0% found this document useful (0 votes)
65 views

Computer Pp1 Ms

Uploaded by

snassiab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Computer Pp1 Ms

Uploaded by

snassiab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

JOINT EXAMINATIONS

KENYA CERTIFICATE OF SECONDARY EDUCATION (KCSE)

451/1 - COMPUTER STUDIES - PAPER 1


(THEORY) – FORM FOUR
MARCH 2024

Section A (40 marks)

1 Why must food and beverages be kept out of the computer lab? [2 marks]
Food droplets may attract rodents which may computer components more so cables while

beverage may spill on metallic part therefore causing rust

2 State two key technological developments that occurred during the third generation [2 marks]
of computers
i) Development of integrated circuits that combined several transistors

ii) Development of magnetic storage devices

3 a) What are toggle keys in relation to keyboards? [1 marks]


These are keyboard keys that can perform two different functions or any key that is used to turn a

function on or off, or to switch between two functions. Examples are the caps lock key, number lock key and

scroll lock key.

b) What type of keyboard would you prefer for the following and why? [4 marks]

i) Visually impaired users: Braille keyboards because they have touch overlays that are raised keys that

can be felt by the fingers

ii) Busy restaurant: Concept keyboards are used when fast input is needed and are ideally suited to selecting

from a limited range of choices.

4 State two differences between buffers and registers [4 marks]

Visit www.mwalimuresources.co.ke 1 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
i) Buffers hold more than one piece of data while registers hold only one piece of data at a time

ii) Buffers are found in I/O devices and CPU while registers are only found in the CPU

5 As a computer expert, you were approached by certain organization to help them [3 marks]
secure some computers they require. You were keen at certain considerations based
on the knowledge you have in computing. What would the following considerations
imply?
i) Software Authenticity: It is the genuineness, validity and legitimacy of the software i.e. obtained from

authorized source

ii) Multi-media capability Ability of the computer to work with text, audio and visual

iii) Software portability The ease of software to be installed or copied in multiple computers

6 During class discussion, a Form One student was asked to present his findings on [4 marks]
what Operating Systems perform in a computer. Explain four key points he will
address.
i) Job scheduling – allocating processor time to various tasks following certain criteria
ii) Interrupt handling – dealing with breaks from the normal sequencing of operations when processing a
task
iii) Error handling – recognizing any error that may occur and suggesting possible remedies
iv) Memory management – organizing how memory locations shall be utilized by data and programs

7 a Differentiate between formula and function as used with spreadsheets. [2 marks]


Formula – user designed mathematical expression that create relationship with the referenced cells while a

function in an inbuilt mathematical expression/formula that can be utilized by the user

8 a When working with database, one required to create relationship among the table [2 marks]
structures. What is relationship in database?
It is an association between tables that are created using join statements to retrieve data or is a situation that exists

between two relational database tables when one table has a foreign key that references the primary key of the other

table

b State three purpose of establishing relationship among tables. [3 marks]


 It establishes a connection between a pair of tables that are logically related to each other.

Visit www.mwalimuresources.co.ke 2 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
 It helps to refine table structures and minimize redundant data.

 It enables retrieval of data from multiple tables easy

9 Most spreadsheets usually accept certain type of data to be entered into the [2 marks]
worksheets. Outline four types of these data.
 Values
 Labels
 Formulae
 Functions
10 a Outline four benefits of using word processors over manual typewriters [2 marks]
 Efficiency.
 Documents can easily be sent electronically.
 It is easier to make changes to your documents.
 Spell checking/Gramma checking.
 Insert images and art in documents
 Documents can be saved for future reference electronically
b Differentiate between the following
i. Merging and splitting cells in word processor table [2 marks]
Merging – combining more than one cell, row or column while splitting cell is the sub-division of a cell into

more cells, rows or columns

ii. Data source and main document in mail merge [2 marks]


Data source – list of recipients of the personalized documents while main document is the document that

contain the universal information shall be received by all recipients

11 Why are system analysts referred to as change agents in an organization? [1 marks]


They initiate a change from one system to another within an organization

12 Why would one defragment his storage media? [1 marks]


So as to group data that are related to each other in one particular location to enable fast access of such

data and information

13 What is the meaning of the phrase ‘syntax error’ as used with computer [1 marks]
programming?

Visit www.mwalimuresources.co.ke 3 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
These are errors that are committed when the program code does not conform to the rules of a particular

programming language

14 Why are repeaters necessary when setting up a large network? [1 marks]


They receive weak signal from one segment, clean, boast and then retransmit to the next segment

