Introduction to ICT and Ethics past paper with Answers July 2016

KNEC diploma in ICT module I: Introduction to ICT and ethics past paper July 2016 Answers

QUESTION ONE

a) Differentiate between supercomputers and mainframe computers – Click here to view the Answers

b) ICT is pivotal to the success of devolution in Kenya. Explain three benefits that could be realized with its adoption in county government – Click here to view the Answers

c) Wireless internet is prone to unauthorized user access. Explain three measures that could be used to mitigate this problem. – Click here to view the Answers

QUESTION TWO

a) i)Outline three types of computer buses. – Click here to view the Answers

ii) Distinguish between north and south bridges as used in computer’s chipset. – Click here to view the Answers

b) i) Explain three advantages of telecommuting – Click here to view the Answers

i) Computers cannot work without operating systems. Outline four functions of the software to justify this statement – Click here to view the Answers

QUESTION THREE

a) Outline four categories of computer keyboard keys – Click here to view the Answers

b) i) Irene was required to identify challenges that affect integration of computer ergonomics in an organization. Outline four typical challenges that she could have identified – Click here to view the Answers

ii) Data security should be an important area of concern for every small- business owner. Outline four data safety measures that can be adopted. – Click here to view the Answers

c) i) Paul is required to install a computer network for his company. Explain goals that he should strive to achieve in the installation – Click here to view the Answers

ii) Explain two circumstances that could lead to adaption of a ring topology in computer networking. – Click here to view the Answers

QUESTION FOUR

a) i) List four technologies for random access memory (RAM). – Click here to view the Answers

ii) Differentiate between competing and collaborating conflict management techniques. – Click here to view the Answers

b) Outline four safety precautions that should be adhered to when charging a laptop computer. – Click here to view the Answers

c) Steve was required to select an application software for a client. Explain two factors that he should consider other than cost. – Click here to view the Answers

d) i) Logical data safety techniques are increasingly adopted in organizations. Outline three examples of such logical safety techniques – Click here to view the Answers

ii) Green computing is gaining popularity in developing countries. Outline three challenges in its adoption – Click here to view the Answers

QUESTION FIVE

a) Explain each of the following terms as used in computers: i)data ii)node. – Click here to view the Answers

b) Jane was receiving spam emails in her mail box. Outline four precautionary measures that she could put in place to handle the problem. – Click here to view the Answers

c) i) Outline two advantages of using minicomputers – Click here to view the Answers

ii) Distinguish between requirements and qualifications as applied in recruitments. – Click here to view the Answers

c) Define the term discount as used in computer acquisition – Click here to view the Answers

d) A lecturer described verbal communication in an ICT class. Explain two types of verbal communication that he could have described. – Click here to view the Answers

QUESTION SIX

a) i)Describe each of the following data processing methods; i)batch ii)real-time – Click here to view the Answers

ii) Differentiate between system user and system analyst. – Click here to view the Answers

b) With the aid of a diagram, describe the components of computer’s central processing unit. – Click here to view the Answers

c) i)Philip, a human resource consultant prepared a presentation on staff motivation. Outline four negative impacts of unmotivated staff to an organization that he could have mentioned. – Click here to view the Answers

ii) Sam was required to identify application software in his friend’s computer. Outline Four types of this software that he could have identified – Click here to view the Answers

QUESTION SEVEN

a) Explain two methods of acquiring software license. – Click here to view the Answers

b) For each of the following scenarios, propose the most appropriate type of computer network: i)to connect computers in a single room or a building; ii)to connect computers within a town. iii)to connect computers around the world iv)to enable internet services within a private network – Click here to view the Answers

c) Tessie intends to formulate wireless policy for her company. Outline four rules that she was likely to consider – Click here to view the Answers

d) i) Desktop computers come with several sizes of CPU casing. Outline four types of such casings. – Click here to view the Answers

ii) Beth was required to give a lecture on ICT opportunities to a youth group. Explain two communication skills that could apply during the talk – Click here to view the Answers

QUESTION EIGHT

a) Outline three precautions when handling re-writable Computer Disks – Click here to view the Answers

b) Explain three benefits of embracing good ICT ethics in organization – Click here to view the Answers

c) i) Outline two measures that could be used to mitigate stress at a workplace – Click here to view the Answers

ii) Magnetic disks are popular computer storage medium. Outline three of its advantages that influence this trend – Click here to view the Answers

d) Bernard intends to install software on a number of computers in his company. Describe three methods of installation that he could apply. – Click here to view the Answers

(Visited 98 times, 1 visits today)

Leave a Reply

Your email address will not be published. Required fields are marked *