admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

The following are software classified according to the end user licence agreement. Briefly describe each of them:

open source software, freeware, shareware, and proprietary software

Open source : refers to software provided freely with its source code. The user can modify and redistribute the software.

Freeware: these are software that can be downloaded for free and distributed, buta  the source code is hidden and cannot be altered.

Shareware: is software that is available for free within a given trial period, after which it must be bought.

Proprietary: software made for commercial purposes. The source code is hidden, and it can only be used after paying for a licence.

 

  1. (a)State the meaning of the term disk defragmentation as used in computers  (1mk)

  • The process of rewriting parts of a file to contiguous sectors on a disk

Describe what is meant by shareware.

 the trial version of software for a limited time/number of uses with limited features  free of charge

If a full version is required need to pay a fee/sign up

When the trial is over user is asked to pay/sign up

Protected by copyright

Type of software licence
 

Distinguish between one to one and one to many relationships as used in relational databases

One to one  - Each record in the parent table has exactly one related record in the child table, and vice versa.

One to Many -  Each record in the parent table can have multiple related records in the child table, but each record in the child table is related to only one record in the parent table

Give one reason why use of video-conferencing has increased over the last ten years.

– faster communications now widely available
– safety reasons, e.g. increase in terrorist attacks on international flights
– reduced transportation/accommodation/hardware costs
– environmental issues, e.g. reduced carbon footprint
– increase in multinational working

There are many different types of errors that can occur when developing computer programs. (a) State the name of the two different types of programming error described below.

(i) Unexpectedly halts the program.

(ii) The program produces the wrong output. 
 (b) Another error can result from incorrectly using the rules or grammar of the programming language.

(i) Name this error. 

(ii) State when this error is detected.

 

(i) Unexpectedly halts the program. Run time (execution)

(ii) The program produces the wrong output.  Logical
 (b) Another error can result from incorrectly using the rules or grammar of the programming language.

(i) Name this error. Syntax

(ii) State when this error is detected.

Syntax error is detected during translation into executable code / attempted to run but fails

Explain what happens in the computer during the booting process

The booting process is the sequence of events that occur when a computer is turned on or restarted. It involves a series of steps that allow the computer's operating system to initialize and become functional. Here's a simplified explanation of what happens during the booting process:

  1. Power-On Self-Test (POST): When the computer is powered on, the first thing it does is perform a Power-On Self-Test. During this step, the computer's hardware components, such as the CPU, memory, and storage devices, are checked for proper functioning. The POST verifies that all essential hardware components are present and operational.

  2. Bootloader: Once the POST is completed, the computer looks for the bootloader. The bootloader is a small program stored in the computer's firmware or on the bootable device (such as the hard drive or a USB drive). It is responsible for loading the operating system.

  3. Loading the Operating System: The bootloader locates the operating system's files and initiates the loading process. It may display a boot menu allowing the user to choose the operating system if multiple options are available. The selected operating system's core files are loaded into the computer's memory.

  4. Kernel Initialization: The operating system's kernel, which is the central component responsible for managing system resources, is initialized. The kernel sets up essential components such as device drivers, memory management, and process management.

  5. System Initialization: After the kernel is initialized, the operating system proceeds with system initialization. During this stage, various system services and processes are started, and hardware devices are initialized and configured. The operating system loads essential system files and prepares the environment for user interaction.

  6. Login/Graphical Interface: Once the system initialization is complete, the user is presented with a login prompt or a graphical user interface (GUI). The user can then log in with their credentials or interact with the GUI to access the computer's functionalities.

Give two advantages of using broadband rather than dial-up

  • an use Internet connection and telephone at the same time
  • much faster data transfer speed
  • always “on”
  • charged for number of bytes/flat rate per month rather than actual time on line
  • more bandwidth

What is entity integrity?

  • It ensures that each row has a unique and non-null primary key

Explain why a developer, who is good at both low-level and high-level programming, would normally use high-level languages when writing programs.

  • High-level languages have built-in functions;
  • High-level languages have built-in libraries;
  • High-level languages have more support/help;
  • High-level languages have structures (such as selection and iteration);
  • High-level languages can be less machine-dependent/more portable;
  • It (usually) requires fewer lines of code to be written;
  • It is (usually) quicker to develop code in high-level languages;
  • It is easier to find mistakes in code;
  • The code is easier to maintain//understand;
  • It is easier to structure code in high-level languages;

KCSE 2002 COMPUTER STUDIES PAPER 1

SECTION A (40 MARKS)

1.Describe the purpose of each of the following computer functional units:    (2mks)

    a) Control

    b) Storage

2.Explain how each of the following would affect the suitability of a room for use as a computer room: (2mks)

a) Burglar proofed door

b)Availability of taps and sinks in the room

3.State three data representation codes used in computers       (3mks)

4.State two types of documentation in program development and give the purpose of each.     (4mks)

5.Suppose a 5 element array A contains the values 9, 12, 17, 7 and 20.  Find the value in A after executing the loop below:

            Repeat for k = 1 to 4

            Set A [k +1]: = A [k]

                        [End of loop]            (3mks)

6.State any three activities that occur in a program compilation process  (3mks)

7.The formula = k20 + P$ 18 was typed in cell L21 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24.(2mks)

8.State two ways in which a computer may be used in the efficient running of a hospital (2mks)

9.List three disadvantages of using the traditional file management method          (3mks)

10.Give one disadvantage of a single processor multi-user system    (1mk)

11. List three differences between a micro-computer and a super-computer.         (3mks)

12.State and explain two reasons why word processing is one of the most common applications of many computer users.   (2mks)

13. write- 1 in twos complement notation in byte form                                        (4mks)

14.Explain the following input/output terms as used in computer systems. Give an example for each        (4mks)

  a) Read

  b) Write

15.State two disadvantages of networking.

