Share via Whatsapp

Section A. Answer all questions in the spaces provided

  1. Computers evolved through different technological advancement from the first generation to the fifth generation. Differentiate between the 2nd and 3rd generation computers in terms of secondary storage memory, programs and technology used to make them (3 mrks)
  2. Explain two situations under which warm booting of a computer may be necessary (2 mrks)
  3. Repetitive strain Injuries is one of the common problems associated with the use of computers. Explain any two health issues that could arise from improper use of standard furniture while using computers (4marks)
  4. Differentiate between Control bus and Address bus in computers (2 mrks)
  5. Explain four Data types used in spreadsheets (4 mrks)
  6. Utility programs are commonly used to perform some commonly used services to make computing run smoothly. State any two examples of utility programs(2 marks)
  7. An institution wants to purchase genuine software. Explain any two types of documents that should accompany an original software (2marks)
  8. Kenya National Bureau of statistics has been going through its census using manual systems. State three ways in which computers can be used to improve efficiency in the census process (3marks)
  9. Figure 1 and figure 2 shows icons representing commands used to manipulate graphics in a DTP package.

    Explain the use of each of the icons labeled Figure 1 and Figure 2 ` (2marks)
  10. List three paragraph formatting attributes in a word processor (3marks)
  11. A system designer must work well with a programmer to develop a system. State any three duties of a software developer (3marks)
  12. List any four pointing input devices commonly used in computing (2marks)
  13. Differentiate between tracking and kerning as used in DTP (2 mrks)
  14. State four factors that determine how an operating system organizes data in computers (4 marks)
  15. Explain the difference between software portability and hardware portability (2 mrks)

Section B. Answer question 16 and any other three questions

    1. define the following terms as applied in programming
      1. Syntax (1 mrk)
      2. Source program (1 mrk)
      3. Translator (1 mrk)
    2. use the pseudocode to answer the questions that follow
      set year=1
      profit =2
          Write A
          Until year>7
            Output P
      1. Determine the value of the output P (5 mrks)
      2. Draw a flowchart for the above pseudocode (7 mrks)
      1. Define the term Artificial intelligence as used in computers (1 mrk)
      2. List Four categories of Articial intelligence (4 mrks)
    2. Due to the rapid change in Technology, many campanies are giving up on traditional methods of production. This has affected the companies in many different ways. State any Three benefits that automated methods has affected the industrial production (3 marks)
    3. Name Three duties performed by a computer engineer (3 marks)
    4. With the introduction of computers, it has let to positive or necative impact in the society. State Three Negative effects of ICT on cultural impacts (3 marks)
    1. Differentiate between a nibble and byte (2marks)
    2. Convert each of the following numbers into their respective equivalence
      1. 110.1012
      2. 7348 to hexadecimal equivalence (2marks)
      3. 142.88 to decimal equivalence (2marks)
      4. Perform the following arithmetic calculation (2marks)
      5. Using two’s complement, show how the arithmetic below could be carried out on a 8-bit notation computer system (5marks)
        2910 - 5410
    1. Differentiate between server and client as used in networking. (2 marks)
    2. The diagram below illustrates satellite transmission media. Name the parts labelled A, B and C. (3 marks)
    3. Repeaters are networking devices utilized in data transmission. State two functions of the device. (2 marks)
      1. Define the term network protocol. (1 mark)
      2. State three benefits of internet to a school. (3 marks)
      3. Explain the difference between CC and BCC as used in e-mail.(2 marks)
      4. Apart from passwords, list any four security control measures used to prevent unauthorized access to information systems. (2 marks)
      1. Differentiate between perfective and corrective system maintenance (2 mrks)
      2. State three factors to consider when performing file conversion during system implementation (3 mrks)
      1. Define the term data integrity (1 mrk)
      2. Explain any two ways in which data integrity is measured (4 mrks)
    3. Operating system consists of a set of complex programs that work together to control execution of user programs and acts as an interface between applications and computer hardware.
      1. With reference to disk management system, describe the following operations
        1. Disk partitioning (1 mrk)
        2. Disk defragmentation (1 mrk)
      2. Give three details about a file that is stored by an operating system (3 mrks)
Join our whatsapp group for latest updates


Tap Here to Download for 50/-

Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students

Get on WhatsApp Download as PDF
Subscribe now

access all the content at an affordable rate
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp


What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest