Give three features of a data protection act.
SECTION A (40 MKS)
Answer all the questions in this section in the spaces provided.
1.Describe the computer booting process. (2 mks)
2. State the functions of the following keys on the computer keyboard (2 mks)
a) Backspace
b)Insert (ins)
3. Jane has noticed the following problems with her computer keyboard (2mks)
State three possible causes of these problems and how they can be solved (3mks)
4 a)Define authenticity as used in software selection (1mk)
b) List four ways of acquiring software in an organization (2mks)
5 some of the storage disk available are: zip disks, 3 ½ inch floppy disks, DVDs and 5 ¼ inch floppy disks. Arrange these devices in ascending order of storage capacity. (2mks)
6.You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:
a) Forgetting the password (1mk)
b) Hacking (1mk)
7.State four benefits of using a computer in a school library (2 mks)
8. Using six bits, find the two’s complement of -2310. (4 mks)
9. Explain data series, axis and legends as used in spreadsheet charts. (3mks)
10. a) Describe the term data integrity. (2 mks)
b) State four situations in which data may lose integrity. (2mks)
11.State the function of each of the following:
a)Network interface card (1 mk)
b)Network protocol (1 mk)
c)Hub (1mk)
12. List four types of publications that can be designed by using desktop publishing software. (2mks)
13. Differentiate between the following pair of terms as used in database design:
a) Input mask and design. (2 mks)
b) Table and query ( 2mks)
14. List four factors to be considered when purchasing an operating system. (2mks)
15 Write an algorithm to compute the area of a triangle. (2mks)
SECTION B (60 MARKS)
Answer question 16 and any other three questions from this section in the spaces provided
16. Study the flowchart below and answer the questions that follow
i) Name the control structures used in the flowchart (2mks)
ii) Determine the values of M, N, P and Q. ( 4 mks)
M………………………….. N………………………..
P ………………………….. Q ………………………
iii) Write the pseudo code for the flowchart (7mks)
b) List four functions of an assembler (2 mks)
17. Define the following web related terms:
i) Web browser (1mk)
ii) Hyperlink (1mk)
iii) Hypertext document (1mk)
b) List six activities performed on the web (3mks)
c) An institution has ten stand alone computers
i) Suggest with reasons the most appropriate topology required to inter-connect the computers. (3mks)
ii) State the necessary steps required to connect the computers to the internet. (4mks)
d) Below is an email address:
Name the parts labeled:
i)
ii)
iii)
18.A computer C directory has folders for form 1, form 2, Form 3 and form 4. Each class has student’s folders labeled according to their number. The students create their own folder for the subject the are studying based on the table shown below
|
Form 1 |
Form 2 |
Form 3 |
Form 4 |
|
OS |
SP |
Pr. |
ADB |
|
WP |
DTP DB |
Internet |
|
a)Assuming there is one student per class, draw the corresponding directory tree structure. (6 mks)
b) i) a form four student wants to create a folder to store her project. State the path for that project folder.(2 mks)
ii)Suggest how the student can ensure that:
1. Work is not lost in case the hard disk fails. (1mk)
2. The project is not copied by other students. (1mk)
c) i). Other than I/O devices, list other three devices under the control of the operating system. (3mks)
ii)Explain any one of the devices named in C (i) above (1mk)
d)Define the term trouble shooting (1mk)
19. A manager wishes to replace the current manual system with a computerized one
a)Describe three main areas that must be evaluated to justify the replacement (6mks)
b) List the three areas that would be considered in the requirements specifications. (3mks)
c)State and explain three ways that can be followed to replace the current system (6mks)
20. a) A head teacher keeps the following student details in a database: Name, Address, Town, Date of Birth, Marks scored, Fees paid.
i)Name the most appropriate primary key. Give a reason (2mks)
ii)For each item in the student’s details above, indicate its most appropriate data type as used in the database. (3mks)
iii)Explain why input screens are better data entry designs than entering data directly to a table. (2mks)
b)List two career opportunities associated with databases. (2mks)
c)Distinguish between:
i) A table in a word-processing application and a table in a database application (2mks)
ii)Mouse pointer and insertion point. (2mks)
d)Outline the steps to be followed in order to merge cells in a word processing table. (2mks)
Explain why smoke and dust particles are harmful to a computer
Overheating: Smoke and dust particles can accumulate inside the computer's casing, blocking airflow and hindering the cooling mechanisms of the computer. This can lead to overheating of the internal components, such as the CPU and graphics card. Overheating can cause system instability, performance degradation, and even permanent damage to the hardware.
Component Malfunction: Smoke and dust particles can settle on electronic components, such as the motherboard, memory modules, and connectors. Over time, this accumulation can create a layer of debris, leading to poor electrical contact and interference with signal transmission. This can result in component malfunctions, intermittent failures, or even complete hardware failure.
Short Circuits: If smoke or dust particles contain conductive materials, such as metal flakes or moisture, they can create a risk of short circuits. When conductive particles come into contact with exposed circuits or connectors, they can cause a direct electrical connection between two points that are not intended to be connected. Short circuits can damage components, disrupt data transmission, and even pose a fire hazard.
Increased Maintenance Requirements: Smoke and dust particles can increase the frequency and complexity of computer maintenance. Accumulated dust can clog cooling fans, causing them to work less effectively or even fail. Additionally, smoke particles can leave behind sticky residues that further attract dust, making the cleaning process more challenging.
Reduced Performance and Reliability: As smoke and dust particles accumulate within the computer, they can restrict the movement of mechanical components, such as fans or disk drives, affecting their performance and reliability. Dust particles can also hinder the reading and writing capabilities of optical drives or cause errors in data transmission.
Distinguish between microwave and a radiowave transmission and a microwave transmission (KCSE 2017 PP1)
Microwaves can cover shorter distances. On the contrary, radio waves can travel a long distance. Radio wave is usually propagated through sky mode while microwave uses the line of sight propagation.
State the advantages and Disadvantages of GUI
Advantages
Disadvantages
Identify four different types of computer network.
451/1
COMPUTER STUDIES
PAPER 1
THEORY
DECEMBER 2021
TIME: 2 HOURS
FORM TWO END OF TERM TWO 2O21 EXAM
451/1
COMPUTER STUDIES
PAPER 1
THEORY
TIME: 2½ HOURS
INSTRUCTIONS TO CANDIDATES:
Describe overtype and insert modes as used in word processors
Explain one reason why a computer needs to be connected to a stable power source
System Stability: Computers require a consistent and stable power supply to function properly. Fluctuations or interruptions in the power source can cause various issues that can disrupt the computer's operation or lead to hardware damage.
a. Data Loss: Sudden power outages or voltage fluctuations can cause the computer to shut down abruptly, resulting in data loss if unsaved work is not properly stored. This can be particularly problematic when working on critical tasks or handling important files.
b. Hardware Damage: Power surges or inconsistent power supply can damage the computer's internal components, including the motherboard, CPU, memory, and storage devices. These damages can result in system instability, reduced performance, or even complete hardware failure.
c. Operating System Corruption: Abrupt power loss or inconsistent power supply can corrupt the operating system files, leading to system crashes, error messages, and instability. This may require system repairs or reinstallation of the operating system.
d. Component Lifespan: Inconsistent power supply can put unnecessary stress on computer components, shortening their lifespan. Frequent power fluctuations or surges can cause wear and tear on various parts, reducing their efficiency and overall longevity.
A car park uses a number plate recognition system. Identify the reason why unsigned integers should be used to record the number of cars entering and leaving the car park, rather than signed integers
Data integrity in a database can be divided into three categories: referential integrity, domain integrity and entity integrity.
(a)Outline the meaning of each of the following.
(i) Referential integrity
(ii) Entity integrity
(b) Describe how data integrity can improve the process of database management. (2 marks)
(i) Referential integrity
(ii) Entity integrity
(b) Describe how data integrity can improve the process of database management. (2 marks)
Explain two computer hardware features that may be considered when selecting a laptop computer to be used in developing a KCSE computer studies project (4mks)
Multimedia Capability - A laptop with strong multimedia capabilities is essential for a computer studies project submitted on CD-RW. This ensures that the laptop can efficiently handle multimedia content, providing a seamless experience in creating and presenting project materials.
Processor Speed - Opting for a laptop with a high processor speed is crucial. This feature enables the smooth execution of multiple applications simultaneously, enhancing overall project efficiency and reducing processing delays.
Hard Disk Capacity - Consider a laptop with ample hard disk capacity, as the Microsoft Office suite used in computer projects requires significant space for the installation and storage of project files. A spacious hard drive ensures that there is sufficient room for data and applications.
Main Memory Capacity - Given that students often work with multiple programs concurrently during a project, it's important to choose a laptop with an adequate main memory size. A smaller main memory may result in performance issues, hindering the seamless operation of various software applications during project development.
State the functions of the following registers
Program counter // PC
• Stores the address of the next instruction to be fetched
Memory address register // MAR
• Stores the address where data/instruction is to be read from or saved to
Memory data register // MDR
• Stores data that is about to be written to memory // Stores data that has just been read from memory
Current instruction register // CIR
• Stores the instruction that is currently being decoded/executed
State advantages and disadvantages of Solid State Drives and Hard Disk Drives
Advantages of of Hard Disk Drive
Disadvantages of Hard Disk Drives
Advantages of Solid State Drives
Disadvantages of SDD
Describe the following features of a graphical user interface:
(a) Pointer
(b) Desktop
(a) Pointer
(b) Desktop
Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access
(The parent can) set criteria for the websites she is allowed to visit such as a whitelist/blacklist of websites. The firewall will examine the data/traffic incoming and outgoing from her computer. If data is sent from a website that is not allowed, it will be blocked
Differentiate between action query and select query
An action query is used to modify, add, or delete data in a database whereas a select query is used to retrieve data from a database based on specified criteria but does not make any changes to the data.
Explain the difference between main memory and secondary storage.
Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms.
Virus
Pharming -
Phishing
State the uses of 3D printers