Tallying population size Establishing demographic trends Drawing pie charts to show population share by gender Doing census budgets
List any two components of an expert system (2marks)
One characteristic of a robot is its mechanical structure.
State two other characteristics of a robot
Suggest two advantages of using robots, instead of humans, to build cars in the factory.
Maranda 2024 Mock CRE Paper 2
1. a) Based on Deutro-Isaiah, describe the Messiah. (7mks)
The Messiah would be despised/ rejected
The Messiah would be treated harshly/ arrested/sentenced to death
The Messiah would be reconciling people through His suffering
The death of the Messiah would bring forgiveness of sins of humankind
The Messiah would endure suffering/humiliation without complaining/ would suffer innocently
The Messiah would have nothing attractive
The Messiah would be humble/simple
The Messiah would be highly honored
The Messiah would succeed in His work
He would be despised, rejected, wounded oppressed and afflicted
He endured pain and suffering which would have been ours.
Because of our sins he was wounded
We are healed by the punishment he suffered He was treated harshly but he never said a word
He was put in the grave with the wicked
He was buried with the rich even though he did not commit a crime
He took the place of many sinners and prayed that they might be forgiven.
Maranda MOCK 2024 CRE Paper 2
b) What Simeon and Anna said about the life of Jesus during the dedication. (7mks)
Jesus would save people
He would bring glory to Israel
He would be a light to the gentiles
He would be a universal savoir
He would bring judgment to the Israelites
Many people would oppose his work
He would reveal secret thoughts of people
He would be the source of redemption for Jerusalem
Maranda Mock CRE Paper 2 2024
c) Seven activities which the youth may involve in the church today. (7mks)
Teaching the Sunday school.
Bible study/ Read religious literature.
Community worker’s volunteers
Preaching / fellowship.
Maranda Mock CRE Paper 2 2024
c) Six ways in which Christians can assist the physically challenged members of the society (6mks)
Establishing special institutions for them
Donating equipment, which assists them in their movement.
Giving them vocational training
Assisting them in their daily chores
Accepting them as human beings like themselves
Helping them to develop their talents e.g. games, music, drama etc.
Identifying their abilities and giving them employment.
Encouraging relatives to live with them.
Giving them financial assistance to start income generating projects
a) The parable of the shrewd manager in Luke 16:1-33. (7mks)
There was a rich man who had a steward. He received charges that the steward was wasting his goods.
He called him what he was hearing about him. He told him to turn in account of his stewardship for he could no longer be steward.
The steward asked himself what he would do since his master was taking the stewardship away from him.
He was not strong enough to dig and was ashamed to beg.
He decided what to do so that people may receive him into their house when he is out of the stewardship
He was to summon his masters’ debtors one by one. He went to the first one and asked him how much he owned his master. The debtor said a hundred measures of oil, which he was told to write fifty.
He asked another how much he owned his master. He said a hundred measures of wheat he was told to write eighty
The master commended the dishonest steward for his shrewdness for the sons of his world are shrewder in dealing with their own generation that the ones light.
Seven causes of conflict between Jesus and the Jewish leader in Jerusalem. (7mks)
They questioned the authority Jesus was using to teach Lk 20:1-8.
Jesus accused them of persecuting and rejecting Gods servants in the parable of tenants. Lk 20:9-18.
They had conflict on the issue of whether to pay taxes to cease or not. Lk 20:19-26
The question on resurrection by the Sadducees on Levites marriage. Lk 20:27-39
He claimed to be the messiah and said that even David called Him Lord in the book of Psalms Lk 20:4-44
Jesus openly condemned the hypocrisy of the Jewish leader Lk 20:45-47
Jesus prophesied the destruction of temple of Jerusalem
He condemned the offerings of the rich Jewish leaders, which were meant to show off, but praised the widows’ offerings, which was made out of self-sacrifice Lk 21:1.
