Computer Kcse Past Papers Papers
Computer Kcse Past Papers Papers
PAST PAPERS
COMPUTER STUDIES
PAPER 1
(THEORY)
OCT/NOV 2023
11. State three functions of the central processing Unit (CPU) (3mks)
12. a) Explain the difference between system software and application programs.
(2mks)
b) Explain the difference between digital and analogue computers. (2mks)
13. a) Explain the difference Random Access Memory and Read Only Memory
(2mks)
b) State in which memory the monitor program would be stored. (1mk)
14. State the two requirements of computer program testing (2mks)
15. For each of the following file organization methods, state an appropriate storage
medium.
a) Serial
b) Random (2 mks)
f
17. a) Briefly explain the following terms:
i. cell
ii. range
iii. label
iv. value
v. Function
b) A spreadsheet has the following entries
A B C D E F G
1 PROJECTED
BUDGET
2 Percent 10.0%
3
4 ITEM 1996 1997 1998
5 Food 56,000
6 Clothes 24,000
7 Fees 50,000
8 Transport 20,000
9. Entertainment 15,000
10
11
Provide a formula for cell C5 that can be copied onto cell D5 and the range
C6…D10 to give a uniform increase of 10% of the previous year’s value for each
item. (3mks)
e) Explain the difference between the printing of multiple copies and the
printing of multiple pages. (2mks)
18. a) state any three reasons why people may resist the introduction of
computers at their place of work. (3mks)
b) Explain the difference between data privacy and data security. (4mks)
20. a) Match the computer generation with the technology used to make the
Processor
Generation Technology
Third Thermionic values
First Integrated circuits
Fourth Transistor
Second Large scale integration
(4mks)
Instruction to Candidate
This paper consist of Two sections; A and B
Answer all the questions in section A
Answer question 16 and any other Three questions from section B
All answer should be written in the spaces provided on the question paper.
b) Record
c) Field
5. List two features of word processor (2mks)
6. Differentiate between the hardware and software components of a computer
giving an example of each (4mks)
7. What is program documentation? Give two examples of program documentations
(3mks)
8. Give two differences between high-level and low-level languages. (2mks)
9. Worksheet cells are referenced using the column letter and row number e.g. D2 is
cell in column D and row 2.
Use the sample worksheet provided to answer the questions below.
A B C D E F
1 Moth Jan. Feb Mar. April Total
2 Fees 460 460 460 460
3. Food 300 350- 305 270
4. Electricity 100 100 100 100
5. Fuel 150 150 150 150
6 Transport 38 270 150 300
7 total
b) What cell contains the data items representing transport for the month of
February? (1 mk)
c) Write down the formula that may be used to compute the total in cell F6. (1mk)
10. Name any two types of graphs that are supported by spreadsheets (2mks)
16. The roots of the equation ax2 + bx + c = 0 are given by the formula
X= -b b + 4ac
And a 0
2a
b) Using the flow-chart write a program that will compute the roots and if b2-
4ac is negative, the program should display the message “NEGATIVE”
(5mks)
17. A multinational organization has offered to donate computers to your school. The
Board of Governors has requested you advise on the operating system to be used
by providing answers the following questions.
a) What is an operating system? (1mk)
b) State and briefly explain any two types of operating systems (6mks)
ii) Give any two advantages of using computers in this area (4mks)
19. A computer vendor has recommended the use of a computer database to your
school for student information
a) Explain to the Board of Governors what a database is and its functions
(5mks)
b) Give two examples of database systems (2mks)
COMPUTER STUDIES
(THEORY)
PAPER 1
OCT./NOV. 2000
ii) ASCII
iii) EBDIC
3. Suggest how computers may in future be made more users friendly for persons
that are
a) BCD
b) Without hands
5. Name six steps in program development cycle in their logical sequence. (3mks)
8. List the steps that you would use to correct wrongly spelt words in a document
using the spell-checking feature. (3mks)
10. State what is meant by each of the following and give an example of where each
is used
a) Magnetic Ink character Recognition (MICR) (2 mks)
11. In the following flowchart, what will be the value of the sum when printed?
Show how you arrive at your answer.
Begin
Sum = 0
R: = 0
R: = r + 1
Term: = r (2) +r
Sun: sum + term
R=3 F
Print sum
Stop
13. Explain any three of the terms: creating, editing, printing and saving as used in
word-processing (3mks)
15. What is the use of the search and replace feature in a word-processor? (2mks)
16. A program is required for reading in a student’s name and scores obtained in two
subjects. The output of the program will consist of the student’s name, the two
scores, the average of the two scores and a comment. The comment is based on
the average as follows:
Average Comment
70 Good
< 70 Poor
Write a program to solve the problem using a high level language. (15 mks)
b) State what is meant by each of the following transmission media and give
one advantage and one disadvantage for each .
i) byte
ii) bit
iii) word
20. a) A firm intends to purchase new software. List three items that should
accompany the software. (3mks)
b) State and explain three ways that computer technology could make office
work more efficient. (6mks)
i) Hacking
ii) Fraud
iiii) Piracy
COMPUTER STUDIES
(THEORY)
PAPER 1
OCT. /NOV. 2001
INSTRUCTION TO CANDIDATES
This paper consists of two sections; a and b
Answer all the questions in section a
Answer question 15 and any other three questions form section B
All answer should be written in the spaces provided on the question paper.
(3mks)
7. Give three advantages of separating data from the applications that use the data in
database design. (3mks)
a) Competition
b) Pace of growth
9. a) List any four tasks that an electronic spreadsheet should be able to perform
other than calculations (2mks)
a) Mouse (2 ½ mks)
b) Scanner. (1 ½ mks)
11. State two differences between Disk Operating System (DOS) and WINDOWS
operating system.
b) Name twp DOS commands that may be used for checking disk errors.
(2mks)
13. Explain how a paragraph can be moved from one place to another in word-
processing. (2mks)
SECTION B (60MKS)
Answer question 15 and any other three questions from this section.
i) psuedocode (1 ½ mks)
16. the following car details are to be entered in a database; make, date-of-
manufacture, colour and cost.
a) Prepare a suitable database structure showing field names and their
field types (5mks)
b) Explain how you index the data such that cars of the same make
and colours are together (2mks)
c) Write a statement that can be used to select cars of the colour green
(2 mks)
d) Give an instruction that would;
i) select cars whose cost lie between 500,000/= and
1,000,000/= (3 mks)
17. a) The diagram below represents the essential features o a computer system .
Study the diagram and answer the questions that follow:
A B Output device
Secondary storage
A
B
C
D
ii) On the diagram above, indicate the direction of data flow using
arrows.
(3mks)
c) Explain how CPU registers may be used to carry out a basic calculation
such as:
2+7=9
19. a) In a computer based information system, state the purpose of the following
files and give one example where such a file may be required in a school.
(8mks)
i) Report file
ii) Back-up file
iii) Reference file
iv) Sort file
b) State three precautions that should be taken to ensure that diskettes are
well stored. (3 mks)
COMPUTER STUDIES
PAPER 1
THEORY
NOVEMBER/DECEMBER 2002
1. Describe the purpose of each of the following computer functional units: (2mks)
a) Control
b) Storage
2. Explain how each of the following would affect the suitability of a room for use
as a computer room: (2mks)
4. State two types of documentation in program development and give the purpose
of each. (4mks)
5. Suppose a 5 element array A contains the values 9, 12, 17, 7 and 20. Find the
value in a after executing the loop below:
Repeat for k = 1 to 4
Set A [k +1]: = A [k]
[End of loop] (3mks)
6. State any three activities that occur in a program compilation process (3mks)
7. The formula = k20 + P$ 18 was typed in cell L21 and then copied to cell M24 of a
spreadsheet. Write the formula as it appears in cell M24.
