KCSE 2016 COMPUTER STUDIES PAPER 1
A manager wishes to replace the current manual system with a computerized one. Describe three areas that must be evaluated to justify the replacement (6 marks)
Headache, back and neck pain may result from the use of computers. State how each of them can be minimized (2mks)
Students of a school intended to elect their school Captain by secret ballot. State three ways in which computers can be used to improve the election process (3mks)
State two advantages of electronic databases over a flat file
An organisation that supplies audiobooks over the internet is moving into a new office building.
(a) One reason for networking devices is to provide access to the internet.
(i) Give two other reasons for connecting devices to networks.
State four data types used in MS Excel
State the characteristics of each of the following network topologies (KCSE COMPUTER STUDIES 2021 )
i) Mesh Topology (2mks)
(ii) Ring Topology (2mks)
State the characteristics of each of the following network topologies (KCSE COMPUTER STUDIES 2021 )
i) Mesh Topology (2mks)
(ii) Ring Topology (2mks)
A school intends to install a computer network. Explain three challenges that the school may experience after the installation (KCSE 2021 Computer Studies Q19(b))
Network Failure - when the network becomes faulty or the network is down, users may not access network resources hence operations of an organization may be brought to a standstill
Security Issues: A computer network can be accessed thus there is an increased chance of hacking
The rapid spread of viruses: Viruses can easily spread to terminals of a computer network which may be very expensive to clear
Cultural and moral effects: adult content may be shared in a networked environment which may be of negative impact on teenagers
State advantages of batch processing
Describe the problem recognition and definition stage of system development
Describe three other different categories of malware.
Trojan (horse); a program which misleads the user into thinking it is another
piece of software which, when run, executes another program;
Spyware; a program which records data such as usernames and passwords on
a host system and forwards the information to a third party;
Adware; code embedded or attached to program files which will persistently
show adverts (that attempt to generate revenue);
Worm; code which will run autonomously and replicates itself on a host system;
Ransomware; a program that encrypts user’s data to make it unreadable until
they pay for the key;
Remote Access Tool (RAT); allows access to control and monitor a computer
from a remote network location;
Rootkit; malware that has managed to gain ‘root’ admin privileges;
Bots/Zombies; a program installed on a computer that performs a job for the
remote owner of the bot/zombie such as sending spam or sending web requests
to perform a DOS or attacking a computer system;
Scareware; malware that tells you something is wrong with your system in an
attempt to get you to make a purchase;
Keylogger; a program that monitors/records a user’s keystrokes in order to steal
passwords/confidential details;
State the formatting features used in Ms Excel
Font Formatting:
Cell Formatting:
A school has 3000 students sitting final examinations.
Each student sits eight examinations.
Write an algorithm, using pseudocode or a flowchart, which:
• inputs the marks for all 8 examinations for each student
• outputs for each student the average mark for their 8 examinations
• outputs the highest mark overall
highest = -1
for student = 1 to 3000
total = 0
for exam = 1 to 8
input mark
total = total + mark
if mark > highest then highest = mark
next
average = total/8
output average
next
output highest
Python code:
highest = -1
for student in range(1, 3001):
total = 0
for exam in range(1, 9):
mark = int(input("Enter mark: "))
total += mark
if mark > highest:
highest = mark
average = total / 8
print("Average:", average)
print("Highest mark:", highest)
VBA Code
Option Explicit
Sub CalculateAverageAndHighest()
Dim highest As Integer
Dim total As Integer
Dim mark As Integer
Dim average As Double
highest = -1
For student = 1 To 3000
total = 0
For exam = 1 To 8
mark = InputBox("Enter mark:")
total = total + mark
If mark > highest Then
highest = mark
End If
Next exam
average = total / 8
MsgBox "Average: " & average
Next student
MsgBox "Highest mark: " & highest
End Sub
Give an example of where a PAN could be used
802.3 is the standard for ethernet wired networks and 802.11x is the standard for ethernet
wireless networks.
Outline why standards such as these are important in the development of network devices and
software.
Below is a labelled diagram of a star topology network.

(a) Other than the items labelled above state the hardware required by every computer to connect to a network
b) Describe how a packet is transmitted from computer A to computer D, including the role of the switch

(a)
(b)
There are security concerns associated with cloud storage.
(a) State one way in which providers of cloud storage could prevent security breaches by their own employees
(b) Explain why data on networks is encrypted
(a) One from:
(b) To prevent unauthorised access (1) so that data remains confidential (1) by making it unintelligible (1) because it is scrambled (1)
A supermarket uses point of sale (POS) terminals at the checkout for scanning barcodes on the products.
(a) State two items of data that are stored on the barcode.
(b) Describe how the computer system checks that the barcode has been read correctly.
(c) State the type of file access that is used to get the price from the central computer.
(d) Explain how the system updates the file when an item has been sold.
(a) State two items of data that are stored on the barcode.
(b) Describe how the computer system checks that the barcode has been read correctly.
(c) State the type of file access that is used to get the price from the central computer.
(d) Explain how the system updates the file when an item has been sold.
A company has a website that is stored on a web server.
(a) The website data is broken down into packets to be transmitted to a user.
Describe the structure of a data packet.
Give one advantage using a star network rather than a ring network.
Outline three ways through which ICT can used in marketing
ICT is used to create e-commerce platforms that have made business transactions easier and convenient by allowing customers make purchases and payments from anywhere at any time
ICT is used by marketing agents to create exciting multimedia presentations concerning products or services and present them to the target customers using presentation software such MS PowerPoint
Using multimedia, presentation and animation software, it is possible to design attractive advert materials and video clips to display on billboards, broadcast over a television or uploaded on the internet
Describe the role of the one-dimensional array in programming