improve the day to day operation in a business and decision making. Purpose:
Supporting information processing task e.g. data collection, processing and
communication.
Helping in decision making by collecting operational data, analyzing it and generating
reports to be used in supporting decision making process i.e. online analytic process.
Enable information sharing
Advantages
One has the necessary material.
Disadvantages
Slow method
If wrong data was entered wrong information will be collected.
Interviews
Guidelines:
Interviewee must be informed in good time and the topic of discussion communicated
before to allow for adequate preparation.
Avoid personal biases in your questions.
Be careful about body language and proxemics.
Types of Interviews
Structured: Questions have been already organized or prepared and spaces for the
answers/responses.
Unstructured: Questions are not written or prepared.
Advantages
Non-verbal communication can be used.
Questions can be rephrased instantly for clarification and to probe the interviewee further.
Gives adequate opportunity for the interviewer.
Interviewer is accessible to first hand information.
Disadvantages
It is difficult to organize interviews and they are time consuming.
Interviewee may not fully open up on some issues that may be personal or sensitive. They
are expensive to conduct.
Automated Methods
The uses of data capture devices like cameras, scanners and camcorders.
Advantages
The method is accurate.
Fast.
Disadvantages
Expensive equipment required.
Questionnaire
It is a special purpose document that allows a person to collect information and opinions from
the people who receive and respond to it.
Application
When limited amount of information is required from a large number of people. People
you need to gather information from are vastly dispersed.
Advantages
Since they are filled and returned in primary more sincere responses are possible.
Respondent can fill the questionnaire at their own pace.
Disadvantages
Good ones are difficult to prepare.
The respondent may not fully understand the questions because of ambiguity of language
hence giving erroneous responses.
Time consuming in analyzing.
Observation
Advantages
Difficult concept for non-technical staff to explain can be observed.
Helps analysts become acquainted with the operational personnel.
Helps the analyst acquire know how needed to assist that have been recommended. Can
correct “hazy” understanding/ erroneous impressions.
Disadvantages
The person being interviewed can alter behavior leading to wrong requirement being
observed.
The need to be on-site consumes a lot of time.
The method cannot give information about past activities and problems.
3. System Classification
Deterministic system: system whose output is precisely known by their inputs like
the computer system.
Probalistic system: Output can only be predicted but not precise like in business and
economics.
Cybernetics system: Self system which adapts to the environment and regulate their
own behavior by accessing the feedback e.g. in human beings, plants.
4. Requirement Specification
Output Specification
Activities that entail generation of reports used to facilitate decision making. Factors to
consider;
Target audience.
Frequency of report generation.
Quality and format of output.
Input Specification
Content and volume of input.
Mode and device of input selection.
Layout and information sequence
File / data store specification The
key attribute/ field
Type of data
Length of each field
Back up and recovery strategies
Hardware and software specification
Economic factors e.g. prices
Operational factors e.g. reliability, upgradability, compatibility with existing resources
User-friendliness
5. System Construction
The coding, installing and testing modules and their components e.g. Input, output by
Using high-level structure language like PASCAL, COBOL e.t.c.
Fourth Generation languages- Visual Basic, Visual COBOL, Visual Delphi e.t.c.
Customizing the standard packages.
Testing
6. System Design
Development of flowcharts, data flow diagrams, structured charts e.tc.
7. System Implementation
The activities involved during this stage are: Installing the system, testing, converting from old
system to the new system and training the users.
File creation and convention: Setting up of master files to be used to support the new system.
Training the staff
Convert staff of user department on the effectiveness of the new system
Remove fear of change from them
Enabling staff cope with processing task of the new system
Methods used in training: documentations, film shows, manual reference, group discussions
and visits
Changeover
The process of changing over from old system to the new system.
1. Direct Changeover: The new system commences live operations and immediately the old
system is abandoned.
Advantages
Cheap method
Disadvantages
Places the organization in a do or die situation
Extremely risky
2. Parallel Changeover: Operations of the old system and the new system are run alongside
each other
Advantages
Provides a method of training in the new system
Personnel become familiar with the new system
Disadvantages
Costly to run two systems
Cross checking is difficult
Requires more staff hence more training is required
3. Phased Changeover: Implementation is done only on part of the new system at one time or
step by step.
Advantages
Allows the system to be implemented quickly
Less costly
Failure of the new system is limited
Cause minimal description
Disadvantages
Problems on assuming that the final sphere is implemented and converted
System Documentation
1. Reports on fact-finding
2. Requirement specification
3. System and module flowcharts
4. Table/ file structure description 5. Sample test data and expected output
6. Output reports.
CHAPTER TEN
• Limitations
f.) Elements of Networking
Content
a.) Definition of terms
i) computer networks ii) data
communication Purpose and
Limitations of networking
• Purpose
b.) Network software
• Operating systems
• Protocols
b.) Types of Networks
• Local Area Network (LAN)
• Metropolitan area Network (MAN)
• Wide Area Network (WAN)
Introduction
Modes of Communication
1. Simplex- Communication in only one direction e.g. television and radio
broadcasting
2. Half duplex- Communication in both directions, one at a time e.g. Walkie Talkie
3. Full duplex- Communication in both directions simultaneously.
Advantages of LAN
1. Enables many users share expensive resources like printers and data.
2. Enables communication- sending messages and open chat sessions.
3. Capable of transmitting data very fast.
Purpose of Networking
1 Resource sharing- File sharing, mail exchange, sending faxes, schedule meetings and print
documents leading to less wastage of time and enhances greater productivity.
Roaming of officers who by virtue of their work cover long distance away from their work
place.
Time wastages in accessing organization information.
Remote communication is the process of transmission of data signals between communications
devices located at different geographical locations. Components of remote communication are:
Remote Client- Computer that tries to access resources from another computer
on network.
Remote host- Computer being accessed on network
4. Cost effectiveness- Although the initial installation cost is high it cuts down most
expenses and adds value to service delivery.
Advantages
(i) Daily communication- paperless communication environment.
(ii) Reduces transport cost for executive meetings.
(iii) Resource sharing e.g. printers, fax machine, optical drives, files and
applications.
5. Reliability
(i) Transfer of data with minimum errors from destination
(ii) Easy recovery incase of computer breakdown.
Limitations of Networking
1. Security issues- Data is prone to more illegal access threat in the network 2.
High initial cost for software and hardware.
3. Moral and cultural effect- chartrooms and pornography.
4. Spread of terrorism and drug trafficking.
5. Overeliance on network thus network failure may halt the system or bring down the
organization.
Elements of Networking
A. Data Communication Media
1. Bounded (cabled) Media
Insulator
Wire
Conductor
Advantages
Used in the telephone systems
Cheap installation equipments
Cheap due to mass production of telephone
Disadvantages
Suffer a high attenuation rate.
Sensitive to EMI
and
eavesdropping
Low data transmission but more than
two line
Coaxial cables
Has a central copper core surrounded by a dielectric material (insulator) that is then
surrounded by a hollow mesh conductor covered by a shield. The braid (mesh conductor) is
made of copper/ aluminum and serves as the ground for the carrier wire. The braid protects
radio and electromagnetic interference. The thinner the conductor determines the attenuation
rate. Thinner have a high attenuation rate. Used in network blockade- A link that connects
two separate LAN’s
(ii) Thin coaxial cables (Thinnet)- has no dielectric insulator (iii)
Thick coaxial cables (Thicket)- has two dielectric insulators.
Copper core
Core insulator
Aluminum foil
Braided shielding
Outer layering
(b) Thicknet
Advantages
Stable even under high loads
Large bandwidth than twisted pair
Carry voice, data and video signals simultaneously
Resistant to radio and EMI than twisted pair cables.
Disadvantages
Thicket is hard to work with
Are relatively expensive to buy and install compared to twisted pare
(ii) Single mode: Has a thicker core hence allow several light rays
Cladding
Jacket
Light rays
(i) Core- Central part and is made of a hollow transparent plastic
glass.
(ii) Cladding- Single protection layer surrounding the core. (iv)
Buffer- Surrounds the cladding, strengthening the cable. (v)
Jacket- Outer casing
Types of optical fiber cables:
(i) Multimode: Has a very narrow center core hence have low attenuation rate as
light takes only one path in its suitable for long
Cor
Cladding
e
Advantages
Immune to EMI and eavesdropping.
Fast and support high bandwidth.
Large distance can be covered- low attenuation
Used in hazardous places- Don’t generate electric
signals.
Smaller and lighter than copper- Ideal for space
limited situation
Disadvantages
Difficult installation since it must be carefully be handled
Expensive connectivity devices and media are required
Relatively complex to configure
Difficult and expensive to repair
Advantages
Disadvantages
Signals affected by atmospheric conductors e.g. lightening
Additional numbers of repeaters are added after every few kilometers.
Satellite Transmission
Satellite in space
Downlink
Uplink
Satellite footprint: Area on earth where line of site can easily be located. Transmission of
signals to many recipients’ earth stations forms a point to multipoint transmission.
Very Small Aperture Terminal (VSAT): This technology refers to very small satellite dish
used in radio, data and TV communications. It enables direct access to satellite communication
instead of having to go through satellite owned or licensed satellite gateway.
Advantages
Has a high band width.
Earth station can be installed on a customer property than layering extensive cables.
Cheap since cost is not dependent on the distance.
Disadvantages
Expensive to install ground stations.
Heavy rains or bad weather increases loss of signals. Any
station can receive the signals.
Radio Communication
(i) High Frequency (HF) - Propagated by directing it to ionosphere on
earth. Then the ionosphere will reflect back to earth surface and the receiver will
pick it up.
(ii) Very High Frequency (VHF) - Transmitted over the earths surface.
Stationeries are place strategically to maintain the line of sight from one
another.
(iii) Ultra-High Frequency (UHF)- It is the same as VHF but require smaller
aerial because they can be made to follow even narrow and direct path to the
receiver than VHF
Infrared Transmission
Infrared transceivers must be within the line of sight in the same room because unlike radio
signals they cannot penetrate objects.
Network Software
Classifications of Network Software
a) Network operating system
Network Protocols
They are a set of rules and procedures that govern communication between two different two
devices or people.
Layer Function
7. Application layer User application run here and generate request for data
transmission or open received files.
6. Presentation layer Adds formatting, display and encryption on information to
data
5. Session layer Sets up data transmission session
between two communication
4. Transport layer Manages data transfer over the network to ensure
3. Network layer Address information is added to the data packet and routed
to
2. Data link layer Adds error checking information and prepares data for
going into
1. Physical layer Data packets are finally transmitted via the network and
Downloaded by Wekesa Martins (weharvestmartin@gmail.com)
through
lOMoARcPSD|17337118
In order to transmit data over the network it has to be broken into discrete systematic steps. Each
step has its own rule and procedures i.e. protocols that must be coordinated so that there are no
conflicts or incomplete operations. Achieved through protocol layering .Network protocols are
designed after the Open System Interprocess (OSI) model. The open system interconnection
model is not a protocol as such but is meant to help designers to come up with high quality
layered protocols.
Network Topologies
This refers to the way in which computers her devices have been arranged or how data is
passed from one computer to another in the network. Classifications of Network
Topologies
1. Logical topology
2. Physical topology
Physical Topology
Bus Topology.
All the devices on the network are connected to a central cable called the bus r the backbone.
Each
end of the cable is connected to a terminator to avoid signal from bouncing back and fourth on
the cable causing signal distortion. The network address of computers on the network is called
the medium access control (MAC) address
lOMoARcPSD|17337118
It is to install.
It is less costly because doesn’t require a complete cable length per computer.
The disadvantages of bus topologies are:
Failure of central cable brings the whole network down.
Only one node can transmit message at a time. Difficult to
troubleshoot
Star Topology
All the devices are connected to the central hub (concentrator).
Computer
Central Computer
Computer comput
er
Computer Computer
Easy to configure.
If one node fails it doesn’t affect the other nodes.
