admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

A family has purchased a computer system with the following specification:

Processor speed 2200 MHz
RAM 512 Megabyte
Hard disk drive 120 Gigabytes
CD ROM
DVD writer
Modem 56k
Monitor 17"

(a) The computer has been purchased for buying goods and services over the Internet. Explain how each of these items of hardware would be used for this purpose.

Hard disk drive

RAM

DVD writer
Modem

Hard disk drive

  • to hold the operating system/communication and applications software/ISP software
  • for storing files/information/cookies on backing store

RAM

  • for data, computer programs and operating instructions which are moved into it/downloaded for data currently in use

DVD writer

  • Films/videos/pictures/music/multimedia data downloaded/purchased

Modem

  • link/dial up/establish communication with the Internet
  • Convert digital signals to analogue/audio tones (and vice versa) Which can travel across the telephone system
Question Image

Maranda 2024 Mock CRE Paper 2

1. a) Based on Deutro-Isaiah, describe the Messiah. (7mks)

The Messiah would be despised/ rejected

The Messiah would be treated harshly/ arrested/sentenced to death

The Messiah would be reconciling people through His suffering

The death of the Messiah would bring forgiveness of sins of humankind

The Messiah would endure suffering/humiliation without complaining/ would suffer innocently

The Messiah would have nothing attractive

The Messiah would be humble/simple

The Messiah would be highly honored

The Messiah would succeed in His work

He would be despised, rejected, wounded oppressed and afflicted 

He endured pain and suffering which would have been ours. 

Because of our sins he was wounded 

We are healed by the punishment he suffered He was treated harshly but he never said a word 

He was put in the grave with the wicked 

He was buried with the rich even though he did not commit a crime 

He took the place of many sinners and prayed that they might be forgiven.

 

Question Image

Maranda Mock CRE Paper 2 2024 

c) Six ways in which Christians can assist the physically challenged members of the society (6mks)

Establishing special institutions for them

Donating equipment, which assists them in their movement.

Giving them vocational training

Assisting them in their daily chores

Accepting them as human beings like themselves

Helping them to develop their talents e.g. games, music, drama etc.

Identifying their abilities and giving them employment.

Encouraging relatives to live with them.

Giving them financial assistance to start income generating projects 


 

a) The parable of the shrewd manager in Luke 16:1-33. (7mks)

There was a rich man who had a steward. He received charges that the steward was wasting his goods.

He called him what he was hearing about him. He told him to turn in account of his stewardship for he could no longer be steward.

The steward asked himself what he would do since his master was taking the stewardship away from him.

He was not strong enough to dig and was ashamed to beg.

He decided what to do so that people may receive him into their house when he is out of the stewardship

He was to summon his masters’ debtors one by one. He went to the first one and asked him how much he owned his master. The debtor said a hundred measures of oil, which he was told to write fifty.

He asked another how much he owned his master. He said a hundred measures of wheat he was told to write eighty

The master commended the dishonest steward for his shrewdness for the sons of his world are shrewder in dealing with their own generation that the ones light.


 

Seven causes of conflict between Jesus and the Jewish leader in Jerusalem. (7mks)

They questioned the authority Jesus was using to teach Lk 20:1-8.

Jesus accused them of persecuting and rejecting Gods servants in the parable of tenants. Lk 20:9-18.

They had conflict on the issue of whether to pay taxes to cease or not. Lk 20:19-26

The question on resurrection by the Sadducees on Levites marriage. Lk 20:27-39

He claimed to be the messiah and said that even David called Him Lord in the book of Psalms Lk 20:4-44

Jesus openly condemned the hypocrisy of the Jewish leader Lk 20:45-47

Jesus prophesied the destruction of temple of Jerusalem

He condemned the offerings of the rich Jewish leaders, which were meant to show off, but praised the widows’ offerings, which was made out of self-sacrifice Lk 21:1.


 

Six ways in which parents can resolve misunderstanding with their children. (6mks)

Allowing dialogue

Listening to their views

Presenting them with the correct, picture of the situation

Setting a good example to them

Giving them appropriate time for leisure activities

Seeking help from church leaders

Guiding them on how to choose friends

Advising them on the right moral values

Praying for and with them to bring about understanding 

Committing the children to God’s will

Discussing the problem with their friends and relatives


 

a) Seven reasons why Jesus sent the Holy Spirit to the disciples after his ascension. (7mks)

The holy spirit would comfort the disciples

He was to counsel the disciples

He would guide the disciples on what is right / God’s righteousness

He was to convict people of their sins

He was to show disciples on what is right

He was to reveal the future / enable the disciples to prophet’s / God’s will

He would glorify Jesus through the work of the disciples

He would enable the disciples to witness Christ throughout the world

He would replace the physical presence of Jesus 

He would empower the disciples to be able to speak with courage

b)How the unity of believers is expressed in the body of Christ? (8mks)

St Paul describes the believers as the body of Christ 

Christ is the head of the church

The believers form parts of the body

The body has different organs, in the same way the church has different members

They all need to work together for the well-being of the church 

Every part of the body is needed to make it whole/ all parts interdependent / one part cannot be without the other

The different church members are given different spiritual gifts by the holy spirit to carry out God’s work 

Believers are united through baptism in the Holy Spirit.


 

c)The church in Kenya help to bring about the unity in the country. (6mks)

Assisting the government is developing a curriculum schools that teaches about patriotism

Advocating for peaceful co-existence among Kenyans

Fighting corruption, discrimination, tribalism, nepotism and all forms of favourism

Acting as a voice of reason among the ruling political class demanding their unity as a government

Assisting the less fortunate in the society thus fighting disparity

Condemning and reporting to the relevant authorized groups that bring disharmony in the society

Developing joint rallies, prayers and reconciliatory meetings together.

Forgiving one another to avoid disunity

Obeying church rules/ leaders

Chastity is a virtue


 

a) Attitude of Christian towards human sexuality. (7mks)

Sex is sacred

Man and woman are for companionship

Both man and woman are equal before God

It is for procreation

Man and woman are complementary 

Man and woman were created in the image of God

They became one in marriage

Human beings have the ability to control sexual desire

All forms of irresponsible sex are condemned 

Chastity is a virtue

b)Six ways in which sex is abused in Kenya today. (6mks)

Sex before marriage / fornication/ pre-marital sex

Sex outside marriage / adultery

Prostitution

Bestiality

Homosexuality/ lesbianism/ sodomy/oral sex

Pornographic literature/mass media using of technological devices in sex

Incest

Masturbation

Rape /defilement of minors

c)Why are minors sexually abused in Kenya today? (7mks)

Permissiveness

Lack of self-control

Influence of the mass media

Mental illness / stress/ drug and substance influence

Erosion of the African culture moral value

False religious / devil worship /strange cults

To avenge for oneself

Breakdown of religious values

Irresponsible parenthood

Indecent dressing

Leniency of the law

Idleness

Poverty / unemployment

6 a) Six practices in the African Society that promoted law, order and justice? (6mks)

Cultural taboos/dos and don’ts in the society

Kinship ties had rules which governed their relationships

Oaths – swearing while making agreements.

Rites of passage e.g. during initiation, the youth were taught laws/secrets of society.

Practice of rituals in the society promoted good relationships between the living/living dead.

Communal life i.e. “I am because we are, and since we are therefore Iamb.”

Inheritance of property was done fairly which brought justice /order.

Worship of God/veneration of ancestors created orderliness

b). Seven reasons for the need of law, order and justice in the society. (7mks)

In order to safeguard peoples personal rights.

To ensure security and protection of the people and their property.

To promote peace and harmony

To attract both local and foreign investment in the country

To promote peaceful relationship between countries.

To safeguard freedom of the citizens

To control and check the powers of those in authority

To enable the gov’t to implement its taxation policies effectively and to use the money

collected for the good of the community

To enable Christians worship God in peace and freely spread the good news.


 

c) Explain the factors which hinder effective maintenance of law and order in the (7 marks)

Increase in the rate of crime especially in urban areas

Political instability e.g. Post election violence

Greed for power and wealth

Political selfishness leading to dictatorship and despotism

High rate of unemployment leading to idleness / crime

Corruption especially by custodians of the law e.g. police.

Hypocrisy i.e. leaders misleading the society

High level of poverty forcing others into crime



 

Question Image

Describe one effect of not having primary keys in tables in a relational database

Without a primary key, a table in a database may have duplicate rows, making data not uniquely identifiable. This can lead to issues with data integrity and challenges in maintaining relationships between tables. Retrieving and updating specific records becomes problematic, and setting referential integrity constraints is impossible, potentially leading to loss of data.

Question Image


(i) Give three advantages and disadvantages of using a touch-sensitive interface.

Advantages

  •  A touch screen is very intuitive
  • Easy to use as the user simply touches what they see on the display
  • Save space as no keyboard or mouse is required.
  • Touch monitors can even be mounted on the wall.
  • Touching a visual display of choices requires little thinking and is a form of direct manipulation that is easy to learn.
  • Touch screens are the fastest pointing devices.
  • Touch screens have easier hand-eye coordination than mice or keyboards.
  • No extra workspace is required as with other pointing devices.
  • Touch screens are durable in public access and in high volume usage

Disadvantages

  • Difficult for people with accessibility issues, e.g no feedback, disability
  • Can be easily damaged/scratched
  • Damaged/scratched screen prevent the interface from functioning as it should
  • Dirty screens difficult to read
  • Users must be within arm’s reach of the display
  • It is difficult to select small items
  • User's hand may obscure the screen
  • Screens need to be installed at a lower position and tilted to reduce arm fatigue
  • Some reduction in image brightness may occur
  • They cost more than alternative devices
Question Image

What is a computer virus?

A computer virus is a program designed to damage other programs or causes irregular behaviour in a computer system.

Question Image

Describe how the CPU and main memory work together.

Data and instructions are fetched from main memory, from addresses requested by the CPU on the address bus. (Data and instructions are sent) using the data bus. (Data and instructions are then) decoded and executed in the CPU.
Results of operations are sent back to the memory on the data bus

Question Image

Identify the network component that uses the IP address to send data only to its correct destination

Router

Question Image

State a circumstance under which dry-run testing is performed when developing a program (2mks)

  • To detect and remove errors
  • To confirm if the program produces the expected output
Question Image

State what is meant by each of the following modes of data  processing

(i) Batch processing.
(ii) Real-time processing.
(iii) Online processing.
(iv) Off-line processing.

(i) Jobs collected together for processing at a later time
(ii) Output produced quickly enough to affect the next input
(iii) User has direct contact with the processor
(iv) User cannot communicate directly with the processor

Question Image

State the functions of the following protocols

POP -Stands for post office protocol

  • used to download emails from email servers

SMTP- Simple Mail Transfer Protocol

  • used to send emails to email servers and transfer emails between servers

FTP - Stands for the file transfer protocol

  • handles file uploads and downloads
  • transfers data and programs and not viewable content

 

State the functions of the following protocols

POP -Stands for post office protocol

  • used to download emails from email servers

SMTP- Simple Mail Transfer Protocol

  • used to send emails to email servers and transfer emails between servers

FTP - Stands for the file transfer protoc

Question Image

A workshop has a lot of heavy machinery operating throughout the day and requires a cable to connect a workstation to a switch. Which of the following, unshielded twisted pair (UTP) or shielded twisted pair (STP) cable, would be the more suitable? Justify your response.

Shielded twisted pair cable:
A twisted pair cable is made up of four pairs of twisted copper wires, a shielded twisted pair cable applies a shield to each one of the pairs on a cable or to all of the pairs together. This shield can reduce EMI (electromagnetic interference), which would be emitted from heavy machinery. This increased data transmission quality in the workshop. STP can also reduce crosstalk.

Question Image

Differentiate between a function parameter and a function argument

A parameter represents additional information that  a function requires to perform its task. Each parameter required by a function is specified in the function header

An argument the value supplied in the function call. When the function is called, the argument value is passed into the function parameter so that the function can perform its task

Question Image

Distinguish between application and system software

  • Application software refers to software that is designed to help the computer user to accomplish specific tasks
  • Examples of application software include; Internet browsers, word processors, spreadsheets, databases etc
  • System software is software that performs tasks needed to operate the hardware and provide services to other software
  • Examples Operating Systems, Networking software, utility programs(encryption, backup, disk defragmentation software, ...)
Question Image

What is a referential integrity constraint?

  • It requires that a foreign key must have a matching primary key or it must be null
Question Image

802.3 is the standard for ethernet wired networks and 802.11x is the standard for ethernet
wireless networks.
Outline why standards such as these are important in the development of network devices and
software.

  • Standards specify a set of rules for hardware and/or software used in network communications. Because all manufacturers must adhere to the standards when manufacturing network hardware or software, it means that all devices should be able to communicate, regardless of manufacturer.
Question Image

Describe how a FRID works.

RFID stands for radio frequency identification. There is an RFID reader and tag.RFID is used in contactless credit and debit cards as well as in some hotel room cards. Inside an RFID tag is a chip that contains a small amount of memory. The chip is attached to a coil of wire which acts as an antenna. When an RFID tag is scanned, the reader emits radio waves which are picked up by the tag’s antenna. The power induced in the tag’s antenna from these waves is enough to power the chip which then uses its antenna to emit its own radio wave, which contains the information held on the chip. This wave is picked up by the reader which decodes the information and returns the information to a computer.

Question Image

There are four change-over methods used in the implementation stage of the system development life cycle (SDLC): direct change-over, phased, parallel and pilot.

Direct Change-Over

  • A date is chosen for the shutdown of the old system, then at that time, the old system
    is turned off and the new system is implemented

Phased

  • Parts of the new system are implemented in stages or for a period of time, both the old and the new system are running together until all parts of the system are implemented.
Question Image

State three features of the fifth generation computers (3mks)    [2017 paper 1]

  • Artificial intelligence
  • Parallel processing
  • Natural language processing
  • quantum computing
Question Image

Name two other input/output devices used at the POS terminal apart from keyboard and barcode reader and give a use for each device.

device: beeper/loud speaker
use: to indicate barcode correctly read/error in reading barcode
device: (LCD) screen/monitor
use: to show prices and other information about goods
device: touch screen
use: to show prices and other information about goods/to select items that need to be
weighed/identified
device: weighing machine
use: to find weight of loose items (e.g. fruit) to enable pricing
device: (magnetic) card reader/CHIP and PIN reader
use: to read customer’s debit/credit card/enable customer to pay for goods using a
credit or debit card
device: printer
use: to print receipts

Question Image