0% found this document useful (0 votes)
720 views32 pages

ICT Studies: Networking & Careers

All topics in computer for form 4

Uploaded by

makonmercy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
720 views32 pages

ICT Studies: Networking & Careers

All topics in computer for form 4

Uploaded by

makonmercy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

COMPUTER STUDIES FORM QUESTION AND ANSWERS

COVERED TOPICS

 Introduction to networking and data communication


 Application areas of ICT
 Impact of ICT on society
 Career opportunities in ICT

1
Introduction to networking and data communication

1. Define the following terms:


a) Computer network
b) Data communication
c) Data signal
d) Signal encoding

a) Computer network: A computer network is a collection of interconnected devices, such as


computers, servers, printers, or other peripheral devices, that are linked together to facilitate
communication and resource sharing. These connections can be wired or wireless and enable the
exchange of data and information between devices.

b) Data communication: Data communication refers to the exchange of digital data between two or
more devices through a transmission medium, such as cables, optical Fibres, or wireless channels. It
involves the encoding, transmission, and decoding of data to enable communication between
devices in a network.

c) Data signal: A data signal is a physical representation of digital data that is transmitted over a
communication channel. It can take various forms, including electrical signals in wired connections,
light signals in optical Fibres, or radio waves in wireless communication. Data signals carry
information encoded in binary format (0s and 1s) and are modulated according to specific
communication protocols.

d) Signal encoding : Signal encoding is the process of converting digital data into a format suitable
for transmission over a communication channel. It involves mapping binary data (0s and 1s) onto
physical signals that can be transmitted through the chosen medium. Encoding techniques vary
depending on the communication protocol and the characteristics of the transmission medium, and
they may include methods such as modulation, line coding, and scrambling. Proper encoding ensures
reliable and efficient transmission of data between devices in a network.

2. What is the difference between stand alone and a networked computer?

A standalone computer functions independently without connection to other devices,


typically used for personal or small business tasks with all data and software stored locally. In
contrast, a networked computer is part of a larger interconnected system, allowing
communication, resource sharing, and collaboration among multiple devices and users within
a network. Networked computers can share resources like files and printers, access shared
data and services hosted on other devices, and facilitate efficient collaboration, making them
common in larger organizations where interconnectedness and collaboration are crucial.

2
3. Using illustrations, differentiate between the wave forms of analogue and digital signals

4. A signal wave has three main properties; frequency, wavelength and amplitude. Describe each of
them.

1. Frequency: Frequency refers to the number of cycles or oscillations of a signal wave that occur in
a given unit of time, usually measured in Hertz (Hz). It indicates how rapidly the wave oscillates or
repeats within a specified time frame. Higher frequencies correspond to shorter time intervals
between cycles, while lower frequencies have longer time intervals.

2. Wavelength: Wavelength is the distance between two consecutive corresponding points on a


signal wave, such as peak to peak or trough to trough. It is typically measured in meters (m) or
another unit of length. Wavelength represents the physical length of one complete cycle of the wave
and is inversely proportional to frequency, meaning that higher frequencies have shorter
wavelengths, and vice versa.

3. Amplitude: Amplitude refers to the maximum displacement or height of a signal wave from its
rest position. It represents the strength or intensity of the signal and is measured from the baseline
or zero reference point to the peak of the wave. Amplitude is often used to indicate the magnitude
or power of a signal, with higher amplitudes corresponding to more significant variations in signal
strength.

5. Differentiate between the following:

a) Signal modulation and demodulation

b) Modulation rate and baud rate

c) Bandwidth and throughput

d) Baseband and broadband signals

3
a) Signal modulation and demodulation:

- Signal modulation involves altering one or more properties of a carrier signal, such as its
amplitude, frequency, or phase, to encode information onto it. This process prepares the signal for
transmission over a communication channel.

- Demodulation, on the other hand, is the reverse process of modulation. It involves extracting the
original information from a modulated carrier signal at the receiving end of a communication
system. Demodulation retrieves the encoded data by reversing the changes made during
modulation.

b) Modulation rate and baud rate:

- Modulation rate refers to the rate at which the carrier signal is modified or modulated to encode
information. It is typically measured in bits per second (bps) and indicates how quickly data is
transmitted.

- Baud rate, on the other hand, refers to the number of signal symbols transmitted per second. It
represents the rate of change of the signal in terms of its physical waveform, such as voltage
transitions. In simpler terms, baud rate indicates how many times the signal can change per second.

c) Bandwidth and throughput:

- Bandwidth refers to the range of frequencies that a communication channel or system can
accommodate without significant attenuation or distortion of the signal. It is typically measured in
Hertz (Hz) and represents the capacity of the channel to carry data.

- Throughput, on the other hand, refers to the actual data transfer rate achieved in a
communication system. It represents the amount of data successfully transmitted over a given
period, often measured in bits per second (bps). Throughput can be affected by various factors such
as network congestion, errors, and protocol overhead.

d) Baseband and broadband signals:

- Baseband signals are signals that occupy the entire frequency range of the transmission medium.
They typically have a narrow frequency range and are used in communication systems where the
entire bandwidth of the medium is dedicated to transmitting a single signal without modulation.

- Broadband signals, on the other hand, occupy a wider frequency range within the transmission
medium. They are usually modulated onto a carrier signal and transmitted over a broader range of
frequencies. Broadband signals allow for the simultaneous transmission of multiple signals or data
streams over the same medium, often using techniques such as frequency division multiplexing
(FDM).

6. To make the most of a (optimize) communication channel, many signals are sent together using
either frequency or time division techniques.

a) State the name given for these techniques

b) Using an illustration (diagrams) , explain how this concept works

4
Answers

a) MULTIPLEXING
b)

Multiplexing is a technique used in telecommunications and computer networks to efficiently


share a transmission medium among multiple users or applications. It involves combining
multiple signals or data streams into a single signal for transmission over a shared medium,
such as a cable, Fibre optic line, or wireless channel, and then separating those signals at the
receiving end. This allows for more efficient utilization of the available bandwidth and
resources, enabling multiple users or devices to communicate simultaneously over the same
channel without interfering with each other.

7. During data transmission from a source to a destination, it could face challenges that may
cause it to get lost. Highlight these challenges.

Answers

- Attenuation: Attenuation refers to the decrease in signal strength or intensity as it travels through
a medium, such as a cable, Fibre optic line, or wireless channel. This reduction in signal strength
occurs due to factors such as absorption, scattering, and impedance mismatch along the
transmission path. Attenuation can lead to signal degradation, affecting the quality and reliability of
communication over long distances.

- Noise: In the context of telecommunications and signal processing, noise refers to any unwanted or
random interference that disrupts the transmission or reception of a signal. Noise can arise from
various sources, including electrical interference, environmental factors, and electronic components
within communication systems. Excessive noise can degrade the signal-to-noise ratio, making it
challenging to extract the intended information from the received signal.

5
- Dispersion: Dispersion is the phenomenon where a signal spreads out over time or space as it
travels through a medium. In optical Fibres, for example, dispersion can occur in two main forms:
chromatic dispersion and modal dispersion. Chromatic dispersion is caused by the variation in the
speed of different wavelengths of light, while modal dispersion arises due to the different
propagation paths taken by light rays in multimode Fibres. Dispersion can lead to signal distortion
and limit the transmission bandwidth, affecting the overall performance of communication systems.

- Delay distortion: Delay distortion, also known as intersymbol interference (ISI), occurs when
different parts of a transmitted signal arrive at the receiver with varying delays. This delay
discrepancy can result from factors such as multipath propagation, where the signal takes multiple
paths to reach the receiver, or dispersion effects in the transmission medium. Delay distortion can
cause overlapping symbols or bits in the received signal, making it difficult to correctly interpret and
decode the transmitted data. Mitigating delay distortion is crucial for maintaining signal integrity
and ensuring reliable communication.

8. Explain the importance of repeaters in a communication system

Acts as a Signal amplification and regeneration equipment are essential for extending
transmission distances in communication systems, ensuring that signals maintain adequate
strength and integrity over long distances .

9. Explain the following data communication modes

Simplex, half duplex, full duplex

1. Simplex: In simplex communication, data travels in only one direction, from the sender to the
receiver. The receiver can only receive data and cannot send any back. An example of simplex
communication is a television broadcast, where the TV station sends signals to viewers, but viewers
cannot send signals back to the station.

2. Half Duplex: In half-duplex communication, data can be transmitted and received, but not
simultaneously. It allows communication in both directions, but only one direction at a time. Users
take turns sending and receiving data. An example of half-duplex communication is a walkie-talkie,
where users push a button to speak and release it to listen.

3. Full Duplex: In full-duplex communication, data can be transmitted and received simultaneously.
Both the sender and receiver can communicate with each other at the same time. This mode enables
real-time two-way communication. Examples of full-duplex communication include telephone
conversations and internet video calls.

10. List four reasons why computer networks are important.

1. Communication: Networks enable communication between individuals, organizations, and


devices, allowing them to share information, collaborate, and coordinate activities efficiently. Email,
instant messaging, video conferencing, and social media platforms are all facilitated by computer
networks.

6
2. Resource Sharing : Networks enable the sharing of resources such as printers, scanners, storage
devices, and software applications. This reduces costs, increases efficiency, and facilitates better
utilization of resources within an organization.

3. Data Sharing and Access: Networks allow for the easy sharing and access of data and information
across different locations and devices. This enables real-time access to critical data, enhances
decision-making processes, and supports collaborative work environments.

4. Remote Access and Mobility: With networks, individuals can access resources and data remotely
from any location with an internet connection. This enables flexible work arrangements, remote
access to corporate systems, and support for mobile devices such as smartphones and tablets.

5. Business Operations and Productivity: Networks play a crucial role in supporting business
operations and improving productivity by automating processes, streamlining workflows, and
providing access to essential tools and information.

6. Global Connectivity: Computer networks connect individuals and organizations worldwide,


facilitating global communication, commerce, and collaboration. This global connectivity has
transformed the way businesses operate and has opened up new opportunities for innovation and
growth.

7. Information Sharing and Collaboration: Networks enable seamless information sharing and
collaboration among individuals and teams, fostering innovation, creativity, and knowledge sharing.
This is particularly important in research, education, and development environments.

8. E-commerce and Online Services: Networks support e-commerce platforms and online services,
enabling businesses to reach customers worldwide, conduct transactions securely, and deliver digital
goods and services efficiently.

9. Disaster Recovery and Redundancy: Networks can be configured to provide redundancy and
backup solutions, ensuring data integrity and availability in the event of hardware failures, natural
disasters, or cyberattacks.

10. Entertainment and Media: Networks deliver entertainment and media content such as
streaming video, music, and online gaming to users worldwide, enriching leisure time and providing
access to a wide range of digital entertainment options.

11. Explain 6 limitations of networking as learnt

1. Cost of installation- Its expensive to install and maintain a network.

2. Security Concerns: Networking introduces security vulnerabilities, including unauthorized access,


data breaches, malware attacks, and network eavesdropping. Securing networks requires
implementing robust security measures such as firewalls, encryption, access controls, and intrusion
detection systems.

7
3. Bandwidth Limitations: Network bandwidth refers to the capacity of a network to transmit data.
Bandwidth limitations can lead to network congestion, slowdowns, and degraded performance,
especially in high-traffic environments. Increasing bandwidth often requires costly infrastructure
upgrades.

4. Reliability and Availability: Network reliability and availability are crucial for uninterrupted
communication and business operations. However, networks are susceptible to outages, equipment
failures, and connectivity issues, which can disrupt services and productivity. Redundancy and
backup solutions are necessary to minimize downtime and ensure continuity of operations.

5. Compatibility and Interoperability: Different networking technologies, protocols, and devices


may not always be compatible or interoperable, leading to connectivity issues and integration
challenges. Ensuring seamless communication between diverse systems often requires
implementing standards-based solutions and interoperability testing.

6. Scalability: Networks must accommodate growing numbers of users, devices, and data traffic
over time. However, scaling networks to meet increasing demands can be complex and costly,
requiring careful capacity planning, infrastructure upgrades, and scalability considerations.

7. Maintenance and Management: Networks require ongoing maintenance, monitoring, and


management to ensure optimal performance, security, and reliability. Managing network
configurations, troubleshooting issues, and performing updates can be time-consuming and
resource-intensive, especially in large and complex network environments.

12. Explain the following types of networks

WAN, LAN, MAN:

1. WAN (Wide Area Network) : A WAN is a type of network that spans over a large geographical
area, typically covering multiple cities, countries, or even continents. It connects multiple LANs and
other networks over long distances using leased lines, fibre optics, or satellite links. WANs are
commonly used by organizations to connect their remote offices, branches, or facilities. The Internet
is the most extensive example of a WAN.

2. LAN (Local Area Network) : A LAN is a type of network that spans over a relatively small
geographical area, such as a single building, office, or campus. It connects computers, servers,
printers, and other devices within the same physical location using wired or wireless connections.
LANs typically offer high-speed data transfer rates and low latency, making them suitable for local
communication and resource sharing within organizations or residential settings.

3. MAN (Metropolitan Area Network) : A MAN is a type of network that covers a larger
geographical area than a LAN but smaller than a WAN, typically spanning a single city or
metropolitan area. It connects multiple LANs and other networks within the same geographic area
using high-capacity Fibre optic cables or wireless technologies. MANs are commonly used by service
providers to offer high-speed internet access, telecommunications services, and interconnection
between local networks within urban areas.

8
13.List examples of Wide Area Network (WANs)

1. The Internet: The largest and most well-known WAN, connecting millions of devices worldwide
and enabling global communication, collaboration, and information sharing.

2. Global corporate networks: Many multinational corporations operate WANs to connect their
geographically dispersed offices, branches, and data centres. These networks facilitate centralized
management, data sharing, and collaboration among employees located in different regions.

3. Telecommunication networks: WANs are used by telecommunications companies to provide


services such as internet access, voice communication, and data transmission over long distances.
Examples include fibre optic networks, satellite networks, and submarine cables.

4. Cloud computing networks: Cloud service providers operate WANs to deliver computing
resources, storage, and services to users over the internet. These networks enable on-demand access
to cloud-based applications, platforms, and infrastructure from anywhere in the world.

5. Financial networks: Financial institutions use WANs to facilitate electronic banking, online
transactions, and interbank communication. Examples include networks operated by banks, stock
exchanges, and payment processing companies.

6. Government networks: Government agencies use WANs to connect their offices, departments,
and agencies across different regions or countries. These networks support communication, data
sharing, and collaboration among government officials, employees, and stakeholders.

7. Educational networks: Universities, colleges, and research institutions operate WANs to connect
their campuses, research facilities, and academic resources. These networks support online learning,
research collaboration, and access to educational resources for students, faculty, and staff.

8. Healthcare networks: Healthcare organizations use WANs to connect hospitals, clinics, and
medical facilities to share patient records, medical images, and healthcare information. These
networks support telemedicine, remote diagnostics, and collaboration among healthcare
professionals.

14. Explain briefly three elements of networking.

 Communication media (Bounded and unbounded medium)- Wired and Wireless


 Communication software (Protocols)
 Devices

15. List four types of guided transmission media

 Two wire open lines cables


 Twisted pair cable
 Coaxial cables
 Fibre optic cables

9
16. Using illustrations, differentiate between unshielded and shielded twisted pair cables

17. With the aid of a diagram, describe the physical structure of a coaxial cable.

18. Differentiate between thinnet and thicknet coaxial cables.

10
19. Discuss how a fibre optic cable transmits data.

Fibre optic cables transmit data by converting digital information into modulated light pulses,
generated by a light source like a laser or LED. These pulses travel through the core of the Fibre optic
cable, which is surrounded by a cladding layer that ensures total internal reflection, minimizing signal
loss. At the receiving end, light-sensitive receivers detect the incoming light pulses and convert them
back into electrical signals. These signals are then processed to recover the original digital data.
Fibre optic cables offer high-speed, high-bandwidth data transmission over long distances, with
minimal signal degradation and interference, making them essential for telecommunications,
internet connectivity, and data networking applications.

20. State five advantages of using fibre optical as a transmission media

1. High Bandwidth : Fibre optics can transmit data at incredibly high speeds, typically ranging from
hundreds of Mbps to terabits per second. This high bandwidth makes it suitable for transmitting
large amounts of data over long distances without significant degradation in signal quality.

2. Low Attenuation : Compared to traditional copper wires, Fibre optics experience much lower
signal loss over long distances. This low attenuation allows for longer transmission distances without
the need for signal repeaters, reducing overall infrastructure costs.

3. Immunity to Electromagnetic Interference (EMI) : Fibre optic cables are not affected by
electromagnetic interference, unlike copper cables. This immunity makes Fibre optics ideal for
environments where EMI is common, such as areas near heavy machinery or power lines. It also
makes them suitable for use in areas with high levels of radiofrequency interference, such as data
centers and industrial settings.

4. Security: Fibre optic cables are difficult to tap into without detection because they do not emit
electromagnetic signals that can be intercepted. This inherent security feature makes Fibre optics
highly desirable for transmitting sensitive information, such as financial data, government
communications, and military operations.

5. Lightweight and Small Size : Fibre optic cables are much lighter and thinner than traditional
copper cables, allowing for easier installation and maintenance. They also take up less space, making
them ideal for applications where space is limited, such as in crowded urban environments or within
existing conduit systems. Additionally, their small size and flexibility make them easier to install in
difficult-to-reach areas, such as underground or underwater.

11
21. Differentiate between Bluetooth and infrared transmissions

Bluetooth operates using radio waves in the 2.4 GHz frequency band and offers longer ranges
of up to 100 meters with higher data rates ranging from 1 Mbps to 3 Mbps, infrared
transmission relies on light waves and has a significantly shorter range of a few meters with
lower data rates typically ranging from 115 kbps to 4 Mbps. Bluetooth employs security
features such as authentication and encryption, making it more secure compared to infrared,
which lacks built-in security mechanisms.

22. Using an illustration, explain how data is transmitted on terrestrial microwaves relay stations

LINE OF SIGHT

23. Define the following terms

Communication satellite, Uplink, Geostationary satellite, satellite footprint, downlink channel

A communication satellite is an artificial satellite stationed in space to relay communications signals,


such as television, radio, internet, and telephone data, between various locations on Earth. These
satellites are placed in orbit around the Earth, usually in geostationary or geosynchronous orbits.

- Geostationary Satellite: A geostationary satellite is positioned in a fixed point above the Earth's
equator, maintaining the same relative position to the Earth's surface. This means the satellite
appears to remain stationary from a point on Earth, making it ideal for telecommunications
purposes as antennas can be pointed towards the satellite without the need for tracking.

- Uplink: In satellite communication, the uplink refers to the transmission of data from Earth to the
satellite. This is typically done using ground stations equipped with high-gain antennas to transmit
signals towards the satellite.

- Satellite Footprint: The satellite footprint refers to the geographical area on the Earth's surface
covered by the satellite's signal. It is determined by the satellite's position, altitude, and antenna
characteristics. The footprint can vary in size and shape depending on these factors.

- Downlink Channel: The downlink channel is the transmission path from the satellite to the
receiving ground stations or satellite dishes on Earth. It carries data from the satellite to the
intended receivers, such as television signals, internet data, or telephone communications. The
downlink channel complements the uplink channel, completing the bidirectional communication link
between the satellite and the ground.

12
24. Explain the use of the following network connectivity devices

Network interface card, intelligent hub, Hub, Repeater, Modem, Bridge, LAN switch

1. Network Interface Card (NIC): A network interface card is a hardware component that connects a
computer or other device to a network. It allows the device to communicate over the network by
providing a physical connection (e.g., Ethernet port) and handling the transmission and reception of
data packets.

2. Hub: A hub is a basic networking device that connects multiple devices in a network. It operates
at the physical layer (Layer 1) of the OSI model and simply forwards data packets to all connected
devices without any intelligence. Hubs are often used in small networks, but they have been largely
replaced by switches due to their inefficiency in handling network traffic.

3. Repeater: A repeater is a networking device that amplifies and retransmits signals in a network. It
operates at the physical layer (Layer 1) of the OSI model and is used to extend the distance of a
network by regenerating weak signals. Repeaters are typically used in environments where the
length of the network cable exceeds the maximum allowable length.

4. Modem: A modem (modulator-demodulator) is a device that modulates digital data from a


computer into analog signals for transmission over analog communication lines such as telephone

13
lines, and demodulates incoming analog signals back into digital data. Modems are commonly used
for connecting to the internet over telephone lines (DSL modem) or cable lines (cable modem).

5. Bridge: A bridge is a networking device that connects multiple network segments or LANs (Local
Area Networks) together and forwards data packets between them based on the MAC addresses of
the devices. Bridges operate at the data link layer (Layer 2) of the OSI model and help to reduce
network traffic by filtering unnecessary packets.

6. Intelligent Hub: An intelligent hub is an advanced version of a hub that includes additional
features such as filtering and managing network traffic, error detection, and diagnostics. Unlike
traditional hubs, intelligent hubs have some level of intelligence and can make decisions about how
to handle data packets.

7. LAN Switch : A LAN switch is a networking device that operates at the data link layer (Layer 2) or
network layer (Layer 3) of the OSI model and is used to connect multiple devices in a local area
network (LAN). Unlike hubs, switches are intelligent devices that can forward data packets to specific
devices based on their MAC addresses, making them more efficient in handling network traffic than
hubs.

25. Give five functions of a router

1. Packet Forwarding: Routers forward data packets between different networks. They examine the
destination IP address of each packet and determine the best path for it to reach its destination
based on routing tables and algorithms such as OSPF (Open Shortest Path First) or RIP (Routing
Information Protocol).

2. Network Address Translation (NAT) : NAT is a process used by routers to modify network address
information in packet headers while in transit. This is particularly useful for conserving IP addresses,
enabling multiple devices within a private network to share a single public IP address.

3. Firewall Services: Many modern routers include built-in firewall capabilities. Firewalls help
protect networks by inspecting incoming and outgoing traffic, filtering it based on predetermined
security rules, and blocking or allowing packets accordingly. This helps prevent unauthorized access
and malicious attacks.

4. Quality of Service (QoS) : Routers can prioritize certain types of network traffic over others using
QoS mechanisms. For example, they can give priority to voice or video data to ensure a smoother
experience for real-time applications, such as VoIP (Voice over Internet Protocol) calls or video
streaming, over less time-sensitive traffic like file downloads.

5. Virtual Private Network (VPN) Support : Many routers support VPN functionality, allowing
remote users to securely connect to a private network over the internet. VPNs encrypt data traffic
between the remote user's device and the private network, ensuring confidentiality and security,
especially when accessing sensitive information or resources remotely.

14
26. State three categories of networking software

- Networking operating system


- Network protocols
- Network security software
27. Briefly describe the OSI mode
The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and
standardize the functions of a telecommunication or computing system. It consists of seven layers,
each responsible for specific tasks related to transmitting data over a network. Here's a brief
overview of each layer:

1. Physical Layer: This layer deals with the physical connection between devices. It defines the
characteristics of the transmission medium, such as cables or wireless signals, and the
electrical/optical signals used for communication.

2. Data Link Layer: The data link layer is responsible for node-to-node communication, ensuring
reliable data transfer over the physical layer. It handles error detection and correction, as well as
framing, addressing, and flow control.

3. Network Layer: This layer focuses on routing and forwarding data packets between different
networks. It determines the optimal path for data transmission based on logical addresses (IP
addresses), and it handles logical addressing, routing, and traffic control.

4. Transport Layer: The transport layer provides end-to-end communication between hosts,
ensuring that data is reliably and accurately delivered. It manages data segmentation, reassembly,
flow control, and error recovery.

5. Session Layer: The session layer establishes, maintains, and terminates communication sessions
between applications. It manages the synchronization, check pointing, and recovery of data
exchange sessions.

6. Presentation Layer: This layer is responsible for data translation, encryption, and compression,
ensuring that data is presented in a format that applications can understand. It handles data
conversion between different formats and character sets.

7. Application Layer: The application layer provides network services directly to end-users and
applications. It includes protocols for tasks such as email (SMTP), file transfer (FTP), web browsing
(HTTP), and remote login (SSH).

27. Explain the use of the following protocols with regard to OSI reference model.
TCP, SMTP, FTP, IP
1. TCP (Transmission Control Protocol) :

- Layer : Transport Layer (Layer 4)

- Use : TCP provides reliable, connection-oriented communication between devices. It ensures that
data is delivered in the correct order and without errors. TCP handles tasks such as segmentation,
reassembly, flow control, and error recovery, making it suitable for applications that require
guaranteed delivery of data, such as web browsing, email, and file transfer.

15
2. SMTP (Simple Mail Transfer Protocol) :

- Layer : Application Layer (Layer 7)

- Use : SMTP is used for sending and receiving email messages. It operates at the application layer
and defines the format and rules for transferring email messages between mail servers. SMTP is
responsible for the delivery of outgoing mail and the reception of incoming mail.

3. FTP (File Transfer Protocol) :

- Layer : Application Layer (Layer 7)

- Use : FTP is a standard protocol used for transferring files between computers on a network. It
allows users to upload, download, and manipulate files on remote servers. FTP operates at the
application layer and provides commands for establishing connections, navigating directories, and
transferring files.

4. IP (Internet Protocol) :

- Layer : Network Layer (Layer 3)

- Use : IP is responsible for routing packets of data across network boundaries. It provides
addressing and routing functions to facilitate the transfer of data packets between devices on
different networks. IP operates at the network layer and is the foundation of the Internet Protocol
Suite. It assigns unique IP addresses to devices and determines the best path for data transmission
based on routing algorithms.

28. Using examples differentiate between logical topology and physical topology.
Logical topology and physical topology are two different aspects of network design and operation,
each serving distinct purposes. Here's a brief differentiation using examples:

1. Physical Topology:

- Physical topology refers to the actual layout of the network infrastructure and how devices are
physically connected to each other.

- Examples include:

- Bus Topology: Devices are connected in a linear fashion, like nodes on a single cable.

- Star Topology: Devices are connected to a central hub or switch.

- Ring Topology: Devices are connected in a circular arrangement, where each device is
connected to exactly two other devices.

- Mesh Topology: Devices are interconnected with multiple redundant paths between them.

- Physical topology determines factors such as the length of cables, the location of devices, and
the type of connectors used.

16
2. Logical Topology:

- Logical topology refers to how data flows within the network and how devices communicate with
each other, irrespective of their physical arrangement.

- Examples include:

- Ethernet: Devices communicate using the Ethernet protocol, which includes rules for addressing,
data encapsulation, and error detection.

- Token Ring: Devices communicate by passing a token around the network, granting permission
to send data.

- IP (Internet Protocol): Devices communicate using IP addresses, with data packets routed based
on network addressing.

- Logical topology defines the pathways that data takes as it moves through the network and
how devices identify and communicate with each other.

17
18
NB// FOOD FOR THOUGHT
GIVE ADVANTAGES AND DISADVATANGES OF ALL THE ABOVE
TOPOLOGIES.

19
29. Briefly differentiate carrier sense multiple access with collision detection (CSMA/CD) and
carrier sense multiple access with collision avoidance (CSMA/CA) protocols as used on bus
network.

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) :

- Operation: In CSMA/CD, nodes listen to the transmission medium before transmitting data. If the
medium is idle, they can send their data. However, if multiple nodes attempt to transmit
simultaneously, collisions can occur. When a collision is detected, the transmitting nodes stop
transmitting immediately and enter a backoff algorithm, waiting for a random amount of time
before attempting to retransmit.

- Detection: Collisions are detected by monitoring the signal on the transmission medium during
transmission. If a node detects that its transmitted signal is being interfered with, it assumes a
collision has occurred.

- Applicability: CSMA/CD is commonly used in Ethernet networks, particularly in bus topologies.

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) :

- Operation: In CSMA/CA, nodes listen to the medium before transmitting, just like CSMA/CD.
However, instead of attempting to detect collisions while transmitting, CSMA/CA tries to avoid
collisions altogether. Nodes send a small request to send (RTS) frame to the intended receiver. The
receiver responds with a clear to send (CTS) frame if it's ready to receive. Only after receiving the
CTS does the sender transmit the data. This helps in reducing the likelihood of collisions.

- Avoidance Mechanism: CSMA/CA relies on a mechanism where nodes request permission before
sending data, thereby avoiding collisions proactively.

- Applicability: CSMA/CA is commonly used in wireless networks, where the likelihood of collisions
is higher due to shared wireless channels. It's particularly prevalent in Wi-Fi networks.

20
APPLICATION
AREAS
OF
ICT

21
1. State four types of financial systems that can be automated using ICT
 Budgeting
 Accounting
 Banking
 Auditing
2. Identify the main components that make up an electronic point of sale EPOS
terminal

- Screen/Display: A display screen where the transaction details, product information, and
prompts are shown to the cashier and sometimes to the customer.

- Input Devices: Input devices such as a touchscreen, keyboard, or keypad for entering
product information, prices, quantities, and other transaction details.

- Barcode Scanner: A device for scanning product barcodes to quickly input product
information into the system.

- Card Reader: A device for reading credit/debit cards, including magnetic stripe readers, chip
readers, and contactless NFC readers.

- Cash Drawer: A drawer that opens to store cash and coins received from customers and to
provide change.

- Receipt Printer: A printer for printing transaction receipts for customers.

3. State four advantages of using EPOS system in retail stores


 Faster processing of transactions
 Automatic update of inventory files.
 Automatic triggers for shelve restocking and reordering of new stock
 Uniform price enforcement for all customers.

4. Identify four types of computer based learning


 Computer aided Instruction CAI
 Computer aided learning CAL
 Electronic learning E-learning
 Compute based simulation

 Computer-Aided Instruction (CAI) :

- CAI refers to the use of computers to deliver educational content and facilitate
learning. It often involves interactive software programs that guide learners through
instructional materials, quizzes, and exercises. CAI allows for personalized learning
experiences tailored to individual learners' needs, pacing, and learning styles. It can
include multimedia elements such as text, images, audio, and video to enhance
engagement and comprehension.

22
 Computer-Aided Learning (CAL) :
- CAL encompasses a broader range of educational activities supported by
computers, including both instruction and learning processes. CAL integrates
technology into various aspects of the learning process, such as accessing
educational resources, collaborating with peers, completing assignments, and
receiving feedback. It emphasizes the role of technology in empowering learners to
take more active roles in their education and to explore topics at their own pace.
 Electronic Learning (E-learning) :
- E-learning refers to the use of electronic technologies, primarily the internet, to
deliver educational content and support learning activities. It includes various forms
of online learning, such as web-based courses, virtual classrooms, digital libraries,
and educational apps. E-learning provides flexibility in terms of access to learning
materials and interaction with instructors and peers, enabling learners to engage in
education from anywhere with an internet connection.
 Computer-Based Simulation:
- Computer-based simulation involves the use of computer programs to replicate
real-world scenarios or processes for educational purposes. Simulations allow
learners to experiment with different variables, observe outcomes, and gain
practical experience in a safe and controlled environment. They are particularly
useful for training in fields where hands-on experience is costly, risky, or impractical,
such as aviation, healthcare, engineering, and military training. Simulations can
range from simple interactive exercises to highly immersive virtual reality
environments.

5. Define the term digital library

A digital library is a collection of digital resources organized and accessible through


electronic means, typically over the internet or on a computer network. These
resources can include various types of digital content such as texts, images, audio
files, videos, datasets, and software.

5. Differentiate between internet and world wide web

The World Wide Web, commonly known as the web, is a system of interconnected hypertext
documents and resources accessible via the internet.

The internet is a global network that connects millions of computers and other devices
worldwide.

6. Using an example explain non-destructive testing as conducted in the manufacturing


industry

This is the creation of virtual models that emulate real world crash effect such as a car
crashing head on with another on coming vehicle.

23
7. State four advantages of computerized simulation and modelling
 Cost Savings: Computerized simulation and modeling can significantly reduce the
costs associated with physical prototyping and testing. Instead of building multiple
prototypes and conducting extensive testing, engineers can simulate different
scenarios virtually. This reduces material costs, labor costs, and time spent on
iterative design processes. Additionally, simulations allow for the identification of
potential design flaws early in the development process, avoiding costly errors that
may arise later during production or operation.
 Time Efficiency: With computerized simulation and modeling, engineers can rapidly
iterate through design iterations and test various scenarios in a fraction of the time it
would take with physical prototypes. This accelerated design process helps
companies bring products to market faster, seize opportunities in competitive
markets, and respond quickly to changing customer needs or industry trends.
 Insightful Analysis: Simulation and modeling tools provide detailed insights into
complex systems and phenomena that may be difficult to observe or measure in the
real world. Engineers can analyze factors such as stress distribution, fluid dynamics,
thermal behavior, and structural integrity with precision and accuracy. This enables
them to optimize designs, predict performance under different conditions, and make
informed decisions to improve product quality and efficiency.
 Risk Mitigation: By simulating various scenarios and analyzing potential outcomes,
organizations can proactively identify and mitigate risks associated with product
development, manufacturing processes, and operational activities. For example,
simulations can help identify safety hazards, optimize production processes to
minimize defects, and assess the impact of external factors such as environmental
conditions or market fluctuations.
8. List five application areas of ICT in transportation

 Air reservations, Shipping control systems, Tracking systems, Automobile control systems
 Traffic Management Systems: ICT is utilized for implementing traffic management systems
that monitor and control traffic flow in urban areas. These systems often include traffic
signals, sensors, cameras, and centralized control centers that analyze data in real-time to
optimize traffic flow, reduce congestion, and enhance safety.
 Intelligent Transportation Systems (ITS): ITS employs ICT to integrate various technologies
into transportation infrastructure and vehicles. This includes applications such as GPS
navigation systems, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)
communication, electronic toll collection, dynamic route guidance, and real-time traveler
information systems.
 Fleet Management Systems: ICT is used in fleet management systems to monitor and track
vehicles, optimize routes, manage fuel consumption, and schedule maintenance tasks. These
systems utilize GPS tracking, telematics, and communication technologies to provide real-
time data about vehicle location, performance, and operational status.

24
 Public Transportation Systems: ICT is applied in public transportation systems to improve
service reliability, accessibility, and efficiency. This includes fare collection systems,
automated scheduling and dispatching, real-time passenger information systems, and
mobile ticketing applications. ICT also enables the integration of different modes of public
transportation, such as buses, trains, and subways, to provide seamless multimodal
journeys.
9. List some unique biometric features that security and law enforcement agencies
can rely on to uniquely identify people using biometric systems

 Fingerprints
 Iris color
 Facial features like eye-nose-check bone triangulation

10. Explain the components of an expert system

1. Knowledge Base: Stores domain-specific information in the form of rules, facts, and procedures.

2. Inference Engine: Applies logical algorithms to interpret data, draw conclusions, and provide
solutions based on the knowledge base.

3. User Interface: Facilitates user interaction by allowing input queries and displaying responses in a
user-friendly format.

4. Expert System Software

 Explanation Facility: Provides explanations for the system's decisions to enhance


transparency and user understanding.
 Knowledge Acquisition System: Aids in acquiring, updating, and organizing domain
expertise to keep the system relevant.
 Knowledge Base Editor: Allows knowledge engineers to create, edit, and manage the
contents of the knowledge base efficiently.

11. State three examples of the use of expert system


- In medicine to provide diagnostic services
- In mining to provide knowledge on availability of minerals when certain
parameters are provided.
- Est try to provide answers to provide or clarify uncertainties in cases which would
have required the combined efforts of a number of human experts.

25
12. Identify the following parts of a virtual reality session

A –gloves; B. Head gear c. Body suit

13. State some of the applications areas of virtual reality


- In military and space exploration to generate virtual environments for practices
purposes.
- In training, to learn critical skills such as the flight simulations for pilots
- In architecture, to simulate how completed building would look like.

26
IMPACTS
OF
IC
T ON SOCIETY

27
1. Highlight four impacts of ICT on employment
Job creation, Job losses, Job displacement, Job productivity

1. Job creation: ICT has the potential to create new job opportunities in sectors such as information
technology, telecommunications, software development, and digital marketing, as well as in
supporting industries that provide services and infrastructure for ICT.

2. Job losses: Despite creating new jobs, ICT can also lead to job losses through automation and
efficiency improvements, particularly in industries where routine tasks can be performed more
efficiently by machines or software, resulting in reduced demand for human labour.

3. Job displacement: ICT can lead to job displacement when workers need to adapt to new skills and
technologies or transition to different industries due to changes in job requirements and market
demands driven by technological advancements.

4. Job productivity: ICT can enhance job productivity by providing tools and technologies that
streamline workflows, improve communication and collaboration, automate repetitive tasks, and
enable faster access to information, ultimately leading to higher efficiency and output per worker.

2. Highlight three negative impacts of ICT on human health

1. Sedentary Lifestyle : Increased use of ICT devices such as computers, smartphones, and tablets
often leads to sedentary behaviors, as people spend extended periods sitting and engaging with
screens. This lack of physical activity is associated with various health risks, including obesity,
cardiovascular diseases, and musculoskeletal problems.

2. Digital Eye Strain : Prolonged exposure to screens, especially at close distances, can cause digital
eye strain or computer vision syndrome. Symptoms may include eyestrain, headaches, dry eyes,
blurred vision, and neck or shoulder pain. Staring at screens for extended periods without breaks can
exacerbate these symptoms and lead to long-term vision problems.

3. Sleep Disturbances : ICT devices emit blue light, which can disrupt the body's natural sleep-wake
cycle by suppressing the production of melatonin, a hormone that regulates sleep. Excessive screen
time, particularly before bedtime, can interfere with sleep quality and duration, leading to insomnia,
sleep disturbances, and daytime fatigue. This disruption of sleep patterns can have negative effects
on overall health and well-being, impacting cognitive function, mood, and immune function.

4. Repetitive strain injuries RSI E.G. back ache, Wrist pain et.c.

3. Explain how ICT has affected our cultural, religion and social values
Information and Communication Technology (ICT) has significantly impacted our cultural, religious,
and social values in various ways:

1. Cultural Exchange and Globalization: ICT has facilitated cultural exchange on a global scale
through the internet, social media, and digital communication platforms. People can easily connect
with individuals from different cultural backgrounds, share experiences, and exchange ideas, leading
to greater cultural diversity and understanding. However, this increased interconnectivity can also

28
lead to cultural homogenization as certain cultural norms and values become dominant through
digital media.

2. Transformation of Cultural Practices : ICT has influenced cultural practices by changing how
people communicate, consume media, and express themselves. For example, social media platforms
have become venues for cultural expression, activism, and identity formation. Traditional cultural
practices may also evolve as they incorporate digital technologies, such as using digital tools for
artistic expression or preserving cultural heritage through digital archives and exhibitions.

3. Impact on Religious Practices : ICT has transformed religious practices by providing new avenues
for worship, education, and community-building. Many religious organizations utilize digital
platforms to broadcast religious services, share religious teachings, and engage with followers
remotely. Online communities and social networks also facilitate religious discourse, support
networks, and evangelism. However, concerns have been raised about the potential for
misinformation, radicalization, and the erosion of traditional religious authority in online spaces.

4. Social Interaction and Relationships : ICT has reshaped social interaction and relationships by
enabling instant communication and connection across geographic distances. Social media
platforms, messaging apps, and online forums allow people to maintain relationships, share
experiences, and form communities regardless of physical proximity. However, excessive reliance on
digital communication can also lead to feelings of isolation, superficial relationships, and reduced
face-to-face interaction, affecting the quality of social connections and interpersonal skills.

5. Privacy and Ethics : The widespread use of ICT has raised concerns about privacy, surveillance,
and ethical implications. Digital technologies enable the collection, storage, and analysis of vast
amounts of personal data, leading to concerns about data security, surveillance, and the erosion of
privacy rights. Additionally, issues such as online harassment, cyberbullying, and the spread of hate
speech highlight the ethical challenges associated with ICT and its impact on social values and
norms.

4. Identify at least nine major break through today which would never have been possible without
ICT

- E learning
- Digital mobile networks
- E- commerce
- Guided missile technology
- Development of MEDICAL technology like CT- scans
- Space exploration
-Mapping of human genome
5. State CURRENT trends in ICT
- Computers are becoming smaller in size with more processing power
- cheaper but larger memory capacity
- Rise of wireless technologies
- Rise of mobile phones
- Better software

29
CARRERS
IN
ICT

30
10 careers in Information and Communications
Technology (ICT) along with their respective
duties:
1. Software Developer/Engineer:
- Duties: Designing, developing, and maintaining software applications or systems. This involves
coding, testing, debugging, and implementing software solutions based on client or organizational
needs.

2. Network Administrator:
- Duties: Managing an organization's computer networks. This includes configuring, monitoring,
and maintaining network infrastructure, troubleshooting network issues, and ensuring network
security and performance.

3. Database Administrator (DBA):


- Duties: Designing, implementing, and managing databases to store and organize data efficiently.
DBAs oversee database security, performance tuning, backup and recovery procedures, and data
integrity.

4. Information Security Analyst:


- Duties: Protecting an organization's computer systems and networks from cyber threats. This
involves analyzing security risks, implementing security measures such as firewalls and encryption,
monitoring for security breaches, and responding to incidents.

5. Systems Analyst:
- Duties: Evaluating an organization's IT systems and processes to improve efficiency and
effectiveness. Systems analysts assess business needs, recommend technological solutions, and
coordinate system development projects.

6. IT Project Manager:
- Duties: Overseeing IT projects from initiation to completion. This involves defining project goals,
creating project plans, allocating resources, managing budgets and schedules, and ensuring that
projects are delivered on time and within scope.

7. Cloud Solutions Architect:


- Duties: Designing and implementing cloud-based solutions for organizations. Cloud architects
assess business requirements, select appropriate cloud services and providers, design cloud
infrastructure, and oversee migration to cloud platforms.

8. IT Consultant:
- Duties: Providing expert advice and guidance on IT strategy, technology solutions, and system
implementation. IT consultants work closely with clients to analyze their needs, recommend
solutions, and assist with the implementation and integration of IT systems.

9. Data Scientist:
- Duties: Analyzing large volumes of data to extract insights and inform business decisions. Data
scientists use statistical techniques, machine learning algorithms, and data visualization tools to
interpret data, identify trends, and solve complex problems.

31
10. User Experience (UX) Designer:
- Duties: Improving the usability and accessibility of software applications and websites. UX
designers conduct user research, create wireframes and prototypes, design intuitive user interfaces,
and collaborate with developers to ensure a positive user experience.
11. Computer operator- enters data into a computer and performs various operations on the data
12. Sales person or self-employed.

THE END
SUBSCRIBE AND SHARE THE LINK WITH YOUR
FRIENDS OR CLASS MATES

DON GICHAI
WHATSAPP: +254799027371

32

You might also like