admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Computer Studies Paper 1 2021  KCSE Prediction Section B Qs. 17,18 and 19

17. a) i) Explain the term search as used in the Internet.                                            [2]

A web based application that locates items or information from the World Wide Web

ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download.                                           [3]

  • Size of the video/format
  • The bandwidth of the media/speed of network/network traffic
  • Type of browser software
  • Background activities running in the computer
  • Restrictions enforced in the computer/firewall/antivirus
  • Speed of the computer/CPU speed
  • Size of RAM

b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system.                                                                                  [4]

  • Poor network/lack of connection
  • Software failure in the system
  • Hardware failure
  • Lack of access rights
  • System overload/hanging
  • Lack of skills/disability/illiteracy
  • Lack of power supply

c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:

i. Cropping                                                                                                               [2]

Applies to graphics – used to trim/remove/hide some portions in the graphics

ii. Transparency                                                                                                         [2]

Used to make background of a graphic to be clear/visible

d. List two areas where infrared waves are used in data communication.                             [2]

18. a) List four activities of the planning stage of systems development.                             Ignore this question, marks redistributed elsewhere

b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.

i. Technical                                                                                                               [3]

Done to determine whether technology exists to support the proposed solution

 

ii. Economic                                                                                                              [3]

Done to determine whether the proposed solution is economically viable

 

iii. Schedule                                                                                                               [3]

Done to determine whether the proposed system can be done within an acceptable time.

c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.

Table 1

Dept Code

Dept Name

001

Computer

002

Aviation

003

Engineering

 

Table 2

DeptID

Student Registration No.

Student’s Name

002

St01

Alex Too

003

St02

Naomi Komi

002

St03

Peter Kengo

 

i. Identify the appropriate primary key for each table.                    [2]

Table 1 – Dept code, Student Registration No

ii. Explain two benefits of enforcing referential integrity in the database. [4]

  • No record can be added in Table 2 if its corresponding record in Table 1 does not exist
  • No record in Table 1 can be deleted without first deleting the corresponding record in Table 2
  • Reduces data redundancies/ensures integrity
  • Prevents deletion of related table

19. a) Describe each of the following validation checks as used in data processing.

i. Preserve check                                                                                                      [2]

Ignore this question, marks redistributed elsewhere

ii. Data type check                                                                                                    [2]

Ensure correct type of data is entered for the field

iii. Check digit                                                                                                           [2]

This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.

b. Write each of the following abbreviations in full:

i) BCD                                                                                                                                    [1½]

Binary Coded Decimal

ii) EBCD                                                                                                                                 [

This question was thrown out and marks redistributed elsewhere

iii) ASCII                                                                                                                    [1½]

American Standard Code for Information Interchange

c) Using 10-bits binary number system, perform the following decimal operation using two’s complement.                                                                                                                                   [6]

12910 - 12810

+129 = 00 1000 0001

128 = 00 1000 0000

-128 = 11 0111 1111 (ones complement)

                            +1

          11 1000 0000 (Twos complement)

129- 128

     00 1000 0001

+ 11 1000 0000

 100 0000 0001

Hence = 00 0000 00012 or 12 (the overflow bit is ignored)

Question Image

Describe the function of the Cache memory

  • (Cache) Stores regularly accessed instructions/data
  • Reduces the need to access instructions/data from the main memory
  •  Makes up for the difference in speed of the CPU and main memory
Question Image

State four factors to consider when acquiring computer software

  • Authenticity
  • Users' needs
  • Availability of documentation
  • Cost
  • Compatibility
  • Upgradability
  • Portability
Question Image

What is a computer system ?

A computer system refers to computer components that collectively function as a single unit to achieve the desired goal. It can also be defined as a collection of hardware, software, and liveware that work together to receive, process, and manage data

Explain two computer hardware features that may be considered when selecting a laptop computer to be used in developing a KCSE computer studies project (4mks)

Multimedia Capability - A laptop with strong multimedia capabilities is essential for a computer studies project submitted on CD-RW. This ensures that the laptop can efficiently handle multimedia content, providing a seamless experience in creating and presenting project materials.

Processor Speed - Opting for a laptop with a high processor speed is crucial. This feature enables the smooth execution of multiple applications simultaneously, enhancing overall project efficiency and reducing processing delays.

Hard Disk Capacity - Consider a laptop with ample hard disk capacity, as the Microsoft Office suite used in computer projects requires significant space for the installation and storage of project files. A spacious hard drive ensures that there is sufficient room for data and applications.

Main Memory Capacity - Given that students often work with multiple programs concurrently during a project, it's important to choose a laptop with an adequate main memory size. A smaller main memory may result in performance issues, hindering the seamless operation of various software applications during project development.

