INSTRUCTIONS TO CANDIDATES:
- Write your Name, Index Number and School in the spaces provided above
- This paper consists of Two sections A and B.
- Answer ALL questions in Section A.
- Answer question 16 and any other THREE questions from Section B.
- All answers should be written in the spaces provided on the question paper..
SECTION A (40 MARKS)
ANSWER ALL QUESTIONS IN THIS SECTION.
-
- Give a reason for each of the following disk management techniques. (3 mks)
- Disk partitioning
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Disk compression
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Disk defragmenting
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Disk partitioning
- Define the term volatility (1mk)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Give a reason for each of the following disk management techniques. (3 mks)
-
- Define recycle bin. (1mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Describe the use of the following language translators (3mks)
- Assemblers
……………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Compilers
……………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Source code
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Assemblers
- Define recycle bin. (1mk)
-
- Explain the concept of distributed databases. (1mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Give one advantages of distributed databases. (1mks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
- Explain the concept of distributed databases. (1mk)
-
- Write the acronym BIOS in full. (1mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - What is the use of BIOS in a computer system? (1mk)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Write the acronym BIOS in full. (1mk)
- State two measures that can be taken to protect computers from physical theft in the computer laboratory. (2 mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Briefly describe the following threats to privacy and confidentiality of data and information. (3mks)
- Eavesdropping
……………………………………………………………………………………………………………………………………………………………………………………………………………………………..……………………………………….. - Industrial epiosonage
……………………………………………………………………………………………………………………………………………………………………………………………………………………………..……………………………………….. - Hacking
………………………………………………………………………………………………………………………………………………………………………………………………………………………………..…………………………………….
- Eavesdropping
- Give any two characteristics of a good password. (2mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - The principal at Machole High School intends to start offering computer studies to the students. He approached you for advice on how to prepare a computer laboratory. Give some four factors that you will advise him to consider when preparing the computer laboratory. (2 Mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Explain the meaning of the term bolding. (1mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………..……………………………………………….. - List any two types of signals that can be used in data transmission. (1mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………..……………………………………………… - Explain the concept of “Line of sight” in wireless communication. (2mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Explain the following in regard to satellite communication that rotate at the same rate as the earth. (2mk)
- Uplink
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Downlink
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Uplink
- What is a logical error in a program? (1mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - List any two methods one can use to test a program. (2mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………. -
- Define the term e-mail. (1mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Explain the information found in the following elements of an email.
- Spam (1 mk)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….. - Draft (1 mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………. - Inbox (1 mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
- Spam (1 mk)
- Give two disadvantages of using e-commerce rather than the conventional method of carrying out business. (2mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Define the term e-mail. (1mk)
-
- Give a reason of formatting a document. (1mk)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… - Give any two examples of word processor software. (1mk)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………. - List any two types of keyboards that is used to input data into a computer. (2 mks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Give a reason of formatting a document. (1mk)
SECTION B (60 Marks)
Answer question 16 and any other three questions in this section.
- Baraka Roses Flower Company pays casual employees based on the number of hours worked as follows
- Less than 10 hours @ khs.100/= per hour
- Up to 15 hours @ khs150/= per hour
- More than 15 hours @khs200/= /per hour
- Write a pseudo code to input the name, rate hours worked. The pseudo code should output the name, hours worked and the wage paid. (6mks)
........................................................................................................................................................................................................................................................................................................................................................... - Draw a flowchart for the above pseudo code (5mks)
.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - State the uses of the following symbols in programming. (4mks)
- Write a pseudo code to input the name, rate hours worked. The pseudo code should output the name, hours worked and the wage paid. (6mks)
-
- List four characteristics of a system (2mks)
................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ - Give any three circumstances that may make an organization to develop a new information system (3mks)
....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - State three system changeover strategies (3 mks)
....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - Give four roles performed by an information system analyst in an organization. (4 mks)
........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ - Describe three guidelines that need to be considered when using interview as the method of fact finding. (3 Mks)
..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
- List four characteristics of a system (2mks)
- Study the diagram below and answer the questions that follow.
- Give the effects of left clicking on the parts labeled. (3 Mks)
- …………………………………………………………………………………
- …………………………………………………………………………………
- …………………………………………………………………………………
- Write the functions that will be entered in the following cells. (4 mks)
F2 : ……………………………………………………………………………………
G2 : …………………………………………………………………………………..
