Computer Studies Kcse Knec Pastpapers Paper 1 1998 2013
Computer Studies Kcse Knec Pastpapers Paper 1 1998 2013
451/1
COMPUTER STUDIES
Paper 1
(Theory)
SAMPLE PAPER
2h hours
8
Kenya Certificate of Secondary Education
9
COMPUTER STUDIES
Paper 1
19
(Theory)
2H hours
r
pe
INSTRUCTIONS TO CANDIDATES
Pa
All answers should be written in the spaces provided on the question paper.
pl
18
B 19
20
21
Total Marks
9 8
Distinguish between hardware and software.
1 9 (2 marks)
e r
3
a p
In most computer systems, there are devices for input only, output only and some
which can be used for both input and output.
P
Give one example of:
(a) An input only device
l e
p
(b) An output only device
m
(c) An input and output device
S a
List any three possible causes of loss of programs and data.
(3 marks)
(3 marks)
3
Table 1 shows three data files, Doc A, Doc B and Doc C and their respective contents.
Doc A DocB DocC
27 93 27
36 60 36
38 34 38
97 38 97
102 93
45 60
34
8
38
102
9
Table 1 45
9
State the dos command that can be used to create file Doc C from files Doc A and
Doc B. (1 mark)
r 1
pe
Explain why a program written by you cannot occupy the entire part of the RAM
a
memory of your computer. (1 mark)
P
l e
p
Define the term data processing cycle. (1 mark)
a m
S
In the following section of text, you wish to replace the word 'the' with the word 'a'.
"Enclosed is a bill for the car you bought from Mutheru's shop in Kiambu".
You have a command that will search globally for a group of characters and replace
them with another group.
(a) What group of characters would need to be searched? (1 mark)
Turn over
9 List the three basic program control structures. (3 marks)
10 The following alogarithms are intended to print out integers from 1 to 10 inclusive
Alogarithm 1
Set count to 1
8
While the count is less than 10 do
Add 1 to the count
9
Output the value of the count
End while.
9
Alogarithm 2
1
Set count to 1
Repeat
r
Output the value of the count
Add 1 to the count
e
Until the value of the count is 10
Alogarithm 3
p
For count going from 1 to 10 DO
a
Add 1 to count
Output the value of the count
P
End for.
None of these alogarithms works correctly. Rewrite the alogarithms so that each one
works correctly. (3 marks)
l e
p
a m
S
5
11 Table 2 below shows a screen from a spreadsheet program that has been used to plan a
household budget. Cells in the spreadsheet are referred to by column letters and row
numbers. Two examples of this are given below. The cell in column D and row two is
referred to as cell D2. It contains the data item "Ksh. 46000". The cell in column A
and row 5 is referred to as A5. It contains the data item "charcoal"
A B c D E F
1 Month January February March April Total
8
2 Rent 46000 46000 460-00 460-00 184000
3 Transport 000 000 250-00 250-00 50000
9
4 Electricity 10000 10000 100-00 10000 100-00
5 Charcoal 15000 15000 15000 15000 60000
9
6 Food 38000 270-00 15000 30000 1100-00
1
7 Total 109000 98000 111000 126000 444000
(a) Write down the data item that is stored in cell E6. (1 mark)
(b)
e r
Which cell contains the data item 'Transport' ? (1 mark)
(c)
a p
Cell B7 contains a formula that is not displayed on the screen. The formula
is sum B2 ... B6 or B2 + B3 + B4 + B5 + B6. What is the purpose of the
P
formula? (1 mark)
l e
p
12 (a) State any two components of a local area network. (2 marks)
a m
S
(b) List any two uses of computer facilities in schools. (2 marks)
Turn over
6
9 8
9
14 Two major cities are 100km apart. There is a proposal to link the two metropolitan
area networks (MANS) together. Select with reasons the most suitable
1
communication media in this application. (4 marks)
e r
a p
P
15 Explain two effects of computer technology on career opportunities in the work place.
(2 marks)
l e
p
a m
S
Below is a list of 11 job titles in computer industry.
1 System analyst
2 Computer operator
3 Data processing manager
4 Database administrator
5 Computer engineer
6 Computer technician
7 Information resource manager
8 Network administrator
9 Computer trainer
10 Software engineer
8
11 Computer programmer
9
Using the titles above write down the correct job title of the person doing the
9
1
following jobs:
(a) Keying in data
r
(b) Daily backup of information
pe
a
(d) Training computer personnel
(2 marks)
P
l e
p
a m
S
Turn over
8
SECTION B
With the aid of a flowchart, write a program in a highlevel language to read any
amount of dollars and convert it into Kenya shillings. The output must be in Kenya
shillings.
Assume the variables, dollars, exchange-rate and shillings as real numbers. (15 marks)
9 8
1 9
e r
a p
P
l e
p
a m
S
9
18 Microcomputers have had a considerable impact on office procedures in recent years.
Discuss the procedures that have been affected and in each case give an explanation of
how the software is applied. (15 marks)
9 8
1 9
e r
a p
P
l e
p
a m
S
Turn over
10
9 8
1 9
(b)
e r
A vendor proposed to a supermarket a voice recognition system of data
p
capture. List the advantages and disadvantages of this device. (6 marks)
P a
l e
p
a m
S
11
20 A school uses a computer to store information on its pupils. The examination results
of the pupils are held in a coded form. Some of the fields used are as follows: Subject,
level, mark obtained and date of examination. The codes used for each field are:
Subject 001 = Literature
102 = Chemistry
304 = Geography
Level 02 = KCPE
03 = KCSE
04 = ORAL
The "mark" is a 3 digit number in the range of 000 to 100. Date of
examination is written in the following way:
8
1087 = October 1987
9
0686 = June 1986
(a) Interpret the following codes
9
(i) 102020560585
r 1
e
(ii) 001040831187
a p
P (4 marks)
l e
(b) Encode a mark of 65 in a KCSE Chemistry examination taken in November,
1984. (1 mark)
(c)
p
It is possible to make errors when entering information. State the conditions
m
required to validate in the:
(i) date field
(4 marks)
(d) State with reasons an example of three extra fields that might be useful.
(6 marks)
Turn over
12
8
.t.
9 9
1
(b) With the aid of appropriate diagrams describe the following topologies as used
in local area network:
r
(i) Bus network
pe
P a
l e
p
m
(ii) Star network
a
(10 marks)
S
Name Index Number
451/1
COMPUTER STUDIES
PAPER 1
(Theory)
Oct/ Nov 1999
2 y hours
2
9
(Theory)
2y hours
2
9 9
1
INSTRUCTIONS TO CANDIDATES
E
Answer ALL the questions in section A.
Answer question 16 (compulsory) and any other THREE questions from section B.
S
All answers should be written in the spaces provided on the question paper.
C
For Official Use Only
K
SECT. QUESTION SCORE
A 1-15
16
17
B 18
19
20
Total Marks
2 Give two types of storage devices used in a computer giving an example of each. (4 marks)
9
3 Give any three precautionary measures considered to ensure the safety of computers in a
computer laboratory. (3 marks) ^
9 9
1
E
4 Define
(a) File
S
(b) Record
K C
(c) Field i :
(3 marks)
9138
3
9 9
9
1 9
Worksheet cells are referenced using the column letter and row number e.g. D2 is cell in
column D and row 2.
E
Use the sample worksheet provided to answer the questions below.
A B C D E F
S
1 Month Jan. Feb. Mar. April. Total
C
2 Fees 460 460 460 460
3 Food 300 350 305 270
K
4 Electricity 100 100 100 100
5 Fuel 150 150 150 150
6 Transport 380 270 150 300
7 Total
(a) Write down the data type that is stored in cell C5. (1 mark)
(b) What cell contains the data item representing transport for the month of February?
(1 mark)
(c) Write down the formula that may be used to compute the total in cell F6. (1 mark)
9138 Turnover
5
SECTION B (60 marks)
(a) Draw a flow-chart to compute the roots of the equation. (10 marks)
9 9
1 9
SE
K C
9 9
1 9
SE
C
A multinational organisation has offered to donate computers to your school. The Board of
K
Governors has requested you to advise on the operating system to be used by providing
answers to the following questions.
(a) What is an operating system? (1 mark)
(b) State and briefly explain any two types of operating systems. (6 marks)
(c) Briefly explain any four functions of an operating system. (8 marks)
(ii) Give any two advantages of using computers in this area. (6 marks)
9 9
9
(b) Explain the effect of computer technology in the following areas:
1
(i) Job opportunities
SE
C
(ii) Job skills
K
(iii) Communication.
(9 marks)
Turn over
8
19 A Computer Vendor has recommended the use of a computer database to your school for
students information.
(a) Explain to the Board of Governors what a database is and its functions. (5 marks)
9 9
(c) Briefly explain any two advantages and two disadvantages of using a database.
9
(8 marks)
1
SE
C
20 (a) What is a computer network topology? (2 marks)
b)
K
Using appropriate diagrams, show any three computer network topologies.
(9 marks)
9138
9
(c) Briefly explain two reasons why organisations need to network their computers.
(4 marks)
0909
2109
S E
K C
9138
Name Index Number ./
451/1
COMPUTER STUDIES
PAPER 1
(Theory)
Oct/ Nov. 2000
2Yi hours
0
2/ hours
2
00
2
INSTRUCTIONS TO CANDIDATES
E
Answer ALL the questions in section A.
Answer question 16 (compulsory) and any other THREE questions from section B.
S
All answers should be written in the spaces provided on the question paper.
C
For Official Use Only
K
SECT. QUESTION SCORE
A 1 - 15
16
17
B 18
19
20
Total Marks
(i) BCD
(ii) ASCII
(iii) EBCDIC
0 0
0
2 Define the term array as used in computer programming. (2 marks)
2
S E
C
3 Suggest how computers may in future be made more user friendly for persons that are;
(2 marks)
K
T
(a) blind _
5 Name six steps in program development cycle in their logical sequence. (3 marks)
0138
State two methods of minimizing dust in a computer laboratory. (2 marks)
List the steps that you would use to correct wrongly spelt words in a document
using the spell checking feature. (3 marks)
0 0
2 0
9
S E
Differentiate between single-user and multi-user operating systems giving an example
of each. (3 marks)
K C
10 State what is meant by each of the following and give an example of where each
is used.
1
F
4
11 In the following flowchart, what will be the value of the sum when printed?
Show how you arrive at your answer.
0 0
2 0
S E
K C
5
13 Explain any three of the terms: creating, editing, printing and saving as used in
wordprocessing. (3 marks)
0 0
14
2 0
List three file organisation methods in a computer. (3 marks)
S E
C
15 What is the use of the search and replace feature in a wordprocessor? (2 marks)
16 A program is required for reading in a student's name and the scores obtained in two
subjects. The output of the program will consist of the student's name, the two
scores, the average of the two scores and a comment. The comment is based on the
average as follows:
Average Comment
> 70 Good
Z 70 Poor
Write a program to solve the problem using a high level language. (15 marks)
0 0
2 0
S E
K C
0138
17 (a) What is meant by data communication in a computer network? (2 marks)
(b) State what is meant by each of the following transmission media and give
one advantage and one disadvantage for each.
0 0 (3 marks)
2 0
S E
(iii)
K C
Optic fibre cables. - (3 marks)
18 Andrew, Jane, David and Zablon had tea, sausages and bananas for breakfast. They took
one sausage, two sausages, three sausages and one sausage respectively. In addition,
they each took a cup of tea and two bananas. Tea, sausages and bananas cost Ksh. 10, 15,
and 5 respectively.
By naming columns A, B, C, and rows 1, 2, 3 :
0
(a) construct a worksheet showing the above information. (7 marks)
00
2
S E
K C
(b) state the expression you would use to obtain:
(b) (i) State two ways through which computer viruses may be controlled.
(2 marks)
0 0
0
(ii) Explain how each of the two ways stated in b(i) above assist in controlling
computer viruses. (2 marks)
2
S E
C
(c) Define each of the following computer terminologies: (3 marks)
K
(i) byte
(ii) bit
(iii) word
(d) Convert the hexadecimal number FC1 to its binary equivalent. (6 marks)
20 (a) A firm intends to purchase new software. List three items that should
accompany the software. (3 marks)
0 0
(b)
2 0
State and explain three ways that computer technology could make office work
E
more efficient. (6 marks)
S
K C
(c) Explain the meaning of each of the following computer crimes: (6 marks)
(i) Hacking
(ii) Fraud
(iii) Piracy
Name Index N u m b e r
451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2001
2 4 hours
INSTRUCTIONS TO CANDIDATES
0 1
0
This paper consists of T W O sections; A and B.
Answer A L L the questions in section A.
2
Answer question 15 a n d any other T H R E E questions from section B.
All answers should be written in the spaces provided on the question paper.
E
F o r Official U s e Only
S
Section Question Score
C
A 1-14
15
K
B
16
17
18
19
TOTAL MARKS
Candidates should check the question paper to ensure that all the
pages are printed as indicated and no questions are missing.
1111 © 2001, The Kenya National Examinations Council T u r n over
S E C T I O N A (40 marks)
0 1
(a) Explain what is meant by batch processing.
2 0 (1 mark)
S E
C
(b) Give one advantage and one disadvantage of batch processing. (2 marks)
K
List any four high level programming languages. (2 marks)
1111
3
6 The first column in the table below contains the formulae as stored into the cell F 1 0 of a
spreadsheet. Enter the formulae as they would appear w h e n copied to cell M 2 0 of the
same spreadsheet.
Formula in F 1 0 F o r m u l a in M 2 0
1
= D10*E10
0
= A$25
= $D$13
0
(3 marks)
2
7 Give three advantages of separating data from the applications that use the data in
database design. (3 marks)
S E
K C
1111 T u r n over
Explain the impact of information technology on organisations in each of the following
areas:
1
(a) List any four tasks that an electronic spreadsheet should be able to perform other
0
than calculations. (2 m a r k s )
(b)
2 0
Explain what is meant by automatic recalculation as used in a spreadsheet.
E
(1 mark)
S
C
10 Describe the functions of the following computer hardware c o m p o n e n t s :
K
(a) mouse (1 -j marks)
1111
5
12 (a)
0 1
Give one difference between internal and external c o m m a n d s in Disk Operating
0
System. (2 marks)
2
S E
C
(b) N a m e t w o D O S c o m m a n d s that m a y be used for checking disk errors. (1 mark)
13
K
Explain how a paragraph can be moved from one place to another in wordprocessing.
(2 marks)
1111 T u r n over
S E C T I O N B (60 marks)
Answer question 15 and any other three questions from this section.
0 1
2 0
(b)
S E
A p r o g r a m is required to list the first 1000 numbers in the series: 2, 4, 6, 8, 1 0 , . . .
D r a w a flowchart and write a p r o g r a m that can be used to carry out this task.
C
(12 marks)
K
7
(a) Prepare a suitable database structure showing field names and their field types.
(5 marks)
(b)
0 1
Explain h o w you index the data such that cars of the same m a k e and colour are
0
together. (2 m a r k s )
2
S E
(c)
K C
Write a statement that can be used to select cars of colour green. (2 marks)
1111 T u r n over
8
0 1
2 0
S E
K C
(0 N a m e the components: (4 marks)
1111
9
(ii) On the diagram above, indicate the direction of data flow-using arrows.
(3 marks)
(c) Explain h o w the C P U registers may be used to carry out a basic calculation such as
2 + 7 = 9. (4 marks)
0 1
0
18 (a) State three ways in which computer technology m a y affect employment patterns
in organisations. (3 marks)
2
S E
C
(b) (i) State and explain three reasons w h y the employment patterns are affected.
K
(6 marks)
1111 T u r n over
10
19 (a)
0 1
In a computer based information system, state the purpose of the following files
0
and give one example where such a file m a y be required in a school. (8 m a r k s )
2
(i) Report file.
S E
(iii)
K C
Reference file.
1111
11
(b) State three precautions that should be taken to ensure that diskettes are well stored.
(3 marks)
(c) Distinguish between "serial" and "indexed sequential" file organisation methods.
(2 marks)
0 1
(d)
2 0
Distinguish between binary and octal n u m b e r systems and give an example of
each. (2 marks)
S E
K C
1111
Name Index N u m b e r
451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2002
2 y hours
2
INSTRUCTIONS TO CANDIDATES
0
This paper consists of T W O sections; A and B.
0
Answer A L L the questions in section A.
2
Answer question 16 and any other T H R E E questions from section B.
All answers should be written in the spaces provided on the question paper.
E
Candidates may be penalised for not following the instructions given in this paper.
S
For Official Use Only
C
Section Question Score
K
A 1-15
16
17
B 18
19
20
Total marks
S E C T I O N A (40 marks)
Answer all the questions in this section.
1 Describe the purpose of each of the following computer functional units: (2 marks)
(a) control
(b) storage.
2 Explain how each of the following would affect the suitability of a room for use as a
2
computer room: (2 marks)
0
(a) burglar proofed door
(b)
2
availability of taps and sinks in the room. 0
S E
C
3 State three data representation codes used in computers. (3 marks)
K
4 State two types of documentation in program development and give the purpose of each.
(4 marks)
2111
3
5 Suppose a 5 element array A contains the values 9, 12, 17, 7 and 20. Find the value in A
after executing the loop below.
Repeat for k = 1 to 4
Set A[k + 1 ] : = A [k]
[ End of loop ] (3 marks)
6 State any three activities that occur in a program compilation process. (3 marks)
02
The formula = K 2 0 + P$ 18 was typed in cell L21 and then copied to cell M 2 4 of a
0
spreadsheet. Write the formula as it appears in cell M24. (2 marks)
2
8
S E
State two ways in which a computer may be used in efficient running of a hospital.
(2 marks)
9 K C
List three disadvantages of using traditional file management method. (3 marks)
2111 T u r n over
List three differences between a micro-computer and a super-computer. (3 marks)
State and explain two reasons why word processing is one of the most c o m m o n
applications of many computer users. (2 marks)
02
0
Write-1 in twos complement notation in byte form. (4 marks)
2
S E
K C
Explain the following input/output terms as used in computer systems. Give an example
for each. (4 marks)
(a) Read
(b) Write
Answer question 16 and any other three questions from this section.
16 The following flowchart can be used to list the odd numbers between 0 and 100.
02
2 0
(a)
S E
Write a program segment for the flowchart using a high level language. (7 marks)
K C
2111 T u r n over
6
(b) What would be the output from the flowchart if the statement in the decision box
is changed to: (3 marks)
(i) odd = 1 0 0
(c) Modify the flowchart so that it prints only the sum of the odd numbers between
0 and 100. (5 marks)
02
2 0
S E
K C
7
17 (a) List five precautions that can be taken to protect data stored in diskettes. (5 marks)
-^(b) State and explain two precautions that can be taken to help recover data lost through
accidental erasure. (4 marks)
02
(c)
2 0
Describe each of the following data processing methods:
(i) batch processing
(6 marks)
S E
(ii)
K C
distributed processing
(iii) multiprogramming.
2111 T u r n over
8
(ii) List four types of keys found on a computer keyboard. Give an example
of each. (4 marks)
(b) Give four differences between present d a y s ' computers and the older generation
of computers. (4 marks)
02
2 0
(c) (i)
E
State three advantages and one disadvantage of using a laser printer.
S
(4 marks)
K C
(ii) Distinguish between a line printer and a page printer. (2 marks)
2111
9
(c) Give four reasons why a firm may decide to computerise its operations. (4 marks)
2
(d) An individual has a right to demand guarantee to privacy of personal information
0
stored on a computer.
0
Give three such types of information. (3 marks)
2
S E
20 (a)
K C
Give three comparisons of the traditional method of typing a document on a
typewriter against using a word processor. (6 marks)
(ii) Give two examples of spreadsheet packages available in the market today. (2 marks)
2111 T u r n over
10
02
2 0
S E
K C
2111
Name Index Number
451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct/Nov. 2003
2-j hours
INSTRUCTIONS TO CANDIDATES
This paper consists of TWO sections; A and B.
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.
All answers should be written in the spaces provided on the question paper.
A 1-15
16
17
B 18
19
20
TOTAL SCORE
1 Computer systems are built from three types of physical components: processors,
memories and I/O devices.
(a) State two tasks of a processor. (2 marks)
2 Threats to the safety of computer systems take many forms such as:
White-collar crime, natural disasters, vandalism and carelessness.
Give one way as to how each of these forms of threats can be controlled. (2 marks)
3 (a) Explain the term nibbles as used in data representation in computers. (1 mark)
(b) Perform the following binary arithmetic giving the answers in decimal notation.
(3 marks)
(i) 11100111 + 1101001 011
(ii) 1001011-011-111-111
3111
3
(b) State the type of translator necessary for a program written in:
(2 marks)
(3 marks)
7 (a) Distinguish between labels and formulae with respect to spreadsheets. (2 marks)
3111 Turnover
4
(b) Consider the entries made in die cells below.
Cell B2 B3 CIO Cll C13
Entry 200 100 B2 B3 = C10 + C11
State the value displayed in cell CI3. (2 marks)
8 List three differences between Wide Area Networks (WAN) and Local Area Networks
(LAN). (3 marks)
Study the flowchart segment below and state the last value printed from the flowchart.
(2 marks)
3111
(b) State any two components of an expert system. (2 marks)
Give two reasons why optical disks are better storage media compared to floppy diskettes.
(2 marks)
What are the DOS commands used for the following? (2 marks)
(a) Changing directories.
Turn over
7
(c) Modify the flowchart so that it adds up all its outputs and displays the sum
obtained. (3 marks)
(b) Which operating system might be pre-installed in this computer and why? (2 marks)
(b) List any three items that may be referred to as data terminal equipmen
network.
State three advantages and two disadvantages of mesh network topology. (5 marks)
10
(c) With reasons, briefly describe the most appropriate type of printer or output
device for the output of: (6 marks)
(i) customer invoices on multi-part stationery
311.1
11
(b) Draw a labelled diagram to illustrate the internal structure of a diskette. (4 marks)
(c) Give two differences between post office mail and electronic mail (E - mail).
(2 marks)
(d) Speed and accuracy are some of the advantages of using computers in banking.
State three other advantages of use of computers in banking. (3 marks)
3H1
Name Index Number
451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2004
2 j hours
INSTRUCTIONS TO CANDIDATES
04
0
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.
2
All answers should be written in the spaces provided on the question paper.
E
For Official Use Only
S
Section Question Score
C
A 1-15
K
16
17
B 18
19
20
TOTAL SCORE
04
2 0
E
Explain why computers use binary numbers in data representation. (2 marks)
S
K C
4 What is meant by the term dry running as used in program development? (2 marks)
A computer teacher has put a rule that diskettes should not be used in the
Computer Laboratory.
4111
3
(b) State two other alternatives that can be used to achieve the same objective. (2 marks)
6 List three differences between a laser printer and a dot matrix printer. (3 marks)
04 (2 marks)
2 0
S E
8 (a)
K C
What is a utility software? (1 mark)
04
2 0
(b) Data processing manager.
S E (2 marks)
K C
4111
5
12. (a) In DOS, what are the following commands used for?
(i) RD (1 mark)
(b) What happens when the following commands are typed in the DOS
environment?
04
0
(ii) DIR (1 mark)
2
13
S E
A student presented a budget in the form of a worksheet as follows.
C
A B C
1 Item Amount
K
2 Fare 200
3 Stationery 50
4 Bread 300
5 Miscellaneous 150
6 Total
(a) Given that the value 0.5 is'typed in cell B9, write the shortest formula
that would be typed in cell C2 and then copied down the column to obtain
half the values in column B. (1 mark)
(b) Write two different formulae that can be typed to obtain the total in cell B6 and then
copied to cell C6. (2 marks)
14 State three operations that can be performed on relational database files. (3 marks)
04
2 0
S E
K C
7
Answer question 16 and any other three questions from this section.
16 Bidii wholesalers has two categories of customers for order processing. Category ' A '
obtains 10% discount on all orders upto Ksh. 10,000 otherwise the discount is 20% on the
entire order. Category ' B ' obtains 30% discount on all orders if the debt repayment is
'good' otherwise the discount is 15%. Draw a flowchart for the order processing.
(15 marks)
04
2 0
S E
K C
Advantages
Disadvantages
04
2 0
S E
K C
Explain three ways by which computer users can protect their eyes from
harmful emissions from the computer screen. (6 marks)
9
(b) List three factors to be considered when deciding on the choice of an electronic
data processing method. (3 marks)
(c) Explain time sharing data processing mode giving two advantages and two
disadvantages of its application. (6 marks)
04
2 0
S E
19 K C
A school has bought a Computer System. The hardware items supplied include:
a 800MHZ processor, 640 MB of RAM, a sound card, speakers, a monitor, a keyboard,
a 12GB hard disk, a floppy disk drive, a CD - Read/Write drive, a mouse, a modem, an
inkjet printer and a joystick. The software supplied include: an operating system, a BASIC
interpreter and the following packages: spreadsheets, graphics, word processor, art,
database and games.
(a) List three input devices from the given specifications. (3 marks)
4
(iii) 12 GB (2 marks)
00
2
S E
Some of the students in the school use he computer to do homework.
C
Name the packages used to:
K
(i) do calculations and draw graphs (1 mark)
(i) Which two hardware items are needed to produce sound? (2 marks)
11
(ii) Which input device is only used for playing games? (1 mark)
20 A school organizes its work in directories. The directory WP contains the files CATS,
EXAMS and ASSIGNMENTS. The directory SP contains the spreadsheet files. The
directory DB contains the database files. The directory PROG is contained in the others
directory. The directory WP also contains the PERSONAL directory. Given that the
directory student contains directories SP, DB, WP and OTHERS.
