0% found this document useful (0 votes)
363 views205 pages

Computer Studies Kcse Knec Pastpapers Paper 1 1998 2013

This document is a sample examination paper for Computer Studies, specifically for the Kenya Certificate of Secondary Education. It consists of two sections, A and B, with various questions covering topics such as computer functions, storage devices, programming, and data management. Candidates are instructed to answer all questions in Section A and a compulsory question plus any three from Section B.

Uploaded by

Philip Ouma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
363 views205 pages

Computer Studies Kcse Knec Pastpapers Paper 1 1998 2013

This document is a sample examination paper for Computer Studies, specifically for the Kenya Certificate of Secondary Education. It consists of two sections, A and B, with various questions covering topics such as computer functions, storage devices, programming, and data management. Candidates are instructed to answer all questions in Section A and a compulsory question plus any three from Section B.

Uploaded by

Philip Ouma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 205

Name Index Number /,

451/1
COMPUTER STUDIES
Paper 1
(Theory)
SAMPLE PAPER
2h hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL

8
Kenya Certificate of Secondary Education

9
COMPUTER STUDIES
Paper 1

19
(Theory)
2H hours

r
pe
INSTRUCTIONS TO CANDIDATES
Pa

This paper has TWO sections; A and B.


Answer ALL the questions in section A.
Answer question 17 (compulsory) and any other THREE questions from section B.
e

All answers should be written in the spaces provided on the question paper.
pl

For Official Use Only


m

SECT. QUES. SCORE


A 1 - 16
17
Sa

18
B 19
20
21
Total Marks

This paper consists of 12 printed pages


©1998, The Kenya National Examinations Council Turn over
SECTION A

Answer all the questions in this section.

1 State any three differences between a micro-computer and a mainframe. (3 marks)

9 8
Distinguish between hardware and software.

1 9 (2 marks)

e r
3

a p
In most computer systems, there are devices for input only, output only and some
which can be used for both input and output.

P
Give one example of:
(a) An input only device

l e
p
(b) An output only device

m
(c) An input and output device

S a
List any three possible causes of loss of programs and data.
(3 marks)
(3 marks)
3

Table 1 shows three data files, Doc A, Doc B and Doc C and their respective contents.
Doc A DocB DocC
27 93 27
36 60 36
38 34 38
97 38 97
102 93
45 60
34

8
38
102

9
Table 1 45

9
State the dos command that can be used to create file Doc C from files Doc A and
Doc B. (1 mark)

r 1
pe
Explain why a program written by you cannot occupy the entire part of the RAM

a
memory of your computer. (1 mark)

P
l e
p
Define the term data processing cycle. (1 mark)

a m
S
In the following section of text, you wish to replace the word 'the' with the word 'a'.
"Enclosed is a bill for the car you bought from Mutheru's shop in Kiambu".
You have a command that will search globally for a group of characters and replace
them with another group.
(a) What group of characters would need to be searched? (1 mark)

(b) What group of characters would be needed for replacement? (1 mark)

Turn over
9 List the three basic program control structures. (3 marks)

10 The following alogarithms are intended to print out integers from 1 to 10 inclusive
Alogarithm 1
Set count to 1

8
While the count is less than 10 do
Add 1 to the count

9
Output the value of the count
End while.

9
Alogarithm 2

1
Set count to 1
Repeat

r
Output the value of the count
Add 1 to the count

e
Until the value of the count is 10
Alogarithm 3

p
For count going from 1 to 10 DO

a
Add 1 to count
Output the value of the count

P
End for.
None of these alogarithms works correctly. Rewrite the alogarithms so that each one
works correctly. (3 marks)

l e
p
a m
S
5

11 Table 2 below shows a screen from a spreadsheet program that has been used to plan a
household budget. Cells in the spreadsheet are referred to by column letters and row
numbers. Two examples of this are given below. The cell in column D and row two is
referred to as cell D2. It contains the data item "Ksh. 46000". The cell in column A
and row 5 is referred to as A5. It contains the data item "charcoal"
A B c D E F
1 Month January February March April Total

8
2 Rent 46000 46000 460-00 460-00 184000
3 Transport 000 000 250-00 250-00 50000

9
4 Electricity 10000 10000 100-00 10000 100-00
5 Charcoal 15000 15000 15000 15000 60000

9
6 Food 38000 270-00 15000 30000 1100-00

1
7 Total 109000 98000 111000 126000 444000
(a) Write down the data item that is stored in cell E6. (1 mark)

(b)

e r
Which cell contains the data item 'Transport' ? (1 mark)

(c)

a p
Cell B7 contains a formula that is not displayed on the screen. The formula
is sum B2 ... B6 or B2 + B3 + B4 + B5 + B6. What is the purpose of the

P
formula? (1 mark)

l e
p
12 (a) State any two components of a local area network. (2 marks)

a m
S
(b) List any two uses of computer facilities in schools. (2 marks)

Turn over
6

13 Explain three advantages of using a database instead of conventional computer file.


(3 marks)

9 8
9
14 Two major cities are 100km apart. There is a proposal to link the two metropolitan
area networks (MANS) together. Select with reasons the most suitable

1
communication media in this application. (4 marks)

e r
a p
P
15 Explain two effects of computer technology on career opportunities in the work place.
(2 marks)

l e
p
a m
S
Below is a list of 11 job titles in computer industry.
1 System analyst
2 Computer operator
3 Data processing manager
4 Database administrator
5 Computer engineer
6 Computer technician
7 Information resource manager
8 Network administrator
9 Computer trainer
10 Software engineer

8
11 Computer programmer

9
Using the titles above write down the correct job title of the person doing the
9
1
following jobs:
(a) Keying in data

r
(b) Daily backup of information

(c) Repairing computers

pe
a
(d) Training computer personnel
(2 marks)

P
l e
p
a m
S

Turn over
8

SECTION B

Answer question 17 and any other three questions.

With the aid of a flowchart, write a program in a highlevel language to read any
amount of dollars and convert it into Kenya shillings. The output must be in Kenya
shillings.
Assume the variables, dollars, exchange-rate and shillings as real numbers. (15 marks)

9 8
1 9
e r
a p
P
l e
p
a m
S
9
18 Microcomputers have had a considerable impact on office procedures in recent years.
Discuss the procedures that have been affected and in each case give an explanation of
how the software is applied. (15 marks)

9 8
1 9
e r
a p
P
l e
p
a m
S

Turn over
10

19 (a) Describe methods of data collection recommended as input to computer


systems in stock ordering in a supermarket. (9 marks)

9 8
1 9
(b)

e r
A vendor proposed to a supermarket a voice recognition system of data

p
capture. List the advantages and disadvantages of this device. (6 marks)

P a
l e
p
a m
S
11
20 A school uses a computer to store information on its pupils. The examination results
of the pupils are held in a coded form. Some of the fields used are as follows: Subject,
level, mark obtained and date of examination. The codes used for each field are:
Subject 001 = Literature
102 = Chemistry
304 = Geography
Level 02 = KCPE
03 = KCSE
04 = ORAL
The "mark" is a 3 digit number in the range of 000 to 100. Date of
examination is written in the following way:

8
1087 = October 1987

9
0686 = June 1986
(a) Interpret the following codes

9
(i) 102020560585

r 1
e
(ii) 001040831187

a p
P (4 marks)

l e
(b) Encode a mark of 65 in a KCSE Chemistry examination taken in November,
1984. (1 mark)

(c)

p
It is possible to make errors when entering information. State the conditions

m
required to validate in the:
(i) date field

S (ii) amark field.

(4 marks)
(d) State with reasons an example of three extra fields that might be useful.
(6 marks)

Turn over
12

21 (a) State five reasons why we need computer networking. (5 marks)

8
.t.

9 9
1
(b) With the aid of appropriate diagrams describe the following topologies as used
in local area network:

r
(i) Bus network

pe
P a
l e
p
m
(ii) Star network

a
(10 marks)

S
Name Index Number

451/1
COMPUTER STUDIES
PAPER 1
(Theory)
Oct/ Nov 1999
2 y hours
2

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1

9
(Theory)
2y hours
2

9 9
1
INSTRUCTIONS TO CANDIDATES

This paper has TWO sections; A and B.

E
Answer ALL the questions in section A.
Answer question 16 (compulsory) and any other THREE questions from section B.

S
All answers should be written in the spaces provided on the question paper.

C
For Official Use Only

K
SECT. QUESTION SCORE
A 1-15
16
17
B 18
19
20
Total Marks

This paper consists of 9 printed pages


Candidates should check the question paper to ensure that all the
printed pages are printed as indicated and no questions are missing.
9131 ©1999 The Kenya National Examinations Council Tu rn Over
2
SECTION A (40 marks)

Answer all questions in this section.

1 State any three functions of a computer. (3 marks)

2 Give two types of storage devices used in a computer giving an example of each. (4 marks)

9
3 Give any three precautionary measures considered to ensure the safety of computers in a
computer laboratory. (3 marks) ^

9 9
1
E
4 Define

(a) File

S
(b) Record

K C
(c) Field i :
(3 marks)

5 List two features of a word processor. (2 marks)

6 Differentiate between the hardware and software components of a computer giving an


example of each. (4 marks)

9138
3

7 What is program documentation? Give two examples of program documentations.


(3 marks)

8 Give two differences between high-level and low-level languages. (2 marks)

9 9
9

1 9
Worksheet cells are referenced using the column letter and row number e.g. D2 is cell in
column D and row 2.

E
Use the sample worksheet provided to answer the questions below.

A B C D E F

S
1 Month Jan. Feb. Mar. April. Total

C
2 Fees 460 460 460 460
3 Food 300 350 305 270

K
4 Electricity 100 100 100 100
5 Fuel 150 150 150 150
6 Transport 380 270 150 300
7 Total

(a) Write down the data type that is stored in cell C5. (1 mark)

(b) What cell contains the data item representing transport for the month of February?
(1 mark)

(c) Write down the formula that may be used to compute the total in cell F6. (1 mark)

9138 Turnover
5
SECTION B (60 marks)

Answer question 16 and any other three questions..


2
16 The roots of the equation ax + bx + c = 0 are given by the formula

(a) Draw a flow-chart to compute the roots of the equation. (10 marks)

9 9
1 9
SE
K C

9138 Turn over


(b) Using the flow-chart in (a), write a program that will compute the roots and
2
If b - 4ac is negative, the program should display the message "NEGATIVE".
(5 marks)

9 9
1 9
SE
C
A multinational organisation has offered to donate computers to your school. The Board of

K
Governors has requested you to advise on the operating system to be used by providing
answers to the following questions.
(a) What is an operating system? (1 mark)

(b) State and briefly explain any two types of operating systems. (6 marks)
(c) Briefly explain any four functions of an operating system. (8 marks)

(a) (i) State one area where computers are used.

(ii) Give any two advantages of using computers in this area. (6 marks)

9 9
9
(b) Explain the effect of computer technology in the following areas:

1
(i) Job opportunities

SE
C
(ii) Job skills

K
(iii) Communication.

(9 marks)

Turn over
8
19 A Computer Vendor has recommended the use of a computer database to your school for
students information.
(a) Explain to the Board of Governors what a database is and its functions. (5 marks)

(b) Give two examples of database systems. (2 marks)

9 9
(c) Briefly explain any two advantages and two disadvantages of using a database.

9
(8 marks)

1
SE
C
20 (a) What is a computer network topology? (2 marks)

b)
K
Using appropriate diagrams, show any three computer network topologies.
(9 marks)

9138
9
(c) Briefly explain two reasons why organisations need to network their computers.
(4 marks)

0909
2109
S E
K C

9138
Name Index Number ./

451/1
COMPUTER STUDIES
PAPER 1
(Theory)
Oct/ Nov. 2000
2Yi hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(Theory)

0
2/ hours
2

00
2
INSTRUCTIONS TO CANDIDATES

This paper has TWO sections; A and B.

E
Answer ALL the questions in section A.
Answer question 16 (compulsory) and any other THREE questions from section B.

S
All answers should be written in the spaces provided on the question paper.

C
For Official Use Only

K
SECT. QUESTION SCORE

A 1 - 15

16

17

B 18

19

20

Total Marks

This paper consists of 10 printed pages


Candidates should check the question paper to ensure that all the printed pages
are printed as indicated and no questions are missing
0138 ©2000, The Kenya[National Examinations Council Turn over
2

SECTION A (40 marks)

Answer the all questions in this section.

1 Write the following abbreviations in full. (3 marks)

(i) BCD

(ii) ASCII

(iii) EBCDIC

0 0
0
2 Define the term array as used in computer programming. (2 marks)

2
S E
C
3 Suggest how computers may in future be made more user friendly for persons that are;

(2 marks)

K
T
(a) blind _

(b) without hands

4 State three advantages of computer networking. (3 marks)

5 Name six steps in program development cycle in their logical sequence. (3 marks)

0138
State two methods of minimizing dust in a computer laboratory. (2 marks)

Differentiate between primary memory and secondary memory. (2 marks)

List the steps that you would use to correct wrongly spelt words in a document
using the spell checking feature. (3 marks)

0 0
2 0
9

S E
Differentiate between single-user and multi-user operating systems giving an example
of each. (3 marks)

K C
10 State what is meant by each of the following and give an example of where each
is used.

(a) Magnetic Ink Character Recognition (MICR) (2 marks)

0138 Turn over

1
F
4

(b) Optical mark reader (OMR)

11 In the following flowchart, what will be the value of the sum when printed?
Show how you arrive at your answer.

0 0
2 0
S E
K C
5

12 Distinguish between system software and application software. (2 marks)

13 Explain any three of the terms: creating, editing, printing and saving as used in
wordprocessing. (3 marks)

0 0
14

2 0
List three file organisation methods in a computer. (3 marks)

S E
C
15 What is the use of the search and replace feature in a wordprocessor? (2 marks)

0138 Turn over


SECTION B (60 marks)

Answer Question 16 and any three other questions.

16 A program is required for reading in a student's name and the scores obtained in two
subjects. The output of the program will consist of the student's name, the two
scores, the average of the two scores and a comment. The comment is based on the
average as follows:

Average Comment

> 70 Good

Z 70 Poor

Write a program to solve the problem using a high level language. (15 marks)

0 0
2 0
S E
K C

0138
17 (a) What is meant by data communication in a computer network? (2 marks)

(b) State what is meant by each of the following transmission media and give
one advantage and one disadvantage for each.

(i) Twisted pair cables. (3 marks)

(ii) Coaxial cables.

0 0 (3 marks)

2 0
S E
(iii)

K C
Optic fibre cables. - (3 marks)

0138 Turn over


8

(c) List four network elements in a local area network. (4 marks)

18 Andrew, Jane, David and Zablon had tea, sausages and bananas for breakfast. They took
one sausage, two sausages, three sausages and one sausage respectively. In addition,
they each took a cup of tea and two bananas. Tea, sausages and bananas cost Ksh. 10, 15,
and 5 respectively.
By naming columns A, B, C, and rows 1, 2, 3 :

0
(a) construct a worksheet showing the above information. (7 marks)

00
2
S E
K C
(b) state the expression you would use to obtain:

(i) total expenditure by David. (4 marks)

0138 Turn over


9

(ii) total number of sausages taken. (2 marks)

(iii) the cost of the cheapest item. (2 marks)

19 (a) What are computer viruses? (2 marks)

(b) (i) State two ways through which computer viruses may be controlled.
(2 marks)

0 0
0
(ii) Explain how each of the two ways stated in b(i) above assist in controlling
computer viruses. (2 marks)

2
S E
C
(c) Define each of the following computer terminologies: (3 marks)

K
(i) byte

(ii) bit

(iii) word

0138 Turn over


10

(d) Convert the hexadecimal number FC1 to its binary equivalent. (6 marks)

20 (a) A firm intends to purchase new software. List three items that should
accompany the software. (3 marks)

0 0
(b)

2 0
State and explain three ways that computer technology could make office work

E
more efficient. (6 marks)

S
K C
(c) Explain the meaning of each of the following computer crimes: (6 marks)

(i) Hacking

(ii) Fraud

(iii) Piracy
Name Index N u m b e r

451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2001
2 4 hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL

Kenya Certificate of Secondary Education


COMPUTER STUDIES
Paper 1
(THEORY)
2 j hours

INSTRUCTIONS TO CANDIDATES

0 1
0
This paper consists of T W O sections; A and B.
Answer A L L the questions in section A.

2
Answer question 15 a n d any other T H R E E questions from section B.
All answers should be written in the spaces provided on the question paper.

E
F o r Official U s e Only

S
Section Question Score

C
A 1-14

15

K
B
16

17

18

19

TOTAL MARKS

This paper consists of 11 printed pages

Candidates should check the question paper to ensure that all the
pages are printed as indicated and no questions are missing.
1111 © 2001, The Kenya National Examinations Council T u r n over
S E C T I O N A (40 marks)

Answer all the questions in this section.

C o m p a r e the t w o types of diskettes used in microcomputers in terms of physical size


a n d densities. (2 marks)

W h y is it necessary to have a U P S in a computer laboratory? (2 marks)

0 1
(a) Explain what is meant by batch processing.

2 0 (1 mark)

S E
C
(b) Give one advantage and one disadvantage of batch processing. (2 marks)

K
List any four high level programming languages. (2 marks)

1111
3

5 A 3 by 4 matrix array M is to be added to another 3 by 4 matrix array N so as to give a


third 3 by 4 matrix array P. Using a high level p r o g r a m m i n g language, write a program
segment that assigns the s u m of M and N to P. (4 marks)

6 The first column in the table below contains the formulae as stored into the cell F 1 0 of a
spreadsheet. Enter the formulae as they would appear w h e n copied to cell M 2 0 of the
same spreadsheet.

Formula in F 1 0 F o r m u l a in M 2 0

1
= D10*E10

0
= A$25
= $D$13

0
(3 marks)

2
7 Give three advantages of separating data from the applications that use the data in
database design. (3 marks)

S E
K C

1111 T u r n over
Explain the impact of information technology on organisations in each of the following
areas:

(a) competition (2 marks)

(b) pace of growth. (2 marks)

1
(a) List any four tasks that an electronic spreadsheet should be able to perform other

0
than calculations. (2 m a r k s )

(b)

2 0
Explain what is meant by automatic recalculation as used in a spreadsheet.

E
(1 mark)

S
C
10 Describe the functions of the following computer hardware c o m p o n e n t s :

K
(a) mouse (1 -j marks)

(b) scanner. ( 1 4 - marks)

1111
5

11 (a) State two differences between Disk Operating System ( D O S ) and W I N D O W S


operating system. (2 marks)

(b) (i) Define the term application software. (l)mark

(ii) G i v e one example of an application software. (1 mark)

12 (a)

0 1
Give one difference between internal and external c o m m a n d s in Disk Operating

0
System. (2 marks)

2
S E
C
(b) N a m e t w o D O S c o m m a n d s that m a y be used for checking disk errors. (1 mark)

13

K
Explain how a paragraph can be moved from one place to another in wordprocessing.
(2 marks)

14 Define the term structured programming. (2 marks)

1111 T u r n over
S E C T I O N B (60 marks)

Answer question 15 and any other three questions from this section.

(a) What is meant by each of the following terms:

(i) pseudocode ( 1 4 marks)

(ii) flowchart. ( 1 4 marks)

0 1
2 0
(b)

S E
A p r o g r a m is required to list the first 1000 numbers in the series: 2, 4, 6, 8, 1 0 , . . .
D r a w a flowchart and write a p r o g r a m that can be used to carry out this task.

C
(12 marks)

K
7

16 The following car details are to be entered in a database: M a k e , date-of-manufacture,


colour and cost.

(a) Prepare a suitable database structure showing field names and their field types.
(5 marks)

(b)

0 1
Explain h o w you index the data such that cars of the same m a k e and colour are

0
together. (2 m a r k s )

2
S E
(c)
K C
Write a statement that can be used to select cars of colour green. (2 marks)

1111 T u r n over
8

(d) Give an instruction that would:


(i) select cars whose cost is between 500,000/= and 1,000,000/- (3 marks)

(ii) determine the average cost of all cars. (3 marks)

17 (a) T h e diagram b e l o w represents the essential features of a computer system. Study


the diagram a n d answer the questions that follow:

0 1
2 0
S E
K C
(0 N a m e the components: (4 marks)

1111
9

(ii) On the diagram above, indicate the direction of data flow-using arrows.
(3 marks)

(b) N a m e the three types of buses in a computer system. (3 marks)

(c) Explain h o w the C P U registers may be used to carry out a basic calculation such as
2 + 7 = 9. (4 marks)

(d) N a m e t w o computer output devices. (1 mark)

0 1
0
18 (a) State three ways in which computer technology m a y affect employment patterns
in organisations. (3 marks)

2
S E
C
(b) (i) State and explain three reasons w h y the employment patterns are affected.

K
(6 marks)

1111 T u r n over
10

(ii) Suggest three strategies that can be employed to m a n a g e resistance to


change. (3 marks)

(c) Give three advantages of computerisation in an organisation. (3 marks)

19 (a)

0 1
In a computer based information system, state the purpose of the following files

0
and give one example where such a file m a y be required in a school. (8 m a r k s )

2
(i) Report file.

(ii) Back-up file.

S E
(iii)

K C
Reference file.

(iv) Sort file.

1111
11

(b) State three precautions that should be taken to ensure that diskettes are well stored.
(3 marks)

(c) Distinguish between "serial" and "indexed sequential" file organisation methods.
(2 marks)

0 1
(d)

2 0
Distinguish between binary and octal n u m b e r systems and give an example of
each. (2 marks)

S E
K C

1111
Name Index N u m b e r

451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2002
2 y hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(THEORY)
2 4 hours

2
INSTRUCTIONS TO CANDIDATES

0
This paper consists of T W O sections; A and B.

0
Answer A L L the questions in section A.

2
Answer question 16 and any other T H R E E questions from section B.
All answers should be written in the spaces provided on the question paper.

E
Candidates may be penalised for not following the instructions given in this paper.

S
For Official Use Only

C
Section Question Score

K
A 1-15

16

17

B 18

19

20

Total marks

This paper consists of 10 printed pages


Candidates should check the question paper to ensure that all the
pages are printed as indicated and no questions are missing.
2111 © 2002, The Kenya National Examinations Council Turn over
2

S E C T I O N A (40 marks)
Answer all the questions in this section.
1 Describe the purpose of each of the following computer functional units: (2 marks)
(a) control

(b) storage.

2 Explain how each of the following would affect the suitability of a room for use as a

2
computer room: (2 marks)

0
(a) burglar proofed door

(b)
2
availability of taps and sinks in the room. 0
S E
C
3 State three data representation codes used in computers. (3 marks)

K
4 State two types of documentation in program development and give the purpose of each.
(4 marks)

2111
3

5 Suppose a 5 element array A contains the values 9, 12, 17, 7 and 20. Find the value in A
after executing the loop below.
Repeat for k = 1 to 4
Set A[k + 1 ] : = A [k]
[ End of loop ] (3 marks)

6 State any three activities that occur in a program compilation process. (3 marks)

02
The formula = K 2 0 + P$ 18 was typed in cell L21 and then copied to cell M 2 4 of a

0
spreadsheet. Write the formula as it appears in cell M24. (2 marks)

2
8

S E
State two ways in which a computer may be used in efficient running of a hospital.
(2 marks)

9 K C
List three disadvantages of using traditional file management method. (3 marks)

10 Give one disadvantage of a single processor multi-user system. (1 m a r k )

2111 T u r n over
List three differences between a micro-computer and a super-computer. (3 marks)

State and explain two reasons why word processing is one of the most c o m m o n
applications of many computer users. (2 marks)

02
0
Write-1 in twos complement notation in byte form. (4 marks)

2
S E
K C
Explain the following input/output terms as used in computer systems. Give an example
for each. (4 marks)

(a) Read

(b) Write

State two disadvantages of networking. (2 marks)


S E C T I O N B (60 marks)

Answer question 16 and any other three questions from this section.

16 The following flowchart can be used to list the odd numbers between 0 and 100.

02
2 0
(a)

S E
Write a program segment for the flowchart using a high level language. (7 marks)

K C

2111 T u r n over
6

(b) What would be the output from the flowchart if the statement in the decision box
is changed to: (3 marks)

(i) odd = 1 0 0

(ii) odd < 100

(iii) odd > 100.

(c) Modify the flowchart so that it prints only the sum of the odd numbers between
0 and 100. (5 marks)

02
2 0
S E
K C
7

17 (a) List five precautions that can be taken to protect data stored in diskettes. (5 marks)

-^(b) State and explain two precautions that can be taken to help recover data lost through
accidental erasure. (4 marks)

02
(c)

2 0
Describe each of the following data processing methods:
(i) batch processing
(6 marks)

S E
(ii)

K C
distributed processing

(iii) multiprogramming.

2111 T u r n over
8

18 (a) (i) What is a computer keyboard? (1 mark)

(ii) List four types of keys found on a computer keyboard. Give an example
of each. (4 marks)

(b) Give four differences between present d a y s ' computers and the older generation
of computers. (4 marks)

02
2 0
(c) (i)

E
State three advantages and one disadvantage of using a laser printer.

S
(4 marks)

K C
(ii) Distinguish between a line printer and a page printer. (2 marks)

19 (a) Identify three Public Universities and three National Polytechnics in K e n y a w h e r e


further computer training is offered. In each case, state the highest level of
qualification that can be acquired in computer training. (6 marks)

2111
9

(b) Distinguish between "Job replacement" and "Job displacement" in reference to


computerisation. (2 marks)

(c) Give four reasons why a firm may decide to computerise its operations. (4 marks)

2
(d) An individual has a right to demand guarantee to privacy of personal information

0
stored on a computer.