It is easy to expand this topology.
Allows the centralization of key network resources.
Disadvantages
Ring Topology
All the components in this topology are connected to a single transmission cable forming a ring styled
connection of computers
Computer
Computer Computer
Downloaded by Wekesa Martins (weharvestmartin@gmail.com)
lOMoARcPSD|17337118
Computer
Computer
Advantages of Ring topology
Modification may be difficult because adding or removing a device can disrupt the entire network
Troubleshooting can be difficult.
If one site fails it affects the entire network.
Mesh Topology
Device in this topology are connected with repeating (redundant) cables between the workstations. Each node
is connected to one another.
Disadvantages
Expensive: Costly to provide the redundant cables. Difficult to install and
maintain.
Tree/Hierarchical Topology
All the nodes are connected in form of a tree with nodes as leaves and links as branches.
The branches are connected to one another by the means of devices called hubs.
Advantages of Hierarchical topology
If the node below the main node fails, the network does not fail.
Disadvantages
If the top node fails the entire network fails because it controls the other nodes.
Expensive to install since it is complex.
Printer
Hub
Bus/backbone
Network Security
Classification of Network Security
(i.) Share level security
(ii.) User level security
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you understand before going to sleep!
Disadvantages of networking
- High initial installation cost (i.e., expensive to install).
- Security threats e.g., hacking, which posses a great danger to loss of information
- Moral and cultural effects.
- Spread of terrorism, drug-trafficking and viruses. - Over reliance on networks.
5. Distinguish between bounded and unbounded transmission media, giving two examples in each.
• In bounded media, data signals are transmitted from the source to the destination through a
restricted pathway, e.g., two open wire cables, twisted pair cables, Coaxial cables, fiber optic
cables.
• Unbounded media transmits data without physical connections, e.g. microwave, satellite, radio,
infrared communication.
6. State what is meant by each of the following data transmission media, and give two advantages
and three disadvantages for each.
i) Twisted pair cables. (3mks)
A twisted pair cable is made up of 2 insulated copper wires twisted around each other in a spiral pattern.
This prevents electromagnetic fields from developing around the two wires as they transmit data.
Advantages
-Has high data transfer rates of up to 100 Mbps
-It is cheap because; of mass production for telephone use.
Disadvantage
o They suffer from high attenuation o affected by electromagnetic
fields
o It has low data transmission rates as compared to other cables
Advantages
o They have a large bandwidth (up to 1 Gbps) compared to twisted pair
cables
o They can carry voice, data and video signals simultaneously
o They are more resistant to radio and electromagnetic interference than
twisted pair cables
Disadvantages
o They are hard to work with
o They are expensive to buy & install
iii) Fibre optic cables is made of transparent glass and uses light to transmit data signals from
one point to another on the network. Advantages
o It is immune to electromagnetic interference, and eavesdropping.
o It is fast and supports high bandwidth
o It has low attenuation; hence, a long distance can be covered
o It is small & light.
Disadvantages
iv) Repeater
A repeater receives a weak signal on the network, cleans and amplifies it for transmission over the next
portion of the network. Signals become weak due to attenuation
8. List two advantages of cell phones over fixed lines. (2mks)
• Are cheaper than fixed lines
• Less prone to transmission errors
• Can be used even where there are no telephone lines
• Portable, i.e. can be carried around
9. a) Study the diagram below and answer the questions that follow:
i)
Name the communication media depicted in the above diagram. (1mk) Satellite
communication
CHAPTER ELEVEN
Specific Objectives
Content
Application Areas of Information and Communication Technology
• Financial Systems
a) accounting
b) banking
c) payroll
• Retail Systems
i) point of sale systems ii) stock
control • Reservations Systems
i) hotels
ii) air-lines
• Communication Systems
i) Fax and telex ii.) radio iii.)
television iv.) video conferencing v.)
e-mail
vi.) telecommuting vii.) internet
• Education
i) Computer Aided Learning (CAL) ii) e-learning
iii) computer based simulation
• Industrial systems
i) simulation
ii) process control iii) CAD (Computer Aided Design)/CAM (Computer Aided
Manufacture)
• Transportation Systems
i) air-traffic control ii) Shipping
control iii) Automobile traffic
control
• Entertainment Systems
i) Computers and movies ii) Multi-media
• Virtual reality
i) Uses of virtual reality ii) visor
• Library Systems
Library lending system
• Home use
• Health
• Expert systems
• Offices
Expert systems
• Offices
Expert systems
• Marketing
i) e-commerce ii) business
Field work Report
Financial Systems
Payroll systems
This system helps an organization to process accurately information of employees including gross pay and
deductions and getting their net pay.
