Computer Studies Paper 1 Questions and Answers - Lanjet Joint Mock Exams 2022

Share via Whatsapp

INSTRUCTION TO CANDIDATES

  • Write your name and index number in the spaces provided above
  • This paper consists of Two sections; A and B.
  • Answer ALL questions in section A.
  • Answer question 16(compulsory) and any other THREE questions from section B.
  • All answers should be written in the spaces provided on the question paper

FOR OFFICIAL USE ONLY

SECTION

QUESTIONS

CANDIDATES SCORE

A

1-15

 

 

 

 

 

B

16

 

17

 

18

 

19

 

20

 
 

TOTAL SCORE

 

QUESTIONS

SECTION A

  1. Define the following terms as used in word processing. (3 marks)
    1. Word wrap
    2. Justification
    3. Drop cap
  2. State three advantages of using computers in performing day to day’s tasks. (3marks)
  3. Wanja operates a bookshop in a town. Lately he is finding the task of managing daily transactions manually overwhelming.
    1. Identify the type of management information system that Wanja should acquire (2 marks)
    2. State two benefits that Wanja will gain from using such a system (2 marks)
  4. State three hardware considerations that need made before installing an operating system (3marks)
  5. Before the end of every month an electricity service provider sends out field officers to take consumer meter readings. The data collected by the officers is then keyed into the computer. The system then generates utility bills which are printed and sent to the consumers.
    1. State two transcription errors that are likely to occur during meter reading or input (2 marks)
    2. State two ways such errors can be avoided (1 mark)
  6. State three editing tools that are available in most standard word processing software (3 marks)
  7. Information security should be enforced both physically and logically.
    1. Differentiate between the two security mechanisms (2 marks)
    2. State two physical security techniques (2 marks)
  8. Explain three types of system buses found on the computer system board (3 marks)
  9. State the four disk management tools found in most operating systems. (3 marks)
  10. Highlight the dangers associated with the following:
    1. Exposing computers to high humidity (1marks)
    2. Purchasing software before assessing requirements (1marks)
    3. Using foreign flash disks on the computer. (1marks)
  11. Differentiate between a filter and a query in a database (1 marks)
  12. The payroll system is both a financial system and a human resources system. Explain this statement. (2marks)
  13. Explain the importance of the following spreadsheet operations.
    1. Freezing columns (1mark)
    2. Data validation (1 mark)
  14. List two ways in which computer technology can be used in law enforcement (1 marks)
  15. In reference to aviation technology, state two advantages of using simulation in training pilots (2mks)

SECTION B (60 MARKS)
Answer question 16(compulsory) and any other THREE questions from this section.

  1. State the stage of program development in which: (4 marks)
    1.                      
      1. A flowchart would be drawn
      2. The programmer would check whether the program does as required
      3. The user guide would be written
      4. The requirements specifications would be written
    2.  A programmer uses program design tools to design a program that can list the odd numbers between 0 and 100.
      1.  Write a pseudo code for this problem. (5mks)
      2. Draw a flow chart for the pseudo code in 16 b) (i) above. (6mks)
      3. Study the follow flowchart then answer the questions that flow. (4 marks)
        ii adadada
        Figure 1 Flowchart 2
        1. Name all the flowchart symbols used in this flowchart. (4 marks)
          A: ..
          B: ..
          C:
          D:
  2. Define the term
    1. Network topology. (1 mark)
    2. Clearly illustrate the following types of network topologies. (5mks)
      1. Bus topology
      2. Mesh topology
      3. Star topology
    3. Explain two factors you would consider before enrolling for an ICT course in a college. (2mks)
    4. Differentiate the function SUM and SUMIF as used in spreadsheet. 2mks
    5. State two advantages of using fiber optic cables. (2mks)
    6. In system development, testing is one of the critical stages. Give three reasons why the testing phase is critical to the systems developer. (3 marks)
  3. A systems analyst has been asked by a doctor to computerize the records she keeps about her patients. He must first of all collect information about the existing system.
    1.                        
      1. Describe four methods he could use to collect this information. (4mks )
      2. Once the whole system has been designed it will need to be implemented.
        1. Describe two methods of implementation that could be used. 2mks
        2. Write down two reasons why one of the methods you gave in (b) (i) is better than the other. ( 2 marks)
    2. After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated. ( 2mks)
    3. State one difference between system flowchart and program flowchart. (2 marks)
  4.                                        
    1. Describe each of the following data processing methods and give an example of where they are used. (6mks)
      1. Online processing
      2. Batch processing
      3. Real-time
    2. Differentiate between the following: (6mks)
      1. Logical file and physical file –
      2. Master file and back-up file –
      3. Random and indexed sequential file organization methods.
    3. An organization is facing threats to data integrity. Explain three ways how the threats can be minimized. (3mks)
  5.                                          
    1.                                
      1. Give one reason why data and information in a computer system needs to be converted to other number systems other than binary. (1mks)
      2. Explain one reason for use of binary in digital technology. (1mks)
      3.  Using twos complement, workout : 1510 - 810 in binary form. (4mks)
      4. Using BCD coding system convert 796 to binary. (3mks)
    2. Convert each of the following to the number system indicated:
      1. 111.1012 to decimal; (3 marks)
      2. 14.687510 to binary [3 marks]

MARKING SCHEME

  1. Define the following terms as used in word processing. (3 marks)
    1. word wrap
      • it is a formatting feature which makes the text to move to the next line automatically
    2. Justification
      • It is an alignment feature where both left and right are aligned
    3. Drop cap
  2. State three advantages of using computers in performing day to day’s tasks. (3marks)
    • It has high speed of processing tasks
    • It is flexible
    • Has high storage space
  3. Wanja operates a bookshop in a town. Lately he is finding the task of managing daily transactions manually overwhelming.
    1. Identify the type of management information system that Wanja should acquire (2 marks)
      • electronic
    2. State two benefits that Wanja will gain from using such a system (2 marks)
      • High storage
      • High processing speed
      • Efficiency
  4. State three hardware considerations that need made before installing an operating system (3marks)
    • Compatibility
    • Availability
    • User need
    • User friendliness
  5. Before the end of every month an electricity service provider sends out field officers to take consumer meter readings. The data collected by the officers is then keyed into the computer. The system then generates utility bills which are printed and sent to the consumers.
    1. State two transcription errors that are likely to occur during meter reading or input (2 marks)
      • Transposition
      • Misreading
    2. State two ways such errors can be avoided (1 mark)
      • Dry checking
      • Using of test data
      • Using debugging utilities
  6. State three editing tools that are available in most standard word processing software (3 marks)
    • Do and redo
    • Spelling and grammar checker
    • Thesaurus
    • Insert mode
    • Type over mode
  7. Information security should be enforced both physically and logically.
    1. Differentiate between the two security mechanisms (2 marks)
      • Physical security ensures the content is not tapered with while logical security refers to securing the meaning of the information
    2. State two physical security techniques (2 marks)
      • Burglar proofing
      • Security personnel
      • Security cameras (cctv)
  8. Explain three types of computer buses found on the computer system board (3 marks)
    • Control bus
    • Address bus
    • Data bus
  9. State four disk management tool found in most operating systems (3 marks)
    • Defragmentation
    • Partitioning
    • Disk Scanning
    • Disk formatting
    • Disk compression
    • Disk backup
    • Disk diagnostic
  10. Highlight the dangers associated with the following:
    1. Exposing computers to high humidity (1marks)
      • Rusting of the parts of the metallic computer
    2. Purchasing software before assessing requirements (1marks)
      • May be a pirated software
    3. Using foreign flash disks on the computer. (1marks)
      • May multiply viruses
  11. Differentiate between a filter and a query in a database (1 marks)
    • Filter if a formatting tool that extract part of the record from the table while query is a database object used to extract information from the database
  12. The payroll system is both a financial system and a human resources system. Explain this statement. (2marks)
    • It is used to perform finance calculations and what if analysis and also used to update and provide financial records for the workers
  13. Explain the importance of the following spreadsheet operations.
    1. Freezing columns (1mark)
      • It enable the use to view only required records at atime
    2. Data validation (1 mark)
      • Ensures the records are valid as per the user need
  14. List two ways in which computer technology can be used in law enforcement (1 marks)
    • Surveillance, crime detection and prevention
    • Scene monitoring by the police
    • Storage of biometric information for investigation of crimes
  15. In reference to aviation technology, state two advantages of using simulation in training pilots (2mks)
    • Safety
    • Less costly
  16.                            
    1. State the stage of program development in which:
      1. A flowchart would be drawn Design
      2. The programmer would check whether the program does as required Testing
      3. The user guide would be written Documentation
      4. The requirements specifications would be written Analysis
    2. A programmer uses program design tools to design a program that can list the odd numbers between 0 and 100.
      1. Write a pseudo code for this problem. (5mks)'
        • Start Marks award
          Odd=1 * Start/ stop – 1 mk
          Repeat Repeat/ until -1 mk
          Write odd correct statements -3 mks
          Odd= Odd+2 *Also accept use of other control statements
          Until odd =99 such as while…DO
      2. Draw a flow chart for the pseudo code in 16 b) (i) above. (6mks)
        flowchart adadda

        System flowchart

        Program flowchart

        A program flowchart details the flow through a single program

        A system flowchart will show the flow through a system(A is made up of many programs).

        . Each box in the flowchart will represent a single instruction or a process within the program

        Each box will represent a program or a process made up of multiple programs.

        A system flow chart describes the flow of data through a complete data-processing system

        describe the flow of data through a particular computer program in a data processing system

        Describe the relationship between inputs, processing, and outputs for a system.

        Describe the sequence of logical operations performed in a computer program.

        Any one at 2 marks. Difference must be shown
      3. Study the follow flowchart then answer the questions that flow.
        ii adadada
        1. Identify the type of flowchart that is represented by the flowchart in figure2
          • System flow chart ( ½ mark)
        2. Name all the flowchart symbols used in this flowchart.
          2 adada
          @ ½ mark each. Each name must be associated with the appropriate symbol. (2 ½ marks)
  17.                                
    1. Define the term network topology . Network topology can be viewed in two ways . Name and Explain the two ways. (5mks)
      • Network topology:
        Refers to the way computers and other devices have been arranged on a network or how data passes from one computer to another on a network.
        refers to the physical arrangement of the network, especially the location of the computers, other devices and how the cables are run between the devices.
    2.               
      1. Logical/Signal topology.
        • Deals with the way data passes from one device to the next on the network. Examples of logical topologies are Ethernet and token ring.
      2. Physical topology.
        • Refers to the physical layout arrangement of components on the network.
        • The most common physical topologies are the bus, the star, the ring and the mesh.
    3. Explain two factors you would consider before enrolling for an ICT course in a college. (2mks)
      • Cost.
      • Job opportunities.
      • Where the examinations offered are recognized.
      • The organization offering the course.
    4. Differentiate the function SUM and SUMIF as used in spreadsheet. 2mks
      • SUM :- Adds values in a range of cells and returns the results
      • SUMIF :- Adds values in a range of cells that meets the specified condition and returns the results.
    5. State two advantages of using fiber optic cables. (2mks)
      1. Noise resistance: It is immune to EMI.
      2. Less signal attenuation: signal can run for miles without requiring regeneration.
      3. Higher bandwidth: fibre optic cable can support dramatically higher bandwidths (and hence data rate) than all other cables.
      4. Smaller and lighter than copper cable hence space limited situations.
      5. Can be used in hazardous (highly flammable) places because they do not generate electrical signals.
      6. Very fast (in light form)
    6. In system development, testing is one of the critical stages. Give three reasons why the testing phase is critical to the systems developer. [3 marks]
      • Helps to ensure that the logical ad physical designs and environment are to the users satisfaction
      • Help to detect and correct errors
      • Gives proof to those skeptical about the working of the system
      • Helps to establish how the system works under various conditions.
  18. A systems analyst has been asked by a doctor to computerize the records she keeps about her patients. He must first of all collect information about the existing system.
    1. Describe four methods he could use to collect this information. 4mks
      Any four from:
      • Observation
      • Questionnaires
      • Interviews
      • Collecting documents/document review @ ½ mark each (2 marks)
    2. Once the whole system has been designed it will need to be implemented.
      1. Describe two methods of implementation that could be used. 2mks
        Described Any two from:
        • parallel running
        • direct changeover
        • pilot running
        • phased implementation. @ 1 mark each (2 marks)
      2. Write down two reasons why one of the methods you gave in (b) (i) is better than the other.
        • parallel running/pilot running
          two form
          there is a backup/fallback system
          In case of malfunction
          time can be taken in correcting malfunctions
          can train staff gradually
        • direct changeover
          two form
          time is not wasted in changeover
          cheaper as you don't have to pay two sets of staff
          system is tested rigorously before implmentation
          less likely to malfunction
        • Phased implementation
          two form
          If system malfunctions only small part of business affected 
          don't have to pay two sets of staff
          can make sure system workd before extending it
          ( 2 marks)
    3. After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated.
      Any two from: ( 2mks)
      • to make sure user requirements have been met
      • to identify any shortcomings
      • to identify possible improvements
    4. State one difference between system flowchart and program flowchart. (2 marks)
      System flowchart Program flowchart
      • A program flowchart details the flow through a single program A system flowchart will show the flow through a system(A is made up of many programs).
      • Each box in the flowchart will represent a single instruction or a process within the program Each box will represent a program or a process made up of multiple programs.
      • A system flow chart describes the flow of data through a complete data-processing system describe the flow of data through a particular computer program in a data processing system
      • Describe the relationship between inputs, processing, and outputs for a system. Describe the sequence of logical operations performed in a computer program.
        Any one at 2 marks. Difference must be show.
    5. Study the following flowchart then answer the questions that follow.
      1. Identify the type of flowchart that is represented above in figure2
        System flow chart ( ½ mark)
      2. Name all the flowchart symbols used in this flowchart (e) figure 2 above.

        @ ½ mark each. Each name must be associated with the appropriate symbol. (2 ½ marks)
  19.                        
    1. Describe each of the following data processing methods and give an example of where used. (6mks)
      1. Online processing – Data is processed immediately it is received e.g. internet banking, online payment system using credit card.
      2. Batch processing – Data is accumulated as a group then it is processed as one/ a group. Eg in payroll system
      3. Real-time – Computer processes the incoming data as soon as it occurs, up to dates the transactions file and gives an immediate response, that would affect the events as they happen e.g. making reservations for airlines seats, hotels etc.
    2. Make a clear difference between:- (6mks)
      1. Logical file and physical file – Viewed in terms of what data items it contain and details of what processing operations may be performed on the data items. Physical files is one that is viewed in terms of how data is stored on a storage media and hoe the processing operations are made possible.
      2. Master file and back-up file – Master file is the main file that contains relatively permanent records about particular items or entries. Back-up file is used to hold copies of data or information from the fixed storage (hard disk)
      3. Random and indexed sequential file organization methods.
        Random – Also direct file organization records are stored randomly but accessed directly on a storage medium. Indexed sequential records are stored and accessed in a particular order using an index used to enable the computer to locate individual records on storage media.
    3. An organization is facing threats to data integrity. Explain three of how the threats can be minimized. (3mks)
      • Backup data preferably on external storage media.
      • Control access to data by enforcing security measures.
      • Design user interface that minimize unauthorized access.
      • Using error detection and correction software when transmitting data.
      • Use devices that directly capture data from the source such as bar code readers.
      • Digital cameras, optical CR.
  20.                            
    1. Give one reason why data and information in a computer system needs to be converted to other number systems other than binary.(1mks)
      • Higher number systems are used in computing to reduce the streams of binary into manageable form.
      • Help to improve the processing speed.
      • Optimize memory usage.
    2. Explain one reason for use of binary in digital technology. (1mks)
      • It is easier to develop devices that understand binary language.
      • Device a designed using binary logic are simple more reliable and consume the energy.
    3.                                    
      1. Using twos complement, workout : 1510 - 810 in binary form. (4mks)
        = 15+(-8)
        Convert 810 to its binary equivalent then write its two’s complement

        15 = 11111 ,
        To 8 bit =00011111

        8= 1000
        To 8bit = 00001000

        11110111 BitwiseNOT of 8 =1’C
        2’C = 11110111+1 = 11111000

        00001111
        + 11111000
        ( 1) 00000111

        Overflow is ignored = 000001112
        And in binary form the difference Is a positive number (000001112 (710)
      2. Twos complement is the most popular way of representing negative numbers in computer Systems. Give an advantage of using this method.
        • There are no two ways of representing a zero as in the case with the other two methods
        • Effective addition and subtraction can be done even with numbers that are represented with a sign bit without a need for extra circuitries to examine the sign of an operand.
      3. Using BCD coding system convert 796 to binary. (3mks)
         2  7  rem    2  9  rem   2 6  rem
         2  3  1    2  4  1   2 3  0
                             
         2  1  1    2  2  0   2 1  1
          0 1   2 1 0     0 1
                  0 1        
        79610 = 0111100101102
    4. Convert each of the following to the number system indicated:
      1. 111.1012 to decimal; (3 marks)
        • 111=1x22+1x21+1x20=4+2+1 = 710
          0.101 = 1x2-1+1x2-2+1x2-3
          = 0.5+0.25+0.125
          = 0.62510
          ⁖111.1012 = 7.62510
      2. 14.687510 to binary [4 marks]
        • 14 = 11102
          0.6875x2 = 1.375
          0.375x2 = 0.75
          0.75x2 = 1.50
          0.50x2 = 1.00
          Decimal portion
          0.10112
          1110.10112

Download Computer Studies Paper 1 Questions and Answers - Lanjet Joint Mock Exams 2022.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Join our whatsapp group for latest updates
Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?