KCSE 2021 Computer Studies Paper Prediction 1 SECTION B
Answer question 16 and any other three questions from this section in the spaces provided.
16. a) With the aid of a flow chart, describe a loop control structure as used in programming. [4]
A control structure that allows statement(s) to be repeatedly executed until a certain condition is met 2mks
NB. Accept any other looping construct
Apart from the user interface, name three other components that make up a typical expert system.
– knowledge base
– rule(s) base
– inference engine
– explanation system
– (expert system) shell
In reference to word processing, define the following terms
Word wrap
Justification
Drop cap
Word wrap - Is a word processing feature in which a word that does not fit in the current line is automatically moved at the start of the next line
Justification - refers to aligning text on both left and right margins
Drop cap - Make the first character of a paragraph occupy more than one line below it
Explain the purpose of each of the following features of a spreadsheet chart (KCSE 2021 Computer Studies, Q19 (a))
Legend
A data series
Data Marker
Explain the purpose of each of the following features of a spreadsheet chart (KCSE 2021, Q19 (a))
Legend
A data series
Data Marker
https://www.lifewire.com/data-series-data-points-data-labels-3123411
Explain the following terms
(a) Disk mirroring
(b) Encryption
(c) Backup
(a) Disk mirroring- Data is written on two or more disks simultaneously.
(b) Encryption - Contents are scrambled so they cannot be understood without a decryption key
(c) Backup - A copy of the data is taken and stored in another location
State two benefits of using computerised traffic control systems
Describe two features you would expect to see in the expert system’s interactive user interface.
– multiple choice/yes-no answers
– easy to understand interface e.g. use of icons/drop down menus etc.
– output shown as % probabilities of fault
For your item named in (a) describe two different tasks that the microprocessor performs.
List three types of errors that are likely to exist in a program (3 marks)
Syntax errors-Incorrect use of programming language
Logical errors- The program do not give the expected output
Runtime errors- Premature end of a program
What is a web browser?
Describe one way developers ensure that their software addresses inclusivity issues.
Incorporate language support features in their software, which allows users to select their preferred language. This can be achieved through multi-language user interfaces and providing translation capabilities. By doing so, developers address language barriers and make the software accessible to a broader audience, demonstrating a commitment to cultural inclusivity.
Gender inclusivity – use gender-neutral language in examples
Cultural/Racial inclusivity – use a variety of ethnicities in photos
Ability inclusivity – represent awareness of disability in some examples
Sexual preference inclusivity – use language that is supportive of LGBTQI+ people
KCSE 2003 COMPUTER STUDIES
SECTION A (40 MARKS)
Answer all the questions in this section
1.Computer systems are built from three types of physical components: processors,memories and 1/O devices.
a) State two tasks of a processor (2 mks)
b)State function of 1/O devices (1 mk)
2. Threats to the safety of computer systems take many forms such as: white-collar crime, natural disasters, vandalism and carelessness.Give on way as to how each of these forms of threats can be controlled. 2 mks)
3.a) Explain the term nibbles as used in data representation in computers
b)Perform the following binary arithmetic giving the answers in decimal notation. (3 mks)
i)1110.01111 + 11010001 .011
ii) 1001011.011 - 111.111
4 a) Distinguish between machine and assembly language (2mks)
b) State the type of translator necessary for a program written in: (2mks)
i) High level language
ii)Assembly language
5. Briefly explain the purpose of the following types of program documentation: (3mks)
a) User manual
b) Reference guide
c) Quick reference guide
6. State any two features of a user-friendly program. (2mks)
7 a) Distinguish between labels and formulae with respect to spreadsheets (2mks)
b) Consider the entries in the cells below.
|
Cell |
B2 |
B3 |
C10 |
C11 |
C13 |
|
Entry |
200 |
100 |
B2 |
B3 |
C10 |
State the value displayed in cell C13 (2 mks)
8.List three differences between wide area Networks (WAN) and Local Area Networks (LAN) (3mks)
9. Study the flowchart segment below and state the last value printed from the flowchart. (2 mks)
10. a) What is an expert system (1mk)
b)State any two components of an expert system (2mks)
11. give two reasons why optical disks are better storage media compared to floppy diskettes (2mks)
12.What are the Dos commands used for the following? (2mks)
a) Changing directories
b) Viewing directories
c) Renaming directories
d) Deleting a directory
13. Distinguish between copying and moving text (2mks)
14. a) Name two methods of paper orientation (1mk)
b)Name two keys used to delete text in a document (1 mk)
15.Name two features a Database package (2mks)
SECTION B (60 MKS)
Answer question and any other three questions from this section
16. Study the flowchart below and answer the questions that follow.
a)Write a high-level language program for the above flowchart (7mks)
b)List the outputs of the flowchart above (5 mks)
c) Modify the flowchart so that it adds up all its outputs and displays the sum obtained (3mks)
17. A computer specification has the following details:
a) What is meant by
i) 1.44 MB floppy disk drive?
ii)20 GB hard disk?
