0% found this document useful (0 votes)
11 views6 pages

Maryhill Girls High School

This document is a Form 1 Computer Studies exam paper from Njonjo Girls High School, consisting of two sections: A and B. Section A contains 15 questions worth 40 marks, while Section B has additional questions totaling 60 marks. The exam covers various topics related to computer safety, keyboard functions, computer classifications, and the impact of technology.

Uploaded by

john
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views6 pages

Maryhill Girls High School

This document is a Form 1 Computer Studies exam paper from Njonjo Girls High School, consisting of two sections: A and B. Section A contains 15 questions worth 40 marks, while Section B has additional questions totaling 60 marks. The exam covers various topics related to computer safety, keyboard functions, computer classifications, and the impact of technology.

Uploaded by

john
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Name: …………………………………………………………… Class: ……………………….

451/1
COMPUTER STUDIES
PAPER 1 (Theory)

2 Hours

Njonjo Girls High School


Form 1 exam
COMPUTER STUDIES

INSTRUCTIONS TO CANDIDATES
This paper consists of TWO sections A and B
Answer ALL questions in both sections
All answers should be written in the spaces provided on the question paper.

For Official Use Only


Section Question Score

A 1-15

16

17

18

19

Total Marks

This paper consists of 6 printed pages


Candidates should check the question paper to ensure that all the pages are printed as indicated and
no questions are missing.
Turn over
1
SECTION A 40 MARKS
1. Explain what is meant by the term “default settings” as used in computing. (2mks)

2. Explain the following safety precautions and practices in a computer laboratory. (3mks)
a. Ventilation

b. Dust and dump proof

c. Cables insulation

3. State four characteristics which make computers better than human beings. (4mks)

4. Distinguish between safety precautions and safety practices. (2mks)

5. State two examples of editing keys found on the keyboard. (2mks)

6. The text in the box below was composed using a typing program. The current cursor position is
between the words “is” and “an”

Computer security is an increasingly important


consideration. From authentication

Describe what happens to the text in the box above when each of the following keyboard keys are
pressed. (3mks)
a. Tab

2
b. Enter

c. Home

7. What is the function of power supply unit found in the system unit. (2mks)

8. State two advantages of using portable computers. (2mks)

9. State three possible causes of fire outbreak in a computer laboratory. (3mks)

10. State two disadvantages of making payments through a mobile phone. (2mks)

11. State three risks posed by improper cabling in a computer laboratory. (3mks)

12. The 21st century has had many forms of ICT technologies improving the various means of
communication. However, these changes have brought many challenges. State three negative social
impacts of these technologies. (3mks)

13. Briefly explain the mainframe computers. (3mks)

14. Explain two health issues that could arise from the use of an unsuitable computer desk. (3mks)

15. State three ways in which mobile phones have affected money transactions in the country.(3mks)

3
SECTION B (60 MARKS)
16. Computers are classified according to many factors.
a. Classify computers according to physical size. (8mks)

b. State two types of computers based on purpose (2mks)

c. Give another name for a laptop. (2mks)

d. State four examples of toggle keys found on a keyboard (4mks)

17. a) State five keyboard grouping in a standard computer keyboard. (5mks)

b) State and explain four common mouse clicking techniques. (4mks)

c) State two requirements before shutting down a computer. (2mks)

4
d) Define the following terms as used in computing: (4mks)
i. Data

ii. Information

iii. ICT

iv. Information Technology

18. a) Define a computer laboratory. (3mks)

b) State four factors to consider when preparing a computer laboratory. (4mks)

c) State four safety measures that protect computer users. (4mks)

d) State four safety measures that are meant to protect computers. (4mks)

19. a) Briefly explain the term computer generation. (2mks)

5
b) Give two characteristics of computers in each of the following generations.
i. Second generation (2mks)

ii. Fifth generation (2mks)

c) Briefly explain how a computer is used in the following areas (4mks)


i. Commerce

ii. Government institutions

d) Give another name for a microcomputer (1mk)

e) Explain briefly the meaning of the following terms: (4mks)


i. Computer Hang

ii. Saving

iii. Notebook

iv. Processing

You might also like