admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

State three features of the fifth generation computers (3mks)    [2017 paper 1]

  • Artificial intelligence
  • Parallel processing
  • Natural language processing
  • quantum computing

Define disk formatting and state three reasons for formatting a disk

Definition

  • Disk formatting is the process of preparing a data storage media for initial use

Reasons:

  • To make a disk blank for reuse
  • To make it compatible with another operating system
  • to create tracks and sectors for first time use

Explain the difference between main memory and secondary storage.

  • Main memory is transitory/temporary/volatile, secondary storage is (semi-)permanent
  • The processor can only use data/instructions that are in the main memory
  • Main memory is directly accessible to the processor, secondary storage is not directly accessible to the processor 

Explain how the techniques of

(i) verification,
(ii) validation
are used to ensure that the stored data is as accurate as possible.

Dual input of data

  • Two inputs are compared by the system and any discrepancies are reported (and not stored.)
  • Data input once, either printed out or checked on the screen and  errors corrected

 Rules are given to the processor

  • Only accept A, B, C, D, E, F, G i.e Any other input rejected.

Drop-down list/radio buttons

  • Provides only valid inputs, so no other validation is required

Maranda Mock CRE Paper 2 2024 

c) Six ways in which Christians can assist the physically challenged members of the society (6mks)

Establishing special institutions for them

Donating equipment, which assists them in their movement.

Giving them vocational training

Assisting them in their daily chores

Accepting them as human beings like themselves

Helping them to develop their talents e.g. games, music, drama etc.

Identifying their abilities and giving them employment.

Encouraging relatives to live with them.

Giving them financial assistance to start income generating projects 


 

a) The parable of the shrewd manager in Luke 16:1-33. (7mks)

There was a rich man who had a steward. He received charges that the steward was wasting his goods.

He called him what he was hearing about him. He told him to turn in account of his stewardship for he could no longer be steward.

The steward asked himself what he would do since his master was taking the stewardship away from him.

He was not strong enough to dig and was ashamed to beg.

He decided what to do so that people may receive him into their house when he is out of the stewardship

He was to summon his masters’ debtors one by one. He went to the first one and asked him how much he owned his master. The debtor said a hundred measures of oil, which he was told to write fifty.

He asked another how much he owned his master. He said a hundred measures of wheat he was told to write eighty

The master commended the dishonest steward for his shrewdness for the sons of his world are shrewder in dealing with their own generation that the ones light.


 

Seven causes of conflict between Jesus and the Jewish leader in Jerusalem. (7mks)

They questioned the authority Jesus was using to teach Lk 20:1-8.

Jesus accused them of persecuting and rejecting Gods servants in the parable of tenants. Lk 20:9-18.

They had conflict on the issue of whether to pay taxes to cease or not. Lk 20:19-26

The question on resurrection by the Sadducees on Levites marriage. Lk 20:27-39

He claimed to be the messiah and said that even David called Him Lord in the book of Psalms Lk 20:4-44

Jesus openly condemned the hypocrisy of the Jewish leader Lk 20:45-47

Jesus prophesied the destruction of temple of Jerusalem

He condemned the offerings of the rich Jewish leaders, which were meant to show off, but praised the widows’ offerings, which was made out of self-sacrifice Lk 21:1.


 

Six ways in which parents can resolve misunderstanding with their children. (6mks)

Allowing dialogue

Listening to their views

Presenting them with the correct, picture of the situation

Setting a good example to them

Giving them appropriate time for leisure activities

Seeking help from church leaders

Guiding them on how to choose friends

Advising them on the right moral values

Praying for and with them to bring about understanding 

Committing the children to God’s will

Discussing the problem with their friends and relatives


 

a) Seven reasons why Jesus sent the Holy Spirit to the disciples after his ascension. (7mks)

The holy spirit would comfort the disciples

He was to counsel the disciples

He would guide the disciples on what is right / God’s righteousness

He was to convict people of their sins

He was to show disciples on what is right

He was to reveal the future / enable the disciples to prophet’s / God’s will

He would glorify Jesus through the work of the disciples

He would enable the disciples to witness Christ throughout the world

He would replace the physical presence of Jesus 

He would empower the disciples to be able to speak with courage

b)How the unity of believers is expressed in the body of Christ? (8mks)

St Paul describes the believers as the body of Christ 

Christ is the head of the church

The believers form parts of the body

The body has different organs, in the same way the church has different members

They all need to work together for the well-being of the church 

Every part of the body is needed to make it whole/ all parts interdependent / one part cannot be without the other

The different church members are given different spiritual gifts by the holy spirit to carry out God’s work 

Believers are united through baptism in the Holy Spirit.


