Computer Studies Paper 1 2021 KCSE Prediction Section B Qs. 17,18 and 19
17. a) i) Explain the term search as used in the Internet. [2]
A web based application that locates items or information from the World Wide Web
ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download. [3]
b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system. [4]
c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:
i. Cropping [2]
Applies to graphics – used to trim/remove/hide some portions in the graphics
ii. Transparency [2]
Used to make background of a graphic to be clear/visible
d. List two areas where infrared waves are used in data communication. [2]
18. a) List four activities of the planning stage of systems development. Ignore this question, marks redistributed elsewhere
b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.
i. Technical [3]
Done to determine whether technology exists to support the proposed solution
ii. Economic [3]
Done to determine whether the proposed solution is economically viable
iii. Schedule [3]
Done to determine whether the proposed system can be done within an acceptable time.
c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.
Table 1
|
Dept Code |
Dept Name |
|
001 |
Computer |
|
002 |
Aviation |
|
003 |
Engineering |
Table 2
|
DeptID |
Student Registration No. |
Student’s Name |
|
002 |
St01 |
Alex Too |
|
003 |
St02 |
Naomi Komi |
|
002 |
St03 |
Peter Kengo |
i. Identify the appropriate primary key for each table. [2]
Table 1 – Dept code, Student Registration No
ii. Explain two benefits of enforcing referential integrity in the database. [4]
19. a) Describe each of the following validation checks as used in data processing.
i. Preserve check [2]
Ignore this question, marks redistributed elsewhere
ii. Data type check [2]
Ensure correct type of data is entered for the field
iii. Check digit [2]
This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.
b. Write each of the following abbreviations in full:
i) BCD [1½]
Binary Coded Decimal
ii) EBCD [
This question was thrown out and marks redistributed elsewhere
iii) ASCII [1½]
American Standard Code for Information Interchange
c) Using 10-bits binary number system, perform the following decimal operation using two’s complement. [6]
12910 - 12810
+129 = 00 1000 0001
128 = 00 1000 0000
-128 = 11 0111 1111 (ones complement)
+1
11 1000 0000 (Twos complement)
129- 128
00 1000 0001
+ 11 1000 0000
100 0000 0001
Hence = 00 0000 00012 or 12 (the overflow bit is ignored)
Describe the function of the Cache memory
State four factors to consider when acquiring computer software
What is a computer system ?
A computer system refers to computer components that collectively function as a single unit to achieve the desired goal. It can also be defined as a collection of hardware, software, and liveware that work together to receive, process, and manage data
Explain two computer hardware features that may be considered when selecting a laptop computer to be used in developing a KCSE computer studies project (4mks)
Multimedia Capability - A laptop with strong multimedia capabilities is essential for a computer studies project submitted on CD-RW. This ensures that the laptop can efficiently handle multimedia content, providing a seamless experience in creating and presenting project materials.
Processor Speed - Opting for a laptop with a high processor speed is crucial. This feature enables the smooth execution of multiple applications simultaneously, enhancing overall project efficiency and reducing processing delays.
Hard Disk Capacity - Consider a laptop with ample hard disk capacity, as the Microsoft Office suite used in computer projects requires significant space for the installation and storage of project files. A spacious hard drive ensures that there is sufficient room for data and applications.
Main Memory Capacity - Given that students often work with multiple programs concurrently during a project, it's important to choose a laptop with an adequate main memory size. A smaller main memory may result in performance issues, hindering the seamless operation of various software applications during project development.
State four operations that may be performed on a file by an operating system
What is utility software?
Describe the difference between a barcode and A quick Response code (QR code)
A company has decided to use a computer for stock control. Describe the process of systems development from the time the decision was made to proceed with computerisation until final testing.
specify output requirements
design documents/screen displays
data for input/storage
form design
storage devices
file structures/access/design
data security/back up files
systems flowchart etc.
implementation i.e. pilot/intermediate/parallel running
testing strategy
training
hardware/software
programming/algorithms
validation
user manual
technical documentation
entering data into system
Differentiate between uploading and downloading a file
Uploading a file refers to the process of transferring a file from a local computer to a remote webserver while downloading a file refers to the process of transferring or copying a file from a remote webserver to a local machine
State the factors that affect the performance of the CPU
Number of cores
The number of cores a processor has directly affects the performance of the processor. Each core can perform its own fetch-execute cycle independently of others, so different applications can be allocated to different cores. Quad-core (four-core) and even octa-core (eight-core) processors are becoming common
Cache memory
A processor’s cache is a small portion of incredibly fast memory. It has read and write speeds far higher than hard disk drives and even SSDs. The cache is used to store frequently used information and reduces time wasted in fetching the same information from main memory time and time again
Clock speed
A processor’s clock speed relates to the frequency of the pulses generated by the system clock. The higher the frequency, the more cycles of the fetch-execute cycle can be completed in the same period of time.
Word length
A word is a group of bits that is treated as a single unit by a processor. Words can be used for representing both instructions and data. The length of a word is the number of bits that are assigned to it, with higher word lengths allowing for more bits to be transferred and manipulated as a single unit.
Address bus width
The width of a bus relates to the number wires that make up the bus. Increasing the width of the address bus increases the range of addresses that it can specify, hence increasing the computer’s amount of addressable memory. Adding a single wire doubles the number of addressable memory locations
Data bus width
Increasing the width of the data bus increases the volume of data that can be transferred over the bus at any one time. A wider data bus allows the processor to fetch more data from the main memory in one cycle of the fetch-execute cycle, reducing the number of cycles required to fetch large volumes of data.
State what is meant by Computer Aided Design (CAD).
Give three different applications that make use of CAD.
Name three specialist input/output devices used in CAD.
– software that can be used to design new products/amend existing products
– makes use of features such as 2D, 3D, wire frames, library of parts, links to CAM
Give three different applications that make use of CAD.
– aerospace
– architecture
– designing cars
– designing consumer goods
– chemical/nuclear plant design
– designing electronic circuit boards
– ergonomic design
– landscape/garden design
Name three specialist input/output devices used in CAD.
– large monitor/screen with hi-res
– touch screen
– plotter
– space mouse/space ball/4D device
– 3D glasses (in some applications)
– light pen
– graphics tablet
– 3D printer
– 3D scanner
Explain why the organization's management and the analyst need to work together to define the problem accurately during system development
Utility software are operating system programs designed to maintain the functionality of a computer system.
Describe three types of utility software that are provided to help maintain the security and integrity of computer data.
Computer Studies Paper 1 2021 KCSE Prediction Section B Qs. 17,18 and 19
17. a) i) Explain the term search as used in the Internet. [2]
A web based application that locates items or information from the World Wide Web
ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download. [3]
b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system. [4]
c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:
i. Cropping [2]
Applies to graphics – used to trim/remove/hide some portions in the graphics
ii. Transparency [2]
Used to make background of a graphic to be clear/visible
d. List two areas where infrared waves are used in data communication. [2]
18. a) List four activities of the planning stage of systems development. Ignore this question, marks redistributed elsewhere
b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.
i. Technical [3]
Done to determine whether technology exists to support the proposed solution
ii. Economic [3]
Done to determine whether the proposed solution is economically viable
iii. Schedule [3]
Done to determine whether the proposed system can be done within an acceptable time.
c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.
Table 1
|
Dept Code |
Dept Name |
|
001 |
Computer |
|
002 |
Aviation |
|
003 |
Engineering |
Table 2
|
DeptID |
Student Registration No. |
Student’s Name |
|
002 |
St01 |
Alex Too |
|
003 |
St02 |
Naomi Komi |
|
002 |
St03 |
Peter Kengo |
i. Identify the appropriate primary key for each table. [2]
Table 1 – Dept code, Student Registration No
ii. Explain two benefits of enforcing referential integrity in the database. [4]
19. a) Describe each of the following validation checks as used in data processing.
i. Preserve check [2]
Ignore this question, marks redistributed elsewhere
ii. Data type check [2]
Ensure correct type of data is entered for the field
iii. Check digit [2]
This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.
b. Write each of the following abbreviations in full:
i) BCD [1½]
Binary Coded Decimal
ii) EBCD [
This question was thrown out and marks redistributed elsewhere
iii) ASCII [1½]
American Standard Code for Information Interchange
c) Using 10-bits binary number system, perform the following decimal operation using two’s complement. [6]
12910 - 12810
+129 = 00 1000 0001
128 = 00 1000 0000
-128 = 11 0111 1111 (ones complement)
+1
11 1000 0000 (Twos complement)
129- 128
00 1000 0001
+ 11 1000 0000
100 0000 0001
Hence = 00 0000 00012 or 12 (the overflow bit is ignored)
State the areas where infra-red radio waves are used KCSE 2018
State two ways of protecting computers against viruses.
State four threats that compromise data integrity and state ways that can be used to minimise these threats
State four threats that compromise data integrity
How threats to data integrity can be minimised:
What are the functions of the system clock in the CPU?
Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access