Intro To Information Communication Technology And Ethics November 2015

Exam Year:2015

Exam code:2920-101

Free knec college past papers

Information communication technology past papers

The Kenya National Examinations Council

Diploma in Information Communication Technology
Module I

Introduction to Information Communication Technology and Ethics

November 2015

Answer any FIVE of the following EIGHT questions

1. (a) Explain each of the following terms as used in computers:
(i) wikis; (2 marks)
(ii) blog. (2 marks)
(b) Sawa Company Ltd. is experiencing internal hacking of their computer system.
Outline four possible root causes of the problem. (4 marks)

(c) (i) Outline two benefits of embracing ICT in learning. (2 marks)
(ii) Distinguish between stress and fatigue. (4 marks)
(d) (i) Define the term lease as used in computer acquisition. (2 marks)

(ii) Keziah was selected as chairperson for an ICT committee in her company.
Outline four communication skills that she could use during meetings. (4 marks)
2. (a) Outline four types of computer mice. (4 marks)
(b) (i) Ergonomics awareness education should address all the safety needs of an organization. Outline four objectives of such an awareness initiative. (4 marks)

(ii) Daisy- Winds Company Ltd. intends to embrace ergonomic standards in all its computer facilities. Outline four benefits that the company could realize from this decision. (4 marks)

“(c) (i) With the aid of diagrams in each case, explain two categories of computer networks based on how information is shared. (4 marks)

(ii) Explain two circumstances that could necessitate the use of hybrid topology in a computer network. (4 marks)

3. (a) Differentiate between microcomputer and minicomputer. (4 marks)

(b) Figure 1 shows typical port signs that could found in a computer system. Outline the function of each of the port signs labeled (i) and (ii). (4 marks)

Figure 1

(c) Tash was invited to give a lecture on the use of ICT at a conference in a college.
Assume she consulted you, outline six qualities of a good public speaker that you could have suggested to her. (6 marks)
(d) Salome noted that a good number of her friends were using pirated software. Explain three categories of risks that are likely to affect their computers. (6 marks)

4. (a) Outline three measures that could be used in an organization to mitigate conflict of interest with its staff. (3 mark)
(b) Explain three advantages of embracing ICT ethics in organizations. (6 marks)
(c) (i) Outline two challenges of computers at home. (2 marks)
(ii) Magnetic disks are popular computer storage medium. Outline three advantages of this storage medium. (3 marks)

(d) Norah was required to describe the categories of computer keys in an examination.
Describe three categories that she was likely to mention (6 marks)

5. (a) (i) Outline three examples of scanners that can be used with computers. (3 marks)
(ii) Distinguish between RAM and ROM as used in computers. (4 marks)

(b) Explain three benefits that an organization could realize by embracing green computing. (6 marks)

(c) (i) Outline three reasons that could necessitate organizations to initiate social responsibility projects. (3 marks)

(ii) A lecturer intends to install computer software. Explain two categories of software that he could install. (4 marks)

6. (a) Explain each of the following types of computers:
(i) analog; (2 marks)
(ii) hybrid. (2 marks)
(b) Differentiate between computer systems implementer and computer systems analyst. (4 marks)
(c) With the aid of a diagram, describe the functional components of a system unit. (4 marks)
(d) (i) Jorum was seeking advice from his friends on how to manage work conflict.
Outline four measures of managing work conflict that he is likely to have been advised. (4 marks)

(ii) Nancy was required to identify functions of an operating system during a job interview. Outline four functions that she could have identified, (4 marks)
7. (a) Explain each of the following terms as used in hardware acquisition
(i) warranty; (2 marks)
(ii) interoperability . (2 marks)

(b) Figure 2 shows a typical network topology. Outline the component labeled (i) and (ii).
(4 marks)

Figure 2

(c) Paul was required to formulate computer laboratory safety rules. Outline four rules that he was likely to list. (4 marks)

(d) (i) All computers utilize several types of buses for efficient system communication.
Describe two typical categories of buses found in computers. (4 marks)
(ii) Polly, an intern student in a certain college was required to install certain software in all computers in the college. Outline four methods of installation that she could have used. (4 marks)
8. (a) (i) List four recordable versions of digital versatile disk (DVl )) that could be found in computers (2 marks)

(ii) Differentiate between preventive and reactive conflict management techniques. (4 marks)
(b) Explain two objectives of computer safety policy in organizations. (4 marks)
(c) Communication software is considered as a vital tool in business. Outline four categories of such software that could be found in business firm . (4 marks)
(d) (i) Data privacy is critical part of information communication technology. Outline three measures that an organization could use to realize its data privacy standards. (3 marks)

(ii) Facebook has connected the world as one big community. Outline three negative impacts that are likely to be associated with its adoption by students. (3 marks)

More related ICT revision materials