admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Explain the function of the protect sheet feature in the spreadsheet program

  • It is a feature used to prevent unwanted changes to be made on the data contained in a sheet by limiting the ability to make changes

Outline any 2 Examples of wireless transmission media       (2marks)

  • Radio waves
  • Microwaves
  • Infrared waves

Confidential information about the students is to be stored on the computer system. Explain the measures that can be taken to ensure that such information remains confidential.

- Passwords
- Hierarchy
- Only allow some staff to access student files
- Only some machines able to access
- Physical location of these machines
- Physical lock on machines
- Encrypted data in files
- Firewall if connected to the Internet

State what is meant by Computer Aided Design (CAD).

Give three different applications that make use of CAD.

Name three specialist input/output devices used in CAD.

software that can be used to design new products/amend existing products
makes use of features such as 2D, 3D, wire frames, library of parts, links to CAM

Give three different applications that make use of CAD.

aerospace
architecture
designing cars
designing consumer goods
chemical/nuclear plant design
designing electronic circuit boards
ergonomic design
landscape/garden design

Name three specialist input/output devices used in CAD.

large monitor/screen with hi-res
touch screen
plotter
space mouse/space ball/4D device
3D glasses (in some applications)
light pen
graphics tablet
3D printer
3D scanner

Distinguish between application and system software

  • Application software refers to software that is designed to help the computer user to accomplish specific tasks
  • Examples of application software include; Internet browsers, word processors, spreadsheets, databases etc
  • System software is software that performs tasks needed to operate the hardware and provide services to other software
  • Examples Operating Systems, Networking software, utility programs(encryption, backup, disk defragmentation software, ...)

KCSE 2003 COMPUTER STUDIES

SECTION A (40 MARKS)

Answer all the questions in this section

1.Computer systems are built from three types of physical components: processors,memories and 1/O devices.

  a) State two tasks of a processor                                                            (2 mks)

  b)State function of 1/O devices                                                               (1 mk)

2. Threats to the safety of computer systems take many forms such as:  white-collar crime, natural disasters, vandalism and carelessness.Give on way as to how each of these forms of threats can be controlled.    2 mks)

3.a) Explain the term nibbles as used in data representation in computers

   b)Perform the following binary arithmetic giving the answers in decimal notation.     (3 mks)

       i)1110.01111 + 11010001 .011

        ii) 1001011.011 - 111.111

     4  a)  Distinguish between machine and assembly language           (2mks)

         b) State the type of translator necessary for a program written in:         (2mks)

            i) High level language

           ii)Assembly language                                                    

5. Briefly explain the purpose of the following types of program documentation: (3mks)

    a)  User manual

     b) Reference guide

     c) Quick reference guide

6. State any two features of a user-friendly program.      (2mks)

7 a) Distinguish between labels and formulae with respect to spreadsheets (2mks)

   b) Consider the entries in the cells below.

 

Cell

B2

B3

C10

C11

C13

Entry

200

100

B2

B3

C10

State the value displayed in cell C13                                      (2 mks)

8.List three differences between wide area Networks (WAN) and Local Area Networks (LAN)      (3mks)

9. Study the flowchart segment below and state the last value printed from the flowchart.         (2 mks)

10.  a) What is an expert system                                                        (1mk)

      b)State any two components of an expert system                     (2mks)

11. give two reasons why optical disks are better storage media compared to floppy diskettes  (2mks)

12.What are the Dos commands used for the following?                       (2mks)

            a) Changing directories

            b) Viewing directories

           c)  Renaming directories

            d) Deleting a directory

13. Distinguish between copying and moving text                                  (2mks)

14. a) Name two methods of paper orientation                                (1mk)

     b)Name two keys used to delete text in a document   (1 mk)

15.Name two features a Database package                                             (2mks)

SECTION B (60 MKS)

Answer question and any other three questions from this section

16.       Study the flowchart below and answer the questions that follow.

 a)Write a high-level language program for the above flowchart (7mks)

 b)List the outputs of the flowchart above                                 (5 mks)

 c) Modify the flowchart so that it adds up all its outputs and displays the sum obtained  (3mks)

17. A computer specification has the following details:

  •  Pentium II
  • 1.44 MB floppy disk drive
  • 20 GB hard disk
  • Full multimedia
  • 17” SVGA monitor
  • Pre-installed operating system
  • Pre-installed office suite

     a)  What is meant by

       i)  1.44 MB floppy disk drive?

       ii)20 GB hard disk?

      iii) 17” SVGA monitor

     b) Which operating system might be pre-installed in this computer and why?         (2mks)

     c) List three multimedia components                                          (3 mks)

      d) i)  what is meant by computer aided manufacture?        (2 mks)

          ii)  Give two examples of computer aided design software.       (2mks)

18. a)Give three examples of network software                                          (3mks)

     b)List any three items that may be referred to as data terminal equipment in a network     (3 mks)

     c)Briefly explain the following terms as used in networking   (4mks)

      i) Remote communication

      ii)Distributed processing

      d) State three advantages and two disadvantages of mesh network topology. (5mks)

19. a)  a company has decided to computerize their operations.  They have decided to purchase package instead of developing their own programs.  Give three advantages and two disadvantages of this approach. 5mks)

      b) i) explain why a value such as 611233444555 may be displayed as ######### When typed in a cell of a spreadsheet (2mks)

       ii)  How can the problem in b (i) above be corrected?      (2mks)

      c) With reasons, briefly describe the most appropriate type of printer output device for the output of:  (6mks)

      i) Customer invoices on multi-part stationery

     ii) Letters to customers

     iii)Detailed engineering designs

20. a)  Distinguish between the following pair of terms                                (6mks)

      i) Data verification and data validation

      ii)Data encryption and passwords

            

KCSE 2007, COMPUTER STUDIES PAPER 1

SECTION A (40 MKS)

Answer all the questions in this section in the spaces provided.

1.Describe the computer booting process.    (2 mks)

2. State the functions of the following keys on the computer keyboard   (2 mks)

  a) Backspace

  b)Insert (ins)

3. Jane has noticed the following problems with her computer keyboard    (2mks)

  • It is taking a longer time to start-up;
  • It is often hanging;
  • Applications are taking longer to load.

 State three possible causes of these problems and how they can be solved (3mks)

4 a)Define authenticity as used in software selection  (1mk)

  b) List four ways of acquiring software in an organization     (2mks)

5 some of the storage disk available are:  zip disks, 3 ½ inch floppy disks, DVDs and 5 ¼ inch floppy disks. Arrange these devices in ascending order of storage capacity.    (2mks)

6.You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:           

a) Forgetting the password     (1mk)

b) Hacking       (1mk)              

7.State four benefits of using a computer in a school library   (2 mks)

8. Using six bits, find the two’s complement of -2310.     (4 mks)

9. Explain data series, axis and legends as used in spreadsheet charts.  (3mks)

  • Data
  • Axis
  • Legend                       

10. a) Describe the term data integrity.                                            (2 mks)

     b) State four situations in which data may lose integrity.           (2mks)

11.State the function of each of the following:

            a)Network interface card                                                           (1 mk)

            b)Network protocol                                                                    (1 mk)

           c)Hub                                                                                         (1mk)  

12. List four types of publications that can be designed by using desktop publishing software.   (2mks)

13. Differentiate between the following pair of terms as used in database design:

    a)  Input mask and design.                                                           (2 mks)

    b) Table and query                                                                      ( 2mks)

14. List four factors to be considered when purchasing an operating system.     (2mks)

15   Write an algorithm to compute the area of a triangle.   (2mks)

SECTION B (60 MARKS)

Answer question 16 and any other three questions from this section in the spaces provided

16. Study the flowchart below and answer the questions that follow

 

i) Name the control structures used in the flowchart                 (2mks)

ii) Determine the values of M, N, P and Q.                                ( 4 mks)

M………………………….. N………………………..

P ………………………….. Q ………………………

  iii) Write the pseudo code for the flowchart   (7mks)

 b)  List four functions of an assembler    (2 mks)

17. Define the following web related terms:       

 i)  Web browser   (1mk)

 ii)  Hyperlink      (1mk)

iii) Hypertext document                (1mk)

b)  List six activities performed on the web      (3mks)

c) An institution has ten stand alone computers

i)  Suggest with reasons the most appropriate topology required to inter-connect the computers.   (3mks)

ii) State the necessary steps required to connect the computers to the  internet.      (4mks)

d) Below is an email address:

                       

                     

                       

Name the parts labeled:

                        i)

                        ii)

                        iii)

18.A computer C directory has folders for form 1, form 2, Form 3 and form 4.  Each class has student’s folders labeled according to their number.  The students create their own folder for the subject the are studying based on the table shown below

 

Form 1

Form 2

Form 3

Form 4

OS

SP

Pr.

ADB

WP

DTP

DB

Internet

 

 

a)Assuming there is one student per class, draw the corresponding directory tree structure.  (6 mks)

b) i)  a form four student wants to create a folder to store her project. State the path for that project folder.(2 mks)

ii)Suggest how the student can ensure that:

                        1.         Work is not lost in case the hard disk fails.                (1mk)

                        2.         The project is not copied by other students.               (1mk)

c) i).  Other than I/O devices, list other three devices under the control of the operating system.                                                  (3mks)

 ii)Explain any one of the devices named in C (i) above            (1mk)

d)Define the term trouble shooting    (1mk)

19. A manager wishes to replace the current manual system with a computerized one

 a)Describe three main areas that must be evaluated to justify the  replacement   (6mks)

b) List the three areas that would be considered in the requirements specifications.      (3mks)

c)State and explain three ways that can be followed to replace the current system    (6mks)

20. a)  A head teacher keeps the following student details in a database:  Name, Address, Town, Date of Birth, Marks scored, Fees paid.

i)Name the most appropriate primary key. Give a reason      (2mks)

ii)For each item in the student’s details above, indicate its most appropriate data type as used in the database.           (3mks)

iii)Explain why input screens are better data entry designs than entering data directly to a table.        (2mks)

b)List two career opportunities associated with databases.       (2mks)

c)Distinguish between:

i) A table in a word-processing application and a table in a database application (2mks)

ii)Mouse pointer and insertion point.    (2mks)

d)Outline the steps to be followed in order to merge cells in a word processing table.    (2mks)

What is block operation as used in Microsoft word?

An editing or formatting procedure that is carried out on a selected block of text in a word-processing document.

A formatting or editing operation that is applied to a block of text after selecting. The block of text can be a paragraph, line, word, page or the whole document. It is much easier to apply editing or formatting to a block of text than to apply it to every single character

Give one benefit and one disadvantage of the use of wireless technology.

Advantages

  • no wires
  • fast/high-speed wireless Internet access
  • WLAN is faster than a modem or mobile
  • WLAN for working at home one day a week/teleworkers
  • see internet content away on the move
  • create and send multimedia messages to mobiles or e-mail
  • picture messaging - send photos/pictures text/sound/recorded
  • greetings from mobiles to mobiles/PCs
  • instant transmission - no busy signals/no searching for phone jacks
  • download e-mail and file attachments on mobile
  • watch live webcast on mobile/hotspot
  • listen to streaming video on mobile/hotspot
  • news/weather/sport/games while on the move
  • access information from mobile anytime
  • send/receive/delete e-mail while on the move
  • wireless Inbox on mobile - to contacts and calendar
  • view business appointments while out of the office on mobile
  • send corporate e-mail while out of the office - even behind a firewall on mobile
  • wireless internet connection from chat rooms for discussions with colleagues while on the move
  • give visual demonstrations from mobile and colleagues watch back at the office

 disadvantages e.g.

  • WLAN speeds are slower than Net access at work/narrow band width
  • any one within the WLAN nodes range with an appropriate device can use your WLAN and broad band link
  • any one who walks past your house or WLAN linked into a corporate system can access sensitive information or credit card details
  • 3G phones not compatible with 2G phones
  • Blue tooth - has limited range
  • blocked signal/distorted signal/weak signal/lag
  • health problems from microwaves

Explain the difference between main memory and secondary storage.

  • Main memory is transitory/temporary/volatile, secondary storage is (semi-)permanent
  • The processor can only use data/instructions that are in the main memory
  • Main memory is directly accessible to the processor, secondary storage is not directly accessible to the processor 

Describe each of the following types of program errors, using an example.

Syntax error

Logical error

Run-time error

Syntax error

  • An error in the source code of a program like pront("Hello, " + name) instead of print
  • These are errors that emanate from improper use of language rules such as spelling mistakes,improper use of variables and misuse of reserved words

Logical error

  • A mistake in a program's source code that results in incorrect or unexpected behaviour like if age == 65: print("Eligible for a discount.") instead of using if age >= 65: print("Eligible for a discount.")
  • These are errors that occur due to imperfect comparisons

Run-time error

  • An error which occurs when a program is asked to do something that it cannot, resulting in a ' crash'9. For example, asking a number to be divided by 0 such as 72/0.
  • An error that results in a sudden halt of an executing program

 

State three features of the fifth generation computers (3mks)    [2017 paper 1]

  • Artificial intelligence
  • Parallel processing
  • Natural language processing
  • quantum computing

Explain the following terms

(a) Disk mirroring

(b) Encryption

(c) Backup

(a) Disk mirroring- Data is written on two or more disks simultaneously.

(b) Encryption - Contents are scrambled so they cannot be understood without a decryption key

(c) Backup - A copy of the data is taken and stored in another location

A company making televisions has introduced robots to replace the human work force.

(a) Describe three effects this would have on the work force

(b) Give two advantages to the company of introducing robots

(c) How could the robots be trained to assemble the televisions?

(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?

(a) Describe three effects this would have on the work force

  • loss of jobs/unemployment
  • deskilling
  • need to re-train
  • different jobs available/re-skilling
  • no longer need to do hazardous/tedious jobs

(b) Give two advantages to the company of introducing robots

lower work force costs (no salaries to pay)

  • lower environmental costs (less electricity for heating/lighting)
  • higher throughput
  • more consistent product
  • robots don’t need breaks, holidays/work 24/7 etc.
  • robots don’t take industrial action

(c) How could the robots be trained to assemble the televisions?

  • tasks repeated by skilled worker and how each task is done is memorised
  • tasks programmed directly into the computer/robot memor

(d) A whole batch of televisions was produced with some of the parts missing. How could this error have been avoided?

  • if parts missing for a sequence, then a warning should be given and the assembly stopped
  • several quality control stages to spot an error early on
  • program in checks at each stage of assembly so robots can detect a fault immediately

Distinguish between a formula and a function as used in spreadsheets

  • A formula is a mathematical expression that returns a value
  • A function is an excel inbuilt formula that returns a value given a range of values or arguments

A sound engineer is recording a singer. Describe why the sound must be converted to a digital format before it can be stored on a computer system

  • Computer systems use binary/ones and zeros/voltage on or off;
  • Sound is analogue/continuous;
  • Computers use digital data/discrete values

State advantages of batch processing

  • once instructions are given, the processing runs automatically hence requiring little supervision
  • tasks are processed as a group hence reducing the cost
  • It is faster since the since runs automatically
  • there is increased output since the processor works without any interruption

The Acme company stores data for a private scientific research group. It has recently upgraded its storage capacity and needs to dispose of its existing hard drives securely. Outline two methods for the secure disposal of the data on the hard drives.

Acme company needs to ensure that if they are reselling the drives they wipe the drive (this should be done regardless of the destruction of the drive) to the DoD standard.

  • Disassemble the drive by pulling it apart the drive so that the data would not be accessed
  • Destroy the metal disk either by drilling holes so it cannot be read
  •  Encrypt drives with passwords that are not accessible
  • Degaussing the hard drives
  • Use specialized overwriting software

This would ensure that any software cannot be used to locate files.

State two benefits of using robots

  • reduced labour costs/do not need paying
  • reduced cost of goods
  • improve speed of production/productivity
  • high degree of accuracy/precision/less errors
  • can operate where humans can not go
  • do not take breaks/holidays/get tired
  • work 24 hrs a day
  • reduce accidents at traffic lights
  • improve traffic flow
  • can work in dangerous conditions

Give two advantages of using broadband rather than dial-up

  • an use Internet connection and telephone at the same time
  • much faster data transfer speed
  • always “on”
  • charged for number of bytes/flat rate per month rather than actual time on line
  • more bandwidth