Accounting systems
(i.) Customer order entry and billing: Subsystem records incoming customer orders authorizes
delivery of items or services and produce invoice for customers whoi don’t pay in advance
(ii.) Inventory management: Keeps track of items in stock and help the management to determine
which item to reorder.
(iii.) General ledger account: Keep track of how much a business makes and its worthiness by
summarizing the financial transactions producing a report called balance sheet.
(iv.) Accounts payable: Keeps track of the amount the business sows other organizations like the tax
organizations, suppliers and transporters.
(v.) Accounts receivable: Keeps track or records the amount owed by the customers.
Banking Systems
(i.) Processing customers’ transactions: Computers are used in banks to record deposits, withdraws
and calculating interest on savings and loans.
(ii.) Cheque clearing and processing: The use of magnetic Ink-Character Recognition (MICR) details of
the cheque is automatically entered into the computer for the cheque process. The special characters
on the cheques includes the bank in which the cheque is drawn from, the customer accounts number
the cheque number and the cheque amount.
(iii.) The electronic fund transfer: Use of Information Communication Technology to move money.
Used especially with credit cards and the ATM cards.
Reservation systems
These systems are also called online enquiries. The concept used in reservation systems is the application of
distributed network systems. Applications of reservation systems:
(i.) Hotel booking: Booking and reservations rooms in a hotel are made from a remote terminal
connected to a centralized computer database or via the internet using the hotels website.
(ii.) Airline booking: All the flights and passenger records are stored in a centralized
database.Travel agents from all over the world can access each data via communication lines.
Likewise the agents book in clients where tickets have not been bought.
(iii.) Car rentals
Education Systems
1. Computer Aided Instruction (CAI): The process of using computers to learn, drill and practice
particular education principles.
2. Computer Aided Learning (CAL): This is meant to drill the learner and present particular education
materials the way a teacher does in class.
3. E-learning: Lessons and lectures are presented from a central site like a website the transacted to remote
conference terminals or displayed on television screens.
4. Computer Aided Simulation: It refers to the science of representing behavior of a real life situation by
using computerized models.
Communication Systems
(i) Fax: During the process of sending the fax the document is scanned then converted into
analog form then transmitted. The receiver fax converts it into the original softcopy the it
prints the document.
(ii) Radio communication: Computers are used to:
Record and manage radio programmes for broadcasting.
Manage radio transmission and took performance.
Create slides, simulated objects and sound effects when preparing
electronic and printed media advertisements.
Advantages
Reduces transport cost.
Gives people the option of flex time. Saves costs.
Reduces pollution and congestions inroads.
Disadvantages
Lack of discipline.
Work quality may suffer.
Few opportunities for brainstorming with colleagues. Disappear of direct
supervision.
(vi) Internet
World Wide Web: This is the collection of webpages, which may be made of text, images,
animations, sounds and video held on web servers.
E-mail: Electronic sending and receiving of messages, data, files or graphics in
the internet.
Industrial systems
(i) CAM and CAD
Computer Aided Design (CAD): Refers to the integration of computers and graphics to
aid in the design and drafting process. Examples of software are: Softpan, Autocad and
Archicad.
Computer Aided Manufacturing (CAM): It refers to the use of computers to control machines
in the manufacturing process e.g. Delta.
(ii) Industrial simulation: Allows activities that would otherwise be expensive and dangerous
to real life situation to be put under test. The Non Destructive Testing (NDT) can be used to
test motors and other machines with the use of computers.
(iii) Process control: Computers are used to contol ongoing physical process like regulating
temperature, pressure and fluid flow.
Library Systems
(i) Lending system: Information system that manages the issuarance and the return of the borrowed
reading materials.
(ii) Inventory control: Manages the stock by checking for books currently in the shelves and those on
high demands for purpose of adding more.
(iii) Cataloging: A catalog refers to the collection of cards with information about each book or
reference materials found in the library. Electronic cataloging is updated constantly when new
reference materials are required. Entertainment Systems
(i) Games: Games are now found on the Digital videos disks (DVDs) and three- dimensional (3D)
games are now possible on personal computers.
(ii) Music and video: Video compact disks (VCDs) and Digital versatile disks (DVDs) have
become a common feature in the music industry. In music industry computers are used in
recording, synthesizing, editing and adding special effects on music. In video industry,
computers are used to produce high simulated and animated movies, generate scenes and
actors.
Transportation Systems
(i) Automobile traffic control: controlling traffic lights in road junctions.
(ii) Air traffic control: Computers are used to monitor air traffic movement, take off and landing of
aircrafts.
(iii) Shipping control: Controlling and guiding paths taken by spaceships and water vessels as they
travel to distant land using the Global Positioning System (GPS).
Home Use
(i) Preparing domestic budgets.
(ii) Entertainment.
(iii) Research.
(iv) Education.
Marketing
(i) Electronic commerce (e-commerce): Transactions are carried out directly without
physical interaction between the buyer and the seller.
(ii) Electronic presentation
(iii) Advertising
Virtual/ Artificial Reality/ Cyberspace/ Virtual Works/ Virtual
Environment
Condition in which a person is psychologically immersed in an artificial environment generated by a computer
system: Requirements
Head mounted display (HMD)/ Headgear: made up of two tiny display screens and sound systems that
channel images and sound from the source to the eye and early presenting a stereo three dimensional
(3D) sound effect in the virtual world.
Gloves: Allows the user to navigate through the virtual world and interact with virtual objects. They
have sensors that collect data about the movement of the hands and relays the data into the system
Body suit: Worn during virtual reality session and iis made of condux VR software
Applications
(i) Training in medicine, military education
(ii) Entertainment
(iii) Simulation
(iv) Study of human anatomy
(v) Exploring landscape, underneath
(vi) Crime scene reconstruction
Law Enforcement
Biometric analysis: fingerprints and facial identification.
Use of video camera e.g. in banks
Development of strong military bases which have international coordination by use of a computer radar
system
Jet fighters are computerized with correct control centers.
Teleworking
A situation where an employee works usually at home using at home using a computer connected to work
place.
Advantages
Reduces travel expenses due to reduction of unnecessary travel to work.
Gives people the option of flextime giving them the option of working long hours part time.
Saves cost if people work from home.
Reduces pollution and congestion as a result of fewer people commuting to work.
Disadvantages
People who lack discipline may not do work, where as others may overwork.
Work quality may suffer if employees take the attitude “no one sees me doing the job so it doesn’t
matter.
Fewer opportunities of brain storming with colleagues.
Direct supervision disappears when people work from home.
End of topic
5. a) Write down all the input and output devices of an ATM machine of Pesapoint in Kenya.
- Keyboard
- The ATM card
b) Give two advantages of using electronic point-of sale terminals as opposed to manual
entry at a supermarket checkout counter. (2mks)
• Fewer errors made by employees, i.e. correct prices are used at the point of entry
• It ensures faster entry of data, since the attendant does not have to enter details
manually.
• Ensures good stock management procedure.
7. Define the following terms:
a) Biometric analysis
This is the study, measurement & analysis of human biological characteristics. It uses a computer and a
biometric device to recognize & analyze features of human body parts such as fingerprints, lips, voice iris
colour, etc
b) Telecommuting
A situation where an employee works in a location that is remote from the normal place of work either on
full-time or part-time basis.
10. Describe how computing has been applied to each of the following areas:
i) Transportation systems. (2mks)
- Used by railway corporations to coordinate the movement of their goods & wagons - Used in
airline industry for air traffic control, surveillance of airspace using radar equipment
- Used in shipping control
- Used in automobile traffic control in busy towns, i.e. to simulate the timing of traffic lights.
11. Suggest how computers may in future be made more user-friendly for
persons that are:
a) Blind (1mk)
- Development of Braille keyboards, or engraved keyboards
- Computers can be installed with talking software, i.e., can store voice patterns of
the user
b) Without hands
- Use of voice-activated commands.
- Computers can be installed with powerful multimedia system & speech
recognition devices.
12. Give at least four reasons why a firm may decide to computerize its operations
- Handling of errors easily
- Easy storage and retrieval of information
- Increased efficiency - Higher quality work - Reduced cost.
CHAPTER TWELVE
Specific Objectives
Content
a) Effects on employment
• job creation
b) Automated production
• Education
• Communication
• Research
• Commerce
• Arts
• Entertainment
• Transport
e) Cultural effects
• Computer crimes
• Moral effects
• Possible future trends in capabilities, physical size, price, software etc • Artificial intelligence
robotics
Introduction
Issues Resulting from the use of ICT
Effects on employment
1. Job creation: New opportunities; computers operators, programmers, network administration,
information technology and information science managers, database administrators, software
developers, system analyst etc.
2. Job replacement: Clerical and repetitive tasks that require a large number of employees have been
made redundant. Computer illiterate are replaced.
3. Displacement: Loosing job, displacement of employees from another place or department when
computer skills are required.
Automated Production
Advantages
Disadvantages
Environment pollution: Huge garbage dumps of dead computer parts, printers, ink, tonner cartridges,
monitors and other computer accessories are disposed in landfills causing environmental pollution. Nickel-
cadmium laptop batteries that contain toxic cadmium which when buried in a landfill can leak into
underground water tables and attachment areas.
Cultural Effects
1. Flaming: writing online messages that use derogatory, obscene or dirty language.
2. Pornographic material
3. Computer crimes: hacking, eavesdropping, piracy etc.
4. ICT have erased people’s integrity by using computers as a tool to accomplice their vices e.g.
forge certificates, passports and other document.
5.
Breakthrough in ICT
It has changed lifestyles in health care, education, communication, research, commerce, art and design,
entertainment, transport etc.
This is a branch of computer science that is concerned with the development of machines that emulate
human like qualities as learning, communication, seeing and hearing.
Applications
1. Expert System: Software designed to make a computer operate at a level of a human
expert on a specific narrow area of specialization. Examples are;
Mycin- blood and meningitis
Prospectors- Predicting mineral deposit in certain geographical site
Delta- Repair diesel electric locomotive Xcon
Components of artificial intelligence are;
1. Knowledge base: Expert system’s database of knowledge about a particular subject.
It contains relevant facts, beliefs, assumption and procedures for solving particular problems.
2. Inference engine: Software that controls the search for knowledge in the knowledge base ,
procedures and conclusions.
3. User interface: Display screen that enables the user to interact with the system.
3. Artificial neural network: use of electronic devices and software to enable the neurological
structure of human basic. Essential attributes;
The neurodes can be trained to distinguish between what constitutes a signal and what
doesn’t.
They are capable of recognizing patterns in large amount of data that are too complex for
human beings.
4. Robotics: Computer controlled device that emulates human beings in carrying out tasks that
would otherwise be dangerous and different.
Merits
A robot can work on repetitive task without getting bored or tied.
Can work on dangerous areas unlike human beings
Increased production because they are capable of working at a high speed
Leads to less operating expenses since less personnel is required
Demerits
Lead to job replacement
Expensive to install
3. Expanded superhighway
Involves integration of cabled and wired technologies for the purpose of data and information transmission.
End of topic
6. State three reasons why users may resist the introduction of information and communication
Technology (ICT) to their place of work
(i) Fear of change- people are creatures of habit, hence are afraid of change
(ii) Fear of losing their jobs: By installing the computer into an organization, employees fear that they
might end up losing their jobs
(iii) Fear of failure – Since the computer is very new in a given working environment, the people will be
afraid that they might never get used to it.
(iv) Loss of control: The management fear that once a computer system is implemented, they might lose
control of the organization.
CHAPTER THIRTEEN
Specific Objectives
Content
Universities
v) Research Institutions
Introduction
Computer Operator
1. Entering data into the computer for processing
2. Keeping up to date records (log files) of all information processing activities.
Computer Technician
1. Troubleshooting computer hardware software related problems
2. Assembling and upgrading computers and their components
3. Ensuring that all computer related accessories e.g. printers, storage media, modems are in good
working conditions
4. Help hardware engineers in designing and creating some computer components
e.g. motherboard, storage devices
System Analyst
1. Attributes/ Qualities of a good system analyst
2. Good problem solving skills and creativity: experience in problem solving
3. Good communication skills
4. Must have business knowledge
5. Technical knowledge in hardware, software and processing
Responsibilities
Reviewing the current manual system and making recommendations on how to replace it
Preparing system specification
Working with programmers to construct and test the system
Preparing instruction manual
Coordinating training for users of the new system
Computer Programmer
1. Writes in-house application programs/ system programs
2. Customize commercial application packages to suite the organization needs
3. Test, install, debug and maintain programs developed
Software Engineers
1. Develop system and application software
2. Develop user and technical documents for the new software
3. Maintaining and updating software to meet day to day requirement while overcoming
challenges.
Computer Engineers
1. Design and develop computer components such as storage devices, motherboard and other
components
2. Determining the electrical power requirements of each computer component
3. Re-engineer computer components to enhance its functionality and efficiency
4. Design and develop engineers and manufacturing computer controlled devices such as robots
Computer Trainer
1. Developing training reference materials
2. Guide learners on how to acquire knowledge through carrying out research
3. Advising learners on the best career opportunities in the broad field of ICT
4. Preparing learners for ICT examination
Network Administration
1. Set-up a computer network
2. Maintaining and enforce security measures on the network
3. Monitoring the use of network resources
4. Maintaining and troubleshooting network related problems
Research Institutions
1. Polytechnics: Offer diploma and certificate courses 2. Colleges:
Offer diploma, certificate and craft courses.
End of topic
- Kenyatta University
- Jomo Kenyatta University of agriculture and Technology (JKUAT)
- Egerton University
- Maseno university
(b) Identify at least three related courses offered at
(i) College level
- Certificate in information technology
- Diploma in information technology
- Diploma in Education (computer science)
5. Explain two factors one would consider before enrolling for an ICT course in a college
- The cost of the course
- Marketability of the course, i.e. whether it offers courses recognized both locally and
internationally.
- Basic course requirement, e.g. qualifications
- Job opportunities
PROJECT
Specific Objectives
GENERAL REQUIREMENTS
Schools intending to offer Computer Studies are expected to have the following minimum equipment:
1) Computer Laboratory/classroom(s)
ii) Computer desks that accommodate monitor at eye level iii) At least one computer per every four
students (1:4) in Forms one and two and one computer for every two students (1:2) for Forms three and
four.
iv) At least one printer for every four computers v) Printing
Stationery vi) Appropriate storage devices e.g. diskettes
vii) Storage facilities for diskettes and other consumables e.g. disk banks viii)
Appropriate software for the curriculum ix) Relevant reference materials
Note: The computers to be used for the course should preferably be IBMs or IBMcompatibles due to their
low maintenance costs and availability of spare parts.
In addition to the above, the following facilities though not mandatory will greatly assist in achieving the
objectives of the course.
1. HARDWARE
i) The PCs should be Pentium I I or higher ii) The PCs
should have a CD-ROM drive
iii) At least one of the PCs in the school should be full multimedia iv) A
network environment v) Internet connection vii) Printers with graphic
capabilities (not necessarily in colour)
2. SOFTWARE
i) It is recommended though not necessary that the operating system be a Graphical User Interface
(GUI)
ii) Software for the application packages may also be GUI - based which supports pointing devices
iii) Up to date anti-virus software are highly recommended.