admin@kcseforecast.com

Q&A-KCSE Computer Studies Paper 1

Give three features of a data protection act.

  • data shall only be used for the specific purpose for which it was collected
  • data shall be adequate/relevant/not excessive
  • data shall be accurate/up to date
  • data shall not be kept any longer than necessary
  • individuals have the right to see data about them (and have it changed if inaccurate)
  • sufficient means taken for security/integrity of data
  • data shall not be transferred to a country with lower protection laws
  • data users must be registered
Question Image

KCSE 2007, COMPUTER STUDIES PAPER 1

SECTION A (40 MKS)

Answer all the questions in this section in the spaces provided.

1.Describe the computer booting process.    (2 mks)

2. State the functions of the following keys on the computer keyboard   (2 mks)

  a) Backspace

  b)Insert (ins)

3. Jane has noticed the following problems with her computer keyboard    (2mks)

  • It is taking a longer time to start-up;
  • It is often hanging;
  • Applications are taking longer to load.

 State three possible causes of these problems and how they can be solved (3mks)

4 a)Define authenticity as used in software selection  (1mk)

  b) List four ways of acquiring software in an organization     (2mks)

5 some of the storage disk available are:  zip disks, 3 ½ inch floppy disks, DVDs and 5 ¼ inch floppy disks. Arrange these devices in ascending order of storage capacity.    (2mks)

6.You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following:           

a) Forgetting the password     (1mk)

b) Hacking       (1mk)              

7.State four benefits of using a computer in a school library   (2 mks)

8. Using six bits, find the two’s complement of -2310.     (4 mks)

9. Explain data series, axis and legends as used in spreadsheet charts.  (3mks)

  • Data
  • Axis
  • Legend                       

10. a) Describe the term data integrity.                                            (2 mks)

     b) State four situations in which data may lose integrity.           (2mks)

11.State the function of each of the following:

            a)Network interface card                                                           (1 mk)

            b)Network protocol                                                                    (1 mk)

           c)Hub                                                                                         (1mk)  

12. List four types of publications that can be designed by using desktop publishing software.   (2mks)

13. Differentiate between the following pair of terms as used in database design:

    a)  Input mask and design.                                                           (2 mks)

    b) Table and query                                                                      ( 2mks)

14. List four factors to be considered when purchasing an operating system.     (2mks)

15   Write an algorithm to compute the area of a triangle.   (2mks)

SECTION B (60 MARKS)

Answer question 16 and any other three questions from this section in the spaces provided

16. Study the flowchart below and answer the questions that follow

 

i) Name the control structures used in the flowchart                 (2mks)

ii) Determine the values of M, N, P and Q.                                ( 4 mks)

M………………………….. N………………………..

P ………………………….. Q ………………………

  iii) Write the pseudo code for the flowchart   (7mks)

 b)  List four functions of an assembler    (2 mks)

17. Define the following web related terms:       

 i)  Web browser   (1mk)

 ii)  Hyperlink      (1mk)

iii) Hypertext document                (1mk)

b)  List six activities performed on the web      (3mks)

c) An institution has ten stand alone computers

i)  Suggest with reasons the most appropriate topology required to inter-connect the computers.   (3mks)

ii) State the necessary steps required to connect the computers to the  internet.      (4mks)

d) Below is an email address:

                       

                     

                       

Name the parts labeled:

                        i)

                        ii)

                        iii)

18.A computer C directory has folders for form 1, form 2, Form 3 and form 4.  Each class has student’s folders labeled according to their number.  The students create their own folder for the subject the are studying based on the table shown below

 

Form 1

Form 2

Form 3

Form 4

OS

SP

Pr.

ADB

WP

DTP

DB

Internet

 

 

a)Assuming there is one student per class, draw the corresponding directory tree structure.  (6 mks)

b) i)  a form four student wants to create a folder to store her project. State the path for that project folder.(2 mks)

ii)Suggest how the student can ensure that:

                        1.         Work is not lost in case the hard disk fails.                (1mk)

                        2.         The project is not copied by other students.               (1mk)

c) i).  Other than I/O devices, list other three devices under the control of the operating system.                                                  (3mks)

 ii)Explain any one of the devices named in C (i) above            (1mk)

d)Define the term trouble shooting    (1mk)

19. A manager wishes to replace the current manual system with a computerized one

 a)Describe three main areas that must be evaluated to justify the  replacement   (6mks)

b) List the three areas that would be considered in the requirements specifications.      (3mks)

c)State and explain three ways that can be followed to replace the current system    (6mks)

20. a)  A head teacher keeps the following student details in a database:  Name, Address, Town, Date of Birth, Marks scored, Fees paid.

i)Name the most appropriate primary key. Give a reason      (2mks)

ii)For each item in the student’s details above, indicate its most appropriate data type as used in the database.           (3mks)

iii)Explain why input screens are better data entry designs than entering data directly to a table.        (2mks)

b)List two career opportunities associated with databases.       (2mks)

c)Distinguish between:

i) A table in a word-processing application and a table in a database application (2mks)

ii)Mouse pointer and insertion point.    (2mks)

d)Outline the steps to be followed in order to merge cells in a word processing table.    (2mks)

Question Image

Explain why smoke and dust particles are harmful to a computer

  1. Overheating: Smoke and dust particles can accumulate inside the computer's casing, blocking airflow and hindering the cooling mechanisms of the computer. This can lead to overheating of the internal components, such as the CPU and graphics card. Overheating can cause system instability, performance degradation, and even permanent damage to the hardware.

  2. Component Malfunction: Smoke and dust particles can settle on electronic components, such as the motherboard, memory modules, and connectors. Over time, this accumulation can create a layer of debris, leading to poor electrical contact and interference with signal transmission. This can result in component malfunctions, intermittent failures, or even complete hardware failure.

  3. Short Circuits: If smoke or dust particles contain conductive materials, such as metal flakes or moisture, they can create a risk of short circuits. When conductive particles come into contact with exposed circuits or connectors, they can cause a direct electrical connection between two points that are not intended to be connected. Short circuits can damage components, disrupt data transmission, and even pose a fire hazard.

  4. Increased Maintenance Requirements: Smoke and dust particles can increase the frequency and complexity of computer maintenance. Accumulated dust can clog cooling fans, causing them to work less effectively or even fail. Additionally, smoke particles can leave behind sticky residues that further attract dust, making the cleaning process more challenging.

  5. Reduced Performance and Reliability: As smoke and dust particles accumulate within the computer, they can restrict the movement of mechanical components, such as fans or disk drives, affecting their performance and reliability. Dust particles can also hinder the reading and writing capabilities of optical drives or cause errors in data transmission.

Question Image

Distinguish between microwave and a radiowave transmission and a microwave transmission  (KCSE 2017 PP1)

Microwaves can cover shorter distances. On the contrary, radio waves can travel a long distance. Radio wave is usually propagated through sky mode while microwave uses the line of sight propagation. 

Question Image

State  the advantages and Disadvantages of GUI

Advantages

  • It is intuitive
  • Easy to navigate
  • Uses menus, pointers and icons thus easy to learn and use
  • It lets the user exchange data between different software applications
  • The user does not have to learn complicated commands

Disadvantages

  • Takes a lot of memory
  • A lot of processor power is needed
  • Takes up a larger amount of hard disk space than other interfaces
  • They need significantly more memory (RAM) to run than other interface types

 

Question Image

Identify four different types of computer network.

  1. MAN
  2. WAN
  3. PAN
  4. LAN
Question Image

451/1

COMPUTER STUDIES

PAPER 1

THEORY

DECEMBER 2021

TIME: 2 HOURS

 

FORM TWO END OF TERM TWO 2O21 EXAM

451/1

COMPUTER STUDIES

PAPER 1

THEORY

TIME: 2½ HOURS

 

INSTRUCTIONS TO CANDIDATES:

  • Write your name and ADMISSION number in the spaces provided above.
  • Write the date of examination and sign in the spaces provided.
  • This paper consists of two sections.
  • Answer all the questions in section A.
  • Choose one topic to answer in section B
  • All answers must be written in the spaces provided in this question paper.
  1. SECTION A
  2.  Answer all questions in this section
  3. What is a computer?                                                                                                            1mks
  4. State three physical components that make up a computer                                                 3mks
  5. State the hardware technological differences between the second generation and third generation computers                                                                                                          2mks
  6. State and explain three characteristics of a computer                                                         3mks
  7. State the functions of the following special memories in a computer                                3mks
  8. Buffers
  9.  
  10. Registers
  11. Cache
  12.  
  13. Define the following as used in data representation in a computer                                  (5mks)
  14. Bit
  15.  
  16.  
  17. Byte
  18.  
  19.  
  20. Nibble
  21.  
  22.  
  23.  
  24. Word
  25.  
  26.  
  27.  
  28. Word-length
  29.  
  30.  
  31. State two reasons why a DVD is superior to a typical compact disk                               (2mks)
  32. State three advantages of flat panel monitors over cathode ray tube monitors                   3mks
  33. Explain the following terms as used in word processing                                                  3mks
  34. Section breaks
  35. Thesaurus
  36. Superscript
  37. State two advantages of  impact printers                                                                             2mks
  38. State the function of the following keys on the computer keyboard                                  3mks
  39. Enter key
  40. Insert key
  41. Delete key
  42. State the technology used by the following secondary devices to store data                      3mks
  43. Magnetic storage devices
  44. Solid state storage devices
  45. Optical storage devices
  46. State three reasons why an operating system is important in a computer                         3mks
  47. A typical computer’s main memory consists of both volatile and non-volatile memory.
  48. i)  Explain what is meant by the term volatile memory                                          (1mark)
  49. ii) What is normally stored in the non-volatile part of a computer’s main memory (1mark)
  50. Explain why having cache memory can improve the performance of the CPU         (2mks)
  51. What is a computer system?                                                                                           (1mk
  52. Give two differences between a solid state drive (SSD) and a hard disk drive (HDD)   2mks
  53. State three categories of software classified according User license agreement              (3mks)
  54. State two disadvantages of Random Access Memory                                                       (1mk)
  55.  
  56.  
  57. a) Explain the functions performed by the following components of a processor   (2 marks)
  58. Control unit
Question Image

Describe overtype and insert modes as used in word processors

  • Overtype mode: deletes the current text at the cursor position and replaces the existing characters with new text
  • Insert Mode: pushes the existing text away as new text is inserted between the existing text
Question Image

Explain one reason why a computer needs to be connected to a stable power source

System Stability: Computers require a consistent and stable power supply to function properly. Fluctuations or interruptions in the power source can cause various issues that can disrupt the computer's operation or lead to hardware damage.

a. Data Loss: Sudden power outages or voltage fluctuations can cause the computer to shut down abruptly, resulting in data loss if unsaved work is not properly stored. This can be particularly problematic when working on critical tasks or handling important files.

b. Hardware Damage: Power surges or inconsistent power supply can damage the computer's internal components, including the motherboard, CPU, memory, and storage devices. These damages can result in system instability, reduced performance, or even complete hardware failure.

c. Operating System Corruption: Abrupt power loss or inconsistent power supply can corrupt the operating system files, leading to system crashes, error messages, and instability. This may require system repairs or reinstallation of the operating system.

d. Component Lifespan: Inconsistent power supply can put unnecessary stress on computer components, shortening their lifespan. Frequent power fluctuations or surges can cause wear and tear on various parts, reducing their efficiency and overall longevity.

Question Image

A car park uses a number plate recognition system. Identify the reason why unsigned integers should be used to record the number of cars entering and leaving the car park, rather than signed integers

  • Unsigned integers store more positive values
Question Image

Data integrity in a database can be divided into three categories: referential integrity, domain integrity and entity integrity.

(a)Outline the meaning of each of the following.

(i) Referential integrity

(ii) Entity integrity

(b) Describe how data integrity can improve the process of database management. (2 marks)

(i) Referential integrity

  • Two entities that are related require that a foreign key must have a matching primary key

(ii) Entity integrity

  • Entity integrity specifies that the Primary Keys on every instance of an entity must be kept, must be unique and must have values other than NULL

(b) Describe how data integrity can improve the process of database management. (2 marks)

  • Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle and is a critical aspect to the design, implementation, and usage of any system that stores, processes, or retrieves data
  • The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities)
Question Image

Explain two computer hardware features that may be considered when selecting a laptop computer to be used in developing a KCSE computer studies project (4mks)

Multimedia Capability - A laptop with strong multimedia capabilities is essential for a computer studies project submitted on CD-RW. This ensures that the laptop can efficiently handle multimedia content, providing a seamless experience in creating and presenting project materials.

Processor Speed - Opting for a laptop with a high processor speed is crucial. This feature enables the smooth execution of multiple applications simultaneously, enhancing overall project efficiency and reducing processing delays.

Hard Disk Capacity - Consider a laptop with ample hard disk capacity, as the Microsoft Office suite used in computer projects requires significant space for the installation and storage of project files. A spacious hard drive ensures that there is sufficient room for data and applications.

Main Memory Capacity - Given that students often work with multiple programs concurrently during a project, it's important to choose a laptop with an adequate main memory size. A smaller main memory may result in performance issues, hindering the seamless operation of various software applications during project development.

 

State the functions of the following registers

Program counter // PC
Stores the address of the next instruction to be fetched
Memory address register // MAR
Stores the address where data/instruction is to be read from or saved to
Memory data register // MDR
Stores data that is about to be written to memory // Stores data that has just been read from memory
Current instruction register // CIR
Stores the instruction that is currently being decoded/executed

Question Image

State advantages and disadvantages of Solid State Drives and Hard Disk Drives

Advantages of  of Hard Disk Drive

  • Hard disk drives are cheaper per gigabyte than solid state drives.
  • Hard disks have a longer lifespan than solid state drives

Disadvantages of Hard Disk Drives

  • Consumes more power than SDD
  • They are noisy.
  • They are slower than solid state drives.
  • They are susceptible to wear and tear as they have movable parts.

Advantages of Solid State Drives

  • Are faster than HDDs
  • It is more durable as it does not have moving parts
  • Consumes less power
  • Are not noisy

Disadvantages of SDD

  • It costs more than a conventional hard disk
  • Have fewer write/erase cycles compared to a hard disk drive
  • Lost data cannot not be recovered
Question Image

Describe the following features of a graphical user interface:

(a) Pointer

(b) Desktop

(a) Pointer

  •  A graphical object on a computer screen that responds to move movement and allows the computer user to select and execute commands in graphical user interface operating systems

(b) Desktop

  • It Is a special folder in the file system that is displayed when no other windows are open
Question Image

Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access

(The parent can) set criteria for the websites she is allowed to visit such as a whitelist/blacklist of websites. The firewall will examine the data/traffic incoming and outgoing from her computer. If data is sent from a website that is not allowed, it will be blocked

Question Image

Differentiate between action query and select query

An action query is used to modify, add, or delete data in a database whereas a select query is used to retrieve data from a database based on specified criteria but does not make any changes to the data.

Question Image

Explain the difference between main memory and secondary storage.

  • Main memory is transitory/temporary/volatile, secondary storage is (semi-)permanent
  • The processor can only use data/instructions that are in the main memory
  • Main memory is directly accessible to the processor, secondary storage is not directly accessible to the processor 
Question Image

Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms.

Virus

  • - program/software that replicates/copies itself
  • – can delete or alter files/data stored on a computer
  •  – can make the computer “crash”/run slow

Pharming -

  • malicious code/software installed on a user’s hard drive/actual webserver
  •  – this code redirects user to a fake website (without their knowledge)
  •  – to obtain personal/financial information/data

Phishing

  • - legitimate-looking emails sent to a user
  • – as soon as the recipient opens/clicks on the link in the email/attachment …
  • – … the user is directed to a fake website (without their knowledge)
  • – To obtain personal/financial information/data
Question Image

State the uses of 3D printers

  • Making prosthetic limbs for patients
  • Making items which allow precise reconstructive surgery
  • Making light-weight plane wings
  • Making sculptures
Question Image