©2023 TVET CDACC
061006T4ICT
ICT TECHNICIAN LEVEL 6
IT/OS/ICT/CR/2/6
INSTALLATION OF COMPUTER SOFTWARE
NOV/DEC 2023
TVET CURRICULUM DEVELOPMENT, ASSESSMENT AND CERTIFICATION
COUNCIL (TVET CDACC)
CANDIDATE WRITTEN ASSESSMENT
TIME: 3 Hours
INSTRUCTIONS TO CANDIDATE
1. This paper has TWO sections A and B. Attempt questions in each section as per instructions
given in the section.
2. You are provided with a separate answer booklet.
3. Marks for each question are indicated in the brackets.
4. Do not write on the question paper
This paper consists of 3 printed pages
Candidates should check the question paper to ascertain that all pages are
printed as indicated and that no questions are missing
Page 1 of 7
©2023 TVET CDACC
SECTION A: 40 MARKS
Attempt ALL questions in this section.
1. Describe each of the following terms: (4 Marks)
a) System-level utility software;
type of software that is designed to help user manage, maintain and optimize computer
systems. Example disc cleanup, antivirus and antivirus software.
b) The Graphical User Interface (GUI).
Type of user interface that allows users to interact with electronic devices through visual
indicators and graphical icons, rather than text-based commands.
2. Distinguish between open source and off the shelf methods of software acquisition. (4 Marks)
Open-source: freely available for use distribution with source code available for
modification and customization
Off the shelf software: Pre-packaged software designed for general use without
modification
3. Mary intends to acquire software for her company. Enumerate any FOUR factors she should
consider before selecting the software. (4 Marks)
Functionality
Compatibility
Scalability
Security
Upgradeability
User-friendliness
4. State THREE types of operating systems. (3 Marks)
Windows
Linux
macOS
Android
IOS
5. a) State the role of the following utility software in a computer system. (3 Marks)
i. anti-virus: software used to detect, prevent and remove malware from a computer system
ii. Merge: combines multiple file or data set into one file or data set.
iii. compressor: reduce file size for transmission or storage
Page 2 of 7
©2023 TVET CDACC
b) Give TWO items that should come along with authentic software. (2 Marks)
license key or product key
user manual
installation media or download link
6. Identify THREE types of functional testing. (3 Marks)
Unit testing – Testing individual components
Integration testing – Ensures different modules work together
System testing – check the complete system for defects
Acceptance testing
7. Mention FOUR activities performed in during user training. (4 Marks)
Demonstrating software features and functionalities
Providing hand-on practice sessions
Providing user manual and training material
Answering user questions and addressing concerns
Assessment test to evaluate user understanding
8. Explain THREE parameters to be tested during non-functional software testing. (6 Marks)
Performance testing
Security testing
Usability
Reliability
9. Discuss TWO types of software maintenance (4 Marks)
Corrective maintenance
Adaptive maintenance
Perfective maintenance
10. Outline THREE roles and responsibilities of a software configuration manager. (3 Marks)
Version control
Change management and tracking
Build management: Ensure software build and deployment runs smoothly
Release Management. Planning and coordinating the release of new software versions.
SECTION B: 60 MARKS
Attempt any THREE questions in this section.
11. You have been contracted by the government of Kenya as an ICT consultant to supply the
computers to the public institution and install all the software that are required by the institution
Page 3 of 7
©2023 TVET CDACC
a) Using a well labeled diagram, illustrate at least TEN steps that could be followed to deliver
the training module on how to use the software’s installed on the computers. (10 Marks)
Gather system requirements
Install necessary drivers and dependencies
Install the software
Configure the system setting
Set up user accounts and permissions
Demonstrate key features
Provide hands – practice
Answer user queries
Conduct assessment test
Offer ongoing support
b) Information security is important when installing computer software. Explain THREE types
of data controls that could be considered when installing software. (6 Marks)
Access control
Data Encryption
Audit and logging controls: maintaining logs of user activity to track changes and
potential
Data validation: Implement check to ensure that data entered into the software is
accurate and consistent.
c) Identify FOUR strategies should be employed to ensure efficient and accurate software
release management during software configuration? (4 Marks)
Automated deployment process
Keeping details release documentation
Using version control systems
Performing thorough testing before release
12. Mr. Alex operates a computer bureau which specializes in preparing customer curriculum vitae,
developing business cards and printing annual reports for the organization.
a) Discuss FOUR types of application software that he should have installed in his computers.
Word processing software
Page 4 of 7
©2023 TVET CDACC
Web browsing software
Spreadsheet software
Graphics Editing software
Presentation software
(8 Marks)
b) Describe SIX types of installations that he would use to install software’s in his new
computers that he has purchased due to increase in numbers of client for better production
(12 Marks)
Full installation (entire software package)
Custom installation (select feature only)
Network installation (install on the server and accessed remotely)
Silent installation (automated setup without user intervention)
Web-based installation
Portable installation
Clean installation
13. Most public institutions in Kenya have embraced digital transformation for education and
research for students, the IT department of each institution was requested to install software in
their computers and ensure that the software’s were configured
a) Highlight at least SIX key areas of importance in software configuration. (6 Marks)
Security setting: configure firewalls, antivirus software and access controls to protect the
system from threats
Network setting: configure network connectivity, IP addressing, and DNS settings for
proper.
User account management: Creating and managing user accounts with appropriate
permission and access rights.
Software updates: Ensure that the operating system and the applications are up to date.
Performance Tuning: Optimizing system settings for better performance and resource
utilization.
Backup and Recovery: Configuring backup schedules and recovery options to protect
data loss.
Regional and Language Settings
b) State SIX advantages of functional testing. (6 Marks)
Verifies Functionality: Ensures that the software performs its intended functions
correctly
Identify defects: Detect bugs and errors in the software early in the development
process.
Improves software Quality: enhances the reliability and stability of the software.
Page 5 of 7
©2023 TVET CDACC
Ensure compatibility: verifies that the software meets specified requirements and
standards.
Reduces Development costs: Fixing bugs early is cheaper than fixing them later.
Increase user satisfaction: Delivers a more reliable and user-friendly products
Reduce risk of failure
c) Computer software is classified according to end-users licensing, acquisition and purpose.
Describe FOUR types of system software.
(8 Marks)
Operating Systems (OS): Manages hardware and software resources and provides a
platform for applications (e.g., Windows, macOS, Linux).
Device Drivers: Enables communication between the OS and hardware devices (e.g.,
printer drivers, graphics drivers).
Utility Software: Assists in managing and optimizing system performance (e.g., antivirus,
disk defragmenters).
Programming Language Translators: Converts programming code into machine-readable
code (e.g., compilers, interpreters).
Firmware: Software embedded in hardware devices that controls their basic functions
(e.g., BIOS, UEFI).
14.
a) You are an IT expert working in an ICT firm as a sales person; you realize that the sales for
software have reduced. Discuss FIVE factors that could have led to this reduction in software
acquisition. (10 Marks)
Economic Downturn: Businesses and individuals may reduce spending on software
during economic hardship.
Increased Competition: New competitors may offer similar software at lower prices or
with better features.
Shift to Cloud-Based Solutions: Companies may opt for subscription-based cloud
services instead of purchasing traditional software licenses.
Software Piracy: Availability of pirated software may reduce legitimate sales.
Changing User Needs: Software may not be meeting the evolving needs of users.
Ineffective Marketing and Sales: Poor marketing campaigns or sales strategies may lead
to reduced demand.
Shift towards mobile applications
Page 6 of 7
©2023 TVET CDACC
b) Explain FIVE benefits of implementing preventive software maintenance. (10 Marks)
Reduces Downtime: Proactive maintenance minimizes unexpected software failures and
system downtime.
* Extends Software Lifespan: Regular maintenance ensures that the software remains
compatible and efficient over time.
* Improves Performance: Optimizing software settings and removing unnecessary files
enhances system performance.
* Enhances Security: Applying security patches and updates protects the software from
vulnerabilities and threats.
* Reduces Costs: Preventive maintenance is often cheaper than fixing major problems
that arise from neglect.
* Increases User Productivity: Reliable and well-maintained software improves user
efficiency and reduces frustration
THIS IS THE LAST PRINTED PAGE
Page 7 of 7