(a) Draw the directory tree structure with C as the root. (7 marks)
04
2 0
S E
K C
(b) Write the path at which the contents of the subdirectory DB can be erased or
displayed. (2 marks)
(d) Give two reasons for storing files in directories and subdirectories. (2 marks)
04
2 0
S E
K C
Name Index Number
451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2005
2 hours
INSTRUCTIONS TO CANDIDATES
05
This paper consists of TWO sections; A and B.
Answer ALL the questions in section A.
2 0
Answer question 16 and any other THREE questions from section B.
E
All answers should be written in the spaces provided on the question paper.
S
For Official Use Only
C
Section Question Score
K 1-15
16
17
B 18
19
20
TOTAL SCORE
Indicate whether the following devices are used for input or output. (2 marks)
(i) Plotter
(iii) Mouse
05
0
(iv) Visual display unit
2
E
Explain why the following controls should be implemented for computer based systems.
(2 marks)
(i) Back-ups.
S
(ii) Passwords. K C
For each of the following, give one reason why they are not allowed in a computer
laboratory. (2 marks)
(i) Smoking.
3
3 Distinguish between Real, Integer and Character data types as used in programming.
(3 marks)
4 The cells K3 to K10 of a worksheet contain remarks on students performance such.as very
5
good, good, fair and fail depending on the average mark. Write a formula that can be used to
count all students who have the remark "very good". (3 marks)
00
2
5 (a) State the purpose of registers in a computer system. (1 mark)
S E
C
(b) Name two multiprogramming operating systems. (2 marks)
K
6 (a) A serial file comprises of records placed in positions 1 to 10. State the position of the
end of file marker. (1 mark)
05
2 0
S E
K C
Explain the following terms as used in program implementation. (2 marks)
(ii) BBB(-5:10)
(iii) CCC(18)
05
2 0
E
Define the term artificial intelligence. (2 marks)
S
K C
10 Name two types of relationships that can be applied in database design. (2 marks)
(a) indenting
5
(a) Explain Binary Coded Decimal code of data representation. (1 mark)
00
2
E
(b) Write the number 451 in BCD notation.
)0 (1 mark)
S
C
Arrange the following data units in ascending order of size.
K
BYTE, FILE, BIT, NIBBLE. (2 marks)
State two health issues that may result from prolonged use of computers. (2 marks)
SECTION B (60 marks)
Answer question 16 and any other three questions from this section.
(ii) the programmer would check whether the program does as required
5
(iv) the requirements specifications would be written.
00
2
State the output of the following flowchart segment.
A = 30
S E
C
\ r
B = 28
B = A K
A = B
(2 marks)
Turn over
8
(i) Draw a flowchart to compute the combined resistance (R) of two resistors R|
and R2 in parallel using the formula;
(5 T marks)
05
(ii)
2 0
Write a program using Pascal or C languages for the flowchart in c(i) above.
(5 7 marks)
S E
K C
(c) The following information shows the income and expenditure for "Bebayote" matatu for
five days. The income from Monday to Friday was Kshs. 4,000, 9,000, 10,000, 15,000
and 12,000 respectively while the expenditure for the same period was Kshs. 2,000,
3,000, 7,000, 5,000 and 6,000 respectively.
Draw a spreadsheet that would contain the information. Indicate the rows as
1,2,3 and the columns as A, B, C (4 marks)
05
2 0
S E
C
(ii) State the expression that would be used to obtain:
K
I Monday's profit (2 marks)
Using two's complement, substract 7 from 4 and give the answer in decimal notation.
(4 marks)
Convert:
(i) 91Bi6 to octal (3 marks)
5
(ii) 3768 to hexadecimal (3 marks)
00
2
E
(iii) 9.625 io to binary. (4 marks)
S
K C
Explain what the following DOS commands will do when executed.
(b) (i) With the aid of a diagram, explain hierarchial (tree) network topology.
(3 marks)
05
2 0
(ii)
S E
List two advantages and two disadvantages of hierarchial network topology.
(4 marks)
C
Advantages
K
Disadvantages
(i)
(2 marks)
(ii)
(2 marks)
(iii)
(2 marks)
05
(b)
2 0
Simulation is one of the application areas of computers,
(i) What is meant by the term simulation? (1 mark)
S E
(ii)
C
Name two application areas of simulation.
K
(2 marks)
(c) Explain three ways in which computers have impacted on education. (3 marks)
5111
Name Index Number
COMPUTER STUDIES
PAPER 1 (SAMPLE PAPER)
(THEORY)
2006
272 hours
6
This paper consists of two sections; A and B.
Answer all the questions in section A.
0
Answer question 16 and any other three questions from section B.
2
For Official Use Only
0
e
Section Question Score
p l 1-15
16
a m 17
S
B 18
19
20
Total Marks
1 State two practices to be observed in order to ensure the safety of the computer user.
(2 marks)
2 Give an example of a:
6
6 (a) State the type of data communication media that could be used in an electronically
0
noisy environment. (1 Mark)
0
(b) Explain your answer in (a) above. (1 Mark)
2
Give two reasons why it is necessary to have a program design. (2 Marks)
l e
8 Distinguish between portrait and landscape orientations. (2 Marks)
p
9 (a) State one use of hexadecimal notation in a computer. (1 Mark)
m
(b) Convert 161% to hexadecimal. (2 Marks)
a
10. Explain two features of a DVD that enables it to store more information than a CD-R
S
(4 Marks)
Explain the meaning of the following terms:
12. Name three responsibilities that are carried out by a web administrator, (3 Marks)
(b) A school intends to set-up an e-learning system. List three problems that are likely to
be encountered. (3 Marks)
14. Name three circumstances in which it is better to use a questionnaire than an interview for
451/1
15. A worksheet contains the data shown below:
Cell Al A2 A3 CI C2 C3 Gl
Answer question 16 and any other three questions from this section.
n=3
6
for /' = 2 to n do
0
X = A[i]
0
A[0]=X
j = i-\
While A [ j ] > X do
2
A[j +
l e
1]= A[j ]
p
J= J- 1
m
End while
a
A[j + l] = X
S
Print A [ 1 ], A[ 2 ], A[ 3 ]
End for
(ii) Initially^ [ 1 ] = 4, A[ 2 ] = 3, A[ 3 ] = 9.
What is the output of the above pseudocode? (6 Marks)
3
17. (a) Study the diagram below and answer the questions that follow:
06
0
(i) Name the communication media depicted in the above diagram. (1 Mark)
2
(ii) Name the parts labelled A, B, C and D (4 Marks)
l e
(iii) List three advantages of the above communication media. (3 Marks)
p
(b) A student is attempting to print a programming documentation. The printer is not
responding to the print command. Explain four possible causes for the anormally.
m
(4 Marks)
a
(c) Describe three mouse clicking techniques. (3 Marks)
S
18. (a) Despite the introduction of the ATM Card, human resource is still necessary
in the banks. Give two reasons why humans are still needed. (2 Marks)
(c) Give two safety precautions that the card owners should observe to ensure
security of their money. ( 4 Marks)
19. (a) Distiguish between logical and physical computer files. (2 Marks)
(ii) Give two examples to show how a person who has committed a
computer crime can help to improve a computer system. (2 Marks)
451/1
4
(c) (i) What is a search engine? (IMark)
(ii) The internet can be used to source information about emerging issues that may
not be available in print form. Give two advantages and two disadvantages of
information obtained from the internet. (4 Marks)
(5 Marks)
20. (a) (i) Give one advantage of using GUI over a Command Line Interface. ( I M a r k )
(ii) Some computer systems still use command line interfaces. State two
advantages of command line interface. (2 Marks)
6
(b) (i) Distinguish between operating system software and utility software.
0
(2 Marks)
0
(ii) Name two utility programs. (2 Marks)
2
(c) (i) Outline three precautions one should take when assembling a computer.
e
(3 Marks)
l
(ii) Give three reasons why one might purchase a computer with a one year
p
warranty instead of a three year warranty. (3 Marks)
m
(2 Marks)
S a
451/1
5
Name Index Number
451/1
COMPUTER STUDIES
Paper 1
(THEORY)
Oct./Nov. 2006
2 y hours
INSTRUCTIONS TO CANDIDATES
06
0
Write your name and index number in the spaces provided above.
This paper consists of TWO sections; A and B.
2
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.
E
All answers should be written in the spaces provided on the question paper.
S
For Official Use Only
C
Section Question Candidate's
Score
K
A 1 - 15
16
17
B 18
19
20
Total Score
2 Distinguish between transcription and transposition types of errors and give an example of
6
each. (4 marks)
00
2
3 (a) What are peripheral devices?
S E (1 mark)
K C
(b) Give two examples of peripheral devices. (1 mark)
6079
(b) Distinguish between the terms single-tasking and multi-user as used in operating
systems. (2 marks)
5 What actions should be taken in case of a fire outbreak in the computer laboratory?
(4 marks)
06
0
6 (a) What is an Internet Service Provider? (1 mark)
2
(b)
S E
An employee in a business company is charged with the responsibility of putting the
C
company advertisements on the internet.
K
(i) State the professional title of the employee. (1 mark)
(ii) Give an example of software used by this employee to carry out the above task.
(1 mark)
12 (a) List two arithmetic operations that can be performed on a row of numeric data in a word
processing table. (1 mark)
(b) In each case of (a) above, write the expression used. (2 marks)
13 List two methods of gathering information during system development process. (2 marks)
06
14 Name three types of optical disks.
2 0 (3 marks)
S E
15
K C
The diagram below shows a formatted plate surface of a storage disk.
(b) Draw a flowchart to compare three non-equal numeric values A, B, C and print the
6
largest of the three. (11 marks)
00
2
S E
K C
6079
One of the functions of an operating system is job scheduling.
Explain what is meant by job scheduling. (1 mark)
06
0
Describe the following categories of software:
2
(i) firmware (1 mark)
S E
C
(ii) proprietary software. (1 mark)
K
A new company XYZ intends to go into the business of desktop publishing.
Advise the company on three computer hardware system specification features to
consider as a measure of enhancing performance. (6 marks)
Turn over
8
(b) State one way in which a user may reverse the last action taken in a spreadsheet
package. (1 mark)
(c)
06
The following is a sample of a payroll. The worksheet row and column headings are
0
marked 1, 2, 3 , . . . and A, B, C,... respectively.
A B C
PAY PER
D
BASIC
2 E F
GROSS
G
TAX
H
NET
E
1 HOURS
NAME WORKED HOUR PAY ALLOWANCES PAY DEDUCTIONS PAY
2 KORIR 12 1500
S
3 ATIENO 28 650
4 MUTISO 26 450
C
5 ASHA 30 900
K
6 MAINA 18 350
7 WANJIKU 22.5 500
8 WANYAMA 24.5 250
9 OLESANE 17 180
10 MOSETI 33 700
TOTALS
(i) D2 (1 mark)
6079
(ii) E4 (1 mark)
(iv) G7 (1 mark)
(v) H5 (1 mark)
(d) (i) State three ways of moving round the page in a Desktop Publishing window.
(3 marks)
06
0
(ii) State two ways on how Information & Communication Technology (ICT) can
2
be used to reduce the spread of HIV/AIDS. (2 marks)
S E
19 (a)
K C
Describe the following terms with reference to security of data:
(b) A students' database comprises of students' details table and fees received table as
shown below:
Surname
Middle Name Date
First Name Amount
Admission Number Receipt Number
Course
(i) State the primary key field for each table. (2 marks)
06
0
(ii) State the field which should serve as the linking field for the two tables.
2
(2 marks)
S E
C
(c) Describe the following terms with respect to computer security:
K
(i) logic bombs (2 marks)
6079
11
20 (a) The diagram below shows four common network topologies A, B, C and D.
06
2 0
S E
K C
D ;
6
(iii) List two problems associated with network topology B. (2 marks)
00
(iv)
2
List two disadvantages associated with network topology D. (2 marks)
S E
C
Differentiate between Internet and World Wide Web. (2 marks)
K
Describe the following network services and identify their applications.
6079
Name Index n u m b e r
451/1
COMPUTER STUDIES Candidate's signature
Paper 1
(THEORY) Date
Oct./Nov. 2007
24 hours
Write your name and index number in the spaces provided above.
Sign and write the date of the examination in the spaces provided above.
7
This paper consists of TWO sections; A and B.
0
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.
0
All answers should be written in the spaces provided on the question paper.
2
For official Use Only
Section
S EQuestion Candidate's
Score
C
A 1 - 15
K
16
17
B 18
19
20
Total Score
Candidates should check the question paper to ascertain that all the
pages are printed as indicated and no questions are missing.
S E C T I O N A (40 marks)
Answer ALL the questions in this section in the spaces provided.
State the functions of the following keys on the computer keyboard: (2 marks)
7
(a) backspace
00
2
(b) insert (ins).
S E
Jane has noticed the following problems in her computer:
C
• it is taking a longer time to start up;
K
• it is often hanging;
• applications are taking longer to load.
State three possible causes of these problems and how they can be solved. (3 marks)
7077
3
07
Zip disks, 3 \ inch floppy disks, D V D s and 5 \
0
inch floppy disks. Arrange" these devices in an ascending order of storage capacity.
2
(2 marks)
E
6 You have been asked to change your computer password. State a precaution you need to
S
take in order to avoid each of the following:
C
(a) forgetting the password (1 mark)
(b) hacking.
K (1 mark)
9 Explain data series, axis and legend as used in spreadsheet charts: (3 marks) ^
7
data series
axis
00
2
E
legend
S
C
10 (a) Describe the term data integrity. (2 marks)
K :
7077
5
07
12
2 0
List four types of publications that can be designed by using desktop publishing software.
E
(2 marks)
S
K C
13 Differentiate between the following pairs of terms as used in database design: (2 marks)
07
2 0
15
S E
Write an algorithm to compute the area of a triangle. (2 marks)
K C
7077
SECTION B (60 marks)
Answer question 16 and any other THREE questions from this section in the spaces provided.
16 (a) Study the flowchart below and answer the questions that follow.
START
M=6
N = 17
P = M-N
Q = N+M
YES NO
07 M=N
0
Q=M
P=N
2
S E
K C
(i) N a m e the control structures used in the flowchart. (2 marks)
M N
P Q
7
(iii) Write the pseudocode for the flowchart. ( 8 marks)
07
2 0
S E
K C
7077
List four functions of an assembler. (2 marks)
(ii) hyperlink
07 (1 m a r k )
2 0
E
(iii) hyper text document. (1 mark)
S
K C
List six activities performed on the web. (3 marks)
Turn over
10
(ii) State the necessary steps required to connect the computers to the internet.
(4 marks)
07
(d) Below is an e-mail address:
2 0
E
ggitau @moest.edu.ke
S
(i ) (ii) (»') (iv)
C
N a m e the parts labelled (2 marks)
K
(i)
(")
(Hi)
(iv)
OS SP Prog. ADB
DTP
WP Internet
DB
7077
11
Assuming there is one student per class, draw the corresponding tree structure. (6 marks)
07
0
(i) A form four student wants to create a folder to store her project. State the
2
path for that project folder. (2 marks)
(ii)
S E
Suggest how the student can ensure that:
C
w o r k is not lost in case the hard disk fails; (1 mark)
K
the project is not copied by other students. (1 mark)
(i) Other than I/O devices, list other three devices under the control of the
operating system. (3 marks)
Turn over
12
A manager wishes to replace the current manual system with a computerised one.
(a) Describe three main areas that must be evaluated to justify the replacement.
(6 marks)
07
2 0
S E
(b) K C
List the three areas that would be considered in the requirements specifications.
(3 marks)
(c) State and explain three ways that can be followed to replace the current system.
(6 marks)
13
(i) Name the most appropriate primary key. Give a reason. (2 marks)
(ii) For each item in the student's details above, indicate its most appropriate
datatype as used in the database. (3 marks)
07
2 0
(iii)
S E
Explain why input screens are better data entry designs than entering data
C
directly to a table. (2 marks)
K
(b) List two career opportunities associated with databases. (2 marks)
(d)
07
Outline the steps to be followed in order to merge cells in a word processing table.
0
(2 marks)
2
S E
K C
7077
NAME Index No. /
Instructions to candidates
8
Write your name and index number in the spaces provided above.
Sign and write the date of the examination in the spaces provided above.
0
This paper consists of two sections; A and B.
0
Answer all the questions in section A.
Answer question 16 and any other three questions from section B.
2
All answers should be written in the spaces provided on the question paper.
E
For Examiner's Use Only
S
Section Question Candidate's
Score
C
A 1 -15
K
16
17
B 18
19
20
Total Score
Candidates should check the question paper to ascertain that all the
pages are printed as indicated and no questions are missing.
(b) Other than scanning devices, name two other input devices. (1 mark)
8
2. Distinguish between the following:
00 (2 marks)
2
S E
K C
8357
3
08
5. (a) Define the term Computer Aided Design.
2 0 (1 mark)
S E
K C
(b) List three advantages of using Computer Aided Design. (3 marks)
• • • • in fit
6. List three ways in which computer technology can be used in law enforcement. (3 marks)
08
2 0
S E
C
8. Describe each of the following types of computers (2 marks)
K
(a) hybrid;
(b) embedded.
9. State two purposes of the maintenance phase of the system development life cycle.
(2 marks)
8357
5
08
2 0
E
11. Headache, back and neck pain may result from use of computers. State how each of them
can be minimised. (2 marks)
S
K C
12. State two ways in which each of the following can be prevented: (4 marks)
14. Distinguish between formatting a disk and scanning a disk with reference to operating
8
systems. (2 marks)
00
2
S E
C
15. State two advantages of using robots in manufacturing of goods. (2 marks)
8357
7
16. Study the flow chart below and answer the questions that follow.
08
2 0
S E
K C
If DATA is the following sorted list of 13 elements, such that N = 13:
(where N is the number of elements in the list), 11, 22, 30, 33, 40, 44, 55, 60, 66, 77,
80, 88, 99.
(a) Determine the output from the flowchart if ITEM is:
(i) 40 (2 marks)
(ii) 99 (2 marks)
(iv) 5 (2 mark)
08
2 0
S E
K C
17. (a) Describe two ways in which a computer can represent a positive number and a
negative number. (2 marks)
8357
9
(b) A particular computer stores numbers in a single 8-bit word. How would it
represent 0.312510? (3 marks)
8
(d) Perform the decimal subtraction 1410 - 6 10 using
0
(i) regular binary; (3 marks)
2 0
(ii) one's complement.
S E (5 marks)
K C
18. (a) List three advantages and three disadvantages of wired communication over
wireless communication. (6 marks)
Advantages
Disadvantages
08
0
(b) Describe the following signals and state where each is applied in network
2
communication: (4 marks)
(i) analog;
S E
(ii) digital.
K C
(c) Name the two types of coaxial cables. (2 marks)
8357
11
19. The information below is maintained by the patron of wildlife club in a school. Study it and
answer the questions that follow.
8
Mariam 2E 3925 S 002 Serengeti
0
Josephine 2W 3926 N001 Nairobi
0
Elvis 4N 3746 AB 001 Aberdare
Carey 3E 3805 T002 Tsavo
2
Gordon 1W 4029 N002 Nairobi
Paul IN 4013 M002 Mara
E
(a) Describe the field values, records and file. (3 marks)
S
K C
(b) State the most appropriate primary key for the list. (1 mark)
(c) State the most appropriate data type for the fields:
(d) If a database was to be created for the list; Forms, Tables, Queries and Reports are
likely to be used.
(ii) Which objects cannot be used to store the data in the list? (3 marks)
08
2 0
E
(i) How many field values are in the list? (1 mark)
S
C
(ii) How many records are in the list? (1 mark)
8357
13
08
(a) (i)
2
What is the name of this file structure? 0 (1 mark)
(ii)
S E
One of the files in MISCELLANEOUS has a file name similar to one in
C
CHEMISTRY in Form 1. Describe what happens if all the contents of
K
CHEMISTRY are copied to MISCELLANEOUS. (2 marks)
Turn over
14
State four properties that an operating system displays about a file. (2 marks)
08
0
A removable storage media unit connected to a single user microcomputer system is
2
used for permanent storage of programs and data. State six file functions you would
expect the operating system of the computer to provide to enable the user to
maintain this storage media. (3 marks)
S E
K C
State two tasks performed by the operating system in each of the following
resources:
08
2 0
S E
K C
8357
Name ................................................................................................. Index No .............................. J.,
451/1
COMPUTER STUDIES Candidate's signature
Paper 1
(THEORY) Date...............................
Oct/Nov. 2009
2Vi hours
Instructions to Candidates
( a ) Write your name and index number in the spaces provided at the top of this page.
( b ) Sign and write the date of examination in the spaces provided above.
0 9
0
(c) This paper consists of TWO sections; A a n d B .
2
( d ) Answer ALL the questions in section A.
( e ) Answer question 16 and any other THREE questions from section B .
if) All answers should be written in the spaces provided on the question paper.
E
( g ) This paper consists of 16 printed pages.
S
( h ) Candidates should check the question paper to ascertain that all the pages are printed as
indicated and that no questions are missing.
A K
Section
C For Official Use Only
Question
1 - 15
Score
B 16
17
18
19
20
Total
section in the spaces provided. Give a reason for each of the following: (a)
(1 mark)
(b) typing and re-typing a new password when changing it. (1 mark)
0 9
With reference to quality of print, noise level and cost, compare a dot matrix with a Laser
printer.
20
S E
K C
A computer accessories vendor needs to order supplies. A spreadsheet is used to calculate the order part
of which is shown below.
A B C D
1. Item Price per unit Number ordered Cost (Kshs)
2. 56K modem 8,565.00 60
3. 128 MB Ram 4,950.00 40
4. Pentium IV 13,525.00 55
Processor
5. Total
9089 09462
(i) D2 (1 mark)
(ii) D5
(
1 mark)
(b) If a value added tax (VAT) of 16% was charged on each item and the number ordered
was decreased by 10%, write a new formula that can be used in D2.
(2 marks)
0 9
5
20
Explain the following terms as used in desktop publishing: (2 marks)
E
(a) embedded object
■
S
(b) autoflow. K C
(b) Which of the approaches named in (a) above is appropriate for critical systems?
Explain. (2 marks)
0 9
20
7
(1 mark)
K C
(b) interrupt handling. (1 mark)
09462
5
9 A computer user typed the name Kajiado as Kajaido and 8726 as 8126. (a)
0 9
0
(b) Explain how such errors can be controlled. (2 marks)
2
S E
10
K C
Describe Third Generation Languages and name two examples. (2 marks)
(b) What is the purpose of the following internet domains? (i) (1 mark)
.org
(ii) .gov
0 9
12 (a)
20
Name two types of buses found on the computer motherboard. (2 marks)
S E
(b) K C
State the purpose of each of the types of buses named in (a) above. (2 marks)
13 (a) Name the two files commonly used in mail merge. (1 mark)
9089
(b) Name and explain the two types of dropcaps. (2 marks)
Give three ways in which horticultural farmers can benefit from the use of Information and
Communication Technology (ICT). (3 marks)
9
Arrange the following job titles in the order of their seniority.
0
Database administrator, ICT manager, Systems analyst. (1 mark)
20
S E
K C
16 Study the flowchart below and answer the questions that follow.
^ START ^
READ N
M =1 =1
F=
9
1 i
F=F xM
0
(a) What would the flowchart generate as output if the value of N at input was:
0
(i) (2 marks)
2
6?
S E
K C © 2009 THE KENYA
NATIONAL
EXAMINATIONS
COUNCIL Kenya
Certificate of Secondary Education COMPUTER STUDIES Paper 1
9089 (THEORY)
(ii) 1? (2 marks)
Write a pseudocode that does the same thing as the flowchart above. (7 marks)
9
0 9
20
S E
K C t
Turn over
10
(c) Modify the flowchart so as to reject an input below 0 and to avoid the
looping when the input is 0.
(4 marks)
0 9
20
S E
K C
A lecturer keeps the following student details in a database: name, age, course.
(a) Write an expression you would use to compute the year of birth of a
student using this year as the current year. (2 marks)
(b) What query expressions would the lecturer use to list the students whose
age is above 15 years and below 25 years? (3 marks)
9
(ii) the mean age of the students in the database? (2 marks)
0 0
2
(d) Name and describe any two types of database models. (6 marks)
S E
K C
18 The diagram below shows a layout of a computer network used by a law firm. A
(a) workstation and a printer are located in every consulting room.
0 9
0
(ii) Name the device labelled D. (1 mark)
2
E
(iii) State four functions of the device labelled 'server' (4 marks)
S
K C
9089 09462
13
Give two advantages and one disadvantage of the above network design.
(3 marks)
(v)
0 9
If the firm intends to open extra offices in two different towns, name any
0
three hardware devices that would be required. (3 marks)
2
(vi)
S E
State any two security problems that might arise by linking the offices in
C
different towns. (2 marks)
K
What is spy ware? (1 mark)
19 (a) Study the following diagram and answer the questions that follow.
2GB HDD
Network
MONITOR
128 MB RAM
FLOPPY CPU
SPEAKER
DRIVE 32 MB
ROM
CD DRIVE
MOUSE
SCANNER
PRINTER
9
(i) Name two devices that are used for long term storage. (2 marks)
0 0
(ii)
2
Name three peripherals shown on the diagram that are used for input.
E
(3 marks)
S
K C
(iii) Name two other devices that a Computer Aided Design (CAD) user might wish to add to
the set-up above.
(2 marks)
09462
15
package. State three advantages why many computer users prefer integrated packages
to separate packages. (3 marks)
(i) An anti-virus software installed in a computer is loaded into the main memory each time the computer is
switched on.
Explain three ways in which computer viruses are spread from one computer to
another. (3 marks)
09
20
(ii) Give two reasons why an anti-virus package should be updated regularly.
(2 marks)
SE
KC
Perform the following binary arithmetic and give your answers in decimal notation:
09462
Covert the following numbers into their binary equivalents:
0 9
0
Using four-bit twos compliment, perform the following arithmetic
2
(3 marks)
1012-1112
S E
K C
THIS IS THE LAST PRINTED PAGE
Instructions to Candidates
(a) Write your name and index number in the spaces provided above.
(b) Sign and write the date of examination in the spaces provided above.
(c) This paper consists of TWO sections; A and B.
(d) Answer ALL the questions in section A.
(e) Answer question 16 and any other THREE questions from Section B.
(e) ALL answers should be written in the spaces provided on the question paper.
(f) This paper consists of 12 printed pages.
(g) Candidates should check the question paper to ascertain that all the pages are
printed as indicated and that no questions are missing.
1 0
(b)
2 0
State two characteristics of an effective data communication system. (2 marks)
S E
compared to the internet.
K C
Explain why an intranet is a more secure way to share files within an organisation
(2 marks)
"sen a formal
f, a and a function as used in spreadsheets.
(2 marks)
5 State four functions which are specific to Network Operating Systems (4 marks)
6 The word raeejs appearing several times in a long story document composed using a DTP
package. How would this word be replaced with the word content?. (3 marks)
1 0
2 0
E
Study the pseudocode below and determine its output. (3 marks)
S
1. 0
0
C
1
2. M+T
K
T+5
K+ 1
3. while K < 3
4.
5.
9 State the purpose of each of the following memories in a computer system. (2 marks)
(a) RAM
1 0
0
10 Explain why telecommuting isjigt suitable for a doctor when carrying out an operation on a
2
patient. (2 marks)
S E
11 K C
Copyright laws are laws granting authors the exclusive privilege to produce, distribute, perform
or display their creative works. It is a legal framework for protecting the works such as book
publishing, motion-picture production and recording. State two challenges that are posed to
these laws by ICT. (2 marks)
1 0
14
2 0
State three ways in which ICT can be used in shipping control. (3 marks)
S E
K C
15 A firm operates an order system that coordinates orders, raw materials and inventory across its
three factories. Currently the orders are processed manually at each factory and communicated
to the others over the phone . The management intends to computerise their operations. State
the first two computer professionals who will be required and their roles.
(4 marks)
(a) Machine language programs are more difficult to write than high-level language
programs. State two reasons for this. (2 marks)
(b) In order to process examination results of students in a school, their names, index
numbers and scores in 11 subjects are required. The average score for each student
is then determined and a grade assigned. This process is repeated for all 40 students in
a class.
Draw a flowchart to:
• Read a student's name, index number and the scores in all the subjects.
0
• Determine the student's average score.
• Assign a grade to the student depending on the average score as follows:
1
Score Grade
0
80 < score A
2
60 < score < 80 B
40 < score < 60 C
score < 40 F
E
• Display the student's name, index number, average score and the grade.
S
• Repeat the above steps for all the students in the class. (10 marks)
K C
1 0
2 0
S E
(c)
C
Below is a list of program segments in different generations of programming languages.
K
Identify the language for each.
SUB 40
ADD 20
(iii) For x: = 1 to 10 do
Write (x);
(b) Give three reasons why system maintenance phase is necessary in SDLC.
(3 marks)
1 0
(c)
2 0
State two instances where observation is not a viable method of gathering information
during system analysis stage. (2 marks)
S E
(d)
K C
Various considerations should be made during input design and output design.
State two considerations for each case. (4 marks)
Input design.
Onput design.
18 (a) Using two examples, explain the term field properties as used in database design.
(2 marks)
(b) Below is
Patient No
1
an extract from a hospital database table.
Name 0
Date Registered Amount paid Remarks
LDK/001
LDK/004
Mathew Olang 04/05/08
Joy Chelimo 07/06/08
20 2500.00
1200.00
To go for x-ray
Medicine to be
ordered
E
LDK7008 John Kamau 09/08/08 3500.00 To be admitted for
S
further check up
LDK/002 Gerald Wasike 02/04/05 800.00 To come back for
C
review
(i)
K
State with reasons the most suitable data types for the following fields: (8 marks)
(I) patient No;
(IV) remarks.
(ii) Which would be the most appropriate primary key field for the above table?
(1 mark)
(iii) What is the purpose of a primary key field in database design? (1 mark)
0
(iv) Describe how information about patients who registered after 09/08/06 can be
1
extracted from the database. (3 marks)
2 0
19 (a)
S E
Explain how data in a computer system is secured using:
(i) password;
(4 marks)
K C
(ii) user access level.
(c) State two characteristics of a computer that is infected by computer viruses. (2 marks)
(d) (i) The figure below shows how data is transmitted through a public telephone line.
1 0
2 0
E
NameA,B,C and D. (4 marks)
S
(ii)
K C
State two advantages of using fibre optic cables over satellite in data
communication. (2 marks)
20 (a) Using ones complement, convert the decimal number -9 into a 6-bit binary number.
(3 marks)
(b) (i) State three standard coding schemes used in data representation. (3 marks)
1 0
2 0
S E
C
(c) Using twos complement, show how the arithmetic below would be carried out
on a 8-bit computer system. (6 marks)
K
(+54)-(+29)
Instructions to Candidates
1. Write your name and index number in the spaces provided above.
2. Sign and write the date o f examination in the spaces provided above.
J. This paper consists o f TWO sections; A and B.
11 1
4. Answer ALL the questions in section A.
20 1/
6. ALL answers should be written in the spaces provided on the question paper.
7. This paper consists o f 13 printed pages.
8. Candidates should check the question paper to ascertain that all the pages are
printed as indicated and that no questions are missing.
Total Score
The text in the box below was composed using a wordprocessor. The current cursor position is
between the words “is” and “an” .
Describe what happens to the text in the box above when each of the following keyboard keys
are pressed.
(3 marks)
(a) tab
(b) enter
11 1
20 1/
45
(c) home
State four characteristics which make computers better than human beings. (4 marks)
3 Give three reasons why primary storage devices are not used for secondary storage.
(3 marks)
4 Asha has a hardware shop and lately, she is finding the task of managing daily sales in the shop
overwhelming.
(b) State two input devices that are used in retail systems. (1 mark)
11 1
20 1/
(c) Apart from enhancing the speed of operation, state two other benefits that Asha will gain
from using such a system. (2 marks)
45
5 The accounts department of a secondary school is using a system that generates invoices that
are printed in triplicate using carbon papers.
(a) Name one type of printer suitable for this task. (1 mark)
A student tried opening an application program on a computer that was functioning well. The
program did not load and the operating system reported that the memory was insufficient.
Give two causes of such response. (2 marks)
11 1
State two measures that can be put in place to control piracy of software. (2 marks)
20 1/
45
10 A water company sends out clerks to read water meters. The data collected by the clerks is then
fed into the computer and then all the bills are printed at the same time.
11 A school has acquired a system that imitates human teachers. Students can learn by getting
answers from the system which they would normally get from the teacher. Give three
advantages of this system. (3 marks)
11 1
20 1/
45
12 Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The
management is convinced that someone is illegally gaining access to the data in their
computers. State three ways in which the company can overcome this problem. (3 marks)
14 State the importance of considering the following factors when acquiring a software.
Answer question 16 and any other three questions from this section in the spaces provided.
45
#
(b) Describe two types of errors that may be detected during program testing. (4 marks)
(c) A company’s workers travel to work either by public or by private means. All workers
are paid a travel allowance of Ksh. 200, but those using private means are paid an
additional Ksh. 100.
^ ...............................................................
(ii) Draw a flowchart to determine a worker’s travel allowance. (4 marks)
11 1
20 1/
45
(a) State three standard data coding schemes used in computing and electronic systems.
(3 marks)
18 (a) What is meant by each of the following terms as used in table creation?
(b) State four types of text wrap that can be applied to a graphic. (2 marks)
A B C D E
1 I t e m D e s c r ip t io n No of U n it s C o s t p e r U n it T o ta l C o st
5 Salt 2 20
45
Figure 1
(ii) The prices of all items increased by 10% and the value 10% is placed
in cell B8. Using cell addresses with absolute referencing only, write a
formula to calculate the new unit price of salt. (2 marks)
(iii) Write a function to display the number of cells in which the cost per unit is
equal to 110. (2 marks)
(iv) Write a function to display the least total cost for all items. (2 marks)
19 (a) What is meant by each of the following terms as used in the internet?