iii) 17” SVGA monitor
b) Which operating system might be pre-installed in this computer and why? (2mks)
c) List three multimedia components (3 mks)
d) i) what is meant by computer aided manufacture? (2 mks)
ii) Give two examples of computer aided design software. (2mks)
18. a)Give three examples of network software (3mks)
b)List any three items that may be referred to as data terminal equipment in a network (3 mks)
c)Briefly explain the following terms as used in networking (4mks)
i) Remote communication
ii)Distributed processing
d) State three advantages and two disadvantages of mesh network topology. (5mks)
19. a) a company has decided to computerize their operations. They have decided to purchase package instead of developing their own programs. Give three advantages and two disadvantages of this approach. 5mks)
b) i) explain why a value such as 611233444555 may be displayed as ######### When typed in a cell of a spreadsheet (2mks)
ii) How can the problem in b (i) above be corrected? (2mks)
c) With reasons, briefly describe the most appropriate type of printer output device for the output of: (6mks)
i) Customer invoices on multi-part stationery
ii) Letters to customers
iii)Detailed engineering designs
20. a) Distinguish between the following pair of terms (6mks)
i) Data verification and data validation
ii)Data encryption and passwords
KCSE 2016 COMPUTER STUDIES PAPER MARKING SCHEME
State the function of each of the following keys on the computer keyboard : (2mks)
Backspace;
Insert
An organization intends to replace an existing system by carrying out the process in stages .
Name the implementation strategy ; (1mk)
Give two reasons why the organization is opting to use the implementation strategy in (a) above (2mks)
A manager wishes to replace the current manual system with a computerized one. Describe three areas that must be evaluated to justify the replacement (6 marks)
Headache, back and neck pain may result from the use of computers. State how each of them can be minimized (2mks)
Students of a school intended to elect their school Captain by secret ballot. State three ways in which computers can be used to improve the election process (3mks)
Explain why intranet is a more secure way to share files within an organization compared to internet (2mks)
List two career opportunities directly associated with computer networking (2mks)
Distinguish between a formula and a function as used in spreadsheets
The C directory of a computer has folders named Form 1, Form 2, Form 3 and Form 4. Each class has students’ folder named according to their admission number. The student created their own folder for subjects they are studying based on the table below:
Describe one effect of not having primary keys in tables in a relational database
Without a primary key, a table in a database may have duplicate rows, making data not uniquely identifiable. This can lead to issues with data integrity and challenges in maintaining relationships between tables. Retrieving and updating specific records becomes problematic, and setting referential integrity constraints is impossible, potentially leading to loss of data.
Differentiate between Physical and logical topologies
State two reasons for the increased use of computers in offices (2 marks)
State the primary function of the Dynamic Host Configuration Protocol (DHCP) protocol.
KCSE 2016 COMPUTER STUDIES PAPER 1
State the function of each of the following keys on the computer keyboard : (2mks)
Backspace;
Insert
An organization intends to replace an existing system by carrying out the process in stages .
Name the implementation strategy ; (1mk)
Give two reasons why the organization is opting to use the implementation strategy in (a) above (2mks)
A company has decided to use a computer for stock control. Describe the process of systems development from the time the decision was made to proceed with computerisation until final testing.
specify output requirements
design documents/screen displays
data for input/storage
form design
storage devices
file structures/access/design
data security/back up files
systems flowchart etc.
implementation i.e. pilot/intermediate/parallel running
testing strategy
training
hardware/software
programming/algorithms
validation
user manual
technical documentation
entering data into system
Computer System Questions
Parallel data transmission
Serial data transmission
b) Give one benefit of each type of data transmission.
Serial
Give one application of each type of data transmission. Each application must be different
Parallel
Serial
State what is meant by the term USB
Describe two benefits of using USB connections between a computer and a device.
DVD - optical media which use one spiral track; red lasers are used to read and write data on the media surface; makes use of dual-layering technology to increase the storage capacity
ROM - non-volatile memory chip; contents of the chip cannot be altered; it is often used to store the start-up routines in a computer (e.g. the BIOS)
SSD/ Solid State Drive/memory (SSD): a non-volatile memory device that uses NAND flash memories (which consist of millions of transistors wired in series on single circuit boards)
Blue Ray - optical media that uses blue laser technology to read and write data on the media surface; it uses a single 1.1 mm polycarbonate disc
Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms.
Virus
Pharming - malicious code/software installed on a user’s hard drive/actual webserver
– this code redirects users to a fake website (without their knowledge)
– to obtain personal/financial information/data
Phishing - legitimate-looking emails sent to a user – as soon as the recipient opens/clicks on the link in the email/attachment, the user is directed to a fake website (without their knowledge) – To obtain personal/financial information/data
control bus- this bus carries signals used to coordinate the computer’s activities
address bus - this uni-directional bus carries signals relating to memory addresses between processor and memory
data bus - this bi-directional bus is used to exchange data between processor, memory and input/output devices
The seven stages in a von Neumann fetch-execute cycle
Modern LCD monitors and televisions use LED-backlit technology.
Give two advantages of using this new technology compared to the older cold cathode fluorescent lamp (CCFL) method