Comp Kcse 2025 National Schools Mocks
Comp Kcse 2025 National Schools Mocks
For Marking Schemes, Contact Kenya Educators Consultancy 0724 333 200 OR
Subscribe to our website www.kenyaeducators.co.ke for similar resources
TABLE OF CONTENTS
1.ALLIANCE HIGH SCHOOL
2.KAPSABET BOYS HIGH SCHOOL
3.KENYA HIGH SCHOOL
4.MARANDA BOYS HIGH SCHOOL
5.MOI GIRLS KABARAK
6.NYAMBARIA BOYS HIGH
SCHOOL 7.KABIANGA BOYS HIGH
SCHOOL Confidential!!!
ELIMU BORA MAISHA BORA
KENYA EDUCATORS
CONSULTANCY
For Marking Schemes, Contact Kenya Educators Consultancy 0724 333 200 OR
Subscribe to our website www.kenyaeducators.co.ke for similar resources
NAME:……………………………………………………… STREAM………………..…
SCHOOL…………………………………………………….. SIGNATURE……………..
A 1 - 15 40
16 15
B 17 15
18 15
19 15
TOTAL 100
3. Two features of Von Neumann architecture are the use of registers and the
use of buses.
Give the names of any two registers and two buses. (2 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
4. The following terms are frequently used in data transmission. Distinguish each
pair.
(i) Simplex and duplex (2 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
(ii) Switch and hub (2 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
7. State three ways that computers help the police detect crime. (3 marks)
..............................................................................................................................................
.............. ...............................................................................................................................
............................. ................................................................................................................
............................................ .................................................................................................
...........................................................
.............................................................................................................................................
............... .............................................................................................................................
............................... .............................................................................................................
............................................... .............................................................................................
...............................................................
(b) Distinguish between customized and custom made software. (2
marks)
.............................................................................................................................................
............... .............................................................................................................................
............................... .............................................................................................................
............................................... .............................................................................................
...............................................................
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
10. What is the difference between system files and application files? Give
examples.
(3 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
11. Differentiate between the terms upgradability and compatibility in relation to
hardware
specification. (2 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
12. How does the operating system accomplish multiprocessing and multitasking
activities
in a computer? (2 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
(b)The shopping mall has over 100 cameras. At the end of each day all these
cameras send
their images, captured over the last 24 hours, to a central computer.
Explain why the mall uses dedicated fiber optic cable rather than transmitting the
data over the local
broadband network. (2 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
14. Publishing firms prefer using DTP instead of Word processors. Giveany TWO
reasons for this. (2 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
15. Banks have replaced each credit card with a smart card, which contains a
microchip, in order to give greater protection against fraud. State three items of data
that are stored on the microchip in a smart card. (3 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
16. 5000 numbers are being input which should have either1 digit (e.g. 5), 2
digits (e.g. 36), 3digits (e.g. 149) or 4 digits (e.g. 8567).
(a)Write program logic, using pseudo code, which
•inputs 5000 numbers
•outputs how many numbers had 1 digit, 2 digits, 3 digits and 4 digits
•Outputs the % of numbers input which were outside the range. (7
marks)
©KNEC 2024 [Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
(b)Draw a flowchart fort the above pseudo code. (8 marks)
(b)The owner needs to be able to enter their own sequence of movements for
the model
car. Name a suitable input device. Give a reason for your choice of device.
(2 marks)
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
(c)Explain why the model car uses a solid state drive rather than another type
of
secondary storage. (2 marks)
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
(d)A database has been set up to bring together information about the
world’s tallest buildings. A section of the database is shown below.
(i)How many records are in the section of the database shown? (1 mark)
.............................................................................................................................
.............
(ii) Using Ref No. only, which records would be output if the following
search condition was entered:(Year < 1990) AND (Height (m) > 375)? (1 mark)
........................................................................................................................................
..............
(iii) Write down a search condition to find out how many buildings are in
China or how many buildings have more than 80 floors. (2 marks)
(iv) For each of the following fields give a different validation check. (2
marks)
a.Year ...............................................................................................................
b.Ref
No. ..........................................................................................................
(v) In a relational database, relationships must be enforced. Explain why?
(2 marks)
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
19. A passenger logs onto an airline website and types in the reference number
for their flight. Once the passenger accesses their account they can choose their
seat and also print out a boarding pass which contains a unique barcode. This
barcode is scanned at the airport check-in desk.
(a)Name one input and one output device found at the check-in desk and give a
reason for your
choice. (2 marks)
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
(b)The training department of an international airline has introduced computer
based
training (CBT) to teach foreign languages to its cabin crew. Give TWO
advantages of using CBT.
(2 marks)
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
........................................................................................................................................
..............
