Computer Studies Paper 1 Questions and Answers - Bondo Mocks 2021 Exams

Share via Whatsapp
Instructions to candidates
  • This paper consists of two sections: A and B
  • Answer ALL questions in section A
  • Answer question 16 and any other three from section B
  • Candidates must answer the questions in English

SECTION A (40 marks)    

Answer all the questions in this section.

  1. Identify the transmission mode used when communicating with the devices listed below. (2marks)
    1. Public address system
    2. Phone chat via WhatsApp
  2. Describe the evolution of computers based on the following    (3marks)
    1. Memory capacity
    2. Processing capability
    3. Physical size
  3. Beryl does not understand why computers are said to be Automatic at the same time they have No Intelligent Quotient (IQ)  (2marks)
  4. Vero a student from Nyamira Girls lives in a house with full internet access. She spends most of her time on phone and Desktop computer. State any three social issues associated with doing this. (3 marks)
  5. Computers are known to have created jobs to many people. Below are duties and responsibilities of different computer professionals. State the professionals who undertakes the duties and responsibilities listed below. (3marks)
    1. Troubleshooting Computer hardware and software related problems
    2. Developing Training Reference materials
    3. Reengineer computer components to enhance its functionality and efficiency
  6. Give three reasons that might have necessitated the development of Second generation computers. (3 marks)
  7. Millicent wrote a program but it did not behave as expected. Describe two types of errors that may hinder the program from running or run but give invalid results. (2marks)
  8. Describe two password options that Ms-Word employ to protect its documents. (2marks)
  9. Mention two limitations of using counterfeit software. (2marks)
  10. Name the computer parts listed below. (2marks)
     Diagram  CSPP1BondoMocks21Q10 Figure 1  CSPP1BondoMocks21Q10aFigure 2
     Name    
  11. Describe the following functions of the operating system. (3marks)
    1. Network Management
    2. Security
    3. Interrupt Handling
  12. State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media (3marks)
  13.  
    1. Define the term normalization. (l mark)
    2. State a reason to justify why database administrators usually perform normalization when creating a database for an organization. (2marks)
  14. Mention three factors to consider when choosing a file organization method. (3marks)
  15. What are the four challenges experienced in implementing e-learning in Kenya. (4marks)

SECTION B (60 marks)     

Answer questions 16 and any other three questions from this section.
  1.  
    1. Describe the following qualities of an algorithm. (2marks)
      1. Definiteness
      2. Finiteness
    2. The table below shows the monthly charges applicable to different amount of water consumed by clients in a particular town
       Volume of Water consumed  in m3   Consumption in Kshs
       0 – 10   200
       10 – 20  350
       20 – 30  500
       Over 30  1000
      In addition to the consumption, the amount of the water bill will consist of a standing charge of Kshs 200 and a sewerage fee equivalent to 20% of the consumption.
      1. Write a pseudo code for a program that prompts a user to enter the volume of water consumed per month. The program then computes and output the amount of the water bill in a year.    (7 marks)
      2. Draw a flowchart for the pseudo code.   (6marks)
  2.  
    1. The table below is an extract from a spreadsheet use it to answer the questions that follow
         A   B   C   D   E   F
       1  Customer Number  Product Name   Quantity   Unit Cost   Total   Type Remark 
       2  145321  Malomalo  20  100  2000  Bronze 
       3  143561  Kisambo  40  200  8000  Silver
       4  156784  Weeti  40  400  16000  Gold
       5  123454  Wheat  20  20  1000  Bronze
       6  453218  Nyozi  10  10  100  Bronze
         GRAND TOTAL      27100  
      1. Identify the Ms-Excel feature that is used in cell A1 and B1 to enable the texts appear the way they are. (1mark)   
      2. Name the data type in cell E4 and F3. (2marks)
      3. Use absolute reference to represent a formula that  is used to calculate total for wheat   (2 marks)
      4. Suggest how named reference can be used to calculate the GRAND TOTAL.     (3marks)
      5.  
        1. Write a formula that will classify product type base on the total as shown in the table below.(2 marks)
           Total  Type 
           0  – 5000  Bronze 
           5001  – 10000  Silver 
           10001 and Above  Gold
        2. State the difference between Cc and Bcc. (2marks)
        3. Mention three factors to consider when choosing an ISP. (3marks)
  3.  
    1. What is the binary equivalent of 12⁄32  base 10. (3marks)
    2. Determine the Hexadecimal equivalent of 44468. (3marks)
    3. Subtract 110012 from 1910 using twos complement and write your answer in decimal notation. (4marks)
    4. Evaluate 101101101+10101- 1011110. (3marks)
    5. With reference to DTP describe the following terms. (2marks)
      1. Gutter
      2. Stroke
  4.  
    1. State three circumstances under which a system analyst may prefer to use questionnaire instead of observation during facts finding. (3marks)
    2. Mention three operational factors that a system analyst need to consider when sourcing for hardware and software to be used with the proposed system. (3marks)
    3. Describe three advantages of parallel changeover. (3marks)
    4. Define the following terms as used in Networking
      1. Ionosphere (1mark)
      2. Line of sight (1mark)
    5. Identify the OSI layer in which the following communication devices operates
      1. Router (1mark)
      2. NIC (1mark)
    6. Describe two factors to consider when choosing a transmission media. (2marks)
  5.  
    1. The following records were entered in a database
       Date  Class    Registration No 
       1/1/2007  East  1425-A
       1/1/2008  North  1426-A
       12/1/2007  North  1426-B
      1. Suggest a validation rule for date given that it should be not before 1/1/2006          (2marks)
      2. List the records that will be displayed after running the following criteria? (2marks)
        1. <>#1/1/2008 on date
        2. 1426-A on class
      3. Write the input mask for registration No (1mark)
      4. Choose the most appropriate data type for Date and Registration No                        (2marks)
      5. Explain the following terms as used in Word Processing (3marks)
        1. Word Wrap
        2. Orientation
        3. Indenting
      6. A Student typed Genge Ni Salima uta Do during a practical lesson. State how the text will appear (5marks)

MARKING SCHEME

  1. Identify the transmission mode used when communicating with the devices listed below
    1. Public address system
      • Simplex
    2. Phone chat via WhatsApp
      • Duplex/Half Duplex
        Award 1 mark each max 2
  2. Describe the evolution of computers based on the following
    1. Memory capacity
      • Modern computers have a larger memory capacity that can hold large volumes of data as opposed the older computers
    2. Processing speed
      • Advancement in technology have led to development of computers that process data very fast that first generation computers
    3. Physical size
      • The size of the have reduced greatly modern computers are smaller in size as compared to earlier computers
        Award 1 mark each max 3
  3. Beryl does not understand why computers are said to be Automatic at the same time they have No Intelligent Quotient (IQ)
    • It said to automatic because once it is given the correct it will be a position to execute numerous tasks without user intervention
    • NO IQ because a computer purely depend on the installed program without the programs the computer cannot any task
      Award 1 mark each max 2
  4. Vero a student from Nyamira Girls lives in a house with full internet access. She spends most of her time on phone and Desktop computer. State any three social issues associated with doing this
    • Dehumanization
    • Internet addiction Flaming
    • Drug trafficking
    • Cyber terrorism
    • Access to inappropriate content
    • Intrusion to private information
    • Fraud
      Award 1 mark each max 3
  5. Computers are known to have created jobs to many people. Below are duties and responsibilities of different computer professionals. State the professionals who undertakes the duties and responsibilities listed below
    1. Troubleshooting Computer hardware and software related problems
      • Computer Technician
    2. Developing Training Reference materials
      • Computer Trainer
    3. Reengineer computer components to enhance its functionality and efficiency
      • Computer Engineer
        Award 1 mark each max 3
  6. Give three reasons that might have necessitated the development of Second generation computers
    • A lot of heat that was generated by the first generation computers
    • High power consumption that was experienced with the first generation computers
    • The large size of the first generation
    • The vacuum tube which usually breaks
    • Very low processing of capability of the first generation computer
  7.  
  8. Describe two password options that Ms-Word employ to prevent unauthorized access to its
    • Password open – This password grant access to the documen
    • Password to modify – This password give the authority to modify the content of the document
      Award 1 mark each max 2
  9. Mention two limitations of using counterfeit software
    • Introduce malware in your computer
    • Malfunction
    • Lack of essential components
    • Incompatibilities issues
      Award 1 mark each max 2
  10. Name the computer parts listed below
    1. Figure 1
      • RAM
    2. Figure 2
      • Processor
        Award 1 mark each max 2
  11. Describe the following functions of the operating system
    1. Network management
      • The operating system is responsible for facilitating connectivity and managing communication using communication protocols
    2. Security
      • Operating system provide mechanism of protecting information and programs installed in the computer. This usually achieved through password, biometric systems, backup, system restore etc.
    3. Interrupt handling
      • Operating system have interrupt handler which study the cause of the interrupt and then take the necessary actions order to solve the interrupt without interfering with normal sequential execution
        Award 1 mark each max 3
  12. State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media
    • Smart browsing
    • Install latest antivirus versions and update regularly
    • Always scan email attachment before downloading
      Award 1 mark each maxk3
  13.  
    1. Define the term normalization
      • It is the process of decomposing fields into separate but related tables
        Award I mark each max 1
    2. State a reason to justify why database administrators usually performnormalization when creating a database for an organization
      • To minimize data redundancy in the database
        Award 2 marks max 2
  14. Mention three factors to consider when choosing a file organization method
    • Method of access
    • Storage media
    • Frequency of update
      Award 1 mark each max 3
  15. What are the four challenges experienced in implementing e-learning in Kenya
    • High initial cost of setup ICT infrastructure
    • Unreliable internet connectivity
    • Lack of standards
    • Technophobia
      Award 1 mark each max 4
  16.  
    1. Describe the following qualities of an algorithm
      1. Definiteness
        • Each step of an algorithm must be precisely defined; the actions to be carried out must be rigorously and unambiguously specified for each case
      2. Finiteness
        • An algorithm must always terminates after a finite number of steps
          Award 1 mark each max 2
    2. The table below shows the monthly charges applicable to different amount of water consumed by clients in a particular town.
      In addition to the consumption, the amount of the water bill will consist of a standing charge of Kshs 200 and a sewerage fee equivalent to 20% of the consumption
      1. Write a pseudo code for a program that prompts a user to enter the volume of water consumed per month. The program then computes and output the amount of the water bill in a year
        Start
               Set counter =1
               Set S_Charge= 200
               Set Bill =0
               REPEAT
                            Enter Volume of Water
                            IF Volume > 0 and <=10 Then
                                Consumption =200
                           Else
                           IF Volume >10 and <=20 Then
                                Consumption =350
                           Else
                                  IF Volume >20 and <=30
                                  Consumption =500
                           Else
                                  Consumption =1000
                                   Endif
                                   Endif
                                   Endif
                                           Sewerage = 0.2x Consumption
                                           Bill = Bill+S_Charge+Consumption+Sewerage
                                           Counter = counter +1
                          UNTIL Counter =12
                                      Print Bill
        Stop

        Marking Points
        Start =0.5
        Variables initialization
        =0.5
        Repeat =0.5
        Volume Input =0.5
        Results of 1 st Condition
        =0.5
        Results of 2 nd Condition
        =0.5
        Three Endif =0.5
        Sewerage Computation
        =0.5
        Bill computation =0.5
        Until condition =0.5
        Increment counter 0.5
        Stop =0.5
      2. Draw a flowchart for the pseud code
        CSPP1BondoMocks21Ans16
  17.  
    1. The table below is an extract from a spreadsheet use it to answer the questions that follow
      1. Identify the Ms-Excel feature that is used in cell A1 and B1 to enable the texts appear the way they are
        • Wrap text
          Award 1 mark max 1
      2. Name the data type in cell E4 and F3
        • E4 Formula/Function
        • F3 Function
          Award 1 mark each max 2
      3. Use absolute reference to represent a formula that is used to calculate total for wheat
        • =Product ($c$5:$D$5) or =$c$5:$D$5
          Award 2mark max 2
      4. Suggest how named reference can be used to calculate the GRAND TOTAL
        • Rename E2 to E6 as Total
        • =Sum(Total )
          Award 1 mark for renaming the range
          Award 2 mark for correct function max 2
      5. Write a formula that will classify product type base on the total as shown in the table below
        • =IF(E2>=10001,"Gold",IF(E2>=5001, "Silver":, "Bronze"))
          Award 1 correct function
          Award 1mark bracket to bracket
    2. State the difference between Cc and Bcc
      • CC field to send a copy of the email to people just to keep them in the loop while the BCC field is used when you want to send an email to multiple recipients but do not want any of them to know about the other people you have sent them to
        Award 2 marks max 2
    3. Mention three factors to consider when choosing an ISP
      • Cost
      • Speed
      • Cost
      • Type of connection
      • Reliability
      • Customer support
        Award 1 mark each max 3
  18.  
    1. What is the binary equivalent of base 10
      It is the same as 0.34375 
      number in decimal = 0.5
                0.34375 x 2 = 0.6875
                  0.6875 x 2 = 1.375
      values = 1
                    0.375 x 2 = 0.75 
                      0.75 x 2 = 1.5
                        0.5 x 2 = 1.0 = 0.010112

      Writing the  Multiplying by =0.5
      Reading correct Answer =1
    2. Determine the Hexadecimal equivalent of 4446 8
      4 =100 4=100 4=100 6=110      assigning binary
      equivalent =0.5
         1001     0010     0110           grouping the number in
      four bits =0.5
                9     2       6       = 926H   Getting the Hexadecimal equivalent for each group= 1
                                                        Answer=1
    3. Subtract 11001 2 from 19 10 using twos complement and write your answer in decimal notation
      Rewrite the question as 19+(11001)
       19 = 10011                                             Getting the binary equivalent of 19
      0.5
      11001
      00110 ......... 1c                                         Getting Ones complement =0.5
           + 1 
      + 00111............ 2c                                   Getting twos complement = 0.5
         10011
         11010                                                        Adding 2C to 19 = 0.5
               - 1
          11001                                                        Subtracting 1 = 0.5
          00110 = -610                                              Recompliment = 0.5
    4. Evaluate 101101101+10101- 1011110
      101101101
          + 10101
      110000010
        - 1011110
      100100100
    5. With reference to DTP defined the following terms
      1. Gutter
        • The inside margins closest to the spine of a book or the blank space between two facing pages in the center of a newsletter or magazine is known as the gutter. The gutter space includes any extra space allowance needed to accommodate the binding of books,
      2. Stroke
        • Refer to a line style
           CSPP1BondoMocks21Ans18e Accept the diagram with the outline pattern
          Award 1 mark each max 2
  19.  
    1. State three circumstances under which a system analyst may prefer to use questionnaire instead of observation during facts finding
      • When the people you need to gather information from are vastly dispersed
      • When the analyst want to collect confidential information
      • When limited amount of information is required from a large number of people
        Award 1 mark each max 3
    2. Mention three operational factors that a system analyst need to consider when sourcing for hardware and software to be used with the proposed system
      • Reliability
      • Compatibility
      • Upgradeability
      • User needs
        Award I mark each max 3
    3. Describe three advantages of parallel changeover
      • Costly to run two systems
      • Cross checking is difficult
      • Require more staff hence training required for additional staff
      • The benefits of the new system are not realized by the entire organization immediately
        Award 1 mark each max 3
    4. Define the following terms as used in Networking
      1. Ionosphere
        • The Ionosphere is part of Earth's upper atmosphere, between 80 and about 600 km where Extreme UltraViolet (EUV) and x-ray solar radiation ionizes the atoms and molecules thus creating a layer of electrons. the ionosphere is important because it reflects and modifies radio waves used for communication and navigation
          Award 1 mark max 1
      2. Line of sight
        • Is a type of propagation that can transmit and receive data only where transmit and receive stations are in view of each other without any sort of an obstacle between them.
          Award 1 mark max 1
    5. Identify the OSI layer in which the following communication devices operates
      1. Router
        • Network layer
      2. NIC
        • Physical layer
          Award 1 each max 2
    6. Describe two factors to consider when choosing a transmission media
      • Cost
      • Bandwidth
      • Attenuation rate
      • Reliability
      • Ease of Installation
      • Distance
  20. The following records were entered in a database
    1. Suggest a validation rule for date given that it should be not before
      • <#01/01/2006#
        Award 2 marks max 2
    2. List the records that will be displayed after running the following criteria?
      1. <>#1/1/2008 on date
         Date  Class    Registration No 
         1/1/2007  East  1425-A
         1/1/2008  North  1426-A
        Award ½ for each record max 1
      2. 1426-A on class
         Date  Class    Registration No 
         1/1/2008  North  1426-A
             
        Award 1 mark max 1
    3. Write the input mask for registration No
      • 0000-L
        Award 1 mark each max 1
    4. Choose the most appropriate data type for Date and Registration No
      • Date –Date
      • Registration No – Text
        Award 1 mark each max 2
    5. Explain the following terms as used in Word Processing
      1. Word wrap
        • The feature that automatically move a word or cursor to the beginning of the next line if does not fit at the end of the current line
      2. Orientation
        • Refer to the position of the page in relation to the text which can either landscape or portrait
      3. Indenting
        • Refer to moving the text way from the margin
          Award 1 mark each max 3
    6. A Student typed Genge Ni Salima uta Do during a practical lesson. State how the text will appear
       Change case options   Appearance
       Upper case  GENGE NI SALIMA UTA DO
       Sentence case  Genge ni salima uta do
       Toggle case  gENGE nI sALIMA uTA dO
       Lower case  genge ni salima uta do
       Capitalized Each Word/ Title case  Genge Ni Salima Uta Do
      Award 1 mark each max 5
Join our whatsapp group for latest updates

Download Computer Studies Paper 1 Questions and Answers - Bondo Mocks 2021 Exams.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest