Loading...

CPA Information Communication Technology – April 2024 Past Paper & Answers

Unit: Information Communication Technology

7 Questions

Download Complete Period

Get all questions and answers for "April 2024" in a single PDF file

Join the community! 550+ students upgraded in the last 24 hours. Limited Discount Seats Available

Questions

Download CPA Information Communication Technology April 2024 past paper with detailed answers and marking scheme. This paper is based on KASNEB examination standards and is ideal for revision and exam preparation.

Access the full paper online, download the PDF, or study offline. Each question includes step-by-step solutions to help you understand key concepts in Information Communication Technology.

1
Mobile devices and applications Overview of operating systems Data security The Internet
​​(a) List TWO limitations of mobile computing.                                                           
 
(b) Identify SIX factors to consider in the selection and acquisition of a computer operating system. 
 
(c) Every organisation, regardless of its size or industry needs to prioritise the implementation of robust data security controls. 
 
Explain FOUR types of data security controls. 
 
(d) Quick Response (QR) codes have gained significant popularity in recent years, becoming a widely adopted technology for various purposes. 
 
Outline FOUR reasons for the popularity of QR codes. 
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
2
Mobile devices and applications Legal, ethical and social issues in information systems
​​(a) The emergence of mobile communication applications has revolutionised how people communicate and interact with each other.  
 
Explain FOUR essential features of a communication application. 
 
(b) Outline SIX moral dimensions associated with information systems.
 
(c) A company uses cloud computing technology for data storage.  
 
Explain THREE ethical challenges the company might face while using this technology. 
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
3
Data security Systems analysis and design An overview of application packages
​​(a) An increase in online data processing has led to increased rate of computer crimes.  
 
Describe THREE control measures that could be put in place to reduce computer crime rate in organisations.     
 
(b) Explain THREE circumstances that would necessitate the use of pilot approach during system change over.    
 
(c) Explain the following functions as used in spreadsheet application: 
 
(i) SUMIF. 
 
(ii) PMT.

(d) An organisation installed an inhouse developed application software to support their operations. 

 State FOUR advantages they would gain by using this software.  
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
4
An overview of application packages Overview of operating systems Systems analysis and design e-Commerce
​​(a) Describe TWO reasons that would necessitate the use of water mark on a word processing document.    
 
(b) Explain FOUR circumstances when batch operating system would be most appropriate.        
 
(c) Explain THREE types of feasibility studies that are conducted during the development of an information system.        
 
(d) Highlight SIX challenges of e-commerce in developing countries.  
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
5
Systems analysis and design Overview of operating systems Data security e-Commerce
​​(a) Outline SIX core processes for software development. 

(b) Explain TWO reasons why a major operating system must evolve over time. 

(c) Examine THREE methods that could be used to prevent social engineering related attacks. 

(d) Explain TWO advantages and TWO disadvantages of digital wallets as an ecommerce payment method.
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
6
Overview of operating systems Systems analysis and design An overview of application packages
​​(a) Explain TWO reasons for multi-booting.
 
(b) Implementation is an importance phase in the development of an information system. 

Describe THREE activities carried out in this phase. 
 
(c) Business owners looking to manage financial data tend to embrace two primary options; spreadsheets and accounting software. 

Evaluate THREE reasons why businesses prefer using accounting softwares.  
 
(d) Explain THREE differences between “word processing software” and “desktop publishing software”. 
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
7
Data security Mobile devices and applications Legal, ethical and social issues in information systems Systems analysis and design
​​(a) (i)  Identify FOUR security threats in mobile applications. 
 
      (ii)  Propose an appropriate measure to mitigate each of the threats identified in (a) (i) above. 

(b) Social concerns in information systems are a crucial aspect of the development and implementation of information systems. These concerns are related to ethical, social, political and moral issues that arise from the use of information systems. 

Examine FOUR social issues in Information Systems. 
 
(c) Describe FOUR events that might spark an iterative process in software development. 
Want to join the discussion?

Log in to post comments and interact with tutors.

Login to Comment
Success!

Comment posted! We'll give you feedback soon.