Loading...
Back to Unit

Computer networks

Unit: Information Communication Technology

Premium Topic Resources

Sign in to download the full Topic PDF and enable offline revision mode.

Login to Access
Join the community! 550+ students upgraded in the last 24 hours. Limited Discount Seats Available

Practice CPA Information Communication Technology Computer networks questions with detailed answers and explanations.

Access past exam questions by topic, improve your understanding, and download PDF for offline revision.

April 2026

3 Questions
Question 3
​​BrightPath Microfinance operates in multiple regions and processes sensitive customer financial data. 
 
Required: 
(a) The institution has experienced phishing attacks targeting finance staff. 
 
 Analyse TWO organisational weaknesses that enable such attacks and propose mitigation strategies. 

(b) Management is considering adopting a zero-trust security model. 
 
Assess FOUR strategic implications of implementing zero-trust architecture.  

(c) Citing  THREE reasons, justify the most appropriate network architecture for secure inter-branch communication. 
 
(d) A cybersecurity audit revealed vulnerabilities in endpoint devices. 
 
 Evaluate THREE major cyber threats affecting financial institutions and recommend layered security controls.  


Answers and Explanations are locked.

Login to View Answer
Question 2
​​The Finance Director of Summer Manufacturing Ltd. wishes to enhance data-driven decision-making. 

Required: 
(a) Management reports have been inconsistent across departments. 

Assess FOUR roles of standardised reporting templates and automated systems in improving data reliability.    

(b) Summer Ltd. is considering migrating accounting systems to cloud-based platforms. 

Citing TWO reasons, justify whether this decision would enhance or weaken financial governance.  
 
(c) Evaluate THREE ways spreadsheet tools could be leveraged for financial forecasting, risk analysis and performance monitoring. 
 
(d) The organisation is implementing Enterprise Resource Planning (ERP) software. 
 
 Analyse THREE ways ERP integration could strengthen internal controls and financial transparency. 


Answers and Explanations are locked.

Login to View Answer
Question 1
​​(a) A recent system crash disrupted operations for two days.

(i) Explain TWO roles of system recovery planning. 

(ii) Recommend TWO continuity mechanisms.  

Rafiki Holdings is considering virtualisation to reduce infrastructure costs.

 Assess FOUR benefits of implementing virtualised environments. 

(C) Analyse THREE ways in which ICT alignment with business strategy could create competitive advantage for Rafiki Holdings.

(d) The organisation is deciding between Windows Server and Linux Server environments. 
     
      Evaluate THREE critical operating system features that should influence this decision in an enterprise accounting environment. 


Answers and Explanations are locked.

Login to View Answer

December 2025

1 Questions
Question 6d
​​Assess FOUR ways in which Internet of Things (IoT) could improve operational efficiency of manufacturing firms.


Answers and Explanations are locked.

Login to View Answer

August 2025

2 Questions
Question 2c
​​Cloud computing is typically categorised into three main service models namely; Infrastructure as a Service (IaaS), 
Platform as a Service (PaaS) and Software as a Service (SaaS). 
 
Required: 
(i) Describe and distinguish each of the above service model.  
 
(ii) State TWO features of each of the above model.          


Answers and Explanations are locked.

Login to View Answer
Question 5c
​​Discuss FOUR ways in which network topologies influence communication efficiency.


Answers and Explanations are locked.

Login to View Answer

April 2025

3 Questions
Question 7c
​​(i)  Explain the term “WLAN” as used in relation to computer networks.                                           
 
 (ii) Discuss FOUR features of WLANs.    


Answers and Explanations are locked.

Login to View Answer
Question 5c
​​Examine SIX roles of the Internet of Things (IoT) in modern networks.


Answers and Explanations are locked.

Login to View Answer
Question 3b
​​Highlight FIVE factors to consider when selecting a transmission media.


Answers and Explanations are locked.

Login to View Answer

December 2024

3 Questions
Question 2
​​(a) Explain TWO process management activities of an operating system.    
 
(b) Explore FOUR roles of edge computing in Internet of Things (IoT). 
 
(c) Highlight FOUR measures that could be used to minimise unethical Information Communication Technology (ICT) practices in an organisation. 
 
(d) Discuss FOUR steps carried out during system requirements elicitation process. 


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Describe FOUR ways in which an information system supports decision-making within an organisation.  
 
(b) Explain FOUR benefits of using goal seek in financial analysis. 
 
(c) Examine THREE benefits of prototyping in identification and clarification of user requirements. 

(d) Currently, the use of wireless data transmission media has increased. However, it still faces many challenges. Evaluate THREE such challenges. 


Answers and Explanations are locked.

Login to View Answer
Question 6
​​(a) Outline TWO strategies to overcome each of the following challenges in electronic commerce:  
 
(i) Security challenge. 
 
(ii) High competition challenge. 
 
(iii) High customer acquisition costs.
 
(iv) Challenges in maintaining customer trust. 
 
(b) Identify FOUR features to look for when selecting an accounting software for use in an organisation. 
 
(c) Highlight FOUR potential benefits of implementing Internet of Everything (IoE) in businesses.  
 
(d) Examine FOUR benefits of conducting a post-implementation review (PIR) of an information system project.     


Answers and Explanations are locked.

Login to View Answer

August 2024

4 Questions
Question 2
​​(a) Explain TWO benefits of using pivot tables in a spreadsheet software.    
 
(b) Outline FOUR applications of mobile computing in the financial sector.    
 
(c) Describe FOUR ways in which the Internet of Things (IoT) impacts our daily lives.     
 
(d) Examine FOUR ways on how an organisation should handle sensitive data in order to ensure confidentiality, 
prevent unauthorised access and data misuse. 


Answers and Explanations are locked.

Login to View Answer
Question 6
​​(a) Outline THREE characteristics of mobile cloud computing application.   
 
(b) Explain FOUR services offered by an Internet Service Provider (ISP).     
 
(c) Highlight FOUR circumstances that would necessitate an organisation to use mail merge feature in a word 
processing program.   
 
(d) List FOUR disadvantages of prototyping in systems analysis and design.   
 
(e) Describe FIVE major activities of an operating system with regard to process management.


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Explain TWO circumstances that would necessiate an organisation to use the outsourcing method to acquire an information system. 
 
(b) Highlight FOUR limitations of cloud computing.
 
(c) Explain THREE circumstances that could necessitate setting up of a Local Area Network (LAN) in an organisation.
 
(d) Highlight SIX measures that could be used to minimise unethical ICT practices in an orgnisation.  


Answers and Explanations are locked.

Login to View Answer
Question 3
​ ​​(a) Highlight THREE important factors to consider when choosing a network topology.      
 
(b) An organisation processes and stores large volumes of data in an information system.  
  
 Explain THREE data security goals that the organisation might aim to achieve in the above scenario.   
 
(c)  (i)  Examine TWO challenges of e-commerce infrastructure.   
 
 (ii)  Describe FOUR ways that could be used to secure an e-commerce infrastructure.  
 
(d) Using an appropriate scenario, demonstrate how you would solve a business problem using spreadsheet solver. 


Answers and Explanations are locked.

Login to View Answer

December 2023

3 Questions
Question 1
​​(a) Highlight TWO benefits of linking worksheets in a spreadsheet program.  
 
(b) Outline FOUR qualities of a good system documentation. 
 
(c) Explain THREE desirable features of e-commerce websites that could enable customers find products quickly. 
 
(d) Examine FOUR challenges associated with cloud storage. 


Answers and Explanations are locked.

Login to View Answer
Question 2
​​(a) Citing TWO examples, explain the term “mobile operating system”.
 
(b) Using an example, explain the use of the “IF” function in a spreadsheet application.  
 
(c) Explain THREE ways in which a transaction processing system helps in improving operations of an organisation. 
 
(d) Analyse THREE factors that should be considered when creating a computer network.  


Answers and Explanations are locked.

Login to View Answer
Question 3
​​(a) Differentiate between pilot implementation methodology and parallel information systems implementation methodologies.  
 
(b) Highlight FOUR benefits of a network operating system to an organisation. 
 
(c) Outline FOUR roles of an Information Systems Analyst. 
 
(d) Explain TWO technical trends that generate ethical concerns.    
 
(e) (i)    Distinguish between systems analysis and systems design.
  
     (ii)  Citing TWO reasons, explain the purpose of the system development life cycle.


Answers and Explanations are locked.

Login to View Answer

August 2023

6 Questions
Question 1
​​(a) Explain how the following elements affect the processing power of a computer: 
 
(i) Cache memory.    
 
(ii) Data bus.   
 
(iii) Type of processor.   
 
(b) List FOUR limitations of star network topology.         
 
(c) Highlight FOUR salient features of a Computerised Accounting Software (CAS).   
 
(d) Outline SIX advantages of a pivot table report. 


Answers and Explanations are locked.

Login to View Answer
Question 3
​​(a) Highlight TWO ethical issues that need to be considered by an  information systems development team. 
 
(b) Explain TWO types of computer networks under each of the following criterion: 
 
(i) Functionality.               
 
(ii) Ownership.   
 
(iii) Transmission media.     
 
(c) Assess THREE information system vulnerabilities and their respective countermeasures.   


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Distinguish between “Executive Support System (ESS)” and “Decision Support System (DSS)”.  
 
(b) Highlight SIX advantages of Conditional Formatting in a spreadsheet program.       
 
(c) Explain THREE components of a computer network.        
 
(d) Analyse SIX benefits of developing a Disaster Recovery Plan (DRP).     


Answers and Explanations are locked.

Login to View Answer
Question 5
​​(a) List FIVE limitations of computer networking.    
 
(b) Highlight FIVE reasons why an organisation may choose an off-the-shelf software package.  
 
(c) Highlight FIVE benefits of cloud storage.              
 
(d) Examine FIVE major components of e-commerce infrastructure. 


Answers and Explanations are locked.

Login to View Answer
Question 6
​​(a) (i)  State TWO examples of Network Operating System (NOS) from different software manufacturers.  
 
(ii) List TWO advantages and TWO disadvantages of Network Operating Systems (NOS). 
 
(b) Outline FOUR reasons why Read Only Memory (ROM) is preferred for storing firmware.  
 
(c) Summarise FOUR ways in which a transaction processing system improves operations of an organisation.     
 
(d) A library management system is an example of an information system.  
 
In relation to the above statement, state TWO relevant examples of the following items in a library system: 
 
(i) Data. 
 
(ii) Processing. 
 
(iii) Information. 


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) Explain TWO ways in which an operating system acts as a resource manager.      
 
(b) Highlight FOUR benefits of Internet of Things (IoT) in smart home.      
 
(c) Outline SIX instances when you would recommend prototypes during system development.   
 
(d) Examine SIX benefits associated with business processes integration.


Answers and Explanations are locked.

Login to View Answer

April 2023

1 Questions
Question 6a
​​XYZ Ltd. invited an ICT consultant to set up a computer network. The consultant linked all the computers to every other in the network. The nodes were connected to every other via a dedicated link so that every node features a point-to-point connection to the opposite node.

Required:

(i) State the type of network topology on the above scenario.

(ii) Highlight benefits associated with the topology.


Answers and Explanations are locked.

Login to View Answer

December 2022

3 Questions
Question 2b
​​Explain limitations of using “Internet of things” (IoT) technology.


Answers and Explanations are locked.

Login to View Answer
Question 3a
​​(i) Differentiate between “Intranet” and “Extranet” as used in computer networks.


(ii) Outline limitations of using “extranet” as a computer network in an organisation.


Answers and Explanations are locked.

Login to View Answer
Question 7a
​​Explain characteristics of a “peer to peer” computer network.


Answers and Explanations are locked.

Login to View Answer

August 2022

3 Questions
Question 4
​​(a) Citing three reasons, explain the importance of requirements gathering in system development.
 
(b) Justify why an information system is considered as an intellectual property. 
 
(c) Explain the following features of a presentation package: 
 
(i) Transition effects.            
 
(ii) Speaker notes. 
 
(iii) Templates. 
 
(d) The organisation where you work intends to set up a local area network.  
 
Advise your management team on three hardware components required to accomplish the above task. 
 
(e) Outline four factors that could be used when selecting the best software development methodology for a specific project. 


Answers and Explanations are locked.

Login to View Answer
Question 6
​​(a) An insurance company has decided that it no longer requires a physical Head Office. Its strategic aim is to become a virtual organisation. The company’s auditors have concerns that information held by the virtual company would lack security. 

Required: 
Describe three measures that could be adopted to ensure the information in the insurance company remain secure.

(b) Highlight three challenges of prosecuting ICT cases in court.

(c) Explain four application areas of cloud computing technology in a governance/accounting services firm. 

(d) Identify five major management challenges to building and implementing information systems within an organisation. 

(e) Outline two limitations of a touch screen as an input device. 


Answers and Explanations are locked.

Login to View Answer
Question 7
​ ​​(a) Explain three legal issues involved when a person who is a resident in Kenya or your country wants to purchase a car offered for sale in Japan via a server in Hungary. Assume he is doing online purchase through e-Commerce. 

(b) John Mbululu intends to implement cloud computing in his organisation but he has several concerns about cloud computing. 
      Suggest three possible concerns for John Mbululu. 

(c) One technique for gathering requirements during system development is the use of workshops. 
     Discuss two advantages and two disadvantages of using workshops for requirements gathering.

(d) (i) To minimise resistance during system changeover, it is always necessary to involve users. Identify four different ways of involving users in the system development process.

     (ii) Explain four approaches used in system changeover. 

    (iii) Explain the significance of an information centre in an organisation.


Answers and Explanations are locked.

Login to View Answer

April 2022

3 Questions
Question 5
​​(a) (i) Explain the term "smart home" as used in the world of technology.

(ii) Describe the importance of the "Internet of Things" in the smart home.

(b) Explain three reasons why organisations pursue business process integration.

(c) E-commerce customers should be able to find the product they are looking for quickly.

Identify three best practice features for e-commerce websites.

(d) Examine the significance of carrying out stakeholder analysis before undertaking an information systems project.


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Discuss the importance of information security policies.

(b) Explain four reasons why an organisation may prefer to install a peer to peer networking model.

(c) Outline seven indicators of a successful information system.


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) The Internet of Things (loT) has grown very rapidly and emerged to be a large part of how human beings live, communicate and conduct business. While web-enabled devices are turning our global rights into a great switched-on operating area, the implementation ofIoT has several challenges.

Discuss four security challenges that accompany IoT.

(b) Identify four benefits of requirements gathering process in an information system development.

(c) (i) Identify three challenges that businesses could face in adopting e-commerce.

     (ii) For each of the identified challenges in (c) (i) above, suggest a suitable solution that businesses could use to deal with it.

(d) Summarise two common challenges encountered while using the system development life cycle (SDLC) model.


Answers and Explanations are locked.

Login to View Answer

December 2021

3 Questions
Question 3
​​​​(a) (i) Outline three models used in classifying e-commerce applications.
     (ii) Explain two security challenges encountered in digital marketing of e-commerce.

(b) Most companies have embraced the use of cloud technology though they are facing challenges in its use.
     Explain three such challenges. 

(c) Define each of the following terms as used in systems theory.
     (i)  Functional decomposition. 
    (ii)  Functional cohesion. 
    (iii) Feed-forward. 

(d) Describe four features of systems approach to information systems.


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Highlight four characteristics of Internet of Things (loT). 

(b) Propose four duties of an information centre in an organisation.

(c) ABC Transport company has opted to train its users before a new system is implemented.

     Suggest four benefits of training users before implementing a new information system. 

(d) Outline four advantages of using joint application design (JAD) technique in the design of an information system.

(e) (i) Define "cell referencing" in the context of spreadsheet applications.

     (ii) Using an example, explain one type of cell referencing.


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) Describe each of the following types of information systems as used in organisations:

(i) Transaction processing system.

(ii) Management reporting system.

(iii) Decision support system.

(b) XYZ Company Ltd. intends to implement a new information system.

Explain three organisational factors that should be considered to ensure success of the system.

(c) Explain three types of applications of Internet of Things (IoT) in the government sector. 

(d) Outline two features of a word processing program.


Answers and Explanations are locked.

Login to View Answer