C9: …………………………………………………………………………………...
B10 : ………………………………………………………………………………… - Differentiate between the traditional analysis ledger sheet and an electronic spreadsheet. (3 mks)
....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - Name four data types used in spreadsheets (2 mks)
........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - Explain the following concepts as used in spreadsheets: (3 mks)
- Automatic recalculation
................................................................................................................................................................................................................................................................................................................................................ - “What if” analysis
............................................................................................................................................................................................................................................................................................................................................... - Worksheet
..............................................................................................................................................................................................................................................................................................................................................
- Automatic recalculation
- Give the effects of left clicking on the parts labeled. (3 Mks)
- Explain the meaning of the term file organization. (2 mks) ………………………………………………………………………………………..………………………………………………………………………………………………………………………………….………………………….
- Indicate the method of file access for the following file organization methods. (2 mks)
- Indexed sequential: ………………………………………………
- Sequential: ………………………………………………………….
- Serial: ………………………………………………………………..
- Random: …………………………………………………………….
- List the six stages of data collection in their correct order. (3mks)
.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - Differentiate between the following types of errors.
- Misreading and Transposition error. (2 mks)
..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - Overflow and truncation errors. (2 mks)
...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - Give four ways of minimizing threat to data integrity. (4 mks)
..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
- Misreading and Transposition error. (2 mks)
- Indicate the method of file access for the following file organization methods. (2 mks)
-
- Describe the use of the following buses. (3mks)
- Data bus
........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ - Address bus
...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - Control bus
..............................................................................................................................................................................................................................................................................................................................................
- Data bus
- In relation to the control unit of the CPU, explain the three stages of the fetch execute cycle. (3mks)
..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - A CPU has got registers for internal operations.
- Define the term register. (1mk)
...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... - Describe the functions of the following registers. (3mks)
- Instruction register
.............................................................................................................................................................................................................................................................................................................................................. - Working register
............................................................................................................................................................................................................................................................................................................................................... - Accumulator.
...............................................................................................................................................................................................................................................................................................................................................
- Instruction register
- Define the term register. (1mk)
- Indicate an area of application for. (3mks)
- Joystick
.............................................................................................................................................................................................................................................................................................................................................. - Touch screen
................................................................................................................................................................................................................................................................................................................................................ - Graphic tablet
....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
- Joystick
- Explain the difference between softcopy output and hardcopy output. (2mks)
......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
- Describe the use of the following buses. (3mks)
MARKING SCHEME
-
- Give a reason for each of the following disk management techniques. (3 mks)
- Disk partitioning
Process of dividing large physical disk into two or more portions called logical drives - Disk compression
Squeezing disk contents to free space on the media - Disk defragmenting
Re-arranging scattered folders to speed up access and retrieval
- Disk partitioning
- Define the term volatility (1mk)
Frequency with which records are added to the file or deleted from.
Volatile - memory cost which when power goes off the content
- Give a reason for each of the following disk management techniques. (3 mks)
-
- Define recycle bin. (1mk)
Locaton where deleted files and folders are stored and can be accessed and restored back. - Describe the use of the following language translators (3mks)
- Assemblers
It is a language translator that translates assembly language into machine readable form that a computer can understand - Compilers
Translator that translates entire source program into objecto code - Source code
Program that is in human readable form
- Assemblers
- Define recycle bin. (1mk)
-
- Explain the concept of distributed databases. (1mk)
Running databases or programs on different computers which are on the same network - Give one advantages of distributed databases. (1mks)
Failure of central computer does not affect operations of the other
Processing loud is equally distributed hence no wastage
Processing is fast since PPI does not process their own work
- Explain the concept of distributed databases. (1mk)
-
- Write the acronym BIOS in full. (1mk)
Basic input output system - What is the use of BIOS in a computer system? (1mk)
It directs the power on self test during booting
- Write the acronym BIOS in full. (1mk)
- State two measures that can be taken to protect computers from physical theft in the computer laboratory. (2 mks)
Employ guards
Burglar proofing
Reinforce weak access points
Install backup storage preferable out of the computer room - Briefly describe the following threats to privacy and confidentiality of data and information. (3mks)
- Eavesdropping
Tapping into communication channels to get information - Industrial epiosonage
Spying on a computer to get information that can be used to cripple the competitor - Hacking
Intentional breaking of codes and passwords to gain access
- Eavesdropping
- Give any two characteristics of a good password. (2mks)
At least six characters long including letters and numbers
Not easy for someone to know easily
Easy to remember - The principal at Machole High School intends to start offering computer studies to the students. He approached you for advice on how to prepare a computer laboratory. Give some four factors that you will advise him to consider when preparing the computer laboratory. (2 Mks)
Number of computers to help set up
Maximum number of users
Reliability of source of power
Security of computer hardware and software - Explain the meaning of the term bolding. (1mk)
Increase the intensity of text such that when printed it appears thicker than normal - List any two types of signals that can be used in data transmission. (1mk)
Digital signal
Analogue signal - Explain the concept of “Line of sight” in wireless communication. (2mks)
It is a transmission whereby stationaries are placed strategically where they can connect and "See" each other - Explain the following in regard to satellite communication that rotate at the same rate as the earth. (2mk)
- Uplink
Signal sent from the earth station to the satellite that is hosted in the spaces - Downlink
After uplink, the signal is received by satellite, amplified and transmitted to the earth station
- Uplink
- What is a logical error in a program? (1mk)
An error not detectable by translators whereby the program run seccessfully but give wrong output
Syntax - error from improper use of programming languages - List any two methods one can use to test a program. (2mks)
Desk cleaning - correction done on papers
Debugging utilities. Errors corrected by execution
Test data - Trial runs by programmers
Reasons for testing;
Ensure all the system programs are error free
Guarantee that end user can successfully interact -
- Define the term e-mail. (1mk)
Software that enables one to create an account over the nternet that can be used to send and receive messages from other people - Explain the information found in the following elements of an email.
- Spam (1 mk)
Folder in an email account where all junk and suspicious mails received are stored - Draft (1 mk)
- Inbox (1 mk)
A folder in your account where all genuine incoming received mails are stored
- Spam (1 mk)
- Give two disadvantages of using e-commerce rather than the conventional method of carrying out business. (2mks)
- Define the term e-mail. (1mk)
-
- Give a reason of formatting a document. (1mk)
To make it more attractive and appealing to the reader - Give any two examples of word processor software. (1mk)
- List any two types of keyboards that is used to input data into a computer. (2 mks)
- Give a reason of formatting a document. (1mk)
SECTION B (60 Marks)
Answer question 16 and any other three questions in this section.
- Baraka Roses Flower Company pays casual employees based on the number of hours worked as follows
- Less than 10 hours @ khs.100/= per hour
- Up to 15 hours @ khs150/= per hour
- More than 15 hours @khs200/= /per hour
- Write a pseudo code to input the name, rate hours worked. The pseudo code should output the name, hours worked and the wage paid. (6mks)
Start
Enter name, hours worked
If hours worked<10
Rate = Hours * 100
If hours worked = <15
Rate = Hours worked * 150
If hours worked = <15
Rate = Hours worked * 200
Calculate payment wage = Hours * Rate
Output Hours worked, Payment rate and home
End if
End if
End if
Stop - Draw a flowchart for the above pseudo code (5mks)
- State the uses of the following symbols in programming. (4mks)
Input/output
Process
Decision
Start/stop
- Write a pseudo code to input the name, rate hours worked. The pseudo code should output the name, hours worked and the wage paid. (6mks)
-
- List four characteristics of a system (2mks)
Holostic thinking - many components to make one
Subsystem - made of many system
Boundary and environment
System entropy
Input and output
Open and close
Purpose
Control - Give any three circumstances that may make an organization to develop a new information system (3mks)
New opportunities
Problems with current system
Directions from management and government - State three system changeover strategies (3 mks)
Direct changeover
Parallel changeover
Phased changeover - Give four roles performed by an information system analyst in an organization. (4 mks)
Reviewing existing system and making recommendations
Work with programmer in constructing new system
Prepare system specifications
Prepare instructional manual - Describe three guidelines that need to be considered when using interview as the method of fact finding. (3 Mks)
Interviewee to be informed in good time and topic of discussion
Avoid persmal biases in your questions
Be careful about body language and proxemics
- List four characteristics of a system (2mks)
- Study the diagram below and answer the questions that follow.
- Give the effects of left clicking on the parts labeled. (3 Mks)
- Change font face
- Change color
- Underline
- Write the functions that will be entered in the following cells. (4 mks)
F2 : Sum= (B2:E2)
G2 : Average (B2:E2)
C9: Sum (C2:C8)
B10 : Min (B2:B8) - Differentiate between the traditional analysis ledger sheet and an electronic spreadsheet. (3 mks)
Utilizes powerful aspects of computer e.g speed and storage
Offer large virtual sheet for a lot of data to be entered
Utilize large storage space in the computer
Has inbuilt formula and functions making calculations easy
Automatically adjust records if data in worksheet is changed - Name four data types used in spreadsheets (2 mks)
Label - text or alphanumeric characters
Values - Numbers that can be manipulated
Formula
Functions
Date and time - Explain the following concepts as used in spreadsheets: (3 mks)
- Automatic recalculation
It is where data is automatically adjusted once records in a worksheet have been changed - “What if” analysis
Involves changing changing the value of one of the arguments in a formula to see the difference the change would make on the result of the calculation - Worksheet
Worksheet is a collection of rows and columns where data is entered
- Automatic recalculation
- Give the effects of left clicking on the parts labeled. (3 Mks)
- Explain the meaning of the term file organization. (2 mks)
It is the way data is stored ina file- Indicate the method of file access for the following file organization methods. (2 mks)
- Indexed sequential: Direct access
- Sequential: Serial or binary search
- Serial: Serral
- Random: Direct
- List the six stages of data collection in their correct order. (3mks)
Data creation
Data transmission
Data preparation
Media conversion
Input validation
Sorting - Differentiate between the following types of errors.
- Misreading and Transposition error. (2 mks)
Misleading - Occur when incorrect reading of source document is done by user when typing e.g S instead of 5
Transposition - Occur as a result of incorrect arrangement of characters e.g 518 instead of 581 - Overflow and truncation errors. (2 mks)
Overflow - Occur from a calculation that has a long fractional part which cannot fit in allocated memory
Truncation - Occur when numbers with long fractional part are cut to fit in the allocated space - Give four ways of minimizing threat to data integrity. (4 mks)
Using error detection and correction software when transmitting data
Using device that capture data direct from the source e.g camera
Controlling access to data by enforcing security measures
Back up data preferably on external storage
- Misreading and Transposition error. (2 mks)
- Indicate the method of file access for the following file organization methods. (2 mks)
-
- Describe the use of the following buses. (3mks)
- Data bus
Pathway where actual data transfer take place - Address bus
Pathway used to locate storage position in memory for the data to be executed - Control bus
Pathway for timing and controlling functions sent by the control unit to the parts of the system
- Data bus
- In relation to the control unit of the CPU, explain the three stages of the fetch execute cycle. (3mks)
An instruction is fetched from the memory
An instruction is interpreted (decoded)
An instruction is implemented - A CPU has got registers for internal operations.
- Define the term register. (1mk)
One cell storage in the CPU - Describe the functions of the following registers. (3mks)
- Instruction register
Temporarily hold an instruction but it is interrupted into a form that CPU can uncerstand - Working register
Store data that is being processed - Accumulator.
Store intermediate results from immediate processing
- Instruction register
- Define the term register. (1mk)
- Indicate an area of application for. (3mks)
- Joystick
Playing computer games - Touch screen
Mobile phones, news rooms.
Where people are standing or wet areas - Graphic tablet
For designing using Computer Aided Design(CAD)
- Joystick
- Explain the difference between softcopy output and hardcopy output. (2mks)
Soft copy is a document that is intangible and is found in a machine while harcopy is a printed copy that is tangible
- Describe the use of the following buses. (3mks)
Download Computer Studies Paper 1 Questions and Answers - Lanjet Joint Mock Exams 2020.
Tap Here to Download for 50/-
Get on WhatsApp for 50/-
Why download?
- ✔ To read offline at any time.
- ✔ To Print at your convenience
- ✔ Share Easily with Friends / Students