Com Paper 1
Com Paper 1
451/1
COMPUTER STUDIES
PAPER 1
(THEORY)
TIME: 2 ½ hours
Instructions to Candidates
(a) Write your name and index number in the spaces provided above.
(b) This Paper consists of two sections A and B.
(c) Answer ALL the questions in section A.
(d) Answer question 16 (compulsory) and any other THREE questions from section B.
(e) All answers should be written in the spaces provided.
(f) This paper consists of 12 printed pages. Candidates should check to ensure that all pages are printed as
indicated and no questions are missing
451/1
Computer Studies
Paper 1
(Theory)
Turn over
Computer studies paper 1
SECTION A 40MKS
Answer All the Questions in this section in the spaces provided
1. a) Distinguish between optical and magnetic scanners (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) Differentiate between hardware and software portability (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
2. a) Name two special purpose memories found either inside or outside the microprocessor (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) Distinguish between an accumulator and an address register (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
3. Differentiate between formatting and editing as used in word processor (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
4. a) Distinguish between pasteboard and printable page in DTP (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) Differentiate between a margin guide and column guide as used in DTP (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
5. a) Define the term normalization as used in a database design (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page | 2
Computer studies paper 1
b) Explain two objective of normalization (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
6. Describe two methods used to secure data in a database (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
7. Explain the meaning of the following terms as used with DTP (4marks)
a) Crop
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) Embedded object
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
c) Master page
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
d) Tool box
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
8. Make a clear difference between a website and web portal (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
9. a) What is a protocol (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) Write the following in full (2marks)
(i) TCP/IP
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(ii) HTML
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page | 3
Computer studies paper 1
(iii) HTTP
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(iv)FTP
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
10. Explain the following as used in data security (3marks)
a) Fraud
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) Eavesdropping
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
c) Information security
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
11. Explain the importance of control structure in program development (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
12. State four stages in data processing (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
13. Describe three electrical safety precaution rules that should be observed in a computer room (3marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
14. a) What is a speech input (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) State two disadvantages of using this method of data input (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page | 4
Computer studies paper 1
15. Name two solid state storage devices (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
SECTION B (60MARKS)
Answer question 16 (compulsory) and any other THREE question from this section
16. a) Explain three errors detecting methods in program development (3marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) The gross salary of employees of Mutson chemists is based on the basic and additional benefits.
Employees with more than 10 year’s experience get an additional pay of 10% of their basic salary.
Bonuses are given as per employees’ sales of the month as:
>200,000 15%
100,000 – 200,000 10%
Below 100,000 5%
Draw a flowchart for the program that will calculate gross salary and output each employee’s basic
salary, gross salary and all benefits. (12marks)
Page | 5
Computer studies paper 1
17. a) Write the following acronyms in full
(i) EBCOIC (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(ii) COBOL (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(iii) ASCII
(1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) Explain why computes use binary numbers in data representation (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
c) Convert the following values to the stated number system
(i) 20.216 to decimal (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(ii) 7.12510 to binary (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
d) Perform the following binary arithmetic
(i) 111001112 + 001011102 (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(ii) 101012-1102 (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page | 6
Computer studies paper 1
Page | 7
Computer studies paper 1
d) An organization is facing threats to data integrity. Explain three ways on of how the threats can be
minimized
(3marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
19. a) One of the functions of an operating system is job scheduling. Explain what is meant by job
scheduling (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) Recently on 4th March 2013 Kenya went on election in which the results were to be transmitted
electronically using mobile phones from all polling stations to the main server. But the system
(server) failed to work.
(i) Give two security threats that the system was prone to (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(ii) State control measures that the IEBC should take in future to ensure and safe tallying of votes
(2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
c) The principal of Chebloch primary school wants to acquire a new operating system for his computer.
Advise him stating the advantages of graphical user interface over command line interface.
(2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
d) Explain the meaning of the following terms used in data processing (6marks)
(i) Truncated
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(ii) Transposition
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page | 8
Computer studies paper 1
(iii) Transcription
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
e) Explain why the processor of a micro computer is referred to as micro processor. (1mark)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
20. a) List and explain the functions of each computer bus (6marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b) The formul = &B2 + C&4 is entered in cell C5 and then copied to D10. Write down the formula as it
appears in the destination cell (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
c) Give two reasons why smaller computers like laptops tend to be more expensive than desktop
computer (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
d) Define the term program documentation (1mark)
………………………………………………………………………………………………………………
Page | 9
Computer studies paper 1
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
e) Briefly explain the terms parallel running and direct changeover as used in system implementation
(2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
f) Differentiate between a primary key and a foreign key as used in designing a database (2marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page | 10