Form 1- 4 Topical Questions With Answers
Form 1- 4 Topical Questions With Answers
1
- Disk drives - Produced a lot of heat
- Battery - The computers
- Buses constantly broke down
- Input/ output ports due to the excessive
- Video card heat generated; hence
- Expansion slots were short- lived and
were not very reliable
(c) Give two differences between - Their internal memory
tower – style and desktop system units capacity/ size was low
- Tower style system unit - Slow in processing data
is designed to stand - Very costly
alone or to be placed - Used magnetic drum
on the floor, desktop memories
units lie on the desk - Cards were sued to
with the monitor placed enter data into the computers
on top
- Tower style units have Second generation computers
more space for expansion than - Used transistors in their
the typical desktop units memory
- They consumed less
(2 power & produced less
mks) heat than the first
generation computers
7. Computers have evolved through - They were relatively
a number of generations. List any faster than the 1st generation
4 characteristics of the first computers
generation of computers. - Used magnetic core
- Large in physical size memories
- Relied on thermionic - Were less costly than
valves (vacuum tubes) to process and first generation computers
store data - RAM memory capacity
- Consumed a lot of was 32 KB
power
- Produced a lot of heat Third Generation computers
- The computers - Used integrated circuits
constantly broke down in their memory
due to the excessive - They were faster than
heat generated; hence second generation computers
were short- lived, and - RAM memory capacity
were not very reliable was 2 GB
- Their internal memory - Slightly smaller in size
capacity/ size was low than 1st & 2nd generation
- Processing speed was computers
very slow - They used a wide range
- Very costly of peripheral devices
- Used magnetic drum - Could support remote
memory communication
facilities/ more than
8. Briefly explain the classification one user at the same
of computer according to time
historical development - Magnetic disks were
(generations) introduced for storage
First generation computers purposes
- Used vacuum tubes in
their memory Fourth generation computers
- Large in physical size - Used large scale
- consumed a lot of integrated (LSI) circuits
power & very large scale
2
integrated (VLSl) - A laptop is small &
circuits in their memory portable; desktop computers are not
- They were small & very portable
fast
- Had storage (memory) 11. (a) Explain the emerging
capacity trends in microcomputer
- Magnetic disks, bubble technology in relation to
memories & optical disks were size
used for storage - PCs are becoming small
- The first operating and portable, e.g. personal Digital
system was introduced Assistant (PDA).
3
- A radio with a knob that - Communication centers as
slides in a slot to increase volume terminals
- Small business enterprises e.g.
(b) Give three example of shops, small offices and homes
special – purpose computers
- Robots 16. (a) Define a microcomputer
- Mobile phones used for
communication only ( 1 mk)
- Calculators that carry - A computer who’s CPU
out calculations only (processor) has been implemented with a
- Computers used in microprocessor
digital watches & in petrol pumps
- Computers used in (b) Differentiate between a
petrol pumps microcomputer and a personal
- Computers used in computer ( 2 mks)
washing machines - A microcomputer is larger in
- An automatic pilot physical size than a PC
- A word processor - A microcomputer is more
powerful than a PC
15. State a specific example where - A PC was designed to be used
each of the following types of by one person only
computers can be used
(a) Supercomputer (c) List three factors to be
- Weather forecasting considered when purchasing a
- Petroleum research microcomputer (3 mks)
- Defense and weapon analysis - Type of processor
- Aerodynamic design and - Processing speed
simulation - Amount of main memory
(RAM)
(b) Mainframe computer - Storage capacity of the hard
( 1 mk) disk
- Banks for preparing bills, - Cost of the computer
payrolls, etc - Speed of output devices
- Hospitals - Number of users who can
- Airports (i.e., in Airline access the computers at the same time
reservation systems for booking & storing
flight information) 17. Explain four reasons which make
- Communication networks as microcomputers suitable for personal
servers computing work
- Reduced cost, i.e. are cheaper
(c) Minicomputer than the minicomputers & mainframe
(1 mk) computers
- Scientific laboratories & - Have high processing speed
research institutions - Are small in size (occupy less
- Engineering plants for office space)
controlling chemical or mechanical processes - Are more energy efficient (i.e.
- Space industry consume less power)
- Insurance companies & banks - Are more reliable in doing
for accounting purposes various functions than the early mainframe
- Communication centers as computers
servers - Are versatile (i.e. can be used
for many different tasks)
(d) Microcomputer / personal
computer 18. (a) Identify and explain five areas
( 1 mk) where computers are used to process
- Training & Learning data ( 10 mks)
institutions, e.g. schools Supermarkets
4
- For stock control i.e. records of - Automobile traffic control; to
what is in store, what has been monitor vehicle traffic in busy
sold, and what is out of stock towns
- For calculating customer’s - In Railways corporations; to
change coordinate the movement of
- For production of receipts goods & wagons
- It can be used as a barcode - In shipping control, for efficient
reader management of fleets, cargo
Banks handling & communication
- Manage financial transactions Offices
through the use of special cash - For receiving & sending of
dispensing machines called information through e- mails,
ATMs used for cash deposit & fax, etc
withdrawal services - Production of documents
- Processing of cheques - Keeping of records
- For preparation of payrolls
- Better record keeping & 19. Identify three advantages of
processing of documents using computers in banking
- Provide electronic money (3 mks)
transfer facilities - Speed and accuracy
Homes - Easy to access information
- Entertainment e.g. watching - Easy to update records
movies, playing music, playing computer - Requires less space for storage
games - Improves data security and
- For storing personal privacy
information/ documents 20. (a) Define the term ‘ computer
- For calculating & keeping laboratory’
home budgets ( 2 mks)
Industries - A computer laboratory is a
- To monitor and control room that has been specially
industries processes through the use of prepared to facilitate
robots installation of computers, and
- For management control, i.e. provide a safe conducive
to keep track of elders, bills and transactions environment for teaching &
- For advertisement purposes, learning of Computer studies.
which enable an industry to attack more (b) Give two factors to be
customers considered when preparing
Police stations a computer laboratory (2
- Matching, analyzing & keeping mks)
databases of fingerprints - Security of computers
- For taking photographs & - Reliability of the source of
other identification details power
- For record keeping - Number of computers to be
- For face recognition, scene installed and the amount of
monitoring & analysis which space available
help the police carry out - The maximum number of
criminal investigations users that the laboratory can
speedily accommodate
Transport industry
- Airports; to control the 21. List down three safety
movement of aircrafts, their precautions one should observe
take off & landing using radar when entering a computer
equipment laboratory
- For making reservations
(booking purposes) (3 mks)
- Storing flight information - Avoid smoking or exposing
computers to dust
5
- Avoid carrying foods & drinks/ 26. Why would it not be good to
beverages to the computer install Powder or Water – based
room fire extinguishers in the computer
- Avoid unnecessary movements room?
as you may accidentally knock - Powder particles settle on
the peripheral devices storage devices and may
- Only authorized people should scratch them during read/
enter the computer room write operation
- Computers users should be - Water causes rustling of
trained on how to use metallic parts and short – circuits if used
computers frequently
- Computer illiterates should not 27. (a) State one reason why a
be allowed to operate the computer needs to be connected to a
computers stable power supply
- collect any waste papers which (1 m
might be lying in the computer - To prevent damage to the
room & put them into the computer’s secondary storage media
dustbin - To avoid damage and loss of
- Shut the door of the computer important data or information
room properly such as application software
stored on the media
22. Describe the ideal environment - Prevent loss of data/
for a computer to work properly information that had not been saved before
(3 mks) the failure
- Should be free from dust,
water and magnets (b) List down four functions of
- Should be kept in well the uninterruptible Power Supply (UPS)
ventilated rooms with (4 mks)
optimum (medium) humidity - It prevents sudden power
surges that might destroy the computer
23. Explain why smoke and Dust - It supplies power to the
particles are harmful to a computer Computer during blackouts and brownouts
- Dust and smoke particles - It provides stable (clean)
settle on storage devices and power supply
may scratch them during read/ - Alerts the user of power loss
write operation (by beeping)
- It affects the cooling of the - Allows the user to save his/ her
computer work, and switch off the
system using the correct
24. Identify three facilities that will procedure
ensure proper ventilation in a room 28. Mention two things that are likely
- Large & enough windows and to cause strain- in the computer room
doors - Poor lighting of the room
- Installing fans - Bright monitors
- Installing air conditioning - Flickering monitors
system - Very bright wall paints reflect
- Avoid overcrowding of either too much light
machines or people in the room 29. Identify three proper sitting
postures while using the computer
25. Why must foods and beverages - Adopt relaxed and straight
be kept out of the computer room? back position to avoid bending
- Food particles may fall into the forward or learning far
moving parts of the computer backwards
and damage them. Liquids - The feet should be firmly
may spill into the computer placed flat on the floor
parts causing rusting or - The seat must be high enough
electrical faults allowing the eyes to be the same level with
the top of the
6
Screen 33. List three things that can spoil a
- The seat must have a straight printer if they are not of the
backrest that allows someone correct specification, and explain
to sit upright. This prevents what damage may be caused
muscle pains & backaches (i) Printer Paper: Different
caused by poor sitting printers have different sensitivity to
posture printing papers. Using the wrong
- The height of the chair or quality paper in a particular printer
working surface must be high can make the paper get stuck
enough such that your (ii) Cartridges & Ribbons: Printers
forearms are parallel with the are very specific to manufacture’s
floor and your wrists are cartridges & ribbons
straight. Use of clones or imitations ( i.e., the
- The seat must be high enough wrong make & model) can damage
relative to the table to enable the printer mechanism
the user use the hands on the (iii) Refilling of cartridges or re-
peripheral devices inking of ribbons: It can spoil the
comfortably. printer due to leakage or use of poor
30. State two methods of minimizing quality materials
dust in a computer laboratory
- Fit the computer room with 34. Explain three ways that computer
special curtains to reduce entry of dust technology could make office
particles more efficient (3 mks)
- Cover the floor with carpets in - There is easier & faster
order to absorb dust retrieval of data, i.e. they
- Regular cleaning of the reduce the time and effort
laboratory needed to access and retrieve
- Cover the computer devices information
with dust covers when cleaning the room - Increased accuracy of data
- Better presentation of data
31. Name two main causes of fire in - Ensure faster processing of
the computer laboratory and give data
the precautions that should be - Ensures economic use of
taken to guard against them storage space
- Inflammable chemical such as
those used to clean the computer equipment 35. (a) Explain the steps you would
Keep the chemicals away in follow to set up a new computer
store after use - Gently and carefully connect
- Open wires/ cables the interface cable of each
- Ensure that all electrical wires device to the correct port and
are properly insulated to the device.
- Ensure that the computer - Connect the computer to the
room has a gaseous fire source of power and switch it on.
extinguisher containing carbon - Observe boot up information
dioxide in case of any on the screen to see whether
accidents Power-On Self Test (POST)
- Smocking displays any error message. A
successful boot means that the
32. What is the purpose of labeling a computer was properly setup.
diskette? (b) Outline three reasons why it
- To prevent confusing the data is important to first shut down
in the different diskettes the computer before turning it off
- To prevent mixing diskettes - To avoid damaging storage
that are used everyday with devices that may still be in use
those used for long- term - To avoid damaging system and
storage of important data. application files
7
- To avoid loss of data and An input device that lets the
information user enter commands into the computer for
( 3 mks) execution by
typing
36. A computer must go through the
process of booting/ initialization (b) List four types of keys found
before use on a computer keyboard, giving an
(a) Briefly explain the term example of each
“computer booting”.
Booting refers to the starting ( 4 mks)
up of a computer. It is the - Function/ command keys
entire process that makes the (F1- F12)
computer ready for use. - Alphanumeric Keys
(b) Explain what happens in (A-Z, 0-9)
the computer during the booting - Numeric keypad
process (0-9)
When the power is switched - Cursor control keys
on, internally, it first checks (PgUp, PgDn, Home, end, Arrow keys)
whether all the components - Special PC keys
are in good working condition, (Ctrl, Shift, Alt, Ins, Enter, Spacebar,
i.e. the RAM, CMOS (BIOS), Caps lock, Num
hard disk & floppy disk drive
controllers, and the keyboard. lock, etc)
If no problem is found, it then - Editing keys
loads the operating systems (Del, Backspace, and spacebar)
(c) Give and explain two types (c) Name the keyboard keys that
of booting will help you: (2
(i) Cold booting: mks)
It happens when a computer (i) Type the upper character in a
which was originally off is key - SHIFT Key
switched on by pressing the (ii) Execute a selected command
power button on the systems - ENTER Key
unit
The Computer starts by
checking all its components to
determine whether they are
functioning properly
( 1 mk)
8
COMPUTER SYSTEMS They are the physical &
1. Define the following terms as used in tangible devices that make up
computing a computer systems, e.g
(i) System system unit, input devices,
A collection of independent output devices and storage
10
- Emergency situations - Availability & reliability of the
- Where faster data input is data entry device
required - Accuracy required
- In language translator or - Availability of space
programs - Appropriateness of the device
- Voice tags for voice dialing in reference to where it is to
- In automated materials be used
handling e.g. in airports, a
good handlers give spoken 12. Describe three functions
commands that direct the performed by the CPU
luggage to the appropriate ( 3 mks)
conveyor belt. (i) It carries out processing of
- For house/ office or car data
security where voice activated (ii) System control- it controls the
locks are used for access sequence of operations within the computer
control (iii) It gives commands to all parts
- In voice- activated toys and of the computer
games (iv) It controls the use of the Main
- In electronic funds transfer Memory in storing of data &
instructions
9. Name two examples of scanning (v) Storage of data- It provides
(data capture) devices used at temporary storage (RAM) &
point of scale terminals in permanent storage (ROM)
supermarkets
- Barcode reader 13. Explain the functions performed
- Light pen by each of the following central
- Cash registers processing unit elements
(i) Control Unit
10. (a) What are turnaround ( 2 mks)
documents - Interpreting instructions
These are documents produced as - Issuing control instructions to
output and which can be re-used as input by the operating system
the computer
(b) Name any two data capture (ii) Arithmetic and logic Unit
techniques that make use of turnaround - Performs arithmetic
documents calculations such as addition,
or multiplication of figures
( 2 mks) - Performs logical operations &
- Optical character recognition comparison on data
(OCR) - Performs output of logical
- Optical Mark Recognition functions (variables)
(OMR)
- Magnetic Ink Character
Recognition (MICR) (iii) Registers
- Optical Bar Recognition (OBR) - Holds data and instructions
- Magnetic Stripe Recognition temporarily just before and
after processing
11. List five factors one would
consider when selecting a data input (iv) The main memory
device (4 mks) - Stores data just before and
- The needs of the user after processing
- Type of data to be input - Stores instructions waiting to
- Volume of data to be entered be obeyed/ executed
- Input speed - Holds program instructions &
- Cost, i.e. the initial cost of the the data currently being
input device & cost of using processed
the device on a day – to – day
basis.
11
- Stores intermediate results of allows different elements or
processing awaiting transfer to sections of the computer to
the output devices communicate with each other.
A parallel collection of conditions
(v) The system clock that carry data & control signals
It determines the processing from one element to another
speed of the CPU
(b) State the functions of each
14. In reference to ALU, explain the of the following computer
meaning of logic operations and bus ( 3 mks)
give an example of this
processing operation
Data bus- carries data from the
processor to memory during the
Logic operation is the ability to
write operations and from memory
compare two quantities or
to the processor during the read
numbers to determine which is
operations
greater than, less than, equal
to, or not equal to the other. Address bus- it conveys
It also involves the testing for addresses, i.e it carries the
existing of a condition address of the memory location or
encountered during the device to be acted on by the
processing of an application & processor
altering the sequence of Control bus- it carries the timing &
instructions accordingly. control signals necessary to
coordinate the activities of the
15. Give four types of registers found entire system
in the CPU
- Accumulator 18. (a) What is the computer
- Instruction Motherboard?
- Address register This is the electronic board where all
- Storage register electronic components such as
processor, memory chips, BIOS, bus
16. (a) Name the basic unit used to connections etc are assembled
measure the processing speed of a (b) State any four components found
computer ( 1 mk) on the computer motherboard
Hertz (Hz) - Processor (CPU)
(b) A computer processor speed - SIMM/DDR sockets
is measured in Hertz. What fraction of - Memory chips
a second is the - BIOS
following? - Interface chips
- Buses
(i) 1. Nanosecond
1 19. (a) What is a Drive?
1__________ A drive is a computer device
1 x 109 = for reading data from or
1,000,000,000 seconds writing data into a storage
media, e.g. a tape or disk
(ii) 1. Microsecond
1 = (b) State any two types of
1________ computer drives, giving an
1 x 106 example of a storage device used
1,000,000 seconds by each
13
Several sectors can be Hardcopy is printed copy, e.g.
grouped to form clusters. printout on paper such as
25. State two reasons why Magnetic letters while softcopy is
tapes are not commonly used as intangible information e.g.
computer data storage medium screen display or music.
today
- Are slow when retrieving data. (vii) MICR and OCR scanners
This is because of the linear storage of data MICR uses magnetic
o the tape. technology to read magnetic
- Do not fully use their recording characters, while OCR uses
surface due to inter- record Gaps laser/ light technology to read
characters
14
If 1 sector = 512 It stores Firmware (bootstrap
bytes instructions) - the essential
(12 x 512) = 6,144 files the computer uses while
bytes booting/ starting up.
1,000,000 bytes 1 MB
6,144
It stores the system data &
instructions that are necessary
1,000,000 = 0.006144
for the normal functioning of
MB
the computer hardware e.g.
the Kernel / supervisor of the
(b) A double – sided disk contains
OS
40 tracks on each side. The tracks
are divided into 9 sectors of 512 It stores translation programs
bytes each. What is the total (code converters) used for
capacity of the disk in converting a user’s program
megabytes? ( 2mks) into machine language
Total tracks = (40 x 2) It stores special functions
= 80 (facilities) peculiar to a given
Total sectors = (80 x 9) machine
= 720 It stores character generators
Total bytes (720 x 512) for printers & Video displays
= 368, 640 bytes
It stores instructions used in
If 1 MB = 1,048, 576 bytes special – purpose computers &
? = 368, 640 computerized fuel pumps
bytes (b) Give three characteristics of
368, 640 ROM
1,048, It can only be read, but cannot
576 be written to (i.e., the user can
= 0.352 MB only read the information in
the ROM, but cannot write on it
29. By giving examples, differentiate unless it is a special type of
between primary and Secondary ROM).
Computer storage Provides permanent or semi
permanent storage of
( 3 mks) instructions & data from the
Primary Memory manufacturer.
1. Used for holding data & instructions It is non volatile memory
required immediately by the CPU Forms a small proportion of
2. It is accessed directly by the CPU the main storage ( i.e. it
3. Provides fast access to information contributes 30% of the internal
is accurate & reliable Memory).
4. It is expensive per bit of memory
dues to the technology involved
Stores essential files for
starting the computer
5. It has low/ limited storage capacity
(Bootstrap programs)
6. It is volatile & therefore it is used
to store temporary programs &
(c) Name two different types of
data
ROM
7. The speed of the processor
- Masked ROM
depends on the size & type of
- Programmable Read- Only
primary storage
Memory (PROM)
E.g. Read Only Memory (ROM) &
- Erasable Programmable Read-
Random Access Memory (RAM)
Only Memory (EPROM)
- Electrically Alterable Read-
Only Memory (EAROM)
30. (a) State four functions of Read –
31. (a) Outline three characteristics
Only Memory (ROM)
of Random Access Memory (RAM)
15
- Stores data & programs
temporarily during the times (i) Identify the name of the devices
when they are needed in the Flash Disk
Main Memory (or during
execution). (ii) List down two advantages
- Provides “read & write of this device over a floppy disk in
facilities” i.e. it allows storage ( 2 mks)
instructions to be written, read - Smaller in size than a floppy
out & to be changed at will. disk, hence, easily portable
- The contents in RAM are user – - Has a high data storage
defined, i.e. the user dictates capacity compared to a floppy disk
what is to be contained in the - Flash disks are more reliable
RAM than floppy disks
- Its contents are temporary
- It is a volatile memory 33. (a) List any four examples of
- Forms the major proportion of optical storage devices
main storage - Compact Disk Read – Only
Memory (CD – ROM)
(b) Name the two types of RAM - Compact Disk Recordable (CD-
clearly starting their R)
differences (3 mks) - Compact Disk Rewritable (CD-
RW)
(i) Static RAM - LS- 120 super disk
A static RAM can retain its - Digital Versatile Disk (DVD)
data/ content as long as power - Optical card
is provided to the memory - Optical tape
chips, i.e. it does not need to (b) Give two advantages of a digital
be re- written periodically Versatile Disk over a normal Compact
(ii) Dynamic RAM disk
- Dynamic RAM can only hold its - DVD has a larger storage
content for a short while even capacity than a CD ( 2 mks)
when power is on. - A DVD offers better data
Therefore, in order to maintain storage quality
its content/ data, a DRAM must
undergo the refreshing 34. (a) State the two types/ forms of
process (i.e. it must be re- computer output
written continually) - Softcopy
- Static RAM is much faster than - Hardcopy
Dynamic RAM
- SRAM chips are physically (b) List any four examples of
large & much more expensive output devices in a computer
than DRAM chips - Monitors
- Dynamic RAM has a much - Printers
higher packing density than - Sound output, e.g. speakers
SRAM, i.e., a DRAM chip is able - Audio response units
to store more information than - Plotters
a SRAM chip of the same size. - Sound cards
- Digital projectors
32. The diagram below shows as - Computer output on
example of microforms (COM)
a - Storage devices
secondary
(c) Identify three
Functions of
computer
devices
16
- Transmit the intermediate &
final results to the users (c) Give two advantages of the
- Convey messages e.g. error higher number of pixels per square
messages to the operators centimeter (2 mks)
- Provide immediate response to - Higher screen resolution
queries - Displays of sharp & clear
- Convert the coded results images
produced by the computer to human- - The screen is able to display a
readable form higher number of different images
35. (a) State one function of the
screen (monitor) 37. (a) What are character printers?
- Used to display the results of
all the data that has been processed from (1 mk)
the computer Are usually low- speed printers
- It converts machine- coded that print one character at a time?
outputs results from the
processor into a form that can (b) Give two examples of
be understood by people character printers
- Dot matrix
(b) Show two differences between - Thermal
a CRT monitor and a flat- panel display - Daisy wheel
- CRT monitor uses a cathode - Inkjet
ray tube to display information, while a flat - Golf ball
panel does
not. 38. Distinguish between impact and
- CRT has a protruding back, non impact printers and give two
while a flat panel does not. examples of each
- Flat panel displays are light & Impact printers print by
easily portable, while CRT’s are heavy striking mechanism & are
- CRT can display a wide range noisy, e.g Dot matrix, Daisy
of colours, while a flat panel displays a wheel, and Golf Ball, drum and
limited number chain printer.
of colours Non- impact printers print
- CRT consumes more electrical either by laser, ink or thermal
power than flat panel displays transfer mechanism & are
- The screen of a flat panel is silent, e.g. Laser, Inkjet,
much thinner & smaller than that of a CRT thermal printer, electrostatic
- The screen resolution of a CRT and xerographic
is adjustable, while that of a flat panel is
often set 39. (a) Distinguish between a line
printer and a page printer
(c) Give there examples of flat- A page printer prints
panel monitors available in the market documents page by page,
today while a line printer prints
- Liquid crystal displays (LCD) documents line by line
- Electro luminescent (EL)
- Gas plasma (b) State three advantages and
- Thin Film Transistor (TFT) one disadvantages of:
(i) Laser Printers
36. (a) What are pixels? Advantages - Cheap running
Pixels (picture elements) are cost
dots on the screen that form characters and - Produces high
images quality of
printouts
(b) What role do pixels play in - Has a very high
screen display? speed of
They determine the clarity of printing ( it is
images on the screen fast)
17
- Economical in
maintenance 41. List three advantages of a plotter
- It is very silent over normal printer machines
- Plotters produce information in
Disadvantages - an easily understandable form
Expensive to purchase & - Their presentation is quick &
maintain reliable
- Involves - Produces large graphical
expensive designs of high quality, which are east to
multiply colour read & use
printing - Can print on large sized
papers, e.g. papers e.g. Al, Which a normal
(ii) Inkjet Printers printer cannot
Advantages - Cheap to
purchase 42. Give two advantages of using
- Cheaper sound output devices
multiple colour - Very fast making it useful in
printing emergency situations
- Produces high - One can receive the output
quality prints even when a few meters away from the
computer
Disadvantage - - No reading ability is required
Expensive to run (i.e. to buy of the user
cartridges) - Suitable for the blind and
- Produces a people with poor sight
water based - Can be used for distant
print which communication if done over telephone lines
fades easily - Errors are easily corrected,
e.g. if used in a camera, one
40. Highlight four factors one should know when the film or
consider when purchasing a printer (4 exposure is set wrongly.
mks) - Makes computing interesting
- Cost involved i.e. the printer’s and entertaining
buying price, cost of
maintenance & cost of 43. George connected new
consumable items like printing multimedia speakers to his
papers, ribbons/ cartridges computer and tried to play his
- Volume of printing expected favorite music CD, but no sound
( speed of the printer) came out. Suggest two problems
- Quality of printing e.g. ability that might have occurred ( 2 mks)
to print graphics & colour - Volume control was too low
- Capability of the selected - Loose or improper connection
printer, i.e. multiple copy to the sound card
production, paper size, etc - Speakers not powered
- Compatibility with other - Multimedia not supported
computers - Lack of analogue cable
- Environment in which the connecting the optical drive to the
printer will operate motherboard or sound card
- Ease of maintenance - Sound card drivers not
- Reliability of the printer installed
- Application it is required for
(i.e. purpose/ use of the 44. List down 4 factors to consider
printer) when buying an output device
- Type of paper used by the - The volume of the data
printer - The speed at which the output
- Documentation is required
- Availability
18
- Cost of the method chosen as 48. (a) Explain two differences
compared with the benefits to be between serial and parallel
derived communication ports of a
- Suitability of the application computer
- Whether a printed version is - Serial ports have 9 pins, while
required parallel ports have holes for 9 or 25 pins
- Parallel cables transmit several
45. Define the following terms bits of data simultaneously, while serial
(a) Port cables transmit
A special kind of socket found One bit at a time
at the back of a computer - Serial cables are slower than
used to connect an external parallel cable
peripheral device such as a - Serial cables allow for 2 ways
printer, monitor, mouse, communication (i.e.
scanner, modem, flash disk, communication to and from
etc to the interface cards the computer and the device
inside the computer connected to it) while parallel
cables usually offer 1- way
(b) Data interface cable communication.
These are special cables that (b) Give two major advantages of
connect all the peripheral a USB interface cable over
devices to the motherboard other cables in the
and the CPU. They transmit computer
data signals and information to - It is light & convenient to carry
and from the devices - It provides faster transmission
of high – quality data
- Its serial nature enables it to
(c) Power cable connect devices a longer
Cable for power supply to distance away
devices - The USB port can be used to
connect a wide range of
46. State the function of the power peripheral devices due to its
supply unit found in the system unit common universal interface
(1 mk)
49. Outline three precautions one
- It supplies stable power to the should take when assembling a
motherboard and other internal devices of a computer
computer - Disconnect all diverts from the
- Converts the potentially power source before starting to work on
dangerous alternating current them
(AC) into a steady low- voltage - Never work alone because you
direct current (DC) usable by may need help in ease of energy
the computer. - Discharge ant static electricity
that might have built up on the
47. (a) Name any two peripheral hands by touching an earthed
devices which get their power supply metallic object and wearing an
through ports anti- static wrist member.
- Keyboard
- Mouse 50. State six factors which you would
consider when selecting
(b) State the type of port that computer hardware for an
would commonly be used to connect the organization
following devices - Cost of the system
(i) Mouse - PS/2, - Processor type and speed
Serial, or USB - Storage capacity of hard disk
(ii) Modem - Serial & RAM memory size
(iii) External CD drive - Parallel - Warranty (service contract)
- Upgradeability of the computer
19
- Compatibility of the system - Clones are locally assembled
- Portability (light to carry) computers
- User needs
- Popularity of the hardware Disadvantages
manufacturer - Their components are not
- Availability of spare parts optimized to work with each other
- Multimedia capability - They are not as reliable as
their brand names like IBM,
51. List down any four hardware Compaq, Hewlett Packard
components you can add or upgrade in (HP), Dell, Gateway etc.
a computer system
(4 mks)
- Processor (CPU) 54. (a) What is standard software?
- Ports e.g. USB ports/ SCSI These are programs
ports developed, packaged and then
- Hard disk made available for purchase
- DVD drives/ tape drives either directly from the
- RAM memory developer, though a vendor or
- Expansion slots a distributor
They may be used for a wide
52. (a) What is warranty with variety of purposes
reference to the purchase of computers
A warranty is an agreement between (b) Small and large scale
the buyer and the seller that spells organizers are turning to the use
out terms and conditions of after of in- house developed software
selling a product in case of failure or for the processing activities
malfunction. rather than use of standard
A warranty is usually the duration in software
which your computer is supposed to
work without any problem. (i) What is in- house developed
software?
(b) Why is it important to These are programs that are
carefully study a warranty before uniquely designed & written by
committing yourself by signing it? the user or a software house
In order to negotiate on sensitive under contract, to meet the
items like duration, after sales services etc. specific needs of a particular
user or organization.
(c) List down three issues to
understand about warrants They are usually customized
- Duration (scope of cover) (tailored) to perform a specific
- How comprehensive is the job or solve only specific
warranty- good warranty should cover all the processing tasks in one
parts of the organization
Computer.
- Liability agreement e.g. how (ii) Give two reasons that may be
long should the supplier take influencing these organizations for such
to repair a fault or replace the a decision
product, and if he/ she delays, (2m
who bears the cost. - The user gets well tested
- Does the warranty offer online program, which he/ she is able to use with
support? confidence
- Regularity of service or - The program provides all the
maintenance facilities required to solve a particular
problem
53. What are clones with reference to - The purchaser has direct
computers and what is their control over the package, as he/ she is
disadvantage? involved in its
20
Production (b) A firm intends to purchase
- The user is able to quickly new software. List three items of
implement the results obtained from the use documentation that should
of the package accompany the software
- They can easily be modified to - A license
meet specific user’s needs - Installation guide
without involving expert - User manual (guide)
programmers. - Reference manual
55. Differentiate between single- - Warranty
purpose programs and integrated - Upgrades
software - Service pack
- Single – purpose software is
developed for only one
purpose, while integrated
software is a suite of more
than one program and can be
used to carry out a variety of
tasks
21
OPERATING SYSTEMS - It keeps track (monitors) of the
1. The central processor and parts of the memory that are
peripheral devices of a in use, and those which are
computer system are free
coordinated by the operating (ii) Processor management:
system The processor can only
(a) Define the term ‘operating execute one program at any
system’ one time. Therefore, in a multi-
A set of computer programs tasking system access to the
that normally reside in the CPU must be carefully control
main memory and used to & monitored. The OS must
control the basic computer decide, which program will be
hardware resources & the allowed into the system, and
operation of the entire system for how long
(iii) Job scheduling- it schedules
The main program that & loads programs in order to
controls the execution of user
provide a continuous sequence
applications, and enables the
of processing. This is
user to access the hardware &
necessary when more than
software resources of the
one application program is
computer
occupying the main storage
(iv) Error reporting and
(b) List two resources/
interrupt handling- The OS
components that an operating
reports any errors that occur
system manages
during program execution.
- Processor
(v) Management of CPU time:
- Memory (RAM)
In a multi- taking system
- Secondary storage devices
where several user programs
- Input/ output devices
share the computer resources,
- Communication devices
the processing is done
- I/O & communication ports
according to the job priorities
- Files
allocated and in a continuous
(c) There are several types of
process until all the jobs in the
operating systems in use today.
queue within the memory are
State two examples of
executed. This ensures that
Operating systems which you are
the CPU does not remain idle
familiar
at any given time.
( 2 mks)
(vi) Manages the input and
- Disk Operating System (DOS)
output devices
- Windows
The OS controls the allocation
- MacOS
of I/O devices and tries to
- Unix
resolve any conflicts that arise.
- Linux
It also monitors the state of
each I/O device and signals
2. Name the two latest operating
any faults detected
systems from Microsoft
(vii) File management
corporation ( 2 mks)
OS is concerned with the
- Windows XP
logical organization of the files
- Windows Vista
in the computer & provides
ways for sorting, retrieving &
3. Explain any four functions of
sharing of the files
an operating system software
It also provides a means of
( 8 mks)
protecting the data files &
(i) Memory allocation &
programs against
loading of programs
unauthorized access and
- Loads application programs
corruption.
from an external storage into
(viii) It controls the selection &
the available locations in the
operation of the hardware
Main memory (RAM)
22
devices used for input, output through Graphical User
& storage Interface (GUI) or though
(ix) It interfaces the user to the typed commands
system’s hardware, i.e. it (a) Give one advantage of using GUI
provides a quick means of based operating system over a
communication between the command line interface
computer user and his
programs
(x) Logging & accounting ( 1 mk)
The OS keeps records (internal User friendliness
logs) on how the computer
resources (e.g. CPU time,
Easy to learn & use even by
those who do not have much
memory, peripherals) are
knowledge about them
being used
It also keeps a complete One does not need to master
record of all what happens any commands
during processing (usually in It is faster to work with than a
the form of a printed log) command line interface as it
only relies on clicking the
4. What is an interrupt? icons by use of a pointing
An interrupt is break from the device
normal sequential flow of (b) Some computer systems still
instructions processing in a use command line interfaces.
program State two advantages of
command line interface
5. Give three ways in which - They are more flexible than
operating system are menu- driven interfaces
classified ( 3 mks) - There is security of data as
The number of users they only those who know how to use the
handle commands will access
The number of tasks they it.
- They use cheap hardware &
execute concurrently
software facilities
Human computer interface - One has a better control over
the system resources
6. Giving an example in each
case, explain the following 8. What is a deadlock in
types of operating systems reference to operating
(a) Single – user / single systems?
tasking - It is a situation
A system that allows only one in an OS when a
user to run one user program particular task
at a time in an interactive, holds a needed
conversational mode. E.g. Ms- resource and
DOS, PC- DOS. refuses to
release it for use
(b) Multi- User/ Multi- tasking by other tasks
A multi- user computer system
can allow interactive facilities
to several at a time. A Multi-
tasking Computer system can 9. Explain briefly the following
allow more than one program concepts as used in the
which are in the memory to be windows environment:
processed at the same time. (a) Desktop
E.g. Microsoft Windows, Linux. Desktop is mostly an empty
screen that appears when
7. A computer user may interact windows starts and has some
with a computer either
23
standard icons that show that an operating system for use in
the computer is ready for use. a computer
( 3 mks)
26
user to know how much data
the disk can hold.
- It can also check for bad
sectors on the new disk.
27
WORD PROCESSING Grammar& spelling mistakes
can be checked & a text-
1. a) What is a word Processor? editing tool that provides
(1 alternative words with similar
mk) meanings.
A computer program that A word processor allows mail
enables a person to create, merging, which makes it
retrieve, edit, format, and print possible to produce similar
text based documents letters and sent them to
b) List two common examples several people.
of word processing
software widely used in the 3. a) What is a template?
market today. (1mk)
It is a document that acts as a
(2 mks) blue print or outline for other
-Microsoft word documents of the same type. It
-WordPerfect contains the standard text,
-Lotus WordPerfect graphics and formatting for
-WordStar use in all documents of this
-WordPad type.
2. Give three comparisons of the b) State two advantages of
traditional method of typing a using a template to create a document.
document on a (2m
Typewriter against using a word - It helps save time and makes
processor (6mks) creating of new documents easy
Correcting typing mistakes - It ensures that there is
using a word processor is consistency between the documents
easy; it is hard to correct being created.
mistakes on a typewriter.
Producing multiple copies of 4. Explain the difference between
the same page is possible overtypes and insert mode in word
using a word processor, but it processing
is not possible to produce
multiple copies on a (2mks)
typewriter. Type over deletes the current
Text formatting features are text at cursor position and inserts new text.
available on a word processor, Inserting pushes the old text
e.g. front size, font type, font away as new text is inserted at
colour, boldfacing, italicization, cursor position.
etc.
The documents created can be 5. Veronica tried to retrieve a
stored in the computer for document file following all the
future reference steps correctly. The filename did
Typing using a word processor not appear in file list box. State
is easier & more efficient three causes for this.
because most of the actions (3m
are automatic. For example; - The file may not have been
the word wrap feature saved
automatically takes the text - The file may have been
cursor to the beginning of the deleted
next line once it reaches the - The file may be located in a
end of the current line. different folder from the one she was trying
A new page is automatically to
inserted after reaching the end retrieve from (or may have
of the current page been moved).
Graphics can be added within - The file may have been
documents using a word destroyed by a computer virus.
processor
28
6. Mwikali selected a paragraph in
word processing. Explain what (6mks)
happened after pressing the Change: Accepts the
following keys on the keyboard: current selection in the suggestions box
(3mks) Ignore Once: Leaves the
i) CTRL + B -Changes the highlighted error unchanged (if
paragraph to bold/removes bold from paragraph the highlighted
ii) CTRL +A -the whole document word is a valid
is selected word) & finds
iii) CTRL+ U -the selected text is the next spelling
underlined/removes underline from the or grammar
selected text. error
Ignore all: retains all the
7. Precisely explain the role of the occurrences of
following editing features of a word the same word
processor; or phrase in the
document from
(3mks) another
i) Find and replace -To find language, e.g. a
words that you want replaced by others Kiswahili.
ii) Undo and redo- Undo Add: Adds the
reverses the previous/latest action, highlighted word
while redo in the
does the Suggestions box
undone action to the Custom
iii) Thesaurus -It gives dictionary.
suggestion of words or phrases
with similar meaning 10. Clearly explain the meaning of
(synony the following terms as used in
ms), and word processing:
sometimes
antonyms to the
selected word. (7mks)
iv) Autocorrect -It checks
for wrongly spelled words, and i) Editing a document - Making
automatically replaces changes to an already typed/existing
them document.
with the correct ii) Blocking text- Selecting a
ones as set by group of text in order to work with it as a
the user. whole, e.g. a word sentence or
8. Give the steps you would use to paragraph.
find and replace the occurrence iii) Printing – having your work
of a particular word in Microsoft copied on a piece of paper as output
Word. iv) Saving- Storing a
(4mks) file/document permanently in the computer’s
- Click on edit, select find (or secondary
replace) memory (e.g., hard disk) so as
- Type the word you want to to be used in the future.
replace with in the replace with box
- Click replaces or Replace all if v) Italicizing text- making the
you want to replace all the text saint forward
occurrences of that word in vi) Header- It is a standard text
your document at once. or information such as page numbers,
chapter
9. Name and explain the use of any titles, etc that appears above
three buttons found in a spell-check the top margin of every page
dialog box in a document or in a section
29
vii) Footer-It is a standard text or he/she has already started to
information that appears below the bottom type
margin of every page in a AutoCorrect automatically
document. replaces mistyped words with
11. a) What is document the correct ones as set by the
formatting? user.
(1mk) c) Drawing and inserting a
Applying various styles to table in a document
enhance the appearance of a document (2mks)
b) Give any five document Drawing – use the pen tool to
formatting features of a word draw the table
processor. Inserting table- use the Table-
Insert-table Command
- Bolding 14. Explain how a paragraph can be
- Font colouring moved from one page to another
- Text alignment using a word processor.
- Font type
- Setting tabs (4mks)
- Underlining - Select the paragraph
- Italicizing - Click Cut on the Edit menu/
- Font size. standard toolbar, (or Press CTL
+ ‘X’)
c) Differentiate between - Click to place the insertion
‘superscript’ and ‘Superscript is text point here you want to put the
formatted text
to be at the bottom of a - Click on Edit, then choose
line. Paste (or Press CTRL + ‘V’)
Superscript is text formatted 15. a) What is line spacing?
to be at the top of a line, (1mk)
Subscript is text formatted to The vertical distance between
be at the bottom of a line. two text lines in a document
b) Explain any three line
12. What are page margins? spacing specification used in Microsoft
Non-printing but visible text- Word.
limiting borders that mark the
distance that text starts on a (3mks)
page away from the edge of i) Single space –
the page accommodates the largest font in a line
ii) 1.5 line space- 1 ½
13. Differentiate between: time that of single line spacing
a) A Hard page break and a iii) Double – twice that of
Soft page break. (2mks) single line spacing
A hard page break is inserted iv) Exactly – a fixed line
on a page even before the end spacing that word does not adjust
of the page, e.g. by pressing v) At least – the minimum
CTRL+ ENTER or setting a line spacing that is needed to fit the largest
manual page break. font or graphic on the
For a Soft page break, the text line.
cursor moves or creates a new vi) Multiple- a line spacing
page automatically when at that is increased or decreased by a
the end of the current page percentage that you
during typing. specify .
(4mks)
b) Auto complete and 16. Give any four text alignment
AutoCorrect (2mks) features (4 mks)
AutoComplete helps a person - Left alignment
to type quickly by completing - centre alignment
automatically a word that - Right alignment
30
- Justified (2mks)
17. List any thee sources of graphics To check whether the page
that can be used in Microsoft word. layout is OK
(3mks) To confirm that no details are
- From Microsoft clip gallery outside the printable area
- From Scanner to go through the document
- By drawing using the Drawing before printing
tools available in Ms-World To save on printing papers &
- Import from another file printer toner because; errors
18. a) Explain the concept of on the
graphics that can be used in Microsoft printouts that may require
word. (3mks) reprinting will be minimal.
Getting ready-made objects
and text from other applications into the 22. a) Distinguish between
word Portrait and Landscape orientations.
processor.
b) What is the difference (2mks)
between object linking and embedding? In Portrait, text & graphics are
(2mks) printed with the longest side of
In linking, the object imported the page
can only be edited in the original vertically upright, while in
application from which it was Landscape, text & graphics are
created. printed with the longest side of
In embedding, the object the page placed horizontally.
imported becomes part of the current b) State two reasons why it is
application necessary to specify the correct paper
and can be edited there. size
19. Give a reason why it may be before printing a
necessary to merge cells in a table. document?
(1mk) (2mks)
To create larger cells in a table Select a paper size depending
without increasing the height on the document page size
or width of the existing cells. needed
To comply with printer
capabilities
20. a) Define mail merging. 23. Outline any three main features
(2mks) that make word processors popular
The process of generating programs.
personalized letters or (3m
documents by combining Saving of documents for future
a standard document, but reference
addressed to different Printing of multiple documents
recipients. after editing
b) Give two advantages of mail formatting of documents into
merge over copy and pasting several times required form
to Mailing features such as mail
mass mail a document. merging of standard document
with another saved file.
(2mks)
combining of letters saves
time when printing
It allows producing of many
documents at once
The mailing list can be re-used
on another document
21. a) Give two advantages of
previewing a document before printing.
31
SPREADSHEETS recalculation on formulae. For
1. What is electronic spreadsheet a manual worksheet, changing
software? (2mks) one value means rubbing the
A computer program that looks result & writing the correct one
like the manual ledger sheet with again.
rows & columns for entering data 4. Explain five application areas
that can be manipulated where spreadsheet software can be
mathematically using formulae. used.
2. Give any two application (5m
programs classified as spreadsheets. i) Accounting: - spreadsheet
(2mks) software can be used by accountants to
Microsoft Excel record
Lotus 123 their daily transactions & also
-Corel Quattro Pro keep financial records, e.g. they can
-super calculators record
-Multiplan sales & purchases, produce
-VP-Planner invoices, compile financial
-VisiCalc statements, calculate profits,
3. Differentiate between the prepare budgets, etc.
traditional analysis ledger sheet and an ii) Data management: - a
electronic spreadsheet enables data & information to
spreadsheet. be
(5mks) arranged neatly in tables,
produced easily and also kept
An electronic spreadsheet; up-to-date, e.g. one can edit,
- Has a large worksheet for data save , sort, filter, use forms to
entry & manipulation as enter and view records, and
compared to manual worksheet data.
worksheet iii) Scientific applications: -
- Has inbuilt formulae (called spreadsheets can be used by scientists &
functions) that are non- researchers to compile and
existent in manual worksheets analyze their results.
- Uses the power of the iv) Statistical analysis: -
computer to quickly carry out spreadsheets provide a set of statistical
operations Functions/tools that can be
- Has better document used to develop complex statistical or
formatting & editing qualities engineering analyses, e.g.,
than a manual worksheet teachers can compile their students’
- Utilizes the large storage marks and
space available on computer produce results.
storage devices to save & v) Forecasting: - using the
retrieve documents. ‘what if’ analysis technique, spreadsheets
- Can easily be modified, while can be
manual spreadsheets involve a used to find out the effect of
lot of manual calculations & changing certain values in a
are very difficult to amend worksheet on the other cells.
- The user can very quickly & This helps in financial
efficiently perform complicated forecasting, budgeting, etc.
computations using the 5. State five features of
information stored in an spreadsheets that are useful in financial
electronic spreadsheet. modeling. (5mks)
- Enables the user to produce Have inbuilt functions &
neat work formulae which can be used to
- Offers graphical representation perform most mathematical
of data leading to statistical, trigonometric or
comprehensive decisions. financial calculations
- It is accurate in its calculations Allows automatic recalculation
& allows automatic on formulae
32
#have ability to perform ‘what This is whereby an electronic
if’ analysis, which can be used spreadsheet will adjust the
to find out the effect of result of a formula
changing certain values in a automatically when the values
worksheet on the other cells are changed, so that they
Have the ability to sort & filter correspond with the different
data input.
Have a data validation facility,
which ensures that the correct ii) ‘What if’ analysis
data is entered into the ‘What if’ analysis is a feature
spreadsheet. in spreadsheets that is used to find out the
Have a chart facility that can effect of changing certain
be used to draw Line graphs, values in a worksheet on the other
Bar charts, Pie charts, cells.
Histograms, etc. It involves changing the values
Some spreadsheets have a of one of the arguments in a formula in
SOLVER facility that is used to order to see the difference the
uncover the best uses of change would make on the
scarce resources so that result of the calculation.
desired goals such as profit iii) Sheet tabs
can be maximized, or These are names of the
undesired goals such as cost worksheets that appear at the
can be minimized. bottom of the worksheet
They enabled printing of entire window. They enable the user
worksheets, portions of a to move from one worksheet
worksheet or several to another.
worksheets within the shortest iv) Worksheet
time possible A page (single sheet) stored in
Have the ability to summarize a workbook
data using Consolidation and 8. Name four data types used in
Pivot tables. spreadsheets
(2mks)
6. Define the following terms as Labels
used in a worksheet: Values
(3mks) Functions
i) Columns Formulae
These are the fields that make 9. An Agrovet Company wants to
up the worksheet of a spreadsheet, analyze its employee’s personal
and are details using Microsoft Excel.
identified by letters. The company has five employees:
They run vertically from top Mary Anne, Francis Kihara, Lena
downwards Achieng, Hellen Wanjiku, and
ii) Rows mwangi Peter. Their ages are 20,
These are the records that 45, 90, 45 and 34 years
form a worksheet, and are respectively. Mary department;
identifies by numbers. Mwangi Peter in finance
They run horizontally from left department and Hellen Wanjiku
to right. in Computer department
Mary Anne and Hellen Wanjiku
iii) Cell are single whereas Francis
A box formed when a row & a Kihara, Lena Achieng and Mwangi
column intersect in a Peter are married.
worksheet where the data is Construct a worksheet showing
entered the above information. Use
7. Explain the following concepts as appropriate column headlings
used in spreadsheets: (4mks)
i) Automatic recalculation
33
12. Differentiate between relative
and absolute cell reference as used in
(6mks) Ms-excel.
A B C D (2m
1 AGROVET COMPANY
2 NAMES AGE DEPARTMENT STATUS
3 Mary Anne 23 Research Single
4 Francis 45 Personnel Married
Kihara
5 Lena Achieng 90 Research Married
6 Hellen 45 Computer Single
Wanjiku
7 Mwangi Peter 34 Computer Married
8
Relative cell referencing
means the referencing means
10. a) What is a cell reference? that the references of cell used
(1mk) in a formula are relative to the
A cell reference is the identity of a cell location of the cell where the
in a worksheet. A cell is identified by formula is placed, e.g. E3= C3*
use of the column letter and the row D3. this tells Excel to multiply
number headings. the contents of C3 by D3
which have been defined in
b) For each of the following, relation to E3.
state the type of cell reference.(4 mks) Absolute cell addressing
i) A5 Relative reference means reference is made to
ii) $F$5 Absolute row reference one or more cells in a way
(only the row reference is absolute) which doesn’t vary(change)
iii) H$21 Absolute column according to circumstances.
reference (only the column reference is 13. The fist column in the table below
absolute) contains formulas as entered into
iv) $D7 Absolute column cell D46. In the second column,
reference (only the column reference is enter the formulas as they would
absolute) appear when copied to cell B56.
11. a) A formula to add the
contents of B5 and C4 was (4mks)
entered in Cell F5.
what will it become when it Formula in D46 Formu
is copied to Cell H8? =D1 =B11
(1 mk) =F5*C10 =D15
= D8 +E7 =H$46 + J40 =F$4
=$E12 – D$14*$F$2 =$E2
b) Explain the reason for your
answer. (2mks)
When we move to cell H8 from
F5, the column changes by 2 while the 14. A worksheet contains the data
row changes by 3. The formula shown below:
= B5 +C4 is also updated
likewise. This is because of Cell Al A2 A3 C1
relative referencing.
Entry 5 7 10 10
c) What is the equivalent
R1C1 reference for G20?
(1mk)
=R20C7 State the value displayed in G1
(2mks)
Solution:
34
= SUMIF (Cells to be A chart wizard is a step by
tested/evaluated, expression step procedure of designing spreadsheet
that defines which cells will be charts.
added,
actual cells to be added).
= 7+10 = 17 b) State the use of:
(2mks)
i) A pie chart- A pie
15. Study the worksheet below and chart is used to show distribution. It shows
answer the questions that follow: the
Proportional size of
A B C items that make up a data
1 series to the sum of
2 SKYWAYS AGENCIES the items.
3 PRODUCT REGION 1 REGION 2 ii) A line graph- A line
graph is used to show trend
4 Rexona 3400 3,700
5 Lifebuoy 2500 2600
6 Omo 6000 6100
7 Ushindi 1200 1500
8 Carmel 7000 6900
9 Total
10 Maximum
11 Average
35
DATABASES tables. Each table consists of
1. a) Define a database. rows and columns.
(2mks) iii. Hierarchical database: The
A collection of related files data items are organized in
organized to provide hierarchical (tree-like)
consistent and controlled structure. The records are
access stored in multiple levels,
to the data items. where units further down the
A collection of related data system are subordinate to the
elements stored together ones above
under one logical structure so iv. Network database:It allows
as to provide a consistent & a data element (or record) to
controlled access to the items. be related to more than one
A collection of information other data element/record.
related to a particular subject Links are used to express the
or purpose relationship between different
A common data pool, data items forming a network
maintained to support the of items.
various activities taking place
within the organization. b) Define the term sorting
b) List four examples of (2mks)
database programs in the market Sorting involves arranging of
today.(2mks) records in a logical order in the
Microsoft Access database. It can either be in
Oracle Ascending or descending
FoxPro order.
Dbase
2. State the components of a 4. a) What are database
Database hierarchy in ascending order. management system software?
(2mks) (2mks)
Character A collection of programs used
(alphabets, numbers to store & retrieve data, and
and special characters) manage files or records
containing related information
Fields (Facts, from a database.
attributes, set of related
characters)
b) Give the two classes of database
Records software. (2mks)
(Collection of fields) PC-based database software:-
Are usually designed for
File individual users or small
(Collection of records) businesses, e.g. Ms-Access,
Dbase, Paradox, FoxPro
Database (Logical Corporate database software:-
collection of files) Are designed for big
corporations that handle large
3 a) Explain three types of amounts of data, e.g. Oracle,
database models. (6 SQL Server, Sybase, etc
marks) 5. State the use of the following
objects in databases.
i. Flat file database: It holds (3mks)
only one set of data i) Tables To store
ii. Relational database: related records
Related data items are ii) Forms They act as
stored or organized together in screens for entering, changing &
structures called relations or viewing data
in tables
36
iii) Query Searching for
specific records/Data manipulation/Selecting (3 mks)
6. a) Define the term One-to-One
normalization as used in database One-to-many
design. (2mks) Many –to-Many
Normalization is the process of 10. Explain how ‘parents’ and ‘child’
trying to eliminate storage of duplicate tables are related in relational
values in a database. database. (4mks)
b) State three objectives of A parent table is the one that
normalization. (3mks) has the primary key of the
To relate different tables in a relationship, while a child table
database is the one that has the foreign
To ease the retrieval of data key of the relationship.
from a relational database Parent and child tables are
Breaking up multi theme related through a common
tables into smaller workable field that links the two tables.
tables Records in a child table relate
7. Give three advantages of to one record in a parent table.
separating data from the 11. a) Describe four major
applications that use the data in shortcomings of the conventional
database design. (paper )file
(3mks) structures that are being
You can retrieve recorded data addressed by the database
easily approach. (4mks)
You can do calculations in an Unnecessary duplication of
easy way data
Creating of queries, forms, Boredom & time wastage
reports will be easy by using especially when searching for
data separation. a particular item
In order to carry out any file
8. Differentiate between: processing task(s), all the
i) Primary key and related files have to be
relationship processed
(2mks) Misleading reports due to poor
Primary key is a field or a set data entry and organization
of fields that can be used to Difficulty in sorting, retrieving
uniquely identify each & updating records
individual record in a table. It Security: no protection of files
is used to relate a table to the against unauthorized access
foreign keys in other tables. and corruption
Sharing of files is difficult
ii) Tabular and columnar form Some information resulting
layout. (2mks) from several files may not be
Tabular – the records are available.
displayed from left to right across the page,
and b) List any two methods used
the labels appear at the top of to secure data in a database
each column, with each row (2mks)
representing a new record. Password protection
Columnar – the fields for each User and group permissions
record are displayed down a User-level security
column, i.e. each value is Data encryption
displayed on a separate line
with field labels to the left.
9. State three types of relationships
that can be used to link tables in
databases.
37
12. The following car details are to
be entered in a database: Make,
Date-of-manufacture, colour, and
cost.
a) Prepare a suitable database
structure showing field names
and their field data types
(5 mks)
Field name
Data type
ID (Primary key)
Auto Number
Make
text
Date of manufacture
Date/time
Colour
Text
Cost
Currency
b) Explain how you index the data
such that cars of the same make
and colour are together.
(2mks)
Create a query to show same make
and colour
c) Write a statement that can be
used to select cars of colour green.
(2mks)
Create a query. In the colour field,
and in the Criteria row, write “green”
d) Give an instruction that would:
i) Select cars whose cost is
between 500,000/= and 1,000,000/=
(3mks)
Create a query. In the cost
field, and in the criteria row, write “.>500000
and <1000000”
ii) Determine the average cost of
all cars. (3mks)
Create a query. Choose
average of costs “Avg” option in the total
section.
38
DESKTOP PUBLISHING (DTP)
b) Margins and column
1 a) Define the term desktop guides.
publishing. (2mks) (2mks)
The process of producing Margins mark text areas on
publications such as the page along the edges, while column
newspapers, books, guides
newsletters, cards, etc by divide the page into several
marking areas for text and fields. They are used to define
graphical objects using the printable area.
specialized programs installed c) Change case and drop cap.
on a desktop computer.
b) Give any three examples of (2mks)
desktop publishing Change case is changing text
software available in the from upper to lower case,
market today. sentence, title, or toggle case,
while drop cap refer to making
(3mks) the first character in a line
- Adobe PageMaker bigger and drops down to
- Adobe Photoshop occupy the space in the lines
- Adobe illustrator that follow.
- Ventura d) Kerning and tracking.
- Microsoft Publisher (2mks)
- CorelDraw Tracking refers to changing
- Harvard graphics the visual denseness or
2. Identify four different types of openness of characters in
publications that can be produced aline, while Kerning is fixing
using desktop publishing particular pairs of letters that
software. are too close or too far apart
(4mks) from each other.
- Cards, e.g. for special e) Fill and stroke
occasions such as weddings, A stroke refers to a line style,
graduations, congratulations, while a fill refers to applying
etc background pattern such as
- Newsletters shading to a graphical object.
- Newspapers 4 a) What is layering as used in
- Calendars DTP (1 mk)
- Advertisements/Posters Layering is the placing of text
- Magazines or objects on top of each other.
- Certificates b) Why is layering very useful
- Notices in a desktop publisher? (1mk)
- Catalogues
- Pamphlets
- Books It may be used to create
- Brochures watermarks.
3. Differentiate between the following: 5. What commands are used in
place of portrait and landscape
a) Pasteboard and printable page. page orientation in PageMaker?
(2mks)
Pasteboard is where text & (1mk)
objects are placed for editing i. Portrait-tall;
before transferring them to the ii. Landscape-wide
printable area; Printable page
refers to the area enclosed in 6. Give three methods that are used
margin guides. to transform an object. (3mks)
i. Rotating
ii. Skewing
(2mks) iii. Reflecting
39
7. a) what is text wrap?
(1mk)
Text wrap is controlling the
flow of text over or around a graphical
object.
b) Give three ways you can
wrap text on an object.
(3mks)
Make the text jump the object
to the next page or column
Allow to text to jump over the
object and continue on the
same page
Create a rectangular text wrap
around all the sides of the
object.
8. Define the term object grouping
(2mks)
This refers to joining objects in
order to manipulate them as
one object.
40
INTERNET & E-MAIL 4. a) Explain the following terms
as used in internet:
1. The first computer Network was i) Website
set up by ARPA in the United ( ½ mk)
States of America. What is the A collection /group of related
full meaning of the acronym Web pages belonging to an organization or
ARPA (1mk) individual
Advanced Research Projects ii) Browse/Surf the web.
Agency ( ½ mk)
Moving around and between
2. Your manager wishes to be the Web pages
connected to the Internet. He 5. a) What is meant by the term
already has a powerful personal e-learning? (1mk)
Computer (PC), a printer, and This is learning through
access to a Telephone line. interaction with special programs on the
However, he understands that he computer.
will need a Modem.
State why a modem is required to b) A school intends to set-up
connect him to the internet. an e-learning system. List
(2mks) three problems that are
A modem enables one to likely to be encountered.
connect to the Internet and
access information by (3mks)
transmitting data from one - Lack of capital
computer to another across - Lack of skilled manpower
telephone lines. (required technology to run &
support the e-learning system)
3. The Internet connects millions of - Spread of computer viruses
computers and - Availability of pornographic
telecommunication devices that material & literature to the
have different hardware and students from the internet.
software configurations. For
these incompatible devices to be
able to communicate, a 6. a) Identify the parts of the
protocols? (1mk) following e-mail address labelled A, B, C
A protocol is a set of rules that and
govern how tow computers D
can send and receive data on
a network (4mks)
Special communication rule lat @africaonline . co.ke
that government sending and
receiving of messages by
computers on a network A B C D
b) Name the two most common
protocols for the Internet, and A Name of the individual
state their functions. or organization
B Name of the host
(3mks) computer in the
Transmission control network on which the e-
Protocol (TCP); - It governs mail account is hosted
how data is transferred from C Identifies the type of
one place to another the organization or
Internet Protocol (IP); - It is institution offering a
used to provide routing from particular service, i.e.
one network to another (i.e. it commercial
enable data to be sent& organization
received by the different D Name of the country
computers on a network) where the site is located, i.e. Kenya.
41
Excite.com
b) Mention two examples of e- 9. Briefly describe four factors
mail software. (2mks) contributing to Internet access
- Microsoft Outlook and growth in Kenya.
- Outlook express
- Microsoft exchange (6mks)
- Eudora i) Cost: - for effective use of
7. Discuss four advantages and two internet, a powerful & costly computer is
disadvantages that electronic needed. The cost of installing
mails have over regular mails. internet services, telephone
bills is also high hence
(6mks) discouraging internet growth.
Advantages ii) Illiteracy: - Many people are
i) Cheap & economical: -It costs computer illiterate and therefore have no
almost nothing to transmit and e-mail idea
message over the network. of computer internet services.
There is no need for stamps, iii) Inadequate infrastructure: -
envelopes, etc Lack of infrastructures such as telephone
ii) Secure;-Access to a user’s services in rural areas also
mailbox can be restricted by use of a hinders growth of internet
password access. Lack of electricity
iii) Faster: - The delivery of an e- discourages people from
mail message normally takes seconds or installing internets in their
minutes depending on the offices.
distance to the receiver. iv) lack of awareness of the
iv) Efficient:- A message prepared existence of such services by the public.
only once can be sent to several
people
v) Convenient: - with e-mail, one
can send his/her messages when it is
convenient for him/her & the
recipients can respond at their
convenient times.
vi) Cheaper in preparing the
message: - Most e-mail users
accept less well-formatted
messages and slight typing
errors are overlooked, unlike in
business letters which are
expected to be error-free and
formatted according to certain
standards.
Disadvantages
- the initial installation cost is
higher
- Messages may be lost before
they can be read due to virus
infection
- Messages may not be kept for
future reference due to the
high cost of storage
(2mks)
8. a) What is a search engine?
(2mks)
Google .com
Yahoo. Com
Hotmail.com
42
DATA SECURITY & CONTROL without permission with
1. Differentiate between data the aim of gaining or
security and data integrity. misinforming the
(2mks) authorized users.
Data security – the protection Alteration changes the
of data & information from accidental information inferences
or intentional from the data.
disclosure to unauthorized vi) Fraud- use of
person or from unauthorized computers to conceal information or cheat
modification. other
Data integrity-the accuracy & people with the
completeness of data entered in a intention of gaining money or
computer. information
Define integrity – the accuracy vii) Trespass-illegal
& completeness of data entered in a physical entry to restricted places where
computer. computer
hardware, software &
backed up data is kept.
2. a) Define the term Computer 3. Outline four ways of preventing
crime (2mks) piracy with regard to data and
The use of computer hardware information.
or software for illegal (4m
activities, e.g., stealing, - Enact & enforce copyright laws
forgery defrauding, etc. and other regulatory
A deliberate theft or criminal frameworks that protect the
destruction of computerized owners of data & information
data against piracy
Committing of illegal acts - make software cheap enough
using a computer or against a to increase affordability
computer system. - -use licenses and certificates
b) Explain the meaning of of authenticity to identify
each of the following with originals
reference to computer - Set installation passwords that
crimes. prevent illegal installation of
software.
(7mks) 4. a) What is a Computer virus?
i) Cracking – use of (2mks)
guesswork over and over again trying to look This is a program intentionally
for written to destroy data,
weak access points in information or the working of
software in order to get other programs inn a computer
access to data & system
information b) i) State two ways through which
ii) Hacking – Breaking of computer viruses may be controlled.
security codes and passwords to gain (2 mks)
unauthorized access to Running antivirus software
a computer system. programs regularly
iii) Tapping - Listening to Controlling the movement of
a transmission line to gain a copy of the storage media (e.g. floppy
message being disks, flash disk, etc) in and
transmitted. out of the computer room
iv) Piracy –Making illegal Disabling the floppy disk drives
copies of copyrighted software, data, or ii) Explain how each of the
information (i.e. two ways listen in b (i)
copying of software illegally). above assist in controlling
v) Data alteration – Illegal computer viruses.
changing of stored data & information (2mks)
43
Antivirus software helps to - Should not be kept longer than
detect and remove the viruses necessary
from the computer controlling - Should be accurate and up-to-
the movement of floppy disks date
ensures that infected disks are - Should be collected, used &
not inserted into computers. kept for specified lawful
purposes (e.g., data should not
5. Computer systems need be used for unlawful gain)
maximum security to prevent an - The owner of the data has a
unauthorized access. State six right to know what data is held
precautions that you would by the person or organization
expect an organization to take to having it.
prevent illegal access to its - Data should not be transferred
computer-based systems. to other countries without the
(6mks) owner’s permission
Lock the doors, (i.e. keep the - Do not collects irrelevant and
computers in a strong room, overly too much information
which should remain firmly for a purpose.
locked when nobody is using 7. An individual has a right to
it). demand guarantee to privacy of
Avoid welcoming strangers personal information stored on a
into the computer room computer. Give three such types
Use of personal identification of information.
cards
Use of fingerprint identification (3 mks)
Install security alarms at - Name
strategic access points so as to - Date of birth
alert the security personnel in - ID. Number
case of a break in. - Residence
Use of special voice recorders - Address
that would be able to analyse - Phone number
the voice of a trespasser &
check against the database
containing the voice patterns
of valid users
Enforce data & information
access control policies on all
employees to control access to
data
Use file passwords to prevent
any person from getting
access to the electronic files
Enforce network security
measures, e.g. use of firewalls
Encrypt the data & information
during transmission
Perform frequent audit trails to
identify threats to data &
information.
44
DATA REPRESENTATION IN A COMPUTER 5. Distinguish between Binary and
Octal number systems, and give
1. With the aid of a diagram, explain an example of each.
the difference between a digital
signal and an analogue signal. (2mks)
Binary (base 2) system has just two
(2mks) states usually called “ON” and “OFF” or “0”
An analogue signal is continuous in and “1”, Octal (base 8) system has
nature, while a digital signal is in discrete eight different characters, I.e, 01234567.
form.
6. Perform the following computer
Analogue arithmetic. In each case, show
signal- sine wave how you arrive at your answer.
Digital
signal – rectangular shaped
(4mks)
i) bit - The smallest binary unit,
‘0’ or ‘1’
ii) Byte - A group/collection of 8
bits used to represent a character.
iii) Nibble - a group of four binary
digits usually representing a numeric
value.
iv) word - The total number of
bits that a single register of a particular
machine can hold
45
a) Convert the following Decimal =111111
numbers to their Binary equivalent. 2
i) 4510 c) Use binary addition to solve the
(2mks) following: 410 +310 (2mks)
4510 = 4
1011012 10 =
1002
ii) 4.75 Step 2: Add binary notations
(1mk) 1002
112 +
2 4 Rem 1112 1112
2 2 0 3 Rem
2 1 0 2 1 1
1 1 1 1
310 = 112
=0.112
0.75 x 2 = 1.50 1 d) Convert 101000000011111112 to
0.50 x 2 = 1.00 1 its Hexadecimal equivalent.
= 1002 (2mks)
= 100.112
20 23222120 23222120 232+21
1 0100 0000 0111
b) Convert 778 to Binary.
(2mks)
Step 1: Convert the octal = [1] + [4] + [0] + [4+2+1]
number given to decimal +[8+4+2+1]
(7x81) + (7x80) =[1] +[4] +[0] +[7] +[15]
56 + 7 = 6310 = 1407F16
46
82 81 80 2 1 1
1 1
7 6 7
=1112
2 1 0
1 1
= [2x161] + [ 0x160] [2x
34 (1/16)]
10 =1000102 (2mks) =32. [0.125]
= 32.12310
f) 7AB16 to decimal
b) 7.12510 to binary (2mks)
(2mks) 162 161 160
2 7 Rem 7 A B
2 3 1
47
= [7x162] + [10x 161 ] + b) Use Two’s compliment to
[11x160] subtract 101 from 1000: (2mks)
=1792 + 160 +11 = 196310 Step 1: change the values to 8 binary digits.
000010002 - 000001012
g) 0.111011.0102 to Octal Step 2: Add the binary equivalent of
(2mks) the first value to the Two’s complement of
the second value
22 21 20 21 20 00001000
(1)00000011
=1000000112
= {4 + 2+ 1} {2+1} {2 +1} (2mks)
{2}
=73.28 12. Convert 7AE16 to a decimal
number.
(2mks)
10. Convert 57.410 to its Octal Step 1
equivalent (2mks) 162+ 161 160
8 57 Rem 7 A E
8 7 1
=[7x162] + [12x161] + [1x160]
8 7 1 = 3840 + 192 +1 = 403310
2 7 7
Step 2
2 4033 Rem
0. 2 2016 1
4x8=
2 1008 0
3.2 3
0. 2 504 0
2x8= 2 252 0
1.6 1 2 126 0
= 0.318 2 63 0
2 31 1
=718 71.318
2 15 1
2 7 1
11. a) Perform the following 2 3 1
Binary arithmetic: 2 1 1
i) 11100111 + 00101110 1 1
(1mk)
403310 = 1111110000012
11100111 14. Write the following
00101110 + abbreviations in full:
(1) 00010101 (4mks)
=1000101012
(1 mk) i) BIT -Binary digit
ii) BCD -Binary Coded
ii) 101012 – 110+2 Decimal
iii) ASCII -American
(1mk) Standard Code for information Interchange
101012 iv) EBCDIC -Extended
1102 Binary Coded decimal Interchange Code
11112
48
DATA PROCESSING 3. Outline the 5 stages of data
collection.
1. With an aid of a diagram, explain (3mks)
the stages of the data processing cycle. Data creation
Data transmission
Data preparation
(6mks) Media conversion (i.e,
conversion of data from one
medium to another
Data Collection
Input validation
Sorting
49
Data integrity refers to the CPU bound jobs require more of the
dependability, timeliness, CPU time to process these jobs. Most
availability, relevance, of the work the I/O devices perform is
accuracy & completeness of on the Input; and Output; hence, they
data/information require very little CPU time.
b) State three ways of
minimizing threats to data integrity. 8. Most companies are now shifting from
(3mks) the use of geographically distributed
Backing up the data on personal computers. This method of
external storage media data processing is known as
Enforcing security measures to Distributed Data Processing
control access to data (DDP)
Using error detection &
correction software when Required:
transmitting data i) Name any threes computing
Designing user interfaces that resources that can be distributed.
minimize chances of invalid (3mks)
data being entered. -CPU (Processors) time
-Files
6. a) briefly explain real-time -Application software
processing. (2mks) -Data/information/messages
Airline reservation systems -Computer processing power
Theatre (cinema) booking -Memory (computer storage)
Hotel reservations -Input/Output devices, e.g. printers
Banking systems -communication
Police enquiry systems devices/communication ports
Chemical processing plants
Hospitals to monitor the ii) Name four examples of industries
progress of a patient and business organizations that
Missile control systems extensively use distributed
processing systems.
c) Give three advantages and two (4mks)
disadvantages of a real-time system.
(5mks) Banks
Advantages Computerized retails stores, e.g.
Provides up-to-date information supermarkets
The information is readily Learning institutions with many
available for instant decision- departmental offices
making Bureaus or communication cyber
Provides better services to cafes
users/customers. Airline reservation systems
Fast &reliable
Reduces circulation of hardcopies. iii) List down two benefits and three
Disadvantages risks that might be associated
Require complex Os & are very with the distributed data
expensive processing system.
Not easy to develop (5mks)
Real time systems usually use 2 or Benefits
more processors to share the The load on the host computer is
workloads, which is expensive. greatly reduced
Require large communication The use of low cost minicomputers
equipment. minimizes the cost in data processing
Delays in data processing are reduced
7. Differentiate between CPU bound Provides better services to the
jobs and I/O bound jobs. customers
There is less risk in case of system
(2mks) breakdown
50
The design & implementation of the Enhances data integrity (i.e.
system is less complex due to accuracy and completeness)
decentralization
The level of expertise required is less. 11. Distinguish between logical and
Risks physical computer files.
Data duplication is very
common
Programming problems occur (2mks)
with microcomputers & A logical file is viewed
minicomputers in terms of what data
Security threats, i.e. the data items it contains and
& information sent one the what processing
network from one place to operations may be
another can be tapped, or performed on the data
listened to by unauthorized A physical file is viewed
parties in terms of how the
More training is needed for the data items found in a
users involved file are arranged on the
It is expensive due to the extra storage media and how
cost of communication they can be processed.
equipment.
51
from the computer’s fixed
storage or main file for
security purposes e.g. a copy
of all the students admitted in
a school fees, report on
absentees
iii) Reference file - Used for
reference purposes. It
contains records that are fairly
permanent or semi-
permanent, e.g. Deductions in
caution money, wage rates,
tax deductions, employees
address, price lists etc.
iv) Sort file – used to sort/rank
data according to a given
order, e.g. ranking position in
a class of students.
14. a) What is file organization?
It is the way records are
arranged (laid out) within a
particular file or any secondary
storage device in a computer
b) Differentiate between the
following file organization methods:
(4mks)
i) Sequential and serial
In sequential file
organization, records are stored in a sorted
order using a
key field, while in serial; the
records are stored in the order
they come into the file, and
are not sorted in any way.
52
PROGRAMMING languages
Section A
1. Define the following terms: (3mks)
(3mks) Easier to learn, understand
i) Computer Program and use
A computer program is a set of Easily portable, i.e. they can
instructions that directs a computer on how be transferred between
to process a particular task. computers of different families
ii) Programming and run with little or no
Programming is the process of modification
designing a set of instructions The programs are short & take
which can be used to perform shorter time to be translated
a particular task or solve a More flexible, hence they
specific problem. enhance the creativity of the
iii) Programming language programmer and increase
A programming language is a his/her productivity in the
language (set of instructions) used in workplace
writing of computer programs. Easier to debug (correct
The language must be errors)& maintain
understood by the computer Easy to modify
for it to execute. They are user-friendly &
2. Explain the meaning of the problem –oriented, hence can
following as used in computer be used to solve problems
programming. (2mks) arising from the real world.
i) Syntax -these are rules
that govern the arrangement of commands 4 a) Examine two features of
in a fourth generation languages (4GLS)
particular language (2mks)
ii) Semantic - the meaning Have programming tools such
attached to every command in a particular as command buttons, forms,
language. textboxes, etc
3. a) What are low-level Use of mouse pointer to drag
languages? Give their features. an object on a form
(4mks) Use application generators to
These are the basic generate program codes
programming languages, Can enquire & access data
which can easily be stored in database systems
understood by the computer
directly, or which require little b) List three examples of
effort to be translated into fourth generation programming
computer understandable languages. (3mks)
form. Visual Basic
Delphi Pascal
Features: Cobol
They are machine hardware- Access Basic
oriented
They are not portable, i.e. , a
program written for one 5. Describe 5 factors to be
computer cannot be installed considered while choosing a
and used on another computer programming language. (5mks)
of a different family i) The availability of the relevant
They use Mnemonic codes translator
They frequently used symbolic ii) Whether the programmer is
addresses. familiar with the language
iii) Ease of learning and use
b) Give three advantages of iv) Purpose of the program, i.e.
high-level languages as opposed to low- application areas such as education,
level business,
53
scientific, etc. i) FORTRAN - formula
v) Execution time: High –level Translator
languages are easy to read, ii) COBOL- Common
understand & develop; hence, business oriented language
they require less development iii) OOP - Object
time. Machine code & Oriented Programming
Assembly languages are
relatively difficult to read, 8 a) Define a Language
understand and develop; translator
hence, they are time- (1mk)
consuming. This is a language processor
such as an assembler,
vii) Popularity: - the language interpreter, or compiler that
selected should be suitable converts the source program
and /or successful in the into object code.
market with respect to the
problems to be solved. b) Give two advantages of
viii) Documentation: - It should compiling a program rather than
have accompanying interpreting
documentation (descriptions it.
on how to use the language or
maintain the programs written (2mks)
in the language - Interpreters translate the
ix) Availability of skilled source program one
programmers: - The language statement/line at a time,
selected should have a pool of Compilers translate the entire
readily available programmers source code at once before
to ease the programming execution.
activity, and reduce - Interpreters translate the
development time. program each time it runs,
hence slower than compiling.
6. Differentiate between the Complied programs can be
following as used in programming: saved on a storage media. It
a) A source program is a does not require any further
program that is not yet translation any time the
translated; program is run, hence
Object code is a program that executes faster than
is in machine readable form interpreted programs.
obtained from a source - Interpreter translation takes
program by use of a translator less memory, while compiled
programs require more
b) Flowchart and pseudo memory as the object code
code. (2mks) files are larger.
A flowchart is a graphical
representation of step-by-step 9. Name the stages of a program
processing logic of a program, development in their logical sequence.
while pseudo code is a set of (31/2)
structured English like Problem recognition
statements that describe the Problem definition
processing steps to be Program design
followed to solve a given Program coding
problem. Program testing and
debugging
7 What do the following Program implementation and
abbreviations stand for: maintenance
(2mks) Program documentation
54
10. (a) Give two reasons why it is algorithms which span
necessary to have a program design. over several pages.
(2mks)
It identifies the exact order in 12. Explain the following types of
which the processing tasks will computer program errors:
be carried out so as to solve a) Syntax error
the problem
It provides for easy (2mks)
maintenance & modification These are programming
errors/mistakes that
b) State two requirements during occur due to
computer program testing. (2mks) incorrect/improper use
Compilation to check the of the grammatical
whole program if there are any errors rules of a particular
Debugging the program language
11. a) State any four E.g., Punctuation
rules/guidelines that should be mistakes, (i.e. omitting
followed when drawing a comma or a
program flowcharts. semicolon), improper
naming of variables,
(4mks) wrong spellings of user
A flowchart should have defined and reserved
only one entry (starting words.
point) and one exit b) Logical Errors
point These are errors that
The flowchart should be occur as a result of bad
clear, neat and easy to program design
follow Logical errors relate to
Use the correct symbol the logic of processing followed in the
at each stage in the program to
flowchart get the desired results
The flowchart should e.g. they may occur as
not be open to more a result of misuse of
than one interpretation logical operators.
Avoid overlapping the
lines used’ to show the c) Run-time (execution) error.
flow of logic as this can (2mks)
create confusion in the Run-time (execution)
flowchart errors. They occur
Make comparison when the programmer
instructions simple, i.e , develops statements,
capable of Yes/No which are not
answers projecting towards the
The logical flow should desired goal. Such
be clearly shown using statements will create
arrows deviations from the
Ensure that the desired objectives
flowchart is logically
correct & complete 13. Explain four error detecting
b) Give one advantage of methods in program development
pseudo codes over flowcharts (4mks)
(1mk) i) Dry running (desk
Pseudo codes are checking); - checking a program for
easier to write and errors by
understand making the corrections
They are convenient on a paper before
especially for long entering it in the
program editor.
55
ii) Translator system
checking: - It involves the running of a (3mks)
translator
program (e.g., compiler
or Interpreter) after
entering the set of
coded instructions in
order to detect any
syntax errors.
iii) Use of debugging
utilities: - It involves
supplying data values
to the program for
which the answer is
known. If the program
does not give the
correct answers, it
shows that it contains
some errors.
57
display an error message “Error:
Division by zero”.
START
PRINT (“Enter two numbers, X
and Y”) Input X, Y
IF Y=0 THEN
PRINT ‘Error: division by
c) zero’
ELSE
REPEAT…UNTIL loop Quotient = X/Y
(4mks) PRINT X, Y, Quotient
ENDIF
21.
a) With aid of a pseudo code STOP
and a flowchart, design an algorithm
that
would:
Prompt the user to enter two
number X and Y Flowchart
Divide X by Y. However, if the
value of Y is 0, the program should
b)
Write
down
the
58
assignment statement used in the SET Initial day to 0
algorithm above. (2mks) WHILE Initial day <=6
Quotient=x/Y DO
F = 32 + (9c/5)
c) Which program control structure INPUT temperature in
is depicted in the algorithm? (1mk) 0
C
If …then...Else Initial day = Initial day
+1
22. Draw a flowchart for a program Cumulative =
that is to prompt for N numbers, Cumulative + 0F
accumulate the sum and them END WHILE
find the average. The output is Average =
the accumulated totals and the Cummulative/7
average. PRINT average
Stop
24.Michael
deposits 1,000
in a bank at an
interest rat of
10% per year.
At the end of
each year, the
interest earned
is added to the
amount on
deposit and
this becomes
the new
deposit for the
next year.
Develop a
pseudo code to
determine the
year in which
the amount
accumulated
first exceeds
23. Write a 2,000. Also for
pseudo each year,
code print the year
that (starting from
reads 1), the deposit,
the Interest
earned, and
the total
temperature for each day in a accumulated at the end of the
week, in degree Celsius, converts year.
the celcius into Fahrenheit and
then calculate the average START
weekly temperatures. The Input initial deposit, Interest
program should output the rate, and Target deposit
calculated average in degrees Set Deposit to 1000
Fahrenheit. Set Year to 0
REAPEAT
START Year= Year + 1
INPUT temperature in 0C
59
Interest = Deposit x your answer.
10% (5mks)
Total = Deposit
+Interest R Term Sum
Deposit = total 0 0x2 0
0 + 0=0
UNTIL Deposit > 2000
PRINT Deposit, Year 1 1
1x2 = 2 0+2=2
STOP 2 2
2x2 = 8 2 +8 =10
3 3
3x2 = 24 10 + 24 = 3
(7mks)
START
PRINT “Enter member Name,
share and Deposit”
INPUT Name, Shares, Deposit
IF shares > 100,000 THEN
Interest = 0.05 x
Shares
ELSE
Interest = 0.03 x
Shares
ENDIF
Total savings =Deposit +
shares +Interest
PRINT Name, Total savings,
Interest
STOP
60
flowchart below and answer the
questions that follow:
a) List all
the outputs
from the
flowchart.
(3mks)
24, 50,
102 (any correct 3)
(3mks)
i) M100
Only one value,
11 will be printed 1
iii) M = 100
values
starting
with 11 to
infinity, i.e. ,
27. 11, 22, 44,
……….
a) 1
Study
the
61
c) Modify the flowchart to print the 28. The gross salary of employees of
sum Mutson Chemist is
of based on the Basic
all and additional
the benefits.
Employees with
more than 10
year’s experience
get an additional
pay of 10% of
their basic salary.
Bonuses are given
as per employees’
sales of the month
as:
>200,000
15%
100,000 – 200,000
10%
Below 100,000
5%
outputs. (9mks) Draw a flowchart for the program that
will calculate Gross salary and output
each employee’s Basic salary, gross
salary and all benefits.
(15 mks)
62
operate within a specific
framework, limits or space. The
system receives inputs
from & communicates its
outputs to the environment.
Subsystems: - A system does
not exist alone, but it is made
up of different components or
other systems that
communicate with each other
Inputs and outputs: - a
system communicates with its
environment by receiving
inputs and giving outputs. E.g.
a manufacturing firm gets
SYSTEMS inputs in form of raw materials
DEVELOPMENT from the environment and
transforms them into finished
1. What do you mean by a system? products which are released
(2mks) into the environment
A system is a set of items, Process:- a system usually
equipments, procedures, transforms or processes data
programs or techniques & from one state to another.
people working jointly with an System entropy (decay);a
aim of achieving common system must have controls
goals. which help it not to operate
beyond its boundaries. The
2. Differentiate between soft controls enable the system to
systems and hard systems. adapt to changes in the
(2mks) environment in order to give
In Soft systems, goals and the expected output or to
objectives are not clearly perform to the expected level.
defined. In hard systems,
goals & objectives are clearly 4. a) Define the term information
defined and the outcomes system.
from the processes of the (2mks)
systems are predictable An information system is the
Soft systems are usually the arrangement of people, data,
human activity systems; their processes and information that
boundaries keep on changing. work together to support and
improve the day-today
operations of a business.
(5mks) b) Highlight three
3. Explain five characteristics of a circumstances that
system (5mks) necessitate the
Holistic thinking: - a system development of new
contains a set of interacting elements. information systems.
However, in
holistic thinking, a system is (3mks)
considered as a whole unit. New opportunities: - a
Purpose:- a system must be chance to improve the
designed to achieve a specific quality of internal
predefined objective. processes and
System boundaries and service delivery
environment; -the components of in the
each system should organization
may arise
63
Invention of new systems analyze it, and
which are more successful generate reports that
than the existing ones can be used to support
Problems: - the user may the decision making
encounter some difficulties process in an
in the operations of the organization
existing system 7. State one disadvantage of the
Directive: - these are Traditional approach in system
requirements imposed by development (1mk)
the management, The structure of the old
government, or system is not changed in
external anyway; hence; hence, the
influences. weaknesses of the old system
5. State four roles (functions) of an are not corrected and are
Information system analyst. carried forward to the new
(4mks) system.
Examines the feasibility of
potential computer 8. What is Prototyping as used in
applications. system development?
Reviews the existing (2mks)
system & makes It is a Rapid system/program
recommendations on how development technique 1
to improve or implement where system developers
an alternative system. quickly capture user
Works hand in hand with requirements by designing
programmers to construct system interfaces in the
a computerized system presence of the user.
Coordinates the training of
new system users and 9. Outline the seven steps followed
owners. in structured system development.
He is the overall project (3 ½ mks)
manager of the information -Problem recognition and
system being definition
implemented. Some of his -Information gathering
duties include: assuring -Requirements specification
quality, keeping within -System design
schedule & budgeting. -System construction (coding)
6. Define the following terms: -System implementation
i) System control -System review and
A system control is a maintenance. (NB: Order must
method by which a be followed)
system adapts to
changes in the 10. Define the term Feasibility study
environment in order to as used in system development.
give the expected (2mks)
output or perform at This is a special study carried
the expected level. out to establish the costs and benefits
ii) System boundary of a proposed
It is the scope/limits new system.
within which the system 11. You are required to develop a
components operate registration system for a particular
iii) Online analytical school. State
processing two ways in which you would
The process whereby a gather the information required
computer-based for the system development.
information system is
used to capture (2mks)
operational data,
64
-Study of available documents the questionnaires at their
-Observation convenient time.
-Interviews It is a cheap method of
-Use of questionnaires collecting data from large
-workshops and seminars number of individuals
-Use of automated methods Responses can easily be
12. Identify two disadvantages of tabulated and analyzed
Observation method used in fact- quickly.
finding. (2mks) 14. a) Explain the importance of
-The person being observed using automated methods in fact
may perform differently or change finding. (1mk)
his/her behaviour Automated method of
leading to wrong requirements data collection can be used in areas which
being observed are not easily
-The work being observed may accessible.
not involve the level of difficulty or b) Give one example of
volume automated information gathering
normally experience during technique. (1mk)
that period of time. -Use of a video camera
-The need to be on the site to capture motion pictures
where the activities are taking -Use of Tape recorder.
place consumes a lot of time. 15. Mention the four factors that may
-Some activities may take be considered in order to design a good
place at odd times causing a file.(4mks)
scheduling inconvenience for o Output specifications
the analyst. (i.e., output from the
13. a) Name three circumstances in system)
which it is better to use a Questionnaire o Input specifications
than an o Table/file structure
Interview for gathering specifications
information. o Hardware specifications
(3mks) o Software specifications
If the information to be
gathered is located over 16. State four factors that may be
widely spread geographical considered in order to design a good
area. file. (4mks)
If a large number of people - Record key fields
are to be questioned, and - Data type for each field
the questions to be asked - Length of each field
require short answers, or - Backup and recovery
are limited to Yes/No strategies.
Where 100% coverage is 17. Define the term “attribute”
not essential (1mk)
Where privacy (anonymity) An attribute is a unique
of the respondents is to be characteristic of a record for
maintained. which a data value can be
b) Outline three advantages stored in the system database.
of questionnaires. E.g., a student record has
(3mks) attributes such as Name,
Use of questionnaires gives admission number, class, etc.
the respondents privacy;
hence, there is likelihood 18. State two methods/tools that a
that the information given system analyst may use to design a
is sincere and real. system. (2mks)
Questions can be answered - Use of system flowcharts
quickly since respondents - Data flow diagrams
can complete and return - Entity relationship models
- Structured charts
65
confidence to run the
19. Explain three tasks that are new system.
carried out during system o The weaknesses of the
implementation. (3mks) old system may not be
- File conversions corrected & may still be
- Staff training transferred to the new
- Project management system.
- Changeover strategies. o Loss of jobs for the
workers whose
20. Your school has decided to departments are
replace its library control system. affected.
The current system was o If the new system fails,
implemented ten years ago but data recovery may be
has restricted reporting facilities impossible.
and has a text-based interface.
The school intents to replace the (iii) Mention any two
old system with a new advantages of running both
computerized system, and is now the manual system ad the
considering both ‘Parallel computerized system
running” and “direct simultaneously.
changeover”. (2mks)
a). (i) Briefly explain the terms o If the outputs from the
parallel running and direct two systems are
changeover as used in system similar, confidence in
implementation. the ICT systems.
o Users have time to
(2mks) familiarize themselves
Parallel running is where both with the ICT systems.
the old and the new systems o It is reliable because it
are run in parallel to each enables thorough
other (a the same time) for testing.
sometime until users have o Weaknesses in either of
gained confidence in the new the systems are
system. Data is processed on corrected.
both systems in order to -
compare their performance,
and also cross-check the NETWORKING & DATA COMMUNICATION
results.
Direct changeover is a 1. Define the following terms:
complete replacement of the (2mks)
old system with the new (i) Computer network
system in one bold move. The (2mks)
old system is stopped & A collection 2 or more computers
abandoned and the new connected together using
system starts operating transmission media (e.g.,
immediately. telephone cables, or Satellites) for
the purpose of communication
(ii) Give two disadvantages of and sharing of resources.
direct changeover over parallel running. (ii) Data transmission
(1mk) (2mks)
o It may be very Passing information from one
inconveniencing (or, terminal to another in a computer
the organization will network through
incur huge losses) in telecommunication channels
case the new system (b) Differentiate between a modern and
fails or faces problems. a multiplexer.
o The users may not have (2mks)
gained enough
66
A Multiplexer enables sending of It doesn’t need powerful &
multiple data signals over the expensive servers for data storage
same medium, either It can accommodate users with
simultaneously or at different variety of needs
times. Creation of employment at the
A Modern converts a digital signal remote centers.
to analogue form, so that it can be
transmitted over analogue 5. Distinguish between bounded and
telephone lines. unbounded transmission media, giving
3. State three advantages and three two
disadvantages of computer networking. examples in each.
(6mks) In bounded media, data signals
Advantages are transmitted from the source to
- Sharing of resources between the the destination through a
computers restricted pathway, e.g., two open
- Sharing of risks. wire cables, twisted pair cables,
- Provides cheaper and efficient Coaxial cables, fiber optic cables.
communication. Unbounded media transmits data
- Running cost is low because of the without physical connections, e.g.
minimal hardware required. microwave, satellite, radio,
- Reliable and error-free. infrared communication.
- Enhances faster communication 6. State what is meant by each of
- It is not time-consuming. the following data transmission
media, and give two advantages
Disadvantages of networking and three disadvantages for
- High initial installation cost (i.e., each.
expensive to install). i) Twisted pair cables.
- Security threats e.g., hacking,
which posses a great danger to (3mks)
loss of information A twisted pair cable is made
- Moral and cultural effects. up of 2 insulated copper wires
- Spread of terrorism, drug- twisted around each other in a
trafficking and viruses. spiral pattern. This prevents
- Over reliance on networks. electromagnetic fields from
developing around the two
4. (a) What is a distributed system? wires as they transmit data.
(2mks) Advantages
This is a system in which data is -Has high data transfer rates of
manipulated in different up to 100 Mbps
processors/computers, which are -It is cheap because; of mass
on the same network but placed in production for telephone use.
separate locations.
Disadvantage
(b) State any two advantages of o They suffer from high
distributed systems. attenuation
(2mks) o affected by
There is sharing of data & other electromagnetic fields
resources. o It has low data
Relieves the central computer of transmission rates as
the burden of processing data compared to other
Failure of the central computer cables
does not affect the operations of
the other terminals ii) Coaxial cables
Processing load is shared equally; Coaxial cables consist of two
hence no time wastage conductors which are insulated
There is faster processing of data and shielded to provide high
since each machine can process & noise immunity & also more
store its data
67
resistant to electromagnetic o wireless networks can
interference. span large geographical
areas easily
Advantages o Can be used in very
o They have a large remote areas that do
bandwidth (up to 1 not have high cost
Gbps) compared to physical infrastructure
twisted pair cables like telephone lines
o They can carry voice, o Flexible.
data and video signals Disadvantages
simultaneously o The initial cost is very
o They are more resistant high
to radio and o It is relatively difficult
electromagnetic to establish or
interference than configure.
twisted pair cables 7. Explain the function of the
Disadvantages following network devices:
o They are hard to work i) Network interface card
with (NIC)
o They are expensive to NIC creates a physical
buy & install link between the computer and the
transmission media.
iii) Fibre optic cables is made ii) Gateway
of transparent glass and Gateways provide
uses light to transmit data access to the Wide area networks &
signals from one point to the Internet.
another on the network. iii) Bridge
Advantages This is a network device
o It is immune to that selectively determines the
electromagnetic appropriate network
interference, and segment for which a
eavesdropping. message is meant to be
o It is fast and supports delivered.
high bandwidth iv) Repeater
o It has low attenuation; A repeater receives a
hence, a long distance weak signal on the
can be covered network, cleans and
o It is small & light. amplifies it for
Disadvantages transmission over the
o Difficult & expensive to next portion of the
install network. Signals
o Once broken, it is become weak due to
difficult & expensive to attenuation
repair. 8. List two advantages of cell
iv) Wireless/microwave/radio phones over fixed lines.
transmission. (2mks)
(3mks) Are cheaper than fixed
In wireless lines
transmission, no Less prone to
physical connections transmission errors
are used to transmit Can be used even
data from one point to where there are no
another. Instead a telephone lines
transmitting antenna & Portable, i.e. can be
a receiver aerial are carried around
used to facilitate the
communication 9. a) Study the diagram below
Advantages and answer the questions that follow:
68
Logical (signal) topology deals
i)
Name
the
communication media depicted in the with the way data passes from
above diagram. (1mk) one device to the next on the
Satellite communication network
ii) Name the parts labelled A, Physical topology refers to the
B, C, and D. (4 mks) physical arrangement (layer
A -Receiving earth station out) of devices on the network.
B -Satellite in space APPLICATION AREAS OF ICT
C -Down link 1. Write in full hence, explain the
D -Up link term ICT.
iii) List three advantages of (2mks)
the above communication media. ICT- Information and
(3mks) Communication Technology
- It is fast ICT- refers to the integration of
- It is convenient because; it computers and
provides a large constant line of telecommunication facilities
sight to each station Hence, there for the
is no need to keep on moving the purpose of communication.
parabolic dish so as to track the 2. State four areas where
line of sight computers are used today.
- Can be in very remote areas that (4mks)
do not have high cost physical i) Financial systems, e.g.
infrastructure like telephone lines. accounting, stock exchange, payroll,
banking, etc,
(2mks) ii) Transport systems, e.g. air
10. a) Define the term network traffic control, shipping control, automobile
topology. traffic
(2mks) control
Network topology refers to the iii) Entertainment systems, e.g.
arrangement of the computers, printers and used in showing movies, playing music, &
other computer games.
equipment connected on the iv) Scientific research, i.e.
network. weather forecasting, medical research,
b) Distinguish between logical military & space
and physical network topology. (2mks) exploration.
69
3. State two ways in which a - There is no need for human
computer may be used in efficient bank clerks.
running of a hospital.
- Keeping records of incoming
and outgoing patients
- In electro-cardiogram 6. a) State four components of an
screening and monitoring, analyzing the electronic Point-of-sale terminal.
sickness & checking (4mks)
for damages, e.g. X-ray Terminal, e.g. Console, which
- A computer controls life is connected to the main
supporting machines computer
- For inventory control Monitor
- To access foreign expertise or Printer
labour, i.e. to get in touch with
consultants or surgeons in b) Give two advantages of
another country, thereby using electronic point-of sale terminals
reducing traveling of patients as opposed
& professionals. to manual entry at a
4. a) Name the type of supermarket checkout counter.
processing that would be required by a (2mks)
payroll system. (1mk) Fewer errors made by
Batch processing employees, i.e. correct prices
are used at the point of entry
b) Identify two benefits of It ensures faster entry of data,
using computers in accounting systems. since the attendant does not
(2mks) have to enter details manually.
- They make the processing of Ensures good stock
financial records easier management procedure.
- Error checking procedures can 7. Define the following terms:
e established to ensure a) Biometric analysis
accuracy & security of data This is the study,
- Used to store volumes of measurement & analysis of human biological
financial records characteristics. It uses a
- Ensure fast & easy production computer and a biometric
of financial reports device to recognize & analyze
- They are cheaper than manual features of human body parts
systems such as fingerprints, lips, voice
iris colour, etc
5. a) Write down all the input
and output devices of an ATM b) Telecommuting
machine of Pesa-point in A situation where an employee
Kenya. works in a location that is remote from the
- Keyboard normal place of work either on
- The ATM card full-time or part-time basis.
- Screen (Visual display)
- Printer
8. Outline four devices required in
b) List down three order to conduct a video conference.
advantages of ATM cards. (4mks)
(3mks) - A computer
- Offer 24 hour service to - A digital video camera
customers (camcorder) attached to a computer
- Ensure more flexibility in cash - Network software for video
deposits and withdrawals conferencing
- It is secure because; it requires - A microphone
a personal identification number (Pin), which - Speakers
is only
known by the card holder
70
9. a) Define the term E- vii) Law enforcement
commerce (2mks)
(2mks) For keeping record on
E-commerce is a way of doing fingerprints
business where the Biometric analysis in crime
transactions are carried out detection so as to provide
electronically without the immediate & accurate
seller and buyer interacting information
physically. Scene monitoring & analysis to
b) List down two advantages help the police in arresting
of e- commerce as used in modern traffic offenders and criminals.
business
environment viii) Library management
systems
(2mks) (2mks)
- Reduces traveling, hence - Keeping book records and
saves money and time stock management
- A company can access - Tracking overdue books
customers all over the world,
and is not limited by space & 11. Suggest how computers may in
wagons future be made more user-friendly for
- Reduces operating costs of persons
small business as they can that are:
establish websites where they a) Blind
can auction their good & (1mk)
services. This also increases - Development of Braille
their sales. keyboards, or engraved keyboards
- Computers can be
10. Describe how computing has installed with talking software, i.e., can store
been applied to each of the following voice patterns
areas: of the user
i) Transportation systems.
(2mks) b) Without hands
- Used by railway corporations - Use of voice-activated
to coordinate the movement of their commands.
goods & wagons - Computers can be
- Used in airline industry for installed with powerful multimedia
air traffic control, surveillance system & speech
of airspace using radar recognition devices.
equipment 12. Give at least four reasons why a
- Used in shipping control firm may decide to computerize its
- Used in automobile traffic operations
control in busy towns, i.e. to - Handling of errors
simulate the timing of traffic easily
lights. - Easy storage and
retrieval of information
vi) Reservation systems. - Increased efficiency
- Higher quality work
(2mks) - Reduced cost.
- To keep record of reservation
- For online reservation (i.e.
provide online remote
services)
- Paperless transaction (Paying
via credit cards)
- Easy to check for vacant
positions
71
IMPACT OF ICT ON SOCIETY b) State three other areas
1. Identify four problems associated where automation is applicable.
with the introduction of computers in a (3mks)
society. - Intelligent control of traffic
lights
(4mks) - The autopilot in aircrafts
o Job displacement and - Use of robots in industries
replacement - Manufacturing industries
o Computer crimes, e.g. such as vehicle assembly plants, oil
piracy, fraud, hacking refineries, and
o Health effects, e.g. food processing companies.
repetitive strain injury, 4. Discuss the applications of
eye problems Artificial Intelligence in each of the
o Cultural effects and following fields:
immorality (DVD’s, i) Expert systems
pornographic literature In medical institutions for
on the Internet diagnosis of diseases
2. Distinguish between “job In mining companies for
replacement” and “job displacement” in prospecting of minerals.
reference to Financial forecasting, e.g.
Computerization formulation of taxation &
marketing policies, and
(2mks) making of investment
In job replacement, the decisions.
unskilled workers may be Financial forecasting, e.g.
replaced with the skilled formulation of taxation &
ones. In job displacement, marketing policies, and
some employees may be making of investment
displaced/ moved to new decisions.
working areas as the
computer may serve to ii) Natural language
perform tasks that may be processing
performed by several (2mks)
people. It involves development of
programming languages,
3. A recent breakthrough in the whether spoken or written
manufacturing industry is the This will make the task of
development of a full data processing even
manufacturing plant, that can faster
produce vehicles using robots only. iii) Artificial neural networks.
a) Give three advantages of
fully automated manufacturing. (3mks) (2mks)
Increases efficiency due to This is the use of electronic
the balancing of workload devices & software to
and production emulate the learning
capacity. process of the human brain
Production increases in the and how it recognizes
workplace patterns.
Improves customer service 5. Explain the impact of information
Enables production of technology on organization in
adequate & high quality each of the following areas
goods in time (i) Competition
Enables efficient utilization (2 mks)
of resources, e.g. raw - Ability to advertise in the
materials, personnel and internet
equipment; hence reducing - Improved quality goods &
operating expenses. services
- Reduced operational costs
72
ensures that resources and
(ii) Pace of growth labour are available as
(2 mks) required and interfaces to
- Reduced costs users
- Reduced need for manpower
- Reduced space requirement 2. Differentiate between software
- Greater output engineer and a computer engineer
( 2 mks)
6. State three reasons why users Software engineer develops
may resist the introduction of software/ programs as per
information and communication requirements; computer
Technology (ICT) to their place of engineer designs computer
work hardware and improves on
(i) Fear of change- people are existing ones.
creatures of habit, hence are afraid of 3. (a) Sate three public universities
change where one can further her computer
(ii) Fear of losing their jobs: By studies ( 3 mks)
installing the computer into an - Nairobi university
organization, employees fear - Moi University
that they might end up losing - Kenyatta University
their jobs - Jomo Kenyatta University of
(iii) Fear of failure – Since the agriculture and Technology (JKUAT)
computer is very new in a - Egerton University
given working environment, - Maseno university
the people will be afraid that (b) Identify at least three related
they might never get used to courses offered at
it. (i) College level
(iv) Loss of control: The - Certificate in information
management fear that once a technology
computer system is - Diploma in information
implemented, they might lose technology
control of the organization. - Diploma in Education
(computer science)
CAREER OPPORTUNITIES IN
ICT (ii) University level
1. Give a brief description of the - Bsc. Computer science
following careers available in the - Bsc. Information technology
computing field. - Msc. Information systems
(i) A Software engineers is one
who is skilled in software 4. (a) Name three responsibilities
development and technical that are carried out by a:
operations of computer (i) Web administrator
hardware - Develop & test websites
He develops and updates both - Maintains, updates & modifies
system and application information on the websites to
software together with the meet new demands by the
associated documentations. users.
- Monitors the access & use of
(ii) Data processing managers (DPM) internet connection by
enforcing security measures
( 2 mks) - Downwards information
A data processing manager is needed by an organization or
the person who usually is in institution from internet
charge of the overall running websites
of the data processing
department in an organization (ii) Computer trainer
He plans, monitors and
controls the personnel,
73
- Training people on how to use
a computer & the various
application programs
- Development training
reference materials
- Guiding learners on how to
acquire knowledge through
carrying out research
- Advising the learners on the
best career opportunities in
the broad field of ICT
- Preparing learners for ICT
examinations
74
K.C.S.E SAMPLE PAPER - System auditing and use of log
Kenya Certificate of Secondary files
Education - Use of passwords
451/1 computer studies - putting in place punitive
Paper 1 (theory) measures
2 ½ hours - Data encryption
- Use of firewalls
INSTRUCTIONS TO CANDIDATES
This paper consists of TWO sections A and B (ii) Natural disasters
Answer ALL the questions in section A. - Use of UPS
Answer questions 16 and any other THREE - Use of backups
questions from section B - Installation of lightening
arrestors
- Having standby fire fighting
FOR OFFICIAL USE ONLY equipment
SECTION QUESTION - Use of fire- proof data saves
A 1- 15 - Contingency plans
16
17 (iii) Vandalism
18 - Tighten security measures,
e.g. use of alarm systems, fitting,
19
burglar- proof doors
20
- Punitive measures.
TOTAL SCORE
(iv) Carelessness
- Better selection of personnel
SECTION A (40 marks) - Improve employee training
Answer all the questions in this section and Education Plus Agencies
1. Computer systems are built - Limit access to data and
from three types of physical computers
components: processors, - Regular backups
memories and I/O devices - Use of UNDELETE and
(a) State two tasks of a processor UNFORMAT utilities
- To fetch data & information
from memory 3. (a) Explain the term nibbles as
- Decodes instructions used in data representation in
- Execute/ runs programs computers ( 1 mk)
- Controls hardware operations A nibble is a group of 4 binary
through sending of control signals usually representing a numeric
number.
(b) State the functions of I/O
devices (b) Perform the following
- Transfer information into & out binary arithmetic, giving the
of the computer answers in decimal notation
- Serves as the interface (3 m
between the user & the computer (i) 1110.0111 + 1101001.11
- Enables the user to
communicate with the computer 1110.0111
1101001.011 +
2. Threats to the safety of 1110111.1101
computer system take many
forms such as: white- collar (ii). 1001011.011 – 111.111
crime, natural disasters, 1001011.011
vandalism and carelessness. 111.111 –
Give one way as to how each 1000011.100
of these forms of threat can
be controlled ( 2 mks)
(i) White- collar crime
- Use of policies
75
4. (a) Distinguish between 7. (a) Distinguish between
machine and assembly labels and formulae with
language ( 2 mks) respect to spreadsheets
Machine language uses ( 2 mks)
machine codes (binary digits) Labels are text consisting of
that consist of 0’s & 1’s, alphanumeric characters,
whereas assembly language while a formula is a sequence
makes uses mnemonic codes of values, cell references,
(symbolic representations of functions and arithmetic
the machine code. operators whose calculations
(b) State the type of translator results to a numeric value.
necessary for a program written
in: ( 2 mks) (b) Consider the entries made in the
cells below
(i) High level language Cell B2 B3 C10 C11 C13
Interpreter or compiler
Entry 200 10 B2 B3 =C10 + C11
(ii) Assembly language
0
Assembler
5. Briefly explain the purpose of
State the value displayed in cell
the following types of program
C13
documentation: ( 3 mks)
(2 mks)
(a) User manual
It returns an error message: #
This is a manual provided for
VALUE!
an end user to enable him/ her
use the program. It is
8. List three differences between
applicable in user- oriented
Wide Area Networks (WAN)
documentation.
and local Area Networks (LAN)
(b) Reference guide
( 3 mks)
I is used by someone who
- LAN is limited to
already knows how to use the
a small
program but needs to be
geographical
reminded about a particular
distance
point or obtain detailed
- Data
information about a particular
transmission
feature.
speed in LANS
is higher
(c) Quick reference guide
- Cost of data
This is a single sheet or card
transmission in
small enough to fit into a
LANs is small
pocket, which the user may
- There are less
keep handy for help with
transmission
common tasks carried out
errors in LANs
with as program.
9. Study the flowchart segment
6. State any two features of a
below and state the last value
user- friendly program
printed from the flowchart
( 2 mks)
- Error reporting and recovery
- Good screen display
- Validation of input
- Comment statements
- Indentations
- Self- descriptive variables
- Menu driven
- Online help
76
storage of large volumes of
data, hence making them
economical.
- Have high data
transfer rates
VAR
A, B, C, COUNT: INTEGER;
BEGIN
A: =0;
B: = 1
FOR COUNT: 0 TO 10
DO
Begin
Writeln (B);
C: A + B
SECTION B (60 MARKS) A: = B;
Answer question 16 and any other B: = C’
three questions from this section End;
16. Study the flowchart below END
and answer the questions that (b) List the outputs of the flowchart
follow: above (5
mks)
1,1,2,3,5,8,13,21,34,55
(any ten integers)
(a) Write
a high level language program for
the above flowchart ( 7 mks)
Program ABC;
Uses WinCRT;
VAR
A, B C COUNT: INTEGER;
BEGIN
A: 0
B=1
REPEAT
Writeln (B)
78
(c) Modify the flowcharts so that it
adds up (a) What is meant by?
all its (i) 1.44 MB floppy disk
outputs drive?
and It has a floppy
disk for diskettes of
capacity 1.44
megabytes
79
- 3 Dmacs - Enhances fault tolerance
provided by
18. (a) Give three examples of redundant/excessive links
network software
( 3 mks) Disadvantages
- UNIX - Difficult and expensive to
- Linux install and maintain
- Novell NetWare - Very costly as it requires large
- Microsoft Windows NT amounts of cables ( or
- Microsoft Windows 2000 redundant links)
- Microsoft Windows 2003 - Difficult to add more nodes
when the network is large
(b) List any three items that may - Difficult to isolate faults due to
be referred to as data terminal lack of a central control point
equipment in a network
19. (a) A company has decided to
computerize their operations.
( 3 mks) They have decided to
- Servers purchase packages instead of
- Dummy terminals developing their own
- File servers programs. Give three
- Printers advantages and two
- Modems disadvantages of their
- Terminators approach.
(c) Briefly explain the following ( 5 mks)
terms as used in networking Advantages of packages
( 4 mks) - They are cheaper to purchase
(i) Remote communication as the cost of developing
This is the transfer of data them is effectively shared
between computers in between the purchases
different locations - There is saving of the
programming effort because;
It is a long- distance data the company buys the
transfer without the use of
software when ready- made
cables
- Packages are thoroughly
tested
(ii) Distributed processing
- Relatively quick results are
Distributed processing is the
obtained
sharing of computer processing power
Disadvantages of packages
(d) State three advantages
- The purchaser is not in direct
and two disadvantages of
control of the software
mesh network topology ( 5
because he/ she is not
mks)
involved in developing it.
- Packages are produced to
Advantages of mesh topology
meet general needs, hence
- It is fast
may not deal with the specific
- Failure on one mode will not
user or company needs.
cause communication
- Packages cannot be modified
breakdown
(customized) Due to the
- Easy to troubleshoot cable
application of the developer’s
problems. If two machines are
copyright acts.
not communicating, the
- Packages include extra
administrator will only check
facilities which may not be
the cable between them.
required by an individual user
- Enhances flexibility in
or company
communication
80
- Packages may allow only a that it has been transcribed
clumsy solution to the task at (written out) correctly.
hand Validation involves subjecting
- Some packages have data to checks built in a
capabilities which will require program to check for its
the user to develop them appropriateness or integrity
further. before it is processed.
- It is easy to forget the
commands to use the (ii) Data encryption and
package, especially if it is not passwords
used frequently. Encryption- mixing up,
(b) (i) Explain why a value such distorting or changing of data
as 6112334445555 may be being transmitted over a
displayed as ####### when network to prevent
typed in a cell on a spreadsheet unauthorized disclosure.
A password – a secret code
( 2 mks) used to prevent unauthorized access
of data in a computer
(ii) How can the problem in (b) (i)
above be corrected? (iii) Dry run and walkthrough
By increasing the column Dry run is where the program
width is tested on paper before it is keyed in
Walkthrough is a style of
(c) With reasons, briefly describe evaluating a program by a
the most appropriate type of team of professionals which in
printer or output device for the turn reports to the
output of: programming team.
(6
mks)
(i) Customer invoices on
multi- part stationery
Dot- matrix printer
( or any impact
printer)
It produces sharp
impact on both original
land and the copies
81
This paper consists of TWO sections A and B
Answer ALL the questions in section A.
(c) Give two differences between post Answer questions 16 and any other THREE
Office Mail electronic mail ( E- mail) questions from section B
( 2 mks)
- Post office mail is operated
manually; Email is computerized FOR OFFICIAL USE ONLY
- Post office mail is slow; email SECTION QUESTION
is fast A 1- 15
- Email has a wide area of 16
coverage 17
- Email is more secure 18
19
(d) Speed and accuracy are some
20
of the advantages of using
TOTAL SCORE
computers in banking. State
three other advantages of using
computers in banking
(3 mks)
SECTION A ( 40 marks)
- Makes it easy to access
Answer all the questions in this section
information
- It is easy to update records
1. How is a point of sale terminal
- requires less space for storage
used in a business organization?
of documents
( 2 mks)
- Improved data security &
- It can be used for pricing the
privacy
different types of commodities
- It can be used as a bar code
reader
- Fore checking stock levels
(stock control)
- For adding totals of purchase
& calculating customers change
- For receipt production
82
For a compiler, syntax errors - Laser jets use Toner cartridges
are reported & corrected after while dot matrix use ribbons
the source code has been - A laser printer is expensive
translated to its object code than a dot matrix
equivalent. - The print quality of a laser
3. Explain why computers use printer is better
binary numbers in data
representation (2 mks) 7. List four stages involved in the
Data is stored in computers in data processing cycle
binary form. The computer’s ( 2 mks)
CPU carries arithmetic & - Data collection/ preparation
logical operations by binary - Data input
numbers. - Processing
This is because; binary - Output of information
numbers has only two digits, 0
& 1, which make it suitable for 8. (a) What is a utility software?
representing two states of This is a program used
data such as OFF & ON. frequently by the computer to carry
out routine jobs
4. What is meant by the term dry Utility software is used to
running as used in program manage computer files,
development? (2 mks) diagnose and repair computer
A method of checking a problems and assist in helping
program for logical errors by the computer to run more
making the corrections on a efficiently.
paper or from the printouts
(b) Give four examples of utility
5. A computer teacher has put a software
rule that diskettes should not be - Text editors
used in the computer laboratory - Sort utility
- Language translators
(a) Give a reason for the rule - Merge utility
- To prevent the spread of - Loader
viruses between the computers - Copy utility
- To prevent unauthorized - Linker
copying of programs from or to the - Dump utility
computers - Diagnostic tools
- Students may carry immoral - Database management system
files using the diskettes
9. Distinguish between an
(b) State two alternatives that intelligent terminal and dump
can be used to achieve the same terminal
objective (2 mks) - An intelligent terminal is one
- Using diskless computers which is capable of performing
- Use of antivirus software to some limited amount of
detect/ clean viruses before use processing on data before
transmitting what is beyond
6. List three differences between a their processing abilities to the
laser printer and a dot matrix central computer.
printer (3 mks) - A dump terminal is one which
- Laser printers are faster than does not have any of its own
dot matrix printers processing capabilities/ power.
- Laser printers are quiet while It relies on the processing
dot matrices are noisy capabilities of the central
- Laser printers use thermal computer that serves it.
technology while dot matrix is an
impact printer 10. List two duties of the following
personnel
83
(a) Database administrator (ii) Dir It lists all the contents
- Designs & develops database of the current directory
applications for the organization 13. A student presented a budget in the
- Installs & co- ordinates form of a worksheet as follows
database systems A B
- Updates the database by
1 Item Amount
adding new record, modifying
the existing records & deleting 2 Fare 200
the unnecessary records. 3 Stationery 50
- Responsibilities for the 4 Bread 300
security of data in the 5 Miscellaneous 150
database (i.e. designs & sets 6 Total
up security measures needed
The student intends to have spent
to control access to the
half the amount by mid- term
organization’s data.
(a) Given that the value 0.5 is typed
- Ensures the database meets
in cell B9, write the shortest
the information needs of the
formula that would be typed in
organization
cell C2 and then copied down the
- Ensures facilities for retrieving
column to obtain half the values
data and structuring reports
in column B.(1 mks)
are appropriate to the needs of
the organization
= B2*$B9
- Responsible for documenting
(b) Write two different formulae that
the manuals for users
can be typed to obtain the total
(b) Data processing manager
in cell B6 and then copied to cell
- Ensures that the organizational
C6.
information needs are met
= SUM (B2: B5)
- In charge of the overall
(2
running of the data processing
mks)
departments, e.g. he is in
OR
charge of purchasing the
= B2 + B3 + B4 + B5
required equipment
14. State three operations that can
11. Differentiate between source
be performed on a relational
program and object program
database files (3 mks)
Source program is the
- Indexing
program as written by the
- Sorting
programmer using an editor
- Filtering
program either in high level or
- Querying
assembly language.
- Updating of records
Object program is the program
- Report generation
in machine code (or binary
15. List three parts that constitute an
form) produced by a compiler
array definition statement
or assembler after translating
( 3 mks)
the source program, and can
- Array name
be readily and can be readily
- Range, which contains the
loaded into the computer.
initial value & the final value
12. (a) In DOS, what are the
- Data type
following commands used for?
E.g. Score: Array [1….50] of integer
(i) RD - Remove directory-
means deleting a directory from the tree
SECTION B (60 marks)
(ii) DEL - deletes all files in a
Answer question 16 and any other three
particular directory
questions from this section
(b) What happens when the
following commands are typed in the
16. Bidii wholesalers has two
DOS environment?
categories of customers for
(i) CD Changes the directory
order processing, category ‘A’
one level up the directory tree
obtains 10% discount on all
orders up to Kshs 10,000
84
otherwise the discount is 20% on
the entire order. Category “B’
obtains 30% discount on all
orders if the debt repayment is
‘good’ otherwise the discount is
15%. Draw a flowchart for the
order processing. (15 mks)
85
17. (a) List three application areas of themselves to work without
artificial intelligence supervision
( 3 mks) - There is possible delegation of
- Expert systems, e.g. medical duties to unauthorized persons
diagnosis, engine repair, legal defense etc - Isolated employees may be
- Natural language processing exploited in an environment
- Artificial neutral networks e.g. where they can’ t easily get
investment analysis, signature Analysis, etc support from co- workers
- Robotic/ perception systems
18. (a) Explain three ways by which
(b) With the improvement in computer users can protect their
price and performance of eyes from harmful emissions from
computers and communication the computer screen
equipment it will be possible for ( 6 mks)
people in various business - Using antiglare (radiation
organizations to work from home. filter) screens that are
Such working using a PC as a specially tinted to reduce the
remote terminal is often radiation from the monitor or
described as teleworking. State light that reaches the eye.
three advantages and three - Controlling light intensity by
disadvantages of working from adjusting the brightness
home. buttons on the screen
- Tilting the monitors so as not
to face the user directly
( 12 mks) - Wearing special spectacles
Advantages when using computers in order
- Reduces unnecessary travel to to control the light intensity.
the place of work - Avoid using flickering monitors
- Reduces traveling expense as they can cause extreme eye
(i.e. saves traveling time, risk strain that can damage
and cost) eyesight.
- There is less stress due to - Very bright wall paints reflect
commuting inconveniences too much light into the user’s
such as traffic jams eyes.
- Reduces office space, - Taking frequent rests
equipment and cost
- Extends working hours (b) List three factors to be
- Suitable for people with considered when deciding on the
disabilities, because they are choice of an electronic data
able to overcome the barrier of processing method
not being able to commute to - Type and size of business
an office - Timing aspects of the
- People can live where they information produces
choose without the worry of - Link between applications
having to move towns and - Volume of data records held in
break up social & family the organization
networks in order to find - Cost pf acquiring the relevant
suitable employment. hardware, software, storage
Disadvantages media, etc the cost of
- Lack/ unavailability of maintenance
appropriate facilities to allow - Operation speed
the work to be done - Quality of output required
- There is poor security on home
offices (c) Explain time sharing data
- Privacy threats processing mode, giving
- Lack of control and two advantages and two
supervision. The workers have disadvantages
to be able to motive
86
(6
mks) (a) List three input devices
Time sharing is a processing from the given
mode where a central specifications
processor services 2 or more - Keyboard
users who have different - Mouse
requirements. - Joystick
87
Joystick (e) Give two disadvantages of
(1 mk) using command driven
interfaces as compared to
20. A school organizes its work in menu driven interfaces
directories. The director WP contains
the files CATS, EXAMS and ( 2 mks)
ASSIGNMENTS. The directory of SP - The user must know the
contain the spreadsheet files. The command to type
directory DB contains the database - It is less user- friendly i.e. it is
files. The directory PROG is contained not easy to use
in the OTHERS directory. The - The user is required to master
directory WP also contains the the format/ syntax of all
PERSONAL directory. Given that the commands and their usage
directory STUDENT contains perfectly.
directories SP, DB, WP and OTHERS - Writing commands is time
consuming
(a) Draw the directory tree
structure with C as the root
(7 mks)
(2 mks)
C: STUDENT\DB>
88
K.C.S.E SAMPLE PAPER (b) For each of the following give
Kenya Certificate of Secondary one reason why they are not
Education Plus Agencies 451/1 allowed in a computer laboratory
computer studies
Paper 1 (theory) ( 2 mks)
2 ½ hours
(i) Smoking
INSTRUCTIONS TO CANDIDATES Smoke particles settle on storage
This paper consists of TWO sections A and B devices and may scratch them
Answer ALL the questions in section A. during read/ write operation
Answer questions 16 and any other THREE
questions from section B
It can cause fire
It deposits ash on devices causing
FOR OFFICIAL USE ONLY malfunction
SECTION QUESTION It affects the health of other users
A 1- 15
(ii) Eating foods
16
Food particles may fall into the
17 moving parts of the computer and
18 damage them
19
20
TOTAL SCORE
3. Distinguish between real, integer
and character data types as used
SECTION A (40 Marks) in programming:
Answer all the questions in this section Real:
1. (a) What is disk formatting - Used for numeric values that
Process of preparing a new disk may contain fractions/
for use by imprinting empty decimals
tracks & sectors on the surface of - Has a higher range than
the disk that can be recognized integer
and access by a particular Integer
operating system - Used for whole numbers
- Has a lower range than real
The preparation/ initialization of a Characters
disk for storage of data - Used for alphanumeric/
(b) Indicate whether the following control/ signal/ graphical
devices are used for input or character
output - Character uses fewer bits than
a real or integer
( 2 mks) 4. The cells K3 to K10 of a
(i) Plotter - Output worksheet contain remarks on
(ii) Light pen - Input students ’ performance such as
(iii) mouse - Input very good, good, fair and fail
(iv) Visual display unit- Input/ depending on the average mark.
output Write a formula that can be used
to count ALL students who have
2. (a) Explain why the following the remark “very good”. (3
controls should be implemented mks)
for computer based systems =COUNTIF (K3:K10,’’Verry
Good’’)
( 2 mks) 5. (a) State the purpose of
(i) Back- ups - Backups can be used registers in a computer system
to recover/ restore/ prevent lost data ( 1 mks)
(ii) Password- Passwords control They act as high speed storage
access to computer systems/ facilities locations. They are used to
hold data and instructions
89
temporarily just before and
after processing.
(b) Name two (b) Explain the following terms as
multiprogramming used in program implementation
operating systems ( 2 mks)
- Linux (i) parallel running
- Microsoft windows 98 This is where both the existing
- UNIX and the new systems are run
- Microsoft windows 2000 concurrently/simultaneously
- OS/2 (at the same time) for a period
- Microsoft Windows Me of time until users have gained
- Novell Netware confidence in the new system.
- Microsoft Windows XP Data is processed on both
- Macintosh OS systems in order to compare
6. (a) A serial file comprises of their performance, and also
records placed in positions 1 to cross check the results.
10. State the position of the end
of the file market. ii) Direct change over
( 1 mk) This is a complete replacement
The end- of – file marker is the of the existing system with the
position immediately after the last new system in one bold move.
record, i.e. position 11 The existing system is stopped
(b) State the purpose of each of & abandoned and the new
the following: system starts operating
(i) File server software immediately.
- Controls access to avail files
stored on a networked/ shared 8. Consider the linear arrays:
storage location i) AA (5: 50)
- Services client requests for ii) BBB (-5:50)
files iii) CCC (18)
(ii) Communication software
- Used for receiving/ sending Find the number of elements in
messages or data in a network each array.
- Used for routing traffic (3mks)
- Used for assigning identities to AAA (5:50) = 50- 5 +1
nodes =46
7. (a) Name the control structure BBB (-5: 50) = 10 – (-5) +1
depicted by the flowchart below =16
( 1 mk) CCC (18) = 18 – 1 +1
=18/cannot be determined
90
10. Name two types of relationships 14. Arrange the following data units
that can be applied in database design. in ascending order of size.
(2mks) BYTE, FILE, BIT, NIBBLE
- One to one (2mks)
- One to many/ Many to One
- Many to Many Bit Nibble
11. Explain the following terms as Byte File
used in word processing: (3 mks)
a) Indenting
It is moving of line/paragraph 15. State two health issues that may
text away from the left or right result from prolonged use of computers.
margin (2mks)
Leaving a space at the Harmful radiations that cause
beginning of a line/paragraph of text damage to eyesight/eye problems
from the margin eyestrain/eye fatigue
b) Alignment Headaches
Refers to how text is Repetitive Strain Injury (RSI) i.e.
positioned/lined up in a paragraph arm strain, wrist strain
relative to the left, right or finger deformation
centre of the page. Back strain.
c) Word wrap
A facility that word processor
use to automatically move the SECTION B (60 MKS)
text cursor to the beginning of
the next line when it reaches ANSWER QUESTION 16 AND ANY OTHER
the right margin automatic THREE QUESTIONS FROM THIS SECTION
rolling of text to the next line
when you reach the end of the 16. a) State the stage of program
line. development in which: (2mks)
12. Outline two ways in which i) A flowchart would be
computers can be used in hotels. drawn
(2mks) Program design
Reservation/booking of rooms
Record keeping on sales and ii) The programmer would
purchases (stock control) check whether the program does as
Producing bills & payrolls required program
Marketing and advertising Testing
Communication iii) The user guide would be
Security written
13. a) Explain binary coded decimal Program testing
code of data representation.
(1mk) iii) The user guide would be
This is a data encoding system that written
uses 4 binary digits to represent an Program documentation
individual decimal digit.
iv) The requirements specification
would be written.
Problem definition/analysis
b) Write the number 45110 in b) State the output of the following
BCD notation (1mk) flowchart segment
A=30
Number 4 5
45110 = 010001010001BCD
B=A
91B
A=
Write A, B
END
17. a) List paragraph formatting
activities in word processing.
A= 30, B= 30 (3mks)
b) Differentiate
between bolding and
highlighting text.
(2mks)
Highlighting:
- Selecting or
marking a given of
text e.g., a word,
sentence or
paragraph, in order
to work with it
- Highlighting is
temporary.
Bolding:
- making the
selected text
appear darker then
the rest of the text
- To add emphasis
to the text by
ii) WRITE A
PROGRAM USING Pascal or c languages thickening/darkening the
for the flowchart in c(i) above. characters
- Bolding is permanents.
(5mks)
PROGRAM resistors (Input, c) The following information shows
Output ); the income and expenditure for
VAR “behayote”
R, R1, R2: Real; 1 matatu
for five days. The income from
Begin Monday to Friday was Ksh. 4,000,
Writeln (‘Input R1 and R2’); 9,000, 10,000, 15,000, and
Readln (R1, R2) 1 12,000 respectively while the
expenditure for the same period
R: = 1/ (1/R+ 1/R2); 3 was Kshs. 2,000, e, 000, 7,000,
(reciprocals-1mk, sum/reci – 5,000, and 6,000 respectively.
1mk, result r- 1mk) i) Draw a spreadsheet that would
Writeln ( R); ½ contain the information. Indicate
92
the rows as 1, 2, 3…..And the
columns as a, B, C….
(4mks) 2 7 Rem
2 3 1
A B
1 1
1 BEBA YOTE MATATU
1 1
2 Day Income
(Ksh)
3 Monday 4,000 =0000011
4 Tuesday 9,000 Step 3: Get the Ones
5 Wednesday 10,000 complement of the
6 Thursday 15,000 second value.
7 Friday 12,000 =111110002
Step 4: Add 1 to the
One's complement to
3 columns with titles @ 1 mark each
get Two's complement.
= 3 marks
=11111000
Labeling rows/columns 1
1+
mark
11111001
ii) State the expression that would
Step 5: Add the binary
be used to obtain:
equivalent of the first
I Monday’s profit
value to the Two's
(2mks)
complement of the
= B3-C3
second value.
II Total income
00000100
= SUM(B3:B7) -OR- =B3 + B4
11111001 +
+ B5 + B6 + B7
11111101
III Highest expenditure.
= 111111012
= MAX(C3:C7)
18. (a) Subtract Oil 12 from 10012
(c) Convert: 91Bi6
1001
to octal
0111 –
(3
0010
marks)
=00102 =102
(b) Using two's complement, Step 1: Convert 91B16 to
subtract 7 from 4 and give decimal
the answer in decimal 162 16' 16°
notation.
9 1 B
(4 marks)
Step 1: Write it as 4 + 9xl62 +1x16'+ 11x16°
(-7) 2304+16 + 11 =233110
Step 2: Change the Step 2: Convert 233110 to octal
values to 8 binary 8 2331 Rem
digits.
8 291 3
2 4 Rem
2 2 0 8 36 3
1 0
1 1
8 4 4
4 4
=000001002
(ii) 3768 to
hexadecimal
93
Step 1: Convert 3768 to 19. (a) Explain what the
decimal following DOS commands will do when
executed.
82 81 80 (i) A:\>copy *.* B: (2 marks)
Copy all the files from drive A:
to drive B:
3 7 6 (ii) C:\>ERASE *.DOC (2 marks)
Delete all files with
extension .DOC from drive C:
3x82 + 7x81
+ 6x80
37
68=FE16
(4
marks)
2 9 Rem
2 4 1
2 2 0
1 0 It is connected in such a way
that nodes are in different
1 1
levels of control such that
0.625x2-1.25 1 higher nodes control those
0.250x2 = 0.50 0 below them.
0.50x2 =1.00 1 A child node has only one
parent but a parent node can
0.62510-1012 have more than one child.
9.62510= 1001.1012 The child nodes can only be
accessed through the parents.
94
is used to instruct the
computer to carry out
(ii) List two advantages (execute) a command that has
and two disadvantages of been typed or selected on the
hierarchical network screen.
topology.
Shift key:
(4 marks)
Advantages (2 marks)
- Provides centralized control.
- Enhances data security &
privacy. It can be used for changing
- Easy to isolate faults. cases, e.g., to get single
- Easy to add and remove capital letters.
nodes. It is used to get the
- If a non-critical node fails, punctuation marks on top of
partial communication is still possible. the Number keys or the
Disadvantages symbols
- Slow data movement along the on top of certain
branches. keys .especially on the
- If the parent node fails, the alphanumeric section.
child nodes are inaccessible. Used for shortcuts in
- Difficult/sophisticated to combination with other keys,
implement in a wide area network. e.g., SHIFT + DEL
50. (a) Name and explain the
function of the keyboard keys (b) Simulation is one of the
represented by the following application areas of computers,
symbols. (i) What is meant by the
term simulation?
(1 mark)
Tab key: Simulation is the designing of
models of either an actual or
(2 marks) theoretical physical item, and
analyzing/testing the
Used in Word processors to execution output using a
move certain text or the cursor computer.
at set intervals on the (ii) Name two application
Same line to the required areas of simulation. (2 marks)
position on the screen. - In training of pilots, using
Used to move from one cell to flight simulators.
another. - In medicine to train doctors
Used to move the cursor on operation techniques.
between options. , - In engineering, e.g.
Used to indent text. - Architectural design (of
buildings)
Enter key: - Design of electronic circuits,
ships, roads and cars.
(2 marks) - Design of bridges.
- Aeronautical engineering
(i.e., design of aircrafts)
It is used as a RETURN key. - To simulate the timing of
When pressed at the end of a traffic lights.
text line or paragraph in a - To simulate the timing of a
word processor, it forces the nuclear attack for testing
text cursor to move to the next national defences.
line or paragraph. - Aviation training.
It is used to issue completion - Laboratory experiments
commands to the computer. It - Missile launch.
95
- Space exploration.
- Vehicle accidents.
- Entertainment, e.g., games.
(iii) State three advantages of
computer based simulation. (3 marks)
Saves cost - it is an
economical/cheap way of
testing models before actually
building them.
It enables the manufacturers
identify weaknesses of the real
situation or object, hence;
put the correct reinforcements
to their designs
Reduces risks - it allows some
activities that would otherwise
be expensive & dangerous in
real-life situation to be put
under test.
Faster.
Convenient. .
(c) Explain three ways in which
computers have impacted on education.
- Standardizing learning.
- Has ensured quality output.
- Brought the need for retraining
staff.
- Enabled distance learning,
- Created jobs, e.g., computer
trainers.
- Causes job displacement and
replacement.
96