Computer Studies Paper 1 Questions and Answers - Lanjet Joint Mock Exams 2020

Share via Whatsapp

INSTRUCTIONS TO CANDIDATES:

  • Write your Name, Index Number and School in the spaces provided above
  • This paper consists of Two sections A and B.
  • Answer ALL questions in Section A.
  • Answer question 16 and any other THREE questions from Section B.
  • All answers should be written in the spaces provided on the question paper..

SECTION A (40 MARKS)
ANSWER ALL QUESTIONS IN THIS SECTION.

  1.    
    1. Give a reason for each of the following disk management techniques. (3 mks)
      1. Disk partitioning
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      2. Disk compression
        ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      3. Disk defragmenting
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. Define the term volatility (1mk)
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  2.    
    1. Define recycle bin. (1mk)
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. Describe the use of the following language translators (3mks)
      1. Assemblers
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      2. Compilers
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      3. Source code
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  3.    
    1. Explain the concept of distributed databases. (1mk)
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. Give one advantages of distributed databases. (1mks)
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      ……………………………………………………………………………………………………………………………………
  4.    
    1. Write the acronym BIOS in full. (1mk)
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. What is the use of BIOS in a computer system? (1mk)
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  5. State two measures that can be taken to protect computers from physical theft in the computer laboratory. (2 mks)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  6. Briefly describe the following threats to privacy and confidentiality of data and information. (3mks)
    1. Eavesdropping
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………..………………………………………..
    2. Industrial epiosonage
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………..………………………………………..
    3. Hacking
      ………………………………………………………………………………………………………………………………………………………………………………………………………………………………..…………………………………….
  7. Give any two characteristics of a good password. (2mks)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  8. The principal at Machole High School intends to start offering computer studies to the students. He approached you for advice on how to prepare a computer laboratory. Give some four factors that you will advise him to consider when preparing the computer laboratory. (2 Mks)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  9. Explain the meaning of the term bolding. (1mk)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………..………………………………………………..
  10. List any two types of signals that can be used in data transmission. (1mk)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………..………………………………………………
  11. Explain the concept of “Line of sight” in wireless communication. (2mks)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  12. Explain the following in regard to satellite communication that rotate at the same rate as the earth. (2mk)
    1. Uplink
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. Downlink
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  13. What is a logical error in a program? (1mk)
    …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  14. List any two methods one can use to test a program. (2mks)
    …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
  15.    
    1. Define the term e-mail. (1mk)
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. Explain the information found in the following elements of an email.
      1. Spam (1 mk)
        ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
      2. Draft (1 mk)
        ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
      3. Inbox (1 mk)
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
    3. Give two disadvantages of using e-commerce rather than the conventional method of carrying out business. (2mks)
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  16.    
    1. Give a reason of formatting a document. (1mk)
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. Give any two examples of word processor software. (1mk)
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
    3. List any two types of keyboards that is used to input data into a computer. (2 mks)
      …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

SECTION B (60 Marks)
Answer question 16 and any other three questions in this section.

