Computer Pp1 Ms
Computer Pp1 Ms
1 Why must food and beverages be kept out of the computer lab? [2 marks]
Food droplets may attract rodents which may computer components more so cables while
2 State two key technological developments that occurred during the third generation [2 marks]
of computers
i) Development of integrated circuits that combined several transistors
function on or off, or to switch between two functions. Examples are the caps lock key, number lock key and
b) What type of keyboard would you prefer for the following and why? [4 marks]
i) Visually impaired users: Braille keyboards because they have touch overlays that are raised keys that
ii) Busy restaurant: Concept keyboards are used when fast input is needed and are ideally suited to selecting
ii) Buffers are found in I/O devices and CPU while registers are only found in the CPU
5 As a computer expert, you were approached by certain organization to help them [3 marks]
secure some computers they require. You were keen at certain considerations based
on the knowledge you have in computing. What would the following considerations
imply?
i) Software Authenticity: It is the genuineness, validity and legitimacy of the software i.e. obtained from
authorized source
ii) Multi-media capability Ability of the computer to work with text, audio and visual
iii) Software portability The ease of software to be installed or copied in multiple computers
6 During class discussion, a Form One student was asked to present his findings on [4 marks]
what Operating Systems perform in a computer. Explain four key points he will
address.
i) Job scheduling – allocating processor time to various tasks following certain criteria
ii) Interrupt handling – dealing with breaks from the normal sequencing of operations when processing a
task
iii) Error handling – recognizing any error that may occur and suggesting possible remedies
iv) Memory management – organizing how memory locations shall be utilized by data and programs
8 a When working with database, one required to create relationship among the table [2 marks]
structures. What is relationship in database?
It is an association between tables that are created using join statements to retrieve data or is a situation that exists
between two relational database tables when one table has a foreign key that references the primary key of the other
table
9 Most spreadsheets usually accept certain type of data to be entered into the [2 marks]
worksheets. Outline four types of these data.
Values
Labels
Formulae
Functions
10 a Outline four benefits of using word processors over manual typewriters [2 marks]
Efficiency.
Documents can easily be sent electronically.
It is easier to make changes to your documents.
Spell checking/Gramma checking.
Insert images and art in documents
Documents can be saved for future reference electronically
b Differentiate between the following
i. Merging and splitting cells in word processor table [2 marks]
Merging – combining more than one cell, row or column while splitting cell is the sub-division of a cell into
13 What is the meaning of the phrase ‘syntax error’ as used with computer [1 marks]
programming?
programming language
15 State one major reason why organizations are opting for telecommuting . [1 marks]
It saves on the office space and allows workers to work at their convenient times
It also reduces the office conflicts that may be encountered by staff
c Study the following statements and answer the questions that follow [7 marks]
Start
Initialize x to 3 and y to 4
Count = 1
While Count <=10
Increment x by 1
Multiply y by 2 and subtract ½
Add x to y to attain z
Increase the value of Count by 2
Endwhile
Print the values for x, y and z
Stop
Start
X=3
Y=4
Count = 1
X=x+1
Y = (Y + 2) – ½
Z=X+Y
Count = Count + 2
Print X, Y and Z
Stop
e Describe each of the following computer terminologies as used in data representation [4 marks]
i. Word
A combination of two or more bytes
ii. Bit
Binary digits that is either 1 or 0
iii. Byte
Combination of 8 consecutive bits that forms a character
iv. Nibble
It is a half a byte or 4 consecutive bits
Batch processing
f There are so many ways that can be used to reduce threat to data integrity. Mention any [2 mark]
two
Using direct capture devices
Backing data on separate location/external storage devices
Controlling access to data by putting security measures
Using error detection and correction software when transmitting data
Designing user interfaces that minimize chances of entry of invalid data
g Give the best file organization employed by Magnetic tapes and SD Cards. [2 mark]
SD Card – Random/Direct
Magnetic tapes - Serial
h i. The school’s LAN is done using UTP cable. List two advantages of using this [2 mark]
type of cable.
Cheaper because of mass production
Installation equipment used are usually cheap
Easier to set up a network as they readily available
ii. List two advantages of using fibre optic cable in networking [2 marks]
Visit www.mwalimuresources.co.ke 9 Call/WhatsApp 0735649658
Computer Paper 1 Term 1 2024 Marking Scheme
Fast and support high bandwidths
Smaller and lighter
Suffer low attenuation hence suitable for use as backbone
Immune to electromagnetic interference and eavesdropping
Can be used in highly flammable systems
i Data flows in the school’s LAN in a duplex manner. List two other modes of data [1 mark]
transmission in a network
Simplex
Half duplex
If the Tax Rate is applicable to all items listed, write a formula that can be entered in cell
E2 and can be copied along the column to get the tax for other items
=D2 * $B$7
Outline four formatting styles that have been applied to the passage
Indentation
Bold facing
Double strikethrough
Underline
d List three career opportunities in the field of ICT. [3 marks]
Database administrators
Network managers
Computer technicians
Trainers
System analysts