(b) A school has set up its network using wireless technology to link computers. State
11 1
three problems that the school is likely to experience when using this technology.
20 1/
(3 marks)
45
(c) List three ways by which parents can protect their children from accessing inappropriate
content from the internet. (3 marks)
(d) Explain three problems associated with using e-mail technology for communication.
(6 marks)
20 (a) Explain three reasons why an organization may need to change to a new computerised
system. (6 marks)
11 1
20 1/
45
f t
(b) State why each of the following is important in system documentation.
(c) Name the tools used for data storage in each of the following methods of data processing,
(i) manual; (1 mark)
(d) A teacher manages students’ records by storing daily attendance information in a file
called register and students’ personal records such as year of birth and home address in
a file called students.
12
Paper 1 451/1 - Computer Studies - PI
(THEORY) Tuesday 11.00 am - 1.30 pm
2 Vi hours 30/10/2012 (2nd Session)
Instructions to candidates
20
(a) Write your name and index number in the spaces provided at the top o f this page.
(b) Sign and write the date o f examination in the spaces provided above.
(c) This paper consists o f TWO sections; A and B .
(d) Answer ALL the questions in section A .
1
(e) Answer question 16 and any other THREE questions from section B.
(f) All answers should be written in the spaces provided on the question paper.
1/
12
20
1
1/
12
(b)
20
List six examples of Data Communication Equipment. (3 marks)
1 /1
45
12
20
7 A student saved a document in a diskette. Later on, the student found that the diskette could
not open and therefore the work got lost.
Give three precautions the student should have taken to ensure the work was not lost.
(3 marks)
1
1/
45
State two:
12
(a) functions of an email software; (1 mark)
20
(b) protocols used in sending and receiving of emails. (1 mark)
1
1/
(a) One-to-one;
(b) One-to-many.
12 State the stage of system development life cycle in which each of the following activities take
12
place:
A: ................................................................................
12
B:
20
C:
/1
12
20
1 /1
45
Answer question 16 and any other THREE questions from this section in the spaces provided.
16 (a) State the use of each of the following flowchart symbols. (3 marks)
(i) O
12
20
/1
(iii)
CZJ
1
45
P = 5
Q = 6
INPUT N
If N is GREATER OR EQUAL TO 10
R = P*Q
S = Q -P
T = P+Q+R+S
ELSE
R=P+Q
S=Q
T=R+S
12
END IF
PRINT R, S and T
From the algorithm, determine the output if the input value of N is:
20
(i) 7; (3 marks)
1
1/
12
20
17 (a) Convert each of the following binary numbers to decimal equivalent given that the left
most digit is a sign bit.
/1
(i) 0 0 1 0 1 1 0 1 (2 marks)
1
45
(ii) 1 1 0 0 1 0 0 1 (2 marks)
12
(c) Using two’s complement, subtract 11 0 from 8 |(), leaving your answer in binary
notation. (5 marks)
20
1 /1
45
(b) A company in town wishes to link its offices together. The linking may be through
wireless or fibre optic network media.
(i) State two benefits that the company would gain from the use of metropolitan
area network (MAN). (2 marks)
12
20
(ii) State three advantages of using wireless over fibre optic network media.
(3 marks)
1
1/
12
(ii) State two roles of an information system.
20 (2 marks)
/1
File A:
Reg. No. Student Name Sex Address
File B:
Reg. No. Fees Pavments Date of Pavment
12
3008 1500 03/09/2011
3001 900 02/09/2011
3015 400 21/09/2011
(i)
20
Which of the two files above represents a Transaction file? (1 mark)
1
1/
(ii) State two advantages and two disadvantages of this data processing mode.
(4 marks)
12
20
1
1/
45
12
20
/1
(b) List three factors that should be considered when developing a database application
and give reasons why each should be considered. (6 marks)
1
45
12
20
1
1/
Instructions to candidates
(a) Write your name and index number in the spaces provided above.
13
(b) Sign and write the date of the examination in the spaces provided above.
(c) This paper consists o f two sections; A and B.
(d) Answer all the questions in section A.
(e) Answer question 16 and any other three questions from section B.
20
(f) All answers should be written in the spaces provided on the question paper.
(e) This paper consists o f 16 printed pages.
(f) Candidates should check the question paper to ascertain that all the pages are printed as
indicated and that no questions are missing.
1
(g) Candidates should answer the questions in English.
1/
Question
Section Candidate’s Score
number
45
A 1 - 15
16
17
B 18
19
20
Total Score
(a) CAD
(b) DVD
(c) WORM
(d) POS
13
A school keeps student records in a database. The data is coded before entry.
20
State three reasons why the coding is necessary. (3 marks)
1
1/
5 List two career opportunities directly associated with computer networking. (2 marks)
6 A retailer uses a spreadsheet program to calculate profits. Figure 1 shows the spreadsheet.
13
A IH C D HH F
1 Items Cost Selling Profit Items Total
Price Price per Item sold Profit
Item 1 305 350
20
45 32 1440
Item 2 100 120 20 45 900
Item 3 200 220 20 32 640
Item 4 107 130 23 89 2047
1
Figure 1
1/
(b) Write the formula that has been entered in cell F2. (2 marks)
13
20
1
1/
Figure 2
45
(a) Give one name for the combined topology in figure 2. (1 mark)
(b) Name the two topologies forming the combined topology in figure 2. (2 marks)
(b) Give two reasons why the organisation is opting to use the implementation strategy in
(a) above. (2 marks)
13
20
(b) Differentiate between pull-down menu and pop-up menu as used in Graphical User
Interface (GUI) operating systems. (2 marks)
1
1/
45
11 The 21st century has had many forms of ICT technologies improving the various means of
communication. However, these changes have brought many challenges.
State three negative social impacts of these technologies. (3 marks)
12 Explain why a DTP application would be preferred to a word processing application when
designing a publication.
(2 marks)
13 A computer is idle but the hard disk light is blinking, indicating some activity.
State two possible causes of this. (2 marks)
13
20
1
14 Describe compatibility as a factor to consider when purchasing a computer. (2 marks)
1/
45
15 Identify the appropriate output device for the production of each of the following:
&
913113 KNEC 43006101 KCSE
7
SECTION B (60 marks)
Answer question 16 and any other THREE questions from this section in the spaces provided.
16 (a) Figure 3 shows a flowchart. Use it to answer the questions that follow.
13
20
1
1/
45
13
20
1
1/
45
13
20
1
1/
45
913113
€1 KNEC 43006101 KCSE T\irn over
10
17 (a) Describe three types of validation checks as used in data processing. (6 marks)
(b) A company has opted to store its employees’ personal details in a computer system.
13
Describe two software methods that may be used to prevent unauthorized access to
these details. (4 marks)
20
1
1/
45
I. real-time; (2 marks)
(ii) State an application area where real-time data processing mode is applied. (1 mark)
13
18 Figure 4 shows an advert placed in a newspaper. Use it to answer the questions that
follow.
NEW ARRIVALS - LAP TOP COMPUTER
20
HDD Windows 8
300 GB Home Edition
RAM Free Suite
:ALL0622 405405
1
512 MB • Word processor
Ksh 48,0000
Screen • Email
I 17 inches Keyboard, Mouse, Modem
Parallel port USB, serial
OTHER PCs AVAILABLE
Figure 4
913113
fH KNEC 43006101 KCSE Turn over
12
(ii) The screen is said to be 17 inches. Explain what this means. (2 marks)
(b) State one advantage of having each of the following provided with a laptop.
(ii) U SB .....................................................................................................
13
(3 marks)
(c) State the software package in the free suite which is most suitable for each of the
20
following:
(d) (i) State three advantages of using a computer to design an advert such as the one
in Figure 4. (3 marks)
19 A worker is unable to travel to the office but may still be able to do the office work through
telecommuting.
(a) Explain why the worker may use each of the following:
13
20
1
(ii) fax; (2 marks)
1/
45
(b) The worker needs to make regular backups of documents sent to the office.
State three reasons for this. (3 marks)
13
20
1
1/
(c) Explain two benefits that the employer will get by allowing this worker to do the
office work through telecommuting. (4 marks)
45
(ii) Explain the preference of binary number systems over decimal number systems
in computers. (2 marks)
13
20
(b) (i) Using one’s complement, subtract 1000112 from 0100102. (4 marks)
1
1/
45
................................................... r
13
(c) Perform the following binary operations.
1101 + 11011 + 101 + 11111 (2 marks)
20
1
1/
45
913113 2013