Computer Studies Paper 1 Questions and Answers - Samia Joint Mock Examination 2021/2022

Share via Whatsapp

Instruction to candidates

  1. Write your name and index number in the space provided above.
  2. Sign and write the date of examination in the spaces provided above.
  3. This paper consists of two sections A and B.
  4. Answer all the questions in section A.
  5. Answer question 16 and any other three questions from section B.
  6. All answers should be written in the space provided in the question paper.
  7. This paper consists of 14 printed pages.
  8. Do not remove and pages from this booklet.
  9. Candidates should check the question paper to ascertain that all the pages are printed as indicated and that no questions are missing.
  10. Candidates should answer the questions in English.

SECTION A (40 MARKS)
ANSWER ALL QUESTIONS IN THIS SECTION

  1. Name the two common types of system units and differentiate them. (2 mks)
  2. Define the following characteristics of a computer system. (2 mks)
    1. Versatile
    2. Reliable
  3. State any three types of computer programme documentation (3mks)
  4. Name any three effects of ICT on health (3mks)
  5. List one function of a bridge in computer network (1mk)
  6.    
    1. Convert 11110001101112 to its octal equivalent (1mk)
    2. Convert 512.258 to its base 10 equivalent (2mks)
  7. With an aid of a diagram, differentiate between selection control structure and iteration control structure. (4mks)
  8.    
    1. Auki company is in the process of computerizing its services. List four measures that should be put into consideration to protect the users in their computerized areas. (2mks)
    2. Give two reasons why powder and liquid extinguishers are not recommended unlike gaseous extinguishers. (2mks)
  9. Without proper marketing, a business cannot survive in a competitive environment hence computers are being used in a number of ways to enhance marketing. List any three ways of ensuring this is effected. (3mks)
  10. Describe the following terms as used in computers. (3mks)
    1. Tab Key …………………
      Spacebar……………………
    2. Clicking
  11. Control unit is an essential component of the CPU. Describe the functions of the control unit. (2 mks)
  12.      
    1. Differentiate between buffers and Registers (2 mks)
    2. Speech recognition devices are used to capture natural sound and convert the input into digital form. State two problems related to speech recognition devices. (2mks)
  13. Define Solid-state storage and give two examples. (2 mks)
  14.      
    1. Explain how a pixel affects the resolution of a monitor. (1mark)
    2. List two types of computer output on microform (COM). (2mks)
  15. Advantages of using ATM cards

SECTION B (60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS IN THIS SECTION

  1.      
    1. Define the following terms as used in programming (2 mks)
      1. Source code
      2. Object code
    2. Differentiate between Assembler and Interpreter as used in programming. (2mks)
    3. Identify the type of programming language used in the codes below; (1mk)
      1. 1101 1101 1011 1011
        1110 0001 1100 0111
        0010 1110 1011 0011
      2. LDA A, 20
        ADD A, 10
        STO B, A
        NOP
    4. Draw a program flowchart that would accept three numbers, find their sum. If the sum is greater than 200, it adds 30 to the sum, otherwise subtract 20 from the sum. The program should then display the sum. (5mks)
      Draw a flow chart for the above pseudo code. (5mks)
  2.      
    1. In order to generate information from data items, a set of processing activities have to be performed on the data items in a specific sequence depending on the desired result. Draw a well labeled diagram to illustrate data processing cycle. (2mks)
    2. A data entry clerk experiences some common errors when typing. Most of the time, she finds that:
      1. After every calculation, the result is less than the expected number of digits required e.g.345.7896543 the result is given as 345.789.
      2. Different charactersare typed wrongly, for example instead of typing12873457 she types 128734S7.
        Identify the two types of errors commonly experienced by the clerk during data processing in (i) and (ii) above respectively. (2mks)
    3. State two ways a user can ensure data accuracy is maintained during data processing. (2mks)
    4.      
      1. State three advantages of a computerized filing system as used in data processing. (3mks)
      2. State two disadvantages of a serial file organization method in computing. (2marks)
      3. Differentiate between distributed processing and interactive processing modes; stating one application area of each. (4marks)
  3.      
    1. Write the following acronyms in full as used in operating systems.
      1. GUI (½ mark)
      2. WIMP (½ mark)
    2. State three factors considered when choosing an operating system for use in a computer. (3 mks)
    3. An operating system manages and organizes a computer system using the following structures:
      File, Folder and Drive. State the meaning of the underlined items respectively. (3mks)
    4.    
      1. Differentiate between error handling and interrupt handling as used in operating systems. (2mks)
      2. State three reasons why most network technicians prefer using command line operating systems to configure networking equipment. (3mks)
    5. Disk management is one important aspect in secondary storage in computer systems. Explain the following tools used by an operating system to manage disks in the computer. (3mks)
      1. Formatting
      2. Partitioning
      3. Defragmentation
  4.      
    1. Define the following terms as used in networking. (3mks)
      1. Network
      2. Intranet
      3. Browser
    2. The World Health Organization is global entity that deals with health issues around the world. It has computer networks linking its regional and continental offices using internet. State two importance of the internet to such organization. (2mks)
    3. Mr. Zuma, the Principal of a school wishes his school to have an internet connection in a bid to improve its service delivery. Mention four internet connectivity requirements that must be present to enable the connection. (2mks)
    4. Explain the following as used in e-mail:
      1. Inbox (1mk)
      2. Drafts (1mk)
    5.      
      1. Failure of information systems is a major concern in the security of data in computing systems. State two causes of such failure. (2mks)
      2. Explain the following computer crimes.
        1. Fraud (1mk)
        2. Industrial espionage (1mk)
    6. Excluding passwords, state two other security control measures used to guard against unauthorized access to computers in a network. (2mks)
  5.      
    1. Convert the 1010.0112 to decimal equivalent. ( 3mks)
    2. Perform the following number system conversions. (3mks)
      1. 342.258to binary.
      2. 50310 to hexadecimal (3mks)
    3.    
      1. Compute the binary arithmetic given below: (3mks)
        10111 + 10001 + 101
      2. Using 8-bit notation, perform the twos complement of 2510 -1510, leaving your answer in binary. (4mks)