  1. Baraka Roses Flower Company pays casual employees based on the number of hours worked as follows
    • Less than 10 hours @ khs.100/= per hour
    • Up to 15 hours @ khs150/= per hour
    • More than 15 hours @khs200/= /per hour
      1. Write a pseudo code to input the name, rate hours worked. The pseudo code should output the name, hours worked and the wage paid. (6mks)
        ...........................................................................................................................................................................................................................................................................................................................................................
      2. Draw a flowchart for the above pseudo code (5mks)
        ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      3. State the uses of the following symbols in programming. (4mks)
        1
        2
        3
        4
  2.    
    1. List four characteristics of a system (2mks)
      ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    2. Give any three circumstances that may make an organization to develop a new information system (3mks)
      .......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    3. State three system changeover strategies (3 mks)
      .......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    4. Give four roles performed by an information system analyst in an organization. (4 mks)
      ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    5. Describe three guidelines that need to be considered when using interview as the method of fact finding. (3 Mks)
      ..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
  3. Study the diagram below and answer the questions that follow.
    5
    1. Give the effects of left clicking on the parts labeled. (3 Mks)
      1. …………………………………………………………………………………
      2. …………………………………………………………………………………
      3. …………………………………………………………………………………
    2. Write the functions that will be entered in the following cells. (4 mks)
      F2 : ……………………………………………………………………………………
      G2 : …………………………………………………………………………………..
      C9: …………………………………………………………………………………...
      B10 : …………………………………………………………………………………
    3. Differentiate between the traditional analysis ledger sheet and an electronic spreadsheet. (3 mks)
      .......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    4. Name four data types used in spreadsheets (2 mks)
      ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    5. Explain the following concepts as used in spreadsheets: (3 mks)
      1. Automatic recalculation
        ................................................................................................................................................................................................................................................................................................................................................
      2. “What if” analysis
        ...............................................................................................................................................................................................................................................................................................................................................
      3. Worksheet
        ..............................................................................................................................................................................................................................................................................................................................................
  4. Explain the meaning of the term file organization. (2 mks) ………………………………………………………………………………………..………………………………………………………………………………………………………………………………….………………………….
    1. Indicate the method of file access for the following file organization methods. (2 mks)
      1. Indexed sequential: ………………………………………………
      2. Sequential: ………………………………………………………….
      3. Serial: ………………………………………………………………..
      4. Random: …………………………………………………………….
    2. List the six stages of data collection in their correct order. (3mks)
      ....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    3. Differentiate between the following types of errors.
      1. Misreading and Transposition error. (2 mks)
        .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      2. Overflow and truncation errors. (2 mks)
        ......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      3. Give four ways of minimizing threat to data integrity. (4 mks)
        ..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
  5.    
    1. Describe the use of the following buses. (3mks)
      1. Data bus
        ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      2. Address bus
        ......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      3. Control bus
        ..............................................................................................................................................................................................................................................................................................................................................
    2. In relation to the control unit of the CPU, explain the three stages of the fetch execute cycle. (3mks)
      .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    3. A CPU has got registers for internal operations.
      1. Define the term register. (1mk)
        ......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      2. Describe the functions of the following registers. (3mks)
        1. Instruction register
          ..............................................................................................................................................................................................................................................................................................................................................
        2. Working register
          ...............................................................................................................................................................................................................................................................................................................................................
        3. Accumulator.
          ...............................................................................................................................................................................................................................................................................................................................................
    4. Indicate an area of application for. (3mks)
      1. Joystick
        ..............................................................................................................................................................................................................................................................................................................................................
      2. Touch screen
        ................................................................................................................................................................................................................................................................................................................................................
      3. Graphic tablet
        ....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    5. Explain the difference between softcopy output and hardcopy output. (2mks)
      ......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................


