Explain the function of the protect sheet feature in the spreadsheet program
Outline any 2 Examples of wireless transmission media (2marks)
Confidential information about the students is to be stored on the computer system. Explain the measures that can be taken to ensure that such information remains confidential.
- Passwords
- Hierarchy
- Only allow some staff to access student files
- Only some machines able to access
- Physical location of these machines
- Physical lock on machines
- Encrypted data in files
- Firewall if connected to the Internet
State what is meant by Computer Aided Design (CAD).
Give three different applications that make use of CAD.
Name three specialist input/output devices used in CAD.
– software that can be used to design new products/amend existing products
– makes use of features such as 2D, 3D, wire frames, library of parts, links to CAM
Give three different applications that make use of CAD.
– aerospace
– architecture
– designing cars
– designing consumer goods
– chemical/nuclear plant design
– designing electronic circuit boards
– ergonomic design
– landscape/garden design
Name three specialist input/output devices used in CAD.
– large monitor/screen with hi-res
– touch screen
– plotter
– space mouse/space ball/4D device
– 3D glasses (in some applications)
– light pen
– graphics tablet
– 3D printer
– 3D scanner
Distinguish between application and system software
KCSE 2003 COMPUTER STUDIES
SECTION A (40 MARKS)
Answer all the questions in this section
1.Computer systems are built from three types of physical components: processors,memories and 1/O devices.
a) State two tasks of a processor (2 mks)
b)State function of 1/O devices (1 mk)
2. Threats to the safety of computer systems take many forms such as: white-collar crime, natural disasters, vandalism and carelessness.Give on way as to how each of these forms of threats can be controlled. 2 mks)
3.a) Explain the term nibbles as used in data representation in computers
b)Perform the following binary arithmetic giving the answers in decimal notation. (3 mks)
i)1110.01111 + 11010001 .011
ii) 1001011.011 - 111.111
4 a) Distinguish between machine and assembly language (2mks)
b) State the type of translator necessary for a program written in: (2mks)
i) High level language
ii)Assembly language
5. Briefly explain the purpose of the following types of program documentation: (3mks)
a) User manual
b) Reference guide
c) Quick reference guide
6. State any two features of a user-friendly program. (2mks)
7 a) Distinguish between labels and formulae with respect to spreadsheets (2mks)
b) Consider the entries in the cells below.
|
Cell |
B2 |
B3 |
C10 |
C11 |
C13 |
|
Entry |
200 |
100 |
B2 |
B3 |
C10 |
State the value displayed in cell C13 (2 mks)
8.List three differences between wide area Networks (WAN) and Local Area Networks (LAN) (3mks)
9. Study the flowchart segment below and state the last value printed from the flowchart. (2 mks)
10. a) What is an expert system (1mk)
b)State any two components of an expert system (2mks)
11. give two reasons why optical disks are better storage media compared to floppy diskettes (2mks)
12.What are the Dos commands used for the following? (2mks)
a) Changing directories
b) Viewing directories
c) Renaming directories
d) Deleting a directory
13. Distinguish between copying and moving text (2mks)
14. a) Name two methods of paper orientation (1mk)
b)Name two keys used to delete text in a document (1 mk)
15.Name two features a Database package (2mks)
SECTION B (60 MKS)
Answer question and any other three questions from this section
16. Study the flowchart below and answer the questions that follow.
a)Write a high-level language program for the above flowchart (7mks)
b)List the outputs of the flowchart above (5 mks)
c) Modify the flowchart so that it adds up all its outputs and displays the sum obtained (3mks)
17. A computer specification has the following details:
a) What is meant by
i) 1.44 MB floppy disk drive?
ii)20 GB hard disk?
iii) 17” SVGA monitor
b) Which operating system might be pre-installed in this computer and why? (2mks)
c) List three multimedia components (3 mks)
d) i) what is meant by computer aided manufacture? (2 mks)
ii) Give two examples of computer aided design software. (2mks)
18. a)Give three examples of network software (3mks)
b)List any three items that may be referred to as data terminal equipment in a network (3 mks)
c)Briefly explain the following terms as used in networking (4mks)
i) Remote communication
ii)Distributed processing
d) State three advantages and two disadvantages of mesh network topology. (5mks)
19. a) a company has decided to computerize their operations. They have decided to purchase package instead of developing their own programs. Give three advantages and two disadvantages of this approach. 5mks)
b) i) explain why a value such as 611233444555 may be displayed as ######### When typed in a cell of a spreadsheet (2mks)
ii) How can the problem in b (i) above be corrected? (2mks)
c) With reasons, briefly describe the most appropriate type of printer output device for the output of: (6mks)
i) Customer invoices on multi-part stationery
ii) Letters to customers
iii)Detailed engineering designs
20. a) Distinguish between the following pair of terms (6mks)
i) Data verification and data validation
ii)Data encryption and passwords
SECTION A (40 MKS)
Answer all the questions in this section in the spaces provided.
1.Describe the computer booting process. (2 mks)
2. State the functions of the following keys on the computer keyboard (2 mks)
a) Backspace
b)Insert (ins)
3. Jane has noticed the following problems with her computer keyboard (2mks)
State three possible causes of these problems and how they can be solved (3mks)
4 a)Define authenticity as used in software selection (1mk)
b) List four ways of acquiring software in an organization (2mks)
5 some of the storage disk available are: zip disks, 3 ½ inch floppy disks, DVDs and 5 ¼ inch floppy disks. Arrange these devices in ascending order of storage capacity. (2mks)
6.You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:
a) Forgetting the password (1mk)
b) Hacking (1mk)
7.State four benefits of using a computer in a school library (2 mks)
8. Using six bits, find the two’s complement of -2310. (4 mks)
9. Explain data series, axis and legends as used in spreadsheet charts. (3mks)
10. a) Describe the term data integrity. (2 mks)
b) State four situations in which data may lose integrity. (2mks)
11.State the function of each of the following:
a)Network interface card (1 mk)
b)Network protocol (1 mk)
c)Hub (1mk)
12. List four types of publications that can be designed by using desktop publishing software. (2mks)
13. Differentiate between the following pair of terms as used in database design:
a) Input mask and design. (2 mks)
b) Table and query ( 2mks)
14. List four factors to be considered when purchasing an operating system. (2mks)
15 Write an algorithm to compute the area of a triangle. (2mks)
SECTION B (60 MARKS)
Answer question 16 and any other three questions from this section in the spaces provided
16. Study the flowchart below and answer the questions that follow
i) Name the control structures used in the flowchart (2mks)
ii) Determine the values of M, N, P and Q. ( 4 mks)
M………………………….. N………………………..
P ………………………….. Q ………………………
iii) Write the pseudo code for the flowchart (7mks)
b) List four functions of an assembler (2 mks)
17. Define the following web related terms:
i) Web browser (1mk)
ii) Hyperlink (1mk)
iii) Hypertext document (1mk)
b) List six activities performed on the web (3mks)
c) An institution has ten stand alone computers
i) Suggest with reasons the most appropriate topology required to inter-connect the computers. (3mks)
ii) State the necessary steps required to connect the computers to the internet. (4mks)
d) Below is an email address:
Name the parts labeled:
i)
ii)
iii)
18.A computer C directory has folders for form 1, form 2, Form 3 and form 4. Each class has student’s folders labeled according to their number. The students create their own folder for the subject the are studying based on the table shown below
|
Form 1 |
Form 2 |
Form 3 |
Form 4 |
|
OS |
SP |
Pr. |
ADB |
|
WP |
DTP DB |
Internet |
|
a)Assuming there is one student per class, draw the corresponding directory tree structure. (6 mks)
b) i) a form four student wants to create a folder to store her project. State the path for that project folder.(2 mks)
ii)Suggest how the student can ensure that:
1. Work is not lost in case the hard disk fails. (1mk)
2. The project is not copied by other students. (1mk)
c) i). Other than I/O devices, list other three devices under the control of the operating system. (3mks)
ii)Explain any one of the devices named in C (i) above (1mk)
d)Define the term trouble shooting (1mk)
19. A manager wishes to replace the current manual system with a computerized one
a)Describe three main areas that must be evaluated to justify the replacement (6mks)
b) List the three areas that would be considered in the requirements specifications. (3mks)
c)State and explain three ways that can be followed to replace the current system (6mks)
20. a) A head teacher keeps the following student details in a database: Name, Address, Town, Date of Birth, Marks scored, Fees paid.
i)Name the most appropriate primary key. Give a reason (2mks)
ii)For each item in the student’s details above, indicate its most appropriate data type as used in the database. (3mks)
iii)Explain why input screens are better data entry designs than entering data directly to a table. (2mks)
b)List two career opportunities associated with databases. (2mks)
c)Distinguish between:
i) A table in a word-processing application and a table in a database application (2mks)
ii)Mouse pointer and insertion point. (2mks)
d)Outline the steps to be followed in order to merge cells in a word processing table. (2mks)
What is block operation as used in Microsoft word?
An editing or formatting procedure that is carried out on a selected block of text in a word-processing document.
A formatting or editing operation that is applied to a block of text after selecting. The block of text can be a paragraph, line, word, page or the whole document. It is much easier to apply editing or formatting to a block of text than to apply it to every single character
Give one benefit and one disadvantage of the use of wireless technology.
Advantages
disadvantages e.g.
Explain the difference between main memory and secondary storage.
Describe each of the following types of program errors, using an example.
Syntax error
Logical error
Run-time error
Syntax error
Logical error
Run-time error
State three features of the fifth generation computers (3mks) [2017 paper 1]
Explain the following terms
(a) Disk mirroring
(b) Encryption
(c) Backup
(a) Disk mirroring- Data is written on two or more disks simultaneously.
(b) Encryption - Contents are scrambled so they cannot be understood without a decryption key
(c) Backup - A copy of the data is taken and stored in another location
A company making televisions has introduced robots to replace the human work force.
(a) Describe three effects this would have on the work force
(b) Give two advantages to the company of introducing robots
(c) How could the robots be trained to assemble the televisions?
(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?
(a) Describe three effects this would have on the work force
(b) Give two advantages to the company of introducing robots
lower work force costs (no salaries to pay)
(c) How could the robots be trained to assemble the televisions?
(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?
Distinguish between a formula and a function as used in spreadsheets
A sound engineer is recording a singer. Describe why the sound must be converted to a digital format before it can be stored on a computer system
State advantages of batch processing
The Acme company stores data for a private scientific research group. It has recently upgraded its storage capacity and needs to dispose of its existing hard drives securely. Outline two methods for the secure disposal of the data on the hard drives.
Acme company needs to ensure that if they are reselling the drives they wipe the drive (this should be done regardless of the destruction of the drive) to the DoD standard.
This would ensure that any software cannot be used to locate files.
State two benefits of using robots
Give two advantages of using broadband rather than dial-up