Loading...
Back to Unit

Overview of operating systems

Unit: Information Communication Technology

Premium Topic Resources

Sign in to download the full Topic PDF and enable offline revision mode.

Login to Access
Join the community! 550+ students upgraded in the last 24 hours. Limited Discount Seats Available

Practice CPA Information Communication Technology Overview of operating systems questions with detailed answers and explanations.

Access past exam questions by topic, improve your understanding, and download PDF for offline revision.

April 2026

1 Questions
Question 1
​​(a) A recent system crash disrupted operations for two days.

(i) Explain TWO roles of system recovery planning. 

(ii) Recommend TWO continuity mechanisms.  

Rafiki Holdings is considering virtualisation to reduce infrastructure costs.

 Assess FOUR benefits of implementing virtualised environments. 

(C) Analyse THREE ways in which ICT alignment with business strategy could create competitive advantage for Rafiki Holdings.

(d) The organisation is deciding between Windows Server and Linux Server environments. 
     
      Evaluate THREE critical operating system features that should influence this decision in an enterprise accounting environment. 


Answers and Explanations are locked.

Login to View Answer

December 2025

3 Questions
Question 4c
​ ​​Explain THREE maintenance utilities found in an operating system.


Answers and Explanations are locked.

Login to View Answer
Question 1c
​​(i) Explain THREE roles of an operating system (OS) in a computer system. 

(ii) Citing an example in each case, describe TWO distinct types of operating systems.


Answers and Explanations are locked.

Login to View Answer
Question 2a
​ ​​Explain TWO factors to consider when selecting an operating system for a new computer system.


Answers and Explanations are locked.

Login to View Answer

August 2025

2 Questions
Question 1a
​​Explain the term “virtual memory” in relation to operating systems.


Answers and Explanations are locked.

Login to View Answer
Question 7c
​​Outline SIX ways in which an operating system secures a computer system.


Answers and Explanations are locked.

Login to View Answer

April 2025

1 Questions
Question 7b
​​Explain FOUR components of the task bar.


Answers and Explanations are locked.

Login to View Answer

December 2024

3 Questions
Question 3
​​(a) Outline FOUR potential risks of using outdated software.
 
(b) Highlight FOUR environmental impacts of Information Communication Technology (ICT) in business. 
 
(c) Discuss THREE roles of source document integration in computerised accounting systems. 
 
(d) Examine SIX reasons why an operating system is deemed crucial for the proper functioning of a computer system.     


Answers and Explanations are locked.

Login to View Answer
Question 5
​​(a) Explain THREE benefits that would accrue to a business as a result of using mobile applications.
 
(b) Explain FIVE reasons why a non- impact printer may be better than an impact printer in an office environment.                
  
 
(c) One of the common e-commerce security issues is lack of trust in the privacy and e-commerce security. 
 
 Explain THREE methods attackers use to compromise e-commerce security.  
 
(d) Describe THREE maintenance utilities in an operating system. 


Answers and Explanations are locked.

Login to View Answer
Question 2
​​(a) Explain TWO process management activities of an operating system.    
 
(b) Explore FOUR roles of edge computing in Internet of Things (IoT). 
 
(c) Highlight FOUR measures that could be used to minimise unethical Information Communication Technology (ICT) practices in an organisation. 
 
(d) Discuss FOUR steps carried out during system requirements elicitation process. 


Answers and Explanations are locked.

Login to View Answer

August 2024

2 Questions
Question 1

(a) Explain the function of an operating system in job accounting.       
 
(b) Highlight THREE ways in which operating systems authenticate users.        
 
(c) Outline FOUR functions of user documentation during the development of an information system.        
 
(d) Enumerate FIVE factors to consider when designing an information system output.           
 
(e) Information Communication Technology (ICT) has heightened ethical issues and exerted pressure on existing social arrangements. 
           
 Discuss THREE technological trends that are responsible for the above issues.


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) Discuss THREE activities involved during information system requirements elicitation process. 
 
(b) Outline FOUR activities of an operating system in regard to management of secondary storage. 
 
(c) Describe FOUR environmental impact of ICT in business.    
 
(d) The introduction of new information technology raises new ethical, social, and political issues that must be dealt with on an individual, social, and political levels.  
  
 Discuss THREE moral dimensions raised by these issues. 


Answers and Explanations are locked.

Login to View Answer

April 2024

4 Questions
Question 6
​​(a) Explain TWO reasons for multi-booting.
 
(b) Implementation is an importance phase in the development of an information system. 

Describe THREE activities carried out in this phase. 
 
(c) Business owners looking to manage financial data tend to embrace two primary options; spreadsheets and accounting software. 

Evaluate THREE reasons why businesses prefer using accounting softwares.  
 
(d) Explain THREE differences between “word processing software” and “desktop publishing software”. 


Answers and Explanations are locked.

Login to View Answer
Question 5
​​(a) Outline SIX core processes for software development. 

(b) Explain TWO reasons why a major operating system must evolve over time. 

(c) Examine THREE methods that could be used to prevent social engineering related attacks. 

(d) Explain TWO advantages and TWO disadvantages of digital wallets as an ecommerce payment method.


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Describe TWO reasons that would necessitate the use of water mark on a word processing document.    
 
(b) Explain FOUR circumstances when batch operating system would be most appropriate.        
 
(c) Explain THREE types of feasibility studies that are conducted during the development of an information system.        
 
(d) Highlight SIX challenges of e-commerce in developing countries.  


Answers and Explanations are locked.

Login to View Answer
Question 1
​​(a) List TWO limitations of mobile computing.                                                           
 
(b) Identify SIX factors to consider in the selection and acquisition of a computer operating system. 
 
(c) Every organisation, regardless of its size or industry needs to prioritise the implementation of robust data security controls. 
 
Explain FOUR types of data security controls. 
 
(d) Quick Response (QR) codes have gained significant popularity in recent years, becoming a widely adopted technology for various purposes. 
 
Outline FOUR reasons for the popularity of QR codes. 


Answers and Explanations are locked.

Login to View Answer

August 2023

2 Questions
Question 7
​​(a) Explain TWO ways in which an operating system acts as a resource manager.      
 
(b) Highlight FOUR benefits of Internet of Things (IoT) in smart home.      
 
(c) Outline SIX instances when you would recommend prototypes during system development.   
 
(d) Examine SIX benefits associated with business processes integration.


Answers and Explanations are locked.

Login to View Answer
Question 2c
​​Examine THREE ways in which an operating system provides data security in a computer system.


Answers and Explanations are locked.

Login to View Answer

April 2023

5 Questions
Question 6d
​​Describe features of time-sharing operating system


Answers and Explanations are locked.

Login to View Answer
Question 6b
​ ​​Outline benefits associated with the use of pivot tables.


Answers and Explanations are locked.

Login to View Answer
Question 5c
​​Enumerate reasons why memory management is required in a computer system.


Answers and Explanations are locked.

Login to View Answer
Question 4a
​​Give reasons why an operating system must evolve over time


Answers and Explanations are locked.

Login to View Answer
Question 1c
​ ​​Highlight activities that the operating system executes in relation to process management.


Answers and Explanations are locked.

Login to View Answer

December 2022

4 Questions
Question 1d
​ ​​Explain problems that could be encountered when using a computerised accounting software.


Answers and Explanations are locked.

Login to View Answer
Question 3c
​​Veronica stored word processing files in a flash disk when working from a home desktop computer. She has realised that the files could no longer open at her place of work.

Required:
Suggest reasons why some files may not open despite being visible on the flash disk.


Answers and Explanations are locked.

Login to View Answer
Question 6d
​​Explain factors to consider when choosing an operating system for a computer.


Answers and Explanations are locked.

Login to View Answer
Question 1c
​​Using an example, explain how one would use “Goal seek” function in a business.


Answers and Explanations are locked.

Login to View Answer

April 2022

1 Questions
Question 3
​​(a) Discuss six reasons why a computer operating system is considered as a resource manager. 

(b) It is possible to lose a laptop, a mobile phone or a flash disk. 
     Discuss four ways you could protect the data in your device to minimise data breach. 

(c) The Tangaza County Government intends to establish information centres. 
     Explain two services that are likely to be offered at the centres. 

(d) State two challenges of using computerised accounting software in an organisation.


Answers and Explanations are locked.

Login to View Answer