(c)The airline also trains its pilots.
(i)What type of training is most appropriate to train pilots to manage
dangerous
situations? (1 mark)
...................................................................................................................................
.............
(i) What formula is in cell G5 to find the mean share price for KLN?
..........................................................................................................................................
(1 mark) (ii) What formula is in cell H5 to find the highest share price for KLN?
..........................................................................................................................................
(1 mark) (iii) If the data in cell E4 was changed to 425, which cells would be
automatically
updated? .............................................................................................................................
............. (2 marks) (iv) State the cells that are needed to create a line graph to show
the share prices for years 2006 to 2008.
..........................................................................................................................................(2
marks)
(v) The student wants to extend the spreadsheet to include share prices for 2010.
Describe how the student would do this.
..........................................................................................................................................
(2 marks)
20. (a) Explain each of the following functions of operating system. (6 marks)
(i)Job scheduling
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
(b)Inkjet printers and laser printers are two common types of printer. Describe ONE
feature and principle of operation of each type of printer. (4 marks)
..............................................................................................................................................
.............. ...............................................................................................................................
............................. ................................................................................................................
............................................ .................................................................................................
........................................................... ..................................................................................
.......................................................................... ...................................................................
.........................................................................................
(c)IEBC receives poll results from the polling centers direct to their
headquarters
digitally using Wireless networks. Give any THREE reasons for preference of
wireless communication. (3 marks)
..............................................................................................................................................
.............. ...............................................................................................................................
............................. ................................................................................................................
............................................ .................................................................................................
........................................................... ..................................................................................
.......................................................................... ...................................................................
......................................................................................... ....................................................
........................................................................................................ .....................................
.......................................................................................................................
©KNEC 2024 [Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
(d)Suggest any TWO ways in which they can ensure security of this data during
transmission. (2 marks)
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
..............................................................................................................................................
..............
©KNEC 2024 [Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
NAME:……………………………………………………… STREAM………………..…
SCHOOL…………………………………………………….. SIGNATURE……………..
INSTRUCTIONS TO CANDIDATES
✓Type your name and index number at the top right hand corner of each printout.
✓ Write the name and version of the software used for each question attempted in the
answer sheet.
✓Passwords should NOT be used while saving in the CD.
✓Answer all questions
✓All questions carry equal marks
The methodology area can justly be described as a jungle. Firstly there appears to exist
many hundreds of the system development methodologies. Longworth (1985) in a recent
study identified over 300. If all these are different, then it is no wonder that there is so much
confusion. However, it may be that the differences are trivial and are made solely to
differentiate methodologies in the market place
WHA T I S A METHODOLOGY?
There is very little agreement as to what it means other than at a general level. The term
is usually used very loosely and yet it is used very extensively.
This loose use does not mean that there are no definitions, simply that there are no
universally agreed definitions. At the general level, it is regarded as a recommended series
of steps and procedures to be followed in the course and developing an information system.
In a brief adhoc survey, this proves to be about the maximum that people will agree to and
of course such a definition raise many more questions than it answers.
For example:
The questions that arise are fundamental as well as numerous. Unfortunately the most that
can be achieved is to air the issues. The information system community is in the process of
debating the meaning of the term methodology in an information system context, and it may
one day have a universal definition. However, it may be more realistic to assume that this will
never be achieved. An information system's methodology has been defined as a
recommended collection of philosophies, phase, procedures, rules, techniques, tools,
documentation, management and training for developers of information systems.(Madison
1983). According to this definition, a methodology has a number of components.
Which specify:
In addition, the methodology is supposed to specify how the project is to be managed and
controlled and support the training needs of the users of the methodology. This is all
encompassed in a view or philosophy concerning the important and critical aspects of
information systems development.
Required:
b)Remove the underline from all the underlined and change the text to bold and italics. Apply
hanging ident to the first two paragraphs. Save the document as EXERCISE 2. (6marks)
c) Select the text starting from the words "For example:…….information systems
development" (at the end
of the passage) and move it to a new page and save as EXERCISE 3. (5 marks) d)
(i) Retrieve EXERCISE document and convert it to two columns of the same width and
height and justify them.
(6marks) (ii)
Double space the first paragraph of the passage and fit the entire passage into one
page(4marks)
©KNEC [Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
(iii) Insert your name into the passage as a footer so as to appear as © your name. Save the
document as EXERCISE 4. (5marks)
2.Table 1, table 2 and table 3 are extracts of records, kept in a carpentry shop. Use the
information to
answer the questions that follow;
Carpenter Table Customer Table
CAPENTER CUSTOMER CUSTOMER
CAPENTER _ID NAME _ID NAME
CAP_001 JAMES CUST_01 MARY K.
CAP_002 JOHN CUST_02 DIANA K.
CAP_003 ALEX CUST_03 ALEX N.
CAP_004 ISAAC CUST_04 MARTHA K.
CAP_005 MAURICE CUST_05 SARAH W.
CUST_06 JOHNSON G.
Order Table
CARPENTER CUSTOMER ORDER ITEM ORDERED MONTH AMOUNT
_ID _ID _NO
CAP_001 CUST _01 1721 Bench January 18,000
CAP_002 CUST _02 1722 Coffee table January 25,000
CAP_003 CUST _03 1723 Office table January 10,000
CAP_004 CUST _04 1724 Single bed January 18,000
CAP_005 CUST _05 1725 Arm chair January 60,000
CAP_001 CUST _01 1726 Double bed February 75,000
CAP_002 CUST _04 1727 Dining table February 85,000
CAP_004 CUST _03 1728 Arm chair February 60,000
CAP_001 CUST _02 1729 Double decker February 72,000
bed
CAP_002 CUST _06 1730 Kitchen table February 82,000
SCHOOL…………………………………………………….. SIGNATURE……………..
A B C D
A ……………………………………………………………
B …………………………………………………………..
C ……………………………………………………………
D …………………………………………………………..
15.State any two features of a user friendly program (2mks)
…………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………..
SECTION B (60 MARKS)
Answer question 16 and any other three questions from this section
16.a) State three qualities of a good psecudocode? (3mks)
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………… b) i)
State the 3 translators used in programming (3mks)
c) Draw a flowchart that was used to come up with the following pseud code (7mks)
Start
N=0
X=0
While n < 3
Repeat
X=X+1
While x < 2
N = N +1
End while
Stop
18.a) Human activity systems are said to be soft systems. Give therereasons why they are said to
be so (3mks)
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………… b)
What are hard information systems (2mks)
Using the above worksheet write the following formula to calculate the values in cells labeled (4mks)
………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
SCHOOL…………………………………………………….. SIGNATURE……………..
INSTRUCTIONS TO CANDIDATES
✓Type your name and index number at the top right hand corner of each printout.
✓ Write the name and version of the software used for each question attempted in
the answer
sheet.
✓Passwords should NOT be used while saving in the CD.
✓Answer all questions
✓All questions carry equal marks
a)Enter the data in all bordered worksheet and auto fit all column. Save the workbook as mark 1
(15mks) b)Find the total marks for each subject (3mks)
c)Find total for each subject per stream using a function (5mks)
d)Find mean mark for each student using a function (5mks)
e)Rank mean student in descending order using the mean (5mks)
f)Create a well labeled column chart on a different sheet to show the mean mark of every student.
Save the workbook as mark 2. (7mks)
g)Using mark1, use subtotals to find the average mark for each subject per stream. Save the workbook
as mark 3 (7mks)
h)Print mark 1,mark 2 and the chart
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
•Answer ALL questions in section A and Question 16 plus THREE other questions in
section B..
TOTAL 100
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………
7. Arithmetic and logic unit and the main memory use electrical
pathways called buses. Describe any two of these buses. 2 Marks
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………………………………
(ii) Gradient
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………
(iii) Cropping
(b) Define a foreign key and list any two kinds of relationships
in tables 3 Marks
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………
…………………………………………………………………….…
YES
YES
NO
STOP
State the output of the above program flowchart for the inputs (4 Marks)
given below Amount = 15,000, 14,000 and 23,000 respectively
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
…………………………………………………………
Disadvantage
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………
e.Information is the most valuable asset of an organization that needs to
be safe guarded. State any three measures to be considered in
maintaining data integrity.
(3 Marks)
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………
f.As Jayden was entering data into the computer, He typed byocott
instead of boycott.
i. Identify the type of error made by Jayden (1 Mark)
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………
SCHOOL…………………………………………………….. SIGNATURE……………..
451/2
COMPUTER STUDIES
Paper 2
Time: 21/2 Hours
INSTRUCTIONS TO CANDIDATES
✓ Type your name and index number at the top right
hand
corner of each printout.
✓ Write the name and version of the software used for each question attempted in
the answer
sheet.
✓Passwords should NOT be used while saving in the CD.
✓Answer all questions
✓All questions carry equal marks
<NAME>, <ADMNO>
<ADDRESS>
<TOWN> DEAR<NAME>
REF:2008 KCPE RESULTS
I am happy to inform you that the NOV-DEC. Examinations are out. Kindly arrange to
visit our school on<Date to visit>at 9.00 am in order to know the details. Remember
to carry your original KCPE certificate and examination registration card–bearing the
index number.
Yours truly,
Headteacher
Data source (List of candidates)
Required
(i). Save Main document as Main Doc (1 mk)
(ii). Save Data source as Data source (1 mk)
(iii). Change the addresses and reference font size to 14 pt (1½mks)
Required
(i)Align the title to the center and underline it (1 mk)
(vi) Insert word Art ‘’COMPUTER’’ and set it to appear behind the text. (5 mks)
(vii) Search for words ‘’Computer’’ and replace all with ‘’PC’’ (2mks)
(viii) Move paragraph with the heading ‘’how a computer operates’’ to the
end of the
document (2 mks)
(ix) Set the font style of the document to Arial black (3 mks)
SCHOOL…………………………………………………….. SIGNATURE……………..
Instructions to Candidates
•Write your name, class and admission number in the spaces
provided.
•This paper consists of two sections.
•Answer ALL questions in section A and Question 16 plus THREE other questions in section
B.. •All answers MUST be written in the spaces provided on this question paper.
TOTAL 100
10. (a) Name FOUR approaches that may be used to replace a Computerized
Information system. (2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………… (b)
Which of the approaches named in (a) above is appropriate for critical systems? Explain.
(2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………… 11.
Terry intends to download a movie from the Internet. State the two factors that may
determine the
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(b) What query expressions would the lecturer use to list the students whose age is
above 15 years and below 25 years? (2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………… 13.
a) Explain each of the following roles performed by an operating system
i. Memory management ( 2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
ii. Interrupt handling ( 2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
14. A computer teacher has put a rule that flash disk should not be used in the
computer laboratory (a) Give
a reason for the rule (1 mark)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
c) Perform the following binary arithmetic 11001.101+1110.011 (2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………… d)
Define the following terms. (3 marks)
i) Record
……………………………………………………………………………………………………………
ii) File
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………… iii)
Database
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
e) List any FOUR ways of dealing with a virus on a computer. (4 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………… 18.
a) Explain the functions performed by (2 marks)
i) The control unit-
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………… ii)
Arithmetic and logic unit (ALU)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………… b)
Define the following terms in relation to computer software . (3 marks)
ii) Proprietary
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………………
iii) Open source
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………………………………………………… c) i)
Define the term E-commerce (2marks)
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………………………………………………… ii)
List down TWO advantages of e- commerce as used in modern business environment
(2marks)
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………………………………………………… d)
Describe THREE ways how computing has been applied to each of the following areas:
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(b) Using a Diagram, describe the following signals and state where each is applied in
network communication:
(i) Analog; (2
marks)
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
SCHOOL…………………………………………………….. SIGNATURE……………..
INSTRUCTIONS TO CANDIDATES
✓Type your name and index number at the top right hand corner of each printout.
✓ Write the name and version of the software used for each question attempted in the
answer sheet.
✓Passwords should NOT be used while saving in the CD.
✓Answer all questions
✓All questions carry equal marks
Kenya has embraced a Competency Based Curriculum (CBC) to increase skills development
and instill values in the learner. Parental empowerment and engagement in the learning
process is
essential to the learner’s growth and development. As a parent, you are the first educator,
trainer
and source of authority for your child. The purpose of this brochure, therefore, is to give you
more information about CBC and your role in the learning process of your child.
WHAT IS COMPETENCY BASED CURRICULUM?
This is a process that gives learners an opportunity to be actively involved in learning. It
facilitates
identification and development of learner’s unique talents and abilities through different
career
pathways after grade 9. CBC assists learners acquire, nurture and apply values in day to
day living
WHY THE CHANGE FROM 8-4-4 CURRICULUM TO CBC?
The Competency Based Curriculum was rolled out nationally in January 2019 in Early
Years Education. The difference between 8.4.4 and CBC;
From 8-4-4 To CBC
Focuses on teaching Focuses on practical learning
Focuses on memorization of content Focuses on application of knowledge
Focuses on academic achievement Focuses not only on academic achievement but also
on skills development and nurturing of values
Focuses on examination and results Focuses on what the learner is expected to achieve
and provision of feedback on the learner’s progress
Focuses on competition Focuses on collaboration
Not all learners transited to the next Facilitates smooth transition for all learners
level
©KNEC [Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
Less emphasis on talent and career More emphasis on talent identification and career
progression development
Less parental engagement in More parental empowerment and engagement
learning
Required
i) CBC (2 marks)
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
•Write your name, class and admission number in the spaces
provided.
•This paper consists of two sections.
•Answer ALL questions in section A and Question 16 plus THREE other questions in section
B.. •All answers MUST be written in the spaces provided on this question paper.