 

c)The church in Kenya help to bring about the unity in the country. (6mks)

Assisting the government is developing a curriculum schools that teaches about patriotism

Advocating for peaceful co-existence among Kenyans

Fighting corruption, discrimination, tribalism, nepotism and all forms of favourism

Acting as a voice of reason among the ruling political class demanding their unity as a government

Assisting the less fortunate in the society thus fighting disparity

Condemning and reporting to the relevant authorized groups that bring disharmony in the society

Developing joint rallies, prayers and reconciliatory meetings together.

Forgiving one another to avoid disunity

Obeying church rules/ leaders

Chastity is a virtue


 

a) Attitude of Christian towards human sexuality. (7mks)

Sex is sacred

Man and woman are for companionship

Both man and woman are equal before God

It is for procreation

Man and woman are complementary 

Man and woman were created in the image of God

They became one in marriage

Human beings have the ability to control sexual desire

All forms of irresponsible sex are condemned 

Chastity is a virtue

b)Six ways in which sex is abused in Kenya today. (6mks)

Sex before marriage / fornication/ pre-marital sex

Sex outside marriage / adultery

Prostitution

Bestiality

Homosexuality/ lesbianism/ sodomy/oral sex

Pornographic literature/mass media using of technological devices in sex

Incest

Masturbation

Rape /defilement of minors

c)Why are minors sexually abused in Kenya today? (7mks)

Permissiveness

Lack of self-control

Influence of the mass media

Mental illness / stress/ drug and substance influence

Erosion of the African culture moral value

False religious / devil worship /strange cults

To avenge for oneself

Breakdown of religious values

Irresponsible parenthood

Indecent dressing

Leniency of the law

Idleness

Poverty / unemployment

6 a) Six practices in the African Society that promoted law, order and justice? (6mks)

Cultural taboos/dos and don’ts in the society

Kinship ties had rules which governed their relationships

Oaths – swearing while making agreements.

Rites of passage e.g. during initiation, the youth were taught laws/secrets of society.

Practice of rituals in the society promoted good relationships between the living/living dead.

Communal life i.e. “I am because we are, and since we are therefore Iamb.”

Inheritance of property was done fairly which brought justice /order.

Worship of God/veneration of ancestors created orderliness

b). Seven reasons for the need of law, order and justice in the society. (7mks)

In order to safeguard peoples personal rights.

To ensure security and protection of the people and their property.

To promote peace and harmony

To attract both local and foreign investment in the country

To promote peaceful relationship between countries.

To safeguard freedom of the citizens

To control and check the powers of those in authority

To enable the gov’t to implement its taxation policies effectively and to use the money

collected for the good of the community

To enable Christians worship God in peace and freely spread the good news.


 

c) Explain the factors which hinder effective maintenance of law and order in the (7 marks)

Increase in the rate of crime especially in urban areas

Political instability e.g. Post election violence

Greed for power and wealth

Political selfishness leading to dictatorship and despotism

High rate of unemployment leading to idleness / crime

Corruption especially by custodians of the law e.g. police.

Hypocrisy i.e. leaders misleading the society

High level of poverty forcing others into crime



 

Define Domain integrity

Domain integrity - ensures that all data in  a field contain valid values

Describe how the database can be recovered from a system failure

  • mirrored hard disk/hot standby/second computer
  • re-run the old master file with the transaction file

Give one benefit and one disadvantage of the use of wireless technology.

Advantages

  • no wires
  • fast/high-speed wireless Internet access
  • WLAN is faster than a modem or mobile
  • WLAN for working at home one day a week/teleworkers
  • see internet content away on the move
  • create and send multimedia messages to mobiles or e-mail
  • picture messaging - send photos/pictures text/sound/recorded
  • greetings from mobiles to mobiles/PCs
  • instant transmission - no busy signals/no searching for phone jacks
  • download e-mail and file attachments on mobile
  • watch live webcast on mobile/hotspot
  • listen to streaming video on mobile/hotspot
  • news/weather/sport/games while on the move
  • access information from mobile anytime
  • send/receive/delete e-mail while on the move
  • wireless Inbox on mobile - to contacts and calendar
  • view business appointments while out of the office on mobile
  • send corporate e-mail while out of the office - even behind a firewall on mobile
  • wireless internet connection from chat rooms for discussions with colleagues while on the move
  • give visual demonstrations from mobile and colleagues watch back at the office

 disadvantages e.g.

  • WLAN speeds are slower than Net access at work/narrow band width
  • any one within the WLAN nodes range with an appropriate device can use your WLAN and broad band link
  • any one who walks past your house or WLAN linked into a corporate system can access sensitive information or credit card details
  • 3G phones not compatible with 2G phones
  • Blue tooth - has limited range
  • blocked signal/distorted signal/weak signal/lag
  • health problems from microwaves

State four tasks performed at the analysis stage in systems analysis.

  • understand the current system
  • produce data flow diagrams/system flowchart
  • identify user/client requirements/objectives
  • interpret user/client requirements/objectives
  • agree requirements/objectives with the user/client
  • collect data from the current system
  • fact finding (e.g. questionnaires, interviewing, etc.)
  • problem identification

A company making televisions has introduced robots to replace the human work force.

(a) Describe three effects this would have on the work force

(b) Give two advantages to the company of introducing robots

(c) How could the robots be trained to assemble the televisions?

(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?

(a) Describe three effects this would have on the work force

  • loss of jobs/unemployment
  • deskilling
  • need to re-train
  • different jobs available/re-skilling
  • no longer need to do hazardous/tedious jobs

(b) Give two advantages to the company of introducing robots

lower work force costs (no salaries to pay)

  • lower environmental costs (less electricity for heating/lighting)
  • higher throughput
  • more consistent product
  • robots don’t need breaks, holidays/work 24/7 etc.
  • robots don’t take industrial action

(c) How could the robots be trained to assemble the televisions?

  • tasks repeated by skilled worker and how each task is done is memorised
  • tasks programmed directly into the computer/robot memor

(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?

  • if parts missing for a sequence, then a warning should be given and the assembly stopped
  • several quality control stages to spot an error early on
  • program in checks at each stage of assembly so robots can detect a fault immediately

State four factors to consider when acquiring computer software

  • Authenticity
  • Users' needs
  • Availability of documentation
  • Cost
  • Compatibility
  • Upgradability
  • Portability

Explain the functions of the following parts of the CPU

Control Unit; Decodes instruction; Controls the fetching and writing of data;

Arithmetic Logic Unit/ ALU; Executes mathematical instructions;  Executes logical instructions; Compares values held in registers;

 Clock; Controls the number of instructions carried out each second;   allows the CPU to synchronize operations;

State examples of wireless transmission media

  • Broadcast Radio
  • Infrared
  • Bluetooth
  • Microwaves
  • Satellite

Explain, with examples where appropriate, the following five computer terms.

(a) Buffer

(b)batch processing

(c) e-commerce

(d) simulation

(a) Buffer

  • temporary storage or memory which compensates for the difference speed of peripherals and the CPU

(b)batch processing

  • processing doesn’t start until all data is collected
  • JCL (any reference to Job Control Language)
  • no need for user interaction
  • processed all in one go
  • done at “quiet” times
  • e.g. billing, payroll, cheque processing

(c) e-commerce

  • electronic commerce
  • buying and selling products/services using the internet/computer networks

(d) simulation

  • studying the behaviour of a system by using a model/mathematical representation
  • results can be predicted
  • e.g. flight (or other) simulator, modelling hazardous chemical process

(e) Email

  • sending messages from one device to another using computer networks/Internet

IT technicians are setting up a new file server for a school. Describe the benefits and drawbacks of using a command line interface (CLI) rather than a graphical user interface (GUI) to set up a new file server.  (4marks)

Benefits

  • The user is not restricted to the predetermined options//the GUI uses icons and set menus
  • The user has more control over the computer settings//in GUI computer settings are protected from the user
  • Uses less memory than GUI
  • Requires less processing power for the interface
  • More processing power is made available for the task

Drawbacks

  • The commands used have to be learnt
  • The commands used have to be remembered
  • The commands used have to be typed in/entered exactly
  • Have to remember the exact path/correct name of application
  • More prone to errors on data entry Commands have to be typed in//in a GUI can use touchscreens/mice
  • Tends to be used by specialist people//GUI is more user-friendly and can be used by non-experts

Give four features of a Data Protection Act

  • data must be up to date
  •  data can only be read/used for the purpose for which it was collected
  • data must be adequate, relevant and not excessive
  • data must be accurate
  • data must be destroyed when no longer needed/don’t keep longer than necessary
  • data user must register what data stored
  • data must be used/collected fairly and lawfully
  • data must be held securely
  • data must be protected from accidental damage
  • only authorised personnel can have access to the data
  • fines are imposed for data mis-use
  • data should not be passed on to a third party without permission
  • a person can view data and have it changed/removed if incorrect

State the type of software that is needed for logging onto the Internet and finding websites selling goods and services.

  1. logging on
  2. finding websites

logging on

  •  dial-up/communications software/ISPsoftware

finding websites

  •  browser/search engine

COMPUTER STUDIES 2016 PAPER 1

  1. Identify any computer output device suitable for each of the following tasks:
  1. Generating receipts where carbon copies are required  (1mk)
  • Impact printers e.g dot matrix

     b) an architectural drawing where precision is required         (1mk)

  • Plotter

(c ) producing document output for a visually impaired person (1mk)

  • Braille/speakers
  1. Pesa Tele has offices in Nairobi and Kampala connected in a network . the management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem (3mks)
  • Encryption
  • Firewall
  • Audit trail/tracking
  • Use of passwords
  • Limit the number of log-in attempts
  1. Explain two ways in which the use of internet could make reporting of corruption easier (4mks)
  • Interactive: the internet based technology enables real-time dialogue hence instantaneous reporting of cases
  • Outreach: the technology allows the coverage of wide areas
  • Social mobilization : it easy to create a network of people with similar concerns
  • Anonymity : it is easier to report corruption without being  known
  • Security: the message sent reaches destination without being intruded
  1. State ways in which software errors can be prevent during program development
  • Use of antivirus software
  • Performing system update frequently
  • Testing the software before implementation
  • Proper training

State the types of storage devices used in a computer

  1. Primary Storage (Memory):

    • Random Access Memory (RAM): This is a volatile memory used to store data and instructions that the CPU (Central Processing Unit) can access quickly. RAM is essential for running applications and the operating system. However, its contents are lost when the computer is powered off.
    • Read-Only Memory (ROM): ROM is a non-volatile memory that stores essential firmware and instructions necessary for the computer's boot-up process. It retains its contents even when the power is turned off.
    • Cache Memory: Cache is a small and fast memory located closer to the CPU. It stores frequently accessed data to speed up the processing.
  2. Secondary Storage (Mass Storage):

    • Hard Disk Drive (HDD): HDDs use magnetic storage to store data on rotating platters. They provide relatively large storage capacities and are commonly used in computers and laptops for long-term data storage.
    • Solid-State Drive (SSD): SSDs use NAND flash memory to store data, offering faster read and write speeds than HDDs. They are more durable and consume less power, making them increasingly popular in modern computers.
    • Optical Discs: CDs, DVDs, and Blu-ray discs are examples of optical storage media. They are mainly used for distribution of software, music, movies, and archival purposes.
    • USB Flash Drives: Also known as thumb drives or pen drives, these portable storage devices use flash memory to store data and can be easily connected to a computer's USB port.
    • Memory Cards: Memory cards, such as SD cards and microSD cards, are used in various devices like cameras, smartphones, and tablets to store data, photos, videos, etc.
    • External Hard Drives: These are HDDs or SSDs contained within an external enclosure, allowing users to expand their computer's storage capacity or create backups.