 

State four operations that may be performed on a file by an operating system

  • file deletion
  • file copying
  • file renaming
  • file retrieval
  • file closing
  • file reading
Question Image

What is utility software?

  • System software that analyses, configures, optimises and maintains a computer system
Question Image

Describe the difference between a barcode and A quick Response code (QR code)

  • A barcode is one-dimensional while a QR code is two dimensional
  • Barcodes are a set of vertical lines and QR code contains squares
  • QR codes can be read from any angle . Barcode is only above or below and lined up horizontally
Question Image

A company has decided to use a computer for stock control. Describe the process of systems development from the time the decision was made to proceed with computerisation until final testing.

specify output requirements
design documents/screen displays
data for input/storage
form design
storage devices
file structures/access/design
data security/back up files
systems flowchart etc.
implementation i.e. pilot/intermediate/parallel running
testing strategy
training
hardware/software
programming/algorithms
validation
user manual
technical documentation
entering data into system

Question Image

Differentiate between uploading and downloading a file

Uploading a file  refers to the process of transferring a file from a local computer to a remote webserver while downloading a file refers to the process of transferring or copying a file from a remote webserver to a local machine

Question Image

State the factors that affect the performance of the CPU

Number of cores
The number of cores a processor has directly affects the performance of the processor. Each core can perform its own fetch-execute cycle independently of others, so different applications can be allocated to different cores. Quad-core (four-core) and even octa-core (eight-core) processors are becoming common

Cache memory
A processor’s cache is a small portion of incredibly fast memory. It has read and write speeds far higher than hard disk drives and even SSDs. The cache is used to store frequently used information and reduces time wasted in fetching the same information from main memory time and time again

Clock speed
A processor’s clock speed relates to the frequency of the pulses generated by the system clock. The higher the frequency, the more cycles of the fetch-execute cycle can be completed in the same period of time.

Word length
A word is a group of bits that is treated as a single unit by a processor. Words can be used for representing both instructions and data. The length of a word is the number of bits that are assigned to it, with higher word lengths allowing for more bits to be transferred and manipulated as a single unit.

Address bus width
The width of a bus relates to the number wires that make up the bus. Increasing the width of the address bus increases the range of addresses that it can specify, hence increasing the computer’s amount of addressable memory. Adding a single wire doubles the number of addressable memory locations

Data bus width
Increasing the width of the data bus increases the volume of data that can be transferred over the bus at any one time. A wider data bus allows the processor to fetch more data from the main memory in one cycle of the fetch-execute cycle, reducing the number of cycles required to fetch large volumes of data.

Question Image

State what is meant by Computer Aided Design (CAD).

Give three different applications that make use of CAD.

Name three specialist input/output devices used in CAD.

software that can be used to design new products/amend existing products
makes use of features such as 2D, 3D, wire frames, library of parts, links to CAM

Give three different applications that make use of CAD.

aerospace
architecture
designing cars
designing consumer goods
chemical/nuclear plant design
designing electronic circuit boards
ergonomic design
landscape/garden design

Name three specialist input/output devices used in CAD.

large monitor/screen with hi-res
touch screen
plotter
space mouse/space ball/4D device
3D glasses (in some applications)
light pen
graphics tablet
3D printer
3D scanner

Question Image

Explain why the organization's management and the analyst need to work together to define the problem accurately during system development

  • College authorities are the experts in the problem
  • A system Analyst is an expert with computers
  • The two need to pool resources to come up with a clear definition
  • Agree on the outcomes so that when the system is , there are a set of criteria to judge it by
Question Image

Utility software are operating system programs designed to maintain the functionality of a computer system.

Describe three types of utility software that are provided to help maintain the security and integrity of computer data.

  1. Virus scanning / Anti-virus. Used to locate and delete viruses / scans and compares files with databases of known viruses.
  2. Firewall: checks data packets / examines source address / filters out unexpected packets.
  3. Back up. Copies data onto a separate storage device for use if the original data is lost or corrupted.
Question Image

Computer Studies Paper 1 2021  KCSE Prediction Section B Qs. 17,18 and 19

17. a) i) Explain the term search as used in the Internet.                                            [2]

A web based application that locates items or information from the World Wide Web

ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download.                                           [3]

  • Size of the video/format
  • The bandwidth of the media/speed of network/network traffic
  • Type of browser software
  • Background activities running in the computer
  • Restrictions enforced in the computer/firewall/antivirus
  • Speed of the computer/CPU speed
  • Size of RAM

b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system.                                                                                  [4]

  • Poor network/lack of connection
  • Software failure in the system
  • Hardware failure
  • Lack of access rights
  • System overload/hanging
  • Lack of skills/disability/illiteracy
  • Lack of power supply

c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:

i. Cropping                                                                                                               [2]

Applies to graphics – used to trim/remove/hide some portions in the graphics

ii. Transparency                                                                                                         [2]

Used to make background of a graphic to be clear/visible

d. List two areas where infrared waves are used in data communication.                             [2]

18. a) List four activities of the planning stage of systems development.                             Ignore this question, marks redistributed elsewhere

b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.

i. Technical                                                                                                               [3]

Done to determine whether technology exists to support the proposed solution

 

ii. Economic                                                                                                              [3]

Done to determine whether the proposed solution is economically viable

 

iii. Schedule                                                                                                               [3]

Done to determine whether the proposed system can be done within an acceptable time.

c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.

