KCSE 2021 Computer Studies Paper Prediction 1 SECTION B
Answer question 16 and any other three questions from this section in the spaces provided.
16. a) With the aid of a flow chart, describe a loop control structure as used in programming. [4]
A control structure that allows statement(s) to be repeatedly executed until a certain condition is met 2mks
NB. Accept any other looping construct
Explain the difference between
(i) serial and parallel,
(ii) simplex and duplex
modes of data transmission.
State examples of wireless transmission media
Give two other uses of hexadecimal in computer science.
State two reasons for carrying out software updates
A computer laboratory experiences power supply problems. Describe three power related problems that should be addressed
Blackout: This is unexpected discontinuation of power supply in the laboratory.
Power sag: Sudden drop of voltage levels that lasts less than a second.
Transients/ surge: High voltage flowing.
Brownout: Partial blackout where there's low voltage flow.
What is block operation as used in Microsoft word?
An editing or formatting procedure that is carried out on a selected block of text in a word-processing document.
A formatting or editing operation that is applied to a block of text after selecting. The block of text can be a paragraph, line, word, page or the whole document. It is much easier to apply editing or formatting to a block of text than to apply it to every single character
Explain, using examples where appropriate, the meaning of these computer terms
(a) byte ..................................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(b) compiler ............................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(c) handshaking .....................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(d) technical documentation ..................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(e) simulation .........................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2
(a) byte
(b) compiler program
(c) handshaking
(d) technical documentation
(e) simulation
Define social engineering
A car park uses a number plate recognition system. Identify the reason why unsigned integers should be used to record the number of cars entering and leaving the car park, rather than signed integers
The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set.
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space
State the differences between a hub and a switch
One characteristic of a robot is its mechanical structure.
State two other characteristics of a robot
Computer Studies Paper 1 KCSE 2021 Prediction
Section A
1.State two reasons for the increased use of laptop computers in government offices. [2]
They are small and fit in a small storage space
They are light weight hence can be carried to areas where their services are required
The monitor, system unit, keyboard units are integrated together
Easy to share
Have rechargeable battery
Have low power consumption
2.Computer network technicians prefer to use command-line based operating systems when configuring networks. State three reasons for the preference. [3]
Do not take up a lot of memory
Have direct access to most hardware devices/provide complete control during configuration
Cheaper to acquire as some are freeware/shareware
Faster to execute commands
Difficult to hack/more secure
More stable
3.State three measures that should be put in place in a computer laboratory to safeguard users’ health. [3]
4.State three ways in which barcode readers may be used in schools. [3]
Take inventory of items
Transactions in the school library
Keep track of movement of goods
Track students in and out of school
Used to register roll call
5.State three advantages of flat panel monitors over cathode ray tube monitors as used in computers. [3]
6.State three possible reasons for the extinction of daisy wheel printers in the market. [3]
7.State three ways in which an operating system secures a computer system. [3]
8.A law firm prefers to use hard copy output when handling documents for legal matters. State two reasons for this preference. [2]
9.State the function of each of the following feature in a word processor
a. Thesaurus [1]
Feature that suggests words with similar or opposite meanings to the selected word
b. Comments [1]
Feature that allows a user to attach remarks
10. With the aid of an example, explain the term multi-level list as used in word processing. [3]
Formatting style that shows listed items at different level instead of using one line
11. Distinguish between real-time operating system and distributed operating system. [3]
Accept answers based on data processing concept
12. Explain the function of protect sheet feature in a spreadsheet program. [2]
A tool/feature that prevents unwanted changes to the spreadsheet. Requires a user to key in a password inorder to make changes
13. State four computer based careers introduced as a result of computerized data processing method at the airport. [2]
NB/ Accept any computer based career
14. In a spreadsheet, the formula = If(A1>10,A1*77,A1*50) is entered in a cell. Interpret the results. [3]
Checks the value in cell A1if it is more than 10, if the comparison is true then the outcome of the value in cell multiplied by 77 is displayed, else if it is false the results of the value in cell A1 multiplied by 50 are displayed.
15. State a stage in systems development cycle where each of the following activities are carried out:
a. Identifying the technologies that may be used in a proposed system. [1]
Accept any sub stage within system analysis e.g. requirement specification, problem definition, information gathering, etc
b. Identifying shortcomings of a system. [1]
All stages of system development
c. Preparing the system migration plan. [1]
Implementation stage
What characterises a phased implementation approach?
- Phased means that only one part of the system is implemented at a time
Distinguish between an optical scanner and a magnetic ink scanner
What is secondary storage?
What is a utility software?
The following are some of the possible definitions:
It is system software designed to help the users to analyse, configure, optimize, or maintain a computer
System software that helps maintain the proper and smooth functioning of a computer system
Examples include antivirus software, Disk clean-up tools, disk defragmenters, backup software, etc
A school intends to install a computer network. Explain three challenges that the school may experience after the installation (KCSE 2021 Computer Studies Q19(b))
Network Failure - when the network becomes faulty or the network is down, users may not access network resources hence operations of an organization may be brought to a standstill
Security Issues: A computer network can be accessed thus there is an increased chance of hacking
The rapid spread of viruses: Viruses can easily spread to terminals of a computer network which may be very expensive to clear
Cultural and moral effects: adult content may be shared in a networked environment which may be of negative impact on teenagers