admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

State four operations that may be performed on a file by an operating system

  • file deletion
  • file copying
  • file renaming
  • file retrieval
  • file closing
  • file reading
Question Image

(b) Routers have an important role in how the internet functions.
  Describe how a router directs data on the internet.

  • Reads the data/packet to find the recipient's address 
  • Has physical connections to >=2 different networks
  • Holds a routing table
  • Stores information about (IP) addresses 
  • Keeps packets inside a network by not forwarding them 
  • Forwards data / directs/forwards/sends packets 
  • Chooses the most efficient path to the next node
Question Image

The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set.

(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.

  • All the characters and symbols that can be represented by a computer system.
  • Each character and symbol is assigned a unique value.

(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is

that the text stored takes up more storage space

  • Each character is encoded using more bits

 

Question Image

What is an information system ?  (KCSE 2012))

Is an arrangement of people, data, processes, communication and IT that interact to support problem solving

 

Components of an information system

  • Hardware
  • Software
  • Data - information manipulated by software
  • people- all people involved
  • Processes - steps to accomplish a goal
Question Image

What is a web browser?

  • A software which can display a webpage on a user's computer screen
Question Image

KCSE 2021  Prediction Computer Studies Paper 1  Q.16 (c)

c) Distinguish between a source program and a compiler as used in computer programming. [2]

Source program is the original program in a high level language as written by the programmer while a compiler is a program translator that converts source program to object code.

Question Image

The introduction of a new system involves evaluation and maintenance once the system is
implemented.
Describe the evaluation and maintenance stage of the systems development life cycle (SDLC)
and provide one example of an activity undertaken in this stage.

  • Continually monitoring, evaluating and updating the system once it is operational. Activities include rectifying bugs, requesting changes, updating aspects, finding errors, maintaining code etc.
Question Image

Explain the functions of the following parts of the CPU

Control Unit; Decodes instruction; Controls the fetching and writing of data;

Arithmetic Logic Unit/ ALU; Executes mathematical instructions;  Executes logical instructions; Compares values held in registers;

 Clock; Controls the number of instructions carried out each second;   allows the CPU to synchronize operations;

Question Image

Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access

  • Websites any inappropriate websites ie pornography, drugs, guns,
  • terrorism etc. e.g. is it acceptable for the organisation to allow access to this
  • sort of material when you can’t control who is accessing the service?
  • Time limit amount of time, they may not want to provide indefinite access
  • or may want to charge for access after the time limit has expired.
  • Preventing file sharing and illegal sharing\use of copyrighted materials.
  • Accountability identification of users and actions on a network by
  • preventing anonymous access.
  • Prevention of illegal activities such as terrorism and fraud.
  • The responsibility to keep children safe and protected.
  • Responsibility to keep users (customers) data safe and secure.
  • Spoofing of websites, phishing. Responsibility of organisation to put some kind of protection in place, eg filtering of known fraudulent sites.
  • Recording of private messages or details if not encrypted.
  • Recording of usernames and passwords that the user may also use to access other systems.
  • Responsibility of organisation to secure their systems from possible attack.
  • Sales and marketing providing sales leads to market products.
Question Image

Explain how virtual memory can compensate for the limited  RAM capacity in a computer.

  • VM is used when RAM is full  i.e part of the secondary storage used as (temporary) RAM/VM
  • Data from RAM is moved to the secondary storage/VM (to make space in RAM)
  • RAM can then be filled with new data
  • When data in VM is needed it is moved back to RAM
Question Image

State three categories Operating Systems grouped according to user interface

  • Commandline/ Character interface Operating systems
  •  Menu Driven Operating Systems
  •  Graphical User Interface Operating Systems
Question Image

Name one item used in the home, other than a computer, that contains a microprocessor.

  • camera
  • microwave
  • washing machine
  • video recorder
  • fridge
  • sewing machine
  • air conditioning
  • games console
  • electronic game electronic toys
  • rice cooker
  • dish washer
  • TV
  • alarm clock
  • radio
Question Image

Satellite services are used to provide broadband internet connectivity to regional and remote areas of Kenya. State one advantage and one disadvantage of using satellites for this purpose.

Advantages

  • can cover large areas
  • requires minimal land-based transmission support
  • requires minimal infrastructure to provide internet access
  • minimal impact on the environment or humans.

Disadvantages

  • transmission speeds are not comparable with other forms of transmission
  • data costs are expensive by comparison to other forms of transmission
  • expensive to deliver.
Question Image

Outline a factor that can influence the performance of a network.

  • The different factors that can influence the performance of a network include: bandwidth, network design, data collisions, and excess broadcast traffic.
  • The bandwidth can influence through the method of transmission and medium used
Question Image

State three documents that are used during mail merging in word processing

  • Main document
  • Data source
  • merged document
Question Image

 Describe four features of the operating system when providing a graphical user interface on a personal computer. Give a suitable example of each feature.