Six ways in which parents can resolve misunderstanding with their children. (6mks)
Allowing dialogue
Listening to their views
Presenting them with the correct, picture of the situation
Setting a good example to them
Giving them appropriate time for leisure activities
Seeking help from church leaders
Guiding them on how to choose friends
Advising them on the right moral values
Praying for and with them to bring about understanding
Committing the children to God’s will
Discussing the problem with their friends and relatives
a) Seven reasons why Jesus sent the Holy Spirit to the disciples after his ascension. (7mks)
The holy spirit would comfort the disciples
He was to counsel the disciples
He would guide the disciples on what is right / God’s righteousness
He was to convict people of their sins
He was to show disciples on what is right
He was to reveal the future / enable the disciples to prophet’s / God’s will
He would glorify Jesus through the work of the disciples
He would enable the disciples to witness Christ throughout the world
He would replace the physical presence of Jesus
He would empower the disciples to be able to speak with courage
b)How the unity of believers is expressed in the body of Christ? (8mks)
St Paul describes the believers as the body of Christ
Christ is the head of the church
The believers form parts of the body
The body has different organs, in the same way the church has different members
They all need to work together for the well-being of the church
Every part of the body is needed to make it whole/ all parts interdependent / one part cannot be without the other
The different church members are given different spiritual gifts by the holy spirit to carry out God’s work
Believers are united through baptism in the Holy Spirit.
c)The church in Kenya help to bring about the unity in the country. (6mks)
Assisting the government is developing a curriculum schools that teaches about patriotism
Advocating for peaceful co-existence among Kenyans
Fighting corruption, discrimination, tribalism, nepotism and all forms of favourism
Acting as a voice of reason among the ruling political class demanding their unity as a government
Assisting the less fortunate in the society thus fighting disparity
Condemning and reporting to the relevant authorized groups that bring disharmony in the society
Developing joint rallies, prayers and reconciliatory meetings together.
Forgiving one another to avoid disunity
Obeying church rules/ leaders
Chastity is a virtue
a) Attitude of Christian towards human sexuality. (7mks)
Sex is sacred
Man and woman are for companionship
Both man and woman are equal before God
It is for procreation
Man and woman are complementary
Man and woman were created in the image of God
They became one in marriage
Human beings have the ability to control sexual desire
All forms of irresponsible sex are condemned
Chastity is a virtue
b)Six ways in which sex is abused in Kenya today. (6mks)
Sex before marriage / fornication/ pre-marital sex
Sex outside marriage / adultery
Prostitution
Bestiality
Homosexuality/ lesbianism/ sodomy/oral sex
Pornographic literature/mass media using of technological devices in sex
Incest
Masturbation
Rape /defilement of minors
c)Why are minors sexually abused in Kenya today? (7mks)
Permissiveness
Lack of self-control
Influence of the mass media
Mental illness / stress/ drug and substance influence
Erosion of the African culture moral value
False religious / devil worship /strange cults
To avenge for oneself
Breakdown of religious values
Irresponsible parenthood
Indecent dressing
Leniency of the law
Idleness
Poverty / unemployment
6 a) Six practices in the African Society that promoted law, order and justice? (6mks)
Cultural taboos/dos and don’ts in the society
Kinship ties had rules which governed their relationships
Oaths – swearing while making agreements.
Rites of passage e.g. during initiation, the youth were taught laws/secrets of society.
Practice of rituals in the society promoted good relationships between the living/living dead.
Communal life i.e. “I am because we are, and since we are therefore Iamb.”
Inheritance of property was done fairly which brought justice /order.
Worship of God/veneration of ancestors created orderliness
b). Seven reasons for the need of law, order and justice in the society. (7mks)
In order to safeguard peoples personal rights.
To ensure security and protection of the people and their property.
To promote peace and harmony
To attract both local and foreign investment in the country
To promote peaceful relationship between countries.
To safeguard freedom of the citizens
To control and check the powers of those in authority
To enable the gov’t to implement its taxation policies effectively and to use the money
collected for the good of the community
To enable Christians worship God in peace and freely spread the good news.
c) Explain the factors which hinder effective maintenance of law and order in the (7 marks)
Increase in the rate of crime especially in urban areas
Political instability e.g. Post election violence
Greed for power and wealth
Political selfishness leading to dictatorship and despotism
High rate of unemployment leading to idleness / crime
Corruption especially by custodians of the law e.g. police.
Hypocrisy i.e. leaders misleading the society
High level of poverty forcing others into crime
State two computer-based careers that have arisen as a result of computer-based data processing in a factory (2 marks)
System analyst
Web designers
Network administrators
Database administrators
Programmers
Computer technicians
KCSE Computer Studies Paper 1, 2001
SECTION A (40 MARKS)
ANSWER ALL THE QUESTIONS IN THIS SECTION
1.Compare the two types of diskettes used in microcomputers in terms of physical size and densities. (2mks)
2.Why is it necessary to have a UPS in a computer laboratory? (2mks)
3 a) Explain what is meant by batch processing (1mk)
b) Give one advantage and one disadvantage of batch processing ( 2mks)
4. List any four high level programming languages (2mks)
5.A 3 by 4 matrix M is to be added to another 3 by 4 matrix array N so as to give a third 3 by 4 matrix array P. Using a high level programming language, write a program segment that assigns the sum of M and N to P.(4mks)
6. The first column in the table below contains the formulae as stored into the cell F10 of a spreadsheet. Enter the formulae, as they would appear when copied to the cell M20 of the same spreadsheet. (3mks)
Formula in F10 |
Formula in m20 |
=D10* E10 |
|
=A$ 25 |
|
=$ D$13 |
|
7. Give three advantages of separating data from the applications that use the data in database design. (3mks)
8. Explain the impact of information on organizations in each of the following areas: (2mks)
a) Competition
b) Pace of growth
9. a) List any four tasks that an electronic spreadsheet should be able to perform other than calculations (2mks)
b) Explain what is meant by automatic recalculation as used in a spreadsheet.(1 mk)
10. Describe the functions of the following computer hardware components:
a)Mouse (2 ½ mks)
b)Scanner. (1 ½ mks)
11. a)State two differences between Disk Operating System (DOS) and WINDOWS operating system.
b. i) Define the term application software (1mk)
ii) Give one example of application software (1mk)
12. a) Give one difference between internal and external commands in Disk Operating System. (2mks)
b) Name two DOS commands that may be used for checking disk errors. (2mks)
13. Explain how a paragraph can be moved from one place to another in word-processing. 2mks)
14. Define the term structured programming. (2mks)
SECTION B (60MKS)
Answer question 15 and any other three questions from this section.
15.a) What is meant by each of the following terms:
i) pseudocode (1 ½ mks)
ii) Flowchart (1 ½ mks)
b) a program is required to list the first 1000 numbers in the series: 2, 4, 6, 8,
10. Draw a flowchart and write a program that can be carried out this task. (12 mks)
16. The following car details are to be entered in a database; make, date-of-manufacture, colour and cost.
a) Prepare a suitable database structure showing field names and their field types (5mks)
b) Explain how you index the data such that cars of the same make and colours are together (2mks)
c) Write a statement that can be used to select cars of the colour green (2 mks)
d) Give an instruction that would;
i)select cars whose cost lie between 500,000/= and 1,000,000/= (3 mks)
ii)Determine the average cost of all cars (3mks)
17. a)The diagram below represents the essential features o a computer system. Study the diagram and answer the questions that follow:
i)Name the components (4mks)
A
B
C
D
ii) On the diagram above, indicate the direction of data flow using arrows. (3mks)
b) Name the three types of buses in a computer system (3mks)
c) Explain how CPU registers may be used to carry out a basic calculation such as:2 + 7 = 9
d) Name two computers output devices. (1 Mark)
18. a)State three ways in which computer technology may affect employment patterns in organizations (3mks)
b) State three ways in which computer technology may affect employment patterns in organizations (3mks)
c)Suggest three strategies that can be employed to manage resistance to change (3mks)
d) Give three advantages of computerization in an organization. (3mks)
19. a)In a computer based information system, state the purpose of the following files and give one example where such a file may be required in a school. (8mks)
i) report file
ii)Back-up file
