admin@kcseforecast.com

+2541026301456

Q&A-KCSE Computer Studies Paper 1

KCSE 2016 COMPUTER STUDIES PAPER 1

A manager wishes to replace the current manual system with a computerized one. Describe three areas that must be evaluated to justify the replacement  (6 marks)

  • Technical feasibility
  • Does the current technology suffice
  • Economic feasibility
  • Benefits outweigh costs/ whether the project is cost effective
  • Schedule feasibility
  • Can it be done within the schedule

Headache, back and neck pain may result from the use of computers. State how each of them can be minimized (2mks)

  • Proper lighting
  • Regular breaks
  • Use of antiglare
  • Correct position of the screen
  • Ergonomic furniture

Students of a school intended to elect their school Captain by secret ballot.  State three ways in which computers can be used to improve the election process                           (3mks)

  • Registrations of voters
  • Voter identification
  • Actual voting
  • Tallying

KCSE 2016 COMPUTER STUDIES PAPER 1

State the function of each of the following keys on the computer keyboard :  (2mks)

Backspace;

  • Deletes characters to the left of the cursor

Insert

  • Add characters at the cursor position
  • Toggles between overtype and insert modes

An organization intends to replace an existing system by carrying out the process in stages .

Name the implementation strategy ;  (1mk)

  • Phased change-over

Give two reasons why the  organization is opting to use the implementation strategy  in (a) above (2mks)

  • Gives employees time to learn
  • Organizations can revert to the old system in case of failure
  • Reduces resistance by the employee
  • It is easier to find system errors as you are dealing with only one part at a time
  • Accessing parts of the old system is still is possible in case of failure of the new system

KCSE 2016 COMPUTER STUDIES PAPER MARKING SCHEME

State the function of each of the following keys on the computer keyboard :  (2mks)

Backspace;

  • Deletes characters to the left of the cursor

Insert

  • Add characters at the cursor position
  • Toggles between overtype and insert modes

An organization intends to replace an existing system by carrying out the process in stages .

Name the implementation strategy ;  (1mk)

  • Phased change-over

Give two reasons why the  organization is opting to use the implementation strategy  in (a) above     (2mks)

  • Gives employees time to learn
  • Organizations can revert to the old system in case of failure
  • Reduces resistance by the employees
  • It is easier to find system errors as you are dealing with only one part at a time
  • Accessing parts of the old system is still is possible in case of failure of the new system

 

A manager wishes to replace the current manual system with a computerized one. Describe three areas that must be evaluated to justify the replacement  (6 marks)

  • Technical feasibility
  • Does the current technology suffice
  • Economic feasibility
  • Benefits outweigh costs/ whether the project is cost effective
  • Schedule feasibility
  • Can it be done within the schedule

                                                                      

Headache, back and neck pain may result from the use of computers. State how each of them can be minimized                               (2mks)

  • Proper lighting
  • Regular breaks
  • Use of antiglare
  • Correct position of the screen
  • Ergonomic furniture

Students of a school intended to elect their school Captain by secret ballot.  State three ways in which computers can be used to improve the election process                          (3mks)

  • Registrations of voters
  • Voter identification
  • Actual voting
  • Tallying

Explain why intranet is a more secure way to share files within an organization compared to internet (2mks)

  • Intranet involves the interconnection of computers  within  the organization hence it is easier to monitor the access and sharing of files since the users in an organization can be assigned accounts and passwords which will enable to access files they are authorized to access unlike the internet where many can access what is stored in the organization’s website

List two career opportunities directly associated with computer networking               (2mks)

  • Network administrators
  • Network engineers
  • Network technicians

Distinguish between a formula and a function as used in spreadsheets

  • A formula is a mathematical expression that returns a value
  • A function is an excel inbuilt formula that returns a value given a range of values or arguments

 The C directory of a computer has folders named Form 1, Form 2, Form 3 and Form 4. Each class has students’ folder named according to their admission number.  The student created their own folder for subjects they are studying based on the table below:

1. State two ways in which a computer may be used in a healthcare  sector other than record keeping

  • Patient monitoring
  • Used to control medical equipment e.g ultra sound
  • medical research and studies
  • communication and telemedicine

State four operations that may be performed on a file by an operating system

  • file deletion
  • file copying
  • file renaming
  • file retrieval
  • file closing
  • file reading

Explain the term website as used in the internet

  • A collection of related webpages under the same domain name

Explain a reason necessitating  governments to enact data protection laws

  • To provide legal backing so that it is possible to seek redress if the rights are violated
  • To observe copyright for those who create original works
  • To protect the confidentiality of information kept  about an individual

When an image is inserted in a DTP document is selected, handles on its placeholders appear.  State three uses of these handles

  • Used to resize the image
  • Used to rotate the image
  • Used to move the image

State a circumstance under which dry-run testing is performed when developing a program (2mks)

  • To detect and remove errors
  • To confirm if the program produces the expected output

State two ways in which data validation is implemented on an input form of a database application

  • By setting the validation rule for the input controls on the property sheet in design view
  • By use of VBA to restrict user inputs for a given control on a form
  • By use of queries to restrict options available for the user in a combo box or listbox
  • Setting correct data types for the fields in table the design
  • Enforcing referential integrity in database relationships
  • Use of input mask for the controls on the property sheeet in design view

Mikal has been employed as a computer trainer in an organisation. State three roles that she is likely to play in the organisation

  • Developing training materials
  • Training computer users
  • Conducting ICT examinations
  • Managing the learning and examination process
  • Developing guidelines for using the computer lab
  • Planning the course content
  •  

List three electronic data processing modes used in computers

  • Realtime processing
  • Batch processing
  • Timesharing
  • multiprogramming
  • Online
  • Batch
  • Distributed

What are computer networks?

A set of connected computers and other devices which share resources such as software, internet connection,printers etc

Define what is meant by a ‘network protocol

  • An agreement / set of rules / standard for how computers should communicate or how data is sent/received/transmitted on a network
  • Example of what could be agreed in the protocol (e.g. speed / error checking / etc.)

Explain the difference between how the IMAP (Internet message access protocol) and SMTP (simple mail transfer protocol) protocols are used

IMAP

  • Retrieves/accesses/downloads (a copy of an) e-mail
  • Allows synchronisation/management of account

SMTP:

  • Sends/forwards/transmits e-mai