Computer Studies Paper 1 Questions and Answers - Sunrise 2 Evaluation Mock Exams 2022

Share via Whatsapp

INSTRUCTIONS TO CANDIDATES

  • Write your name , school and index number in the spaces provided above
  • This paper consists of TWO sections A and B
  • Answer ALL questions in section A
  • Answer question 16 and any other THREE questions from section B
  • ALL answers should be written on spaces provided on the question paper
  • Candidates should check the question paper to ascertain that All pages are printed as indicated and that no questions are missing

FOR EXAMINERS USE ONLY

SECTION

QUESTION

 

A

1-15

 

B

16

 

17

 

18

 

19

 

20

 
 

TOTAL MARKS

 

QUESTIONS

SECTION A 50 MARKS

  1. State one function for each of the following elements of a computer system: (3mks)
    1. Hardware
    2. Software
    3. Live ware
  2. Explain two health issues that could arise from the use of an unsuitable computer desk (4mks)
  3. List two categories of system software (1mrk)
  4. Explain two contents of a warranty that should be considered when purchasing computer hardware (4mks)
  5. Students of a school intend to elect their school captain by secret ballot. State three ways in which computers can be used to improve the election process (3mks)
  6. Figure 1 and figure 2 show icons representing commands used to manipulate graphics in a desktop publishing package.
    6 adadada
    Explain the use of each of the icons labeled figure 1 and figure 2
  7. Give two differences between a Graphical User Interface (GUI) and a command line Interface. (4mrk)
  8. Identify each of the following symbols as used in a system flowchart.
    1. a adada(1mrk)
    2. b adadad(1mrk)
  9. A student typed a letter in a word processor and the last line of the letter flowed to the second page. State three ways in which the student could have adjusted the letter to fit on one page without changing the paper size. (3mks)
  10. A computer user is unable to retrieve a file stored in a server in an organization. State three reasons why the user would need to contact the network administrator (3mks)
  11. State three ways in which mobile phones have affected money transactions in the country (3mks)
  12. State two items that an electronic mail should have for it to be sent. (2mks)
  13. List four devices that use scanning technology that would be used to capture data directly from source. (2mks)
  14. State two ways in which hardware failure is a threat to data security. (2mks)
  15. Given the binary number 101011101111011, determine the number of:
    1. Nibbles (1mk)
    2. Bytes (1mk) 

Section B (60 marks)
Answer question 16 and any other three questions from this section in the spaces provided

  1.                    
    1. state the advantages of using low level programming languages (2mks)
    2. other than flowcharts, state three tools that can be used to present an algorithm (3mks)
    3. A form one admission interview consists of four tests: Mathematics, English, Kiswahili, and Science. In order to qualify for admission, an applicant must attain a minimum average of 65% in four tests and not less than 70% in Mathematics. All applicants must for the interview. Draw a flowchart that would read the scores for each applicant and determine whether an applicant is successful or not. (10mks)
  2.                    
    1. with the aid of a diagram, describe time sharing mode as used in a computer data processing (5mks)
    2. A company’s management has opted to use computers to process data. State four factors that the management needs to consider when selecting the company data processing mode. (4mks)
    3. Explain the purpose of each of the following in system documentation:
      1. User manual (1mk)
      2. Sample data (1mk)
      3. Table descriptions (1mk)
  3.                    
    1. State the role of each of the following data communication devices
      1. Repeater (1mk)
      2. Router (1mk)
    2. Figure 3 shows a network based on the bus topology.
      19 adada
      1. Identify the component P (1mk)
      2. State the function of the component labeled P (2mks)
    3. Students of Matuga secondary school formed an environmental club with a goal of taking part in environmental conversation activities. Outline three ways in which they can use the internet to achieve this goal. (3mks)
    4.                    
      1. A company has three branches A, B and C where A is the headquarter. The local area network (LAN) at A is directly connected to the LAN at B also directly connected to the LAN at C. Explain two benefits of having the LAN at B also directly connected to the LAN at C. (4mks)
      2. State three ways in which a company can protect its computer network from hackers (3mks)
  4.                          
    1. The following is an extract from a document created using a word processor.
      19 a adada
      Identify six formats that have been applied on the extract. (3mks)
    2. State three tools in a word processor that would help a user to minimize spelling mistakes when creating a document (3mks)
    3. The following is an extract of a spreadsheet created to manage sales. Use it to answer the questions that follow.
       

      A

      B

      C

      D

      1

      ITEM NAME

      UNIT PRICE

      UNITS SOLD

       

      2

      Bed

      12,300

      2

       

      3

      Wardrobe

      16,000

      4

       

      4

      Blanket

      5,000

      4

       

      5

      Mattress

      7,000

      5

       

      6

      Table

      10,000

      3

       
      1. Write a formula that will compute the number of items whose unit price is more than 10, 000. (3mks)
      2. if the formula =$B2 * C$2 was placed in D2, state the output if it was copied to D3. (1mk)
    4. A school administers examinations to all students in science, humanities and languages. Use the entities: EXAMINATIONS, STUDENTS, SCIENCES, HUMANITIES and LANGUAGES to illustrate a network database model. (4mks)
  5.                            
    1. Describe the octal number system. (2mks)
    2. Convert each of the following to the number system indicated:
      1. 111.1012 to decimal (3mks)
      2. 14.687510 to binary (4mks)
    3. Convert the number -1710 into 8-bit:
      1. Signed magnitude representation. (2mks)
      2. Two’s compliment (2mks)
    4. Perform the arithmetic operation. (2mks)
      110.112 + 11.0112

MARKING SCHEME

 

SECTIONA(40 marks)

 

QNS

RESPONSES

MARKS

1.

Function of:-

 
 

(a)Hardware: To perform tasks of inputting, storage, outputting, processing

 
 

during data processing and communication.

1

 

(b)Software:-Instructs the hardware/computer on what to do during data

1

 

Processing.

 
 

-Provides interface between hardware and live ware.

 
 

-Accept functions of software based category i.e. system/

 
 

application/ working/uses.

1

 

(c)Live ware: Meant to design or operate a computer.

 

2.

Problems arising from use of unsuitable computer desk.

  • It could lead to back problems if the desk is of an unrealistic height.
  • If it does not provide good positioning of the monitor, it could result in eyestrain.
  • Wrist problems will arise if the key board and mouse seating positions are bad.
  • njury as a result of falling computer components due to weak computer desks/ small size.

(First 2 x 2)

4

3.

Categories of system software

  • Firmware;
  • Networking software;
  • Operating system;
  • Utilities.

(First 2 x1) 2

1

4.

Two factors to consider when evaluating warranty

  • Period/duration/scope of cover: The warranty should specify the duration of time covered.
  • Service agreement/level: The warranty should indicate the type of service to be provided.
  • Cost implication/ liability agreement: Cost sharing between the dealer and the buyer in the event of any loss or malfunction.
  • Call out response.

(First 2 x 2)

4

5.

Three ways of using computers in electing school captain

  • Registering voters/(faster);
  • Voter identification(accurate);
  • Actual voting;
  • Tallying process (speedy).

(Any3 x 1)

3

6.

Figure1:Bring to front or bring to back

Used when the target graphic is hidden by other objects. When clicked, the target graphic is brought to the front. 

Figure2:Textwrap

It is used when a graphic is placed within the text area and the user needs to define how the text flows around the graphic.

1

 

 

 

1

 

7.

Distinction of GUI and command line operating systems 

GUI

Command line

Makes use of emerging software/ and  hardware technologies
Their interfaces have:

  • ribbons
  • control buttons
  • scrollbars
  • menus
  • can process complex graphics

The user interacts by:

  • clicking
  • scrolling
  • mouse over More user friendly.

Hardly makes use of emerging hardware/software technologies. Their interfaces have:

  • typed commands
  • prompt
  • editor window
  • cannot process complex graphics Users interact by typing in commands
  • Less user friendly.

(Any2 x 2 )

4

 

8.

A system flow chart symbols

  1. Report or documentation
  2. Disk/master file/database

 

1

1

 

9.

Ways of adjusting a document to fit a page

  • Change page orientation.
  • change the font;
  • decrease font size;
  • reduce margin size;
  • reduce character spacing;
  • reduce line height.
  • change font style eg. bold/italic

(Any3 x 1)

3

10.

Role of network administrator

  • to confirm that the network services are running;
  • to confirm that the user is granted appropriate privilege to access the Network services/password/authentication;
  • to confirm that the network infrastructure is in good condition;
  • to confirm that the files sought are inexistence.

(First 3 x 1)

3

11.

Impact of mobile phones

  • Users no longer queue in the bank in order to deposit or withdraw money;
  • Easy acquisition of financial statements;
  • Easy payment of bills;
  • Online banking is possible;
  • Money transfer is fast.
  • Safer transfer of money.
  • Provides wide coverage.
  • Can offer services anywhere anytime.
  • Cheaper money transfer services.
  • Increase in fraud.

(First 3 x 1)

3

12.

Items that an email must have: 

  • the email address of the recipient;
  • the content or message being communicated.

2

 

13.

Direct input methods

  • OBR
  • MICR
  • OCR;
  • OMR;
  • Image scanner;
  • Magnetic strip technology;
  • Image recognition/face recognition/fingerprint.

2

 

14.

Insecurity arising from hardware failure

  • Data loss due to total system failure e.g. HD crash;
  • The experts called upon to repair can access critical/ valuable information;
  • Data recovery software may be used to make unauthorized backups.

(First 2 x 1)

2

 

15.

  • Nibbles-4
  • Bytes -   2

1

1

 

SECTIONB(60marks)

 

16.

(a)    Advantages of using low-level language

  • program execution is immediate;
  • they require no compilation, no interpretation/translation hence they are faster;
  • hardware optimization is extensive;
  • program developed takes less memory space;
  • suitable for micro devices;
  • easy to design electronic device.

(First 2 x 1)

(b)  Three tools that can be used to develop an algorithm

  • Decision table
  • pseudo code;
  • natural language;
  • top down charts;
  • flowcharts.
  • DFD/context diagram
  • ERD
  • decision tree

(First 3 x 1)

2

 

 

 

 

 3

  c) 
c adada
 
17

(a)    Time-sharing mode

This is a processing mode in which a central processor serves two or more users with different requirements. The processor time is divided equally among the tasks in the queue. A user whose task requirements are more than is apportioned is send back to the queue.  For example, four jobs requiring times t1, t2, t3and t4to complete is apportioned equal time in each round until when they are done.  

17 adada

 
 

(b)    Factors to consider when selecting data processing mode 

  • The optimization of processing time;
  • The time factor required for decision arising from the processed data;
  • The ease of development, use and maintenance;
  • The control over the resources e.g. files, I/O devices e.t.c;
  • The need for the shared resources among several users who may afford purchasing their own facilities as in time sharing configuration;
  • The volume of work involved;
  • The cost of acquiring the relevant hardware, software, media e.t.c and the cost of maintenance;
  • The nature of the task to be processed.

(First 4 x 1)  4

 
 

(c)

(i)Purpose of user manual
It is a documentation whose purpose is to help a user to use the system With little guidance.   

 
  (ii) Purpose of sample data
Before the system is implemented, it has to be confirmed that it is functional. Sample data is meant to be used to test whether the system is giving desired output. 
 
  (iii)   Purpose of table descriptions
They are details of table structures that the system will require for the purpose of designing the actual tables.
 
18

(a)(i)Repeater

A device used to re-construct data signal during data transmission to its Original strength/amplify/boost/regenerate. 

 
 

(ii)   Router

  • It is a device used to facilitate movement of data or packets between two Or more LANS of different configuration (expansion of networks).
  • Delivers a packet/data directly to destination computers.
  • Interconnects different networks/provides network services.

1

 

(b)(i)The component P is the terminator.

1

 

(ii)Terminator in a backboneisusedtopreventdatasignalfrombouncingback/absorbsignals.

2

 

(c)Use of internet in environmental conservation club

  • Source of knowledge on environmental matters;
  • Collaboration with peers from other schools or organizations;
  • Dissemination of information on what the club is doing;
  • Seeking for funding from sponsors.

(First 3 x 1)

3

 

(d)(i)Benefits of linking branch B and C

  • Speed of communication between B and C is increased since the traffic between the two branches can be re-routed through the link BC;
  • If either AC or AB is down, the three branches can still communicate;
  • If the HQ systems fail, the two branches Band C can communicate using this link.

(First 2 x 2)

4

 

(ii)Ways to protect company network from hackers

  • Changing password frequently
  • Use of encryption;
  • Use of data proxies;
  • Use of firewalls to filter unwanted packets;
  • User restriction e.g. passwords/ biometrics.
  • Use of complex password.

(Any3 x 1)

3

19.

(a)Formats applied
Bold, strikethrough, underline, italics, centre alignment, dropcap, bulleted list, line height / spacing, 2 column paragraph, column break, casing, font type, left alignment, column separator.

3

 

(b)Tools for proofreading

  • Spellchecker and grammar/ dictionary;
  • Auto complete;
  • Autocorrect;
  • Thesaurus.

(Any3 x 1)

3

 

(c)(i) =@ or + Count if (B2: B6, “>10,000”)(B2:B6)Argument range- 1(>10,000) Criteria  - 1
AllFormulacorrect-1

(ii)AtD3
Formula is
$ B3 * C$2- 1
= 16000#2
=32, 000- 1

3

2

     
 

(d) last as

4

20.

(a)Characteristics of octal number system.

  • each symbol is represented by 3bits.
  • The number is made of8 symbols0, 1, 2,.............. 7;
  • Maximum value of a single digit is7 (one less than the value of the base);
  • This numbersystemusesbase8.

(Any2 x 1)

2

  b) i) b i ssfs 3
 

(ii)14.687510to binary
1410=  11102- 1

0.6875#2=1.375
0.375#2=0.75
0.75#2=1.5
0.5#2=1.0          - 1

Decimal portion=0.1011-1
Numberis1110.10112-1

 
 
 
 
 
 
 

4

 

(c)(i) 1710=  10001 or 100012-1
10010001- 1
binary equivalent of 17Signbit for negative.

2

 

(ii) 1710=      10001
In 8 bit       00010001

Reverse bits 1 1 1 0 1 1 1 0-1

+                  1

1 1 1 0 1 1 1 1

Number is 11 1 0 11 1 12-

2

 

(d)

110.112+11.0112
1 1 0.1 1 0
+0 1 1.0 1 1- 1
 1 0 1 0 . 0 0 1- 1

   

2


Download Computer Studies Paper 1 Questions and Answers - Sunrise 2 Evaluation Mock Exams 2022.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Join our whatsapp group for latest updates
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?