TOTAL 100
4. State two reasons why twos complement is the preferred method of representing
negative numbers as opposed to other methods. (2mks)
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………………………
5(a) The development of computers can be traced to the time when historical non-
electronic computing devices were invented like abacus. Name four other computing
devices. (2mks)
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………………………
9. A flash disk has become a popular storage media. However, it has certain limitations.
Highlight three
such limitations. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
10. Give the importance of including foot notes in a word document. (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
11. State two advantages of flat panel monitors over cathode ray tube monitors. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
14. State one importance of each of the following Microsoft excel features.
(i) Cell pointer (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
15. Match the following functions with appropriate communication device. (4mks)
FUNCTION DEVICE
(i) Provides physical link between
the computer and the transmission
media.
(b) Study the following flowchart and use it to answer the questions that follow.
(i) State the type of control structure represented by the flowchart. (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
……………………………………………………………………………………………
(iii) Write a pseudocode that would achieve the same purpose as the flowchart. (5mks)
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
……………………………………………………………………………………
………………………………………………………………………………………………………………
17(a) A school organizes it’s work in directories. The directory WP contains the files CATs,
EXAMS
and ASSIGNMENTS. The directory DB contains the database files. The directory PROG is
contained in
(b) Write the path for tracing the contents of sub directory DB. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(d) Give two reasons for storing files in directories and subdirectories. (2mks)
………………………………………………………………………………………………………………
18. Using twos compliment perform the following binary operation in 8-bit
(a) notation
710 -2310 (6mks)
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
……………………………………………………………………………………………
………………………………………………………………………………………………………………
C(i) Name three public universities in Kenya where one can further computer studies
course. (3mks)
(ii) Name two computer hardware related courses offered in Kenyan universities. (2mks)
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………………………
19(a) Computer networks are faced with numerous security threats. Explain two methods
of enforcing security in a computer network. (4mks)
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) State three differences between bus topology and star topology. (3mks)
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………………………
(c) Staff training is one of the areas that need to be addressed during system
implementation. Highlight three reasons why this is necessary. (3mks)
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
(d) Give two circumstances where straight change over strategy can be used
during system implementation. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(e) Differentiate between distributed processing and interactive processing modes giving
an application area of each. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
20. A data entry clerk experienced the following errors during typing;
(i) After every calculation the result was less than the expected number of digits. E.g
(i) 345.7896543 was given as 345.789.
(ii) 1287357 was typed as 12873S7
(a) Identify the error in each case. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) State two ways the clerk would have prevented such errors. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Write a function to be entered in cell C2 to display the entries from the largest to the
smallest. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
SCHOOL…………………………………………………….. SIGNATURE……………..
451/2
COMPUTER STUDIES
Paper 2
Time: 21/2 Hours
INSTRUCTIONS TO CANDIDATES
✓Type your name and index number at the top right hand corner of each printout.
✓ Write the name and version of the software used for each question attempted in the
answer sheet.
✓Passwords should NOT be used while saving in the CD.
✓Answer all questions
✓All questions carry equal marks
(a)(i) Enter the data as it appears in a spreadsheet. And save it as MSouth (13mks)
A B C D E F G H I
(ii) Insert two blank rows at the top of the worksheet. (1 mark)
(iii) Enter the following title and subtitle in the blank rows respectively; JOB
RECUIRTMENT FILE and APPLICANTS DETAILS Respectively. (3marks)
(iv) Centre the title and subtitle across the columns that contain (2marks)
data.Using functions, compute:
(i) The mean for each Applicant and format it to 2 decimal places. (3marks)
(ii) The position of each Applicant. (3marks)
(i)The highest and lowest score for Abdi Hussein, enter the answers in L3 and M3
respectively
(3marks) (b)The teacher wishes to analyze the applicants’ data in order to find
those applicants who qualify for
recruitment. Successful candidates MUST meet the following minimum requirements;
i.Must have scored a mean of 40 marks and above;
ii.Must have scored 60 marks and above in Computer;
iii.Must have scored 50 marks and above in Mathematics.
Use the above criteria to remark If the applicants qualifies, the function should
display ‘Successful’. Otherwise it should display ‘Unsuccessful’.
(5marks)
(12mks) iii) For each of the tables, chose the most appropriate key field. (4mks)
iv) Insert input mask for the phone number field such that the numbers are displayed
as 0722-345-671. (2mks)
v) Create one to many relationship. (4mks)
b) i) Create a data input screen for each table for inputting the data in the table
above. Ensure that the name and title of the screen are appropriate. (4mks)
ii) Use the screens created to enter the records in the table above into the
appropriate tables.
(8mks)
c)Create a query to extract all customers whose names end with letter “a”. Save the
query as “END
WITH”. (4mks)
d)Generate a tabular grouped report showing the total and average of the payments in
the payment table.
Grouping should be done on the customer’s name (5mks)
©KNEC[Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
e)Print the two tables and the report.
(3mks)
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
•Write your name, class and admission number in the spaces
provided.
•This paper consists of two sections.
•Answer ALL questions in section A and Question 16 plus THREE other questions in section
B.. •All answers MUST be written in the spaces provided on this question paper.
A 1 - 15 40
16 15
18 15
19 15
20 15
TOTAL 100
ii.Thesaurus
iii.Macros:
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________ 10.Explain the following
spreadsheet concepts:
i.Automatic Recalculation. (1 mark)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________ ii.What if
analysis (1 mark)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________ 11.Suggest two
advantages of using presentation graphics software over the traditional
chalk-and-talk approach in a school environment (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
SECTION B
Answer question 16 (compulsory) and any other three questions from this section 16.(a)(i)
State and describe three types of error can occur in programming: (3 Marks)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (ii) When is
a programming language considered structured? (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (c)(i)
Give one advantage of compliers over interpreters (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (ii)Give one
advantage of interpreters over compliers (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (iii) Explain
briefly why the source codes must be translated again if the programmer wants to use the
program on a computer with a different platform. (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
17.(a) (i) With the aid of examples, explain number complements in the Binary number systems (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii) Outline the benefits of using binary number complementation in computers. (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(b) (i) Why is binary number system best suited for use in computers? (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii) Convert the following base two number into base ten. (2 marks)
11.01
DEF=
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (c)
(i)Distinguish between data validation and data verification. (1 mark)
______________________________________________________________________________
________________________________________________________________________
__________________________________________________________________
________________________________________________________________________ (ii)Give two
examples of data verification techniques. (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
iii. Range Check (1 mark)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
iv. Control Total Check (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ 19. (a) (i)
Explain the term search engine (1 mark)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________
(ii) Peter and Mary use the same keyword to search for information. Suggest two reasons
why their search results may vary. (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(iii)State one disadvantage of using an e-mail account provided by the Internet service
provider (ISP). (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (b) (i)
Explain the term URL (1 mark)
______________________________________________________________________________
__________________________________________________________________ (ii) For the URL
http://www.csklsc.net/pe/calendar.htm,
http stands for (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (ii)Explain
the following types of communication protocol
Ethernet (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (iii)Give
Two examples of wireless-based communications channels. (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(b). Describe Two techniques used by the systems analyst in requirements elicitation. (2 Marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________ (c)What is
a requirements specification and what does it contain? (5 Marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
SCHOOL…………………………………………………….. SIGNATURE……………..
451/2
COMPUTER STUDIES
Paper 2
Time: 21/2 Hours
INSTRUCTIONS TO CANDIDATES
✓Type your name and index number at the top right hand corner of each printout.
✓ Write the name and version of the software used for each question attempted in the
answer sheet.
✓Passwords should NOT be used while saving in the CD.
✓Answer all questions
✓All questions carry equal marks
Figure 1
(d) Using cell addresses only, compute the administrative cost for each quarter
given that the cost is a percentage of total revenue and the percentage rate is in
cell B18.
(3 marks)
(e) Apply thick outside borders and regular inside borders to cells in the
range A3:G18
(f) (i)Copy all the contents of the current worksheet to a new (2marks)
worksheet.
(ii)Rename the old worksheet as original and the new worksheet as formatted
(2 marks)
(g) (i) Change the page layout orientation of the formatted worksheet to landscape
and the
page size scaled to 80%. (2 marks)
(ii) Enter the values 2, 3, 4 and 5 in the cell range B20: B23 respectively
representing
the hotel star category ratings. (1 mark)
(iii) Using a function and cell references:
II compute the total revenue for each hotel category in the 1st quarter
using
reference values in the range B20: B23 in cells C20: C23. (5
marks)
(iv)Sort the revenues from the hotels in descending order of hotels. (2 marks)
(h) (i) Create a column chart that compares the revenues of the hotels in star
the 1st and 2nd quarter. (4 marks)
(i) Save the changes and print later each of the following:
(i) original worksheet showing the column and row headings; (2 marks)
(ii)formatted worksheet; (l mark)
(a) (i) Open a desktop publishing program and set the page layout orientation
to portrait and and
paper size to A4. (2 marks)
(b) Create the city plan as it appears in Figure 2 ensuring that the design covers
the entire printable
area of the page. (46
marks)
(c) Save the changes and print the publication later. (l mark)
142
POPO CITY PLAN
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
•Write your name, class and admission number in the spaces
provided.
•This paper consists of two sections.
•Answer ALL questions in section A and Question 16 plus THREE other questions in section
B.. •All answers MUST be written in the spaces provided on this question paper.