Table 1

Dept Code

Dept Name

001

Computer

002

Aviation

003

Engineering

 

Table 2

DeptID

Student Registration No.

Student’s Name

002

St01

Alex Too

003

St02

Naomi Komi

002

St03

Peter Kengo

 

i. Identify the appropriate primary key for each table.                    [2]

Table 1 – Dept code, Student Registration No

ii. Explain two benefits of enforcing referential integrity in the database. [4]

  • No record can be added in Table 2 if its corresponding record in Table 1 does not exist
  • No record in Table 1 can be deleted without first deleting the corresponding record in Table 2
  • Reduces data redundancies/ensures integrity
  • Prevents deletion of related table

19. a) Describe each of the following validation checks as used in data processing.

i. Preserve check                                                                                                      [2]

Ignore this question, marks redistributed elsewhere

ii. Data type check                                                                                                    [2]

Ensure correct type of data is entered for the field

iii. Check digit                                                                                                           [2]

This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.

b. Write each of the following abbreviations in full:

i) BCD                                                                                                                                    [1½]

Binary Coded Decimal

ii) EBCD                                                                                                                                 [

This question was thrown out and marks redistributed elsewhere

iii) ASCII                                                                                                                    [1½]

American Standard Code for Information Interchange

c) Using 10-bits binary number system, perform the following decimal operation using two’s complement.                                                                                                                                   [6]

12910 - 12810

+129 = 00 1000 0001

128 = 00 1000 0000

-128 = 11 0111 1111 (ones complement)

                            +1

          11 1000 0000 (Twos complement)

129- 128

     00 1000 0001

+ 11 1000 0000

 100 0000 0001

Hence = 00 0000 00012 or 12 (the overflow bit is ignored)

Question Image

State the areas where infra-red radio waves are used      KCSE 2018

  • TV remote control communication;
  • DVD remote communication
  • Communication between peripheral devices and the computer
  • Data link over a short distance using mobile phones Radio remote control
  • Remote locking/opening doors/ devices
Question Image

State two ways of protecting computers against viruses.

  • do not allow outside floppy disks/CD’s/DVD’s
  • use disk free work stations
  • download/install and use anti virus software
  • scan hard disks regularly
  • update the anti virus program regularly
  • do not open file attachments from unknown sources/download
  • doubtful software from the Internet
  • do not use files that come from unknown sources
  • buy original software/do not buy pirated software
  • use firewalls
Question Image

State four threats that compromise data integrity and state ways that can be used to minimise these threats

State four threats that compromise data integrity

  • Human error
  • natural disaster
  • data transmission errors
  • software bugs

How threats to data integrity can be minimised:

  • Backup data preferably on an external storage media
  • control access to data by enforcing security measures
  • design user interfaces that minimise chances of invalid data entry
  • using error detection and correction software when transmitting data over the network
  • using devices that directly capture data from the source such as bar code readers, digtal cameras, and optical character readers

 

Question Image

What are the functions of the system clock in the CPU?

  • It dictates the speed at which data is transferred between these components and enables the sequential execution of instructions in the correct order.
  • generates a timing signal that is used to synchronize communication between CPU components and the rest  of the computer system
Question Image

Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access

  • Websites any inappropriate websites ie pornography, drugs, guns,
  • terrorism etc. e.g. is it acceptable for the organisation to allow access to this
  • sort of material when you can’t control who is accessing the service?
  • Time limit amount of time, they may not want to provide indefinite access
  • or may want to charge for access after the time limit has expired.
  • Preventing file sharing and illegal sharing\use of copyrighted materials.
  • Accountability identification of users and actions on a network by
  • preventing anonymous access.
  • Prevention of illegal activities such as terrorism and fraud.
  • The responsibility to keep children safe and protected.
  • Responsibility to keep users (customers) data safe and secure.
  • Spoofing of websites, phishing. Responsibility of organisation to put some kind of protection in place, eg filtering of known fraudulent sites.
  • Recording of private messages or details if not encrypted.
  • Recording of usernames and passwords that the user may also use to access other systems.
  • Responsibility of organisation to secure their systems from possible attack.
  • Sales and marketing providing sales leads to market products.
Question Image