admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

KCSE 2021 Computer Studies Paper Prediction 1                SECTION B

Answer question 16 and any other three questions from this section in the spaces provided.

16. a) With the aid of a flow chart, describe a loop control structure as used in programming. [4]  

A control structure that allows statement(s) to be repeatedly executed until a certain condition is met                                                                                                      2mks

NB. Accept any other looping construct

Question Image

Explain the difference between
(i) serial and parallel,
(ii) simplex and duplex
modes of data transmission.

  • Serial is the transmission of data one bit at a time/through one wire
  • Parallel is the transmission of data more than one bit at a time/many wires
  • Simplex is the transmission of data in one direction only
  • Duplex is the transmission of data in both directions simultaneously
Question Image

State examples of wireless transmission media

  • Broadcast Radio
  • Infrared
  • Bluetooth
  • Microwaves
  • Satellite
Question Image

Give two other uses of hexadecimal in computer science.

  • colour codes // colour in HTML/CSS
  • error messages
  • locations in memory
  • memory dump // debugging 
  • IP(v6) address
  • ASCII // Unicode
  • assembly language
  • URL.

 

Question Image

State two reasons for carrying out software updates

  • To get the latest features
  • To update security features
Question Image

A computer laboratory experiences power supply problems. Describe three power related problems that should be addressed

Blackout: This is unexpected discontinuation of power supply in the laboratory.

Power sag: Sudden drop of voltage levels that lasts less than a second.

Transients/ surge: High voltage flowing.

Brownout: Partial blackout where there's low voltage flow.

Question Image

What is block operation as used in Microsoft word?

An editing or formatting procedure that is carried out on a selected block of text in a word-processing document.

A formatting or editing operation that is applied to a block of text after selecting. The block of text can be a paragraph, line, word, page or the whole document. It is much easier to apply editing or formatting to a block of text than to apply it to every single character

Question Image

Explain, using examples where appropriate, the meaning of these computer terms

(a) byte ..................................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(b) compiler ............................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(c) handshaking .....................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(d) technical documentation ..................................................................................................
..........................................................................................................................................
......................................................................................................................................[2mks]
(e) simulation .........................................................................................................................
..........................................................................................................................................
......................................................................................................................................[2

(a) byte

  • fixed number of bits, 8 bits
  • represents a character


(b) compiler  program

  • converts/changes/translates high-level language into machine code/machine language/low-level language/object code
  • changes each high-level language instruction into machine code instructions
  • produces an independent program capable of being executed by itself
  • all (syntax errors) listed
  • converts the whole program before execution/in one go
  • converts source code to object code

(c) handshaking

  • exchanging of signals to establish communication between two devices/computers e.g. printer and computer, modem and computer

(d) technical documentation

  • documentation to ensure that the system can be maintained/updated/altered/developed/upgraded
  • trouble shooting/correcting errors/correcting faults
  • explanation of what the program does/how the system works
  • contains file structures
  • algorithms/flow charts/pseudo code
  • program listings
  • hierarchical chart

(e) simulation

  • studying the behavior of a system by using a model/represents real-life/mathematical representation
    e.g. flight simulator (or others), hazardous applications results can be predicted
Question Image

Define social engineering

  • Is where People are manipulated to divulge confidential information
Question Image

A car park uses a number plate recognition system. Identify the reason why unsigned integers should be used to record the number of cars entering and leaving the car park, rather than signed integers

  • Unsigned integers store more positive values
Question Image

The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set.

(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.

  • All the characters and symbols that can be represented by a computer system.
  • Each character and symbol is assigned a unique value.

(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is

that the text stored takes up more storage space

  • Each character is encoded using more bits

 

Question Image
Describe the following threats to privacy and confidentiality: Eavesdropping, surveillance and industrial espionage
Eavesdropping refers to tapping or listening into communacation channels to get information. According to study.com, it is defined the unauthorized interception of a conversation, communication or digital transmission in real time study.com
Question Image

State the differences between a hub and a switch

 

  • switches can send and receive data simultaneously - they are full duplex
  • a hub is half duplex- only one host can communicate at a time.
  • a hub broadcast signals to all computers connected in a network while a switch directs data to its intended destination
Question Image

One characteristic of a robot is its mechanical structure.
State two other characteristics of a robot

  • It has electrical components.
  • It is programmable.

