Print this page

COMPUTER STUDIES PAPER 1 -Kenya certificate oif Secondary Education (KCSE 2016)

Rate this item
(0 votes)
Download PDF for future reference Install our android app for easier access

Click the link below to download the full 2016 KCSE Past Paper with Marking Scheme pdf document, with all the topics.

    1. State the meaning of the term disk defragmentation as used in computers. (1 mark)
    2. State the purpose of disk defragmentation. (1 mark)
  2. Identify the appropriate computer output device suitable for each of the following tasks:
    1. generating receipts where carbon copies are required; (1 mark)
    2. an architectural drawing where precision is required; (1 mark)
    3. producing document output for a visually impaired person. (1 mark)
  3. Pesa Tele Company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem. (3 marks)
  4. Explain two ways in which the use of Internet could make reporting of corruption easier.(4 marks)
  5. State two ways in which software errors can be prevented in program development.
  6. Convert each of the following binary numbers to decimal equivalent given that the left most digit is a sign bit:
    1. 00101101
    2. 11001001
  7. State the functions of each of the following keys on the computer keyboard: (2 marks)
    1. backspace;
    2. insert (ins)
  8. An organisation intends to replace an existing system by carrying out the process in stages.
    1. Name this implementation strategy; (1 mark)
    2. Give two reasons why the organisation is opting to use the implementation strategy in (a) above. (2 marks)
    3. A manager wishes to replace the current manual system with a computerised one. Describe three main areas that must be evaluated to justify the replacement. (6 marks)
  9. Headache, back and neck pain may result from the use of computers.
    State how each of them can be minimised. (2 marks)
    1. Headache
    2. Back & Neck Pain
  10. Students of a school intend to elect their school captain by secret ballot. State three ways in which computers can be used to improve the election process. (3.marks)
  11. Explain why an intranet is a more secure way to share files within an organisation compared to the Internet. (2 marks)
  12. List two career opportunities directly associated with computer networking. (2 marks)
  13. Distinguish between a formula and a function as used in spreadsheets. (2 marks)
  14. The C directory of a computer has folders named Form 1, Form 2, Form 3 and Form 4. Each class has students' folders named according to their admission number. The students created their own folder for subjects they are studying based on the table shown below:
     Form 1 Form 2  Form 3 Form 4 
     OS  SP  Prog.  ADB


    1. A form four student intends to create a folder named proj to store project documents.
      State the path for the project folder. (1 mark)
    2. Suggest how the student can ensure that:
      1. work is not lost in case the hard disk fails; (1 mark)
      2. the project is not copied by other students. (1 mark)
  15. A water company sends out clerks to read meters. The data collected by the clerks is then fed into the computer and then all bills are printed at the same time.
    1. State two advantages of this approach; (2 marks)
    2. Name this type of data processing.(1 mark)
  16. Figure 1 shows a flowchart. Use it to answer the questions that follow.
    1. Interpret the flowchart. (9 mark
    2. Write a pseudo code for the flowchart. (6 marks)
    1. With the aid of a diagram, describe the Hierarchical Database Model. (4 marks)
    2. List three factors that should be considered when developing a database application and give reasons why each should be considered. (6 marks)
      1. Name three types of validation checks during data entry in data processing.(3 marks)
      2. Differentiate between primary key and index key as used in databases. (2 mark
    1. Explain two health issues that could arise from the use of unsuitable computer desk. (4 marks)
      1. Describe two ways in which a positive number and a negative number can be represented in a computer (2 marks)
      2. A particular computer stores numbers in a single 8-bit word.
        Determine how the number 0.3125 10 would be represented. (3 marks)

    1. Figure 2 shows a block diagram of a computer system and its peripheral devices. Use it and answer the questions that follow.
      computer system
      1. Name two devices that may be used for storing data for a long duration. (2 marks)
      2. Name three peripheral devices that are used for input.(3 marks
      3. Name two other devices that a Computer Aided Design (CAD) user might wish to add to the set up above in order to perform his tasks effectively. (2 marks)
    2. A customer wishes to purchase a computer system. The customer can buy word processor, spreadsheet, database, and a drawing package separately or as an integrated package. State three reasons why the customer would prefer an integrated package to separate packages(3mks).
    1. Explain three ways in which an operating system provides data security in a computer system (6 marks)
    2. State two instances where observation is not a viable method of gathering data during system analysis stage. (2 marks)
      1. State the role of each of the following data communication devices:
        • repeater (1 mark)
        • router. (1 mark)
      2. The figure below shows a network based on the bus topology.
        bus topology
        • Identify the component labelled P.
        • State the function of the component labelled P.
Read 444 times Last modified on Wednesday, 27 March 2019 10:47
Print PDF for future reference Join our whatsapp group for latest updates

Related items