COMP 101: Cybersecurity
COMP 101: Cybersecurity
Date: ……………………………………………………………
451/1
COMPUTER STUDIES
PAPER 1 (THEORY)
TIME 2 ½ HOURS.
451/1
COMPUTER STUDIES
PAPER 1
INSTRUCTION TO CANDIDATES
Write your name and index number in the spaces provided above
This paper consists of Two sections; A and B.
Answer ALL questions in section A.
.Answer question 16(compulsory) and any other THREE questions from section B.
All answers should be written in the spaces provided on the question paper
This paper consists of 12 printed pages. Candidates should check the question paper to ensure that all pages are
printed as indicated and no questions are missing
FOR OFFICIAL USE ONLY
SECTION QUESTIONS CANDIDATES SCORE
A 1-15
16
17
18
B 19
20
TOTAL SCORE
b. Justification
……………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
c. Drop cap
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………….
2. State three advantages of using computers in performing day to day’s tasks. (3marks)
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
3. Wanja operates a bookshop in a town. Lately he is finding the task of managing daily transactions manually
overwhelming.
i. Identify the type of management information system that Wanja should acquire (2 marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
ii. State two benefits that Wanja will gain from using such a system (2 marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
4. State three hardware considerations that need made before installing an operating system (3marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..…………..………………………………………………….
5. Before the end of every month an electricity service provider sends out field officers to take consumer meter
readings. The data collected by the officers is then keyed into the computer. The system then generates utility
bills which are printed and sent to the consumers.
a) State two transcription errors that are likely to occur during meter reading or input (2 marks)
6. State three editing tools that are available in most standard word processing software (3 marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..…………..…………………………………………………
8. Explain three types of system buses found on the computer system board (3 marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..…………..…………………………………………………
9. State the four disk management tools found in most operating systems. (3 marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..…………..…………………………………………………
……………………………………………………………………………………………………………………………
12. The payroll system is both a financial system and a human resources system. Explain this statement.
(2marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
14. List two ways in which computer technology can be used in law enforcement (1 marks)
……………………………………………………………………………………………………………………………
15. In reference to aviation technology, state two advantages of using simulation in training pilots (2mks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
ii). Draw a flow chart for the pseudo code in 16 b) (i) above. (6mks)
iii) Study the follow flowchart then answer the questions that flow. (4 marks)
D
E
A C
Page 5 of 10 B
ANESTAR SCHOOLS – LANJET 2022 Computer Studies Paper 1
Figure 1 Flowchart2
C: …………………………………………………………
D: …………………………………………………………
c. Explain two factors you would consider before enrolling for an ICT course in a college. (2mks)
…………..……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………..……………………………………………………………………………
……………………………………………………………………………………………………….………………………
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
f. In system development, testing is one of the critical stages. Give three reasons why the testing phase is
critical to the systems developer. (3 marks)
…………..……………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
……………………………………………………………………..…………………………………………………
………………………………………………………………………………………………………………………
18. A systems analyst has been asked by a doctor to computerize the records she keeps about her patients. He must
first of all collect information about the existing system.
a). Describe four methods he could use to collect this information. (4mks )
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
……………………………………………………………………………………………………………………….……
…………………………………………………………………………………………………………………………….
Page 7 of 10 ANESTAR SCHOOLS – LANJET 2022 Computer Studies Paper 1
(a) Once the whole system has been designed it will need to be implemented.
(i) Describe two methods of implementation that could be used. 2mks
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
……………………………………………………………………………………………………………………….……
…………………………………………………………………………………………………………………………….
(ii) Write down two reasons why one of the methods you gave in (b) (i) is better than the other. ( 2 marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
(b) After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated.
( 2mks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
……………………………………………………………………………………………………………………….……
…………………………………………………………………………………………………………………………….
(c) State one difference between system flowchart and program flowchart. (2 marks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
……………………………………………………………………………………………………………………….……
…………………………………………………………………………………………………………………………….
19. Describe each of the following data processing methods and give an example of where they are used.
(6mks)
i. Online processing
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
iii. Real-time–
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
……………………………………………………………………………………………………………………….……
(c) An organization is facing threats to data integrity. Explain three ways how the threats can be minimized.
(3mks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
……………………………………………………………………………………………………………………….……
20. (a) Give one reason why data and information in a computer system needs to be converted to other number
systems other than binary. (1mks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
(b) Explain one reason for use of binary in digital technology. (1mks)
(c) ii). Using twos complement, workout : 1510 - 810 in binary form. (4mks)
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
……………………………………………………………………………………………………………………….……
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………..………………………………………………
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………….
.……………………………………………………………………………………………………………………………
…………..………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
……………………………………………………………..……………………………………………………………
……………………………………………………………………………………………………………………….……
…………………………………………………………………………………………………………………………….