admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

State the formatting features used in Ms Excel

  • Font Formatting:

    • Font Style: You can change the font style (e.g., Arial, Times New Roman) for cell content.
    • Font Size: Adjust the size of the text within cells.
    • Bold, Italic, and Underline: Apply these formatting options to emphasize text.
    • Font Color: Change the color of the text.
  • Cell Formatting:

    • Number Formats: Apply various number formats, such as currency, percentage, date, and time.
    • Cell Borders: Add or remove borders around cells or cell ranges.
    • Fill Color: Change the background color of cells.
    • Text Alignment: Control how text is aligned within cells (left, right, center, top, bottom).
    • Text Wrapping: Allow text to wrap within a cell if it's too long to fit in one line.
Question Image

State advantages of batch processing

  • once instructions are given, the processing runs automatically hence requiring little supervision
  • tasks are processed as a group hence reducing the cost
  • It is faster since the since runs automatically
  • there is increased output since the processor works without any interruption
Question Image

Describe two desirable features to look for in a laptop rather than a desktop computer.

– lightweight
– long battery life
– cool running processor
– touch pad
– internal webcam

Question Image

State advantages and disadvantages of video conferencing

Advantages

immediate response to questions/queries
can see each other watch body language etc.
easier to have several participants (would be difficult using instant messaging if
several people involved)

Disadvantages

need for expensive equipment/high set up costs
sometimes synchronisation problems make it difficult for delegates
need to train people to use the new technology
greater use of bandwidth

Question Image

State the functions of the following:

  1. Hub
  2. Router
  3. Switch
  4. Bridge

Bridge: Joins together two networks that use the same base protocols.

Hub: Copies all packets of data to all devices on the network.

Router: Stores the addresses of computers on the network and transfers data between devices.

Switch : Analyses each data packet and sends it to the computer it was intended for.

Question Image

Describe the purpose of two registers that are used by Von Neumann architecture.

MAR( memory address register)

  • Stores the address/location where data will be read/written/accessed/fetched
  • stores address/location of data/instruction being processed
  • stores address/location of data/instruction next to be processed

MDR or  memory data register

  • Stores the data/instruction that is fetched/read from memory
  • stores the data that is to be written to memory
  • stores the data/instruction from the address in the MAR
  • stores data/instruction next to be processed

 Program counter

  • Stores the address/location of the next instruction to be run
  • stores the address/location of the current instruction being run

Accumulator

  • Stores the result of manipulation/process/calculation
Question Image

The introduction of a new system involves evaluation and maintenance once the system is
implemented.
Describe the evaluation and maintenance stage of the systems development life cycle (SDLC)
and provide one example of an activity undertaken in this stage.

  • Continually monitoring, evaluating and updating the system once it is operational. Activities include rectifying bugs, requesting changes, updating aspects, finding errors, maintaining code etc.
Question Image

Distinguish between a PAN and a LAN

A PAN exist around a single person whereas a LAN covers a larger area

Question Image

One facility of a Software Development Environment is to convert source code to machine code.  Name and briefly describe four other facilities commonly found in a Software Development Environment.

  • Editor: this allows a programmer to enter and edit source code
  • Automatic formatting:  Correctly indents code
  • Automatic colour coding:  Changes key words, literals and annotation to different colours
  • Linker: this is a program which allows previously compiled code, from software libraries, to be linked together
  • Loader: this is a program which loads previously compiled code into memory.
  • Debugger: this is a program which helps locate, identify and rectify errors in a program
  • Syntax error detection:  Highlighting syntax errors before code is translated
  • Trace: this is a facility which displays the order in which the lines of a program are executed, and possibly the values of variables as the program is being run
  • Break point: this is a facility which interrupts a program on a specific line of code, allowing the programmer to compare the values of variables against expected values.  The program code can then usually be executed one line at a time.  This is called single-stepping
  • Variable watch: this is a facility which displays the current value of any variable.  The value can be 'watched' as the program code is single-stepped to see the effects of the code on the variable.  Alternatively a variable watch may be set, which will interrupt the program flow if the watched variable reaches a specified value
  • Memory inspector: this is a facility which will display the contents of a section of memory
  • Error diagnostics: these are used when a program fails to compile or to run.  Error messages are displayed to help the programmer diagnose what has gone wrong
  • Emulator: will provide and emulator to run the code/app so no physical device required
  • Context sensitive menu:  SDE suggests available options
  • Statement completion:  SDE will complete a statement such as adding an ‘end if’ to an ‘if’ statement GUI creation:  Allows programmer to create a GUI by dragging and dropping controls (buttons, etc...) onto a form.
  • Publisher: facility to package up and deploy program as an easy to install package
Question Image

