admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

State any four applications of electronic spreadsheets

  • Financial accounting
  • Prediction and forecasting
  • Inventory keeping
  • Budgeting
  • Keeping records

State two advantages and one disadvantage of having a network of computers, rather than a series of stand-alone machines, in a school classroom.

Advantages

  • Sharing of software and data files
  • Sharing of hardware, e.g. printers
  • Communication

Disadvantages

  • Security of files is more of a problem

Explain a situation when each of the following Desktop Publishing programs features may be used when creating a document

(i) Crop - used when handling a graphic and there is a need to remove some of the portions in the graphic

(ii)Transparency - used when there is a need to make background of a graphic visible

Mention at least two trends in the technological revolution of computers.

  • Continual decrease in computer size
  • Improved speed and power of processing
  • Decrease in computer physical size and its related facilities cost

A school opted to use direct changeover approach when installing a new system. Explain three challenges that the school may face as a result of this approach (KCSE 2019)

  • The users may not have gained enough confidence to run the new system
  • It may be very inconveniencing in case the new system fails or faces problems
  • The weaknesses of the old system may not be corrected or may still be transferred to the new system

Explain the term proofreading as used in word processing (2mks) [kcse 2017 Paper 1]

  • It is the use of proofing tools like spelling and grammar checkers and autocorrects to check whether a document has typographical or grammatical errors

Differentiate between object code and source code

  • Object code refers to a program in machine language while source code to a program in a high level language that must be translated to object code for it to be machine readable

Outline three ways through which ICT can used in marketing

ICT is used to create e-commerce platforms that have made business transactions easier and convenient by allowing customers make purchases and payments from anywhere at any time

ICT is used by marketing agents to create exciting multimedia presentations concerning products or services and present them to the target customers using presentation software such MS PowerPoint

Using multimedia, presentation and animation software, it is possible to design attractive advert materials and video clips to display on billboards, broadcast over a television or uploaded on the internet


 

COMPUTER STUDIES

PAPER 1

(THEORY)

OCT./NOV. 2005

2 ½ HOURS

SECTION A (40 MKS)

Answer all the questions in this section.

1. a) What is disk formatting?                                                        (1mk)

b) Indicate whether the following devices are used for input or output  (2mks)

i) Plotter

ii)Light pen

iii)Mouse

iv)Visual display unit

2.a)Explain why the following and give one reason why they are not allowed in a computer laboratory. (2mks)

b) For each of the following give one reason why they are not allowed in a computer laboratory.  (2mks)

i) Smoking

ii)Eating foods

3.Distinguish between Real, integer and Character data types as used in programming (3 mks)

4.The cells k3 to K10 of a worksheet contain remarks on student’s performance such as very good, good, fair and fail depending on the average mark.  Write a formula that can be used to count all students who have the remark “very good”      (3mks)

5.a) State the purpose of registers in a computer system               (1mk)

b)Name two multiprogramming operating systems                   (2 mks)

6.a) A series file comprises of records placed in positions 1 to 10.  State the position of the end of file marker.      (1mk)

  b)State the purpose of each of the following: (2mks)

 i)File server software

ii)Communication software

7.a) Name the control structure depicted by the flowchart below.                   (1 mk)

          

b)Explain the following terms as used in program implementation.      (2mks)

 i)Parallel running

 ii)Direct change over

8. Consider the linear arrays:

 i) AAA (5:50)

 ii)BBB (-5:10)

 iii)CC (18)

Find the number of elements in each array (3mks)

9.Define the term artificial intelligence  (2 mks)

10.Name two types of relationships that can be applied in database design  (2mks)

11.Explain binary Coded Decimal code of data representation (1 mk)

 a)Indenting

 b)Alignment

 c)Word wrap

12.Outline two ways in which a computer can be used in hotels               (2 Marks)

13.a)Explain Binary Coded Decimal code of data representation (1marks)

 b)Write the number 4110 in BCD notation (1 mk)

14.Arrange the following data units in ascending order of size.