KCSE 2003 COMPUTER STUDIES

SECTION A (40 MARKS)

Answer all the questions in this section

1.Computer systems are built from three types of physical components: processors,memories and 1/O devices.

  a) State two tasks of a processor                                                            (2 mks)

  b)State function of 1/O devices                                                               (1 mk)

2. Threats to the safety of computer systems take many forms such as:  white-collar crime, natural disasters, vandalism and carelessness.Give on way as to how each of these forms of threats can be controlled.    2 mks)

3.a) Explain the term nibbles as used in data representation in computers

   b)Perform the following binary arithmetic giving the answers in decimal notation.     (3 mks)

       i)1110.01111 + 11010001 .011

        ii) 1001011.011 - 111.111

     4  a)  Distinguish between machine and assembly language           (2mks)

         b) State the type of translator necessary for a program written in:         (2mks)

            i) High level language

           ii)Assembly language                                                    

5. Briefly explain the purpose of the following types of program documentation: (3mks)

    a)  User manual

     b) Reference guide

     c) Quick reference guide

6. State any two features of a user-friendly program.      (2mks)

7 a) Distinguish between labels and formulae with respect to spreadsheets (2mks)

   b) Consider the entries in the cells below.

 

Cell

B2

B3

C10

C11

C13

Entry

200

100

B2

B3

C10

State the value displayed in cell C13                                      (2 mks)

8.List three differences between wide area Networks (WAN) and Local Area Networks (LAN)      (3mks)

9. Study the flowchart segment below and state the last value printed from the flowchart.         (2 mks)

10.  a) What is an expert system                                                        (1mk)

      b)State any two components of an expert system                     (2mks)

11. give two reasons why optical disks are better storage media compared to floppy diskettes  (2mks)

12.What are the Dos commands used for the following?                       (2mks)

            a) Changing directories

            b) Viewing directories

           c)  Renaming directories

            d) Deleting a directory

13. Distinguish between copying and moving text                                  (2mks)

14. a) Name two methods of paper orientation                                (1mk)

     b)Name two keys used to delete text in a document   (1 mk)

15.Name two features a Database package                                             (2mks)

SECTION B (60 MKS)

Answer question and any other three questions from this section

16.       Study the flowchart below and answer the questions that follow.

 a)Write a high-level language program for the above flowchart (7mks)

 b)List the outputs of the flowchart above                                 (5 mks)

 c) Modify the flowchart so that it adds up all its outputs and displays the sum obtained  (3mks)

17. A computer specification has the following details:

  •  Pentium II
  • 1.44 MB floppy disk drive
  • 20 GB hard disk
  • Full multimedia
  • 17” SVGA monitor
  • Pre-installed operating system
  • Pre-installed office suite

     a)  What is meant by

       i)  1.44 MB floppy disk drive?

       ii)20 GB hard disk?

      iii) 17” SVGA monitor

     b) Which operating system might be pre-installed in this computer and why?         (2mks)

     c) List three multimedia components                                          (3 mks)

      d) i)  what is meant by computer aided manufacture?        (2 mks)

          ii)  Give two examples of computer aided design software.       (2mks)

18. a)Give three examples of network software                                          (3mks)

     b)List any three items that may be referred to as data terminal equipment in a network     (3 mks)

     c)Briefly explain the following terms as used in networking   (4mks)

      i) Remote communication

      ii)Distributed processing

      d) State three advantages and two disadvantages of mesh network topology. (5mks)

19. a)  a company has decided to computerize their operations.  They have decided to purchase package instead of developing their own programs.  Give three advantages and two disadvantages of this approach. 5mks)

      b) i) explain why a value such as 611233444555 may be displayed as ######### When typed in a cell of a spreadsheet (2mks)

       ii)  How can the problem in b (i) above be corrected?      (2mks)

      c) With reasons, briefly describe the most appropriate type of printer output device for the output of:  (6mks)

      i) Customer invoices on multi-part stationery

     ii) Letters to customers

     iii)Detailed engineering designs

20. a)  Distinguish between the following pair of terms                                (6mks)

      i) Data verification and data validation

      ii)Data encryption and passwords