MARKING SCHEME

  1.    
    1. Give a reason for each of the following disk management techniques. (3 mks)
      1. Disk partitioning
        Process of dividing large physical disk into two or more portions called logical drives
      2. Disk compression
        Squeezing disk contents to free space on the media
      3. Disk defragmenting
        Re-arranging scattered folders to speed up access and retrieval
    2. Define the term volatility (1mk)
      Frequency with which records are added to the file or deleted from. 
      Volatile - memory cost which when power goes off the content
  2.    
    1. Define recycle bin. (1mk)
      Locaton where deleted files and folders are stored and can be accessed and restored back.
    2. Describe the use of the following language translators (3mks)
      1. Assemblers
        It is a language translator that translates assembly language into machine readable form that a computer can understand
      2. Compilers
        Translator that translates entire source program into objecto code
      3. Source code
        Program that is in human readable form
  3.     
    1. Explain the concept of distributed databases. (1mk)
      Running databases or programs on different computers which are on the same network
    2. Give one advantages of distributed databases. (1mks)
      Failure of central computer does not affect operations of the other
      Processing loud is equally distributed hence no wastage
      Processing is fast since PPI does not process their own work
  4.        
    1. Write the acronym BIOS in full. (1mk)
      Basic input output system
    2. What is the use of BIOS in a computer system? (1mk)
      It directs the power on self test during booting
  5. State two measures that can be taken to protect computers from physical theft in the computer laboratory. (2 mks)
    Employ guards
    Burglar proofing
    Reinforce weak access points
    Install backup storage preferable out of the computer room
  6. Briefly describe the following threats to privacy and confidentiality of data and information. (3mks)
    1. Eavesdropping
      Tapping into communication channels to get information
    2. Industrial epiosonage
      Spying on a computer to get information that can be used to cripple the competitor
    3. Hacking
      Intentional breaking of codes and passwords to gain access 
  7. Give any two characteristics of a good password. (2mks)
    At least six characters long including letters and numbers
    Not easy for someone to know easily
    Easy to remember
  8. The principal at Machole High School intends to start offering computer studies to the students. He approached you for advice on how to prepare a computer laboratory. Give some four factors that you will advise him to consider when preparing the computer laboratory. (2 Mks)
    Number of computers to help set up
    Maximum number of users
    Reliability of source of power
    Security of computer hardware and software
  9. Explain the meaning of the term bolding. (1mk)
    Increase the intensity of text such that when printed it appears thicker than normal
  10. List any two types of signals that can be used in data transmission. (1mk)
    Digital signal
    Analogue signal
  11. Explain the concept of “Line of sight” in wireless communication. (2mks)
    It is a transmission whereby stationaries are placed strategically where they can connect and "See" each other
  12. Explain the following in regard to satellite communication that rotate at the same rate as the earth. (2mk)
    1. Uplink
      Signal sent from the earth station to the satellite that is hosted in the spaces
    2. Downlink
      After uplink, the signal is received by satellite, amplified and transmitted to the earth station
  13. What is a logical error in a program? (1mk)
    An error not detectable by translators whereby the program run seccessfully but give wrong output
    Syntax - error from improper use of programming languages 
  14. List any two methods one can use to test a program. (2mks)
    Desk cleaning - correction done on papers
    Debugging utilities. Errors corrected by execution
    Test data - Trial runs by programmers
    Reasons for testing;
    Ensure all the system programs are error free
    Guarantee that end user can successfully interact
  15.    
    1. Define the term e-mail. (1mk)
      Software that enables one to create an account over the nternet that can be used to send and receive messages from other people
    2. Explain the information found in the following elements of an email.
      1. Spam (1 mk)
        Folder in an email account where all junk and suspicious mails received are stored
      2. Draft (1 mk)

      3. Inbox (1 mk)
        A folder in your account where all genuine incoming received mails are stored
    3. Give two disadvantages of using e-commerce rather than the conventional method of carrying out business. (2mks)

  16.    
    1. Give a reason of formatting a document. (1mk)
      To make it more attractive and appealing to the reader
    2. Give any two examples of word processor software. (1mk)

    3. List any two types of keyboards that is used to input data into a computer. (2 mks)

SECTION B (60 Marks)
Answer question 16 and any other three questions in this section.

