Data integrity in a database can be divided into three categories: referential integrity, domain integrity and entity integrity.
(a)Outline the meaning of each of the following.
(i) Referential integrity
(ii) Entity integrity
(b) Describe how data integrity can improve the process of database management. (2 marks)
(i) Referential integrity
(ii) Entity integrity
(b) Describe how data integrity can improve the process of database management. (2 marks)
Distinguish between a file and a folder
A file is a collection of related data given a unique name while a folder is named storage location on a storage media that contains related files
1. State two ways in which a computer may be used in a healthcare sector other than record keeping
Give two other uses of hexadecimal in computer science.
State two effects of a computer virus
Differentiate between Physical and logical topologies
5 Artificial intelligence is an emerging trend in computer science.
(a) Discuss the use of artificial intelligence by describing some of its characteristics, the ways in which it may be used and the ethical issues associated with its use.
Branch of computer science based on enabling computers to
behave like humans/mimic aspects of human intelligence
• AI is implemented in software.
• Combines psychology, biology, linguistics, mathematics, neuroscience,
and philosophy (ethics)
• AI is not the same as the general intelligence of human beings
Uses – Any of the following:
• Game playing (chess, quiz, video games)
• Analytics (analyse buying patterns, predicting behaviours, predictive
text, financial markets)
• Image processing (recognising objects/patterns)
• Logistics (scheduling, order fulfilment)
• Control systems (cars, manufacturing, weapons, navigation)
• Expert systems (medical, mechanical, electrical diagnosis)
• Neural networks (simulating neuron behaviours as in brains)
• Natural languages processing (chatterbots, chatbots, speech
recognition)
• Robotics (dangerous situations, help aged or disabled)
Ethical issues – Any of the following:
• Take the work of humans, thereby affecting employment rates
• Is a computer to be trusted to make decisions (life-death)?
• If a computer discovers something that humans can’t prove, should it be
accepted as truth?
• Do AI machines have rights?
• Will people be comfortable interacting with machines that are
considered intelligent?
Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.
Describe the following features of a graphical user interface:
(a) Pointer
(b) Desktop
(a) Pointer
(b) Desktop
Apart from the user interface, name three other components that make up a typical expert system.
– knowledge base
– rule(s) base
– inference engine
– explanation system
– (expert system) shell
State the function of a switch in a computer network
Give three examples of how data can be damaged accidentally
A supermarket uses point of sale (POS) terminals at the checkout for scanning barcodes on the products.
(a) State two items of data that are stored on the barcode.
(b) Describe how the computer system checks that the barcode has been read correctly.
(c) State the type of file access that is used to get the price from the central computer.
(d) Explain how the system updates the file when an item has been sold.
(a) State two items of data that are stored on the barcode.
(b) Describe how the computer system checks that the barcode has been read correctly.
(c) State the type of file access that is used to get the price from the central computer.
(d) Explain how the system updates the file when an item has been sold.
State the functions of the following:
Bridge: Joins together two networks that use the same base protocols.
Hub: Copies all packets of data to all devices on the network.
Router: Stores the addresses of computers on the network and transfers data between devices.
Switch : Analyses each data packet and sends it to the computer it was intended for.
Computer Studies KCSE 2006 Paper 1
SECTION A (40 MARKS)
1.What is meant by
a)Analogue data
b)Digital data (4 mks)
2. Distinguish between transcription and transposition types of errors and give an example of each (4mks)
3. a)What are peripheral devices? (1mk)
b)Give two examples of peripheral devices (1mk)
4a)What meant by the term user-friendly as used in software development? (1mk)
b)Distinguish between the terms single-tasking and multi-user as used in operating systems (2mks)
5.What actions should be taken in case of a fire outbreak in the computer laboratory? (4mks)
6a) What is an Internet Service Provider? (1mk)
b) An employee in a business company is charged with the responsibility of putting the company advertisements on the Internet.
i) State the professional title of the employee. (1mk)
ii) Give an example of software used by this employee to carry out the above task. (1mk)
7.Differentiate between COM ports and LPT ports (2mks)
8.Explain two ways in which ICT can enhance commerce. (2mks)
9. Explain the following software terms:
a) Portability (1 mk)
b) Modularity (1 mk)
10. a) State two application areas of desktop publishing software. (2mks)
b) Explain the following graphic terms:
i) Rotate (1 mk)
ii) Crop (1mk)
12. a)List two arithmetic operations that can be performed on a row of numeric data in a word processing table. (1 mk)
b) In each case of (a) above, write the expression used. (2mks)
13. List two methods of gathering information during the system development process (2mks)
14.Name three types of optical disks.(3mks)
15.The diagram below shows a formatted plate surface of a storage disk.
Shade and label:
a) one sector ( 1mk)
b) One block (1mk)
SECTION B (60 MKS)
Answer question 16 and any other three questions from this section in the space provided
16 a) List two examples of:
i) Third generation languages (2mks)
ii) Object oriented languages (2 mks)
b) Draw a flowchart to compare three non-equal numeric values A, B, C and prints the largest of the three. (11 mks)
17 a) One of the functions of an operating system is job scheduling. Explain what is meant by job scheduling. (1mk)
b)List and explain three types of user interfaces. (6 mks)
c)Describe the following categories of software:
i) Firmware (1mk)
ii) Proprietary software (1mk)
d) a new company XYZ intends to go into the business of desktop publishing. Advise the company on three computer hardware system specification features to consider as a measure of enhancing performance. (6 mks)
18. a) distinguish between the following sets of terms as used in spreadsheets. (2mks)
i)Worksheet and workbook
ii) Filtering and sorting
b) State one way in which a user may reverse the last action taken in a spreadsheet package. (1 mk)
c)The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, . and A, B, C. respectively
One facility of a Software Development Environment is to convert source code to machine code. Name and briefly describe four other facilities commonly found in a Software Development Environment.
Describe four features of the operating system when providing a graphical user interface on a personal computer. Give a suitable example of each feature.
Windows for example a word processing application and a spreadsheet
Menus, for example, allow the user to perform operations or run applications such as right-click to create a new folder
Icons for example a picture of linked computers for networking
Pointers(mouse or touchscreen) for example to select items/trigger events
Shortcuts for example to frequently used applications for example having a shortcut to your mail client on your desktop
File navigation for example when searching the hard disc for a file/folder using a browser
copying / deleting / moving/sorting/naming/searching of files or folders for example copying of a file from the hard drive to a USB pen drive (File handling)
Desktop customisation for example changing the colours and background image
Copy and paste for example between applications e.g. copying a graph from a spreadsheet to a word processor
Error messages for example provide users with error/warning/help messages for example ‘printer out of paper’
451/1
COMPUTER STUDIES
PAPER 1
THEORY
DECEMBER 2021
TIME: 2 HOURS
FORM TWO END OF TERM TWO 2O21 EXAM
451/1
COMPUTER STUDIES
PAPER 1
THEORY
TIME: 2½ HOURS
INSTRUCTIONS TO CANDIDATES:
What is a defragmentation software
Describe two differences between a switch and a repeater