1.List four input devices used to capture data by way of scanning 2mks
2. Explain two consequences of not restricting the use of USB flash in a school computer laboratory 4mks
3. Differentiate between a computer power cable and a computer interface cable 2mks
4. Explain two computer hardware features that may be considered when selecting a laptop computer to be used when developing a KCSE computer studies project 4mks
5. List two examples of operating systems that are not capable of supporting computer networks 4mks
6. Explain each of the following functions of an operating system
(a) Process scheduling
(b) Interrupt handling
7. Give two examples of each of the following application packages
(a) Databases; 1mk
(b) Word processing; 1mk
(c)Desktop publishing; 1mk
8. State two ways of preventing children from accessing adult content in a computer linked to the internet 2mks
9. A health centre stores patient's details in a computer. State two ways of maintaining the confidentiality of the information 2mks
10. Convert the decimal number 9.25 base 10 to binary number equivalent 2mks
11. Explain the meaning of the term "distributed data processing" as used in computers 2mks
12. The area of a triangle is obtained using a formula: area = 1/2*base*height. Draw a flowchart that captures the input from a user, computes the area of the triangle and displays the results 3mks
13. An organisation opted to connect their computers to form a network.State two ways through which the organzation may save on the cost of their operations upon implementing the network 2mks
14. State three benefits that may be realized by using ICT to manage automobile traffic operations 3mks
15. State three benefits that may be realized by using ICT to manage automobile traffic operations 3mks
16. (a) Explain two ways that may be used to identify the existence of errors in a program 4mks
(b) Figure 1 show a program translation model involving the use of a translater 4mks
(i) state the type of translator required for this model 4mks
(ii) Explain the reason for the conversion from low level source code to machine code 2mks
(c) A private college intends to offer training on computer packages to a class consisting of 25 students. Each student is required to Ksh. 2000 for this training . A discount of 14% is awarded to each student who will have paid full fee by the opening data of new term. Write a pseudocode that captures fee paid by each student, determine whether the student is eligible for the discount , compute the total fee collected and the total discount awarded 8mks
17 (a) Explain three benefits of using twisted pair cables in a local area network 2mks
(b) Charles has linked five computers at his home using star topology 2mks
(i) Draw a diagram representation for this tolopgy 2mks
(ii) State three reasons that may have prompted him to use this topology 3mks
(iii) Explain two requirements for connecting the network to the internet 3mks
18. (a) Explain three ways through which advancement in ICT has benefited national security 6mks
(b) Convert the binary number 1101.011 base 2 to decimal number equivalent 3mks
(c) A teacher entered test scores in a spreadsheet in cells range C4 to C38. State the formula that should be used to: 3mks
>
(i) Compute each of the following scores:
I. mean of the scores. 1mk
II. number of scores whose value exceed 50 2mk
(ii) Display the text "PASS" if the score is greater or equal to 30 and the text "FAIL" if otherwise 3mks
19. (a)State the unit of measure for each of the following quantities in a computer:
(i) Processor speed 1mk
(ii) Memory capacity 1mk
(iii) Data transmission speed 1mk
(b) Explain three functions of a query in a database 6mks
(c) Peter created three folders named ENG, MATHS and SWAHILI in a folder named STUDIES.In the folder ENG, he created the folders LIT and LANG while in the SWAHILI folder, he created LUGHA and FASIHI
(i)Draw a directory tree structure for all the folders created 4mks
(ii)Given that the STUDIES folder is in the root directory of drive D , write the path for a file named REVISION.DOC stored in the LUGHA folder 2mks
20. (a) Explain three ways through computer components in a computer laboratory may be protected against theft 3mks
(b) Computer studies subject has become an essential components of many professions. State three benefits of computer knowledge to an engineer 3mks
(c) A school opted to provide internet to users in the school through the use of wireless technology. Explain three challenges that the school may face by using this form of technology 6mks