admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

KCSE 2021 Computer Studies Paper Prediction 1                SECTION B

Answer question 16 and any other three questions from this section in the spaces provided.

16. a) With the aid of a flow chart, describe a loop control structure as used in programming. [4]  

A control structure that allows statement(s) to be repeatedly executed until a certain condition is met                                                                                                      2mks

NB. Accept any other looping construct

Question Image

Apart from the user interface, name three other components that make up a typical expert system.

– knowledge base
– rule(s) base
– inference engine
– explanation system
– (expert system) shell

In reference to word processing, define the following terms

Word wrap

Justification

Drop cap

Word wrap - Is a word processing feature in which a word that does not fit in the current line is automatically moved at the start of the next line

Justification - refers to aligning text on both left and right margins

Drop cap - Make the first character of a paragraph occupy more than one line below it

Question Image

Explain the purpose of each of the following features of a spreadsheet chart (KCSE 2021 Computer Studies, Q19 (a))

Legend

  • Legends are a small visual representation of the chart's data series to understand each without confusion.

A data series

  • is a row or column of numbers that are entered in a worksheet and plotted in your chart, such as a list of quarterly business profits
  • A group of related data points or markers that are plotted in charts and graphs

Data Marker

 

 

Explain the purpose of each of the following features of a spreadsheet chart (KCSE 2021, Q19 (a))

Legend

  • Legends are a small visual representation of the chart's data series to understand each without confusion.

A data series

  • is a row or column of numbers that are entered in a worksheet and plotted in your chart, such as a list of quarterly business profits
  • A group of related data points or markers that are plotted in charts and graphs

Data Marker

  • A symbol on the chart that represents a single value in the worksheet.
  • A column, dot, pie slice, or another symbol in the chart representing a data value

https://www.lifewire.com/data-series-data-points-data-labels-3123411

Question Image

Explain the following terms

(a) Disk mirroring

(b) Encryption

(c) Backup

(a) Disk mirroring- Data is written on two or more disks simultaneously.

(b) Encryption - Contents are scrambled so they cannot be understood without a decryption key

(c) Backup - A copy of the data is taken and stored in another location

Question Image

State two benefits of using computerised traffic control systems

  • Detecting congestion.
  • Synchronizing activity between traffic lights.
  • Updating traffic light timing in real time.
  • Updating and informing drivers of ideal speeds.
  •  Prioritizing transportation flow.
  •  Reduce congestion and time spent on the road
  • By reducing congestion it will decrease pollution
  • Prioritize traffic based on changes in traffic conditions in real time.
  • This system is also helpful to reduce infrastructure damage. It is possible to identify overloaded vehicles and provide them with appropriate ways or roads, which will reduce road damage.

Describe two features you would expect to see in the expert system’s interactive user interface.

– multiple choice/yes-no answers
– easy to understand interface e.g. use of icons/drop down menus etc.
– output shown as % probabilities of fault

Question Image

For your item named in (a) describe two different tasks that the microprocessor performs.

  • camera film speed, position (end of film), distance, light
  • washing machine amount of water, speed of wash/temperature/time
  • fridge temperature, display panel
  • air conditioning temperature, timing, display pane
Question Image

List three types of errors that are likely to exist in a program                             (3 marks)

Syntax errors-Incorrect use of programming language

Logical errors- The program do not give the expected output

Runtime errors- Premature end of a program

Question Image

What is a web browser?

  • A software which can display a webpage on a user's computer screen
Question Image

Describe one way developers ensure that their software addresses inclusivity issues.

Incorporate language support features in their software, which allows users to select their preferred language. This can be achieved through multi-language user interfaces and providing translation capabilities. By doing so, developers address language barriers and make the software accessible to a broader audience, demonstrating a commitment to cultural inclusivity.

Gender inclusivity – use gender-neutral language in examples

Cultural/Racial inclusivity – use a variety of ethnicities in photos

Ability inclusivity – represent awareness of disability in some examples

Sexual preference inclusivity – use language that is supportive of LGBTQI+ people

Question Image

KCSE 2003 COMPUTER STUDIES

SECTION A (40 MARKS)

Answer all the questions in this section

1.Computer systems are built from three types of physical components: processors,memories and 1/O devices.

  a) State two tasks of a processor                                                            (2 mks)

  b)State function of 1/O devices                                                               (1 mk)

2. Threats to the safety of computer systems take many forms such as:  white-collar crime, natural disasters, vandalism and carelessness.Give on way as to how each of these forms of threats can be controlled.    2 mks)

3.a) Explain the term nibbles as used in data representation in computers

   b)Perform the following binary arithmetic giving the answers in decimal notation.     (3 mks)

       i)1110.01111 + 11010001 .011

        ii) 1001011.011 - 111.111

     4  a)  Distinguish between machine and assembly language           (2mks)

         b) State the type of translator necessary for a program written in:         (2mks)

            i) High level language

           ii)Assembly language                                                    

5. Briefly explain the purpose of the following types of program documentation: (3mks)

    a)  User manual

     b) Reference guide

     c) Quick reference guide

6. State any two features of a user-friendly program.      (2mks)

7 a) Distinguish between labels and formulae with respect to spreadsheets (2mks)

   b) Consider the entries in the cells below.

 

Cell

B2

B3

C10

C11

C13

Entry

200

100

B2

B3

C10

State the value displayed in cell C13                                      (2 mks)

8.List three differences between wide area Networks (WAN) and Local Area Networks (LAN)      (3mks)

9. Study the flowchart segment below and state the last value printed from the flowchart.         (2 mks)

10.  a) What is an expert system                                                        (1mk)

      b)State any two components of an expert system                     (2mks)

11. give two reasons why optical disks are better storage media compared to floppy diskettes  (2mks)

12.What are the Dos commands used for the following?                       (2mks)

            a) Changing directories

            b) Viewing directories

           c)  Renaming directories

            d) Deleting a directory

13. Distinguish between copying and moving text                                  (2mks)

14. a) Name two methods of paper orientation                                (1mk)

     b)Name two keys used to delete text in a document   (1 mk)

15.Name two features a Database package                                             (2mks)

SECTION B (60 MKS)

Answer question and any other three questions from this section

16.       Study the flowchart below and answer the questions that follow.

 a)Write a high-level language program for the above flowchart (7mks)

 b)List the outputs of the flowchart above                                 (5 mks)

 c) Modify the flowchart so that it adds up all its outputs and displays the sum obtained  (3mks)

17. A computer specification has the following details:

  •  Pentium II
  • 1.44 MB floppy disk drive
  • 20 GB hard disk
  • Full multimedia
  • 17” SVGA monitor
  • Pre-installed operating system
  • Pre-installed office suite

     a)  What is meant by

       i)  1.44 MB floppy disk drive?

       ii)20 GB hard disk?

      iii) 17” SVGA monitor

     b) Which operating system might be pre-installed in this computer and why?         (2mks)

     c) List three multimedia components                                          (3 mks)

      d) i)  what is meant by computer aided manufacture?        (2 mks)

          ii)  Give two examples of computer aided design software.       (2mks)

18. a)Give three examples of network software                                          (3mks)

     b)List any three items that may be referred to as data terminal equipment in a network     (3 mks)

     c)Briefly explain the following terms as used in networking   (4mks)

      i) Remote communication

      ii)Distributed processing

      d) State three advantages and two disadvantages of mesh network topology. (5mks)

19. a)  a company has decided to computerize their operations.  They have decided to purchase package instead of developing their own programs.  Give three advantages and two disadvantages of this approach. 5mks)

      b) i) explain why a value such as 611233444555 may be displayed as ######### When typed in a cell of a spreadsheet (2mks)

       ii)  How can the problem in b (i) above be corrected?      (2mks)

      c) With reasons, briefly describe the most appropriate type of printer output device for the output of:  (6mks)

      i) Customer invoices on multi-part stationery

     ii) Letters to customers

     iii)Detailed engineering designs

20. a)  Distinguish between the following pair of terms                                (6mks)

      i) Data verification and data validation

      ii)Data encryption and passwords

            

Question Image

KCSE 2016 COMPUTER STUDIES PAPER MARKING SCHEME

State the function of each of the following keys on the computer keyboard :  (2mks)

Backspace;

  • Deletes characters to the left of the cursor

Insert

  • Add characters at the cursor position
  • Toggles between overtype and insert modes

An organization intends to replace an existing system by carrying out the process in stages .

Name the implementation strategy ;  (1mk)

  • Phased change-over

Give two reasons why the  organization is opting to use the implementation strategy  in (a) above     (2mks)

  • Gives employees time to learn
  • Organizations can revert to the old system in case of failure
  • Reduces resistance by the employees
  • It is easier to find system errors as you are dealing with only one part at a time
  • Accessing parts of the old system is still is possible in case of failure of the new system

 

A manager wishes to replace the current manual system with a computerized one. Describe three areas that must be evaluated to justify the replacement  (6 marks)

  • Technical feasibility
  • Does the current technology suffice
  • Economic feasibility
  • Benefits outweigh costs/ whether the project is cost effective
  • Schedule feasibility
  • Can it be done within the schedule

                                                                      

Headache, back and neck pain may result from the use of computers. State how each of them can be minimized                               (2mks)

  • Proper lighting
  • Regular breaks
  • Use of antiglare
  • Correct position of the screen
  • Ergonomic furniture

Students of a school intended to elect their school Captain by secret ballot.  State three ways in which computers can be used to improve the election process                          (3mks)

  • Registrations of voters
  • Voter identification
  • Actual voting
  • Tallying

Explain why intranet is a more secure way to share files within an organization compared to internet (2mks)

  • Intranet involves the interconnection of computers  within  the organization hence it is easier to monitor the access and sharing of files since the users in an organization can be assigned accounts and passwords which will enable to access files they are authorized to access unlike the internet where many can access what is stored in the organization’s website

List two career opportunities directly associated with computer networking               (2mks)

  • Network administrators
  • Network engineers
  • Network technicians

Distinguish between a formula and a function as used in spreadsheets

  • A formula is a mathematical expression that returns a value
  • A function is an excel inbuilt formula that returns a value given a range of values or arguments

 The C directory of a computer has folders named Form 1, Form 2, Form 3 and Form 4. Each class has students’ folder named according to their admission number.  The student created their own folder for subjects they are studying based on the table below:

Question Image

Describe one effect of not having primary keys in tables in a relational database

Without a primary key, a table in a database may have duplicate rows, making data not uniquely identifiable. This can lead to issues with data integrity and challenges in maintaining relationships between tables. Retrieving and updating specific records becomes problematic, and setting referential integrity constraints is impossible, potentially leading to loss of data.

Question Image

Differentiate between Physical and logical topologies

  • Physical topology deals with the placement of nodes
  • Logical topology deals with the data flow  in the network
Question Image

State two reasons for the increased use of computers in offices                      (2 marks)

  • They are small and fit in a small storage space
  • They are portable hence can be carried when need to be used outside the office
  • Low power consumption
  • Have rechargeable batteries
Question Image

State the primary function of the Dynamic Host Configuration Protocol (DHCP) protocol.

  • it generates and/or allocates an IP address
Question Image

KCSE 2016 COMPUTER STUDIES PAPER 1

State the function of each of the following keys on the computer keyboard :  (2mks)

Backspace;

  • Deletes characters to the left of the cursor

Insert

  • Add characters at the cursor position
  • Toggles between overtype and insert modes

An organization intends to replace an existing system by carrying out the process in stages .

Name the implementation strategy ;  (1mk)

  • Phased change-over

Give two reasons why the  organization is opting to use the implementation strategy  in (a) above (2mks)

  • Gives employees time to learn
  • Organizations can revert to the old system in case of failure
  • Reduces resistance by the employee
  • It is easier to find system errors as you are dealing with only one part at a time
  • Accessing parts of the old system is still is possible in case of failure of the new system
Question Image

A company has decided to use a computer for stock control. Describe the process of systems development from the time the decision was made to proceed with computerisation until final testing.

specify output requirements
design documents/screen displays
data for input/storage
form design
storage devices
file structures/access/design
data security/back up files
systems flowchart etc.
implementation i.e. pilot/intermediate/parallel running
testing strategy
training
hardware/software
programming/algorithms
validation
user manual
technical documentation
entering data into system

Question Image

Computer System Questions

  1. (a)State what is meant by the terms:

Parallel data transmission

 

  • 8 bits/1 byte/multiple bits sent at a time  
  1. using many/multiple/8 wires/lines

 

Serial data transmission

  • one bit sent at a time  
  • over a single wire

b) Give one benefit of each type of data transmission.

  • Parallel - faster rate of data transmission

Serial

  1. -more accurate/fewer errors over a longer distance
  2. -less expensive wiring  
  3. less chance of data being skewed/out of synchronization/order

Give one application of each type of data transmission. Each application must be different

Parallel

  • sending data from a computer to a printer
  •  internal data transfer (buses)

Serial

  • connect computer to a modem

State what is meant by the term USB

  • universal serial bus

Describe two benefits of using USB connections between a computer and a device.

  • -devices are automatically detected and configured when initially attached
    • Impossible to connect device incorrectly/connector only fits one way
    • has become the industry standard
    • supports multiple data transmission speeds
    • lots of support base for USB software developers
    • supported by many operating systems
    • backward compatible
    • faster transmission compared to wireless

 

 

 

DVD - optical media which use one spiral track; red lasers are used to read and write data on the media surface; makes use of dual-layering technology to increase the storage capacity

ROM - non-volatile memory chip; contents of the chip cannot be altered; it is often used to store the start-up routines in a computer (e.g. the BIOS)

SSD/ Solid State Drive/memory (SSD): a non-volatile memory device that uses NAND flash memories (which consist of millions of transistors wired in series on single circuit boards)

Blue Ray -  optical media that uses blue laser technology to read and write data on the media surface; it uses a single 1.1 mm polycarbonate disc

 

Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms
.

 

 

Virus

  • - program/software that replicates/copies itself
  • – can delete or alter files/data stored on a computer
  •  – can make the computer “crash”/run slow

Pharming - malicious code/software installed on a user’s hard drive/actual webserver

 – this code redirects users to a fake website (without their knowledge)

 – to obtain personal/financial information/data

Phishing - legitimate-looking emails sent to a user – as soon as the recipient opens/clicks on the link in the email/attachment,  the user is directed to a fake website (without their knowledge) – To obtain personal/financial information/data

 

control bus- this bus carries signals used to coordinate the computer’s activities

address bus - this uni-directional bus carries signals relating to memory addresses between processor and memory

data bus - this bi-directional bus is used to exchange data between processor, memory and input/output devices

 

The seven stages in a von Neumann fetch-execute cycle

  • the PC (program counter) contains the address of the next instruction to be fetched
  • the address contained in the PC (program counter) is copied to the MAR (memory address register) via the address bus
  • the instruction is then copied from the memory location contained in the MAR (memory address register) and is placed in the MDR (memory data register)
  • the entire instruction is then copied from the MDR (memory data register) and placed in the CIR (current instruction register)
  • the value in the PC (program counter) is then incremented so that it points to the next instruction to be fetched
  • the address part of the instruction is placed in the MAR (memory address register)
  • the instruction is finally decoded and is then executed

 

Modern LCD monitors and televisions use LED-backlit technology.
Give two advantages of using this new technology compared to the older cold cathode fluorescent lamp (CCFL) method

  • no need to warm up
  • – whiter tint/more vivid colours/brighter image
  • – higher resolution
  • – much thinner monitors possible/lighter weight
  • – more reliable technology/longer lasting
  • – uses much less power/more efficient

 

Question Image