0
Give three such types of information. (3 marks)

2
S E
20 (a)

K C
Give three comparisons of the traditional method of typing a document on a
typewriter against using a word processor. (6 marks)

(b) (i) Define the term spreadsheet. (1 mark)

(ii) Give two examples of spreadsheet packages available in the market today. (2 marks)

2111 T u r n over
10

(c) Explain the following terms as used in a spreadsheet:

(0 what if analysis (2 marks)

(ii) cell (1 mark)

(iii) formula (1 mark)

(iv) pie-chart. (2 marks)

02
2 0
S E
K C

2111
Name Index Number

451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct/Nov. 2003
2-j hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(THEORY)
24 hours

INSTRUCTIONS TO CANDIDATES
This paper consists of TWO sections; A and B.
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.
All answers should be written in the spaces provided on the question paper.

For Official Use Only

Section Question Score

A 1-15

16

17

B 18

19

20

TOTAL SCORE

This paper consists of 11 printed pages


Candidates should check the question paper to ensure that all the
pages are printed as indicated and no questions are missing.
3111 © 2003, The Kenya National Examinations Council Turn over
SECTION A (40 marks)

Answer all the questions in this section,

1 Computer systems are built from three types of physical components: processors,
memories and I/O devices.
(a) State two tasks of a processor. (2 marks)

(b) State the functions of I/O devices. (1 mark)

2 Threats to the safety of computer systems take many forms such as:
White-collar crime, natural disasters, vandalism and carelessness.
Give one way as to how each of these forms of threats can be controlled. (2 marks)

3 (a) Explain the term nibbles as used in data representation in computers. (1 mark)

(b) Perform the following binary arithmetic giving the answers in decimal notation.
(3 marks)
(i) 11100111 + 1101001 011

(ii) 1001011-011-111-111

3111
3

4 (a) Distinguish between machine and assembly language. (2 marks)

(b) State the type of translator necessary for a program written in:

(i) high level language

(ii) assembly language.

(2 marks)

5 Briefly explain the purpose of the following types of program documentation:


(a) user manual

(b) reference guide

(c) quick reference guide.

(3 marks)

6 State any two features of a user friendly program. (2 marks)

7 (a) Distinguish between labels and formulae with respect to spreadsheets. (2 marks)

3111 Turnover
4
(b) Consider the entries made in die cells below.
Cell B2 B3 CIO Cll C13
Entry 200 100 B2 B3 = C10 + C11
State the value displayed in cell CI3. (2 marks)

8 List three differences between Wide Area Networks (WAN) and Local Area Networks
(LAN). (3 marks)

Study the flowchart segment below and state the last value printed from the flowchart.
(2 marks)

10 (a) What is an expert system? (1 mark)

3111
(b) State any two components of an expert system. (2 marks)

Give two reasons why optical disks are better storage media compared to floppy diskettes.
(2 marks)

What are the DOS commands used for the following? (2 marks)
(a) Changing directories.

(b) Viewing directories.

(c) Renaming directories.

(d) Deleting a directory.

Distinguish between copying and moving text. (2 marks)

(a) Name two methods of paper orientation. (1 mark)

(b) Name two keys used to delete text in a document. (1 mark)

Name two features of a Database package. (2 marks)

Turn over
7

(b) List the outputs of the flowchart above. (5 marks)

(c) Modify the flowchart so that it adds up all its outputs and displays the sum
obtained. (3 marks)

3111 Turn over


8

A computer specification has the following details:


Pentium III
144 MB floppy disk drive
20 GB hard disk
Full multimedia
17" SVGA monitor
Pre - installed operating system
Pre - installed office suite.
(a) What is meant by: (6 marks)
(i) 1.44 MB floppy disk drive?

(ii) 20 GB hard disk?

(iii) 17" SVGA monitor?

(b) Which operating system might be pre-installed in this computer and why? (2 marks)

(c) List three multimedia components. (3 marks)

(d) (i) What is meant by computer aided manufacture? (2 marks)

(ii) Give two examples of computer aided design software. (2 marks)


of network software.

(b) List any three items that may be referred to as data terminal equipmen
network.

(c) Briefly explain the following terms as used in networking:


(i) remote communication

(ii) distributed processing.

State three advantages and two disadvantages of mesh network topology. (5 marks)
10

19 00 A company has decided to computerise their operations. They have decided to


purchase packages instead of developing their own programs. Give three
advantages and two disadvantages of this approach. (5 marks)

(b) (i) Explain why a value such as 611233444555 may be displayed as


# # # # # # when typed in a cell of a spreadsheet. (2 marks)

(ii) How can the problem in (b)(i) above be corrected? (2 marks)

(c) With reasons, briefly describe the most appropriate type of printer or output
device for the output of: (6 marks)
(i) customer invoices on multi-part stationery

(ii) letters to customers

(iii) detailed engineering designs.

20 (a) Distinguish between the following pairs of terms: (6 marks)


(i) data verification and data validation

(ii) data encryption and passwords

(iii). dry run and walkthrough.

311.1
11

(b) Draw a labelled diagram to illustrate the internal structure of a diskette. (4 marks)

(c) Give two differences between post office mail and electronic mail (E - mail).
(2 marks)

(d) Speed and accuracy are some of the advantages of using computers in banking.
State three other advantages of use of computers in banking. (3 marks)

3H1
Name Index Number

451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2004
2 j hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(THEORY)
2 hours

INSTRUCTIONS TO CANDIDATES

This paper consists of TWO sections; A and B.

04
0
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.

2
All answers should be written in the spaces provided on the question paper.

E
For Official Use Only

S
Section Question Score

C
A 1-15

K
16

17

B 18

19

20

TOTAL SCORE

This paper consists of 12 printed pages


Candidates should check the question paper to ensure that all the
pages are printed as indicated and no questions are missing.
4111 © 2004, The Kenya National Examinations Council Turn over
SECTION A (40 marks)
Answer all the questions in this section.

How is a point of sale terminal used in a business organisation? (2 marks)

Distinguish between a compiler and an interpreter. (2 marks)

04
2 0
E
Explain why computers use binary numbers in data representation. (2 marks)

S
K C
4 What is meant by the term dry running as used in program development? (2 marks)

A computer teacher has put a rule that diskettes should not be used in the
Computer Laboratory.

(a) Give a reason for the rule. (1 mark)

4111
3

(b) State two other alternatives that can be used to achieve the same objective. (2 marks)

6 List three differences between a laser printer and a dot matrix printer. (3 marks)

7 List four stages involved in the data processing cycle.

04 (2 marks)

2 0
S E
8 (a)
K C
What is a utility software? (1 mark)

(b) Give four examples of utility software. (2 marks)

4111 Turn over


4

9 Distinguish between an intelligent terminal and a dump terminal. (2 marks)

10 List two duties of each of the following personnel:

(a) Database administrator. (2 marks)

04
2 0
(b) Data processing manager.

S E (2 marks)

K C

11. Differentiate between source program and object program. (2 marks)

4111
5

12. (a) In DOS, what are the following commands used for?

(i) RD (1 mark)

(ii) DEL *.* (1 mark)

(b) What happens when the following commands are typed in the DOS
environment?

(i) CD— (1 mark)

04
0
(ii) DIR (1 mark)

2
13

S E
A student presented a budget in the form of a worksheet as follows.

C
A B C
1 Item Amount

K
2 Fare 200
3 Stationery 50
4 Bread 300
5 Miscellaneous 150
6 Total

The student intends to have spent half the amount by mid-term.

(a) Given that the value 0.5 is'typed in cell B9, write the shortest formula
that would be typed in cell C2 and then copied down the column to obtain
half the values in column B. (1 mark)

(b) Write two different formulae that can be typed to obtain the total in cell B6 and then
copied to cell C6. (2 marks)

4111 Turn over


6

14 State three operations that can be performed on relational database files. (3 marks)

15 List three parts that constitute an array definition statement. (3 marks)

04
2 0
S E
K C
7

SECTION B (60 marks)

Answer question 16 and any other three questions from this section.

16 Bidii wholesalers has two categories of customers for order processing. Category ' A '
obtains 10% discount on all orders upto Ksh. 10,000 otherwise the discount is 20% on the
entire order. Category ' B ' obtains 30% discount on all orders if the debt repayment is
'good' otherwise the discount is 15%. Draw a flowchart for the order processing.
(15 marks)

04
2 0
S E
K C

17 (a) List three application areas of artificial intelligence. (3 marks)

4111 Turn over


8

With the improvement in price and performance of computers and communication


equipment, it will be possible for people in various business organisations to work
from home. Such working using a PC as a remote terminal is often described as
teleworking. State three advantages and three disadvantages of working from
home. (12 marks)

Advantages

Disadvantages

04
2 0
S E
K C
Explain three ways by which computer users can protect their eyes from
harmful emissions from the computer screen. (6 marks)
9

(b) List three factors to be considered when deciding on the choice of an electronic
data processing method. (3 marks)

(c) Explain time sharing data processing mode giving two advantages and two
disadvantages of its application. (6 marks)

04
2 0
S E
19 K C
A school has bought a Computer System. The hardware items supplied include:
a 800MHZ processor, 640 MB of RAM, a sound card, speakers, a monitor, a keyboard,
a 12GB hard disk, a floppy disk drive, a CD - Read/Write drive, a mouse, a modem, an
inkjet printer and a joystick. The software supplied include: an operating system, a BASIC
interpreter and the following packages: spreadsheets, graphics, word processor, art,
database and games.

(a) List three input devices from the given specifications. (3 marks)

4111 Turn over


10

Explain the meaning of the following:

(i) 800MHZ (2 marks)

(ii) 640 MB (2 marks)

4
(iii) 12 GB (2 marks)

00
2
S E
Some of the students in the school use he computer to do homework.

C
Name the packages used to:

K
(i) do calculations and draw graphs (1 mark)

(ii) write an essay (1 mark)

(iii) make a poster. (1 mark)

Students enjoy playing noisy computer games.

(i) Which two hardware items are needed to produce sound? (2 marks)
11

(ii) Which input device is only used for playing games? (1 mark)

20 A school organizes its work in directories. The directory WP contains the files CATS,
EXAMS and ASSIGNMENTS. The directory SP contains the spreadsheet files. The
directory DB contains the database files. The directory PROG is contained in the others
directory. The directory WP also contains the PERSONAL directory. Given that the
directory student contains directories SP, DB, WP and OTHERS.

(a) Draw the directory tree structure with C as the root. (7 marks)

04
2 0
S E
K C
(b) Write the path at which the contents of the subdirectory DB can be erased or
displayed. (2 marks)

(c) Write the path for the directory PROG. (2 marks)

4111 Turn over


12

(d) Give two reasons for storing files in directories and subdirectories. (2 marks)

(e) Give two disadvantages of using command driven interfaces as compared to


menu driven interfaces. (2 marks)

04
2 0
S E
K C
Name Index Number

451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2005
2 hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(THEORY)
2 4 hours

INSTRUCTIONS TO CANDIDATES

05
This paper consists of TWO sections; A and B.
Answer ALL the questions in section A.

2 0
Answer question 16 and any other THREE questions from section B.

E
All answers should be written in the spaces provided on the question paper.

S
For Official Use Only

C
Section Question Score

K 1-15

16

17

B 18

19

20

TOTAL SCORE

This paper consists of 12 printed pages


Candidates should check the question paper to ensure that all the
pages are printed as indicated and no questions are missing.
5111 © 2005, The Kenya National Examinations Council Turn over
SECTION A (40 marks)

Answer all the questions in this section.

What is disk formatting? (1 mark)

Indicate whether the following devices are used for input or output. (2 marks)
(i) Plotter

(ii) Light pen

(iii) Mouse

05
0
(iv) Visual display unit

2
E
Explain why the following controls should be implemented for computer based systems.
(2 marks)

(i) Back-ups.

S
(ii) Passwords. K C
For each of the following, give one reason why they are not allowed in a computer
laboratory. (2 marks)

(i) Smoking.
3

(ii) Eating foods.

3 Distinguish between Real, Integer and Character data types as used in programming.
(3 marks)

4 The cells K3 to K10 of a worksheet contain remarks on students performance such.as very

5
good, good, fair and fail depending on the average mark. Write a formula that can be used to
count all students who have the remark "very good". (3 marks)

00
2
5 (a) State the purpose of registers in a computer system. (1 mark)

S E
C
(b) Name two multiprogramming operating systems. (2 marks)

K
6 (a) A serial file comprises of records placed in positions 1 to 10. State the position of the
end of file marker. (1 mark)

5111 Turn over


State the purpose of each of the following: (2 marks)

(i) file server software

(ii) communication software.

Name the control structure depicted by the flowchart below. (1 mark)

05
2 0
S E
K C
Explain the following terms as used in program implementation. (2 marks)

(i) Parallel running.


5

(ii) Direct change over.

Consider the linear arrays:

(i) AAA (5:50)

(ii) BBB(-5:10)

(iii) CCC(18)

Find the number of elements in each array. (3 marks)

05
2 0
E
Define the term artificial intelligence. (2 marks)

S
K C
10 Name two types of relationships that can be applied in database design. (2 marks)

11 Explain the following terms as used in wordprocessing: (3 marks)

(a) indenting

5111 Turn over


(b) alignment

(c) word wrap

Outline two ways in which computers can be used in hotels. (2 marks)

5
(a) Explain Binary Coded Decimal code of data representation. (1 mark)

00
2
E
(b) Write the number 451 in BCD notation.
)0 (1 mark)

S
C
Arrange the following data units in ascending order of size.

K
BYTE, FILE, BIT, NIBBLE. (2 marks)

State two health issues that may result from prolonged use of computers. (2 marks)
SECTION B (60 marks)

Answer question 16 and any other three questions from this section.

State the stage of program development in which: (2 marks)

(i) a flowchart would be drawn

(ii) the programmer would check whether the program does as required

(iii) the user guide would be written

5
(iv) the requirements specifications would be written.

00
2
State the output of the following flowchart segment.

A = 30

S E
C
\ r
B = 28

B = A K
A = B

(2 marks)

Turn over
8

(i) Draw a flowchart to compute the combined resistance (R) of two resistors R|
and R2 in parallel using the formula;

(5 T marks)

05
(ii)

2 0
Write a program using Pascal or C languages for the flowchart in c(i) above.
(5 7 marks)

S E
K C

List three paragraph formatting activities in wordprocessing. (3 marks)


9

(b) Differentiate between bolding and highlighting text. (2 marks)

(c) The following information shows the income and expenditure for "Bebayote" matatu for
five days. The income from Monday to Friday was Kshs. 4,000, 9,000, 10,000, 15,000
and 12,000 respectively while the expenditure for the same period was Kshs. 2,000,
3,000, 7,000, 5,000 and 6,000 respectively.

Draw a spreadsheet that would contain the information. Indicate the rows as
1,2,3 and the columns as A, B, C (4 marks)

05
2 0
S E
C
(ii) State the expression that would be used to obtain:

K
I Monday's profit (2 marks)

II total income (2 marks)

III highest expenditure. (2 marks)

18 (a) Subtract 0111 from 1001


2 2 0 mark)

5111 Turn over


10

Using two's complement, substract 7 from 4 and give the answer in decimal notation.
(4 marks)

Convert:
(i) 91Bi6 to octal (3 marks)

5
(ii) 3768 to hexadecimal (3 marks)

00
2
E
(iii) 9.625 io to binary. (4 marks)

S
K C
Explain what the following DOS commands will do when executed.

(i) A:\>copy *.* B: (2 marks)

(ii) C:\>ERASE *.DOC (2 marks)


11
i

(iii) B:\>DIR P*.BAT (2 marks)

(iv) A:\>MD E X A M S (2 marks)

(b) (i) With the aid of a diagram, explain hierarchial (tree) network topology.
(3 marks)

05
2 0
(ii)

S E
List two advantages and two disadvantages of hierarchial network topology.
(4 marks)

C
Advantages

K
Disadvantages

5111 Turn over


12
20 (a) Name and explain the function of the keyboard keys represented by the following
symbols.

(i)
(2 marks)

(ii)
(2 marks)

(iii)
(2 marks)

05
(b)

2 0
Simulation is one of the application areas of computers,
(i) What is meant by the term simulation? (1 mark)

S E
(ii)
C
Name two application areas of simulation.

K
(2 marks)

(iii) State three advantages of computer based simulation. (3 marks)

(c) Explain three ways in which computers have impacted on education. (3 marks)

5111
Name Index Number

COMPUTER STUDIES
PAPER 1 (SAMPLE PAPER)
(THEORY)
2006
272 hours

THE KENYA NATIONAL EX


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1 (SAMPLE PAPER)
(THEORY)
2Vi hours

6
This paper consists of two sections; A and B.
Answer all the questions in section A.

0
Answer question 16 and any other three questions from section B.

2
For Official Use Only
0
e
Section Question Score

p l 1-15

16

a m 17

S
B 18

19

20

Total Marks

This paper consists of 5 printed pages

Candidates should check the question paper to ensure that all


the pages are printed as indicated and no questions are missing.

© 2005, The Kenya National Examinations Council Turn


S E C T I O N A (40 M A R K S )

Answer all the questions in this section.

1 State two practices to be observed in order to ensure the safety of the computer user.
(2 marks)
2 Give an example of a:

(a) device that reads data. (3 Marks)

(b) pointing device

(c) voice input device.

3 How does an operating system organise information? (1 Mark)

4 List three factors to be considered when purchasing a micro-computer. (3 Marks)

5 Distinguish between data and information, (2 Marks>

6
6 (a) State the type of data communication media that could be used in an electronically

0
noisy environment. (1 Mark)

0
(b) Explain your answer in (a) above. (1 Mark)

2
Give two reasons why it is necessary to have a program design. (2 Marks)

l e
8 Distinguish between portrait and landscape orientations. (2 Marks)

p
9 (a) State one use of hexadecimal notation in a computer. (1 Mark)

m
(b) Convert 161% to hexadecimal. (2 Marks)

a
10. Explain two features of a DVD that enables it to store more information than a CD-R

S
(4 Marks)
Explain the meaning of the following terms:

(a) cracking (2 Marks)

(b) fire walls. (2 Marks)

12. Name three responsibilities that are carried out by a web administrator, (3 Marks)

13. (a) What is meant by the term e-learning? (1 Mark)

(b) A school intends to set-up an e-learning system. List three problems that are likely to
be encountered. (3 Marks)

14. Name three circumstances in which it is better to use a questionnaire than an interview for

gathering information. (3 Marks)

451/1
15. A worksheet contains the data shown below:

Cell Al A2 A3 CI C2 C3 Gl

Entry 5 7 10 10 15 15 = S U M I F ( C 1 : C3, " < > 10", A1:A3)

State the value displayed in G l . (2 Marks)

SECTION B (60 Marks)

Answer question 16 and any other three questions from this section.

16. (a) The following Pseudocode processes data in an array A:

n=3

6
for /' = 2 to n do

0
X = A[i]

0
A[0]=X
j = i-\

While A [ j ] > X do

2
A[j +

l e
1]= A[j ]

p
J= J- 1

m
End while

a
A[j + l] = X

S
Print A [ 1 ], A[ 2 ], A[ 3 ]

End for

(i) Draw a flowchart for the above pseudocode. (7 Marks)

(ii) Initially^ [ 1 ] = 4, A[ 2 ] = 3, A[ 3 ] = 9.
What is the output of the above pseudocode? (6 Marks)

(iii) What is the purpose of the above pseudocode? (1 Mark)

(b) Give an advantage of using an object oriented programming language. (1 Mark)

451/1 Turn over

3
17. (a) Study the diagram below and answer the questions that follow:

06
0
(i) Name the communication media depicted in the above diagram. (1 Mark)

2
(ii) Name the parts labelled A, B, C and D (4 Marks)

l e
(iii) List three advantages of the above communication media. (3 Marks)

p
(b) A student is attempting to print a programming documentation. The printer is not
responding to the print command. Explain four possible causes for the anormally.

m
(4 Marks)

a
(c) Describe three mouse clicking techniques. (3 Marks)

S
18. (a) Despite the introduction of the ATM Card, human resource is still necessary
in the banks. Give two reasons why humans are still needed. (2 Marks)

(b) State four advantages to the users of the cards. (4 Marks)

(c) Give two safety precautions that the card owners should observe to ensure
security of their money. ( 4 Marks)

(d) (i) What is virtual reality? (2 Marks)

(ii) List three areas where virtual reality is used? (3 Marks)

19. (a) Distiguish between logical and physical computer files. (2 Marks)

(b) (i) Define the term computer ethics. (1 Mark)

(ii) Give two examples to show how a person who has committed a
computer crime can help to improve a computer system. (2 Marks)
451/1

4
(c) (i) What is a search engine? (IMark)

(ii) The internet can be used to source information about emerging issues that may
not be available in print form. Give two advantages and two disadvantages of
information obtained from the internet. (4 Marks)

(d) A recent breakthrough in the manufacturing industry is the development of a full


manufacturing plant that can produce vehicles using robots only. Despite these
advances, some manufactures prefer to use human labour. Give three advantages and
two disadvantages of fully automated manufacturing.

(5 Marks)

20. (a) (i) Give one advantage of using GUI over a Command Line Interface. ( I M a r k )

(ii) Some computer systems still use command line interfaces. State two
advantages of command line interface. (2 Marks)

6
(b) (i) Distinguish between operating system software and utility software.

0
(2 Marks)

0
(ii) Name two utility programs. (2 Marks)

2
(c) (i) Outline three precautions one should take when assembling a computer.

e
(3 Marks)

l
(ii) Give three reasons why one might purchase a computer with a one year

p
warranty instead of a three year warranty. (3 Marks)

(d) Distinguish between serial and parallel communication ports of a computer.

m
(2 Marks)

S a

451/1

5
Name Index Number

451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2006
2 y hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(THEORY)
2 j hours

INSTRUCTIONS TO CANDIDATES

06
0
Write your name and index number in the spaces provided above.
This paper consists of TWO sections; A and B.

2
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.

E
All answers should be written in the spaces provided on the question paper.

S
For Official Use Only

C
Section Question Candidate's
Score

K
A 1 - 15

16

17

B 18

19

20

Total Score

This paper consists of 12 printed pages.


Candidates should check the question paper to ensure that all the
pages are printed as indicated and no questions are missing.
6079 © 2006 The Kenya National Examinations Council Turn Over
SECTION A (40 marks)

Answer all the questions in this section in the spaces provided.

1 What is meant by:

(a) analogue data (1 mark)

(b) digital data? (1 mark)

2 Distinguish between transcription and transposition types of errors and give an example of

6
each. (4 marks)

00
2
3 (a) What are peripheral devices?

S E (1 mark)

K C
(b) Give two examples of peripheral devices. (1 mark)

4 (a) What is meant by the term userfriendly as used in software development?


(1 mark)

6079
(b) Distinguish between the terms single-tasking and multi-user as used in operating
systems. (2 marks)

5 What actions should be taken in case of a fire outbreak in the computer laboratory?
(4 marks)

06
0
6 (a) What is an Internet Service Provider? (1 mark)

2
(b)

S E
An employee in a business company is charged with the responsibility of putting the

C
company advertisements on the internet.

K
(i) State the professional title of the employee. (1 mark)

(ii) Give an example of software used by this employee to carry out the above task.
(1 mark)

7 Differentiate between COM ports and LPT ports. (2 marks)

6079 Turn over


5

12 (a) List two arithmetic operations that can be performed on a row of numeric data in a word
processing table. (1 mark)

(b) In each case of (a) above, write the expression used. (2 marks)

13 List two methods of gathering information during system development process. (2 marks)

06
14 Name three types of optical disks.
2 0 (3 marks)

S E
15

K C
The diagram below shows a formatted plate surface of a storage disk.

Shade and label:


(a) one sector (1 mark)
(b) one block (1 mark)
6079 Turn over
Answer question 16 and any other three questions from this section in the spaces provided.

16 (a) List two examples of:

(i) third generation languages (2 marks)

(ii) object oriented languages. (2 marks)

(b) Draw a flowchart to compare three non-equal numeric values A, B, C and print the

6
largest of the three. (11 marks)

00
2
S E
K C

6079
One of the functions of an operating system is job scheduling.
Explain what is meant by job scheduling. (1 mark)

List and explain three types of user interfaces. (6 marks)

06
0
Describe the following categories of software:

2
(i) firmware (1 mark)

S E
C
(ii) proprietary software. (1 mark)

K
A new company XYZ intends to go into the business of desktop publishing.
Advise the company on three computer hardware system specification features to
consider as a measure of enhancing performance. (6 marks)

Distinguish between the following sets of terms as used in spreadsheets.

(i) Worksheet and workbook. (2 marks)

Turn over
8

(ii) Filtering and sorting. (2 marks)

(b) State one way in which a user may reverse the last action taken in a spreadsheet
package. (1 mark)

(c)

06
The following is a sample of a payroll. The worksheet row and column headings are

0
marked 1, 2, 3 , . . . and A, B, C,... respectively.

A B C
PAY PER
D
BASIC
2 E F
GROSS
G
TAX
H
NET

E
1 HOURS
NAME WORKED HOUR PAY ALLOWANCES PAY DEDUCTIONS PAY
2 KORIR 12 1500

S
3 ATIENO 28 650
4 MUTISO 26 450

C
5 ASHA 30 900

K
6 MAINA 18 350
7 WANJIKU 22.5 500
8 WANYAMA 24.5 250
9 OLESANE 17 180
10 MOSETI 33 700
TOTALS

Use the following expressions to answer the questions that follow:

• Basic pay = Hours worked x pay per hour


• Allowances are allocated at 10% of basic pay
• Gross pay = Basic pay + allowances
• Tax deductions are calculated at 20% of gross pay
• Net pay = Gross pay - tax deductions.