(2mks)
8. State two ways in which a computer may be used in efficient running of a hospital
(2mks)
9. List three disadvantage of using traditional file management method (3mks)
12. State and explain two reasons why word processing is one of the most common
applications of many computer users.
(2mks)
14. Explain the following input/output terms as used in computer systems. Give an
example for each (4mks)
a) Read
b) Write
15. State two disadvantages of networking.
16. The following flowchart can be used to list the odd numbers between 0 and 100
Start
Odd=1
Write Odd
Odd=Odd+2
Odd<99
Stop
a) Write a program segment for the flowchart using a high level language.
(7mks)
b) What would be the output from the flowchart if the statement in the
decision box
is changed to: (3 mks)
i) Odd = 100
c) Modify the flowchart so that it prints only the sum of the odd number
between 0 and 100 (5mks)
17. a) List five precautions that can be taken to protect data stored in diskettes
(5mks)
b) State and explain two precautions that can be taken to help recover data
lost through accidental erasure. (4mks)
i) Batch processing
iii) Multiprogramming
b) Give four differences between present day’s computers and the older
generation of computers (4mks)
c) Give four reasons why a firm may decide to computerize its operations.
(4mks)
d) An individual has a right to demand guarantee to privacy of personal
information stored on a computer.
(6mks)
COMPUTER STUDIES
PAPER
(THEORY)
OCT./NOV. 2003
INSTRUCTIONS TO CANDIDATES
This paper consists of two sections’ A and B.
Answer All the questions in section A
Answer question 16 and an other three questions from section B
All answers should be written in the spaces provided on the question paper
1. Computer systems are built from three types of physical components: processors,
memories and 1/O devices.
2. Threats to the safety of computer systems take many forms such as: white-collar
crime, natural disasters, vandalism and careless ness.
Give on way as to how each of these forms of threats can be controlled.
(2 mks)
3. a) Explain the term nibbles as used in data representation in computers
b) Perform the following binary arithmetic giving the answers in decimal
notation. (3 mks)
b) State the type of translator necessary for a program written in: (2mks)
i) High level language
ii) Assembly language
8. List three differences between wide area Networks (WAN) and Local Area
Networks (LAN)
(3mks)
9. Study the flowchart segment below and state the last value printed from the
flowchart. (2 mks)
K=1
K=K+1
M [K] =10
Print M [K]
K>5
YES
NO
EXIT
11. Give two reasons why optical disks are better storage media compared to floppy
diskettes (2mks)
12. What are the Dos commands used for the following? (2mks)
a) Changing directories
b) Viewing directories
c) Renaming directories
d) Deleting a directory
16. Study the flowchart below and answer the questions that follow.
c) Modify the flowchart so that it adds up all its outputs and displays the sum
obtained (3mks)
a) What is meant by
i) 1.44 MB floppy disk drive?
ii) 20 GB hard disk?
iii) 17” SVGA monitor
b) List any three items that may be referred to as data terminal equipment in
a network (3 mks)
c) With reasons, briefly describe the most appropriate type of printer output
device for the output of:
(6mks)
(3mks)
COMPUTER STUDIES
PAPER 1
(THEORY)
OCT./NOV. 2005
2 ½ HOURS
b) Indicate whether the following devices are used for input or output
(2mks)
i) Plotter
ii) Light pen
iii) Mouse
iv) Visual display unit
2. a) Explain why the following give one reason why they are not allowed in a
computer laboratory. (2mks)
b) For each of the following give one reason why they are not allowed in a
computer laboratory. (2mks)
i) Smoking
ii) Eating foods
3. Distinguish between Real, integer and Character data types as used in
programming (3 mks)
i) AAA (5:50)
iii) CC (18)
10. Name two types of relationships that can be applied in database design (2mks)
b) Alignment
c) Word wrap
12. Outline two ways in which computer can be used in hotels (2 Marks)
15. State two health issues that may result from prolonged use of computers (2 mks)
R =1
1
/R 1 + 1/R2 (5mks)
ii) Write a program using Pascal or C languages for the flowchart in C
(i) Above. (5 ½ mks)
17. a) List three paragraph formatting activities in word processing (3mks)
i)
(2mks)
ii)
iii)
(2mks)
(3mks)
COMPUTER STUDIES
PAPER 1
(THEORY)
OCT./Nov. 2006
2 ½ hours
13. List two methods of gathering information during system development process.
(2mks)
14. Name three types of optical disks. (3mks)
15. The diagram below shows a formatted plate surface of a storage disk.
A B C D E F G H
1 NAME HOURS PAY BASIC ALLOWANCES GROSS TAX NET
WORKE PER PAY PAY DEDUCTIONS PAY
D HOUR
2 KORIR 12 1500
3 ATIENO 28 650
4 MUTISO 26 450
5 ASHA 30 900
6 MAINA 18 350
7 WANJIKU 22.5 250
8 WANYAMA 24.5 250
9 OLESANE 17 180
10 MOSET 33 700
TOTALS
Use the following expressions to answer the questions that follow:
Basic pay = hours worked x pay per hour
ii) State two ways on how information & Communication Technology (ICT)
can be used to reduce the spread of HIV/AIDS (2mks)
19. a) Describe the following terms with reference to security of data: (1 mk)
i) Log files
ii) Firewalls (1 mk)
Surname
Middle Name
First Name
Admission Number
Course
Date
Amount
Receipt No.
ii) State the field, which should serve as the linking field for the two tables.
(2mks)
c) Describe the following terms with respect to computer security:
20. a) The diagram below shows four common network topologies A, B, C and
D.
A
B
C
D
a) Backspace
b) Insert (ins)
3. Jane has noticed the following problems in her computer keyboard (2mks)
It is taking longer time to start up;
It is often hanging;
Applications are taking longer to load.
State three possible causes of these problems and how they can be solved (3mks)
4 a) Define authenticity as used in software selection (1mk)
6. You have been asked to change your computer password. State a precaution you
need to take in order to avoid each of the following:
b) Hacking (1mk)
9. Explain data series, axis and legends as used in spreadsheet charts. (3mks)
Data
Axis
Legend
10. a) Describe the term data integrity. (2 mks)
c) Hub (1mk)
12. List four types of publications that can be designed by using desktop publishing
software. (2mks)
13. Differentiate between the following pair of terms as used in database design:
14. List four factors to be considered when purchasing an operating system. (2mks)
M………………………….. N………………………..
P ………………………….. Q ………………………
ii) State the necessary steps required to connect the computers to the
internet. (4mks)
d) Below is an email address:
A B C
ii)
iii)
18. A computer C directory has folders for form 1, form 2, Form 3 and form 4. Each
class has student’s folders labeled according to their number. The students create
their own folder for the subject the are studying based on the table shown below
a) Assuming there is one student per class, draw the corresponding directory
tree structure.