Windows for example a word processing application and a spreadsheet
 
Menus, for example, allow the user to perform operations or run applications such as right-click to create a new folder  
 
Icons for example a picture of linked computers for networking
 
Pointers(mouse or touchscreen)  for example to select items/trigger events  
 
Shortcuts for example to frequently used applications for example having a shortcut to your mail client on your desktop
 
File navigation for example when searching the hard disc for a file/folder using a browser
 
copying / deleting / moving/sorting/naming/searching of files or folders for example copying of a file from the hard drive to a USB pen drive (File handling)
 
Desktop customisation for example changing the colours and background image
 
Copy and paste for example between applications e.g. copying a graph from a spreadsheet to a word processor
 
Error messages for example provide users with error/warning/help messages for example ‘printer out of paper’ 

Question Image

List three electronic data processing modes used in computers

  • Realtime processing
  • Batch processing
  • Timesharing
  • multiprogramming
  • Online
  • Batch
  • Distributed
Question Image

List two primary functions of a domain name server.

  •  map IP addresses to names and criteria
  • To map directory services
  • Maintain directory of domain names
  • To map URL (web address) to IP address
Question Image

Outline one advantage and one disadvantage of interviews and questionnaires as data gathering techniques.
 

Interviews

Advantages

  • can gather specific information and additional information
  • high response rate to questions
  • The question can be rephrased to seek more clarification
  • it is possible to win the confidence of the interviewee and get honest answers

Disadvantages

  • time consuming
  • responses to interview questions are subjective.
  • the interviewee may not open up on some sensitive issues
  •  

Questionnaire

Advantages

  • easy to administer
  • can be anonymous.

Disadvantages

  • fixed (inflexible) design
  • potential differences in understanding and interpretation.
Question Image

Computer Studies KCSE 2006 Paper 1

SECTION A (40 MARKS)

1.What is meant by

    a)Analogue data

     b)Digital data                           (4 mks)

2. Distinguish between transcription and transposition types of errors and give an example of each  (4mks)

3. a)What are peripheral devices?  (1mk)

   b)Give two examples of peripheral devices  (1mk)

4a)What meant by the term user-friendly as used in software development? (1mk)

  b)Distinguish between the terms single-tasking and multi-user as used in operating systems  (2mks)

5.What actions should be taken in case of a fire outbreak in the computer laboratory?  (4mks)

6a) What is an Internet Service Provider?    (1mk)

  b) An employee in a business company is charged with the responsibility of putting the company advertisements on the Internet.

 i) State the professional title of the employee. (1mk)

ii) Give an example of software used by this employee to carry out the above task.    (1mk)

7.Differentiate between COM ports and LPT ports     (2mks)

8.Explain two ways in which ICT can enhance commerce.  (2mks)

9. Explain the following software terms:

    a) Portability       (1 mk)

    b) Modularity      (1 mk)

10. a) State two application areas of desktop publishing software. (2mks)

     b) Explain the following graphic terms:                                                                                     

     i) Rotate (1 mk)

    ii) Crop  (1mk)

12. a)List two arithmetic operations that can be performed on a row of numeric data in a word processing table.    (1 mk)

     b) In each case of (a) above, write the expression used.  (2mks)

13. List two methods of gathering information during the system development process   (2mks)

14.Name three types of optical disks.(3mks)

15.The diagram below shows a formatted plate surface of a storage disk.

 

 

 

            Shade and label:

            a)         one sector                                                                                ( 1mk)

            b)         One block                                                                                (1mk)

SECTION B (60 MKS)

Answer question 16 and any other three questions from this section in the  space provided

16 a) List two examples of:

       i) Third generation languages    (2mks)

       ii) Object oriented languages    (2 mks)

b) Draw a flowchart to compare three non-equal numeric values A, B, C and prints the largest of the three. (11 mks)

17 a) One of the functions of an operating system is job scheduling.  Explain what is meant by job scheduling.   (1mk)

    b)List and explain three types of user interfaces.                      (6 mks)

    c)Describe the following categories of software:

       i) Firmware                 (1mk)

       ii) Proprietary software  (1mk)

     d) a new company XYZ intends to go into the business of desktop publishing. Advise the company on three computer hardware system specification features to consider as a measure of enhancing performance. (6 mks)

18. a) distinguish between the following sets of terms as used in spreadsheets.        (2mks)

     i)Worksheet and workbook

     ii) Filtering and sorting

     b) State one way in which a user may reverse the last action taken in a spreadsheet package.        (1 mk)

     c)The following is a sample of a payroll. The worksheet row and column headings are marked  1, 2, 3, .  and A, B, C.  respectively

 

Question Image