INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY AND ETHICS
November 2021
Time: 3 hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL
DIPLOMA IN INFORMATION COMMUNICATION TECHNOLOGY
MODULE I
INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY AND ETHICS

INSTRUCTIONS TO CANDIDATES
This paper consists of EIGHT questions.
Answer any FIVE of the EIGHT questions in the answer booklet provided.
Candidates should answer the questions in English.


  1. (a) Outline four advantages of the outsourcing method of acquiring computer services.
    • Cost savings on infrastructure and staffing.
    • Access to specialized expertise.
    • Enhanced focus on core business activities.
    • Flexibility and scalability of services.
    (b) Describe three benefits of flash disks as storage devices.
    • Portability due to small size and light weight.
    • High speed of data transfer.
    • Durability and resistance to physical shock.
    (c) Distinguish between a floppy disk and a storage tape.
    • A floppy disk is a portable magnetic storage medium with limited capacity, used for transferring small files.
    • A storage tape is a high-capacity storage medium used for backups and archival data, typically in data centers.
    (d) Softech, a security firm in a financial institution, has two staff members. Explain three ways they could deal with this risk.
    • Implementing strong access controls and monitoring systems.
    • Conducting regular audits and risk assessments.
    • Providing staff training on security protocols and awareness.
  2. (a) Outline three positive effects of Information Communication Technology to a college.
    • Improved access to information and educational resources.
    • Enhanced communication between students, staff, and stakeholders.
    • Streamlined administrative processes and record management.
    (b) Figure 1 shows a computer input device. Use it to answer the questions that follow.(Figure not displayed)(i) Identify the device shown in the figure.
    • Optical Mouse.
    (ii) Explain the advantages of the device identified in (i).
    • Allows precise cursor control.
    • Easy to use and requires minimal training.
    (c) Explain the possible reasons that lead to unethical behavior in Information Communication Technology.
    • Lack of clear ethical guidelines or policies.
    • Pressure to meet tight deadlines or targets.
    • Financial incentives or personal gain.
    (d) A manager is developing a computer program for an organization using a high-level programming language. Describe three characteristics of such languages.
    • Easy to read, write, and maintain due to English-like syntax.
    • Platform-independent and easily portable across different systems.
    • Supports abstraction and complex functionalities.

(a) Outline four advantages of a star computer network topology.

  • Easy to install and manage due to its central hub structure.
  • Fault isolation is easier, as a failure in one cable does not affect others.
  • Scalable, allowing additional devices to be easily connected.
  • Provides good performance and reliability for small to medium-sized networks.

(b) Differentiate between half-duplex and full-duplex communication modes.

  • Half-duplex communication allows data transmission in both directions, but not simultaneously.
  • Full-duplex communication allows simultaneous data transmission in both directions.

(c) Outline four ways through which computers can be infected by a virus.

  • Downloading and opening infected email attachments.
  • Using infected external storage devices, such as USB drives.
  • Installing software from untrusted or unknown sources.
  • Visiting malicious websites or clicking on infected links.

(d) Explain how Telnet protocol enables communication through the internet. (6 marks)

  • Telnet protocol allows remote access to a computer over a network, enabling users to communicate with remote servers as if they were locally present. It transmits data in plaintext, allowing command execution and data transfer.

(a) Outline four types of Read Only Memory (ROM).

  • Programmable Read-Only Memory (PROM)
  • Erasable Programmable Read-Only Memory (EPROM)
  • Electrically Erasable Programmable Read-Only Memory (EEPROM)
  • Mask ROM

(b) Differentiate between compressing and evaluating conflict management techniques.

  • Compressing conflict management involves reducing the impact or intensity of conflicts without necessarily resolving them completely.
  • Evaluating conflict management involves assessing different techniques to determine the most effective way to resolve conflicts.

(c) Delight Company intends to hire a network administrator. Explain three skills that this computer personnel should possess.

  • Proficiency in network configuration and management.
  • Strong troubleshooting and problem-solving skills.
  • Knowledge of network security principles and practices.

(d) Explain three circumstances under which a company could use telecommuting.

  • When employees need flexibility in work locations due to personal or family reasons.
  • During situations like pandemics or natural disasters where physical presence is not feasible.
  • For roles that do not require constant physical presence in the office.

(a) Outline four ways a student could manage stress.

  • Practicing regular physical exercise.
  • Developing a study schedule to manage time effectively.
  • Engaging in hobbies or activities they enjoy.
  • Seeking counseling or support from professionals or peers.

(b) Describe each of the following terms as used in Information Communication Technology:
(i) Information privacy.

  • Protection of personal or sensitive information from unauthorized access or disclosure.

(ii) Copyright.

  • A legal right that grants the creator of original work exclusive rights to its use and distribution.

(iii) Data protection.

  • Safeguarding digital information from unauthorized access, corruption, or loss.

(iv) Ethical issues.

  • Concerns about what is morally right or wrong in the use and management of ICT resources.
  1. (a) Differentiate between data and intelligence terminals.
    • Data terminals are devices that input, display, and store data, while intelligence terminals are equipped with processing power to perform local data processing.
    (b) Jackson Technical Institute has been undertaking unsuccessful social responsibility programs. Explain three possible causes of this failure.
    • Lack of clear objectives or goals for the programs.
    • Insufficient community engagement or feedback.
    • Poor allocation or management of resources.
    (c) Outline three benefits that a school could accrue from good time management.
    • Improved productivity and academic performance.
    • Reduced stress and anxiety among students and staff.
    • Better coordination of activities and events.
  2. (a) Amal Computers Clinic has been handling many detected conflict instances in networks. Explain three possible causes of these conflicts.
    • IP address conflicts when two devices are assigned the same IP address.
    • Misconfigured network devices or settings causing disruptions.
    • Limited network bandwidth leading to competition for resources.
    (b) Figure 2 shows computer parts. Use it to answer the questions that follow.(Figure not displayed)(i) Identify each of the parts depicted in the figure.
    • Part 1: Hard Disk Drive (HDD)
    • Part 2: Central Processing Unit (CPU)
    (ii) Explain one use of each of the parts identified in (i).
    • Hard Disk Drive (HDD): Used for storing operating systems, software, and user data.
    • Central Processing Unit (CPU): Executes instructions and performs calculations required by software.
    (c) Adrian installed an application software in his computer. Describe two classes of this software that are used for personal tasks.
    • Word Processing Software: Used for creating and editing text documents.
    • Spreadsheet Software: Used for organizing, analyzing, and storing data in tabular form.
  3. (a) Outline four types of people skills that should be possessed by an Information Communication Technology graduate.
    • Effective communication skills to convey technical concepts to non-technical users.
    • Teamwork and collaboration skills for working with diverse groups.
    • Problem-solving skills to address technical challenges.
    • Adaptability and willingness to learn new technologies.
    (b) Explain three circumstances where a council would necessitate the use of a batch method in data processing.
    • When processing large volumes of data that do not require immediate response.
    • During off-peak hours to maximize resource usage.
    • When periodic reports or backups are needed.
    (c) Differentiate between logical and physical access controls as used in data security.
    • Logical access controls restrict access to systems and data through software mechanisms, such as passwords and encryption.
    • Physical access controls restrict access to physical areas, like server rooms, through barriers, locks, and guards.
    (d) Landa, an ICT manager in a company, advised the management to acquire a mainframe computer for networking. Explain three reasons that could have led to this advice.
    • The need for high processing power and reliability for critical applications.
    • The capability to handle and manage large-scale transactions and databases.
    • Robust security features to protect sensitive data in a corporate environment.
  4. (a) Explain three characteristics of real-time data processing methods.
    • Immediate processing of data inputs and outputs with minimal delay.
    • High reliability and availability to ensure continuous operation.
    • System responsiveness to time-critical operations, such as emergency response systems.
    (b) Explain two circumstances that could lead to upgrading to a computer-based data management system.
    • Need to handle increasing data volumes more efficiently.
    • Requirement for better data accuracy, security, and retrieval speeds.
    (c) An ICT technician prefers to use a three-step cable in a computer network. Explain three reasons for this preference.
    • Better data transmission speeds compared to older cable types.
    • Improved resistance to electromagnetic interference.
    • Greater durability and longevity for long-term use.
    (d) A company with ICT regulations and guidelines is developing its ICT policy. Outline four sources of these legislations and guidelines.
    • National laws and regulations, such as data protection acts.
    • Industry standards and best practices.
    • International agreements and treaties.
    • Organizational policies and procedures.

(a) Amal Computers Clinic has been handling many detected conflict instances in networks. Explain three possible causes of these conflicts.

  • IP address conflicts when two devices are assigned the same IP address.
  • Misconfigured network devices or settings causing disruptions.
  • Limited network bandwidth leading to competition for resources.

(b) Figure 2 shows computer parts. Use it to answer the questions that follow.

(Figure not displayed)

(i) Identify each of the parts depicted in the figure.

  • Part 1: Hard Disk Drive (HDD)
  • Part 2: Central Processing Unit (CPU)

(ii) Explain one use of each of the parts identified in (i).

  • Hard Disk Drive (HDD): Used for storing operating systems, software, and user data.
  • Central Processing Unit (CPU): Executes instructions and performs calculations required by software.

(c) Adrian installed an application software in his computer. Describe two classes of this software that are used for personal tasks.

  • Word Processing Software: Used for creating and editing text documents.
  • Spreadsheet Software: Used for organizing, analyzing, and storing data in tabular form.

(a) Outline four types of people skills that should be possessed by an Information Communication Technology graduate.

  • Effective communication skills to convey technical concepts to non-technical users.
  • Teamwork and collaboration skills for working with diverse groups.
  • Problem-solving skills to address technical challenges.
  • Adaptability and willingness to learn new technologies.

(b) Explain three circumstances where a council would necessitate the use of a batch method in data processing.

  • When processing large volumes of data that do not require immediate response.
  • During off-peak hours to maximize resource usage.
  • When periodic reports or backups are needed.

(c) Differentiate between logical and physical access controls as used in data security.

  • Logical access controls restrict access to systems and data through software mechanisms, such as passwords and encryption.
  • Physical access controls restrict access to physical areas, like server rooms, through barriers, locks, and guards.

(d) Landa, an ICT manager in a company, advised the management to acquire a mainframe computer for networking. Explain three reasons that could have led to this advice.

  • The need for high processing power and reliability for critical applications.
  • The capability to handle and manage large-scale transactions and databases.
  • Robust security features to protect sensitive data in a corporate environment.

(a) Explain three characteristics of real-time data processing methods.

  • Immediate processing of data inputs and outputs with minimal delay.
  • High reliability and availability to ensure continuous operation.
  • System responsiveness to time-critical operations, such as emergency response systems.

(b) Explain two circumstances that could lead to upgrading to a computer-based data management system.

  • Need to handle increasing data volumes more efficiently.
  • Requirement for better data accuracy, security, and retrieval speeds.

(c) An ICT technician prefers to use a three-step cable in a computer network. Explain three reasons for this preference.

  • Better data transmission speeds compared to older cable types.
  • Improved resistance to electromagnetic interference.
  • Greater durability and longevity for long-term use.

(d) A company with ICT regulations and guidelines is developing its ICT policy. Outline four sources of these legislations and guidelines.

  • National laws and regulations, such as data protection acts.
  • Industry standards and best practices.
  • International agreements and treaties.
  • Organizational policies and procedures.