  1. Baraka Roses Flower Company pays casual employees based on the number of hours worked as follows
    • Less than 10 hours @ khs.100/= per hour
    • Up to 15 hours @ khs150/= per hour
    • More than 15 hours @khs200/= /per hour
      1. Write a pseudo code to input the name, rate hours worked. The pseudo code should output the name, hours worked and the wage paid. (6mks)
        Start 
        Enter name, hours worked
        If hours worked<10
        Rate = Hours * 100
        If hours worked = <15
        Rate = Hours worked * 150
        If hours worked = <15
        Rate = Hours worked * 200
        Calculate payment wage = Hours * Rate
        Output Hours worked, Payment rate and home
        End if
        End if
        End if
        Stop
      2. Draw a flowchart for the above pseudo code (5mks)
        6
      3. State the uses of the following symbols in programming. (4mks)
        Input/output
        1
        Process
        2
        Decision
        3
        Start/stop
        4
  2.    
    1. List four characteristics of a system (2mks)
      Holostic thinking - many components to make one
      Subsystem - made of many system
      Boundary and environment
      System entropy
      Input and output
      Open and close
      Purpose
      Control
    2. Give any three circumstances that may make an organization to develop a new information system (3mks)
      New opportunities
      Problems with current system
      Directions from management and government
    3. State three system changeover strategies (3 mks)
      Direct changeover
      Parallel changeover
      Phased changeover
    4. Give four roles performed by an information system analyst in an organization. (4 mks)
      Reviewing existing system and making recommendations
      Work with programmer in constructing new system
      Prepare system specifications
      Prepare instructional manual
    5. Describe three guidelines that need to be considered when using interview as the method of fact finding. (3 Mks)
      Interviewee to be informed in good time and topic of discussion
      Avoid persmal biases in your questions
      Be careful about body language and proxemics
  3. Study the diagram below and answer the questions that follow.
    5
    1. Give the effects of left clicking on the parts labeled. (3 Mks)
      1. Change font face
      2. Change color
      3. Underline
    2. Write the functions that will be entered in the following cells. (4 mks)
      F2 : Sum= (B2:E2)
      G2 : Average (B2:E2)
      C9: Sum (C2:C8)
      B10 : Min (B2:B8) 
    3. Differentiate between the traditional analysis ledger sheet and an electronic spreadsheet. (3 mks)
      Utilizes powerful aspects of computer e.g speed and storage
      Offer large virtual sheet for a lot of data to be entered
      Utilize large storage space in the computer
      Has inbuilt formula and functions making calculations easy
      Automatically adjust records if data in worksheet is changed
    4. Name four data types used in spreadsheets (2 mks)
      Label - text or alphanumeric characters
      Values - Numbers that can be manipulated
      Formula 
      Functions
      Date and time
    5. Explain the following concepts as used in spreadsheets: (3 mks)
      1. Automatic recalculation
        It is where data is automatically adjusted once records in a worksheet have been changed
      2. “What if” analysis
        Involves changing changing the value of one of the arguments in a formula to see the difference the change would make on the result of the calculation
      3. Worksheet
        Worksheet is a collection of rows and columns where data is entered
  4. Explain the meaning of the term file organization. (2 mks)
    It is the way data is stored ina file 
    1. Indicate the method of file access for the following file organization methods. (2 mks)
      1. Indexed sequential: Direct access
      2. Sequential: Serial or binary search
      3. Serial: Serral
      4. Random: Direct
    2. List the six stages of data collection in their correct order. (3mks)
      Data creation
      Data transmission
      Data preparation
      Media conversion
      Input validation
      Sorting
    3. Differentiate between the following types of errors.     
      1. Misreading and Transposition error. (2 mks)
        Misleading - Occur when incorrect reading of source document is done by user when typing e.g S instead of 5
        Transposition - Occur as a result of incorrect arrangement of characters e.g 518 instead of 581
      2. Overflow and truncation errors. (2 mks)
        Overflow - Occur from a calculation that has a long fractional part which cannot fit in allocated memory
        Truncation - Occur when numbers with long fractional part are cut to fit in the allocated space
      3. Give four ways of minimizing threat to data integrity. (4 mks)
        Using error detection and correction software when transmitting data
        Using device that capture data direct from the source e.g camera
        Controlling access to data by enforcing security measures
        Back up data preferably on external storage
  5.    
    1. Describe the use of the following buses. (3mks)
      1. Data bus
        Pathway where actual data transfer take place
      2. Address bus
        Pathway used to locate storage position in memory for the data to be executed
      3. Control bus
        Pathway for timing and controlling functions sent by the control unit to the parts of the system
    2. In relation to the control unit of the CPU, explain the three stages of the fetch execute cycle. (3mks)
      An instruction is fetched from the memory
      An instruction is interpreted (decoded)
      An instruction is implemented
    3. A CPU has got registers for internal operations.
      1. Define the term register. (1mk)
        One cell storage in the CPU
      2. Describe the functions of the following registers. (3mks)
        1. Instruction register
          Temporarily hold an instruction but it is interrupted into a form that CPU can uncerstand
        2. Working register
          Store data that is being processed
        3. Accumulator.
          Store intermediate results from immediate processing
    4. Indicate an area of application for. (3mks)
      1. Joystick
        Playing computer games
      2. Touch screen
        Mobile phones, news rooms.
        Where people are standing or wet areas
      3. Graphic tablet
        For designing using Computer Aided Design(CAD)
    5. Explain the difference between softcopy output and hardcopy output. (2mks)
      Soft copy is a document that is intangible and is found in a machine while harcopy is a printed copy that is tangible
Join our whatsapp group for latest updates

Download Computer Studies Paper 1 Questions and Answers - Lanjet Joint Mock Exams 2020.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest