admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Give a reason why HMTL is not regarded as a programming language

  •  It does not have declaration part
  • It does not  have control structures
Question Image

Interfaces enable computer users to interact with the operating system.

(a) State four advantages for using a graphical user interface in loading programs and files

(b) A vehicle assembly company has introduced robots to replace the human workforce.  State two effects this would have on the workforce

State four advantages for using a graphical user interface in loading programs and files

  • User friendly
  • No need to know command language as commands are executed by clicking on icons
  • Allows multitasking as several programs open at the same time therefore easier to switch between applications
  • Selecting an item using a mouse is easier and faster than entering commands

Or any other correct response

Advantage @ 1 Mark

Total = 4 X 1 Mark

= 4 Marks

 

A vehicle assembly company has introduced robots to replace the human workforce.  State two effects this would have on the workforce                

  • Unemployment
  • Need to retrain
  • No longer need to do hazardous or tedious jobs
  • Employment of skilled staff who will manipulate the robots

Or any other correct response

Effect @ 1 Mark

Total = 2 X 1 Mark

= 2 Marks

Question Image

Jane has noticed the following problems with her computer  (2mks)

  • It is taking a longer time to start up;
  • It is often hanging;
  • Applications are taking longer to load.

State three possible causes of these problems and how they can be solved (3mks)

There could be several possible causes for the issues Jane is experiencing with her computer keyboard, including:

1. Software Issues
   - Cause: Outdated or corrupt system files, drivers, or operating system.
   - Solution:
     - Ensure the operating system and drivers are up-to-date.
     - Run a system file checker to repair any corrupted system files (e.g., on Windows, run "sfc /scannow" from the Command Prompt).
     - Consider reinstalling the operating system if issues persist.

2. Hardware Issues:
   - Cause: Physical damage or malfunction in the keyboard hardware.
   - Solution:
     - Check for physical damage or debris under the keys and clean the keyboard if necessary.
     - If cleaning doesn't help, consider replacing the keyboard with a new one.

3. Resource Overload:
   - Cause: The computer may be running too many background processes or lacking sufficient hardware resources.
   - Solution:
     - Close unnecessary background applications and processes to free up system resources.
     - Consider upgrading the computer's RAM, CPU, or storage if it's outdated and unable to handle current software demands.
     - Use task manager or activity monitor to identify and terminate resource-intensive processes.

4. Malware or Viruses:
   - Cause: Malicious software can slow down a computer, cause hanging, and delay startup.
   - Solution:
     - Perform a full system scan using reputable antivirus or anti-malware software to remove any threats.
     - Ensure that the operating system's security patches are up-to-date.

5. Disk Fragmentation:
   - Cause: Fragmented files can slow down the loading of applications and overall system performance.
   - Solution:
     - Run a disk defragmentation tool (e.g., Windows' built-in tool) to optimize file storage on the hard drive.
     - Consider upgrading to a solid-state drive (SSD) for faster application loading times.

6. Insufficient Storage:
   - Cause: If the hard drive is nearly full, it can cause slow performance.
   - Solution:
     - Free up space by deleting unnecessary files and programs.
     - Consider upgrading to a larger capacity hard drive or SSD if storage space remains an issue.

7. Background Processes and Startup Items:
   - Cause: Too many unnecessary programs running in the background or starting up with the computer.
   - Solution:
     - Disable or remove unnecessary startup items and background processes to improve startup time.
     - Use the Task Manager or System Preferences (on macOS) to manage startup items.

It's important to diagnose the specific cause of the issues Jane is facing by troubleshooting each potential problem one by one. In some cases, a combination of these solutions may be necessary to fully resolve the problems with her computer keyboard.

Question Image

State the advantages and disadvantages of the command-line interface

Advantages

  • It is quicker to type commands
  • Little memory needed
  • Little processing power needed

Disadvantages

  • Commands have to be typed precisely
  • There is a large number of commands to be learnt
  • It is not user friendly
  • The user has to remember commands
  • Users cannot transfer data between applications
Question Image

Differentiate between active matrix and passive matrix LCDs

 

  • Passive matrix create images by scanning the entire screen whereas active matrix displays are made using thin-film transistors technology(TFT)
  • active matrix  display has a higher resolution compared to passive matrix
  • Active matrix consume more energy than passive matrix
Question Image

Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.

Blagging

  • This is where a victim is tricked/persuaded by a fraudster to give their details or payment information for a false reason/purpose;

Phishing

  • This is where the victim receives and responds to communication that appears to be from a valid or known source but is in fact fraudulent. (It allows the fraudster to capture private information before the victim realises);

Shouldering

  • This is where someone watches and records\remembers a victim entering their pin or security information such as passwords. (They can then use this information to gain access to a system)
Question Image

Describe each of the following types of a program errors, giving an example in each case.

(i) Syntax error.
(ii) Logic error.
(iii) Arithmetic error/runtime error

(i) Incorrect use of language, e.g. PLINT instead of PRINT
(ii) A mistake in the structure of the solution, e.g. a jump goes to the wrong line
(iii) Inappropriate arithmetic is used, e.g. division by 0 is attempted

Question Image

KCSE 2003 COMPUTER STUDIES

SECTION A (40 MARKS)

Answer all the questions in this section

1.Computer systems are built from three types of physical components: processors,memories and 1/O devices.

  a) State two tasks of a processor                                                            (2 mks)

  b)State function of 1/O devices                                                               (1 mk)

2. Threats to the safety of computer systems take many forms such as:  white-collar crime, natural disasters, vandalism and carelessness.Give on way as to how each of these forms of threats can be controlled.    2 mks)

3.a) Explain the term nibbles as used in data representation in computers

   b)Perform the following binary arithmetic giving the answers in decimal notation.     (3 mks)

       i)1110.01111 + 11010001 .011

        ii) 1001011.011 - 111.111

     4  a)  Distinguish between machine and assembly language           (2mks)

         b) State the type of translator necessary for a program written in:         (2mks)

            i) High level language

           ii)Assembly language                                                    

5. Briefly explain the purpose of the following types of program documentation: (3mks)

    a)  User manual

     b) Reference guide

     c) Quick reference guide

6. State any two features of a user-friendly program.      (2mks)

7 a) Distinguish between labels and formulae with respect to spreadsheets (2mks)

   b) Consider the entries in the cells below.

 

Cell

B2

B3

C10

C11

C13

Entry

200

100

B2

B3

C10

State the value displayed in cell C13                                      (2 mks)

8.List three differences between wide area Networks (WAN) and Local Area Networks (LAN)      (3mks)

9. Study the flowchart segment below and state the last value printed from the flowchart.         (2 mks)

10.  a) What is an expert system                                                        (1mk)

      b)State any two components of an expert system                     (2mks)

11. give two reasons why optical disks are better storage media compared to floppy diskettes  (2mks)

12.What are the Dos commands used for the following?                       (2mks)

            a) Changing directories

            b) Viewing directories

           c)  Renaming directories

            d) Deleting a directory

13. Distinguish between copying and moving text                                  (2mks)

14. a) Name two methods of paper orientation                                (1mk)

     b)Name two keys used to delete text in a document   (1 mk)

15.Name two features a Database package                                             (2mks)

SECTION B (60 MKS)

Answer question and any other three questions from this section

16.       Study the flowchart below and answer the questions that follow.

 a)Write a high-level language program for the above flowchart (7mks)

 b)List the outputs of the flowchart above                                 (5 mks)

 c) Modify the flowchart so that it adds up all its outputs and displays the sum obtained  (3mks)

17. A computer specification has the following details:

  •  Pentium II
  • 1.44 MB floppy disk drive
  • 20 GB hard disk
  • Full multimedia
  • 17” SVGA monitor
  • Pre-installed operating system
  • Pre-installed office suite

     a)  What is meant by

       i)  1.44 MB floppy disk drive?

       ii)20 GB hard disk?

      iii) 17” SVGA monitor

     b) Which operating system might be pre-installed in this computer and why?         (2mks)

     c) List three multimedia components                                          (3 mks)

      d) i)  what is meant by computer aided manufacture?        (2 mks)

          ii)  Give two examples of computer aided design software.       (2mks)

18. a)Give three examples of network software                                          (3mks)

     b)List any three items that may be referred to as data terminal equipment in a network     (3 mks)

     c)Briefly explain the following terms as used in networking   (4mks)

      i) Remote communication

      ii)Distributed processing

      d) State three advantages and two disadvantages of mesh network topology. (5mks)

19. a)  a company has decided to computerize their operations.  They have decided to purchase package instead of developing their own programs.  Give three advantages and two disadvantages of this approach. 5mks)

      b) i) explain why a value such as 611233444555 may be displayed as ######### When typed in a cell of a spreadsheet (2mks)

       ii)  How can the problem in b (i) above be corrected?      (2mks)

      c) With reasons, briefly describe the most appropriate type of printer output device for the output of:  (6mks)

      i) Customer invoices on multi-part stationery

     ii) Letters to customers

     iii)Detailed engineering designs

20. a)  Distinguish between the following pair of terms                                (6mks)

      i) Data verification and data validation

      ii)Data encryption and passwords

            

Question Image

List Three file organisation methods in a computer

  • Sequential
  • Random
  • Serial
  • Indexed-sequential
Question Image

Define the following

(a) Cookies

(b) Spyware

(c) Phishing

(d)Spam

(e) Pharming

 

 

(a) Cookies

  • Information that a website stores about a user on their hard disk; this enables
    the website to remember details about the user when they next visit the website.

(b) Spyware

  • Program installed on a PC to gather information about the user. It monitors
    every key press and relays the information back to the home base

(c) Phishing

  • Sending an email that claims to be from a legitimate company; the recipient is then directed to a bogus website where their personal details will be collected

(d)Spam

  • Junk/ (unsolicited) electronic mail advertising products and services sent to a general mailing list.

(e) Pharming

  • Malicious code installed on a PC or on a server. This code directs users to a
    a fraudulent website without their knowledge.
Question Image

Explain why a developer, who is good at both low-level and high-level programming, would normally use high-level languages when writing programs.

  • High-level languages have built-in functions;
  • High-level languages have built-in libraries;
  • High-level languages have more support/help;
  • High-level languages have structures (such as selection and iteration);
  • High-level languages can be less machine-dependent/more portable;
  • It (usually) requires fewer lines of code to be written;
  • It is (usually) quicker to develop code in high-level languages;
  • It is easier to find mistakes in code;
  • The code is easier to maintain//understand;
  • It is easier to structure code in high-level languages;
Question Image

Explain the function of the protect sheet feature in the spreadsheet program

  • It is a feature used to prevent unwanted changes to be made on the data contained in a sheet by limiting the ability to make changes
Question Image

State Examples of utility programs

 

Encryption software

  • Scramble/encode/mix up data so it cannot be read/understood if intercepted/stolen

Defragmentation s/w

  • Move free space together and Move files together hence enabling Faster access to files

(Data) compression s/w

  • Reduce the file size of files or makes files smaller inorder  To use less storage space
  • enables Faster transmission
  • enables storage of more files

Anti-virus / anti-malware s/w

  • To help protect computer/data against viruses/malware
  • To scan the computer to look for/quarantine/remove viruses/malware

Disk analysis and repair s/w

  • Scan disk and look for faults
  • Prevent the loss of data due to faulty disk

Auto-update

  •  Checks Internet for new versions of software/OS
  • Downloads and installs without user interaction

Firewall

  • Examine incoming and outgoing traffic
  • To help restrict/prevent unauthorised access over a network

...over a network/external source

Question Image

Ochieng manages a network for an organisation.
(a) Two computers are assigned the same IP address.
Explain why Ochieng must change the IP address of one of the computers.

  • Devices must have a unique IP address because otherwise, a switch would not know which of the two was the correct device to send packets to

(b) Identify the network topology that requires a server.

  • Star topology

Ochieng manages a network for an organisation.
(a) Two computers are assigned the same IP address.
Explain why Ochieng must change the IP address of one of the computers.

  • Devices must have a unique IP address because otherwise, a switch would not know which of the two was the correct device to send packets to

(b) Identify the network topology that requires a server.

  • Star topology
Question Image

(b) The computer needs an operating system and utility software.

(i) The operating system controls the scheduling of processes.

Describe how the operating system uses scheduling to allocate processor time.

 

  • All processes are held in a queue 
  • Processes are prioritised 
  • Processes are switched On each clock cycle
Question Image

A computer game involves driving a racing car around a track. State which two modes of data processing  would be appropriate, justifying your answers

  • Real time  E.g. turning the wheel must turn the car immediately
  • On line - Otherwise system cannot be real time
Question Image

A protocol is used to securely transmit the data for the website to the browser.
(i) State the name of this protocol.

(ii) Identify how this protocol changes the data to transmit the data securely.
 

(i) State the name of this protocol.   HTTPS 

(ii) Identify how this protocol changes the data to transmit the data securely.

  • It encrypts it
  • It applies encryption algorithm
  • It applies an encryption key
Question Image

The following are software classified according to the end user licence agreement. Briefly describe each of them:

open source software, freeware, shareware, and proprietary software

Open source : refers to software provided freely with its source code. The user can modify and redistribute the software.

Freeware: these are software that can be downloaded for free and distributed, buta  the source code is hidden and cannot be altered.

Shareware: is software that is available for free within a given trial period, after which it must be bought.

Proprietary: software made for commercial purposes. The source code is hidden, and it can only be used after paying for a licence.

 

Distinguish between one to one and one to many relationships as used in relational databases

One to one  - Each record in the parent table has exactly one related record in the child table, and vice versa.

One to Many -  Each record in the parent table can have multiple related records in the child table, but each record in the child table is related to only one record in the parent table

Question Image

Identify one component common to all computers.

  • Processor
Question Image