Describe what is meant by ‘RAID 10’.
a) What is an operating system? (1 mark)
b) Briefly explain any four functions of an operating system. (8 marks)
c) Describe each of the following data processing methods: [6 marks]
a) What is an operating system? (1 mark)
b) Briefly explain any four functions of an operating system. (8 marks)
Interrupt handling - When an interrupt occurs, the current state of the CPU is saved & the OS handles the request, after which the OS restores the previous state of the CPU & resumes the interrupted process.
Process scheduling - OS decides which process runs next & for how long.
Memory management - Ensures that each process has enough memory allocated to execute without interfering with other processes.
Error handling - OS provides a mechanism to detect & respond to errors such as segmentation faults, hardware failures, or invalid instructions.
Describe two benefits of using USB connections between a computer and a device.
Satellite services are used to provide broadband internet connectivity to regional and remote areas of Kenya. State one advantage and one disadvantage of using satellites for this purpose.
Advantages
Disadvantages
Describe the query criteria given below
(a) Like "*kenya*"
(b) Like "*ina"
(c) Like U*
(d) Not Like U*
(e) >= "Mexico"
(f) Like "[A-D]*"
(g) "USA" Or "UK"
State three functions of a network operating system
Compare and contrast CLI and GUI
CLI
GUI
Comparison
What is a network server?
State and explain characteristics of an algorithm
Input : An algorithm can take 0 or more inputs well defined outputs
Finiteness: an algorithm must terminate in finite time and after finite number of steps.
Definiteness : an algorithm must be clear and unambiguous. Each and every step of an algorithm must be clear and precise and it must have only one meaning
Feasibility: should be feasible with the available resources
Output : must produce at least one well defined output
Independent : should have a step-by-step directions which is independent of any programming language
Correctness: should solve the problem it is designed to solve
Efficiency: must take the shortest time possible to run and should require the least memory space. It should use a minimum number of computation steps and memory to produce the desired output. takes little time and memory to run
Generality: should not be limited to a specific case. It should work for all the valid inputs. works for many possible inputs
Effectiveness : should statements that are relevant to the problem. Every step must be basic and essential.
Define the following
(a) Cookies
(b) Spyware
(c) Phishing
(d)Spam
(e) Pharming
(a) Cookies
(b) Spyware
(c) Phishing
(d)Spam
(e) Pharming
State the name of the storage space used by the operating system when there is insufficient RAM
KCSE 2002 COMPUTER STUDIES PAPER 1
SECTION A (40 MARKS)
1.Describe the purpose of each of the following computer functional units: (2mks)
a) Control
b) Storage
2.Explain how each of the following would affect the suitability of a room for use as a computer room: (2mks)
a) Burglar proofed door
b)Availability of taps and sinks in the room
3.State three data representation codes used in computers (3mks)
4.State two types of documentation in program development and give the purpose of each. (4mks)
5.Suppose a 5 element array A contains the values 9, 12, 17, 7 and 20. Find the value in A after executing the loop below:
Repeat for k = 1 to 4
Set A [k +1]: = A [k]
[End of loop] (3mks)
6.State any three activities that occur in a program compilation process (3mks)
7.The formula = k20 + P$ 18 was typed in cell L21 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24.(2mks)
8.State two ways in which a computer may be used in the efficient running of a hospital (2mks)
9.List three disadvantages of using the traditional file management method (3mks)
10.Give one disadvantage of a single processor multi-user system (1mk)
11. List three differences between a micro-computer and a super-computer. (3mks)
12.State and explain two reasons why word processing is one of the most common applications of many computer users. (2mks)
13. write- 1 in twos complement notation in byte form (4mks)
14.Explain the following input/output terms as used in computer systems. Give an example for each (4mks)
a) Read
b) Write
15.State two disadvantages of networking.
SECTION B (60 MKS)
Answer question 16 and any other three questions from this section.
16.The following flowchart can be used to list the odd numbers between 0 and 100
a)Write a program segment for the flowchart using a high level language. (7mks)
b)What would be the output from the flowchart if the statement in the decision box is changed to: (3 mks)
i) Odd = 100
ii) Odd< 100
iii) Odd> 100
c) Modify the flowchart so that it prints only the sum of the odd number between 0 and 100 (5mks)
17.a) List five precautions that can be taken to protect data stored in diskettes (5mks)
b)State and explain two precautions that can be taken to help recover data lost through accidental erasure. (4mks)
c) Describe each of the following data processing methods: (6mks)
i) Batch processing
ii) Distributed processing
iii) Multiprogramming
18. a) i) What is a computer keyboard? (1 mk)
ii) ist four types of keys found on a computer keyboard. Give an example of each(4mks)
b) Give four differences between present day’s computers and the older generation of computers (4mks)
c) i) State three advantages and one disadvantage of using a laser printer. (4mks)
ii) Distinguish between a line printer and a page printer (2mks)
19 a) Identity three public Universities and three National Polytechnics in Kenya where further computer training is offered. In case, state the highest level of qualification that can be acquired in computer training. (6 mks)
b) Distinguish between “Job replacement” and “Job displacement” in reference to computerization. (2mks)
c) Give four reasons why a firm may decide to computerize its operations. (4mks)
d) An individual has a right to demand a guarantee of privacy of personal information stored on a computer.Give three such types of information. (3mks)
20. a) Give three comparisons of the traditional file management method of typing a document on a typewriter against using a word processor. (6mks)
b) i) Define the term spreadsheet (1 mk)
ii) Give two examples of spreadsheet packages available in the market today (2mks)
c) Explain the following terms as used in a spreadsheet:
i) What if …analysis (2 mks)
ii) Cell (1 mk)
iii) Formula (1mk)
iv) Pie chart (2 mks)
For your item named in (a) describe two different tasks that the microprocessor performs.
Outline one advantage and one disadvantage of interviews and questionnaires as data gathering techniques.
Interviews
Advantages
Disadvantages
Questionnaire
Advantages
Disadvantages
Define Data Security
State one ethical responsibility of software users
Interfaces enable computer users to interact with the operating system. State three advantages of using a graphical user interface (GUI) for loading programs and files.
Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access
State the factors that affect the performance of the CPU
Number of cores
The number of cores a processor has directly affects the performance of the processor. Each core can perform its own fetch-execute cycle independently of others, so different applications can be allocated to different cores. Quad-core (four-core) and even octa-core (eight-core) processors are becoming common
Cache memory
A processor’s cache is a small portion of incredibly fast memory. It has read and write speeds far higher than hard disk drives and even SSDs. The cache is used to store frequently used information and reduces time wasted in fetching the same information from main memory time and time again
Clock speed
A processor’s clock speed relates to the frequency of the pulses generated by the system clock. The higher the frequency, the more cycles of the fetch-execute cycle can be completed in the same period of time.
Word length
A word is a group of bits that is treated as a single unit by a processor. Words can be used for representing both instructions and data. The length of a word is the number of bits that are assigned to it, with higher word lengths allowing for more bits to be transferred and manipulated as a single unit.
Address bus width
The width of a bus relates to the number wires that make up the bus. Increasing the width of the address bus increases the range of addresses that it can specify, hence increasing the computer’s amount of addressable memory. Adding a single wire doubles the number of addressable memory locations
Data bus width
Increasing the width of the data bus increases the volume of data that can be transferred over the bus at any one time. A wider data bus allows the processor to fetch more data from the main memory in one cycle of the fetch-execute cycle, reducing the number of cycles required to fetch large volumes of data.
The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set.
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space