admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

KCSE Computer Studies Paper 1, 2001

SECTION A (40 MARKS)

ANSWER ALL THE QUESTIONS IN THIS SECTION

1.Compare the two types of diskettes used in microcomputers in terms of physical size and densities.    (2mks)

2.Why is it necessary to have a UPS in a computer laboratory?  (2mks)

3 a) Explain what is meant by batch processing   (1mk)

   b) Give one advantage and one disadvantage of batch processing ( 2mks)

4. List any four high level programming languages  (2mks)

5.A 3 by 4 matrix M is to be added to another 3 by 4 matrix array N so as to give a third 3 by 4 matrix array P.  Using a high level programming language, write a program segment that assigns the sum of M and N to P.(4mks)

6. The first column in the table below contains the formulae as stored into the cell F10 of a spreadsheet.  Enter the formulae, as they would appear when copied to the cell M20 of the same spreadsheet.  (3mks)

           

Formula in F10

Formula in m20

=D10* E10

 

=A$ 25

 

=$ D$13

 

                                                                                                                                                                 

7.  Give three advantages of separating data from the applications that use the data in database design. (3mks)

8.  Explain the impact of information on organizations in each of the following areas:  (2mks)

   a) Competition

   b) Pace of growth

9. a) List any four tasks that an electronic spreadsheet should be able to perform other than calculations  (2mks)

    b) Explain what is meant by automatic recalculation as used in a spreadsheet.(1 mk)

10. Describe the functions of the following computer hardware components:

   a)Mouse                     (2 ½  mks)

   b)Scanner.                   (1 ½ mks)

11. a)State two differences between Disk Operating System (DOS) and WINDOWS operating system.

 b. i) Define the term application software  (1mk)

     ii) Give one example of application software (1mk)

12. a)  Give one difference between internal and external commands in Disk Operating System.   (2mks)

      b)  Name two DOS commands that may be used for checking disk errors.  (2mks)

13. Explain how a paragraph can be moved from one place to another in word-processing. 2mks)

14.  Define the term structured programming. (2mks)

SECTION B (60MKS)

Answer question 15 and any other three questions from this section.

15.a)  What is meant by each of the following terms:

 i)   pseudocode        (1 ½ mks)

  ii)  Flowchart           (1 ½ mks)

b) a program is required to list the first 1000 numbers in the series:  2, 4, 6, 8,

10. Draw a flowchart and write a program that can be carried out this task.   (12 mks)

16. The following car details are to be entered in a database; make, date-of-manufacture, colour and cost.

 a) Prepare a suitable database structure showing field names and their field types   (5mks)

 b) Explain how you index the data such that cars of the same make and colours are together   (2mks)

 c)  Write a statement that can be used to select cars of the colour green        (2 mks)

 d) Give an instruction that would;

  i)select cars whose cost lie between 500,000/= and 1,000,000/=  (3 mks)

 ii)Determine the average cost of all cars         (3mks)

17.  a)The diagram below represents the essential features o a computer system. Study the diagram and answer the questions that follow:

 

i)Name the components (4mks)

            A

            B

            C

            D

ii) On the diagram above, indicate the direction of data flow using arrows.  (3mks)

b) Name the three types of buses in a computer system (3mks)

c) Explain how CPU registers may be used to carry out a basic calculation such as:2 + 7 = 9

d) Name two computers output devices. (1 Mark)

18. a)State three ways in which computer technology may affect employment patterns in organizations   (3mks)

b) State three ways in which computer technology may affect employment patterns in organizations (3mks)

c)Suggest three strategies that can be employed to manage resistance to change  (3mks)

d) Give three advantages of computerization in an organization.  (3mks)

19. a)In a computer based information system, state the purpose of the following files and give one example where such a file may be required in a school.                (8mks)

i) report file

ii)Back-up file

iii)Reference file

iv) Sort file

b) State three precautions that should be taken to ensure that diskettes are well stored.  (3 mks)

c)  Distinguish between “serial” and Indexed sequential” file organization methods.  (2mks)

d)  Distinguish between binary and octal number systems and give an example of each  (2mks)

 

Describe how ICT is used in marketing

  • ICT provides graphic design tools that allow marketers to create visual content for ads , websites and even social media
  • computers enable marketers to produce video content crucial for modern digital marketing using video editing tools 
  • Computers are used to distribute and analyze online survey polls  that help in understanding customer preferences
  • Social media platforms offer ad placement based on user demographics and interest
  • Online marketing
  • Social media marketing
  • Target marketing
  • Email marketing
  • Blogging

What is a Uniform Resource Locator?

  • It is an address to a resource on the internet

Differentiate between uploading and downloading a file

Uploading a file  refers to the process of transferring a file from a local computer to a remote webserver while downloading a file refers to the process of transferring or copying a file from a remote webserver to a local machine

Satellite services are used to provide broadband internet connectivity to regional and remote areas of Kenya. State one advantage and one disadvantage of using satellites for this purpose.

Advantages

  • can cover large areas
  • requires minimal land-based transmission support
  • requires minimal infrastructure to provide internet access
  • minimal impact on the environment or humans.

Disadvantages

  • transmission speeds are not comparable with other forms of transmission
  • data costs are expensive by comparison to other forms of transmission
  • expensive to deliver.

Journalists are issued with laptops when they start working at a magazine publishing company. The company only uses free open-source software (FOSS).

  • 2.1.1 Explain the concept of open source in the context of FOSS. (2)
  • 2.1.2 Give ONE example of a free operating system the company could install on a laptop. (1)
  • 2.1.3 State TWO disadvantages of using free open-source software.

The laptops are equipped with either an HDD or an SSD.

  • 2.2.1 Users of laptops equipped with HDDs are advised to defragment the HDD regularly.
  • Briefly explain what defragmentation is. (2)
  • 2.2.2 Write out the abbreviation SSD in full. (1)
  • 2.2.3 Explain why an SSD accesses the data faster than an HDD.

The journalists can access their data remotely using virtualisation or Software
as a Service (SaaS).
2.3.1 Define the term virtualisation. (1)
2.3.2 Office365 is an example of SaaS.
(a) Except for remote data access, state TWO benefits of using
SaaS. (2)
(b) Describe how the license model of SaaS works. (2)

  • 2.4 The company takes precautionary measures to protect the magazine's data.
  • 2.4.1 An incremental backup strategy has been implemented to safeguard data. Explain how an incremental backup strategy works. (2)
  • 2.4.2 The company considers installing biometric readers on all the laptops. How would a biometric reader help safeguard the data on a laptop?

 

2.1.1 Explain the concept of open source in the context of FOSS. (2)

  • Is a software whose source available and user can modify and redistribute

Give ONE example of a free operating system the company could install on a laptop. (1)

  • Linux
  • FreeBSD
  • ReactOS
  • Android
  • ChromeOS
  • OpenSolaris

2.1.3 State TWO disadvantages of using free open-source software.

  • Lack of support
  • Security risks
  • Compatibility issues
  • Hidden costs

State the functions of the following registers

Program counter // PC
Stores the address of the next instruction to be fetched
Memory address register // MAR
Stores the address where data/instruction is to be read from or saved to
Memory data register // MDR
Stores data that is about to be written to memory // Stores data that has just been read from memory
Current instruction register // CIR
Stores the instruction that is currently being decoded/executed

Identify four different types of computer network.

  1. MAN
  2. WAN
  3. PAN
  4. LAN

Differentiate between a switch and a hub

A switch forwards data packets directly to the address of the node using point to point transmission method. A hub broadcast the data packets to all computers on the network

The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set.

(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.

  • All the characters and symbols that can be represented by a computer system.
  • Each character and symbol is assigned a unique value.

(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is

that the text stored takes up more storage space

  • Each character is encoded using more bits

 

Interfaces enable computer users to interact with the operating system.

(a) State four advantages for using a graphical user interface in loading programs and files

(b) A vehicle assembly company has introduced robots to replace the human workforce.  State two effects this would have on the workforce

State four advantages for using a graphical user interface in loading programs and files

  • User friendly
  • No need to know command language as commands are executed by clicking on icons
  • Allows multitasking as several programs open at the same time therefore easier to switch between applications
  • Selecting an item using a mouse is easier and faster than entering commands

Or any other correct response

Advantage @ 1 Mark

Total = 4 X 1 Mark

= 4 Marks

 

A vehicle assembly company has introduced robots to replace the human workforce.  State two effects this would have on the workforce                

  • Unemployment
  • Need to retrain
  • No longer need to do hazardous or tedious jobs
  • Employment of skilled staff who will manipulate the robots

Or any other correct response

Effect @ 1 Mark

Total = 2 X 1 Mark

= 2 Marks

Explain why a developer, who is good at both low-level and high-level programming, would normally use high-level languages when writing programs                                                                                    [4 marks]

  • High-level languages have built-in functions;
  • High-level languages have built-in libraries;
  •  High-level languages have more support/help;
  • High-level languages have structures (such as selection and iteration);
  • High-level languages can be less machine-dependent/more portable;
  • It (usually) requires fewer lines of code to be written;
  • It is (usually) quicker to develop code in high-level languages;
  • It is easier to find mistakes in code;
  • The code is easier to maintain//understand;
  • • It is easier to structure code in high-level languages;

Explain what happens in the computer during the booting process

The booting process is the sequence of events that occur when a computer is turned on or restarted. It involves a series of steps that allow the computer's operating system to initialize and become functional. Here's a simplified explanation of what happens during the booting process:

  1. Power-On Self-Test (POST): When the computer is powered on, the first thing it does is perform a Power-On Self-Test. During this step, the computer's hardware components, such as the CPU, memory, and storage devices, are checked for proper functioning. The POST verifies that all essential hardware components are present and operational.

  2. Bootloader: Once the POST is completed, the computer looks for the bootloader. The bootloader is a small program stored in the computer's firmware or on the bootable device (such as the hard drive or a USB drive). It is responsible for loading the operating system.

  3. Loading the Operating System: The bootloader locates the operating system's files and initiates the loading process. It may display a boot menu allowing the user to choose the operating system if multiple options are available. The selected operating system's core files are loaded into the computer's memory.

  4. Kernel Initialization: The operating system's kernel, which is the central component responsible for managing system resources, is initialized. The kernel sets up essential components such as device drivers, memory management, and process management.

  5. System Initialization: After the kernel is initialized, the operating system proceeds with system initialization. During this stage, various system services and processes are started, and hardware devices are initialized and configured. The operating system loads essential system files and prepares the environment for user interaction.

  6. Login/Graphical Interface: Once the system initialization is complete, the user is presented with a login prompt or a graphical user interface (GUI). The user can then log in with their credentials or interact with the GUI to access the computer's functionalities.

What is utility software?

  • System software that analyses, configures, optimises and maintains a computer system

Explain two computer hardware features that may be considered when selecting a laptop computer to be used in developing a KCSE computer studies project (4mks)

Multimedia Capability - A laptop with strong multimedia capabilities is essential for a computer studies project submitted on CD-RW. This ensures that the laptop can efficiently handle multimedia content, providing a seamless experience in creating and presenting project materials.

Processor Speed - Opting for a laptop with a high processor speed is crucial. This feature enables the smooth execution of multiple applications simultaneously, enhancing overall project efficiency and reducing processing delays.

Hard Disk Capacity - Consider a laptop with ample hard disk capacity, as the Microsoft Office suite used in computer projects requires significant space for the installation and storage of project files. A spacious hard drive ensures that there is sufficient room for data and applications.

Main Memory Capacity - Given that students often work with multiple programs concurrently during a project, it's important to choose a laptop with an adequate main memory size. A smaller main memory may result in performance issues, hindering the seamless operation of various software applications during project development.

 

State three documents that are used during mail merging in word processing

  • Main document
  • Data source
  • merged document

List three electronic data processing modes used in computers

  • Realtime processing
  • Batch processing
  • Timesharing
  • multiprogramming
  • Online
  • Batch
  • Distributed

Describe the purpose of a data dictionary, using an address book database as an example.

  • when designing a database a data dictionary provides the description and purpose of the fields/attributes of the database table(s). For example the field name (i.e. “phone number”), the data type (text); the size of the field (10) etc.

Fibre optic cable is available in either single-mode or multi-mode. Outline the characteristics of each mode.

  • Single-mode fibre consists of a narrow core in which all light pulses travel at the same speed and arrive roughly at the same time at the destination.
  • Supports higher bandwidth with less signal loss over a greater distance
  • Multi-mode Multi-mode fibre consists of a larger core in which multiple light pulses can travel down the core.
  • Supports a smaller bandwidth and signals attenuate at a shorter distance than single mode fibre.

Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.

  • All nodes ‘listen’ for traffic to sense when the network is idle.
  • When a node wishes to transmit, it transmits a ‘request to send’ frame’ (RTS)
  • The intended receiving device will transmit a ‘clear to send’ (CTS) frame if it is available.
  • All other nodes ‘sense’ the network is busy and wait a random amount of time before trying to transmit