SECTION B (60 MKS)

Answer question 16 and any other three questions from this section.

16.The following flowchart can be used to list the odd numbers between 0 and 100

 

 

a)Write a program segment for the flowchart using a high level language.  (7mks)

b)What would be the output from the flowchart if the statement in the decision box is changed to:  (3 mks)

i)          Odd = 100

ii)         Odd< 100

iii)        Odd> 100

c)  Modify the flowchart so that it prints only the sum of the odd number between 0 and 100  (5mks)

17.a)  List five precautions that can be taken to protect data stored in diskettes   (5mks)

b)State and explain two precautions that can be taken to help recover data lost through accidental erasure. (4mks)

   c) Describe each of the following data processing methods:    (6mks)

   i) Batch processing

   ii) Distributed processing

   iii) Multiprogramming

18. a)  i)  What is a computer keyboard?      (1 mk)

           ii)  ist four types of keys found on a computer keyboard.  Give an example of each(4mks)

     b) Give four differences between present day’s computers and the older generation of computers   (4mks)

     c)   i) State three advantages and one disadvantage of using a laser printer.  (4mks)

           ii) Distinguish between a line printer and a page printer             (2mks)

19  a) Identity three public Universities and three National Polytechnics in Kenya where further computer training is offered. In case, state the highest level of qualification that can be acquired in computer training. (6 mks)

b) Distinguish between “Job replacement” and “Job displacement” in reference to computerization.  (2mks)

c) Give four reasons why a firm may decide to computerize its operations.   (4mks)

d) An individual has a right to demand a guarantee of privacy of personal information stored on a computer.Give three such types of information.  (3mks)

20. a)  Give three comparisons of the traditional file management method of typing a document on a typewriter against using a word processor.     (6mks)

      b)  i) Define the term spreadsheet (1 mk)

            ii) Give two examples of spreadsheet packages available in the market today        (2mks)

      c) Explain the following terms as used in a spreadsheet:

             i)  What if …analysis         (2 mks)

             ii) Cell                (1 mk)

             iii) Formula  (1mk)

             iv)  Pie chart                                                                      (2 mks)

Explain why it is beneficial to get more RAM instead of relying on virtual memory.

  • More RAM will improve the performance of the computer 
  • More RAM will speed up the access to data
  • Excessive use of VM can cause disk thrashing which decreases performance
  • VM is slower to access than RAM direct (because it has to go back to RAM first)
  • Moving data between RAM and VM takes processor time

Your friend wishes to install a wireless network in his office. Explain to him the difference between guided and unguided media

  • Guided media uses cables to connect to computers whereas unguided media uses waves.

Why must operating system be installed in a computer before any other program

  1. Operating system manages the computer hardware thus without it the programs cannot communicate directly to the hardware
  2. Provide a user interface through which a user can give instructions to the computer. Without a user interface, it would be difficult to load or run programs
  3. other programs depend on the operating system to load them into the memory , allocate resources and schedule processor time, Without operating , there would be nothing to co-ordinate the execution of multiples programs
  4. The OS organizes data in files and directories, making it possible for programs to save, retrieve, and modify data.
  5. Without it, programs wouldn’t know where or how to store data.
  6. The OS controls access to files, memory, and devices, ensuring that one program doesn’t interfere with another.


List two primary functions of a domain name server.

  •  map IP addresses to names and criteria
  • To map directory services
  • Maintain directory of domain names
  • To map URL (web address) to IP address

Describe the main characteristics that distinguish high-level programming languages from low-level languages.

  1. Low level languages do not resemble natural languages they are made up entirely of bit patterns
  2. Low level languages produce code that is executed faster as it is already in a format the CPU can execute / does not need to be translated.
  3. High level languages are easier to understand / learn as commands are more like English / identifiers can be meaningful .
  4. High level languages are easier to use leading to fewer errors.

Describe what is meant by a MAC address.

  • used to identify a device
  • it is a unique (address)
  • it is a static address // it does not change
  • it is set by the manufacturer
  • the first part is the manufacturer ID/number / identifies the manufacturer
  • the second part is the serial number / ID.

 

Distinguish between operating system software and an application software

  • OS controls operation of system/hardware
  • Applications software allows the system to do something useful

Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.

  • All nodes ‘listen’ for traffic to sense when the network is idle.
  • When a node wishes to transmit, it transmits a ‘request to send’ frame’ (RTS)
  • The intended receiving device will transmit a ‘clear to send’ (CTS) frame if it is available.
  • All other nodes ‘sense’ the network is busy and wait a random amount of time before trying to transmit

What is a web browser?

  • A software which can display a webpage on a user's computer screen