State the formatting features used in Ms Excel
Font Formatting:
Cell Formatting:
State advantages of batch processing
Describe two desirable features to look for in a laptop rather than a desktop computer.
– lightweight
– long battery life
– cool running processor
– touch pad
– internal webcam
State advantages and disadvantages of video conferencing
Advantages
– immediate response to questions/queries
– can see each other watch body language etc.
– easier to have several participants (would be difficult using instant messaging if
several people involved)
Disadvantages
– need for expensive equipment/high set up costs
– sometimes synchronisation problems make it difficult for delegates
– need to train people to use the new technology
– greater use of bandwidth
State the functions of the following:
Bridge: Joins together two networks that use the same base protocols.
Hub: Copies all packets of data to all devices on the network.
Router: Stores the addresses of computers on the network and transfers data between devices.
Switch : Analyses each data packet and sends it to the computer it was intended for.
Describe the purpose of two registers that are used by Von Neumann architecture.
MAR( memory address register)
MDR or memory data register
Program counter
Accumulator
The introduction of a new system involves evaluation and maintenance once the system is
implemented.
Describe the evaluation and maintenance stage of the systems development life cycle (SDLC)
and provide one example of an activity undertaken in this stage.
Distinguish between a PAN and a LAN
A PAN exist around a single person whereas a LAN covers a larger area
One facility of a Software Development Environment is to convert source code to machine code. Name and briefly describe four other facilities commonly found in a Software Development Environment.
State two components of the CPU
Any two from:
Computer Studies Paper 1 2021 KCSE Prediction Section B Qs. 17,18 and 19
17. a) i) Explain the term search as used in the Internet. [2]
A web based application that locates items or information from the World Wide Web
ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download. [3]
b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system. [4]
c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:
i. Cropping [2]
Applies to graphics – used to trim/remove/hide some portions in the graphics
ii. Transparency [2]
Used to make background of a graphic to be clear/visible
d. List two areas where infrared waves are used in data communication. [2]
18. a) List four activities of the planning stage of systems development. Ignore this question, marks redistributed elsewhere
b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.
i. Technical [3]
Done to determine whether technology exists to support the proposed solution
ii. Economic [3]
Done to determine whether the proposed solution is economically viable
iii. Schedule [3]
Done to determine whether the proposed system can be done within an acceptable time.
c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.
Table 1
|
Dept Code |
Dept Name |
|
001 |
Computer |
|
002 |
Aviation |
|
003 |
Engineering |
Table 2
|
DeptID |
Student Registration No. |
Student’s Name |
|
002 |
St01 |
Alex Too |
|
003 |
St02 |
Naomi Komi |
|
002 |
St03 |
Peter Kengo |
i. Identify the appropriate primary key for each table. [2]
Table 1 – Dept code, Student Registration No
ii. Explain two benefits of enforcing referential integrity in the database. [4]
19. a) Describe each of the following validation checks as used in data processing.
i. Preserve check [2]
Ignore this question, marks redistributed elsewhere
ii. Data type check [2]
Ensure correct type of data is entered for the field
iii. Check digit [2]
This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.
b. Write each of the following abbreviations in full:
i) BCD [1½]
Binary Coded Decimal
ii) EBCD [
This question was thrown out and marks redistributed elsewhere
iii) ASCII [1½]
American Standard Code for Information Interchange
c) Using 10-bits binary number system, perform the following decimal operation using two’s complement. [6]
12910 - 12810
+129 = 00 1000 0001
128 = 00 1000 0000
-128 = 11 0111 1111 (ones complement)
+1
11 1000 0000 (Twos complement)
129- 128
00 1000 0001
+ 11 1000 0000
100 0000 0001
Hence = 00 0000 00012 or 12 (the overflow bit is ignored)
State two data protection rules that should be obeyed by all staff in a hospital.
Describe a typical situation that requires the use of:
(i) a high-level language
(ii) a low-level language.
High level languages are used in situations when:
Low level languages are used in situations when:
Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access
Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms.
Virus
Pharming -
Phishing
Compare and contrast CLI and GUI
CLI
GUI
Comparison
State two ways of protecting computers against viruses.
KCSE 2021 Prediction Computer Studies Paper 1
b) Study the following pseudocode and answer the questions that follow.
1. Start
2. Get Value1 and Value2
3. If Value1> Value2 Then
4. Maximum = Value1
5. Else If Value1< Value2 Then
6. Maximum = Value2
7. Else Go to 9
8. Display Maximum
9. Stop
i) State the purpose of the pseudocode [1]
To compare two values and output the greater of the two
ii) Draw a flowchart equivalent to the pseudocode. [8]
Factors to consider when choosing DTP software. (4 marks)
A sound engineer is recording a singer. Describe why the sound must be converted to a digital format before it can be stored on a computer system