iii)Reference file
iv) Sort file
b) State three precautions that should be taken to ensure that diskettes are well stored. (3 mks)
c) Distinguish between “serial” and Indexed sequential” file organization methods. (2mks)
d) Distinguish between binary and octal number systems and give an example of each (2mks)
KCSE 2002 COMPUTER STUDIES PAPER 1
SECTION A (40 MARKS)
1.Describe the purpose of each of the following computer functional units: (2mks)
a) Control
b) Storage
2.Explain how each of the following would affect the suitability of a room for use as a computer room: (2mks)
a) Burglar proofed door
b)Availability of taps and sinks in the room
3.State three data representation codes used in computers (3mks)
4.State two types of documentation in program development and give the purpose of each. (4mks)
5.Suppose a 5 element array A contains the values 9, 12, 17, 7 and 20. Find the value in A after executing the loop below:
Repeat for k = 1 to 4
Set A [k +1]: = A [k]
[End of loop] (3mks)
6.State any three activities that occur in a program compilation process (3mks)
7.The formula = k20 + P$ 18 was typed in cell L21 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24.(2mks)
8.State two ways in which a computer may be used in the efficient running of a hospital (2mks)
9.List three disadvantages of using the traditional file management method (3mks)
10.Give one disadvantage of a single processor multi-user system (1mk)
11. List three differences between a micro-computer and a super-computer. (3mks)
12.State and explain two reasons why word processing is one of the most common applications of many computer users. (2mks)
13. write- 1 in twos complement notation in byte form (4mks)
14.Explain the following input/output terms as used in computer systems. Give an example for each (4mks)
a) Read
b) Write
15.State two disadvantages of networking.
SECTION B (60 MKS)
Answer question 16 and any other three questions from this section.
16.The following flowchart can be used to list the odd numbers between 0 and 100
a)Write a program segment for the flowchart using a high level language. (7mks)
b)What would be the output from the flowchart if the statement in the decision box is changed to: (3 mks)
i) Odd = 100
ii) Odd< 100
iii) Odd> 100
c) Modify the flowchart so that it prints only the sum of the odd number between 0 and 100 (5mks)
17.a) List five precautions that can be taken to protect data stored in diskettes (5mks)
b)State and explain two precautions that can be taken to help recover data lost through accidental erasure. (4mks)
c) Describe each of the following data processing methods: (6mks)
i) Batch processing
ii) Distributed processing
iii) Multiprogramming
18. a) i) What is a computer keyboard? (1 mk)
ii) ist four types of keys found on a computer keyboard. Give an example of each(4mks)
b) Give four differences between present day’s computers and the older generation of computers (4mks)
c) i) State three advantages and one disadvantage of using a laser printer. (4mks)
ii) Distinguish between a line printer and a page printer (2mks)
19 a) Identity three public Universities and three National Polytechnics in Kenya where further computer training is offered. In case, state the highest level of qualification that can be acquired in computer training. (6 mks)
b) Distinguish between “Job replacement” and “Job displacement” in reference to computerization. (2mks)
c) Give four reasons why a firm may decide to computerize its operations. (4mks)
d) An individual has a right to demand a guarantee of privacy of personal information stored on a computer.Give three such types of information. (3mks)
20. a) Give three comparisons of the traditional file management method of typing a document on a typewriter against using a word processor. (6mks)
b) i) Define the term spreadsheet (1 mk)
ii) Give two examples of spreadsheet packages available in the market today (2mks)
c) Explain the following terms as used in a spreadsheet:
i) What if …analysis (2 mks)
ii) Cell (1 mk)
iii) Formula (1mk)
iv) Pie chart (2 mks)
KCSE 2003 COMPUTER STUDIES
SECTION A (40 MARKS)
Answer all the questions in this section
1.Computer systems are built from three types of physical components: processors,memories and 1/O devices.
a) State two tasks of a processor (2 mks)
b)State function of 1/O devices (1 mk)
2. Threats to the safety of computer systems take many forms such as: white-collar crime, natural disasters, vandalism and carelessness.Give on way as to how each of these forms of threats can be controlled. 2 mks)
3.a) Explain the term nibbles as used in data representation in computers
b)Perform the following binary arithmetic giving the answers in decimal notation. (3 mks)
i)1110.01111 + 11010001 .011
ii) 1001011.011 - 111.111
4 a) Distinguish between machine and assembly language (2mks)
b) State the type of translator necessary for a program written in: (2mks)
i) High level language
ii)Assembly language
5. Briefly explain the purpose of the following types of program documentation: (3mks)
a) User manual
b) Reference guide
c) Quick reference guide
6. State any two features of a user-friendly program. (2mks)
7 a) Distinguish between labels and formulae with respect to spreadsheets (2mks)
b) Consider the entries in the cells below.
Cell |
B2 |
B3 |
C10 |
C11 |
C13 |
Entry |
200 |
100 |
B2 |
B3 |
C10 |
State the value displayed in cell C13 (2 mks)
8.List three differences between wide area Networks (WAN) and Local Area Networks (LAN) (3mks)
9. Study the flowchart segment below and state the last value printed from the flowchart. (2 mks)
10. a) What is an expert system (1mk)
b)State any two components of an expert system (2mks)
11. give two reasons why optical disks are better storage media compared to floppy diskettes (2mks)
12.What are the Dos commands used for the following? (2mks)
a) Changing directories
b) Viewing directories
c) Renaming directories
d) Deleting a directory
13. Distinguish between copying and moving text (2mks)
14. a) Name two methods of paper orientation (1mk)
b)Name two keys used to delete text in a document (1 mk)
15.Name two features a Database package (2mks)
SECTION B (60 MKS)
Answer question and any other three questions from this section
16. Study the flowchart below and answer the questions that follow.
a)Write a high-level language program for the above flowchart (7mks)
b)List the outputs of the flowchart above (5 mks)
c) Modify the flowchart so that it adds up all its outputs and displays the sum obtained (3mks)
17. A computer specification has the following details:
a) What is meant by
i) 1.44 MB floppy disk drive?
ii)20 GB hard disk?
iii) 17” SVGA monitor
b) Which operating system might be pre-installed in this computer and why? (2mks)
c) List three multimedia components (3 mks)
d) i) what is meant by computer aided manufacture? (2 mks)
ii) Give two examples of computer aided design software. (2mks)
18. a)Give three examples of network software (3mks)
b)List any three items that may be referred to as data terminal equipment in a network (3 mks)
c)Briefly explain the following terms as used in networking (4mks)
i) Remote communication
ii)Distributed processing
d) State three advantages and two disadvantages of mesh network topology. (5mks)
19. a) a company has decided to computerize their operations. They have decided to purchase package instead of developing their own programs. Give three advantages and two disadvantages of this approach. 5mks)
b) i) explain why a value such as 611233444555 may be displayed as ######### When typed in a cell of a spreadsheet (2mks)
ii) How can the problem in b (i) above be corrected? (2mks)
c) With reasons, briefly describe the most appropriate type of printer output device for the output of: (6mks)
i) Customer invoices on multi-part stationery
ii) Letters to customers
iii)Detailed engineering designs
20. a) Distinguish between the following pair of terms (6mks)
i) Data verification and data validation
ii)Data encryption and passwords
COMPUTER STUDIES
PAPER 1
(THEORY)
OCT./NOV. 2005
2 ½ HOURS
SECTION A (40 MKS)
Answer all the questions in this section.
1. a) What is disk formatting? (1mk)
b) Indicate whether the following devices are used for input or output (2mks)
i) Plotter
ii)Light pen
iii)Mouse
iv)Visual display unit
2.a)Explain why the following and give one reason why they are not allowed in a computer laboratory. (2mks)
b) For each of the following give one reason why they are not allowed in a computer laboratory. (2mks)
i) Smoking
ii)Eating foods
3.Distinguish between Real, integer and Character data types as used in programming (3 mks)
4.The cells k3 to K10 of a worksheet contain remarks on student’s performance such as very good, good, fair and fail depending on the average mark. Write a formula that can be used to count all students who have the remark “very good” (3mks)
5.a) State the purpose of registers in a computer system (1mk)
b)Name two multiprogramming operating systems (2 mks)
6.a) A series file comprises of records placed in positions 1 to 10. State the position of the end of file marker. (1mk)
b)State the purpose of each of the following: (2mks)
i)File server software
ii)Communication software
7.a) Name the control structure depicted by the flowchart below. (1 mk)
b)Explain the following terms as used in program implementation. (2mks)
i)Parallel running
ii)Direct change over
8. Consider the linear arrays:
i) AAA (5:50)
ii)BBB (-5:10)
iii)CC (18)
Find the number of elements in each array (3mks)
9.Define the term artificial intelligence (2 mks)
10.Name two types of relationships that can be applied in database design (2mks)
11.Explain binary Coded Decimal code of data representation (1 mk)
a)Indenting
b)Alignment
c)Word wrap
12.Outline two ways in which a computer can be used in hotels (2 Marks)
13.a)Explain Binary Coded Decimal code of data representation (1marks)
b)Write the number 4110 in BCD notation (1 mk)
14.Arrange the following data units in ascending order of size.
BYTE, FILE, BIT, NIBBlE (2mks)
15.State two health issues that may result from prolonged use of computers (2 mks)
SECTION B (60 MARKS)
16. a) State the stage of program development in which (4 mk)
i) A flowchart would be drawn
ii)The programmer would check whether the program does as required
iii)The user guide would be written
iv)The requirements specifications would be written.
b)State the output of the following flow chart segment (1mk)
c) i)Draw a flowchart to compute the combined resistance ® of two resistors R1 and R2 in parallel using the formula;
(5mks)
ii)Write a program using Pascal or C languages for the flowchart in C (i) above. (5 ½ mks)
17. a)List three paragraph formatting activities in word processing (3mks)
b)Differentiate between bolding and highlighting text (2mks)
c) The following information shows the income and expenditure for “bebayote “ matatu for five days. The income from Monday to Friday was Kshs. 4,000, 9,000, 10, 000, 15,000 and 12,000 respectively while the expenditure for the same period was Kshs. 2,000, 3,000, 7,000, 5,000 and 6,000 respectively
i)Draw a spreadsheet that would contain the information. Indicate the rows as 1, 2, 3 …. And the columns as a, B, C (4mks)
ii)State the expression that would be used to obtain:
I Monday’s profit (2mks)
II Total income (2mks)
III)Highest expenditure (2mks)
18.a) Subtract 0112 from 10012 (1mk)
b)Using two’s compliment, subtract 7 from 4 and give the answer in decimal notation (4mks)
c) Convert
i) 91B16 to octal (3mks)
ii) 3768 to hexadecimal (3mks)
iii) 9.62510 to binary (4 mks)
19.a) Explain what the following DOS commands will do when executed.
i) A: \copy *.* B: (2 mks)
ii) C: \> ERASE*. DOC (2mks)
iii) b: \> Md EXAMS (2mks)
b) i) With the aid of a diagram, explain hierarchical (tree) network topology (3mks)
ii)List two advantages and two disadvantage of hierarchical network topology. (4 mks)
Advantages:-
Disadvantages:
20. a)Name and explain the function of the keyboard keys represented by the following symbols.
b) Simulation is one of the application areas of computers
i) What is meant by the term simulation (1mk)
ii)Name two application areas of simulation (2 mks)
iii) State three advantages of computer based simulation (3 mks)
c) Explain three ways in which computers have impacted education (3mks)
Computer Studies KCSE 2006 Paper 1
SECTION A (40 MARKS)
1.What is meant by
a)Analogue data
b)Digital data (4 mks)
2. Distinguish between transcription and transposition types of errors and give an example of each (4mks)
3. a)What are peripheral devices? (1mk)
b)Give two examples of peripheral devices (1mk)
4a)What meant by the term user-friendly as used in software development? (1mk)
b)Distinguish between the terms single-tasking and multi-user as used in operating systems (2mks)
5.What actions should be taken in case of a fire outbreak in the computer laboratory? (4mks)
6a) What is an Internet Service Provider? (1mk)
b) An employee in a business company is charged with the responsibility of putting the company advertisements on the Internet.
i) State the professional title of the employee. (1mk)
ii) Give an example of software used by this employee to carry out the above task. (1mk)
7.Differentiate between COM ports and LPT ports (2mks)
8.Explain two ways in which ICT can enhance commerce. (2mks)
9. Explain the following software terms:
a) Portability (1 mk)
b) Modularity (1 mk)
10. a) State two application areas of desktop publishing software. (2mks)
b) Explain the following graphic terms:
i) Rotate (1 mk)
ii) Crop (1mk)
12. a)List two arithmetic operations that can be performed on a row of numeric data in a word processing table. (1 mk)
b) In each case of (a) above, write the expression used. (2mks)
13. List two methods of gathering information during the system development process (2mks)
14.Name three types of optical disks.(3mks)
15.The diagram below shows a formatted plate surface of a storage disk.
Shade and label:
a) one sector ( 1mk)
b) One block (1mk)
SECTION B (60 MKS)
Answer question 16 and any other three questions from this section in the space provided
16 a) List two examples of:
i) Third generation languages (2mks)
ii) Object oriented languages (2 mks)
b) Draw a flowchart to compare three non-equal numeric values A, B, C and prints the largest of the three. (11 mks)
17 a) One of the functions of an operating system is job scheduling. Explain what is meant by job scheduling. (1mk)
b)List and explain three types of user interfaces. (6 mks)
c)Describe the following categories of software:
i) Firmware (1mk)
ii) Proprietary software (1mk)
d) a new company XYZ intends to go into the business of desktop publishing. Advise the company on three computer hardware system specification features to consider as a measure of enhancing performance. (6 mks)
18. a) distinguish between the following sets of terms as used in spreadsheets. (2mks)
i)Worksheet and workbook
ii) Filtering and sorting
b) State one way in which a user may reverse the last action taken in a spreadsheet package. (1 mk)
c)The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, . and A, B, C. respectively
SECTION A (40 MKS)
Answer all the questions in this section in the spaces provided.
1.Describe the computer booting process. (2 mks)
2. State the functions of the following keys on the computer keyboard (2 mks)
a) Backspace
b)Insert (ins)
3. Jane has noticed the following problems with her computer keyboard (2mks)
State three possible causes of these problems and how they can be solved (3mks)
4 a)Define authenticity as used in software selection (1mk)
b) List four ways of acquiring software in an organization (2mks)
5 some of the storage disk available are: zip disks, 3 ½ inch floppy disks, DVDs and 5 ¼ inch floppy disks. Arrange these devices in ascending order of storage capacity. (2mks)
6.You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:
a) Forgetting the password (1mk)
b) Hacking (1mk)
7.State four benefits of using a computer in a school library (2 mks)
8. Using six bits, find the two’s complement of -2310. (4 mks)
9. Explain data series, axis and legends as used in spreadsheet charts. (3mks)
10. a) Describe the term data integrity. (2 mks)
b) State four situations in which data may lose integrity. (2mks)
11.State the function of each of the following:
a)Network interface card (1 mk)
b)Network protocol (1 mk)
c)Hub (1mk)
12. List four types of publications that can be designed by using desktop publishing software. (2mks)
13. Differentiate between the following pair of terms as used in database design:
a) Input mask and design. (2 mks)
b) Table and query ( 2mks)
14. List four factors to be considered when purchasing an operating system. (2mks)
15 Write an algorithm to compute the area of a triangle. (2mks)
SECTION B (60 MARKS)
Answer question 16 and any other three questions from this section in the spaces provided
16. Study the flowchart below and answer the questions that follow
i) Name the control structures used in the flowchart (2mks)
ii) Determine the values of M, N, P and Q. ( 4 mks)
M………………………….. N………………………..
P ………………………….. Q ………………………
iii) Write the pseudo code for the flowchart (7mks)
b) List four functions of an assembler (2 mks)
17. Define the following web related terms:
i) Web browser (1mk)
ii) Hyperlink (1mk)
iii) Hypertext document (1mk)
b) List six activities performed on the web (3mks)
c) An institution has ten stand alone computers
i) Suggest with reasons the most appropriate topology required to inter-connect the computers. (3mks)
ii) State the necessary steps required to connect the computers to the internet. (4mks)
d) Below is an email address:
Name the parts labeled:
i)
ii)
iii)
18.A computer C directory has folders for form 1, form 2, Form 3 and form 4. Each class has student’s folders labeled according to their number. The students create their own folder for the subject the are studying based on the table shown below
Form 1 |
Form 2 |
Form 3 |
Form 4 |
OS |
SP |
Pr. |
ADB |
WP |
DTP DB |
Internet |
|
a)Assuming there is one student per class, draw the corresponding directory tree structure. (6 mks)
b) i) a form four student wants to create a folder to store her project. State the path for that project folder.(2 mks)
ii)Suggest how the student can ensure that:
1. Work is not lost in case the hard disk fails. (1mk)
2. The project is not copied by other students. (1mk)
c) i). Other than I/O devices, list other three devices under the control of the operating system. (3mks)
ii)Explain any one of the devices named in C (i) above (1mk)
d)Define the term trouble shooting (1mk)
19. A manager wishes to replace the current manual system with a computerized one
a)Describe three main areas that must be evaluated to justify the replacement (6mks)
b) List the three areas that would be considered in the requirements specifications. (3mks)
c)State and explain three ways that can be followed to replace the current system (6mks)
20. a) A head teacher keeps the following student details in a database: Name, Address, Town, Date of Birth, Marks scored, Fees paid.
i)Name the most appropriate primary key. Give a reason (2mks)
ii)For each item in the student’s details above, indicate its most appropriate data type as used in the database. (3mks)
iii)Explain why input screens are better data entry designs than entering data directly to a table. (2mks)
b)List two career opportunities associated with databases. (2mks)
c)Distinguish between:
i) A table in a word-processing application and a table in a database application (2mks)
ii)Mouse pointer and insertion point. (2mks)
d)Outline the steps to be followed in order to merge cells in a word processing table. (2mks)
COMPUTER STUDIES 2016 PAPER 1
b) an architectural drawing where precision is required (1mk)
(c ) producing document output for a visually impaired person (1mk)
KCSE 2016 COMPUTER STUDIES PAPER 1
A manager wishes to replace the current manual system with a computerized one. Describe three areas that must be evaluated to justify the replacement (6 marks)
Headache, back and neck pain may result from the use of computers. State how each of them can be minimized (2mks)
Students of a school intended to elect their school Captain by secret ballot. State three ways in which computers can be used to improve the election process (3mks)
KCSE 2016 COMPUTER STUDIES PAPER 1
State the function of each of the following keys on the computer keyboard : (2mks)
Backspace;
Insert
An organization intends to replace an existing system by carrying out the process in stages .
Name the implementation strategy ; (1mk)
Give two reasons why the organization is opting to use the implementation strategy in (a) above (2mks)
KCSE 2016 COMPUTER STUDIES PAPER MARKING SCHEME
State the function of each of the following keys on the computer keyboard : (2mks)
Backspace;
Insert
An organization intends to replace an existing system by carrying out the process in stages .
Name the implementation strategy ; (1mk)
Give two reasons why the organization is opting to use the implementation strategy in (a) above (2mks)
A manager wishes to replace the current manual system with a computerized one. Describe three areas that must be evaluated to justify the replacement (6 marks)
Headache, back and neck pain may result from the use of computers. State how each of them can be minimized (2mks)
Students of a school intended to elect their school Captain by secret ballot. State three ways in which computers can be used to improve the election process (3mks)
Explain why intranet is a more secure way to share files within an organization compared to internet (2mks)
List two career opportunities directly associated with computer networking (2mks)
Distinguish between a formula and a function as used in spreadsheets
The C directory of a computer has folders named Form 1, Form 2, Form 3 and Form 4. Each class has students’ folder named according to their admission number. The student created their own folder for subjects they are studying based on the table below: