- This paper consists of two sections: A and B
- Answer ALL questions in section A
- Answer question 16 and any other three from section B
- Candidates must answer the questions in English
SECTION A (40 marks)
Answer all the questions in this section.
- Identify the transmission mode used when communicating with the devices listed below. (2marks)
- Public address system
- Phone chat via WhatsApp
- Describe the evolution of computers based on the following (3marks)
- Memory capacity
- Processing capability
- Physical size
- Beryl does not understand why computers are said to be Automatic at the same time they have No Intelligent Quotient (IQ) (2marks)
- Vero a student from Nyamira Girls lives in a house with full internet access. She spends most of her time on phone and Desktop computer. State any three social issues associated with doing this. (3 marks)
- Computers are known to have created jobs to many people. Below are duties and responsibilities of different computer professionals. State the professionals who undertakes the duties and responsibilities listed below. (3marks)
- Troubleshooting Computer hardware and software related problems
- Developing Training Reference materials
- Reengineer computer components to enhance its functionality and efficiency
- Give three reasons that might have necessitated the development of Second generation computers. (3 marks)
- Millicent wrote a program but it did not behave as expected. Describe two types of errors that may hinder the program from running or run but give invalid results. (2marks)
- Describe two password options that Ms-Word employ to protect its documents. (2marks)
- Mention two limitations of using counterfeit software. (2marks)
- Name the computer parts listed below. (2marks)
Diagram Figure 1 Figure 2 Name - Describe the following functions of the operating system. (3marks)
- Network Management
- Security
- Interrupt Handling
- State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media (3marks)
-
- Define the term normalization. (l mark)
- State a reason to justify why database administrators usually perform normalization when creating a database for an organization. (2marks)
- Mention three factors to consider when choosing a file organization method. (3marks)
- What are the four challenges experienced in implementing e-learning in Kenya. (4marks)
SECTION B (60 marks)
-
- Describe the following qualities of an algorithm. (2marks)
- Definiteness
- Finiteness
- The table below shows the monthly charges applicable to different amount of water consumed by clients in a particular town
Volume of Water consumed in m3 Consumption in Kshs 0 – 10 200 10 – 20 350 20 – 30 500 Over 30 1000 - Write a pseudo code for a program that prompts a user to enter the volume of water consumed per month. The program then computes and output the amount of the water bill in a year. (7 marks)
- Draw a flowchart for the pseudo code. (6marks)
- Describe the following qualities of an algorithm. (2marks)
-
- The table below is an extract from a spreadsheet use it to answer the questions that follow
A B C D E F 1 Customer Number Product Name Quantity Unit Cost Total Type Remark 2 145321 Malomalo 20 100 2000 Bronze 3 143561 Kisambo 40 200 8000 Silver 4 156784 Weeti 40 400 16000 Gold 5 123454 Wheat 20 20 1000 Bronze 6 453218 Nyozi 10 10 100 Bronze GRAND TOTAL 27100 - Identify the Ms-Excel feature that is used in cell A1 and B1 to enable the texts appear the way they are. (1mark)
- Name the data type in cell E4 and F3. (2marks)
- Use absolute reference to represent a formula that is used to calculate total for wheat (2 marks)
- Suggest how named reference can be used to calculate the GRAND TOTAL. (3marks)
-
- Write a formula that will classify product type base on the total as shown in the table below.(2 marks)
Total Type 0 – 5000 Bronze 5001 – 10000 Silver 10001 and Above Gold - State the difference between Cc and Bcc. (2marks)
- Mention three factors to consider when choosing an ISP. (3marks)
- Write a formula that will classify product type base on the total as shown in the table below.(2 marks)
- The table below is an extract from a spreadsheet use it to answer the questions that follow
-
- What is the binary equivalent of 12⁄32 base 10. (3marks)
- Determine the Hexadecimal equivalent of 44468. (3marks)
- Subtract 110012 from 1910 using twos complement and write your answer in decimal notation. (4marks)
- Evaluate 101101101+10101- 1011110. (3marks)
- With reference to DTP describe the following terms. (2marks)
- Gutter
- Stroke
-
- State three circumstances under which a system analyst may prefer to use questionnaire instead of observation during facts finding. (3marks)
- Mention three operational factors that a system analyst need to consider when sourcing for hardware and software to be used with the proposed system. (3marks)
- Describe three advantages of parallel changeover. (3marks)
- Define the following terms as used in Networking
- Ionosphere (1mark)
- Line of sight (1mark)
- Identify the OSI layer in which the following communication devices operates
- Router (1mark)
- NIC (1mark)
- Describe two factors to consider when choosing a transmission media. (2marks)
-
- The following records were entered in a database
Date Class Registration No 1/1/2007 East 1425-A 1/1/2008 North 1426-A 12/1/2007 North 1426-B - Suggest a validation rule for date given that it should be not before 1/1/2006 (2marks)
- List the records that will be displayed after running the following criteria? (2marks)
- <>#1/1/2008 on date
- 1426-A on class
- Write the input mask for registration No (1mark)
- Choose the most appropriate data type for Date and Registration No (2marks)
- Explain the following terms as used in Word Processing (3marks)
- Word Wrap
- Orientation
- Indenting
- A Student typed Genge Ni Salima uta Do during a practical lesson. State how the text will appear (5marks)
- The following records were entered in a database
MARKING SCHEME
- Identify the transmission mode used when communicating with the devices listed below
- Public address system
- Simplex
- Phone chat via WhatsApp
- Duplex/Half Duplex
Award 1 mark each max 2
- Duplex/Half Duplex
- Public address system
- Describe the evolution of computers based on the following
- Memory capacity
- Modern computers have a larger memory capacity that can hold large volumes of data as opposed the older computers
- Processing speed
- Advancement in technology have led to development of computers that process data very fast that first generation computers
- Physical size
- The size of the have reduced greatly modern computers are smaller in size as compared to earlier computers
Award 1 mark each max 3
- The size of the have reduced greatly modern computers are smaller in size as compared to earlier computers
- Memory capacity
- Beryl does not understand why computers are said to be Automatic at the same time they have No Intelligent Quotient (IQ)
- It said to automatic because once it is given the correct it will be a position to execute numerous tasks without user intervention
- NO IQ because a computer purely depend on the installed program without the programs the computer cannot any task
Award 1 mark each max 2
- Vero a student from Nyamira Girls lives in a house with full internet access. She spends most of her time on phone and Desktop computer. State any three social issues associated with doing this
- Dehumanization
- Internet addiction Flaming
- Drug trafficking
- Cyber terrorism
- Access to inappropriate content
- Intrusion to private information
- Fraud
Award 1 mark each max 3
- Computers are known to have created jobs to many people. Below are duties and responsibilities of different computer professionals. State the professionals who undertakes the duties and responsibilities listed below
- Troubleshooting Computer hardware and software related problems
- Computer Technician
- Developing Training Reference materials
- Computer Trainer
- Reengineer computer components to enhance its functionality and efficiency
- Computer Engineer
Award 1 mark each max 3
- Computer Engineer
- Troubleshooting Computer hardware and software related problems
- Give three reasons that might have necessitated the development of Second generation computers
- A lot of heat that was generated by the first generation computers
- High power consumption that was experienced with the first generation computers
- The large size of the first generation
- The vacuum tube which usually breaks
- Very low processing of capability of the first generation computer
- Describe two password options that Ms-Word employ to prevent unauthorized access to its
- Password open – This password grant access to the documen
- Password to modify – This password give the authority to modify the content of the document
Award 1 mark each max 2
- Mention two limitations of using counterfeit software
- Introduce malware in your computer
- Malfunction
- Lack of essential components
- Incompatibilities issues
Award 1 mark each max 2
- Name the computer parts listed below
- Figure 1
- RAM
- Figure 2
- Processor
Award 1 mark each max 2
- Processor
- Figure 1
- Describe the following functions of the operating system
- Network management
- The operating system is responsible for facilitating connectivity and managing communication using communication protocols
- Security
- Operating system provide mechanism of protecting information and programs installed in the computer. This usually achieved through password, biometric systems, backup, system restore etc.
- Interrupt handling
- Operating system have interrupt handler which study the cause of the interrupt and then take the necessary actions order to solve the interrupt without interfering with normal sequential execution
Award 1 mark each max 3
- Operating system have interrupt handler which study the cause of the interrupt and then take the necessary actions order to solve the interrupt without interfering with normal sequential execution
- Network management
- State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media
- Smart browsing
- Install latest antivirus versions and update regularly
- Always scan email attachment before downloading
Award 1 mark each maxk3
-
- Define the term normalization
- It is the process of decomposing fields into separate but related tables
Award I mark each max 1
- It is the process of decomposing fields into separate but related tables
- State a reason to justify why database administrators usually performnormalization when creating a database for an organization
- To minimize data redundancy in the database
Award 2 marks max 2
- To minimize data redundancy in the database
- Define the term normalization
- Mention three factors to consider when choosing a file organization method
- Method of access
- Storage media
- Frequency of update
Award 1 mark each max 3
- What are the four challenges experienced in implementing e-learning in Kenya
- High initial cost of setup ICT infrastructure
- Unreliable internet connectivity
- Lack of standards
- Technophobia
Award 1 mark each max 4
-
- Describe the following qualities of an algorithm
- Definiteness
- Each step of an algorithm must be precisely defined; the actions to be carried out must be rigorously and unambiguously specified for each case
- Finiteness
- An algorithm must always terminates after a finite number of steps
Award 1 mark each max 2
- An algorithm must always terminates after a finite number of steps
- Definiteness
- The table below shows the monthly charges applicable to different amount of water consumed by clients in a particular town.
In addition to the consumption, the amount of the water bill will consist of a standing charge of Kshs 200 and a sewerage fee equivalent to 20% of the consumption- Write a pseudo code for a program that prompts a user to enter the volume of water consumed per month. The program then computes and output the amount of the water bill in a year
Start
Set counter =1
Set S_Charge= 200
Set Bill =0
REPEAT
Enter Volume of Water
IF Volume > 0 and <=10 Then
Consumption =200
Else
IF Volume >10 and <=20 Then
Consumption =350
Else
IF Volume >20 and <=30
Consumption =500
Else
Consumption =1000
Endif
Endif
Endif
Sewerage = 0.2x Consumption
Bill = Bill+S_Charge+Consumption+Sewerage
Counter = counter +1
UNTIL Counter =12
Print Bill
Stop
Marking Points
Start =0.5
Variables initialization
=0.5
Repeat =0.5
Volume Input =0.5
Results of 1 st Condition
=0.5
Results of 2 nd Condition
=0.5
Three Endif =0.5
Sewerage Computation
=0.5
Bill computation =0.5
Until condition =0.5
Increment counter 0.5
Stop =0.5 - Draw a flowchart for the pseud code
- Write a pseudo code for a program that prompts a user to enter the volume of water consumed per month. The program then computes and output the amount of the water bill in a year
- Describe the following qualities of an algorithm
-
- The table below is an extract from a spreadsheet use it to answer the questions that follow
- Identify the Ms-Excel feature that is used in cell A1 and B1 to enable the texts appear the way they are
- Wrap text
Award 1 mark max 1
- Wrap text
- Name the data type in cell E4 and F3
- E4 Formula/Function
- F3 Function
Award 1 mark each max 2
- Use absolute reference to represent a formula that is used to calculate total for wheat
- =Product ($c$5:$D$5) or =$c$5:$D$5
Award 2mark max 2
- =Product ($c$5:$D$5) or =$c$5:$D$5
- Suggest how named reference can be used to calculate the GRAND TOTAL
- Rename E2 to E6 as Total
- =Sum(Total )
Award 1 mark for renaming the range
Award 2 mark for correct function max 2
- Write a formula that will classify product type base on the total as shown in the table below
- =IF(E2>=10001,"Gold",IF(E2>=5001, "Silver":, "Bronze"))
Award 1 correct function
Award 1mark bracket to bracket
- =IF(E2>=10001,"Gold",IF(E2>=5001, "Silver":, "Bronze"))
- Identify the Ms-Excel feature that is used in cell A1 and B1 to enable the texts appear the way they are
- State the difference between Cc and Bcc
- CC field to send a copy of the email to people just to keep them in the loop while the BCC field is used when you want to send an email to multiple recipients but do not want any of them to know about the other people you have sent them to
Award 2 marks max 2
- CC field to send a copy of the email to people just to keep them in the loop while the BCC field is used when you want to send an email to multiple recipients but do not want any of them to know about the other people you have sent them to
- Mention three factors to consider when choosing an ISP
- Cost
- Speed
- Cost
- Type of connection
- Reliability
- Customer support
Award 1 mark each max 3
- The table below is an extract from a spreadsheet use it to answer the questions that follow
-
- What is the binary equivalent of base 10
It is the same as 0.34375
number in decimal = 0.5
0.34375 x 2 = 0.6875
0.6875 x 2 = 1.375
values = 1
0.375 x 2 = 0.75
0.75 x 2 = 1.5
0.5 x 2 = 1.0 = 0.010112
Writing the Multiplying by =0.5
Reading correct Answer =1 - Determine the Hexadecimal equivalent of 4446 8
4 =100 4=100 4=100 6=110 assigning binary
equivalent =0.5
1001 0010 0110 grouping the number in
four bits =0.5
9 2 6 = 926H Getting the Hexadecimal equivalent for each group= 1
Answer=1 - Subtract 11001 2 from 19 10 using twos complement and write your answer in decimal notation
Rewrite the question as 19+(11001)
19 = 10011 Getting the binary equivalent of 19
0.5
11001
00110 ......... 1c Getting Ones complement =0.5
+ 1
+ 00111............ 2c Getting twos complement = 0.5
10011
11010 Adding 2C to 19 = 0.5
- 1
11001 Subtracting 1 = 0.5
00110 = -610 Recompliment = 0.5 - Evaluate 101101101+10101- 1011110
101101101
+ 10101
110000010
- 1011110
100100100 - With reference to DTP defined the following terms
- Gutter
- The inside margins closest to the spine of a book or the blank space between two facing pages in the center of a newsletter or magazine is known as the gutter. The gutter space includes any extra space allowance needed to accommodate the binding of books,
- Stroke
- Refer to a line style
Accept the diagram with the outline pattern
Award 1 mark each max 2
- Refer to a line style
- Gutter
- What is the binary equivalent of base 10
-
- State three circumstances under which a system analyst may prefer to use questionnaire instead of observation during facts finding
- When the people you need to gather information from are vastly dispersed
- When the analyst want to collect confidential information
- When limited amount of information is required from a large number of people
Award 1 mark each max 3
- Mention three operational factors that a system analyst need to consider when sourcing for hardware and software to be used with the proposed system
- Reliability
- Compatibility
- Upgradeability
- User needs
Award I mark each max 3
- Describe three advantages of parallel changeover
- Costly to run two systems
- Cross checking is difficult
- Require more staff hence training required for additional staff
- The benefits of the new system are not realized by the entire organization immediately
Award 1 mark each max 3
- Define the following terms as used in Networking
- Ionosphere
- The Ionosphere is part of Earth's upper atmosphere, between 80 and about 600 km where Extreme UltraViolet (EUV) and x-ray solar radiation ionizes the atoms and molecules thus creating a layer of electrons. the ionosphere is important because it reflects and modifies radio waves used for communication and navigation
Award 1 mark max 1
- The Ionosphere is part of Earth's upper atmosphere, between 80 and about 600 km where Extreme UltraViolet (EUV) and x-ray solar radiation ionizes the atoms and molecules thus creating a layer of electrons. the ionosphere is important because it reflects and modifies radio waves used for communication and navigation
- Line of sight
- Is a type of propagation that can transmit and receive data only where transmit and receive stations are in view of each other without any sort of an obstacle between them.
Award 1 mark max 1
- Is a type of propagation that can transmit and receive data only where transmit and receive stations are in view of each other without any sort of an obstacle between them.
- Ionosphere
- Identify the OSI layer in which the following communication devices operates
- Router
- Network layer
- NIC
- Physical layer
Award 1 each max 2
- Physical layer
- Router
- Describe two factors to consider when choosing a transmission media
- Cost
- Bandwidth
- Attenuation rate
- Reliability
- Ease of Installation
- Distance
- State three circumstances under which a system analyst may prefer to use questionnaire instead of observation during facts finding
- The following records were entered in a database
- Suggest a validation rule for date given that it should be not before
- <#01/01/2006#
Award 2 marks max 2
- <#01/01/2006#
- List the records that will be displayed after running the following criteria?
- <>#1/1/2008 on date
Date Class Registration No 1/1/2007 East 1425-A 1/1/2008 North 1426-A - 1426-A on class
Date Class Registration No 1/1/2008 North 1426-A
- <>#1/1/2008 on date
- Write the input mask for registration No
- 0000-L
Award 1 mark each max 1
- 0000-L
- Choose the most appropriate data type for Date and Registration No
- Date –Date
- Registration No – Text
Award 1 mark each max 2
- Explain the following terms as used in Word Processing
- Word wrap
- The feature that automatically move a word or cursor to the beginning of the next line if does not fit at the end of the current line
- Orientation
- Refer to the position of the page in relation to the text which can either landscape or portrait
- Indenting
- Refer to moving the text way from the margin
Award 1 mark each max 3
- Refer to moving the text way from the margin
- Word wrap
- A Student typed Genge Ni Salima uta Do during a practical lesson. State how the text will appear
Change case options Appearance Upper case GENGE NI SALIMA UTA DO Sentence case Genge ni salima uta do Toggle case gENGE nI sALIMA uTA dO Lower case genge ni salima uta do Capitalized Each Word/ Title case Genge Ni Salima Uta Do
- Suggest a validation rule for date given that it should be not before
Download Computer Studies Paper 1 Questions and Answers - Bondo Mocks 2021 Exams.
Tap Here to Download for 50/-
Get on WhatsApp for 50/-
Why download?
- ✔ To read offline at any time.
- ✔ To Print at your convenience
- ✔ Share Easily with Friends / Students