Distinguish between transposition and transcription error in data processing.(Answered)
Define the term datum? Give an example..(Answered)
Differentiate between the terms eavesdropping and tapping as used in data
security(Answered)
Give an example of computer fraud.(Answered)
Define the term computer fraud.(Answered)
Explain five data security practices that can be carried out by an organization.(Answered)
Define the term cyberterrorism.(Answered)
Define the term data control.(Answered)
Define the following terms.
i)Virus hoaxes
ii)Computer worm
iii)Trojan
iv)Phishing
v)Adware
vi)Identity theft(Answered)
Mention the risk to data associated with the opening and responding to spam
mail.(Answered)
Give one law which relates to data and information systems used in Kenya.(Answered)
Describe two areas covered by laws relating to information system.(Answered)
Describe the following methods of detection and protection of computer
crimes:(Answered)
Describe how a firewall works.(Answered)
Mention two examples of cyberterrorism.(Answered)
Describe the following computer crimes;(Answered)
Give four precaution that can be taken against computer viruses in a school.(Answered)
List three ways through which viruses get into a computer system.(Answered)
Give three symptoms of computer infected by viruses.(Answered)
Mention three features of computer viruses.(Answered)
Define the term computer virus.(Answered)
Define the following terms;
i)Password
ii)Authentication(Answered)
Give three items that may be covered by computer ethics.(Answered)
Define the term computer ethics.(Answered)
Define the term spyware.(Answered)
Differentiate between data encryption and use of password.(Answered)
State one function of firewall.(Answered)
State three precautions a bank can take to prevent illegal data alterations.(Answered)
State any three functions of an antivirus software.(Answered)
State ways in which piracy in the software industry can be minimized.(Answered)
State two ways of recovering data lost through accidental erasure.(Answered)
Natural disasters can cause Loss of data and programs.
State two ways of ensuring that data/programs are not lost if a disaster strikes.(Answered)
Other than hacking and cracking, explain any other three computer crimes.(Answered)
State two control measures a company can implement to restrict hackers from accessing its information system.(Answered)
State one benefit of hacking to an organization’s computer system.(Answered)
State four destructive activities that crackers can perform on a computer.(Answered)
Define the term computer server.(Answered)
Mention four forms of unauthorized access(Answered)
List four possible threats to data security.(Answered)
Give two ways of updating an antivirus software(Answered)
Differentiate between data security and privacy.(Answered)
Name three types of computer viruses.(Answered)
Mention three ways of ensuring efficient back up of data.(Answered)
Explain three causes of data loss or program corruption in a computer system.(Answered)
Define the following terms:
a)Private data
b)Confidential data
c)Data security.(Answered)
Give two types of firewall.(Answered)
Define the term firewall.(Answered)
Differentiate between a hacker and a cracker.(Answered)
Give the importance of carrying out audit trail in an information system.(Answered)
Give two ways in which software piracy can be reduced.(Answered)
Define the term system sabotage as applied in computing.(Answered)
Define the term log files.(Answered)
Define the term mail etiquette as applied in sending e-mail.(Answered)
Write the following acronyms in full.
i)GSM
ii)GPRS(Answered)
Give factors to consider when choosing an Internet Service Provider.(Answered)
Outline the role of an Internet Service Provider (ISP).(Answered)
The acronym ARPA is associated with the historical development of the internet. Write it in full(Answered)
Define the term internet.(Answered)
State two advantages of using wireless transmission media to connect to the internet.(Answered)
List eight activities that can be carried out on an active webpage.(Answered)
Outline the steps one would follow to download a file from an active webpage.(Answered)
Differentiate betweenWorld Wide Web (WWW) and the internet.(Answered)
Mention one reason for deleting mails from the inbox.(Answered)
Differentiate between a webpage and a website.(Answered)
State five features of a web browser.(Answered)
State five importance of the internet to the society.(Answered)
List three advantages and disadvantages of e-learning.(Answered)
Define the following terms as used in the internet:
i)search engine
ii)Newsgroup
iii)Browsing
iv)Internet blog(Answered)
An e-mail address is given as mwananchi@gmail.com. Identify each part of this address.(Answered)
Write down six features of electronic mail.(Answered)
Distinguish between the terms sign in and sign up as used with e-mails.(Answered)
Other than congesting the inbox, state any other potential harm that unsolicited mail can bring
about.(Answered)
E-mail users often get unsolicited mail in their inbox. Give the term used to refer to such mails(Answered)
State any four negative effects of internet to the society.(Answered)
Name two e-mail software.(Answered)
List three precautions that should be taken when downloading software from the internet(Answered)
Differentiate between bcc and cc as used in e-mail software.(Answered)
Describe the term global village as used in the internet.(Answered)
Define the following terms as used with e-mail software.
a)attachment
b)cc
c)bcc
d)recipient(Answered)
Write the following acronyms in full:
a)HTML
b)HTTP
c)WWW
d)URL(Answered)
Define the term information superhighway.(Answered)
Mention two:
a)Internet search engines
b)Web browsers
(Answered)
Give three reasons why email has not completely replaced post office mail in Kenya.(Answered)
State the meaning of the following domains types:
i)Com
ii)edu
iii)org
iv)mil(Answered)
List one protocol used on the Internet.(Answered)
Define the term uploading(Answered)
Define the term downloading.(Answered)
Define the term E-learning.(Answered)
State any three disadvantages of e-mail over a postal mail.(Answered)
State any three advantages of email over a postal mail.(Answered)
State any four services provided by the internet.(Answered)
Write the acronym ISP in full.(Answered)
Give four examples of ISPs in Kenya.(Answered)
Define the term protocol as used with the internet.(Answered)
Define the term modulation as used in data communication.(Answered)
Give the functions of a modem in data communication.(Answered)
List three main component contained in the header of an e-mail compose window.(Answered)
List any two components needed for internet connection.(Answered)
State three factors to be considered before designing a publication.(Answered)
Describe three ways of ensuring that an online publication is secure from unauthorized access.(Answered)