Write formulae using cell references for the following cells:

(i) D2 (1 mark)

6079
(ii) E4 (1 mark)

(Hi) F10 (lmark)

(iv) G7 (1 mark)

(v) H5 (1 mark)

(d) (i) State three ways of moving round the page in a Desktop Publishing window.
(3 marks)

06
0
(ii) State two ways on how Information & Communication Technology (ICT) can

2
be used to reduce the spread of HIV/AIDS. (2 marks)

S E
19 (a)

K C
Describe the following terms with reference to security of data:

(i) log files (lmark)

(ii) firewalls. (1 mark)

6079 Turn over


10

(b) A students' database comprises of students' details table and fees received table as
shown below:

Students' details Fees Received


table table

Surname
Middle Name Date
First Name Amount
Admission Number Receipt Number
Course

(i) State the primary key field for each table. (2 marks)

06
0
(ii) State the field which should serve as the linking field for the two tables.

2
(2 marks)

S E
C
(c) Describe the following terms with respect to computer security:

K
(i) logic bombs (2 marks)

(ii) physical security (2 marks)

(iii) tapping. (2 marks)

6079
11

(d) List three functions of an antivirus software. (3 marks)

20 (a) The diagram below shows four common network topologies A, B, C and D.

06
2 0
S E
K C

6079 Turn over


12

(i) Name the network topologies labelled A, B, C and D. (4 marks)

D ;

(ii) Explain what happens if server X in topology A fails. (1 mark)

6
(iii) List two problems associated with network topology B. (2 marks)

00
(iv)

2
List two disadvantages associated with network topology D. (2 marks)

S E
C
Differentiate between Internet and World Wide Web. (2 marks)

K
Describe the following network services and identify their applications.

(i) Voice mail. (2 marks)

(ii) Video conferencing. (2 marks)

6079
Name Index n u m b e r

451/1
COMPUTER STUDIES Candidate's signature
Paper 1
(THEORY) Date
Oct./Nov. 2007
24 hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(THEORY)
2 4 hours

Write your name and index number in the spaces provided above.
Sign and write the date of the examination in the spaces provided above.

7
This paper consists of TWO sections; A and B.

0
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.

0
All answers should be written in the spaces provided on the question paper.

2
For official Use Only

Section

S EQuestion Candidate's
Score

C
A 1 - 15

K
16

17

B 18

19

20

Total Score

This paper consists of 14 printed pages

Candidates should check the question paper to ascertain that all the
pages are printed as indicated and no questions are missing.

©2007 The Kenya National Examinations Council


7077 T u r n over
2

S E C T I O N A (40 marks)
Answer ALL the questions in this section in the spaces provided.

Describe the computer booting process. (2 marks)

State the functions of the following keys on the computer keyboard: (2 marks)

7
(a) backspace

00
2
(b) insert (ins).

S E
Jane has noticed the following problems in her computer:

C
• it is taking a longer time to start up;

K
• it is often hanging;
• applications are taking longer to load.

State three possible causes of these problems and how they can be solved. (3 marks)

7077
3

4 (a) Define authenticity as used in software selection. (1 mark)

(b) List four ways of acquiring software in an organization. (2 marks)

5 Some of the storage disks available are:

07
Zip disks, 3 \ inch floppy disks, D V D s and 5 \

0
inch floppy disks. Arrange" these devices in an ascending order of storage capacity.

2
(2 marks)

E
6 You have been asked to change your computer password. State a precaution you need to

S
take in order to avoid each of the following:

C
(a) forgetting the password (1 mark)

(b) hacking.
K (1 mark)

7 State four benefits of using a computer in a school library. (2 marks)

7077 Turn over


4

8 Using six bits, find the two's complement of -2310. (4 marks)

9 Explain data series, axis and legend as used in spreadsheet charts: (3 marks) ^

7
data series

axis

00
2
E
legend

S
C
10 (a) Describe the term data integrity. (2 marks)

K :

(b) State four situations in which data may lose integrity. (2 m a r k s )

11 State the function of each of the following:

(a) network interface card (1 mark)

7077
5

(b) network protocol (1 mark)

(c) hub. (1 mark)

07
12
2 0
List four types of publications that can be designed by using desktop publishing software.

E
(2 marks)

S
K C
13 Differentiate between the following pairs of terms as used in database design: (2 marks)

(a) input mask and design

7077 Turn over


6

(b) table and query. (2 marks)

14 List four factors to be considered when purchasing an operating system. (2 marks)

07
2 0
15

S E
Write an algorithm to compute the area of a triangle. (2 marks)

K C

7077
SECTION B (60 marks)

Answer question 16 and any other THREE questions from this section in the spaces provided.

16 (a) Study the flowchart below and answer the questions that follow.

START

M=6
N = 17

P = M-N
Q = N+M

YES NO

07 M=N

0
Q=M
P=N

2
S E
K C
(i) N a m e the control structures used in the flowchart. (2 marks)

(ii) Determine the values of M, N, P and Q. (4 marks)

M N

P Q

7077 Turn over


8

7
(iii) Write the pseudocode for the flowchart. ( 8 marks)

07
2 0
S E
K C

7077
List four functions of an assembler. (2 marks)

Define the following web related terms:

(i) web browser (1 mark)

(ii) hyperlink

07 (1 m a r k )

2 0
E
(iii) hyper text document. (1 mark)

S
K C
List six activities performed on the web. (3 marks)

An institution has ten stand-alone computers.


(i) Suggest with reasons the most appropriate topology required to inter-connect
the computers. (3 marks)

Turn over
10

(ii) State the necessary steps required to connect the computers to the internet.
(4 marks)

07
(d) Below is an e-mail address:

2 0
E
ggitau @moest.edu.ke

S
(i ) (ii) (»') (iv)

C
N a m e the parts labelled (2 marks)

K
(i)

(")

(Hi)

(iv)

18 A computer C directory has folders for Form 1, F o r m 2, F o r m 3 and F o r m 4. Each class


has student's folders labelled according to their admission number. The students create their
own folder for the subject they are studying based on the table shown below.

Form 1 Form 2 Form 3 Form 4

OS SP Prog. ADB

DTP
WP Internet
DB

7077
11

Assuming there is one student per class, draw the corresponding tree structure. (6 marks)

07
0
(i) A form four student wants to create a folder to store her project. State the

2
path for that project folder. (2 marks)

(ii)

S E
Suggest how the student can ensure that:

C
w o r k is not lost in case the hard disk fails; (1 mark)

K
the project is not copied by other students. (1 mark)

(i) Other than I/O devices, list other three devices under the control of the
operating system. (3 marks)

(ii) Explain any one of the devices named in (c)(i) above . (1 m a r k )

Turn over
12

(d) Define the term trouble shooting. (1 mark)

A manager wishes to replace the current manual system with a computerised one.
(a) Describe three main areas that must be evaluated to justify the replacement.
(6 marks)

07
2 0
S E
(b) K C
List the three areas that would be considered in the requirements specifications.
(3 marks)

(c) State and explain three ways that can be followed to replace the current system.
(6 marks)
13

20 (a) A headteacher keeps the following student details in a database: N a m e , Address,


Town, Date of birth, Marks scored, Fees paid.

(i) Name the most appropriate primary key. Give a reason. (2 marks)

(ii) For each item in the student's details above, indicate its most appropriate
datatype as used in the database. (3 marks)

07
2 0
(iii)

S E
Explain why input screens are better data entry designs than entering data

C
directly to a table. (2 marks)

K
(b) List two career opportunities associated with databases. (2 marks)

(c) Distinguish between:

(i) a table in word-processing application and a table in a database application


(2 marks)

7077 Turn over


14

(ii) mouse pointer and insertion point. (2 marks)

(d)

07
Outline the steps to be followed in order to merge cells in a word processing table.

0
(2 marks)

2
S E
K C

7077
NAME Index No. /

451/1 Candidate's Signature


COMPUTER STUDIES
Paper 1 Date
(THEORY)
Oct./Nov. 2008
2V2 hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(THEORY)
2V2 hours

Instructions to candidates

8
Write your name and index number in the spaces provided above.
Sign and write the date of the examination in the spaces provided above.

0
This paper consists of two sections; A and B.

0
Answer all the questions in section A.
Answer question 16 and any other three questions from section B.

2
All answers should be written in the spaces provided on the question paper.

E
For Examiner's Use Only

S
Section Question Candidate's
Score

C
A 1 -15

K
16
17
B 18
19
20
Total Score

This paper consists of 15 printed pages.

Candidates should check the question paper to ascertain that all the
pages are printed as indicated and no questions are missing.

8357 ©2008 The Kenya National Examinations Council Turn over


SECTION A (40 marks)

Answer all the questions in this section in the spaces provided.

1 (a) Describe an input device. (1 mark)

(b) Other than scanning devices, name two other input devices. (1 mark)

8
2. Distinguish between the following:

(a) CRT and LCD

00 (2 marks)

2
S E
K C

(b) OCR and OMR. (2 marks)

8357
3

3. (a) What is meant by freeware? (1 mark)

(b) State two ways of acquiring freeware. (1 mark)

4. Describe the term 'home page' as applied in the internet. (2 marks)

08
5. (a) Define the term Computer Aided Design.
2 0 (1 mark)

S E
K C
(b) List three advantages of using Computer Aided Design. (3 marks)

• • • • in fit

8357 Turn over


4

6. List three ways in which computer technology can be used in law enforcement. (3 marks)

7. A computer system is able to work on both spreadsheet and wordprocessing documents.


Explain how a computer can operate two packages at the same time. (2 marks)

08
2 0
S E
C
8. Describe each of the following types of computers (2 marks)

K
(a) hybrid;

(b) embedded.

9. State two purposes of the maintenance phase of the system development life cycle.
(2 marks)

8357
5

10. (a) List four stages in data collection. (2 marks)

(b) What is meant by the following: (2 marks)

(i) transaction file;

(ii) master file?

08
2 0
E
11. Headache, back and neck pain may result from use of computers. State how each of them
can be minimised. (2 marks)

S
K C
12. State two ways in which each of the following can be prevented: (4 marks)

(a) software errors;

(b) computer fraud.

8357 Turn over


6

13. In relation to DTP, state the:

(a) purpose of frames; (1 mark)

(b) difference between an inside margin and an outside margin. (2 marks)

14. Distinguish between formatting a disk and scanning a disk with reference to operating

8
systems. (2 marks)

00
2
S E
C
15. State two advantages of using robots in manufacturing of goods. (2 marks)

8357
7

SECTION B (60 marks)

Answer question 16 and any other three questions


from this section in the spaces provided.

16. Study the flow chart below and answer the questions that follow.

08
2 0
S E
K C
If DATA is the following sorted list of 13 elements, such that N = 13:
(where N is the number of elements in the list), 11, 22, 30, 33, 40, 44, 55, 60, 66, 77,
80, 88, 99.
(a) Determine the output from the flowchart if ITEM is:

(i) 40 (2 marks)

(ii) 99 (2 marks)

8357 Turn over


8

(iii) 120 (2 marks)

(iv) 5 (2 mark)

(b) Explain the purpose of this flowchart. (2 marks)

(c) Write a pseudocode for the above flowchart. (5 marks)

08
2 0
S E
K C
17. (a) Describe two ways in which a computer can represent a positive number and a
negative number. (2 marks)

8357
9

(b) A particular computer stores numbers in a single 8-bit word. How would it
represent 0.312510? (3 marks)

(c) What is the decimal equivalent of the number 1.01112? (2 marks)

8
(d) Perform the decimal subtraction 1410 - 6 10 using

0
(i) regular binary; (3 marks)

2 0
(ii) one's complement.
S E (5 marks)

K C

8357 Turn over


10

18. (a) List three advantages and three disadvantages of wired communication over
wireless communication. (6 marks)

Advantages

Disadvantages

08
0
(b) Describe the following signals and state where each is applied in network

2
communication: (4 marks)

(i) analog;

S E
(ii) digital.

K C
(c) Name the two types of coaxial cables. (2 marks)

(d) (i) Define the term network protocol. (1 mark)

8357
11

(ii) List four internet protocols. (2 marks)

19. The information below is maintained by the patron of wildlife club in a school. Study it and
answer the questions that follow.

Name Class Admission Membership Group


Number Number
Mary 4E 3740 S 001 Serengeti
Gupta 3W 3802 T001 Tsavo
Carey 2N 3949 T003 Tsavo
Gregory 4W 3762 M001 Mara
Sanjay 3N 3800 A 001 Amboseli

8
Mariam 2E 3925 S 002 Serengeti

0
Josephine 2W 3926 N001 Nairobi

0
Elvis 4N 3746 AB 001 Aberdare
Carey 3E 3805 T002 Tsavo

2
Gordon 1W 4029 N002 Nairobi
Paul IN 4013 M002 Mara

E
(a) Describe the field values, records and file. (3 marks)

S
K C
(b) State the most appropriate primary key for the list. (1 mark)

(c) State the most appropriate data type for the fields:

(i) admission number; (1 mark)

(ii) membership number. (1 mark)

8357 Turn over


12

(d) If a database was to be created for the list; Forms, Tables, Queries and Reports are
likely to be used.

(i) State the purpose of each of these objects. (4 marks

(ii) Which objects cannot be used to store the data in the list? (3 marks)

08
2 0
E
(i) How many field values are in the list? (1 mark)

S
C
(ii) How many records are in the list? (1 mark)

8357
13

An operating system organises files in directories as shown in the chart below.


Study it and answer the questions that follow.

08
(a) (i)
2
What is the name of this file structure? 0 (1 mark)

(ii)
S E
One of the files in MISCELLANEOUS has a file name similar to one in

C
CHEMISTRY in Form 1. Describe what happens if all the contents of

K
CHEMISTRY are copied to MISCELLANEOUS. (2 marks)

(iii) What will happen if an attempt is made to delete FORM2 while F i l e l O in


MATHEMATICS is open? (1 mark)

Turn over
14

(iv) State four advantages of this structure. (2 marks)

State four properties that an operating system displays about a file. (2 marks)

08
0
A removable storage media unit connected to a single user microcomputer system is

2
used for permanent storage of programs and data. State six file functions you would
expect the operating system of the computer to provide to enable the user to
maintain this storage media. (3 marks)

S E
K C
State two tasks performed by the operating system in each of the following
resources:

(i) memory; (2 marks)


15

(ii) input/output devices. (2 marks)

08
2 0
S E
K C

8357
Name ................................................................................................. Index No .............................. J.,

451/1
COMPUTER STUDIES Candidate's signature
Paper 1
(THEORY) Date...............................
Oct/Nov. 2009
2Vi hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES Paper
1 (THEORY)
2l/i hours

Instructions to Candidates

( a ) Write your name and index number in the spaces provided at the top of this page.
( b ) Sign and write the date of examination in the spaces provided above.

0 9
0
(c) This paper consists of TWO sections; A a n d B .

2
( d ) Answer ALL the questions in section A.
( e ) Answer question 16 and any other THREE questions from section B .
if) All answers should be written in the spaces provided on the question paper.

E
( g ) This paper consists of 16 printed pages.

S
( h ) Candidates should check the question paper to ascertain that all the pages are printed as
indicated and that no questions are missing.

A K
Section
C For Official Use Only
Question
1 - 15
Score

B 16
17
18
19
20
Total

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
9089 (THEORY)

09462 Turn over


SECTION A (40 marks) Answer ALL the questions in this

section in the spaces provided. Give a reason for each of the following: (a)

changing a password regularly;

(1 mark)

(b) typing and re-typing a new password when changing it. (1 mark)

0 9
With reference to quality of print, noise level and cost, compare a dot matrix with a Laser
printer.

20
S E
K C
A computer accessories vendor needs to order supplies. A spreadsheet is used to calculate the order part
of which is shown below.

A B C D
1. Item Price per unit Number ordered Cost (Kshs)
2. 56K modem 8,565.00 60
3. 128 MB Ram 4,950.00 40
4. Pentium IV 13,525.00 55
Processor
5. Total

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
(THEORY)

(a) Write the formula that can be used in:

9089 09462
(i) D2 (1 mark)

(ii) D5
(
1 mark)

(b) If a value added tax (VAT) of 16% was charged on each item and the number ordered
was decreased by 10%, write a new formula that can be used in D2.
(2 marks)

4 List two uses of computers in meteorology. (2 marks)

0 9
5

20
Explain the following terms as used in desktop publishing: (2 marks)

E
(a) embedded object

S
(b) autoflow. K C

© 2009 THE KENYA NATIONAL EXAMINATIONS


COUNCIL Kenya Certificate of Secondary Education
COMPUTER STUDIES Paper 1
9089 (THEORY)

09462 Turn over


(a) Name four approaches that may be used to replace a Computerised Information system.
(2 marks)

(b) Which of the approaches named in (a) above is appropriate for critical systems?
Explain. (2 marks)

0 9
20
7

(a) job scheduling;


S E
Explain the following operating system functions:

(1 mark)

K C
(b) interrupt handling. (1 mark)

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
9089 (THEORY)

09462
5

8 Name four toggle keys on a standard computer keyboard. (2 marks)

9 A computer user typed the name Kajiado as Kajaido and 8726 as 8126. (a)

State the type of each error. (1 mark)

0 9
0
(b) Explain how such errors can be controlled. (2 marks)

2
S E
10
K C
Describe Third Generation Languages and name two examples. (2 marks)

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education COMPUTER STUDIES
Paper 1 (THEORY) 09462

9089 Turn over


11 (a) (i) What is an internet protocol (IP) address? (1 mark)

(ii) Why is an IP address necessary? (1 mark)

(b) What is the purpose of the following internet domains? (i) (1 mark)

.org

(ii) .gov

0 9
12 (a)
20
Name two types of buses found on the computer motherboard. (2 marks)

S E
(b) K C
State the purpose of each of the types of buses named in (a) above. (2 marks)

13 (a) Name the two files commonly used in mail merge. (1 mark)

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education COMPUTER STUDIES
Paper 1 (THEORY) 09462

9089
(b) Name and explain the two types of dropcaps. (2 marks)

Give three ways in which horticultural farmers can benefit from the use of Information and
Communication Technology (ICT). (3 marks)

9
Arrange the following job titles in the order of their seniority.

0
Database administrator, ICT manager, Systems analyst. (1 mark)

20
S E
K C

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
(THEORY)
09462 Turn over
SECTION B (60 marks) Answer question 16 and any other three

questions from this section in the spaces provided.

16 Study the flowchart below and answer the questions that follow.

^ START ^

READ N

M =1 =1
F=

9
1 i
F=F xM

0
(a) What would the flowchart generate as output if the value of N at input was:

0
(i) (2 marks)

2
6?

S E
K C © 2009 THE KENYA
NATIONAL
EXAMINATIONS
COUNCIL Kenya
Certificate of Secondary Education COMPUTER STUDIES Paper 1
9089 (THEORY)

(ii) 1? (2 marks)

Write a pseudocode that does the same thing as the flowchart above. (7 marks)
9

0 9
20
S E
K C t

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
(THEORY)
09462

Turn over
10

(c) Modify the flowchart so as to reject an input below 0 and to avoid the
looping when the input is 0.
(4 marks)

0 9
20
S E
K C
A lecturer keeps the following student details in a database: name, age, course.

(a) Write an expression you would use to compute the year of birth of a
student using this year as the current year. (2 marks)

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
(THEORY) 09462
11

(b) What query expressions would the lecturer use to list the students whose
age is above 15 years and below 25 years? (3 marks)

(c) Which expression would the lecturer use to generate: (i)

the number of students in the database? (2 marks)

9
(ii) the mean age of the students in the database? (2 marks)

0 0
2
(d) Name and describe any two types of database models. (6 marks)

S E
K C

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education COMPUTER STUDIES
Paper 1
9089 (THEORY)
12

18 The diagram below shows a layout of a computer network used by a law firm. A
(a) workstation and a printer are located in every consulting room.

(i) Name the network topology depicted in the diagram. (1 mark)

0 9
0
(ii) Name the device labelled D. (1 mark)

2
E
(iii) State four functions of the device labelled 'server' (4 marks)

S
K C

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
(THEORY)

9089 09462
13

Give two advantages and one disadvantage of the above network design.
(3 marks)

(v)

0 9
If the firm intends to open extra offices in two different towns, name any

0
three hardware devices that would be required. (3 marks)

2
(vi)

S E
State any two security problems that might arise by linking the offices in

C
different towns. (2 marks)

K
What is spy ware? (1 mark)

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
(THEORY)

09462 Turn over


14

19 (a) Study the following diagram and answer the questions that follow.

2GB HDD
Network
MONITOR

128 MB RAM
FLOPPY CPU
SPEAKER
DRIVE 32 MB
ROM

CD DRIVE
MOUSE

SCANNER

PRINTER

From the diagram:

9
(i) Name two devices that are used for long term storage. (2 marks)

0 0
(ii)
2
Name three peripherals shown on the diagram that are used for input.

E
(3 marks)

S
K C
(iii) Name two other devices that a Computer Aided Design (CAD) user might wish to add to
the set-up above.
(2 marks)

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya


Certificate of Secondary Education COMPUTER STUDIES Paper 1
9089 (THEORY)
A customer wishes to purchase a computer system. The customer can buy word
processor, spreadsheet, database and a drawing package separately or as an integrated

09462
15

package. State three advantages why many computer users prefer integrated packages
to separate packages. (3 marks)

(i) An anti-virus software installed in a computer is loaded into the main memory each time the computer is
switched on.
Explain three ways in which computer viruses are spread from one computer to
another. (3 marks)

09
20
(ii) Give two reasons why an anti-virus package should be updated regularly.
(2 marks)
SE
KC

Perform the following binary arithmetic and give your answers in decimal notation:

(i) 1010.101 + 11.011 (3 marks)

© 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL Kenya Certificate of


Secondary Education COMPUTER STUDIES Paper 1 (THEORY)

(ii) 1010.011 - 11.011 (3 marks)

09462
Covert the following numbers into their binary equivalents:

(i) 0.562510 (3 marks)

(ii) 0.312510 (3 marks)

0 9
0
Using four-bit twos compliment, perform the following arithmetic

2
(3 marks)
1012-1112

S E
K C
THIS IS THE LAST PRINTED PAGE

) 2009 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education COMPUTER STUDIES
Paper 1 (THEORY) 09462
Name: Index No

451/1 Candidate's Signature


COMPUTER STUDIES
Paper 1 Date
(Theory)
OctyNov. 2010
oJ_ hours
l2

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(Theory)
\_ hours
0
2 2

Instructions to Candidates
(a) Write your name and index number in the spaces provided above.
(b) Sign and write the date of examination in the spaces provided above.
(c) This paper consists of TWO sections; A and B.
(d) Answer ALL the questions in section A.
(e) Answer question 16 and any other THREE questions from Section B.
(e) ALL answers should be written in the spaces provided on the question paper.
(f) This paper consists of 12 printed pages.
(g) Candidates should check the question paper to ascertain that all the pages are
printed as indicated and that no questions are missing.

For Examiner's Use Only


Section Questions Candidate's Score
A 1- 15
16
17
B
18
19
20
Total Score

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
0013 41062
SECTION A (40 marks)
Answer all the questions in this section in the spaces provided.

JJ(sl four activities carried out by a data processing system. (2 marks)

(a) Define data communication. (1 mark)

1 0
(b)

2 0
State two characteristics of an effective data communication system. (2 marks)

S E
compared to the internet.

K C
Explain why an intranet is a more secure way to share files within an organisation
(2 marks)

"sen a formal
f, a and a function as used in spreadsheets.
(2 marks)
5 State four functions which are specific to Network Operating Systems (4 marks)

6 The word raeejs appearing several times in a long story document composed using a DTP
package. How would this word be replaced with the word content?. (3 marks)

1 0
2 0
E
Study the pseudocode below and determine its output. (3 marks)

S
1. 0
0

C
1
2. M+T

K
T+5
K+ 1
3. while K < 3
4.
5.

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
0013 41062 Turn over
4
8 Give two reasons why,the use of finger prints and voice input can be used as
reliable forms of security in computer systems. (2 marks)

9 State the purpose of each of the following memories in a computer system. (2 marks)
(a) RAM

(b) Hard disk

1 0
0
10 Explain why telecommuting isjigt suitable for a doctor when carrying out an operation on a

2
patient. (2 marks)

S E
11 K C
Copyright laws are laws granting authors the exclusive privilege to produce, distribute, perform
or display their creative works. It is a legal framework for protecting the works such as book
publishing, motion-picture production and recording. State two challenges that are posed to
these laws by ICT. (2 marks)

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
0013 41062
5
12 State two reasons why it is necessary to use standard furniture in a computer laboratory.
(2 marks)

13 Describe the following terms as used in mail merging: (4 marks)


(a) main document;

(b) data source.

1 0
14
2 0
State three ways in which ICT can be used in shipping control. (3 marks)

S E
K C
15 A firm operates an order system that coordinates orders, raw materials and inventory across its
three factories. Currently the orders are processed manually at each factory and communicated
to the others over the phone . The management intends to computerise their operations. State
the first two computer professionals who will be required and their roles.
(4 marks)

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
0013 41062 Turnover
SECTION B (60 marks)
Answer question 16 and any other three questions
from this section in the spaces provided.

(a) Machine language programs are more difficult to write than high-level language
programs. State two reasons for this. (2 marks)

(b) In order to process examination results of students in a school, their names, index
numbers and scores in 11 subjects are required. The average score for each student
is then determined and a grade assigned. This process is repeated for all 40 students in
a class.
Draw a flowchart to:
• Read a student's name, index number and the scores in all the subjects.

0
• Determine the student's average score.
• Assign a grade to the student depending on the average score as follows:

1
Score Grade

0
80 < score A

2
60 < score < 80 B
40 < score < 60 C
score < 40 F

E
• Display the student's name, index number, average score and the grade.

S
• Repeat the above steps for all the students in the class. (10 marks)

K C

©2070 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
41062
7

1 0
2 0
S E
(c)

C
Below is a list of program segments in different generations of programming languages.

K
Identify the language for each.

(i) LDA 105


(3 marks)

SUB 40
ADD 20

(ii) 10000110 10111101


01111000 0001100

(iii) For x: = 1 to 10 do

Write (x);

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
0013 41062 Turnover
8
17 (a) The following are some of the phases in the systems development life cycle (SDLC):
system analysis, system design, system implementation, system review and
maintenance. State four activities that are carried out during the system
implementation phase. (4 marks)

(b) Give three reasons why system maintenance phase is necessary in SDLC.
(3 marks)

1 0
(c)

2 0
State two instances where observation is not a viable method of gathering information
during system analysis stage. (2 marks)

S E
(d)
K C
Various considerations should be made during input design and output design.
State two considerations for each case. (4 marks)
Input design.

Onput design.

©2070 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper I
THEORY
0013 41062
9
(e) State two reasons why an organisation may use other strategies of software acquisition
other than developing their own. (2 marks)

18 (a) Using two examples, explain the term field properties as used in database design.
(2 marks)

(b) Below is
Patient No
1
an extract from a hospital database table.
Name 0
Date Registered Amount paid Remarks
LDK/001
LDK/004
Mathew Olang 04/05/08
Joy Chelimo 07/06/08
20 2500.00
1200.00
To go for x-ray
Medicine to be
ordered

E
LDK7008 John Kamau 09/08/08 3500.00 To be admitted for

S
further check up
LDK/002 Gerald Wasike 02/04/05 800.00 To come back for

C
review

(i)

K
State with reasons the most suitable data types for the following fields: (8 marks)
(I) patient No;

(II) date registered;

(III) amount paid;

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
0013 41062 Turnover
10

(IV) remarks.

(ii) Which would be the most appropriate primary key field for the above table?
(1 mark)

(iii) What is the purpose of a primary key field in database design? (1 mark)

0
(iv) Describe how information about patients who registered after 09/08/06 can be

1
extracted from the database. (3 marks)

2 0
19 (a)

S E
Explain how data in a computer system is secured using:
(i) password;
(4 marks)

K C
(ii) user access level.

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
0013 41062
11

(b) State three characteristics of a suitable password. (3 marks)

(c) State two characteristics of a computer that is infected by computer viruses. (2 marks)

(d) (i) The figure below shows how data is transmitted through a public telephone line.

1 0
2 0
E
NameA,B,C and D. (4 marks)

S
(ii)
K C
State two advantages of using fibre optic cables over satellite in data
communication. (2 marks)

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
3 41062 Turn over
12

20 (a) Using ones complement, convert the decimal number -9 into a 6-bit binary number.
(3 marks)

(b) (i) State three standard coding schemes used in data representation. (3 marks)

(ii) In a certain coding scheme, each character occupies 7 bits.


Letters of the alphabet are assigned consecutive codes.
If letter N is represented by 1010010;,
What is the representation of letter A in this coding scheme? (3 mark)

1 0
2 0
S E
C
(c) Using twos complement, show how the arithmetic below would be carried out
on a 8-bit computer system. (6 marks)

K
(+54)-(+29)

THIS IS THE LAST PRINTED PAGE.

©2010 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
THEORY
0013 41062
Name: Index No J ,

451/1 Candidate’s Signature


COMPUTER STUDIES
Paper 1 D a te..............................
(Theory)
OctyNov. 2011
hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(Theory)
2 2 hours

Instructions to Candidates

1. Write your name and index number in the spaces provided above.
2. Sign and write the date o f examination in the spaces provided above.
J. This paper consists o f TWO sections; A and B.
11 1
4. Answer ALL the questions in section A.
20 1/

5. Answer question 16 and any other THREE questions from Section B.


45

6. ALL answers should be written in the spaces provided on the question paper.
7. This paper consists o f 13 printed pages.
8. Candidates should check the question paper to ascertain that all the pages are
printed as indicated and that no questions are missing.

For Examiner’s Use Only


Section Questions Candidate’s Score
A 1 - 15
16
17
B
18
19
20

Total Score

© 2011 THE KENYA NATIONAL EXAMINATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
1113 Turn over
SECTION A (40 marks)
Answer all the questions in this section in the spaces provided.

The text in the box below was composed using a wordprocessor. The current cursor position is
between the words “is” and “an” .

Computer security is an increasingly important


consideration. From authentication....

Describe what happens to the text in the box above when each of the following keyboard keys
are pressed.
(3 marks)

(a) tab

(b) enter
11 1
20 1/
45

(c) home

State four characteristics which make computers better than human beings. (4 marks)

) 2011 THE KENYA NATIONAL EXAMINATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
3

3 Give three reasons why primary storage devices are not used for secondary storage.
(3 marks)

4 Asha has a hardware shop and lately, she is finding the task of managing daily sales in the shop
overwhelming.

(a) State a retail system that she should acquire. (1 mark)

(b) State two input devices that are used in retail systems. (1 mark)
11 1
20 1/

(c) Apart from enhancing the speed of operation, state two other benefits that Asha will gain
from using such a system. (2 marks)
45

5 The accounts department of a secondary school is using a system that generates invoices that
are printed in triplicate using carbon papers.

(a) Name one type of printer suitable for this task. (1 mark)

(b) Give a reason for your answer in (a) above (1 marks)

© 2011 THE KENYA NATIONAL EXAM INATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
1113 T urn o v er
A secretary saved a document in a computer. After some time, she could not remember the
name and the location of the file. State four file details that are assigned a file by the
operating system which can assist in tracing the file. (2 marks)

A student tried opening an application program on a computer that was functioning well. The
program did not load and the operating system reported that the memory was insufficient.
Give two causes of such response. (2 marks)

11 1
State two measures that can be put in place to control piracy of software. (2 marks)
20 1/
45

Identify three hardware considerations to be made before installing an operating system.


(3 marks)

© 2011 THE KENYA NATIONAL EXAM INATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
5

10 A water company sends out clerks to read water meters. The data collected by the clerks is then
fed into the computer and then all the bills are printed at the same time.

(a) State two advantages of this approach. (2 marks)


->

11 A school has acquired a system that imitates human teachers. Students can learn by getting
answers from the system which they would normally get from the teacher. Give three
advantages of this system. (3 marks)
11 1
20 1/
45

12 Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The
management is convinced that someone is illegally gaining access to the data in their
computers. State three ways in which the company can overcome this problem. (3 marks)

13 State the purpose of each of the following in database design.

(a) input mask (1 mark)

(b) default value (1 mark)

© 2011 THE KENYA NATIONAL EXAMINATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
1113 TUrn over
6

14 State the importance of considering the following factors when acquiring a software.

(a) warranty; (1 mark)

(b) portability. (1 mark)

15 State two application areas of real time systems. (2 marks)

SECTION B (60 marks)


11 1
20 1/

Answer question 16 and any other three questions from this section in the spaces provided.
45

16 (a) Give two characteristics of scripting languages. (2 marks)

#
(b) Describe two types of errors that may be detected during program testing. (4 marks)

© 2011 THE KENYA NATIONAL EXAMINATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
1113
7

(c) A company’s workers travel to work either by public or by private means. All workers
are paid a travel allowance of Ksh. 200, but those using private means are paid an
additional Ksh. 100.

(i) Write a pseudocode to determine a worker’s travel allowance. (3 marks)

^ ...............................................................
(ii) Draw a flowchart to determine a worker’s travel allowance. (4 marks)
11 1
20 1/
45

© 2011 THE KENYA NATIONAL EXAM INATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
1113 T urnover
(iii) Other than occupying large space, state two disadvantages of using a flowchart
instead of a pseudocode. (2 marks)

(a) State three standard data coding schemes used in computing and electronic systems.
(3 marks)

(b) Convert each of the following numbers:

(i) 110.101 ^ to decimal; (3 marks)


11 1
20 1/
45

(ii) 12.687510 to binary; (4 marks)

(c) Subtract 110.012 from 11001.01012. (2 marks)

>2011 THE KENYA NATIONAL EXAM INATIONS COUNCIL


2 0 U (MMX1) KCSE (11462)
COMPUTER STUDIES
Paper 1
(d) Using twos complement, perform the following binary arithmetic leaving the answer
in binary notation.

11012- 1001012 (3 marks)

18 (a) What is meant by each of the following terms as used in table creation?

(i) cell margin; (1 mark)

(ii) nested table. (1 mark)


11 1
20 1/
45

(b) State four types of text wrap that can be applied to a graphic. (2 marks)

(c) Distinguish between each of the following:

(i) axis labels and data labels; (2 marks)

© 2011 THE KENYA NATIONAL EXAM INATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
1113 T urnover
(ii) cropping and sizing. (2 marks)

Figure 1 shows a section of a worksheet containing information on household items.


Use it to answer the questions that follow.

A B C D E
1 I t e m D e s c r ip t io n No of U n it s C o s t p e r U n it T o ta l C o st

2 Wheat flour 12 110


3 Rice 6 145
11 1
4 Sugar 7 140
20 1/

5 Salt 2 20
45

Figure 1

(i) Write a formula to calculate the total cost of rice. (1 mark)

(ii) The prices of all items increased by 10% and the value 10% is placed
in cell B8. Using cell addresses with absolute referencing only, write a
formula to calculate the new unit price of salt. (2 marks)

(iii) Write a function to display the number of cells in which the cost per unit is
equal to 110. (2 marks)

(iv) Write a function to display the least total cost for all items. (2 marks)

© 2011 THE KENYA NATIONAL EXAM INATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
11

19 (a) What is meant by each of the following terms as used in the internet?

(i) surf; (1 mark)

(ii) uploading; (1 mark)

(iii) inbox. (1 mark)

(b) A school has set up its network using wireless technology to link computers. State
11 1
three problems that the school is likely to experience when using this technology.
20 1/

(3 marks)
45

(c) List three ways by which parents can protect their children from accessing inappropriate
content from the internet. (3 marks)

© 2011 THE KENYA NATIONAL EXAM INATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
1113 T urnover
12

(d) Explain three problems associated with using e-mail technology for communication.
(6 marks)

20 (a) Explain three reasons why an organization may need to change to a new computerised
system. (6 marks)
11 1
20 1/
45

f t
(b) State why each of the following is important in system documentation.

(i) sample data; (1 mark)

(ii) output reports. (1 mark)

) 2011 THE KENYA NATIONAL EXAMINATIONS COUNCIL


2011 (MMXI) KCSE (11462)
COMPUTER STUDIES
Paper 1
1113
13

(c) Name the tools used for data storage in each of the following methods of data processing,
(i) manual; (1 mark)

(ii) electronic. (1 mark)

(d) A teacher manages students’ records by storing daily attendance information in a file
called register and students’ personal records such as year of birth and home address in
a file called students.

(i) Identify the types of computer files named above. (2 marks)

(ii) Give a characteristic of data held in each file. (2 marks)


11 1
20 1/
45
Name Index Number

451/1 Candidate’s signature


COMPUTER STUDIES
Paper 1 D a te .............................
(THEORY)
Oct./Nov. 2012
2 Z hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES

12
Paper 1 451/1 - Computer Studies - PI
(THEORY) Tuesday 11.00 am - 1.30 pm
2 Vi hours 30/10/2012 (2nd Session)

Instructions to candidates
20
(a) Write your name and index number in the spaces provided at the top o f this page.
(b) Sign and write the date o f examination in the spaces provided above.
(c) This paper consists o f TWO sections; A and B .
(d) Answer ALL the questions in section A .
1

(e) Answer question 16 and any other THREE questions from section B.
(f) All answers should be written in the spaces provided on the question paper.
1/

(g) This paper consists o f 18 printed pages.


(h) Candidates should check the question paper to ascertain that all the pages are printed as
indicated and that no questions are missing.
45

For Examiner’s Use Only


Section Question Score
A 1 - 15
16
17
B
18
19
20
Total

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 T«rn over
2
SECTION A (40 marks)

Answer ALL the questions in the spaces provided.

1 State two functions of the Control unit of a computer. (2 marks)

(a) Differentiate between hardware and software portability. (2 marks)

12
20
1
1/

(b) State two disadvantages of CD-ROM over magnetic disks. (2 marks)


45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113
One way in which an organisation enforces security of its computer systems is by restricting
the use of removable media such as floppy disks and flash memories. Give two reasons for
this.
(2 marks)

(a) What is meant by Data Communication Equipment? (1 mark)

12
(b)
20
List six examples of Data Communication Equipment. (3 marks)
1 /1
45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 Turn over
5 When purchasing a computer, the clock speed, RAM size, Hard disk size and monitor size are
often quoted. State the unit for measuring: (2 marks)

(a) Clock speed;.....

(b) RAM size;..........

(c) Hard disk size;

(d) Monitor size......

6 Name three types of graphics used in a word processor. (3 marks)

12
20
7 A student saved a document in a diskette. Later on, the student found that the diskette could
not open and therefore the work got lost.
Give three precautions the student should have taken to ensure the work was not lost.
(3 marks)
1
1/
45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113
5
8 Differentiate between relative cell referencing and absolute cell referencing. (2 marks)

State two:

12
(a) functions of an email software; (1 mark)

20
(b) protocols used in sending and receiving of emails. (1 mark)
1
1/

10 With reference to word processing, describe the term:

(a) superscript; (1 mark)


45

(b) section breaks. (1 mark)

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 Turn over
6
11 Describe the following types of relationships as used in Database design: (4 marks)

(a) One-to-one;
(b) One-to-many.

12 State the stage of system development life cycle in which each of the following activities take

12
place:

(a) determination of the cost-effectiveness of a system; (1 mark)


20
(b) interviews; (1 mark)
1 /1

(c) replacement of an old system with a new one. (1 mark)


45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113
7
13 The figure below is a toolbar for a DTP package.

State the functions of the tools labelled A, B and C. (3 marks)

A: ................................................................................

12
B:
20
C:
/1

14 State two roles of a programmer in system development life cycle. (2 marks)


1
45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 Turn over
8
15 (a) What is meant by disk defragmentation? (1 mark)

(b) State the purpose of disk defragmentation. (1 mark)

12
20
1 /1
45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 ®84®8®8®®
9
SECTION B (60 marks)

Answer question 16 and any other THREE questions from this section in the spaces provided.

16 (a) State the use of each of the following flowchart symbols. (3 marks)

(i) O

12
20
/1

(iii)
CZJ
1
45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 Turn over
10
(b) Below is an algorithm that is used to compute the values of R, S and T.

P = 5
Q = 6
INPUT N

If N is GREATER OR EQUAL TO 10
R = P*Q
S = Q -P
T = P+Q+R+S
ELSE
R=P+Q
S=Q
T=R+S

12
END IF
PRINT R, S and T

From the algorithm, determine the output if the input value of N is:
20
(i) 7; (3 marks)
1
1/

(ii) 10. (3 marks)


45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113
11
(c) Draw a flowchart for the algorithm in Question 16 (b). (6 marks)

12
20
17 (a) Convert each of the following binary numbers to decimal equivalent given that the left
most digit is a sign bit.
/1

(i) 0 0 1 0 1 1 0 1 (2 marks)
1
45

(ii) 1 1 0 0 1 0 0 1 (2 marks)

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 Turn over
12
(b) Convert the decimal number 0.42 to 6 bit binary notation. (4 marks)

12
(c) Using two’s complement, subtract 11 0 from 8 |(), leaving your answer in binary
notation. (5 marks)

20
1 /1
45

(d) Perform the following binary operation. (2 marks)

11001 + 1101 - 101

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113
13
18 (a) State three techniques used by a network administrator to detect and prevent computer
crimes. (3 marks)

(b) A company in town wishes to link its offices together. The linking may be through
wireless or fibre optic network media.

(i) State two benefits that the company would gain from the use of metropolitan
area network (MAN). (2 marks)

12
20
(ii) State three advantages of using wireless over fibre optic network media.
(3 marks)
1
1/

(iii) State two limitations of wireless communication. (2 marks)


45

(iv) State two transmission media used in wireless transmission. (2 marks)

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 Turn over
14
(c) State three ways in which computer virus infection can be prevented other than through
restricting the usage of removable storage media. (3 marks)

19 (a) (i) What is an information system? (1 mark)

12
(ii) State two roles of an information system.
20 (2 marks)
/1

(b) Describe the following file organisation methods:


1

(i) random file organisation; (2 marks)


45

(ii) sequential file organisation. (2 marks)

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113
15
(c) The following records were extracted from two files that contained student data.

File A:
Reg. No. Student Name Sex Address

3002 Christine Onyancha F Box 8932 Kisii


3008 John Otieno M Box 7222 Nairobi
3001 Amina Muthee F Box 1243 Butere
3015 Peter Musyoki M Box 6621 Nyeri

File B:
Reg. No. Fees Pavments Date of Pavment

3002 1000 04/05/2011

12
3008 1500 03/09/2011
3001 900 02/09/2011
3015 400 21/09/2011

(i)
20
Which of the two files above represents a Transaction file? (1 mark)
1
1/

(ii) Give a reason for your answer in c(i) above. (1 mark)


45

(iii) Name the other type of file represented above. (1 mark)

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 Turn over
16
An airline uses an information system whereby if a passenger at station A books a plane seat,
this transaction is immediately shown at stations A and B such that no other passenger can
book the same seat.

(i) Identify this data processing mode. (1 mark)

(ii) State two advantages and two disadvantages of this data processing mode.
(4 marks)

12
20
1
1/
45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
17
20 (a) With the aid of a diagram, describe the Hierarchical Database Model. (4 marks)

12
20
/1

(b) List three factors that should be considered when developing a database application
and give reasons why each should be considered. (6 marks)
1
45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113 Turn over
18
(c) (i) Name three types of validation checks during data entry. (3 marks)

(ii) Differentiate between primary key and index key. (2 marks)

12
20
1
1/

THIS IS THE LAST PRINTED PAGE.


45

© 2012 THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate o f Secondary Education, 2012
COMPUTER STUDIES
Paper 1
912113
Name Index Number ./
451/1 Candidate’s Signature
COMPUTER STUDIES
Paper 1 D ate............................
(Theory)
Oct ./Nov. 2013
2-L hours
2

THE KENYA NATIONAL EXAMINATIONS COUNCIL


Kenya Certificate of Secondary Education
COMPUTER STUDIES
Paper 1
(Theory)
24- hours
T

Instructions to candidates

(a) Write your name and index number in the spaces provided above.

13
(b) Sign and write the date of the examination in the spaces provided above.
(c) This paper consists o f two sections; A and B.
(d) Answer all the questions in section A.
(e) Answer question 16 and any other three questions from section B.
20
(f) All answers should be written in the spaces provided on the question paper.
(e) This paper consists o f 16 printed pages.
(f) Candidates should check the question paper to ascertain that all the pages are printed as
indicated and that no questions are missing.
1
(g) Candidates should answer the questions in English.
1/

For Examiner’s Use Only

Question
Section Candidate’s Score
number
45

A 1 - 15
16
17

B 18

19
20

Total Score

KNEC 43006101 KCSE


© The Kenya National Examinations Council, 2013
913113 Turn over
SECTION A (40 marks)

Answer all the questions in this section in the spaces provided.

Write each of the following acronyms in full as used in computing. (2 marks)

(a) CAD

(b) DVD

(c) WORM

(d) POS

13
A school keeps student records in a database. The data is coded before entry.
20
State three reasons why the coding is necessary. (3 marks)
1
1/

Differentiate between Bcc and cc in an email. (2 marks)


45

913113 KNEC 43006101 KCSE


3
4 State three risks posed by improper cabling in a computer laboratory. (3 marks)

5 List two career opportunities directly associated with computer networking. (2 marks)

6 A retailer uses a spreadsheet program to calculate profits. Figure 1 shows the spreadsheet.

13
A IH C D HH F
1 Items Cost Selling Profit Items Total
Price Price per Item sold Profit
Item 1 305 350
20
45 32 1440
Item 2 100 120 20 45 900
Item 3 200 220 20 32 640
Item 4 107 130 23 89 2047
1

Figure 1
1/

(a) Which row contains labels only? (1 mark)


45

(b) Write the formula that has been entered in cell F2. (2 marks)

913113 KNEC 43006101 KCSE T\irn over


State three reasons why an organisation may opt to develop its own software in-house rather
than buy off-the-shelf software. (3 marks)

8 The topology below is formed by combining two types of topologies.

13
20
1
1/

Figure 2
45

(a) Give one name for the combined topology in figure 2. (1 mark)

(b) Name the two topologies forming the combined topology in figure 2. (2 marks)

913113 KNEC 43006101 KCSE


9 An organisation intends to replace an existing system by carrying out the process in
stages.

(a) Name this implementation strategy. (1 mark)

(b) Give two reasons why the organisation is opting to use the implementation strategy in
(a) above. (2 marks)

10 (a) Explain the importance of disk partitioning. (2 marks)

13
20
(b) Differentiate between pull-down menu and pop-up menu as used in Graphical User
Interface (GUI) operating systems. (2 marks)
1
1/
45

11 The 21st century has had many forms of ICT technologies improving the various means of
communication. However, these changes have brought many challenges.
State three negative social impacts of these technologies. (3 marks)

913113 KNEC 43006101 KCSE Turn over


6

12 Explain why a DTP application would be preferred to a word processing application when
designing a publication.
(2 marks)

13 A computer is idle but the hard disk light is blinking, indicating some activity.
State two possible causes of this. (2 marks)

13
20
1
14 Describe compatibility as a factor to consider when purchasing a computer. (2 marks)
1/
45

15 Identify the appropriate output device for the production of each of the following:

(a) receipts where carbon copies are required; (1 mark)

(b) an architectural drawing where precision is required; (1 mark)

(c) output where the user is visually impaired. (1 mark)

&
913113 KNEC 43006101 KCSE
7
SECTION B (60 marks)

Answer question 16 and any other THREE questions from this section in the spaces provided.
16 (a) Figure 3 shows a flowchart. Use it to answer the questions that follow.

13
20
1
1/
45

(i) Determine the output from the flowchart if:


I. X = 5; (2 marks)

913113 KNEC 43006101 KCSE Turn over


8
II. X = 7. (2 marks)

(ii) Write a Pseudocode for the flowchart in figure 3. (5 marks)

13
20
1
1/
45

913113 KNEC 43006101 KCSE


(iii) Modify the flowchart so that it can be used to get the sum of integers between
50 and 100. (4 marks)

13
20
1
1/
45

(b) List two programming language translators. (2 marks)

913113
€1 KNEC 43006101 KCSE T\irn over
10
17 (a) Describe three types of validation checks as used in data processing. (6 marks)

(b) A company has opted to store its employees’ personal details in a computer system.

13
Describe two software methods that may be used to prevent unauthorized access to
these details. (4 marks)
20
1
1/
45

(c) (i) Describe each of the following data processing modes:

I. real-time; (2 marks)

913113 KNEC 43006101 KCSE


11

II. interactive. (2 marks)

(ii) State an application area where real-time data processing mode is applied. (1 mark)

13
18 Figure 4 shows an advert placed in a newspaper. Use it to answer the questions that
follow.
NEW ARRIVALS - LAP TOP COMPUTER
20
HDD Windows 8
300 GB Home Edition
RAM Free Suite

:ALL0622 405405
1
512 MB • Word processor
Ksh 48,0000

Clock Speed • Spreadsheet


1/

2.3 GHz x 2 • DTP


Optical Drive • Presentation
DVD • Internet browser
45

Screen • Email
I 17 inches Keyboard, Mouse, Modem
Parallel port USB, serial
OTHER PCs AVAILABLE
Figure 4

(a) (i) Define a laptop computer. (1 mark)

913113
fH KNEC 43006101 KCSE Turn over
12
(ii) The screen is said to be 17 inches. Explain what this means. (2 marks)

(b) State one advantage of having each of the following provided with a laptop.

(i) m odem ................................................................................................

(ii) U SB .....................................................................................................

(iii) free suite

13
(3 marks)

(c) State the software package in the free suite which is most suitable for each of the
20
following:

(i) computing budgets.................................................................................................

(ii) creating documents.................................................................................................


1

(iii) designing of brochures...........................................................................................


1/

(iv) records management................................................................................................


(4 marks)
45

(d) (i) State three advantages of using a computer to design an advert such as the one
in Figure 4. (3 marks)

913113 KNEC 43006101 KCSE


13
(ii) State two benefits of having the advert uploaded on the internet. (2 marks)

19 A worker is unable to travel to the office but may still be able to do the office work through
telecommuting.

(a) Explain why the worker may use each of the following:

(i) email; (2 marks)

13
20
1
(ii) fax; (2 marks)
1/
45

(iii) digital camera; (2 marks)

913113 KNEC 43006101 KCSE Turn over


14
(iv) firewall. (2 marks)

(b) The worker needs to make regular backups of documents sent to the office.
State three reasons for this. (3 marks)

13
20
1
1/

(c) Explain two benefits that the employer will get by allowing this worker to do the
office work through telecommuting. (4 marks)
45

913113 KNEC 43006101 KCSE


20 (a) (i) Differentiate between one’s complement and two’s complement in data
representation. (2 marks)

(ii) Explain the preference of binary number systems over decimal number systems
in computers. (2 marks)

13
20
(b) (i) Using one’s complement, subtract 1000112 from 0100102. (4 marks)
1
1/
45

913113 KNEC 43006101 KCSE Turn over


16

(ii) Convert the number 21.03125J0 to its binary equivalent. (5 marks)

................................................... r

13
(c) Perform the following binary operations.
1101 + 11011 + 101 + 11111 (2 marks)
20
1
1/
45

THIS IS THE LAST PRINTED PAGE.

913113 2013

You might also like