 State two components of the CPU

Any two from:

  • Registers
  • Clock
  • CU
  • ALU
Question Image

Computer Studies Paper 1 2021  KCSE Prediction Section B Qs. 17,18 and 19

17. a) i) Explain the term search as used in the Internet.                                            [2]

A web based application that locates items or information from the World Wide Web

ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download.                                           [3]

  • Size of the video/format
  • The bandwidth of the media/speed of network/network traffic
  • Type of browser software
  • Background activities running in the computer
  • Restrictions enforced in the computer/firewall/antivirus
  • Speed of the computer/CPU speed
  • Size of RAM

b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system.                                                                                  [4]

  • Poor network/lack of connection
  • Software failure in the system
  • Hardware failure
  • Lack of access rights
  • System overload/hanging
  • Lack of skills/disability/illiteracy
  • Lack of power supply

c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:

i. Cropping                                                                                                               [2]

Applies to graphics – used to trim/remove/hide some portions in the graphics

ii. Transparency                                                                                                         [2]

Used to make background of a graphic to be clear/visible

d. List two areas where infrared waves are used in data communication.                             [2]

18. a) List four activities of the planning stage of systems development.                             Ignore this question, marks redistributed elsewhere

b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.

i. Technical                                                                                                               [3]

Done to determine whether technology exists to support the proposed solution

 

ii. Economic                                                                                                              [3]

Done to determine whether the proposed solution is economically viable

 

iii. Schedule                                                                                                               [3]

Done to determine whether the proposed system can be done within an acceptable time.

c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.

Table 1

Dept Code

Dept Name

001

Computer

002

Aviation

003

Engineering

 

Table 2

DeptID

Student Registration No.

Student’s Name

002

St01

Alex Too

003

St02

Naomi Komi

002

St03

Peter Kengo

 

i. Identify the appropriate primary key for each table.                    [2]

Table 1 – Dept code, Student Registration No

ii. Explain two benefits of enforcing referential integrity in the database. [4]

  • No record can be added in Table 2 if its corresponding record in Table 1 does not exist
  • No record in Table 1 can be deleted without first deleting the corresponding record in Table 2
  • Reduces data redundancies/ensures integrity
  • Prevents deletion of related table

19. a) Describe each of the following validation checks as used in data processing.

i. Preserve check                                                                                                      [2]

Ignore this question, marks redistributed elsewhere

ii. Data type check                                                                                                    [2]

Ensure correct type of data is entered for the field

iii. Check digit                                                                                                           [2]

This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.

b. Write each of the following abbreviations in full:

i) BCD                                                                                                                                    [1½]

Binary Coded Decimal

ii) EBCD                                                                                                                                 [

This question was thrown out and marks redistributed elsewhere

iii) ASCII                                                                                                                    [1½]

American Standard Code for Information Interchange

c) Using 10-bits binary number system, perform the following decimal operation using two’s complement.                                                                                                                                   [6]

12910 - 12810

+129 = 00 1000 0001

128 = 00 1000 0000

-128 = 11 0111 1111 (ones complement)

                            +1

          11 1000 0000 (Twos complement)

129- 128

     00 1000 0001

+ 11 1000 0000

 100 0000 0001

Hence = 00 0000 00012 or 12 (the overflow bit is ignored)

Question Image

State two data protection rules that should be obeyed by all staff in a hospital.

  • data must be accurate/up-to-date
  • personal data must be registered
  • data must be used for the purpose that is registered for
  • if data is to be used for another purpose the registrar must be notified/
  • subject gives consent
  • patients must be able to see the data and have it changed if it is incorrect
  • processed fairly and lawfully
  • kept no longer than needed
  • kept secure
  • not transferred to other countries without protection
Question Image

Describe a typical situation that requires the use of:

(i) a high-level language

(ii) a low-level language.


High level languages are used in situations when:

  1. Speed of execution is not a critical factor, such as in office applications.
  2. a programmer needs to use complex commands that perform complex tasks.
  3. A programmer wants to make use of standardised library / sub routines.

Low level languages are used in situations when:

  1. a program must execute quickly such as real time applications
  2. a programmer needs to write code that interacts directly with the hardware, such as device drivers
  3. a programmer needs to perform a specific command not available in a HL language.
Question Image

Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access

  • Websites any inappropriate websites ie pornography, drugs, guns,
  • terrorism etc. e.g. is it acceptable for the organisation to allow access to this
  • sort of material when you can’t control who is accessing the service?
  • Time limit amount of time, they may not want to provide indefinite access
  • or may want to charge for access after the time limit has expired.
  • Preventing file sharing and illegal sharing\use of copyrighted materials.
  • Accountability identification of users and actions on a network by
  • preventing anonymous access.
  • Prevention of illegal activities such as terrorism and fraud.
  • The responsibility to keep children safe and protected.
  • Responsibility to keep users (customers) data safe and secure.
  • Spoofing of websites, phishing. Responsibility of organisation to put some kind of protection in place, eg filtering of known fraudulent sites.
  • Recording of private messages or details if not encrypted.
  • Recording of usernames and passwords that the user may also use to access other systems.
  • Responsibility of organisation to secure their systems from possible attack.
  • Sales and marketing providing sales leads to market products.
Question Image

Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms.

Virus

  • - program/software that replicates/copies itself
  • – can delete or alter files/data stored on a computer
  •  – can make the computer “crash”/run slow

Pharming -

  • malicious code/software installed on a user’s hard drive/actual webserver
  •  – this code redirects user to a fake website (without their knowledge)
  •  – to obtain personal/financial information/data

Phishing

  • - legitimate-looking emails sent to a user
  • – as soon as the recipient opens/clicks on the link in the email/attachment …
  • – … the user is directed to a fake website (without their knowledge)
  • – To obtain personal/financial information/data
Question Image

Compare and contrast CLI and GUI

CLI

  • Commands have to be typed in full with no mistakes
  • Requires memorization of commands
  • Uses less memory

GUI

  • Due to graphics, GUI uses a lot of memory
  • GUI is more user friendly
  • Cannot operate properly if memory is low

Comparison

  • Both carry out file management
  • Both are operating systems
  • Both control software and hardware
Question Image

State two ways of protecting computers against viruses.

  • do not allow outside floppy disks/CD’s/DVD’s
  • use disk free work stations
  • download/install and use anti virus software
  • scan hard disks regularly
  • update the anti virus program regularly
  • do not open file attachments from unknown sources/download
  • doubtful software from the Internet
  • do not use files that come from unknown sources
  • buy original software/do not buy pirated software
  • use firewalls
Question Image

KCSE 2021 Prediction Computer Studies Paper 1

b) Study the following pseudocode and answer the questions that follow.

1. Start

2. Get Value1 and Value2

3. If Value1> Value2 Then

4. Maximum = Value1

5. Else If Value1< Value2 Then

6. Maximum = Value2

7. Else Go to 9

8. Display Maximum

9. Stop

i) State the purpose of the pseudocode                                                                                  [1]

To compare two values and output the greater of the two

ii) Draw a flowchart equivalent to the pseudocode.                                                                     [8]

Question Image

Factors to consider when choosing DTP software. (4 marks)

  1. Availability in the market
  2. Initial and maintenance cost
  3. User friendliness
  4. Compatibility
  5. User needs

A sound engineer is recording a singer. Describe why the sound must be converted to a digital format before it can be stored on a computer system

  • Computer systems use binary/ones and zeros/voltage on or off;
  • Sound is analogue/continuous;
  • Computers use digital data/discrete values
Question Image