(6 mks)
c) i). Other than I/O devices, list other three devices under the control of
the operating system. (3mks)
ii) Explain any one of the devices named in C (i) above (1mk)
19. A manager wishes to replace the current manual system with a computerized one
a) Describe three main areas that must be evaluated to justify the
replacement
(6mks)
c) State and explain three ways that can be followed to replace the current
system (6mks)
20. a) a head teacher keeps the following student details in a database: Name,
address, Town, Date of Birth, Marks scored, Fees paid.
iii) Explain why input screens are better data entry designs than
c) Distinguish between:
i) A table in word-processing application and a table in a database
application (2mks)
SECTION II
MARKING SCHEMES
COMPUTER STUDIES
PAPER 1
(THEORY)
OCT. /NOV 1998
2 ½ HOURS
The statements in the loop are repetitively executed while the logical expression is
true. Control will leave the loop only when the while statement is executed and
the logical expression is false at that time.
16 2
21 6
26 5
31 10
36 6
41 2
46 2
51 1
56 1
Mean = fx
f
A B C D E F G
1 PROJECTED
BUDGET
2 Percent 10.0%
3
4 ITEM 1996 1997 1998
5 Food 56,000
6 Clothes 24,000
7 Fees 50,000
8 Transport 20,000
9 Entertainment 15,000
10
Provide a formula for cell C% that can be copied onto cell D5 and the reange C6..
D10 to give a uniform increase of 10% of the previous year’s value for each item.
(3mks)
=$ B2$ * C5
e) Explain the difference between the printing of multiple copies and the
printing of multiple pages
18 a) State any three reasons why people may resist the introduction of
computers at their place of work (3 mks)
o Losing their job (retrenchment)
o Fear that their juniors may become their seniors i.e. change in power
structure
o Some people are not ready to be retrained
o Fear that information will now be available to everyone
20. a) Match the computer generation with the technology used to make the
Processor
Generation Technology
Fourth Transistors
-Magnetic tape
-Magnetic disk
-Optical disk
Disadvantage
Can not do multiple printing.
It’s very costly
COMPUTER STUDIES
(THEORY)
Oct./Nov. 1999
2 ½ hours
Marking scheme
-Storage
-Processing
-Data capture e.g. scanning
-Communication e.g. email
2. Give two types of storage devices used in a computer giving an example of
each.
-Primary storage devices e.g. RAM, ROM
-Secondary storage devices e.g. hard disk, Magnetic Disk, CD-ROM drive
3. Give any three precautionary measures considered to ensure the safety of
computers in a computer laboratory. (3 mks)
b) What cell contains the data items representing transport for the
month of February? –c6
(1mk)
c) Write down the formula that may be used to compute the total in cell
f6. (1mk)
-=sum (B6: E6)
10. Name any two types of graphs that are supported by spreadsheets.(2 mks)
- Pie charts
- Line graphs
- Bar graphs
ii) Broadcast – information is sent any device on the network can receive it e.g. Hub.
13. Give any two types of data entries that may be input into a worksheet cell.
(2 mks)
-Numeric (Number)
-text
-formulae
-date
15. List any three program control structures used in programming. (3 mks)
-sequencing
-Decision
Iteration
16. The roots of the equation ax2 +bx + c= 0 are by the formula
-b b2 +4ac
X= and a # 0
2a
b) Using the flow-chart write a program that will compute the roots and
if b2 – 4ac is negative, the program should display the message
“NEGATIVE (5mks)
17. A multinational organization has offered to donate computers to your school. The
Board of governors has requested you to advise on the operating system to be
used by providing answer the following questions.
ii) Give any two advantages of using computers in this area(4 mks)
Any two areas in any of the above areas
19. A computer Vendor has recommended the use of a computer database to your
school for student information
Advantages
- control of data redundancy
- Promotes data consistency
- There is sharing of data
- Improved security
- Increased concurrency
Disadvantages
- Complexity
- Extra cost of hardware and software
COMPUTER STUDIES
(THEORY)
OCT. /NOV. 2000
2 ½ HOURS
3. Suggest how computers may in future be made more users friendly for persons that
are: (2 mks)
a) Blind – computers that respond to touch and sound (voice)/Braille
keyboard
b) Without hands – computers that respond to voice
i) Problem definition
ii) Feasibility study
iii) System design
iv) System design
v) Programming
vi) System implementation and h/w configuration
vii) Operation and maintenance
i) Start the spell checker e.g. f7 or click on tolls the spelling and grammar
ii) Use the spelling and grammar dialogue box to adjust the words as you
wish
iii) Continue the process till the whole document is spell checked.
Single user O/s – allows one user to operate one program at a time in an
Interactive conversational mode e.g. MS-DOS
Multi-user O/S – Computer system can be accessed by several users or
Applications simultaneously.
-An OMR is able to sense marks on a special form in certain places. Application
include multiple choice answers sheets, enrolment forms etc.
11. In the following flowchart, what will be the value of the sum when printed?
Show how you arrive at your answer
Application software – handles the needs of the end-user e.g. general purpose
packages like word-processors, spreadsheets etc.
13. Explain any three of the terms: Creating, editing, printing and saving as used
in word- processing. (3mks)
Creating –starting a new document
Editing- altering contents of a document
Printing- getting a hard copy of the typed document
Saving – storing a document on secondary media
15. What is the use of the search and replace future in a word-processor. (2mks)
16. a program is required for reading in a student’s name and scores obtained in two
subjects. The output of the program will consist of the student’s name, the two
scores, the average of the two scores and comment. The comment is based on the
average as follows:
Average Comment
70 Good
70 Poor
Write a program to solve the problem using a high level language (15 mks)
Advantages
i) Low cost compared to coaxial and fibre optic
ii) Offers greater security than radiated media
Disadvantages
i) Susceptible to EMI from nearby circuits (cross talk)
ii) Can not transmit over long distances
iii) Data transmission is slow compared to fibre and coaxial
Disadvantages
i) Can only transmit data over short distances
18. Andrew, Jane, David and Zablon had tea, sausages and bananas for
breakfast. They took one sausage, two sausages, three sausages and one sausage
respectively. In addition, they took a cup of tea and two bananas. Tea, sausages
and bananas cost Kshs 10, 15 and 5 respectively.
(b) (i) State two ways through which computer viruses may be controlled
(2mks)
- Using an up to date antivirus
- Prude management policies & procedures e.g. restricting the movement of
diskettes.
(ii) Explain how each of the two ways stated in b (i) above assist in
controlling computer viruses. (2mks)
(d) Convert the hexadecimal number FCI to its binary equivalent (6mks)
20. (a) A firm intends to purchase new software. List three items that should
accompany the software (3mks)
(i) Installation guide
(ii) Service/ maintenance contract
(iii) A reference Manual (Documentation)
(iv) A license
(v) A user guide
(vi) Training
(b) State and explain three ways that computer technology could make office
work more efficient. (6mks)
(i) Powerful easy to use software enables employees to analyze large amounts
of data at their desks at high speeds.
(ii) Accuracy- Once fed with the correct data and instruction given a computer
never makes errors normally.
(iii) Diligence- a computer never gets tired or bored if it has to do the same job
over and over again.
(iv) Automation – Once an instruction has been give, a computer can carry on
its job automatically till it is complete.