15 State one major reason why organizations are opting for telecommuting . [1 marks]
 It saves on the office space and allows workers to work at their convenient times
 It also reduces the office conflicts that may be encountered by staff

Visit www.mwalimuresources.co.ke 4 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
Section B (60 marks)

Answer question 16 and any other three questions

16 a State two distinct differences between compilers and interpreters. [2 marks]


 Compilers translate the entire source code at once before execution while interpreters translate source
code one statement at a time
 Compiled codes can be saved and run when required while interpreters translate the code each time the
program is to run
 Compiled codes require more memory while interpreted codes require less memory
b (i) Outline three demerits of using low level programming languages

 They are machine dependent and therefore not portable [3 marks]


 Require well trained personnel to develop and maintain them
 Are difficult and cumbersome to learn and use
 Debugging is difficult

(ii) Differentiate between monolithic and modular programs [2 marks]


A monolithic program that is self-contained and independent from other computing applications while modular
program is a program that is divided into a set of loosely coupled functional units (named modules) that can be
integrated into a larger program

c Study the following statements and answer the questions that follow [7 marks]
Start
Initialize x to 3 and y to 4
Count = 1
While Count <=10
Increment x by 1
Multiply y by 2 and subtract ½
Add x to y to attain z
Increase the value of Count by 2
Endwhile
Print the values for x, y and z
Stop

i) What does the above statements represents? [1 mark]


Pseudocode
ii) What is the value for y and z [1 mark]
y = 112.5 and z = 120.5

Visit www.mwalimuresources.co.ke 5 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
ii) Implement the above statements using a program flowchart [6 marks]

Start

X=3
Y=4
Count = 1

Count <= 10?

X=x+1
Y = (Y + 2) – ½
Z=X+Y
Count = Count + 2

Print X, Y and Z

Stop

Visit www.mwalimuresources.co.ke 6 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
17 a Outline three ways +4 denary can be represented in a computer [3 marks]
i) Prefixing an extra bit – (0)100
ii) Ones complement – 011
iii) Twos complement - 100

b Use one’s compliment to represent -610 in 8-bits formation. [2 marks]


610 = 1102
8-bit notation = 00000110
Ones complement = 11111001

c Briefly explain how data are represented on a floppy disk [2 marks]


By rearranging the magnetic dipoles within the domains. Dipoles facing one direction would be

interpreted as 1s and those in opposite directions as 0s

d Differentiate between wavelength and frequency of a signal [2 marks]


Wavelength is the distance between two successive peaks of a signal while frequency is the number of

complete oscillations/cycles made within one second by a signal

e Describe each of the following computer terminologies as used in data representation [4 marks]
i. Word
A combination of two or more bytes

ii. Bit
Binary digits that is either 1 or 0

iii. Byte
Combination of 8 consecutive bits that forms a character

iv. Nibble
It is a half a byte or 4 consecutive bits

f Convert 9.62510 to binary [2 marks]


Integral part Fractional part
2 9 0.625 x 2 = 1.25
2 4 rem 1 0.250 x 2 = 0.50
2 2 rem 0 0.500 x 2 = 1.00
2 1 rem 0
2 O rem 1
= 1001 = 0.101
The answer is 1001.1012

Visit www.mwalimuresources.co.ke 7 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
18 i A school intends to network its computers in the computer laboratory. Outline three [3 marks]
benefits that this would bring to the lab users
 Allows scarce resources to be shared among the users
 Facilitate remote communication
 Allows distributed processing

ii a) What is signal attenuation? [1 mark]


It is a situation whereby the signal losses it strength and magnitude as it moves along the transmission media

b) State three advantages unbounded media [3 marks]


 Can span large geographical area
 It is easier to expand the network coverage
 One doesn’t need to maintain the line of sight

iii Network servers run a special type of operating system. State four key functions that this [4 marks]
kind of operating system perform
 Produce logs
 Allows scarce resources to be accessed by various users/applications

iv International Organization for Standardization, ISO developed Open System [4 marks]


Interconnection, OSI reference model to help in developing network protocols. State the
first four layers of this model.
 Physical layer
 Data link layer
 Network layer
 Transport layer
19 Otieno was tasked with entering marks for a certain exam that was done by an entire
class.
a State two types of errors he is likely to encounter during this exercise [2 marks]
 Transposition
 Misreading

b How can the above identified errors be avoided? [1 mark]


 Using devices that capture directly from the source
 Designing user interfaces that minimizes chances of wrong entries

Visit www.mwalimuresources.co.ke 8 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
c Other than the errors identified above, list two other errors that can be encountered [1 mark]
during data processing
 Truncation
 Rounding
 Overflow

d i. A certain research institution had his staff collect data from the field. The [1 mark]
collected data are then surrendered to the central location where they are
processed as a unit over a period of term. What processing mode is being used?

Batch processing

ii. State one merit of this mode. [1 mark]


 Cheaper to produce a whole batch of a product than a single item at a time.
 Machinery can be utilized more efficiently, therefore saving money for the
business.
 Reduces the risk of concentrating on one product and allows for flexibility.
 It is not labour intensive

e Describe data integrity. [1 mark]


It is the completeness and validity of data entered in a computer for processing

f There are so many ways that can be used to reduce threat to data integrity. Mention any [2 mark]
two
 Using direct capture devices
 Backing data on separate location/external storage devices
 Controlling access to data by putting security measures
 Using error detection and correction software when transmitting data
 Designing user interfaces that minimize chances of entry of invalid data
g Give the best file organization employed by Magnetic tapes and SD Cards. [2 mark]
SD Card – Random/Direct
Magnetic tapes - Serial

h i. The school’s LAN is done using UTP cable. List two advantages of using this [2 mark]
type of cable.
 Cheaper because of mass production
 Installation equipment used are usually cheap
 Easier to set up a network as they readily available
ii. List two advantages of using fibre optic cable in networking [2 marks]
Visit www.mwalimuresources.co.ke 9 Call/WhatsApp 0735649658
Computer Paper 1 Term 1 2024 Marking Scheme
 Fast and support high bandwidths
 Smaller and lighter
 Suffer low attenuation hence suitable for use as backbone
 Immune to electromagnetic interference and eavesdropping
 Can be used in highly flammable systems

i Data flows in the school’s LAN in a duplex manner. List two other modes of data [1 mark]
transmission in a network
 Simplex
 Half duplex

Visit www.mwalimuresources.co.ke 10 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
20 a i. Outline three threats to data stored in a computer [3 mark]
 Virus
 Unauthorized access
 Sabotage

ii. Database design can take several forms depending on the user’s needs. Explain [2 marks]
two models that one can use
 Network
 Hierarchical
 Relational
b The following is a spreadsheet relating to a retailer. [2 marks]

If the Tax Rate is applicable to all items listed, write a formula that can be entered in cell
E2 and can be copied along the column to get the tax for other items

=D2 * $B$7

c i. Study the passage below [2 marks]


Raila Amolo Odinga (born 7 January 1945) is a Kenyan politician who served
as the Prime Minister of Kenya from 2008 to 2013. He is assumed as the Leader of
Opposition in Kenya since 2013 as the New Constitution of Kenya does not prescribe for
such a position. He was the Member of Parliament (MP) for Langata from 1992 to 2007.
Raila Odinga served in the Cabinet of Kenya as Minister for Energy from 2001 to 2002, and
as the Minister for Roads, Public Works and Housing from 2003 to 2005. Odinga was
appointed High Representative for Infrastructure Development at the African Union
Commission in 2018.

Outline four formatting styles that have been applied to the passage
 Indentation
 Bold facing
 Double strikethrough
 Underline
d List three career opportunities in the field of ICT. [3 marks]
 Database administrators
 Network managers
 Computer technicians
 Trainers
 System analysts

Visit www.mwalimuresources.co.ke 11 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme
e Outline three services offered on the internet. [3 marks]
 E-mails
 E-commerce
 E-learning
 Chats

THIS IS THE LAST PRINTED PAGE

Visit www.mwalimuresources.co.ke 12 Call/WhatsApp 0735649658


Computer Paper 1 Term 1 2024 Marking Scheme

You might also like