12. i) Indicate the type of cell reference depicted by the following. (3Marks)
a) $H$5
............................................................................................................................................
............ b) H$5
............................................................................................................................................
............ c) H5
........................................................................................................................................................
ii) Give three uses of spreadsheets in a government office concerned with carrying
out national census
(3Marks) .....................................................................................................................................
...................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
13. The Chairman IEBC has called upon a System Analyst to implement an electronic voting
system. He
intends to use voter’s fingerprints, Identity cards and voter’s cards as security measures
to ensure free
and fair elections. Recommend with reasons four input devices that they should use/buy.
(4Marks) .....................................................................................................................................
...................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
....................................................................................................................................................
.... 14. State
any four security control measures that can be taken to detect and protect computer systems
against computer crimes.
(2Marks)
....................................................................................................................................................
....
........................................................................................................................................................
........................................................................................................................................................
..........................................................................................................................................
.............. ...........................................................................................................................
............................. ............................................................................................................
............................................ .............................................................................................
........................................................... ..............................................................................
..........................................................................
c) Give the name and use of the flowchart symbol below. (1Mark)
A
A
i) Name
ii) Use
............................................................................................................................................
............ ...............................................................................................................................
.........................
©KNEC[Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
(d) State any two functions of programming language translators (1
mark)
..........................................................................................................................................
.............. ...........................................................................................................................
............................. ............................................................................................................
............................................ .............................................................................................
...........................................................
e) Draw a flowchart that can be used to create a program which accept a numerical
pin, if the pin is equal to 0721, the program outputs , correct pin and asks for
personal pin, if the pin is 1737, the output is “Admitted to UON,” 1738, the output is
“Admitted to MARKU”, 1739 the output is “Admitted to KEMU” after outputting the
secret message the program stops.
(7 Marks)
REVIEW 7
IMPLEMENTATION 6
CONSTRUCTION 5
DESIGN 4
REQUIREMENT
SPECIFICATION 3
INFORMATION
GATHERING
2
PROBLEM
RECOGNITION 1
i) List any four methods that can be used to achieve the second stage in above.
(2Marks) .....................................................................................................................................
................... ................................................................................................................................
........................ ...........................................................................................................................
............................. ......................................................................................................................
.................................. ii) List
any four areas that have to be designed at the fourth stage.
(4Marks) .....................................................................................................................................
................... ................................................................................................................................
........................ ...........................................................................................................................
............................. ......................................................................................................................
.................................. .................................................................................................................
....................................... iii) Give
one likely consequence of a project that does not stick to its schedule
(2Marks) .....................................................................................................................................
................... ................................................................................................................................
........................
©KNEC[Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
............................................................................................................................................
............ ...............................................................................................................................
.........................
b) Explain the meaning of the following system characteristics. (4Marks)
i) Entropy
............................................................................................................................................
............
........................................................................................................................................................
ii) Controls
............................................................................................................................................
............
....................................................................................................................................................
.... c) State the three functions of an information system.
(3Marks) .....................................................................................................................................
...................
........................................................................................................................................................
........................................................................................................................................................
18. (a) Distinguish between the following pairs of word processing terms
i) A widow and an orphan (2
marks) ........................................................................................................................................
................ ...................................................................................................................................
..................... ..............................................................................................................................
.......................... .........................................................................................................................
............................... ii)
Footnote and end notes (2
marks) ........................................................................................................................................
................ ...................................................................................................................................
..................... ..............................................................................................................................
.......................... .........................................................................................................................
...............................
b) Study the Microsoft Word table below and answer question which follow
Item Quantity Price(sh) Total
Bread 2 33.0 66.0
Milk(litres) 4 30.0
Potatoes 1 75.0
Others Cooking fat(kg) 1 180.0 A
Salt(250 g) 1 15.0 15.0
Total B
©KNEC[Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
i) Supply a formula or function in Cell with letter A to calculate the total amount
spent on 1 kg of
cooking fat (2
marks) ........................................................................................................................................
................ ...................................................................................................................................
..................... ii) Supply
a formula or function in cell with letter B to calculate total expenditure on all items
(2
marks) ........................................................................................................................................
................ ...................................................................................................................................
..................... (c) The
following is a spreadsheet relating to a farmer.
A B C
1 Crop Amount
2 Maize 150
3 Bean 300
4 Cashew nuts 850
5 Cabbages 1036
A function =IF (B2<200, “Not Viable”), IF (B2>300, “Moderate”), IF (B2>1000, “Viable”))).
Give the appropriate result returned in cells C2, C3, C4 and C5
(2Marks) ..........................................................................................................................................
.................... .....................................................................................................................................
.........................
d) Define the terms as used in databases (3Marks)
i) Attribute
............................................................................................................................................
............ ...............................................................................................................................
.........................
ii) Relationship
............................................................................................................................................
............ ...............................................................................................................................
......................... ..................................................................................................................
...................................... .....................................................................................................
...................................................
iii) Dynaset
............................................................................................................................................
............ ...............................................................................................................................
......................... ..................................................................................................................
......................................
©KNEC[Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
........................................................................................................................................................
e) List any four database models. (2marks)
..........................................................................................................................................
.............. ...........................................................................................................................
............................. ............................................................................................................
............................................
(3Marks) .....................................................................................................................................
................... ................................................................................................................................
........................ ...........................................................................................................................
............................. ......................................................................................................................
..................................
b) State two functions of Hubs. (2Marks)
........................................................................................................................................................
........................................................................................................................................................
..................................................................................................................................................
...... c) Explain two different ways in which computers can enhance
communication in Kenya today.
(4Marks) .....................................................................................................................................
...................
........................................................................................................................................................
........................................................................................................................................................
....................................................................................................................................................
.... d) State and explain how the benefits of technology were not effectively used during
the 2007 general
elections.
(3Marks) .....................................................................................................................................
...................
........................................................................................................................................................
SCHOOL…………………………………………………….. SIGNATURE……………..
451/2
COMPUTER STUDIES
Paper 2
Time: 21/2 Hours
INSTRUCTIONS TO CANDIDATES
✓Type your name and index number at the top right hand corner of each printout.
✓ Write the name and version of the software used for each question attempted in
the answer sheet.
✓Passwords should NOT be used while saving in the CD.
✓Answer all questions
✓All questions carry equal marks
(a) Add the following two students before victor and enter the following
information: (3marks
)
Name: Thomas, John
McCullum.
Exam 1: 82 65
Exam 2: 75 79
Exam 3: 81 84
Paper: 87 92
(b) Copy the data in the worksheet grade and paste it in worksheet 2 and save as
Rank.
(2marks) (c) Calculate the final average for each student. The three exams should
each count 25% of the final
average, the paper should count for 15%, and participation should count for the
remarining 10%. (5marks)
(d). Calculate the class average for each exam. (3marks)
(e) Apply one decimal point to the average point (2marks)
(f) Rank the students based on average points (3marks)
(f) Sort the students based on rank after average in ascending order (2marks)
(g) Create a column after rank and name it Grade. Using IF function, grade the
students based on the following criteria. (A=90-100; B=80-89; C=70-79; D=60-69;
F=below 60) (6marks)
Field
Field Name Data Type Size/Forma
Student Id Auto number Long integer
Name Text 20
Surnam Text 20
e Date
of Date/time short Date
Birth
Age Number long integer
Exam Fee Currency Currency
b) Choose the most appropriate primary key and save the table as Students’ Details.
(2marks)
(c) Create a validation rule for the Age field which does not allow students under the
age of 16 to
apply for exams. Create a validation text to complement the validation rule stating
“Student is too
young”.
(2marks) (d) Add the following field below surname (2marks)
Town Text 15
(ii) Create a validation rule on the Results field so that marks greater than 100 would
not be allowed
to be keyed in. Create a validation text to complement the validation rule stating
“Mark is greater
than 100”. (3marks)
f. Re-order the subject field with the result field so that the subject field is now after the
Student Id field.
(2marks)
g. (i) create a student details form to Input the following data in the Students’ Details
table(5marks) Date of
Exam
student id Name Surname Town Birth Age Fee
1 John Black Mosta 16/07/1981 29 25
2 Mary Smith Qrendi 16/05/1982 28 30
3 Anne Hamlet Mosta 18/07/1983 27 40
©KNEC[Contact 0724333200 for Marking Schemes or Order online at
www.kenyaeducators.co.ke]
(ii) Create a student’s marks form used to Input the following data in the
Students’ Marks
table (5
(h). Create a one-to-many relationship between the Students’ Details table and the
Students’ Marks. Enforce referential integrity to the relationship.
(3marks)
(i). Open the Students’ Details table, change the Surname Hamlet to Hammell
(2marks)
(j) Sort the data in the Students’ Details table in alphabetical order according to
Surname. (2marks)
(k) Create a query based on the Students Details table showing all the information
about those students who live at Mosta. Save it as Locality.
(2marks)
(l) Create a two-table query based on Students’ Details and Students’ Marks using the
Student Id, Name and Surname fields from the Students Details table and the Subject
and Result fields from the Students Marks table. The query must display those
students who got a result of 75 marks or more. Save the query as High Achievers
(4marks)
(n) Create a report called Results. Use the following fields: Student Id, Name, Surname,
Subject and Result fields. Calculate the sum and average of each record. In the header
of the report, include the title Results. (5marks)