COMPUTER STUDIES
Oct/Nov. 2001
2 ½ Hours
Paper 1
(THEORY)
Disadvantages
- Time lag between origination of the transactions and the information
availability
- Late information is not suitable for situations where instant decisions
are required
-
4. List any four high level programming languages (2mks)
- Visual basic - Basic
- Pascal - Java
(Any programming language that uses English like syntax)
7. Give three advantages of separating data from the application that use the
data in database design (3mks)
- There is data independence i.e. one can make changes to the
underlying table structures without changing the end- user’s views
- There is improving security and privacy. The end user only sees what
is relevant
- There is improved productivity in from data independence
8. Explain the impact of information on organizations in each of the following
areas:
(a) Competition
- An organization that has access to quick and relevant information will
obviously be ahead of its competitors and can therefore strategize itself
accordingly. Information is a powerful tool in a competitive environment
(b) Pace of growth
- Organizations need to advertise themselves therefore information is a very
important ingredient to their pace of growth. An organization that
advertises itself accordingly will be known and will therefore be ahead of
its competitors.
9. (a) List any four tasks that an electronic spreadsheet should be able to
perform other than calculations.
- Production of graphs
- Automatic recalculation
- Projection of growth curves through what if analysis
- Sorting of data
(b) Explain what is meant by automatic recalculation as used in a
spreadsheet
11. (a) State two differences between Disk Operating System (DOS) and
WINDOWS operating system.
- DOS is command driven while Windows is GUI driven
- DOS is difficult to learn and use while Windows is easier to learn and
use.
(b) (i) Define the term application Software
- Software with a specific function, such as word processor or game. It is
meant to benefit the end user.
(ii) Give one example of application software (1mk)
- Word processor e.g. Ms Word
- Spreadsheet e.g. Ms Excel
12. (a) Give one difference between internal and external commands in Disk
Operating System (2mks)
- Internal DOS commands are part of a file called command that
stays resident in memory (RAM)
- External DOS commands are stored on secondary storage and are
only loaded onto RAM when required
(b) Name two DOS commands that may be used for checking disk
errors (1mk)
CHKDSK, SCANDISK
13. Explain how a paragraph can be removed form one place to another
in word- processing (2mks)
- Highlight/ select the paragraph
- Click on edit then cut
- Click on the new area then click on edit then paste
14. Define the term structured programming (2mks)
- A program is broken down into smaller sections called modules. The
modules are linked together.
(ii) Flowchart
- A flowchart is a diagrammatic or pictorial representation that illustrates
the sequence of operations to be performed to get the solution of a
problem.
(b) A program is required to list the first 1000 numbers in the series 2, 4, 6, 8,
10 ……. Draw a flowchart and write a program that can be carry out
this task (12mks)
16. The following car details are to be entered in a database: Make, date of
manufacture, colour and cost.
(a) Prepare a suitable database structure showing field names and their field
types (5mks)
(b) Explain how you index the data such that cars of the same make and
colours are together. (2mks)
Make the primary key in the main file be the same as that in the indexing
file
(c) Write statements that can be used to select cars of the colour green
(2mks)
Make Date of Colour Cost
manufacture
Expression Green
A B Output device
Secondary Storage
(ii) On The diagram above, indicate the direction of data flow using arrows
(3mks)
(c) Explain how the CPU registers may be used to carry out a basic calculation
such as (4mks)
2+7=9
- The data 2 and 7 are fetched from memory (RAM) and placed in the Data
register (DR) via the memory Buffer Register and the Address register.
- The instruction + (add) is also fetched from memory (RAM) and placed in
the instruction register (IR) via the address register.
- The IR decodes the instruction and sends out the necessary command to
process the data in the DR.
- Results are then taken back to the RAM
(b) State and explain three reasons why the employments patterns are
affected
(6mks)
- Job replacement- Manual jobs can be done by a computer
- Job displacement- Some employees will find themselves being taken
to other departments
- Job creation- Skills will be required for IT personnel in such areas as
networking and database management.
(c) Suggest three strategies that can be employed to manage resistance to
change (3mks)
- Involve the employees concerned when trying to introduce a new
system
- Train the employees in the new system
- Inform the employees in organization plans
- Introduce the new changes in planed order e.g. in phases, in pilot states
etc.
19. (a) In a computer based information system, state the purpose of the
following files and give one example where such a file may re required
in a school (8mks)
(i) Report life
- A summary file from the main file
(b) State three precautions that should be taken to ensure that diskettes
are well stored (3mks)
- Avoid physical damage
- Avoid bringing diskette close to magnetic fields
- Write protect to prevent accidental infection by viruses
- Do not eject from computer when the access light is still on
(d) Distinguishing between binary and octal number systems and give an
example of each (2mks)
COMPUTER STUDIES
Paper 1
(Theory)
2 ½ hours
2002
2. Explain how each of the following would affect the suitability of a room for
use as a computer room. (2mks)
(a) Burglar proofed door- enhances the security system as it prevents
Unauthorized users from entering
(b) Availability of taps and sinks in the room – Could be detrimental since water
can cause damage to computer equipment (3mks)
5. Suppose an element array A contains the values 9, 12, 17, 7 and 20. Find the
value in A after executing the loop below:
Repeat for k= 1 to 4
Set A {k + 1} = A {k}
{End of loop}
10. Give one disadvantages of a single processor multi- user system (1mk)
- The processor gets overloaded due to several time slices
12. State and explain two reasons why word processing is one of the most
common applications of many computer users.
- Text can be edited (changed) on screen and reprinted if mistakes are made
- WP has many features which can be used to format the document to look
presentable
- WP has a spell checker that makes it easy to correct and insert alternate words
14. Explain the following input/ output terms as used in computer systems. Give
an example for each (4mks)
(a) Read- get data from memory e.g. opening a file
(b) Write – put data into memory e.g. saving
16. The following flowchart can be used to list the odd numbers between 0 and
100
Start
Odd=1
Write Odd
Odd=Odd+2
Odd<99
Stop
(a) Write a program segment for the flowchart using a high level language (7mks)
Program list
Var
Odd: integer
Begin
Odd; = 1,
Repeat
Write (odd);
Odd: odd + 2
Until odd>99;
Readln
End.
(b) What would be the output from the flowchart if the statement in the decision
box is changed to:
i. odd = 100 program will run continuously without stopping
ii. Odd <100- only 1 will be displayed
iii. Odd>100 – 1- 99 will be displayed
(c) Modify the flowchart so that it prints only the sum of the odd numbers
between o and 100 (5mks)
17. (a) List five precautions that can be taken to protect data stored in diskettes
(5mks)
- Avoid keeping in places of high temperatures
- Avoid folding/ crushing/ dropping/ (any physical damage)
- Avoid bringing close to magnet/ electrical fields
- Keep in disk bank
- Write protect
- Keep away from dust
- Do not remove while the disk drive is active
- Install an up to date antivirus
(b) State and explain two precautions that be taken to help recover data lost
through accidental erasure
- Keeping backup copies
- Use of recovery tools e.g. unformat/ undelete
(b) give four differences between present days’ computers and the older
generation of computers (4mks)
(c) (i) State three advantages and one disadvantage of using a laser printer
Advantages
- Fast
- Quiet
- Quality printout
- More fonts
Disadvantages
- Can not do carbon printing
- Can not use continuous sheet
- High cost of purchase
19. (a) Identify three public Universities and three National polytechnics in
Kenya where further computer training is offered, In case state the highest
level of qualification that can be acquired in computer training.