   BYTE, FILE, BIT, NIBBlE     (2mks)

15.State two health issues that may result from prolonged use of computers     (2 mks)

SECTION B (60 MARKS)

16. a) State the stage of program development in which  (4 mk)

i) A flowchart would be drawn

 ii)The programmer would check whether the program does as required

 iii)The user guide would be written

iv)The requirements specifications would be written.

b)State the output of the following flow chart segment                  (1mk)

c) i)Draw a flowchart to compute the combined resistance ® of two resistors R1 and R2 in parallel using the formula;

                      (5mks)

ii)Write a program using Pascal or C languages for the flowchart in C (i) above. (5 ½ mks)

17. a)List three paragraph formatting activities in word processing  (3mks)

 b)Differentiate between bolding and highlighting text (2mks)

c) The following information shows the income and expenditure for “bebayote “ matatu for five days.  The income from Monday to Friday was Kshs. 4,000, 9,000, 10, 000, 15,000 and 12,000 respectively while the expenditure for the same period was Kshs.  2,000, 3,000, 7,000, 5,000 and 6,000 respectively

i)Draw a spreadsheet that would contain the information.  Indicate the rows as 1, 2, 3 …. And the columns as a, B, C    (4mks)

ii)State the expression that would be used to obtain:

 I Monday’s profit  (2mks)

 II Total income (2mks)

III)Highest expenditure (2mks)

18.a) Subtract 0112  from 10012 (1mk)

 b)Using two’s compliment, subtract 7 from 4 and give the answer in decimal notation (4mks)

c) Convert

i) 91B16  to octal    (3mks)

ii) 3768   to hexadecimal   (3mks)

iii) 9.62510 to binary  (4 mks)

19.a) Explain what the following DOS commands will do when executed.

    i)  A: \copy *.* B:    (2 mks)

   ii)   C: \> ERASE*. DOC   (2mks)

  iii)   b: \> Md EXAMS  (2mks)

 b)  i)  With the aid of a diagram, explain hierarchical (tree) network topology   (3mks)

  ii)List two advantages and two disadvantage of hierarchical network topology.  (4 mks)

   Advantages:-

   Disadvantages:

20. a)Name and explain the function of the keyboard keys represented by the following symbols.

 

      

 

 

  b) Simulation is one of the application areas of computers        

  i) What is meant by the term simulation      (1mk)

  ii)Name two application areas of simulation   (2 mks)

 iii) State three advantages of computer based simulation (3 mks)

 c) Explain three ways in which computers have impacted education (3mks)

Differentiate between uploading and downloading a file

Uploading a file  refers to the process of transferring a file from a local computer to a remote webserver while downloading a file refers to the process of transferring or copying a file from a remote webserver to a local machine

Give two reasons for connecting computers in a network.

Can share files/data Can share applications/software Can collaborate Can share peripherals (printers, speakers) Can share connectivity (Internet connection, hotspot) Can access files from any computer / hot desk Central control/management (security, software updates, backup, remote support, users, remote monitoring) Allows communication (email, social media, video conferencing, online meeting, collaborative games)

 State two components of the CPU

Any two from:

  • Registers
  • Clock
  • CU
  • ALU

Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access

(The parent can) set criteria for the websites she is allowed to visit such as a whitelist/blacklist of websites. The firewall will examine the data/traffic incoming and outgoing from her computer. If data is sent from a website that is not allowed, it will be blocked

State the uses of 3D printers

  • Making prosthetic limbs for patients
  • Making items which allow precise reconstructive surgery
  • Making light-weight plane wings
  • Making sculptures

Apart from the user interface, name three other components that make up a typical expert system.

– knowledge base
– rule(s) base
– inference engine
– explanation system
– (expert system) shell

State ways of identifying illegal copies of an operating system

  • No licence agreement as a certificate of authenticity
  • Prices that are extremely cheap
  • No documentation manual
  • when one connects to the internet for authentication, the report from the manufacturer indicates that the user may be a victim of software counterfeiting
  • frequent runtime or occurrence of fatal errors when using the machine

 Lucy wrote: “I should validate the input into my database by typing in the same data twice”.Why was her statement incorrect?

  • she had actually described verification
  • data could be incorrect, therefore same incorrect data typed in twice
  • accept description of validation process e.g. range check

Give an example of where a PAN could be used

  • connecting wireless headphone to a phone
  • Using a wireless mouse, keyboard etc
  •  

Describe the role of the registers and system clock within the fetch-execute cycle.

  • Registers are small amounts of memory available that hold data fetched from memory or data waiting to be stored in memory. A temporary holding place for the instruction that has been fetched.
  • The system clock purpose is to determine the pace of the cycle, each tick of the clock a part of the fetch-execute cycle occurs. Regulates the timing and speed of a computers systems functions.

Explain one drawback to a user if the program is distributed as freeware

The user is not allowed to access the source code so, they cannot tailor the software to their needs and  they cannot fix any bugs in it

The software is still covered by copyright

The user must get the owner’s permission to do anything beyond using it