THE KENYA NATIONAL EXAMINATIONS COUNCIL
DIPLOMA IN INFORMATION COMMUNICATION TECHNOLOGY
MODULE I
INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY AND ETHICS
March/April 2023
Time: 3 hours

INSTRUCTIONS TO CANDIDATES:

  • This paper consists of EIGHT questions.
  • Candidates should attempt any FIVE questions.
  • Candidates should answer the questions in English.

1. (a) Outline four advantages of outsourcing acquisition method.
Answer:

  1. Cost savings through reduced operational expenses.
  2. Access to a global talent pool with specialized skills.
  3. Improved focus on core business activities.
  4. Faster turnaround time for projects due to external expertise.

(b) Explain three characteristics of the third generation computers.
Answer:

  1. Utilization of integrated circuits (ICs) which enhanced processing power.
  2. Introduction of operating systems enabling multiple applications to run simultaneously.
  3. Smaller in size compared to earlier generations, leading to more efficient and compact designs.

(c) A computer laboratory has been secured using facial recognition. Explain three reasons for this approach.
Answer:

  1. Enhanced security by ensuring only authorized personnel have access.
  2. Reduction in the possibility of unauthorized entry using stolen credentials.
  3. Automatic logging of entry times and dates, facilitating monitoring and auditing.

(d) With the aid of a diagram, describe peer-to-peer computer network.
Answer: (Description and diagram would involve a network where each computer, known as a peer, has equal status and can communicate directly with others, sharing resources like files without needing a central server.)

(e) Outline three characteristics of the use of voice as an input method.
Answer:

  1. Hands-free operation, beneficial in situations where manual input is not possible.
  2. Enhanced accessibility for users with disabilities.
  3. Potential for faster input, especially for repetitive or standard commands.

2. (a) Outline four benefits of self-awareness as a college student.
Answer:

  1. Improved academic performance through better time management.
  2. Enhanced emotional intelligence, leading to better relationships with peers.
  3. Ability to set realistic goals and work towards achieving them.
  4. Increased resilience and ability to handle stress.

(b) Mrs. Mahohi, Head of Section, was using an input device. Explain three drawbacks associated with its use.
Answer:

  1. Potential for repetitive strain injuries if used for extended periods.
  2. Susceptibility to wear and tear, leading to reduced accuracy or malfunction.
  3. Dependence on the device’s quality, which may affect performance.

(c) Differentiate between peer-to-peer and server-user type of network.
Answer:

  1. In a peer-to-peer network, all devices share equal responsibilities and can communicate directly without a central server. In contrast, a server-user network involves centralized control, where a server manages resources and client devices request services.
  2. Peer-to-peer networks are typically easier to set up and cost-effective for small networks, while server-user networks are more scalable and suitable for larger organizations.
  3. Security in server-user networks is generally stronger due to centralized management, whereas peer-to-peer networks might have decentralized and potentially weaker security controls.

(d) Describe three circumstances that could make an organization shift to in-house software development.
Answer:

  1. Need for customized solutions tailored to specific business processes.
  2. Desire for full control over the software, including updates, modifications, and security.
  3. Cost considerations in the long term, as in-house development might reduce dependency on third-party vendors.

3. (a) Explain two benefits of copyrights.
Answer:

  1. Provides legal protection to creators, ensuring they can control and profit from their work.
  2. Encourages innovation and creativity by rewarding creators with exclusive rights.

(b) An organization intends to develop its ICT legislations. Explain three sources of these legislations.
Answer:

  1. National laws and regulations that govern ICT practices within the country.
  2. International treaties and conventions that the country is a signatory to.
  3. Industry standards and best practices that have been established by professional bodies.

(c) Differentiate between hardware and software as used in computers.
Answer:

  1. Hardware refers to the physical components of a computer system, such as the CPU, monitor, and keyboard, whereas software refers to the programs and applications that run on the hardware.
  2. Hardware is tangible and can be physically touched, while software is intangible and exists as code.
  3. Hardware requires software to function, as it provides the instructions for the hardware to perform tasks.

(d) Technical Institute has launched a virtual learning programme for its students. Explain three advantages of this programme to the students.
Answer:

  1. Flexibility in learning, allowing students to access courses at their convenience.
  2. Accessibility for students in remote locations who might not otherwise attend classes.
  3. Cost-effectiveness, as virtual learning often reduces expenses related to transportation and accommodation.

(e) Explain three techniques an organization can use to manage conflicts.
Answer:

  1. Mediation, where a neutral third party helps resolve disputes by facilitating discussion.
  2. Negotiation, where conflicting parties communicate directly to reach a mutually acceptable solution.
  3. Arbitration, where a third party makes a binding decision after hearing both sides of the conflict.

4. (a) Outline four advantages of light pens as an input device.
Answer:

  1. Allows for direct interaction with the display, providing precise control.
  2. Useful for tasks requiring detailed graphical input, such as drawing or design.
  3. Portable and easy to use with compatible screens.
  4. Eliminates the need for a traditional mouse, offering an alternative input method.

(b) Two staffs from an ICT section were injured. Explain three symptoms that could be exhibited by a computer user suffering from repetitive strain injury.
Answer:

  1. Persistent pain or discomfort in the affected muscles or tendons.
  2. Swelling, numbness, or tingling sensations in the hands or arms.
  3. Reduced strength and difficulty in performing repetitive tasks.

(c) Distinguish between revised and final price give cards as used in technology.
Answer:

  1. A revised price card indicates a change from an earlier quoted price, usually after negotiations or market changes. A final price card represents the last agreed-upon price, with no further changes expected.
  2. Revised price cards may be temporary and subject to further modifications, whereas final price cards are typically binding.
  3. Final price cards are often used in final transactions, while revised price cards are used during the negotiation or bidding stages.

(d) Explain three steps a company could take to improve its software security.
Answer:

  1. Implementing regular software updates and patches to fix vulnerabilities.
  2. Using encryption to protect sensitive data both in transit and at rest.
  3. Conducting regular security audits and penetration testing to identify and address potential threats.

5. (a) Distinguish between soft and hard printers.
Answer:

  1. Soft printers refer to virtual printers that generate files (like PDFs) instead of physical prints, while hard printers produce tangible printouts on paper or other materials.
  2. Soft printers are used for electronic document management, whereas hard printers are for producing physical copies.
  3. Hard printers require ink or toner and physical media, while soft printers do not.

(b) Differentiate between inkjet and laser printers.
Answer:

  1. Inkjet printers use liquid ink sprayed through tiny nozzles to create an image, while laser printers use a laser beam to form images on a drum that is then transferred to paper using toner.
  2. Inkjet printers are typically better for color printing and photo quality, whereas laser printers are more efficient for high-volume text documents.
  3. Laser printers generally have a higher initial cost but lower cost per page compared to inkjet printers.

(c) Progressive Gracelle Company have noted related conflicts arising among themselves. Explain three possible causes of these conflicts.
Answer:

  1. Differences in work ethics or values among employees.
  2. Competition for limited resources or recognition within the company.
  3. Poor communication leading to misunderstandings and resentment.

6. (a) Explain two features of system models.
Answer:

  1. System models provide a visual representation of a system’s components and their interactions, helping to understand complex systems.
  2. They facilitate the analysis and design of systems by breaking down the system into manageable parts.

Distinguish between windowing and non-windowing techniques.
Answer:

  1. Windowing techniques involve the use of graphical windows to interact with the system, allowing multiple tasks to be viewed and managed simultaneously. Non-windowing techniques rely on command-line interfaces or single-task environments without visual multitasking capabilities.
  2. Windowing is more user-friendly and accessible for non-technical users, while non-windowing is often more efficient for experienced users who prefer keyboard shortcuts.

(c) Robotech Company intends to acquire a mainframe computer. Explain three features that could influence this consideration.
Answer:

  1. High processing power capable of handling large-scale computations and data processing.
  2. Ability to support numerous simultaneous users and applications, making it ideal for large organizations.
  3. Enhanced reliability and uptime, essential for mission-critical operations.

(d) An organization aims to improve the confidentiality of its data. Outline three measures that could be put in place to achieve this.
Answer:

  1. Implementing strong encryption protocols to protect sensitive information.
  2. Restricting access to confidential data to only authorized personnel through role-based access control.
  3. Regularly training employees on data privacy practices and potential security threats.

7. (a) Outline three uses of computers in an engineering firm.
Answer:

  1. Design and simulation of engineering projects using CAD (Computer-Aided Design) software.
  2. Data analysis and modeling for structural, mechanical, and electrical systems.
  3. Automation of manufacturing processes through computer-controlled machinery.

(b) Explain four factors to consider when designing a computer room.
Answer:

  1. Adequate ventilation and cooling systems to prevent overheating of equipment.
  2. Sufficient power supply with backup solutions to ensure continuous operation.
  3. Ergonomic layout to facilitate easy access to equipment and ensure comfort for users.
  4. Security measures to protect against unauthorized access or theft.

(c) A student intended to buy solid computers.
(i) Identify this device.
Answer: The device referred to as “solid computers” could be interpreted as rugged or durable computers designed for harsh environments.

(ii) Explain three characteristics of the device identified in (i).
Answer:

  1. Reinforced construction to withstand extreme conditions such as dust, moisture, and impact.
  2. Extended battery life to ensure operation in remote locations without easy access to power.
  3. Portability and compactness to facilitate use in the field or on-site.

(d) Outline four duties of a network administrator.
Answer:

  1. Managing and configuring network hardware and software to ensure optimal performance.
  2. Monitoring network security and implementing measures to prevent unauthorized access.
  3. Troubleshooting network issues and resolving connectivity problems.
  4. Maintaining and updating network documentation, including network maps and configuration details.

8. (a) The following are computer keyboard keys: Home, Tab, Enter, End, Insert, Ctrl, Alt, Page Up
Classify each of these keys as either navigation or special.
Answer:

  • Navigation keys: Home, End, Page Up
  • Special keys: Tab, Enter, Insert, Ctrl, Alt

(b) An organization uses in-house software. Explain three disadvantages of this software.
Answer:

  1. High initial development costs, as the organization must invest in skilled developers and resources.
  2. Maintenance and updates are the organization’s responsibility, requiring ongoing investment.
  3. Limited external support, as the software is custom-made, which may result in challenges if the original development team is unavailable.

THIS IS THE LAST PRINTED PAGE