MARKING SCHEME

SECTION A (40 MARKS)
ANSWER ALL QUESTIONS IN THIS SECTION

  1. Name the two common types of system units and differentiate them. (2 marks)
    1. Tower
    2. Desktop
      Desktop -the monitor is placed on top of the system unit. The tower type the monitor rests on the table
  2. Define the following characteristics of a computer system. (2 marks)
    1. Versatile
    2. Reliable
      Versatile- Computers are flexible in that they can be used to carry out different types of activities such as typing, calculations and playing music.
      Reliable – Computers are more reliable because they do not get tired or bored in the processing repetitive activities
  3. State any three types of computer programme documentation
    • User oriented
    • Operator oriented
    • Programmer oriented
  4. Name any three effects of ICT on health
    • Eye strain injury
    • Repetitive strain injury
    • Electromagnetic injury
  5. List one function of a bridge in computer network
    • Reduce traffic by dividing a busy network into segments
    • Expand size of network segment
    • Address filtering( determining which segment is appropriate for the message to be delivered to)
  6.      
    1. Convert 11110001101112 to its octal equivalent (1 mk)
      170678
    2. Convert 512.258 to its base 10 equivalent(2 mks)
      330.32812510
  7. With an aid of a diagram, differentiate between selection control structure and iteration control structure.
    1
  8.         
    1. Auki company is in the process of computerizing its services. List four measures that should be put into consideration to protect the users in their computerized areas. (2 marks)
      1. Power cables should be insulated
      2. Providing standard furniture
      3. Proper ventilation
      4. Painting the wall with less reflective paints.
      5. Overcrowding should be avoided.
    2. Give two reasons why powder and liquid extinguishers are not recommended unlike gaseous extinguishers. (2 marks)
      1. Liquid –based extinguisher may cause rusting and corrosion of computer components
      2. Powder particles may increase friction, clogging and wearing of movable computer parts
  9. Without proper marketing, a business cannot survive in a competitive environment hence computers are being used in a number of ways to enhance marketing. List any three ways of ensuring this is effected. (3 marks)
    1. Electronic Commerce or e-business
    2. Electronic presentation
    3. Advertising
  10. Describe the following terms as used in computers. (3 marks)
    Tab Key- It is used to move the cursor at set horizontal intervals on the same line such as 0.5inch,1.0 inch e.t.c.
    Space bar- It is used to insert spaces between characters on words when typing
    Clicking- Pressing and releasing the left mouse button once. A click often selects an Icon or Menu.
  11. Control unit is an essential component of the CPU. Describe the functions of the control unit. (2 marks)
    1. The control unit is responsible for coordinating all the activities of the C.P.U
    2. To coordinate these activities, the control unit uses a system clock that sends command signals
  12.    
    1. Differentiate between buffers and Registers (2 marks)
      1. Buffers are special memories that are found in input/output devices. Input data are held in the input buffer while processed output is held in output buffer.
      2. A register is located inside the microprocessor hold one piece of data at a time one inside the C.P.U e.g Accumulator, Instruction Register, Address Register and storage register
    2. Speech recognition devices are used to capture natural sound and convert the input into digital form. State two problems related to speech recognition devices. (2 marks)
      • Recognition rate is slow – the number of words in English and the number of words which can be said at a given point (known as branching factor) mean that response rates are still relatively slow.
      • Limited vocabularies – most systems are still limited to words in isolation; connected speech is much harder to get right than segmented speech. A computer may not respond to a voice command that has speech related problems like accents, Inflations and varying tones.
      • Speaker variability–The speed, pitch, range, rhythm. Intonation, loudness and pronunciation of an individual can vary (especially if they a have a cold).
      • Homophones – Some words e.g. see and sea, sound the same.
      • Problems of speech context – A computer cannot understand different contexts and meanings of speech because it is ‘literal minded’.
      • Background noise –Can upset voice input without a shielded mouthpiece on the microphone.
  13. Define Solid-state storage and give two examples. (2 marks)
    A non-volatile storage that employ integrated circuits rather than mechanical, magnetic or optical technology. They are referred to solid state because they do not have movable parts in its read/write storage mechanism.
  14.      
    1. Explain how a pixel affects the resolution of a monitor. (1 mark)
      A pixel is the smallest unit of a digital image or graphic that can be displayed and represented on a digital display device. The higher the number of pixel, the clearer and excellent images formed on the screen. Less pixel results to less clearer and poorer display on the screen.
    2. List two types of computer output on microform (COM). (2 marks)
      Microfiche
      Microfilm
  15. Advantages of using ATM cards.
    • It is secure
    • It is convenient since services are available to customers at any time
    • It allows for personal enquires
  16. A warranty is an agreement between the buyer and the seller. It spells out terms and conditions after selling a product in case of failure or malfunction. Describe any three basic requirements a good warranty should cover. (3 marks)
    1. Scope of cover for example 4 months, 2years
    2. Callout response and liability agreement. For how long should the supplier take to repair a fault or replace the product and if he/she delays who beams the cost.
    3. Preventive maintenance for example regulating of service at intervals.
  17.         
    1. Differentiate between pasteboard and master page as used in DTP (2 marks)
      • Pasteboard: The background that lies behind your document. It is a convenient space to put things if you need to move text or images between pages. You can also place items on the pasteboard until you decide where to position them on the page. Any text or images that you place on the pasteboard won't be printed.
      • Master page: A page used in designing the general layout that will be replicated in all other pages in the publication.
    2. Differentiate between graphic-based and layout based desktop publishing software. (2 marks)
      1. Graphic based- They are specifically developed to edit and format graphic objects such as pictures and vector drawings.
      2. Layout based- Are specifically developed to create different page layout designs for text and pictures.
  18. Differentiate between Network database and Relational database. (2 marks)
    • Network – model links are used to express the relationship between different data items, forming a network of items. Access to one item can be through multiple paths and from any item. Used to express the relationship between different data items forming a network of items. Access to one item can be through multiple paths from any item
    • Relational - Data items are stored together in structures called relations. In Relational database related data items are stored together in structures (relations or tables). Relationship can be created between tables such that a record or records from one table relates to another or other records in another table.

