admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

List two types of network software

  • Network operating systems
  • Protocols
Question Image

KCSE 2007, COMPUTER STUDIES PAPER 1

SECTION A (40 MKS)

Answer all the questions in this section in the spaces provided.

1.Describe the computer booting process.    (2 mks)

2. State the functions of the following keys on the computer keyboard   (2 mks)

  a) Backspace

  b)Insert (ins)

3. Jane has noticed the following problems with her computer keyboard    (2mks)

  • It is taking a longer time to start-up;
  • It is often hanging;
  • Applications are taking longer to load.

 State three possible causes of these problems and how they can be solved (3mks)

4 a)Define authenticity as used in software selection  (1mk)

  b) List four ways of acquiring software in an organization     (2mks)

5 some of the storage disk available are:  zip disks, 3 ½ inch floppy disks, DVDs and 5 ¼ inch floppy disks. Arrange these devices in ascending order of storage capacity.    (2mks)

6.You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:           

a) Forgetting the password     (1mk)

b) Hacking       (1mk)              

7.State four benefits of using a computer in a school library   (2 mks)

8. Using six bits, find the two’s complement of -2310.     (4 mks)

9. Explain data series, axis and legends as used in spreadsheet charts.  (3mks)

  • Data
  • Axis
  • Legend                       

10. a) Describe the term data integrity.                                            (2 mks)

     b) State four situations in which data may lose integrity.           (2mks)

11.State the function of each of the following:

            a)Network interface card                                                           (1 mk)

            b)Network protocol                                                                    (1 mk)

           c)Hub                                                                                         (1mk)  

12. List four types of publications that can be designed by using desktop publishing software.   (2mks)

13. Differentiate between the following pair of terms as used in database design:

    a)  Input mask and design.                                                           (2 mks)

    b) Table and query                                                                      ( 2mks)

14. List four factors to be considered when purchasing an operating system.     (2mks)

15   Write an algorithm to compute the area of a triangle.   (2mks)

SECTION B (60 MARKS)

Answer question 16 and any other three questions from this section in the spaces provided

16. Study the flowchart below and answer the questions that follow

 

i) Name the control structures used in the flowchart                 (2mks)

ii) Determine the values of M, N, P and Q.                                ( 4 mks)

M………………………….. N………………………..

P ………………………….. Q ………………………

  iii) Write the pseudo code for the flowchart   (7mks)

 b)  List four functions of an assembler    (2 mks)

17. Define the following web related terms:       

 i)  Web browser   (1mk)

 ii)  Hyperlink      (1mk)

iii) Hypertext document                (1mk)

b)  List six activities performed on the web      (3mks)

c) An institution has ten stand alone computers

i)  Suggest with reasons the most appropriate topology required to inter-connect the computers.   (3mks)

ii) State the necessary steps required to connect the computers to the  internet.      (4mks)

d) Below is an email address:

                       

                     

                       

Name the parts labeled:

                        i)

                        ii)

                        iii)

18.A computer C directory has folders for form 1, form 2, Form 3 and form 4.  Each class has student’s folders labeled according to their number.  The students create their own folder for the subject the are studying based on the table shown below

 

Form 1

Form 2

Form 3

Form 4

OS

SP

Pr.

ADB

WP

DTP

DB

Internet

 

 

a)Assuming there is one student per class, draw the corresponding directory tree structure.  (6 mks)

b) i)  a form four student wants to create a folder to store her project. State the path for that project folder.(2 mks)

ii)Suggest how the student can ensure that:

                        1.         Work is not lost in case the hard disk fails.                (1mk)

                        2.         The project is not copied by other students.               (1mk)

c) i).  Other than I/O devices, list other three devices under the control of the operating system.                                                  (3mks)

 ii)Explain any one of the devices named in C (i) above            (1mk)

d)Define the term trouble shooting    (1mk)

19. A manager wishes to replace the current manual system with a computerized one

 a)Describe three main areas that must be evaluated to justify the  replacement   (6mks)

b) List the three areas that would be considered in the requirements specifications.      (3mks)

c)State and explain three ways that can be followed to replace the current system    (6mks)

20. a)  A head teacher keeps the following student details in a database:  Name, Address, Town, Date of Birth, Marks scored, Fees paid.

i)Name the most appropriate primary key. Give a reason      (2mks)

ii)For each item in the student’s details above, indicate its most appropriate data type as used in the database.           (3mks)

iii)Explain why input screens are better data entry designs than entering data directly to a table.        (2mks)

b)List two career opportunities associated with databases.       (2mks)

c)Distinguish between:

i) A table in a word-processing application and a table in a database application (2mks)

ii)Mouse pointer and insertion point.    (2mks)

d)Outline the steps to be followed in order to merge cells in a word processing table.    (2mks)

Question Image

Name two other input/output devices used at the POS terminal apart from keyboard and barcode reader and give a use for each device.

device: beeper/loud speaker
use: to indicate barcode correctly read/error in reading barcode
device: (LCD) screen/monitor
use: to show prices and other information about goods
device: touch screen
use: to show prices and other information about goods/to select items that need to be
weighed/identified
device: weighing machine
use: to find weight of loose items (e.g. fruit) to enable pricing
device: (magnetic) card reader/CHIP and PIN reader
use: to read customer’s debit/credit card/enable customer to pay for goods using a
credit or debit card
device: printer
use: to print receipts

Question Image

State three ways of transforming a picture embedded in a DTP program in order to fit on a designated space on a document (kcse 2019 paper 1)

  • Resizing using resize handles
  • Rotating
  • Cropping
  • Flipping
  • Moving
Question Image

Give any three advantages of computer networks

  1. Enable resource sharing
  2. Facilitate remote communication
  3. Enable distributed processing
  4. Provide better data security and management

6 Programmers write software that controls hardware and interacts with users. Some of this software ensures that networks function properly.

(a) Compilers and interpreters translate source code written in programming languages.
  State four other features of a compiler.

 A single executable file is produced 

The executable program is portable between machines

The program source code is not available

Code can be optimised/made more efficient 

Entire source code file is converted at once

No special environment is needed to execute the code 

It creates object/machine code

Error report is provided at the end of the compilation

Question Image

State three functions of  a network  operating system

  • Allows creation and management of user accounts
  • Helps in troubleshooting of the network
  • controls access to network resources
  • Provides communication services
  • configures network resources
  •  

 

Question Image

An organisation that supplies audiobooks over the internet is moving into a new office building.
 (a) One reason for networking devices is to provide access to the internet.
  (i) Give two other reasons for connecting devices to networks.
 

  • Share peripherals/devices (e.g. printers, scanners)
  • Communicate (e.g. email, instant messaging, play games)
  • Share data (e.g. files/music/videos/backups on servers)
  • Deploy/update applications
     
     

Confidential information about the students is to be stored on the computer system. Explain the measures that can be taken to ensure that such information remains confidential.

- Passwords
- Hierarchy
- Only allow some staff to access student files
- Only some machines able to access
- Physical location of these machines
- Physical lock on machines
- Encrypted data in files
- Firewall if connected to the Internet

Question Image

What is a Uniform Resource Locator?

  • It is an address to a resource on the internet
Question Image

Computer Studies Paper 1 2021  KCSE Prediction Section B Qs. 17,18 and 19

17. a) i) Explain the term search as used in the Internet.                                            [2]

A web based application that locates items or information from the World Wide Web

ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download.                                           [3]

  • Size of the video/format
  • The bandwidth of the media/speed of network/network traffic
  • Type of browser software
  • Background activities running in the computer
  • Restrictions enforced in the computer/firewall/antivirus
  • Speed of the computer/CPU speed
  • Size of RAM

b) Wakulima online is an organization that runs a web based system for assisting farmers to obtain market for their produce. State four technological reasons that may cause a farmer not to access the organization’s system.                                                                                  [4]

  • Poor network/lack of connection
  • Software failure in the system
  • Hardware failure
  • Lack of access rights
  • System overload/hanging
  • Lack of skills/disability/illiteracy
  • Lack of power supply

c) Explain a situation when each of the following Desktop Publishing program features may be used when creating a publication:

i. Cropping                                                                                                               [2]

Applies to graphics – used to trim/remove/hide some portions in the graphics

ii. Transparency                                                                                                         [2]

Used to make background of a graphic to be clear/visible

d. List two areas where infrared waves are used in data communication.                             [2]

18. a) List four activities of the planning stage of systems development.                             Ignore this question, marks redistributed elsewhere

b) Explain a circumstance when each of the following feasibility studies are carried out during systems development.

i. Technical                                                                                                               [3]

Done to determine whether technology exists to support the proposed solution

 

ii. Economic                                                                                                              [3]

Done to determine whether the proposed solution is economically viable

 

iii. Schedule                                                                                                               [3]

Done to determine whether the proposed system can be done within an acceptable time.

c) Table 1 and Table 2 are related tables in a database. Use them to answer the questions that follow.

Table 1

Dept Code

Dept Name

001

Computer

002

Aviation

003

Engineering

 

Table 2

DeptID

Student Registration No.

Student’s Name

002

St01

Alex Too

003

St02

Naomi Komi

002

St03

Peter Kengo

 

i. Identify the appropriate primary key for each table.                    [2]

Table 1 – Dept code, Student Registration No

ii. Explain two benefits of enforcing referential integrity in the database. [4]

  • No record can be added in Table 2 if its corresponding record in Table 1 does not exist
  • No record in Table 1 can be deleted without first deleting the corresponding record in Table 2
  • Reduces data redundancies/ensures integrity
  • Prevents deletion of related table

19. a) Describe each of the following validation checks as used in data processing.

i. Preserve check                                                                                                      [2]

Ignore this question, marks redistributed elsewhere

ii. Data type check                                                                                                    [2]

Ensure correct type of data is entered for the field

iii. Check digit                                                                                                           [2]

This is a number added/calculated by the computer to a binary number. The check digit ensures correct transmission of the binary number.

b. Write each of the following abbreviations in full:

i) BCD                                                                                                                                    [1½]

Binary Coded Decimal

ii) EBCD                                                                                                                                 [

This question was thrown out and marks redistributed elsewhere

iii) ASCII                                                                                                                    [1½]

American Standard Code for Information Interchange

c) Using 10-bits binary number system, perform the following decimal operation using two’s complement.                                                                                                                                   [6]

12910 - 12810

+129 = 00 1000 0001

128 = 00 1000 0000

-128 = 11 0111 1111 (ones complement)

                            +1

          11 1000 0000 (Twos complement)

129- 128

     00 1000 0001

+ 11 1000 0000

 100 0000 0001

Hence = 00 0000 00012 or 12 (the overflow bit is ignored)

Question Image

Explain the difference between the sequential and parallel computational models.

Any four of:
Sequential:
Individual instructions are executed one after another
Flow control is accomplished by jump/branch/goto instructions
Results are usually achieved less quickly than parallel processing (do
not award twice)
Parallel:
Individual instructions can be routed to different processors for
simultaneous execution
Results are usually achieved quicker than sequential instruction (do not
award twice)
Requires multi-core processors or multiple microprocessors
Tasks may be split into different parts with each part executed on a
different processor
Results need to be merged back together after completion

Question Image

Why are CD-Rs and CD_ROMs referred to as WORM?

  • Because data is recorded to the disks once but can be accessed many times without changing the content
  • once data is written to the disk, it becomes read-only and cannot be altered or erased.
Question Image

In reference to word processing, define the following terms

Word wrap

Justification

Drop cap

Word wrap - Is a word processing feature in which a word that does not fit in the current line is automatically moved at the start of the next line

Justification - refers to aligning text on both left and right margins

Drop cap - Make the first character of a paragraph occupy more than one line below it

Question Image

List any two components of an expert system                                (2marks)

  • Knowledge base – is the systems’ database of knowledge about a particular subject. It contains relevant facts, beliefs, assumptions and procedures for solving a particular problem
  • Inference engine – this is the software that controls the search for knowledge in the knowledge base and produces conclusions. It takes the problem posed by the user and seeks to analyze it in order to arrive at a conclusion.
  • User interface- this is the display screen that enables the user interact with the system.

Explain how the operating system performs job/process scheduling/management

  • The OS allocates CPU time to each process, and prioritises them in the order of importance
Question Image

Give two other uses of hexadecimal in computer science.

  • colour codes // colour in HTML/CSS
  • error messages
  • locations in memory
  • memory dump // debugging 
  • IP(v6) address
  • ASCII // Unicode
  • assembly language
  • URL.

 

Question Image

Explain why it is not always true that a computer which has  a quad-core processor runs twice as fast as a computer with a dual-core processor

 

  • Software may be designed to run on 1 core and not multiple cores
  • depends on the task(s)  i.e some tasks cannot be split across cores
  • Clock speed also affects speed i.e dual core may have a faster clock speed and quad-core may have slower clock speed so one task may be run faster/slower
  • RAM size also affects speed i.e Quad-core may have less RAM  amount of VM being used
  • Cache size also affects speed i.e Quad-core may have less cache
Question Image

State three advantages of  biometric authentication

  • Protection against Password-related Vulnerabilities: Traditional password-based authentication methods are vulnerable to various risks, such as weak passwords, password sharing, or password theft.
  • Stronger Access Control: Biometric readers add an additional layer of access control to laptops. Even if someone gains physical possession of the laptop, they would still need the authorized user's biometric data to unlock it and access the data. This helps prevent unauthorized individuals from accessing sensitive information stored on the laptop,
  • Audit Trail and Accountability: Biometric authentication systems often come with built-in logging and auditing capabilities. This means that each time someone accesses the laptop using their biometric data, it can be recorded and associated with a specific user. This creates an audit trail, allowing organizations to track and monitor access to laptops and establish accountability in case of any security incidents or breaches.
Question Image

COMPUTER STUDIES 2016 PAPER 1

  1. Identify any computer output device suitable for each of the following tasks:
  1. Generating receipts where carbon copies are required  (1mk)
  • Impact printers e.g dot matrix

     b) an architectural drawing where precision is required         (1mk)

  • Plotter

(c ) producing document output for a visually impaired person (1mk)

  • Braille/speakers
  1. Pesa Tele has offices in Nairobi and Kampala connected in a network . the management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem (3mks)
  • Encryption
  • Firewall
  • Audit trail/tracking
  • Use of passwords
  • Limit the number of log-in attempts
  1. Explain two ways in which the use of internet could make reporting of corruption easier (4mks)
  • Interactive: the internet based technology enables real-time dialogue hence instantaneous reporting of cases
  • Outreach: the technology allows the coverage of wide areas
  • Social mobilization : it easy to create a network of people with similar concerns
  • Anonymity : it is easier to report corruption without being  known
  • Security: the message sent reaches destination without being intruded
  1. State ways in which software errors can be prevent during program development
  • Use of antivirus software
  • Performing system update frequently
  • Testing the software before implementation
  • Proper training
Question Image