Loading...

CPA Information Communication Technology – April 2022 Past Paper & Answers

Unit: Information Communication Technology

7 Questions

Download Complete Period

Get all questions and answers for "April 2022" in a single PDF file

Join the community! 550+ students upgraded in the last 24 hours. Limited Discount Seats Available

Questions

Download CPA Information Communication Technology April 2022 past paper with detailed answers and marking scheme. This paper is based on KASNEB examination standards and is ideal for revision and exam preparation.

Access the full paper online, download the PDF, or study offline. Each question includes step-by-step solutions to help you understand key concepts in Information Communication Technology.

1
An overview of application packages Data security e-Commerce Legal, ethical and social issues in information systems The Internet
​​(a) Explain five factors to consider when selecting a spreadsheet software.

(b) Explain the following terms as applied to data security in e-commerce.

    (i) Privacy. 
   
   (ii) Integrity. 

  (iii) Authentication.

  (iv) Non-repudiation.

(c) (i) Outline two advantages of a professional code of ethics. 

     (ii) Highlight two drawbacks of a professional code of ethics.

(d) Examine three impacts of the internet on the education sector.
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
2
Legal, ethical and social issues in information systems Systems analysis and design An overview of application packages
​ ​​(a) ABC Ltd. has opted to adopta decision support system in the restructure of its business processes. 

Required: 
(i) State three moral dimensions the company would consider from this move.

(ii) Outline three legal issues the company is likely to consider from this move. 

(b) Outline four possible causes of ICT project failure during system implementation. 

(c) (i) Explain the term "requirement elicitation" in relation to software development. 

     (ii) Explain two "requirements Elicitation" techniques. 

(d) Highlight four features of a word processing of application package.
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
3
Overview of operating systems Data security Introduction to information communication technology (ICT) An overview of application packages
​​(a) Discuss six reasons why a computer operating system is considered as a resource manager. 

(b) It is possible to lose a laptop, a mobile phone or a flash disk. 
     Discuss four ways you could protect the data in your device to minimise data breach. 

(c) The Tangaza County Government intends to establish information centres. 
     Explain two services that are likely to be offered at the centres. 

(d) State two challenges of using computerised accounting software in an organisation.
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
4
Data security Computer networks Information systems in an enterprise
​​(a) Discuss the importance of information security policies.

(b) Explain four reasons why an organisation may prefer to install a peer to peer networking model.

(c) Outline seven indicators of a successful information system.
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
5
Computer networks Information systems in an enterprise e-Commerce Systems analysis and design
​​(a) (i) Explain the term "smart home" as used in the world of technology.

(ii) Describe the importance of the "Internet of Things" in the smart home.

(b) Explain three reasons why organisations pursue business process integration.

(c) E-commerce customers should be able to find the product they are looking for quickly.

Identify three best practice features for e-commerce websites.

(d) Examine the significance of carrying out stakeholder analysis before undertaking an information systems project.

Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
6
Mobile devices and applications The Internet Data security
​​(a) Discuss three benefits that are provided by mobile devices and applications for health care professionals.

(b) (i) Explain the term "Uniform Resource Locator (URL)".

(ii) Using an example, explain the functions of each of the three key parts of a URL.

(c) Assess three benefits of data backup and recovery procedures in a business. 

Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
7
Computer networks Systems analysis and design e-Commerce
​​(a) The Internet of Things (loT) has grown very rapidly and emerged to be a large part of how human beings live, communicate and conduct business. While web-enabled devices are turning our global rights into a great switched-on operating area, the implementation ofIoT has several challenges.

Discuss four security challenges that accompany IoT.

(b) Identify four benefits of requirements gathering process in an information system development.

(c) (i) Identify three challenges that businesses could face in adopting e-commerce.

     (ii) For each of the identified challenges in (c) (i) above, suggest a suitable solution that businesses could use to deal with it.

(d) Summarise two common challenges encountered while using the system development life cycle (SDLC) model.

Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
Success!

Comment posted! We'll give you feedback soon.