admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Defining  blocking of text as used in  word processing

  • Refers to selecting a group of text eg word, sentence or even a paragraph in order to work with it as a whole
Question Image

Differentiate between a compiled and an interpreted program

  • A compiled program will only execute on a processor of specific type/family/with same instruction set
  • A program run using an interpreter can execute on a computer with any type of processor
Question Image

Describe one task that is commonly undertaken during the first phase of system development life cycle

  • The preparation of a system proposal which lists the problem definition, objectives of the study, terms of reference of study, constraints, and expected benefits of the new system, in light of the user requirements
Question Image

Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.

  • All nodes ‘listen’ for traffic to sense when the network is idle.
  • When a node wishes to transmit, it transmits a ‘request to send’ frame’ (RTS)
  • The intended receiving device will transmit a ‘clear to send’ (CTS) frame if it is available.
  • All other nodes ‘sense’ the network is busy and wait a random amount of time before trying to transmit
Question Image

State a stage in system development where each of the following activities are carried out    (KCSE 2018)

(a) Identifying technologies that may be used in a proposed system

  • System Analysis/Information gathering/Problem recognition

(b) Identifying the shortcomings of the old system

  • Problem definition

(c) Prepares the software migration plan

  • Implementation stage
Question Image

Briefly describe three types of database models

  • Hierarchical model  - Records in the database can be related to one parent only but can have more children records
  • Network database model - a child record can be linked to  multiple parent records
  • Relational database model - organizes data into tables that can be linked or related based on data common to each.
Question Image

What is a utility software?

The following are some of the possible definitions:

It is system software designed to help the users to analyse, configure, optimize, or maintain a computer

System software that helps maintain the proper and smooth functioning of a computer system

Examples include antivirus software, Disk clean-up tools, disk defragmenters, backup software, etc

What is the difference between a logical file and a physical file?

  • A physical file contains the original data whereas a logical file does not contain any data
  • A physical file contains one record format while a logical file can contain up to 32 record formats
  • A physical file can exist without a logical file while a logical file cannot exist without a physical file
Question Image

Give one advantage of a star network when compared to a ring network.

if one station/cable fails, others are not affected
easier to identify faults when using star topologies
it is easier to expand this type of network
performance doesn’t deteriorate under load

Question Image

When developing a network security policy, it is important to understand the threats that can be made against a network. ‘IP spoofing’ and ‘back doors’ are two techniques that can compromise the security of a network. Describe each of these techniques.

IP spoofing

A technique used to gain unauthorised access to a computer whereby an intruder sends messages to that computer from a false IP address

Back door:
An undocumented method of gaining access to a program, online service or an entire computer system

Question Image

Define patch as used in the operating system

Refers to a small piece of software designed to update, fix, or improve a specific part of the operating system or an application.

NB: Patches are typically released by the software's developer or the operating system vendor to address security vulnerabilities, software bugs, or to add new features or enhancements

(ii) The organisation has chosen wireless connectivity over wired connectivity for its new office building. There is no significant difference in the cost of installing either.
Give three reasons why the organisation might prefer wireless connectivity.

May not have space for cables to be installed

Employees and visitors can move around the building without disconnecting

Adding new users just means giving out the SSID and password

Question Image

What is data encryption?

  • Refers to the scrambling of data into unreadable form before transmission over a telecommunication media  OR
  • transformation of data from plaintext to ciphertext
Question Image

(a) Name two pieces of hardware needed to enable video-conferencing to take place using a standard computer system.

(b) State one piece of specialist software needed to carry out video-conferencing.

(a)

webcam
speakers
microphone
broadband modem

(b)

use of CODEC (converts/compresses analogue data into digital data)
echo cancellation s/ware (allows talking in real time/keeps everything in sync)
compression s/ware for video/audio
s/ware to access broadband/networking

Question Image

Explain why it is not always true that a computer which has  a quad-core processor runs twice as fast as a computer with a dual-core processor

 

  • Software may be designed to run on 1 core and not multiple cores
  • depends on the task(s)  i.e some tasks cannot be split across cores
  • Clock speed also affects speed i.e dual core may have a faster clock speed and quad-core may have slower clock speed so one task may be run faster/slower
  • RAM size also affects speed i.e Quad-core may have less RAM  amount of VM being used
  • Cache size also affects speed i.e Quad-core may have less cache
Question Image
  1. (a)State the meaning of the term disk defragmentation as used in computers  (1mk)
  • The process of rewriting parts of a file to contiguous sectors on a disk
Question Image

State two reasons why the data in fields such SEX field in a database should be coded.

  • less errors on input
  • requires less storage space
  • validation
  • quicker to input
  • quicker to find
Question Image

What are the likely causes of data and program loss in a computer                                (2 marks)

  • Computer viruses
  • Unstable power supply
  • Hard disk crash
  • Theft of data/programs
Question Image

Distinguish between a client-server and a peer-to-peer network

  • In a client-server network, every device is either a client or a server whereas in a peer-to-peer network each computer has equal responsibility and each has the ability to work as both a server and a client
Question Image

Computer Studies Paper 1  KCSE 2021 Prediction

                                                    Section A

1.State two reasons for the increased use of laptop computers in government offices. [2]

They are small and fit in a small storage space

They are light weight hence can be carried to areas where their services are required

The monitor, system unit, keyboard units are integrated together

Easy to share

Have rechargeable battery

Have low power consumption

2.Computer network technicians prefer to use command-line based operating systems when configuring networks. State three reasons for the preference. [3]

Do not take up a lot of memory

Have direct access to most hardware devices/provide complete control during configuration

Cheaper to acquire as some are freeware/shareware

Faster to execute commands

Difficult to hack/more secure

More stable

3.State three measures that should be put in place in a computer laboratory to safeguard users’ health. [3]

 

  • All power cables must be insulated and hidden from users
  • Furniture used must be of standard
  • Room should have adequate lighting
  • No overcrowding
  • Monitor should be fitted with anti glare
  • Avoid dust
  • Avoid slippery floor
  • Avoid bright coloured walls
  • Promote use of ergonomic devices

 

4.State three ways in which barcode readers may be used in schools. [3]

Take inventory of items

Transactions in the school library

Keep track of movement of goods

Track students in and out of school

Used to register roll call

5.State three advantages of flat panel monitors over cathode ray tube monitors as used in computers.                                                                                                                     [3]

  • Compact and light/portable/less bulky/occupy less space
  • Consume less power
  • Low angle distortion
  • Improved color depth
  • Higher resolution
  • Have less radiation
  • Produce less heat

 

6.State three possible reasons for the extinction of daisy wheel printers in the market. [3]

  • Slow
  • Noisy
  • Lack of graphic support
  • Monochrome printer
  • Supported on font type and size

 

 

7.State three ways in which an operating system secures a computer system.             [3]

  • User authentication
  • Secure user accounts with privileges
  • Encryption of data
  • Keeping log files
  • Auto backup and auto recovery features
  • Inbuilt antivirus

 

8.A law firm prefers to use hard copy output when handling documents for legal matters. State two reasons for this preference.                                                            [2]

  • Can be used without electricity
  • Can serve as physical evidence/exhibit
  • Not easy to change content without leaving evidence
  • No need of computer knowledge

9.State the function of each of the following feature in a word processor

a. Thesaurus                                                                                                                    [1]

Feature that suggests words with similar or opposite meanings to the selected word

b. Comments                                                                                                                   [1]

Feature that allows a user to attach remarks

10. With the aid of an example, explain the term multi-level list as used in word processing.                                                                                                                [3]

  1. Chapter 10
    1. Summary
      1. xxxxxxxx

Formatting style that shows listed items at different level instead of using one line

11. Distinguish between real-time operating system and distributed operating system. [3]

Accept answers based on data processing concept

12. Explain the function of protect sheet feature in a spreadsheet program.                   [2]

A tool/feature that prevents unwanted changes to the spreadsheet. Requires a user to key in a password inorder to make changes

13. State four computer based careers introduced as a result of computerized data processing method at the airport.                                                                                     [2]

  • System analysts
  • Web designers
  • Network administrators
  • Network technicians
  • Programmers
  • Database Administrators

NB/ Accept any computer based career

14. In a spreadsheet, the formula = If(A1>10,A1*77,A1*50) is entered in a cell. Interpret the results.                                                                                                                        [3]

Checks the value in cell A1if it is more than 10, if the comparison is true then the outcome of the value in cell multiplied by 77 is displayed, else if it is false the results of the value in cell A1 multiplied by 50 are displayed.

15. State a stage in systems development cycle where each of the following activities are carried out:

a. Identifying the technologies that may be used in a proposed system.                       [1]

Accept any sub stage within system analysis e.g. requirement specification, problem definition, information gathering, etc

b. Identifying shortcomings of a system.                                                                       [1]

All stages of system development

 

c. Preparing the system migration plan.                                                                          [1]

 

Implementation stage

Question Image