State a circumstance under which each of the following statements are used in a visual basic program: (6 marks)
(i) ReDim;
(ii) Option base;
(iii) Preserve.
(Answered)
Write a Visual Basic program that accepts percentage score in an examination through the use of an input box function. The program then displays a remark based on the following criteria. Use case statement. (5 marks)
Score remarks
0-40 Failed
41-50 Pass
51-70 Credit
Above 70 Distinction (Answered)
State two differences between the unload method and Hide method as used in Visual Basic program forms. (Answered)
Distinguish between function procedure and event procedure as used in Visual Basic programming language. (Answered)
Explain each of the following error handling methods used in Visual Basic programming language (6 marks)
i. Err.Number,
ii. Err.Clear,
iii. On Error-GoTo (Answered)
Explain the function of each of the following IDE interface of a visual basic program: (6 marks)
(i) Form window;
(ii) Property window;
(iii) Form layout window. (Answered)
State the visual basic conversion type function used to convert a string of the following statement in a visual basic program: (4 marks)
(i) Boolean data;
(ii) Currency;
(iii) Date data;
(iv) Integer data. (Answered)
Explain each of the following types of controls in a Visual Basic program (4 marks)
(i) DriveListBox
(ii) DirListBox (Answered)
Models are used to represent the architecture of various systems. Briefly explain four types
of database models that can be implemented in database design (Answered)
Distinguish between a field and a record in database system (Answered)
Write a program in visual basic that accepts a name and a score of six students in a test
through the use of inputbox(). The program should then display the names, scores and the average scores on a picturebox. Attach the code to a command button (Answered)
State two advantages of multiplexing in data communication systems (Answered)
Distinguish between CSMA/CD and token ring media access methods (Answered)
Define the term node as used in data transmission (Answered)
Explain three functions of the data link layer (Answered)
With aid of a diagram, describe the User Datagram Protocol (UDP) datagram (Answered)
Differentiate between malware and ransom ware as applied in network security (Answered)
Explain each of the following terms as used in the internet (6 marks)
i. Bookmark
ii. Plug-in
iii. Search engine
(Answered)
Explain two roles of the Domain Naming Server (DNS) (Answered)
With aid of a diagram, describe TCP/IP layer model (Answered)
Explain three functions of the session layer as used in OSI (Answered)
Differentiate between star and hybrid network topologies (Answered)
Distinguish between network and host addresses as applied in IP addressing (Answered)
With aid of a diagram, describe the structure of a coaxial cable (Answered)
Bring your own device (BYOD) poses some risks to software cooperate networks. Explain two potential risks that are likely to be experienced (Answered)
Differentiate between hub and repeater as used in computer networks (Answered)
Define the term latency as applied in network troubleshooting (Answered)
Describe two components of a data communication system (Answered)
Outline two functions of a network operating system (NOS) (Answered)
Outline two typical features of 10BaseT network (Answered)
Outline three benefits of OSI model in data communication (Answered)
What is a computer Network (Answered)
Explain each of the following as used in Data communication (6 marks)
a) Simplex Communication system
b) Duplex Communication system
c) Full Duplex Communication system
(Answered)
Differentiate between Circuit switching and Packet switching as used in data communication (Answered)
Differentiate between Data Communication Equipment (DCE) and Data Terminal Equipment (DTE) (Answered)
Give 3 functions of a protocol in data communication (Answered)
What is a protocol as used in computer data communication (Answered)
Derive the truth table for each of the following logic gates having two inputs.
(i)NOR gate
(ii)NAND gate
(iii)XNOR gate
(Answered)
Peter, John and Mary intend to purchase 15, 16, 18 books and 9, 11, 15 pens each respectively. In shop A a book cost Kshs 250 and a pen costs Kshs 175 while in shop B, a book cost Ksh 225 while a pen costs Kshs 190.
i) Represent this information in matrix form.
ii) Using matrix method, determine the total cost the three students would spend to acquire the items from shop A and from shop B. (Answered)
State two differences between discrete variable and a continuous variable (Answered)
Explain the term random variable as used in probability (Answered)
Kihoto self-help group comprises of 58 members. They intend to choose 3 officials from the group to represent them in a conference. Determine the number of ways the 3 members can be chosen (Answered)
Simplify the expression (A+B)(A+C) stating the law of Boolean algebra applied at each step (Answered)
Most computers use Universal Serial Bus (USB) ports to allow the attachment of devices. Describe two benefits of using USB ports. (Answered)
Name the most suitable input or output device for each of the following uses. Give a different device in each case. (Answered)
Sensors are one type of input device. For each of the following situations, name a different sensor that could be used.
(i) air conditioning in an office building
(ii) maintaining correct growing conditions in a greenhouse
(iii) detecting an intruder in a building (Answered)
Advantages of Round Robin Scheduling algorithm (Answered)
What are the disadvantages of technical documentation of a program (Answered)
What are the advantages of Technical documentation of a program (Answered)
What is an EDF scheduler? What is its advantage over a rate monotic scheduler? (Answered)