(c) Give four reasons why a firm may decide to computerize its operation
- High quality products/ services
- Better decision- making
- Cut down on costs/ labour
- Compete effectively
- Timely computations of tasks
- Enjoy benefits of global markets
- Sharing information
- Reduce redundancy
Word Processor
- Less dependent on paper
- Much economical in storage
COMPUTER STUDIES
Paper 1
(THEORY)
Oct. /Nov 2003
(a) To control the use of main memory to store data & instructions
(b) To control sequence of operations
(c) To give instructions to all parts of the computer system
(d) To carry out processing
2. Threats to the safety of computer systems take many forms such as: White-
collar crime, natural, disasters, vandalism and carelessness.
- Give one way as to how each of these forms of threats can be controlled
(i) White Collar Crime- Enforce personnel security e.g.
- No one person should be wholly responsible as system administer
- Introduce computer audit trails
- No one person should be in one department for a long time. Purge
employees
(ii) Natural Disasters
- Floods, computers rooms should not be installed in basements
- Lightening, Use UPS, surge protectors and the like
(have backups that are well kept safely away from the computers site,
have a contingency plan).
(iii) Vandalism
- Enforce personnel security e.g. restrict building access
- Secure computer systems to desks, reinforce doors, windows
- Introduce alarm system, CCTV systems
(iv) Carelessness
- Avoid food, drinks into the lab
- Have backups incase of unintended delete operations
- Have undelete utilities
(b) Perform the following binary arithmetic giving the answers in decimal
notation
(i) 1110.0111 + 1101001.011 (3mks)
1110.0111
1101001.0110 = 119.8125
1110111.1101
1001011.011 67.5
= 111.111
1000011.100
- Amount of effort & information required of the user to get the system
to complete required tasks should be kept minimum
- Systems should be self- contained so that the user is not forced into
accessing manuals or dealing with things be kept out of the system
- System should be able to adjust to different levels of expertise between
users, and as users grows in competence.
- User should be made to feel in control of what is going on
7. (a) Distinguish between labels and formulae with respect to spreadsheet
(2mks)
Label- a non- numeric piece of data entered into an electronic spreadsheet cell.
Labels are not used for computations. Any cell entry, which begins with a letter or
on apostrophe, is a level.
Formulae- Mathematical computations which join other cells’ values with
mathematical operators such as +, -, * or /
Error (#value) NB: the = sign is missing in cells C10 and C11
8. List three differences between Wide Area Networks (WAN) and Local Area
Networks (LAN) (3mks)
LAN WAN
1. Private communication network 1. Connects LANs, MANs and
connected by a length of cable covers a much wider
that serves a company located geographical area more than 3
within a radius of 10 m – 3 km km.
2. Modems are not always needed 2. Modem, routers and other
3. Telephone circuit not required communications h/w are
4. High data transmission rates required to complete the WAN
5. Low cost transmission 3. Telephone circuit required
4. Low data transmission rates
5. High transmission link cost
9. Study the flowchart segment below and state the last value printed from the
flowchart. (2mks)
K=1
K=K+1
M [K] =10
Print M [K]
K>5
Exit
11. Give two reasons why optical disks are better storage media compared to
floppy diskettes (2mks)
1. Enormous storage capacity compared to floppy diskettes
2. Faster access time and data transfer rates as compared to floppy diskettes
3. Data Recorded on optical disks is not damaged by stray magnetic fields
and surface problems like fingerprints, dusts etc.
12. What are the DOS commands used for the following?
(a) Changing directories – CD\
(b) Viewing directories – DIR
(c) Renaming directories – REN or RENAME
(d) Deleting a directory- RD\
16. Study the flowchart below and answer the questions that follow
(a) Write a high level language program for the above flowchart (7mks)
(c) Modify the flowchart so that it adds up all its outputs and displays the sum
obtained (3mks)
(b) Which operating system might be pre- installed in this computer and why?
Win 95, 98, ME
Reason: supports multimedia, office suite
(c) List three multimedia components
- CD Rom
- Speaker
- Microphones
- Multimedia projectors
(i) Fault tolerance. Media faulting has been impact on mesh. Redundant links
enable data to be sent over several different paths
(ii) Guaranteed communication channel capacity
(iii) To trouble shoot
Disadvantages
(i) Difficult to install especially as the number of devices increase since
numerous connections must be made.
(ii) Cost. Difficult to maintain redundant links
19. (a) A company has decided to computerize their operations. They have
decided to purchase packages instead of developing their own programs.
Give three advantages and two disadvantages of this approach.
Advantages
(i) Saves on programming effort and exposure on the part of the user
(client)
(ii) The user gets a well- tried and tested program
(iii) Relatively quick implementation results from use of package
Disadvantages
(i) Purchaser does not have full control over the packages as would have
been if it was developed in house
(ii) Package is produced to meet general needs & may not be ideal for a
particular customer
(c) With reasons, briefly describe the most appropriate type of printer or
output device for the output of: ( 6 mks)
Data verification- Ensuring that data entered is the same as in the source
documents
(c) Give two differences between post office mail and electronic mail
(E- Mail) (2mks)
Email
- Costs less to send
- Message sent to users across a computer network
- Message can contain attachment files (WP, Spreadsheets, Graphics etc)
- Recipient can forward message to other user quickly and efficiently
- Recipient can retrieve information from any location across the computer
network
(d) Speed and accuracy are some of the advantages of using computers in
banking. State three other advantages of use of computers in banking.
(3mks)
(i) Massive storage capacity
(ii) Electronic funds transfer
(iii) Processing of cheques using MICR technology
(iv) Provision of ATM services
COMPUTER STUDIES
Paper 1
(THEORY)
OCT/ NOV 2004
2 ½ HOURS
SECTION A
1. How is a point of sale terminal used in a business organization? (2mks)
- Customer’s item code quantity and price are entered into a post terminal,
POS.
- The modem EPOS terminals automatically debit the customers account
- The POS also does stock control, number of goods in stock can be
automatically known for the sales
5. A computer teacher put a rule that diskettes should not be used in the
computer laboratory
(a) Give a reason for the rule
- Introduction of viruses and other bugs from the diskettes
(b) State two other alternatives that can be used to achieve the same objective
- By disabling the diskette drive
- Having up to date antivirus software that will defect and eradicate any
virus in the diskette.
6. List 3 differences between laser printer and a dot matrix printer
Laser
(a) High print speed
(b) Can do no multiple jobs
(c) Quiet printing
(d) Uses photocopier technology
(e) High print quality
Dot matrix
(a) Low printing speed
(b) What happens when the following commands are typed in DOS environment
(iii) CD – takes the user one step backwards in a directory path
(iv) DIR – Displays files and folders
(a) Given that the vale 0.5 is typed in cell B9, write the shortest formula
that would be typed in cell C2 and then copied down the column to obtain
half the values in column B.
= $B49* B2
(b) Write two different formulae that can be typed to obtain the total in
cell B6 and then copied to cell C6
= sum (B2: B5)
= B2 + B3 + B4 + B5
14. State three operations that can be performed on relational database files
- Sorting
- Querying
- Report creation
- Performing calculations
- Indexing
- Data type
e.g.
Array = MyArray {1...n} of
Integer;
16. Bidii wholesalers have two categories of customers for order processing.
Category ‘A’ obtains 10% discount on all orders upto Kshs 10,000 otherwise the
discount is 20% on the entire order. Category ‘B’ obtains 30% discount on all
orders if the debt repayments is ‘good’ otherwise the discount is 15%. Draw a
flowchart for the order processing.
Advantaged
- Impending quality life
- No stress of traveling to the office
- Traveling time saved
- Cost of traveling saved
- Greater flexibility when working at home
Disadvantages
- Possible feeling of isolation
- No social contact with fellow workers
- Additional cost of home working equipment and connection charges or
employees
- More difficult to build firms and share ideas between colleagues
18. (a) Explain three ways by which computer users can protect their eyes from
harmful emissions from the computer screen
- Using a glare filter
- using an LCD screen (does not emit radiation)
- Not sitting in front of the computer for long hours
(c) Explain time- sharing data processing mode giving two advantages
and two disadvantages of its application.
- Central processor serves two or more users with different processing
requirements (tasks) Central processor is available to a variety of users
connected to the central compare via communication links. Processors
time is divided appropriately among users’ tasks into time slices. Control
switched from one job to another under the influence of the OS, in turn,
the processors idle time is removed.
Advantages
- Information output is fast
- Processor idle time is removed
- File enquiry is fast since file are held online
Disadvantages
- Users have no control over central computer
- Response time is more when there are many users
19. A school has brought a computer system. The hardware items include: 800
MHz processor, 640 MB of RAM, a sound card, speakers, a monitor, a keyboard,
a 12 GB hard disk, a floppy disk drive, CDRW drive, a mouse, a modem, an
inkjet printer and a joystick. The software supplied includes: an OS, a BASIC
interpreter and the following packages: Spreadsheets, graphic, word processor, art
database and games.
(a) List three input devices from the given specifications
- Keyboard
- Mouse
- Joystick
(b) Explain the meaning of the following
(i) 800 MHz- refers to the clock speed/ processor speed. The number of clock
cycles per second at which the computer performs its basic operations
(ii) 640 MB- The size of the main memory installed inside main memory, which
holds data and information waiting to be processed.
(iii) 12 GB- The size of the fixed disk (hard disk) in the computer, it is a
secondary storage medium.
(c) Some of the students in the school use the computer to do homework.
Name the packages used to:
(i) Do calculations and draw graphs- Spreadsheets
(ii) Write an easy - word processor
(iii) Make a poster - graphics
(b) Write the path at which the contents of the subdirectory Db can be erased
or displayed
C:\STUDENT\DB
(d) Give two reasons for storing files in directories and sub- directories
- Better management e.g. files from one application or department can be
stored in different directories so as not to mix them. A directory serves as a
table of contents and allows convenient access to files
(e) Give two disadvantages of using command driven interfaces as compared
to menu driven interfaces
COMPUTER STUDIES
Paper 1
(THEORY)
Oct. /Nov 2005
2 ½ hours
MARKING SCHEME
SECTION A (40 marks)
1. (a) What is a disk formatting? (1mk)
- To prepare storage medium by defining tracks and sectors where data will
be placed in compliance with specific operating system requirements.
(b) Indicate whether the following devices are used for input or output
(2mks)
(i) Plotter - Output
(ii) Light pen Input
(iii) Mouse Input
(iv) Visual display unit
(b) For each of the following give one reason why they are not allowed in a
computer laboratory.
(i) Smoking - Can start fire
- Can introduce dust through smoke particles
(ii) Eating foods- Can spill and spoil computer parts like keyboard
Integer - Constant must have at least one digit written without a decimal
Point.
Character - A data component that represents a single letter or symbol
mark. Write a formula that can be used to count all students who have the
remark “very good”
(3mks)
= countif(K3:K10,”very good”)
5. (a) State the purpose of registers in a computer system (1mk)
- To hold data and instructions temporarily as they are being processed in
the CPU ( 2mks)
6. (a) A serial file comprises of records placed in positions 1 to 10. State the
position of the end of file marker (1 mk)
11
(b) State the purpose of each of the following (2mks)
(i) File server software
- Software that provide file handling and storage functions for multiple uses
on a LAN e.g. Windows NT, Windows 2000, Linux
(ii) Communication software
- Program that allows a computer to connect with another computer e.g.
telephone directories, facilities that automate dial up process, log on
procedures etc
7. (a) Name the control structure depicted by the flowchart below
If…then …Else
(ii) Direct change over- starting full operation instantly in the whole
organization (cut – over) & replacing the old system
10. Name two types of relationships that can be applied in database design
(2mks)
a. One to one
b. One to many
c. many to many
12. Outline two ways in which computer can be used in hotels (2mks)
(i) Room reservation system
(ii) Financial and human resource management
13. (a) explain Binary Coded Decimal code of data representation (1mk)
- BCD is a 4-bit code used for coding numeric values only. Unlike pure
binary each number or digit is assigned a specific binary code to represent
it.
(b) Write the number 45110 in BCD notation (1mk)
-100101001
14. Arrange the following data units in ascending order of size (2mks)
BYTE, FILE, BIT, NIBBLE
BIT, NIBBLE, BYTE, FILE
15. State two health issues that may result from prolonged use of computers
(i) Exposure to electromagnetic radiation through the VDU
(ii) Eye Strain
(iii) Repetitive strain injury causing muscle fatigue etc
(c) (i) Draw a flowchart to compare the combined resistance (R) of two
resistors R1 and R2 in parallel using the formula
(i) Write a program using Pascal or C languages for the flowchart in c (i) above.
(5½mks)
Program Resistance (input, output)
Var
R, R1, R2, X1, X2, X3: Real;
Begin
Writeln (this program computes the combined resistance ® of two resistors in
parallel’);
Writeln (please input the values of R1 and R2, press Enter to continue’);
Readln (R1, R2);
x1:1/r1;
x2:1/r2;
x3:=x1+ x2;
R: = 1/x3;
Writeln (the value of the combined resistance is R: 3: 2);
Readln;
End
17. (a) List three paragraph formatting activities in word processing(3 mks)
i. alignment
ii. Tabs
iii. Indentation
iv. Outline level
v. Line spacing
(c) The following information shows the income and expenditure for
“Bebayote” matatu for five days. The income from Monday to Friday was
Kshs 4,000, 9,000, 10,000, 15,000 and 12,000 respectively while the
expenditure for the same period was Kshs, 2,000, 3,000, 7,000, 5,000 and
6,000 respectively.
(i) Draw a spreadsheet that would contain the information. Indicate the
rows as 1, 2, 3…. And the columns as A, B, C. ( 4 mks)
(b) Using two’s compliment, subtract 7 from 4 and give the answer in
decimal notation (4mks)
7 = 1112
4 = 1002
-4 in two’s compliment is 100
111
100
+ 1011
The resulting answer is 011 since the overflow is ignored. In decimal notation
this is 310
(c) Convert
(i) 91B16 to octal
9 1 B
1001 0001 1011
9.62510 = 1001.1012
19. (a) Explain what the following DOS commands will do when executed
(i) A: \copy ** B
- Copy all files in drive A to drive B
(ii) C:\ERASE * DOC
- Delete all file with the extension DOC from drive C
(b) (i) With the aid of a diagram, explain hierarchical (tree) network topology
A network topology that, from a purely topologies
viewpoint, resembles an interconnection of star networks
in that individual peripheral nodes are required to
transmit to and receive from one other node only, toward
a central node, and are not required to act as repeaters
or regenerators.
20. (a) Name and explain the function of the keyboard keys represented by the
following symbols (2mks)
(c) Explain three ways in which computers have impacted on Education (3mks)
- Teaching has been made easier through modeling packages. Modeling is when a
computer program attempts to represent a real situation. In order to do this,
mathematical equations are used. Different values can be input to the model to
investigate possible outcomes.
- Simulations packages can be used to train students
- Multimedia packages offer a wealth of resources material, which students can
transfer across into their project work
- It is easier to maintain school/ students records using computers
Paper 1
(Theory)
Oct. Nov 2006
2 ½ Hours
MARKING SCHEME
Section a (40 marks)
1. What is meant by:
(a) Analogue data: Data that is based on physical variations such as loudness and
pitch, electoral voltages etc
(b) Digital Data- Data, which use the computer’s binary number systems 0 and 1
2. Distinguish between transcription and transportation types of errors and
give an example of each
- A transcription error is a specific type of data entry error that is commonly made
by human operators or by optical character recognition (OCR) programs
E.g. Name: Stamley (wrong) instead of Stanley (Correct)
Margin The blank space that surrounds the text on a page or the
boundary line or the area immediately inside the boundary or the blank
space that surrounds the text on a page.
12. (a) List two arithmetic operations that can be performed on a row of
numeric data in a word processing table
+,-,x,/
15. The diagram below shows a formatted plate surface of a storage disk
(b) Draw a flowchart to compare three non- equal numeric values A,B,C
and print the largest of the three ( 1mk)
(b) State one way in which a user may reverse the last action taken in a
spreadsheet package (1 mks)
- Use the undo command (ctrl + z)
(c) The following is a sample of a payroll. The worksheet row and column
headings are marked 1, 2, 3, and A, B, C respectively
(d) (i) State three ways of moving round the page in desktop publishing window
(3 mks)
- Use cursor keys
- use mouse scroller
- Use scroll buttons (horizontal and vertical)
(ii) State two ways on how information & communication technology (ICT) can
be used to reduce the spread of HIV/ AIDS ( 2 mks)
- Through advertisements on the Internet
- Through creation of posters
- Through discussion groups on the internet
19. (a) Describe the following terms with reference to security of data:
(i) Log files
- A file that lists actions that have occurred. For example, web servers
maintain log files listings every request made to the server. With log file
analysis tools, its possible to get a good idea of where visitors are
coming from, how often they return and how they navigate through a site.
ii) Firewalls. (1mark)
- A firewall is an information technology (IT) security device which is
configured to permit, deny or proxy data connections set and configured
by the organization's security policy. Firewalls can either be hardware
and/or software based.
A firewall!\s basic task is to control traffic between compeer networks
with different zones of trust. Typical examples are the Internet which is
a zone with no trust and an internal network which is (and should be) a
zone with high trust The ultimate goal is to provide controlled interfaces
between zones of differing trust levels through the enforcement of a
security policy and connectivity model based on the least privilege
principle and separation of duties
b) A students' database comprises of students1 details table and fees received
table as shown below:
COMPUTER STUDIES
PAPER 1
(THEORY)
OCT./NOV. 2007
2 ½ HOURS
2. State the functions of the following keys on the computer keyboard (2 mks)
c) Backspace – to delete a character to the left of the cursor
d) Insert (ins) – when the key is depressed editing is in overtype mode. Any
new text typed in the middle of a line is inserted between existing text
while the existing text disappears/is deleted.
3. Jane has noticed the following problems in her computer:
It is taking longer time to start up;
It is often hanging
Applications are taking longer to load.
State three possible causes of these problems and how they can be solved (3mks)
a) Disk is fragmented - Defragment the disk by running the defragment
utility. "
b) Virus/bug infection - run the antivirus utility
c) Capacity of RAM is small- Increase the size by replacing the existing chip
with a higher capacity RAM chip.
d) Processor speed is low - Replace processor with a high speed processor.
4. a) Define authenticity as used in software selection (1 mark)
- This refers to the gem4ineness/originaUty/licensed software. Software that is
not pirated.
b) List four ways of acquiring software in an organization (2 marks)
a) Buy Off-the-shelf package - This can be sold through retail outlets without
any direct contact between the software developer and the customer.
b) Customized software applications - The software developer builds an
application that meets the needs of the customer as defined in a specification.
c) Lease or Rent software.
d) Freeware/Shareware
5. Some of the storage disks available are: Zip disks, 31/2inch floppy disks, DVDs
and 51/4 inch floppy disks. Arrange these devices in ascending order of storage
capacity. (2 marks)
1 1
5 /4 inch floppy disks, 3 /2 inch floppy disks, Zip disks DVDs.
6. You have been asked to change your computer password. State a precaution you
need to take in order to avoid each of the following:
a) Forgetting the password (1 mark)
- Compose password from a hintable phrase.
b) Hacking (1 mark)
- Use both alphabets and numerical in the password
7. State four benefits of using a computer in a school library (2 marks)
a) Record keeping made easier e.g. easy to track borrowers and books
b) Easy to search for library materials.
c) Books and other materials can be held electronically hence allowing
multimedia usage.
d) Library materials can be electronically marked thus minimizing loses
and theft.
8. Using six bits, find the two's complement of -2310. (4 marks)
23÷2=11R1
11÷2=5R1 2310=0101112
5÷2=2R1 Twos compliment = 101000
2÷2=1R0 +1
1÷2=0R1 1010012
9. Explain data series, axis and legends as used in spreadsheet charts. (3 marks)
Data Series
The selected range in a worksheet that EXCEL converts into a graphic
and displays as a chart (in spreadsheet applications)
Axis
A reference line from \which distances or angles are measured in a
coordinate system, such as the X-axis and y-axis in the Cartesian
coordinate system
Legend
Brief description accompanying an illustration (chart) also known as a
caption
10. a) Describe the term data integrity. (2 marks)
The quality of correctness, completeness, wholeness, soundness and
compliance with the intention of the creators of the data
b) State four situations in which data may lose integrity (2marks)
- Accidental insertion/alteration/modification/destruction
- Deliberate insertion/alteration/modification/destruction
- Transfer errors
- Lack of input validations
11. State the-function of each of the following:
a) Network interface card (1 mark)
- It provides connectivity between the PC and the network's physical
medium, the copper or fiber-optic cable.
18. A computer C directory has folders for Form 1, Form 2, Form 3 and Form 4. Each
class has student's folders labeled according to their number. The students create
their own folder for the are studying based on the table shown below.
a) Assuming there is one student per class, draw the corresponding directory
c) i) A form four student wants to create a folder to store to project State the
path for flat project folder. (2 marks)
C:\FORM4\STUDNO\ADB\PROJECT
ii) Suggest how the student can ensure that: - work is not lost in case the hard
disk fails. (1 marie)
- Keep backup copies of the project on offline secondary storage media.
- The project is not copied by other students. (1 mark)
- Use passwords for opening and modifying the project
d) Other than I/O devices, list other three devices under the control of the
operating
- Main memory
- CPU/Processor
- Secondary storage
- Communication device
ii) Explain any one of the devices named in c(i) above. (1mrk)
e) Define the term trouble shooting
Systematic approach to locating the cause of a fault in an electronic
circuit or system
19. A manager wishes to replace the ctirrent manual system with a computerized one
a) Describe three main areas that must be .evaluated to justify the
replacement. (6 marks)
- Technical feasibility: Does'thecurrenttechnology (hardware & software)
allow.
- Economic feasibility: Are funds available?
- Social feasibility: How will the new system impact on the
organization/society?
b) List the three areas that would be considered in the requirements
specifications. (3 marks)
- Users specifications
- Software specifications
- Hardware Specifications
- Organizational integration specifications
c) State and explain three ways that can be followed to replace the current
system. (6 marks)
- Running in parallel: New system runs along side the old one until the
old one is discarded -
- Cut-over: New system replaces the old one instantly.
- Phased: New system is implemented in phases.
- Pilot sites: New system is tested on pilot sites then whole organization.
20. A head teacher keeps the following student details in a database: Name,
Address, Town, Date of Birth, Marks scored, Fees paid.
i) Name the most appropriate primary key. Give a reason. (2 marks)
Name
- Name alone is not unique though it is very rare that two or more students
will share the same name.
ii) For each item in the student's details above, indicate its most
appropriate data type as used in the database. (3 marks)
Name Text
Address Text
Town Text
Date of Birth Date/Time
Mark Scored Numeric
Fees Paid Numeric/Currency
iii) a) Explain why input screens are better data entry designs than entering
data directly to a table. (2 marks)
- Most forms are bound to one or more tables and query in the database
hence a user can design input fields linked to several tables/queries.
- Forms are also appealing to the eye. They have GUI features unlike a
table.
b) List two career opportunities associated with databases. (2 marks)
Database Administrator
Data Administrator System Analyst
Database Developer
c) Distinguish between:
i) A table in word-processing application and a table in a database
application. (2 marks)
- A table in a database application is a data entry/storage object, while a
table in a word processor is made up of rows and columns of cells that
one can fill with text and graphics. Tables in word processors are often
used to organize and present information
- In a database one defines the data type for a table in design stage/view
but not the case in a word processor.
COMPUTER
SECTION A (40 MARKS)
(b) Typing and re- typing a new password when changing it ( 1 mk)
2. With reference to quality of print, noise level and cost, compare a dot matrix
A B C D
1. Item Price per unit Number ordered Cost (Kshs)
2. 56 K modem 8,565.00 60
3. 128 MB Ram 4, 950.00 40
4. Pentium IV 13,525.00 55
Processor
5. Total
(i) D2 ( 1 mk)
(ii) D5 ( 1 mk)
(b) If a value added tax (VAT) of 16% was charged on each item and the number
ordered was decreased by 10%, write a new formula that can be used in D2 ( 2 mks)
(b) Which of the approaches named in (a) above is appropriate for critical
3. A computer user typed the name Kajiado as Kajiado and 8726 as 8126
(i) .org
(ii) .gov
6. (a) name two types of buses found on the computer motherboard ( 2 mks)
(b) State the purpose of each of the types of buses named in (a) above ( 2 mks)
7. (a) Name the two files commonly used in mail merge ( 1 mk)
(b) Name and explain the two types of drop caps ( 2 mks)
8. Give three ways in which horticultural farmers can benefit from the use of
Answer question 16 and other three questions from this section in the spaces provided
(a) What would the flowchart generate as output if the value of N at input was:
(i) 6? ( 2 mks)
(ii) 1? ( 2 mks)
(b) Write a pseudocode that does the same thing as the flowchart above
( 7 mks)
(c) Modify the flowchart so as to reject an input below and to avoid the looping when
11. A lecturer keeps the following student details in a database: name, age, course
(a) write an expression you would use to compute the year of birth of a student
(b) what query expressions would the lecturer use to list the students whose age is
(d) Name and describe any two types of database models ( 6 mks)
12. (a) The diagram below shows a layout of a computer network used by a law farm.
(iv) Give two advantages and one disadvantage of the above network design
( 3 mks)
(v) If the firm intends to open extra offices in two different towns, name any
(vi) State any two security problems that might arise by linking the offices in
13. (a) Study the following diagram and answer the questions that follow
(i) Name two devices that are used for long term storage ( 2 mks)
(ii) Name three peripherals shown on the diagram that are used for input (3 mks)
(iii) Name two other devices that a computer Aided Design (CAD) user might wish to
(b) A customer wishes to purchase a computer system. The customer can buy a word
package. State three advantages why many computer users prefer integrated packages
to separate packages.
(c) (i) An anti- virus software installed in a computer is loaded into the main
Explain three ways in which computer virus are spread from one computer to another
( 3 mks)
(ii) Give two reasons why an anti virus package should be updated regularly
( 2 mks)
14. (a) Perform the following binary arithmetic and give your answers in decimal
notation:
(c) Using four – bit twos compliment, perform the following arithmetic
1. Design a newspaper publication to appear as indicated in the next page using the
following instruction.
(a) Launch the DTP package and set the preference measurements to centimeters
(b) The headings “digital Bulletin’ to have the following styles ( 4 mks)
Font size: 45
(c) The other two headings in the publication to have the styles
Font size: 20
(d) The text under the heading “Basic Networking and Connectivity’ to be in three
Font size: 14
Hyphenation: disabled
Fully justified
(e) The text under the heading ‘Antivirus Information Corner’ to be in a single
column ( 3 mks)
( 10 mks)
(g) Insert the two lines of 4 and 0.75 points respectively in their positions
( 3 mks)
DIGITAL BULLETIN
The ability to expand beyond the limit of a single office has extended the reach of the PC
A network is defined as two or more computers linked together for the purpose
of communicating and sharing information and other resources. Most networks are
constructed around cable connection that link computers. This connection permits the
computers to talk ( and listen) though a wire. More recently, a number of wireless
Bluetooth, radio links and other protocols allow variety of new devices to link with PCs.
In order for the network to function, three basic requirement must be met:
understand each other. Computers often run different software and therefore
A service defines those things a computer shares with the rest of the network. For
SPECIAL OFFER
SPECIAL OFFER
Pentium IV
35,000/=
disks). Unless you use virus detection software the first time that you know that you
have a virus is when it is active. Different viruses are activated in different ways, for
instance, the famous Friday the 13th virus will activate only when it is both a Friday
and the 13th of the month. Be aware, virus can destroy all you data.
2. The central bank of Kenya (CBK) exchange rates on a certain day for foreign
Kariuki, Hamisi, Mumbua, Otieno and Nekesa trade in buying and selling of foreign
currencies. On that day they bought the following foreign currencies from CBK.
Pounds Kroner
Kariuki 400 200 340 1200 290
Hamisi 500 400 400 2000 3000
Mumbua 200 600 300 4000 5000
Otieno 600 200 200 1000 3000
Nekesa 400 200 600 2000 1000
Pounds Kroner
Kariuki 70.5 139.0 96.7910 10.4213 10.6725
Hamisi 69.0 138.5 96.79 10.5712 10.2676
Mumbua 70.0 141.5 96.76 10.3974 10.7432
Otieno 69.55 139.0 96.80 10.6371 10.5942
Nekesa 69.5 138.5 96.40 10.7218 10.6155
(a) Using a spreadsheet package, represent the above information in one worksheet
mks)
(b) Using formulae with absolute and relative cell references, determine the total
14 mks)
(c) Format the profit for each trader to zero decimal places ( 2 mks)
(d) Create a well labeled bar graph on a different worksheet showing the cost
(13 mks)
(e) Use a function to determine the trader who got the highest profit ( 3 mks)
Thanks for
highping
Downloaded by Dominic Morgan ([email protected])
lOMoARcPSD|45006710
productions
@obed #nbhs