Monday, 27 April 2015

KASNEB PAST CICT PAPERS

OPERATING SYSTEM (THEORY) Tuesday: 5 December 2006

KENYA ACCOUNTANTS AND SECRETARIES NATIONAL EXAMINATIONS BOARD
CERTIFIED INFORMATION COMMUNICATION TECHNOLOGY PROFESSIONAL EXAMINATION

PART 1 – MODULE 2
OPERATING SYSTEM (THEORY)
Tuesday: 5 December 2006                                                                                                                   Time allowed: 3 hours.

Answer ALL questions. Marks allocated to each question are shown at the end of the question.
QUESTION ONE
a)       Define the term “operating system” and highlight two types of operating system.      (4 marks)
b)       Outline four tasks which are performed by an operating system performance monitor. (4 marks)
c)        Briefly describe six functions of an operating system.      (12 marks)
                                                                                         (Total: 20 marks)
QUESTION TWO
a)       Explain the difference between an extended machine and a resource manager in the context of an operating system    (6 marks)
b)       State any four requests made by the set-up program during the installation of operating system                                                                          (4 marks)
c)        Hassan Ali, an information communication technology (ICT) student, is on internship at Kazi Mzuri Ltd. The ICT manager would like Hassan Ali to implement redundant array of independent disks (RAID) technology to the company’s database sever.

Required:
Explain the five levels of redundant array of independent disks (RAID) which Hassan Ali would configure on the database server in order to implement the RAID technology.   (10 marks)
                                                                                          (Total: 20 marks)
QUESTION THREE
a)       State four factors which determine the size of the directory services database.  (4 marks)
b)       Highlight six functions which can be performed by the systems administrator or user properly implemented operating system directory services environment.     (6 marks)
c)        You are employed as a system support technician by TN Ltd. The finance manager has informed you that most computers in the finance department are down.

Required:
Describe a suitable troubleshooting methodology you would apply in identifying the problem affecting the computers in the finance department.     (10 marks)
                                                                                          (Total: 20 marks)
QUESTION FOUR
(a)     The domain name system (DNS) is used to resolve host names on a local area network (LAN) or the internet. Explain in brief the two main components of a domain name system (DNS)                                                             (6 marks)
(b)     (i) State the syntax used to run NSLOOKUP utility.                                                                                                       (1 mark)
(ii)Give the steps used to run NSLOOKUP utility in an interactive mode.  (5 marks)
(c)      The system administrator of Sky Ways Ltd. Is in the process of upgrading the company’s intranet. The main objectives of upgrading the intranet is to optimize the browsing traffic.

Required:
Briefly describe four ways in which the system administrator would be able to optimize the intranet browsing traffic.                                                 (8 marks)
                                                                                          (Total: 20 marks)
QUESTION FIVE
Operating system provides a mechanism for configuring the behavior of the keyboard attached to the computer. Outline the behavior  of the following sets of keys after they have been configured correctly:
Sticky keys.                                                                                    (2 marks)
Filter keys.                                                                                     (2 marks)
Toggle keys.                                                                                    (2 marks)
The display utility setting of an operating system is used to configure the “looks and feel” properties of an operating system:
Indicate the importance of the following dislay properties utility settings:
Theme                                                                                          (2 marks)
Desktop                                                                                         (2 marks)
Screensaver                                                                                  (2 marks)
Appearance                                                                                   (2 marks
Define the term “hardware profile” and state the steps followed when creating a new hardware profile.  (6 marks)
                                                                                         (Total: 20 marks)


KASNEB CICT PART I SECTION I ENTREPRENEURSHIP AND COMMUNICATION

KASNEB

CICT PART I SECTION I

ENTREPRENEURSHIP AND COMMUNICATION

TUESDAY: 4 June 2013. Time allowed 3hrs.
Answer any THREE questions in section I and TWO questions in section II. All questions carry equal marks.
                                                                                        SECTION I

Question One
(a)    Explain five myths on entrepreneurship. (10 marks)
(b)   Examine five stages that are involved in the pre-start up phase of a new business venture (10 marks) (Total 20 marks)


Question Two
(a)   (i) Distinguish between Business networking and business outsourcing. (4 marks)
(i)                 Outline six advantages of business outsourcing to an enterprise. (6 marks)
(b)  An enterprise should be socially responsible.
(c)    Argue five cases in support of the above statement. (10 marks) (Total 20 marks)

Question Three
(a)   (i) Distinguish between Utility patents and Design Patents. (4 marks)
       (i)  Discuss four strategies that an entrepreneur might use to minimise patent risk (8 marks)
(b)  Entrepreneurs are faced with challenges of cultural diversity in their business.
(d)   Discuss four ways that could be used to overcome challenges of cultural diversity in businesses (8 marks) (Total 20 marks)
Question Four
(a)   (i) In relation to global entrepreneurship, define the term “gazelle”. (2 marks)
       (i)  Identify five differences between privately sponsored and publicly sponsored incubators (10 marks)
(e)   Explain four internal and four external factors which motivate individuals to develop entrepreneurial behaviour. (8 marks) (Total 20 marks)
                                                                                        SECTION II

Question Five
Poor communication is one of the contributing factors to low productivity in organisations.
(a)    Assess four communication problems which are likely to be encountered at the workplace and recommend measures that could be employed to minimise the problems.(8 marks)
(b)   Outline four factors that might affect an audience’s accurate reception of information.(4 marks)
(f)     Discuss four methods of filing that could be used in an enterprise. (8 marks) (Total 20marks)

Question Six
(a)   Briefly explain when it is best to use each of the following conference seating plans:
(i)   Theatre style (2 marks)
(ii)   U shape style (2 marks)
(iii)  Classroom style (2 marks)
(iv)  Boardroom style (2 marks)
(b)  Outline four benefits of e-mailing memos in an organisation (4 marks)
(g)    Highlight eight characteristics of an effective speech. (8 marks) (Total 20 marks)

Question Seven
(a)   Identify five skills relevant in non-verbal communication.
(b)  Highlight seven benefits which could accrue to an organisation from conducting exit interviews. (7 marks)
(h)   Examine four roles of external communication system in an organisation. (8 marks)(Total 20 marks)


CICT PART II SECTION 3

STRUCTURED PROGRAMMING

Wednesday: 5 June 2013.              
Time: allowed: 3 hours.

Answer ALL questions. Marks allocated to each question are shown at the
end of the question. Show ALL your workings.

ALL programs written should be in C programming language.

QUESTION ONE

(a)     Describe the uses of the following terms in the context of structured programming
         environment:

            (i)  Compilation (2 marks)

            (ii)  Linking (2 marks)

           (iii)  Build (2 marks)

           (iv)  IDE (2 marks)

(b)     Citing suitable examples in each case, describe three types of declarations in
         structured programming. (9 marks)

(c)     Below is a programming declaration.

           Int  *ptv1,} (i),

           x, } (ii),

           a[10]; } (iii)

         Required:

         Identify the parts labeled (i) to (iii). (3 marks)

(Total: 20 marks)

QUESTION TWO

(a)     (i) Distinguish between “declaring a function” and “defining a function”. (4 marks)

        (ii) Write a C language function that calculates and returns the square of an integer
            number. (4 marks)

(b)     Use illustrations to explain three iteration structures used in structured
         programming. (9 marks)

(c)     Highlight three items that a message from a compiler might contain (3 marks)

(Total: 20 marks)

 QUESTION THREE

(a)     Examine the roles of the following statements in structured programming.

       (i)         Continue. (2 marks)

       (ii)        goto. (2 marks)

(b)    You have been awarded a contract to write a program for the government’s tax department.
        The program calculates tax deductions on salary based on the following
        criteria:

          ·        If the salary is less than or equal to Sh. 10,000, there is no deductions.

          ·        If the salary is more than Sh. 10,000, and less than 20,000, the tax deduction is Sh. 1,000.

          ·        If the salary is equal to or more than Sh. 20,000, the tax deduction is 7%.

Required:

Write a C program that inputs the salary amount computes appropriate
tax deductions and outputs the net pay. (7 marks)



(c)      Outline four validation rules of user input in C programming language. (4 marks)

(d)      Highlight five advantages of structured programming languages over procedural languages. (5
          marks)

(Total: 20 marks)

QUESTION FOUR

(a)     Define the following terms as used in structured programming:
          (i)        Pseudocode.
          (ii)       Flow Chart.
          (iii)      Variable.

(b)     The SmartLink Academy uses the following grading system:

            Mark     Grade
           0 to 50     Fail
           51 to 60   Pass
           61 to 70   Credit
           71 to 100 Distinction

       Required:

       A function named grade ( ) to convert marks into appropriate grades. (6 marks)

(c)      Differentiate between the following terms:
       (i)    “Function prototypes” and “Function definitions”. (4 marks)
      (ii)    “Pre-defined functions” and “user-defined functions”. (4 marks)

(Total: 20 marks)

QUESTION FIVE

(a)     (i) Highlight two differences between “if….else” and “do….while” loops in C programming language.
             (4 marks)

        (ii) Write a program in C language using a do while loop for printing or displaying even numbers. (4 marks)

(b)   Write a program which converts temperatures in Fahrenheit to Celsius in steps of 20 degrees to a    maximum of 300 degrees Fahrenheit.

       The program should use the following formula:

         0C = (F– 32) x 5/9

       Where: 0 =degrees, C = Celsius and F = Fahrenheit. (12 marks)

(Total: 20 marks)

KASNEB
CICT PART II SECTION 4
OBJECT ORIENTED PROGRAMMING
Wednesday: 28 May 2014.                                                                                                           Time allowed: 3 hours.
Answer ALL questions. Marks allocated to each question are shown at theend of the question. Show ALL yourworkings.
ALL programs writtenshould be in object oriented programming language (C++, Java, VB.Net).
QUESTION ONE
a)       (i) Explainthe meaning of the term “friend function” in the context of object orientedprogramming.                    (2 marks)
(ii) Write a program in object oriented programming languageto demonstrate the use of friend functions.           (6marks)
(b)      Consider thefollowing constructor function:
                FunctionmyKid (name) {
                                This.kidName= name;
                                This.birthOrder= function (order) {
                                                Inform(‘my kid’ + this.kidName + ‘is a’ + this.birtOrder)
                                };
                };
Required:
        i.           Identify an object, a property and  a method in the above function.                                                                    (3marks)
       ii.           Create an instance of the object in the above functionand state  its output.                                                      (2marks)
(c) (i) Write an object orientedfunction to culculate the factorial of an integer passed as an argument.                         (4 marks)
      (ii) Write a main() program that callsthe function in (c) (i) above and prints the result of the computation.            (3 marks)
   (Total: 20marks)
QUESTION TWO
(a) With the aid of unified modelling language (UML) diagrams,describe the following object oriented programming concepts:
(i)       Derived class                                                                                                                           (4marks)
(ii)     Class diagram                                                                                                                         (4marks)
(b) Summarise three differencces between “composition” and“aggregation” as used in object oriented programming. (6 marks)
(c) Study the program below:
                Classsubject
                {
                                Public:
                IntcomputerNo;
                Int main()
                {
                SubjectOOP subject;
                OOPsubject.computerNo= 5;
                Std ::cout
                };
Required:
Rewrite the above program in an encapsulated version of thesubject class that uses access functions to access computerNo.                                                                                                                                                                                                    (6marks)
   (Total: 20 marks)

QUESTION THREE
(a)    Examinesix similarities between classes and structures in object oriented programminglanguages.             (6 marks)
(b)    (i)Describe a class invariant in object oriented programming. (3 marks)
(ii) Distinguish between deep andshallow objects coppies as used in object oriented programming.              (4 marks)
         (C)     (i)define an enumerated named data typenamed “ComputerType” composed of data members; Dell, HP, Toshiba, Samsung andAcer.                                                                                                                                                                 (2marks)
                (II)Declare a variable of the enumerated data type defined in (c) (i) above andassign it the data member of Samsung type.                                                                                                                                                                                      (2marks)
        (d) Highlightthree implementatitions of “exception safety” in the context of exceptionhundling.                           (3marks)
    (Total 20 marks)
QUESTION FOUR
(a) Describe three features that differentiate an objectoriented programming language from a structured programming language.                                                                                                                                                                           (6marks)
(b)  (i) Explain theconcept of “method overriding” in object oriented programming.                                                        (2marks)
        (ii) Using anobject oriented language, write syntax to show the implementation of methodoverriding explained in (b) (i) above.                                                                                                                                                                                       (3marks)
 (c) A class “TEST” hasthe following description:
Private Members
·        TestCodeof type integer
·        Descriptionof type string
·        candidateNoof type ineger
·        centreReqd(Number of centres required) of type integer
·        amember function CALCNTER() to culculate and return the number of centrescomputed as [(No candidates/100) + 1]
Public Members
·        Afunction SCHEDULE( ) to allow a user to enter values for testCode, Descriptionand candidateNo and return the number of centres required.
·        Callfunction CALCNTR( ) to culculate the number of centres.
·        Afunction DISPTEST( ) to allow a user to view the content of all the datamembers.
Required:
        i.           Anobject oriented program to impliment the class “test”.                                                                                  (7marks)
       ii.           Amain( ) program to call the class TEST ant the functions; SCHEDULE andDISPTEST. (2 marks)
   (Total: 20 marks)
QUESTION FIVE
(a) Identify four types of polymorphism in object oriented programming                                                                          (4marks)
(b) An electricity company charges the following rates to domestic users:
For first 100 units – Sh. 50.00 per unit.
Above 100 units       - Sh. 60.00 per unit.
If the total cost is more than Sh.250.00 then an additional surcharge of 15% is added on the difference.      
Required:
        i.           Define a class named “electricity” in which a function “bill” computes the cost.                                               (4marks)
       ii.           Define a derived class More_Electricity to be the super class of the function Bill which adds the surcharge to the cost.                                                                                                                                                                                  (4marks)
(c) Highlight one advantage and two disadvantages of manually freeing and allocating memory in an object oriented program.                                                                                                                                                                                                                  (3marks)
(d) The various modes in which a filecan be accessed using open ( ) statements are in the table below:
File mode operator                                        Meaning
----------------------------------------------------------------------------------------------------
(i)                                                                            Append to the end of file
----------------------------------------------------------------------------------------------------
(ii)                                                                           Go to the end of file on opening
----------------------------------------------------------------------------------------------------
(iii) ios :: binary
----------------------------------------------------------------------------------------------------                        
(iv) ios :: out
----------------------------------------------------------------------------------------------------                                        
(v)                                                                          Open fails if the file does not exist
----------------------------------------------------------------------------------------------------
Required:
Complete the table by filling in theblank cells.       (5marks)
                                                                                                                                                                                    (Total 20 marks)

KASNEB
CICT PART II SECTION 4
DATA COMMUNICATION AND COMPUTER NETWORKS (THEORY)
Monday: 6 May 2011.                                                                                                     Time allowed: 3 hours.
Answer ALL questions. Marks allocated to each question are shown at theend of the question.
QUESTION ONE
a.       Identify the three broad classifications of protocols in the open system interconnections (OSI) model.           (3marks)
b.       Outline the main function for each classification of open system interconnection (OSI)model identified in (a) above.     (3marks)
c.       With any communication system, it must be recognised that the received signalwilldiffer with the transmitted signal due to various impairments.    Explain briefly three such impairments. (6marks)
(d) Using a diagram, describe the process of modulation and demodulation in a communication between two computers.           (8marks)
(Total: 20 marks)
QUESTION TWO
(a)     Channel access method is hundled at the media access control (MAC) sub-layer of data-link layer. Briefly describe five types of channel access methods.    (10 marks)
(b)     Outline four benefits of packet switching.        (4marks)
(c)      Explain the purpose of ping utility and traceroute utility commands in analysing network connectivity problems.                                                                                                       (6marks)
(Total: 20 marks)
QUESTION THREE
(a)     When documenting a computer network infrastructure, it is important to develop a physical and logical diagram of the network. Analyse the information about the network which is presented in the physical diagram.    (5 marks)
(b)     Briefly describe three types of internet sockets.      (3marks)
(c)      Identify four general categories of wide area network (WAN) connections.          (4marks)
(d)     Explain four considerations for a remote site wide area network (WAN) connection.    (8 marks)
                                                                                                                                                                                    (Total: 20 marks)
QUESTION FOUR
(a)     Briefly explain three types of automatic repeat request (ARQ)                                                                           (6marks)
(b)     A modem transmits data using an eight-level signalling technique.
                                 If each signalling elements has a duration of 0.833 ms, determine
                                              i.     The baud rate.         (2marks)
                                              ii.     The bit rate.          (3marks)
(c)      Outline three possible configurations of a local area network. (3 marks)
(d)     Briefly describe the term “subnetting”                        (4marks)
(Total: 20 marks)

QUESTION FIVE
(a)     Identify six tasks which are necessary for successful data communication.    (6marks)
(b)     Highlight eight common examples of wireless equipment.                         (8marks)
(c)      Using a diagram, explain the functions of each layer of asynchronous transfer protocol (ATM).
                                                                                                                                                                    (Total: 20 marks)

KASNEB
CICT PART II SECTION 4
DATA COMMUNICATION AND COMPUTER NETWORKS (THEORY)
THURSDAY: 1 December 2011.                                                                                   Timeallowed: 3 hours.
Answer ALL questions. Marks allocated to each question are shown at theend of the question.
QUESTION ONE
(a)     Describe six situations in which a fibre optic cable could be used for short distance or low bandwidth applications                                 (6marks)
(b)     Analyse the characteristics which distinguish one modem from another.        (6marks)
(c)      Evaluate the functions of the following layers of open systems interconnection model
(a)     Data link layer                            (5marks)
(b)     Presentation layer                      (3marks)
                                                                                                                                                                                   (Total:20 marks)
QUESTION TWO
(a)     Describe four tasks which are performed by data transmission software (or protocol).  (4 marks)
(b)     Highlight eight devices though which simple network management protocol could run.   (8marks)
(c)      Using appropriate diagram, evaluate the two data connection methods used to connect computers on a network.  (8marks)
                                                                                                                                                                   (Total: 20 marks)
QUESTION THREE
(a)     The original transmission control protocol (TCP/IP) protocol suite had several design goals thtt were intended to make it a viable protocol for the large evolving internetworks.
Required:
Discuss the original goals of TCP/IP.                                                                                                                                    (12 marks)
(b)     Distinguish between the following setof terms:
(i)       A half-duplex connection and afull-duplex connection.                                                                                        (4marks)
(ii)     Internet protocol (IP) address and network mask.                                                                                                (4marks)
                                                                                                                                                                   (Total: 20 marks)
QUESTION FOUR
(a)     Explain the term “network backbone” inthe context of network topologies.      (4marks)
(b)     Appraise three characteristics of thefollowing types of network backbones:
(i)                  Serial backbone                                                   (3marks)
(ii)                Distributed back bone                                            (3marks)
(c)      Evaluate three desirable features that are considered when choosing line codes in data communication        (6 marks)
(d)     Highlight four disadvantages of installing a local area network in a rural school.           (4 marks)
                                                                                                                                                                    (Total:20 marks)
QUESTION FIVE
(a)     FCAPS is an acronym for a categorical model of networking objectives of network management
Analyse the five levels of FCAPS model.                                 (10 marks)
(b)     Outline six ways of securing a wireless network.   
(c)      Distinguish between connection limits and simple rate limits in relation to wide area network (WAN) traffic optimisation.    (4marks)



Propellerads