 

Question Image

Computer Studies Paper 1  KCSE 2021 Prediction

                                                    Section A

1.State two reasons for the increased use of laptop computers in government offices. [2]

They are small and fit in a small storage space

They are light weight hence can be carried to areas where their services are required

The monitor, system unit, keyboard units are integrated together

Easy to share

Have rechargeable battery

Have low power consumption

2.Computer network technicians prefer to use command-line based operating systems when configuring networks. State three reasons for the preference. [3]

Do not take up a lot of memory

Have direct access to most hardware devices/provide complete control during configuration

Cheaper to acquire as some are freeware/shareware

Faster to execute commands

Difficult to hack/more secure

More stable

3.State three measures that should be put in place in a computer laboratory to safeguard users’ health. [3]

 

  • All power cables must be insulated and hidden from users
  • Furniture used must be of standard
  • Room should have adequate lighting
  • No overcrowding
  • Monitor should be fitted with anti glare
  • Avoid dust
  • Avoid slippery floor
  • Avoid bright coloured walls
  • Promote use of ergonomic devices

 

4.State three ways in which barcode readers may be used in schools. [3]

Take inventory of items

Transactions in the school library

Keep track of movement of goods

Track students in and out of school

Used to register roll call

5.State three advantages of flat panel monitors over cathode ray tube monitors as used in computers.                                                                                                                     [3]

  • Compact and light/portable/less bulky/occupy less space
  • Consume less power
  • Low angle distortion
  • Improved color depth
  • Higher resolution
  • Have less radiation
  • Produce less heat

 

6.State three possible reasons for the extinction of daisy wheel printers in the market. [3]

  • Slow
  • Noisy
  • Lack of graphic support
  • Monochrome printer
  • Supported on font type and size

 

 

7.State three ways in which an operating system secures a computer system.             [3]

  • User authentication
  • Secure user accounts with privileges
  • Encryption of data
  • Keeping log files
  • Auto backup and auto recovery features
  • Inbuilt antivirus

 

8.A law firm prefers to use hard copy output when handling documents for legal matters. State two reasons for this preference.                                                            [2]

  • Can be used without electricity
  • Can serve as physical evidence/exhibit
  • Not easy to change content without leaving evidence
  • No need of computer knowledge

9.State the function of each of the following feature in a word processor

a. Thesaurus                                                                                                                    [1]

Feature that suggests words with similar or opposite meanings to the selected word

b. Comments                                                                                                                   [1]

Feature that allows a user to attach remarks

10. With the aid of an example, explain the term multi-level list as used in word processing.                                                                                                                [3]

  1. Chapter 10
    1. Summary
      1. xxxxxxxx

Formatting style that shows listed items at different level instead of using one line

11. Distinguish between real-time operating system and distributed operating system. [3]

Accept answers based on data processing concept

12. Explain the function of protect sheet feature in a spreadsheet program.                   [2]

A tool/feature that prevents unwanted changes to the spreadsheet. Requires a user to key in a password inorder to make changes

13. State four computer based careers introduced as a result of computerized data processing method at the airport.                                                                                     [2]

  • System analysts
  • Web designers
  • Network administrators
  • Network technicians
  • Programmers
  • Database Administrators

NB/ Accept any computer based career

14. In a spreadsheet, the formula = If(A1>10,A1*77,A1*50) is entered in a cell. Interpret the results.                                                                                                                        [3]

Checks the value in cell A1if it is more than 10, if the comparison is true then the outcome of the value in cell multiplied by 77 is displayed, else if it is false the results of the value in cell A1 multiplied by 50 are displayed.

15. State a stage in systems development cycle where each of the following activities are carried out:

a. Identifying the technologies that may be used in a proposed system.                       [1]

Accept any sub stage within system analysis e.g. requirement specification, problem definition, information gathering, etc

b. Identifying shortcomings of a system.                                                                       [1]

All stages of system development

 

c. Preparing the system migration plan.                                                                          [1]

 

Implementation stage

Question Image

What characterises a phased implementation approach?

  • Phased means that only one part of the system is implemented at a time
Question Image

Distinguish between an optical scanner and a magnetic ink scanner

  • Optical scanner is used read data by use a beam of light while a magnetic ink scanner is used to read data encoded/written using magnetic ink by magnetising the ink characters and translating them
Question Image

What is secondary storage?

  • A non-volatile store of data
Question Image

What is a utility software?

The following are some of the possible definitions:

It is system software designed to help the users to analyse, configure, optimize, or maintain a computer

System software that helps maintain the proper and smooth functioning of a computer system

Examples include antivirus software, Disk clean-up tools, disk defragmenters, backup software, etc

A school intends to install a computer network. Explain three challenges that the school may experience after the installation (KCSE 2021 Computer Studies Q19(b))

Network Failure - when the network becomes faulty or the network is down, users may not access network resources hence operations of an organization may be brought to a standstill

Security Issues:  A computer network can be accessed thus there is an increased chance of hacking

The rapid spread of viruses: Viruses can easily spread to terminals of a computer network which may be very expensive to clear

Cultural and moral effects: adult content may be shared in a networked environment which may be of negative impact on teenagers

 

Question Image