SECTION B (60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS IN THIS SECTION

  1.           
    1. Define the following terms as used in programming (2 marks)
      1. Source code
        The program instructions entered in the program editor window that is not yet translated into machine readable form (binary language).
      2. Object code
        The program or source code that is already translated into machine readable form (binary language).It is produced by the assembly process (the production of a source code to machine form/binary).
    2. Differentiate between Assembler and Interpreter as used in programming. (2 marks)
      Assembler(s) – it is a program or language processor that translates assembly language into machine language that the computer can understand and execute.
      Interpreters – It is a translator program that translates source program one instruction at a time, completely translating and executing each instruction before it goes onto the next. Interpreters seldom produce object code but temporarily produce intermediate code which is not stored in main memory.
    3. Identify the type of programming language used in the codes below; (1 mark)
      1. 1101 1101 1011 1011
        1110 0001 1100 0111
        0010 1110 1011 0011
        Machine Language
      2. LDA A, 20
        ADD A, 10
        STO B, A
        NOP Assembly Language
    4. On the Nairobi-Nakuru highway, the Kenya Police have put speed cameras at a certain point to read the time a vehicle passes a point (A) on the road and then reads the time it passes a second point (B) on the same road. (Points A and B are 200 meters apart). The speed of the vehicle is calculated using:
      • Speed = 100/((time at point B-time at point A)) (Km/ hr)
      • The maximum allowed speed is 100 kilometers per hour.
      • 500 vehicles were monitored using these cameras over a 1-hour period.
        1. Write a pseudo code, which: (5 marks)
          • Inputs the start time and the end time for the 500 vehicles that were monitored
          • Calculates the speed for each vehicle using the formula above.
          • Outputs the speed for each vehicle and a message if the speed exceeded 100 km/hour.
            >=100km/hr “High Speed”
            <100km/hr “Normal Speed”
            Start
            starttime=0
            Endtime=0
            Speed=0
            For Vehicles=1 To 500 Do
            Input Start Time
            Input Stop Time
            Speed =100/(End Time-Start Time)
            Print Speed
            If Speed >100 Then
            Print Over Speeding
            Else
            Print Normal Speed
            ENDIF
            NEXT VEHICLE
            ENDFOR
            STOP
        2. Draw a flow chart for the above pseudo code. (5 marks)
          3
  2.        
    1. In order to generate information from data items, a set of processing activities have to be performed on the data items in a specific sequence depending on the desired result. Draw a well labeled diagram to illustrate data processing cycle. (2 marks)
      4
    2. A data entry clerk experiences some common errors when typing. Most of the time, she finds that:
      1. After every calculation, the result is less than the expected number of digits required e.g. 345.7896543 the result is given as 345.789.
      2. Different characters are typed wrongly, for example instead of typing 12873457 she types 128734S7.
        Identify the two types of errors commonly experienced by the clerk during data processing in (i) and (ii) above respectively. (2 marks)
        • Truncation error
        • Misreading error
    3. State two ways a user can ensure data accuracy is maintained during data processing. (2 marks)
      • Using modern data capture devices (direct data capture) such as barcode readers, optical character readers, digital cameras etc., which capture/enter data with minimum user involvement.
      • Design user interfaces that minimizes chances of invalid data entry.
      • Double entry checks
      • Use of error detection and correction software when transmitting and processing data.
      • Use of automated data verification and validation routines in the data processing system.
    4.      
      1. State three advantages of a computerized filing system as used in data processing. (3 marks)
        1. information takes up much less space than the manual filing
        2. it is much easier to update or modify information
        3. it offers faster access and retrieval of data
        4. It enhances data integrity and reduces duplication
        5. It enhances security of data if proper care is taken to secure it.
          1. State two disadvantages of a serial file organization method in computing. (2 marks)
            • It is cumbersome to access because you have to access all proceeding records before retrieving the one being searched.
            • Wastage of space on medium in form due inter-record gaps in storage.
            • It cannot support modern high speed requirements for quick record access.
          2. Differentiate between distributed processing and interactive processing modes; stating one application area of each. (4 marks)
            Distributed:
            • Various geographically dispersed computers are linked by communication lines and all the computers linked belong to the same organization.
            • The computers are located at various departments or business sites for the individual departments or the business site to be served individually by its own computer resources.
            • All the branches have intelligent terminals (usually micro computers) linked to a big computer at the head office. Data from the branches is sent to the master where it is processed.
              Interactive:
            • Occurs if the computer & the terminal user can communicate with each other.
            • It allows a 2-way communication between the user & the computer.
            • As the program executes, it keeps on prompting the user to provide input or respond to prompts displayed on the screen.
            • The user makes the requests and the computer gives the responses.
            • The data is processed individually and continuously, as transactions take place and output is generated instantly according to the request made by user.
  3.           
    1. Write the following acronyms in full as used in operating systems.
      GUI - Graphical User Interface (½ mark)
      WIMP - Windows, Icons, Menus and Pointers/ pointing devices. (½ mark)
    2. State three factors considered when choosing an operating system for use in a computer. (3 marks)
      1. The hardware configuration of the computer e.g. Memory Capacity, processor speed & hard disk capacity.
      2. The application software intended for the computer.
      3. The user friendliness
      4. The documentation available
      5. The cost of the operating system.
      6. Reliability and security provided by the operating system.
      7. The number of processors & hardware it can support.
      8. The number of users it can support.
      9. The type of computers in terms of size and make. For example some earlier Apple computers would not run Microsoft Operating System.
    3. An operating system manages and organizes a computer system using the following structures:
      File, Folder and Drive. State the meaning of the underlined items respectively. (3 marks)
      • Files
        A file is a collection of related data given a unique name for ease of access, manipulation and storage on a backing storage.
      • Folder
        A named storage location where files are stored.
        A container of files.
        Also referred to as directories – Directories originate form a special directory called the root directory or folder.
      • Drives
        A drive is a medium that is capable of storing and reading information that is not easily removed like a disk.
    4.      
      1. Differentiate between error handling and interrupt handling as used in operating systems. (2 marks)
        Error handling .
        • The OS has many ways of reporting to the user of any errors that occur during program execution. It does this by monitoring the status of the computer system & performing error checks on both hardware and software.
        • When the user makes an error, the OS through the Kernel determines the cause of the error, and prints diagnostic messages on the screen suggesting appropriate routines of how the error can be corrected.
        • In case of a fatal error that cannot be corrected, the program will be suspended permanently. E.g., the user program will prematurely terminate when it encounters an illegal operation, such as, dividing a no. by 0 or if it attempts to read a data file that had not been opened.
          Interrupt handling
        • An Interrupt is a break from the normal sequential processing of instructions in a program.
          Each hardware device communicates to the processor using a special number called the Interrupt Request number (IRQ). Therefore, when an interrupt occurs, control is passed to the Kernel, which determines the cause of the interrupt. The processor stops executing the current program to wait for the corrective response of the user. Control is returned to the program that was interrupted once corrective action has been taken.
      2. State three reasons why most network technicians prefer using command line operating systems to configure networking equipment. (3 marks)
        • A CLI can be a lot faster and efficient than any other type of interface.
        • It is secure since the expert only knows the commands.
        • A CLI requires less memory to use in comparison to other interfaces.
        • A CLI doesn't require high graphics, hence a low-resolution monitor can be used.
        • A CLI does not require Windows to run
    5. Disk management is one important aspect in secondary storage in computer systems. Explain the following tools used by an operating system to manage disks in the computer. (3 marks)
      1. Formatting
        • Writing electronic information (tracks and sectots) on the disk so that the computer can recognise the disk as a valid storage device and data can be stored.
        • The formatting process sets up a method of assigning addresses to the different areas. It also sets up an area for keeping the list of addresses. Without formatting there would be no way to know what data is where.
      2. Partitioning
        The act or practice of dividing the storage space of a hard disk drive into separate data areas known as partitions.
      3. Defragmentation
        • Sometimes called defragging or disk optimisation is a software-controlled operation that reduces the amount of fragmentation in file systems by moving the scattered parts of files so that they once again are contiguous (attached).
        • the OS does this by physically organising the contents of the disk to store the pieces of each file close together and contiguously (elements of memory are said to be contiguous if they are adjacent to one another and appear to be connected).
  4.      
    1. Define the following terms as used in networking. (3marks)
      1. Network
        A collection 2 or more computers connected together using transmission media (e.g., telephone cables, or Satellites) for the purpose of communication and sharing of resources.
      2. Intranet
        Internal corporate network that uses the infrastructure of the Internet and the World Wide Web.
      3. Browser
        A browser (short for web browser) is a computer program/software that accesses webpages and displays them on the computer screen. It is the basic software that is needed to find, retrieve, view and send information over the internet.
    2. The World Health Organization is global entity that deals with health issues around the world. It has computer networks linking its regional and continental offices using internet. State two importance of the internet to such organization. (2 marks)
      • Communication with other organizations, with your members, with your staff, with your supporters and donors through e-mails, messenger, web pages, mail lists, web site message boards. The Internet greatly offers rapid communication on a global scale. It even delivers an integrated multimedia entertainment that any other mass medium cannot offer.
      • Publishing your message to the world using online books, journals, press releases, workshops, conferences, lectures. Websites with conference proceedings, PDF (Portable Document Format) files of your publications, blogs, newsfeeds e.t.c. support publishing.
      • Customer support - the people you are helping through your organization. It can help them when you aren't there: email, messenger, web pages, mail lists, and web site message boards. With video-conferencing, podcasting and other great web tools, you can even have workshops and classes online.
      • Research on news, issues, papers and literature relevant to your cause. Use of search engines to find materials world-wide, mail lists e.t.c.
      • Leisure activities – e.g. online games, videos or music.
      • A place to do business and many other commercial activities. E.g. e-bay, amazon.com, e.t.c.
    3. Mr. Zuma, the Principal of a school wishes his school to have an internet connection in a bid to improve its service delivery. Mention four internet connectivity requirements that must be present to enable the connection. (2 marks)
      • Transmission/Telecommunication/Network media
      • Data Terminal Equipments - A TCP/IP enabled computer with a web browser.
      • An account with an Internet Service Provider (ISP).
      • Networking equipment such as a modem, router or switch to connect the computer transmission media.
    4. Explain the following as used in e-mail:
      • Inbox: Stores incoming mails (1 mark)
      • Drafts: Stores a saved copy of e-mails (usually composed but unsent) for later use. (1 mark)
    5.      
      1. Failure of information systems is a major concern in the security of data in computing systems. State two causes of such failure. (2 marks)
        • Hardware failure due to improper use.
        • Unstable power supply as a result of brownout or blackout and vandalism.
        • Network breakdown
        • Natural disaster
        • Program failure/crash
      2. Explain the following computer crimes.
        • Fraud (1 mark)
          Fraud is the use of computers to conceal information or cheat other people with the intention of gaining money or information.
        • Industrial espionage (1 mark)
          Involves spying on a competitor to get or steal information that can be used to finish the competitor or for commercial gain. The main aim of espionage is to get ideas on how to counter by developing similar approach or sabotage.
    6. Excluding passwords, state two other security control measures used to guard against unauthorized access to computers in a network. (2 marks)
      1. Audit trails
      2. Firewalls
      3. Proxy servers
      4. Log files/security monitors
      5. Encryption
      6. User access levels/Multilevel access
      7. Biometric security
  5.      
    1. Convert the 1010.0112 to decimal equivalent. ( 3 marks)
      23 22 21 20  .  2-1 2-2 2-3
      1 0 1 0   0 1 1
      8 0 2 0   0.5 0.25 0.125
      8+0+2+0
      0+0.25+0.125
      Ans = 10.37510
    2. Perform the following number system conversions. (3 marks)
      1. 342.258 to binary.
        3 4 2  .  2 5
        011 100 010   010 101
        011100010    010 101
        Ans = 11100010.0101012
      2. 50310 to hexadecimal (3 marks)
          Divide Result INT  DEC PART *16 Hex
        Ignore decimal parts 503/16 31.4375 31 0.4375 X16 =7 7=7
        31/7 1.9375 1 0.9375 X 16 =15 15=F
        1/16 0.0625 0 0.0625 X 16 =1 1=1
        Ans = 1F7
    3.      
      1. Compute the binary arithmetic given below: (3 marks)
        10111 + 10001 + 101
        Carry digit ˃ 1 1 1 1 1  
          1 0 1 1 1 1
        +   1 0 0 0 1
          10 0 0 0 0 0

        Carry digit ˃   1 1 1 1 1 1,1 
          0 0 0 0 0 0
        -         1 0 1
            1 1 1 0 1 1
        Ans = 111011
      2. Using 8-bit notation, perform the twos complement of 2510 -1510 , leaving your answer in binary. (4 marks)
        25 = 00011001
        15 = 00001111
        Ones complement/Bitwise NOT 15 = 11110000
        Twos complement 15 (11110000 + 1) = 11110001
        Add the binary of 25 to the twos complement of 15 i.e. 00011001 + 11110001
        Carry digit ˃ 1 1 1       1  
          0 0 0 1 1 0 0
          1 1 1 1 0 0 0 1
          (1)0 0 0 0 1 0 1 0
        Ignore overflow bit. Ans = 00001010

Download Computer Studies Paper 1 Questions and Answers - Samia Joint Mock Examination 2021/2022.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Join our whatsapp group for latest updates
Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest