INSTRUCTIONS TO CANDIDATES
- Write your name , school and index number in the spaces provided above
- This paper consists of TWO sections A and B
- Answer ALL questions in section A
- Answer question 16 and any other THREE questions from section B
- ALL answers should be written on spaces provided on the question paper
- Candidates should check the question paper to ascertain that All pages are printed as indicated and that no questions are missing
FOR EXAMINERS USE ONLY
SECTION | QUESTION | |
A | 1-15 | |
B | 16 | |
17 | ||
18 | ||
19 | ||
20 | ||
TOTAL MARKS |
QUESTIONS
SECTION A 50 MARKS
- State one function for each of the following elements of a computer system: (3mks)
- Hardware
- Software
- Live ware
- Explain two health issues that could arise from the use of an unsuitable computer desk (4mks)
- List two categories of system software (1mrk)
- Explain two contents of a warranty that should be considered when purchasing computer hardware (4mks)
- Students of a school intend to elect their school captain by secret ballot. State three ways in which computers can be used to improve the election process (3mks)
- Figure 1 and figure 2 show icons representing commands used to manipulate graphics in a desktop publishing package.
Explain the use of each of the icons labeled figure 1 and figure 2 - Give two differences between a Graphical User Interface (GUI) and a command line Interface. (4mrk)
- Identify each of the following symbols as used in a system flowchart.
(1mrk)
(1mrk)
- A student typed a letter in a word processor and the last line of the letter flowed to the second page. State three ways in which the student could have adjusted the letter to fit on one page without changing the paper size. (3mks)
- A computer user is unable to retrieve a file stored in a server in an organization. State three reasons why the user would need to contact the network administrator (3mks)
- State three ways in which mobile phones have affected money transactions in the country (3mks)
- State two items that an electronic mail should have for it to be sent. (2mks)
- List four devices that use scanning technology that would be used to capture data directly from source. (2mks)
- State two ways in which hardware failure is a threat to data security. (2mks)
- Given the binary number 101011101111011, determine the number of:
- Nibbles (1mk)
- Bytes (1mk)
Section B (60 marks)
Answer question 16 and any other three questions from this section in the spaces provided
-
- state the advantages of using low level programming languages (2mks)
- other than flowcharts, state three tools that can be used to present an algorithm (3mks)
- A form one admission interview consists of four tests: Mathematics, English, Kiswahili, and Science. In order to qualify for admission, an applicant must attain a minimum average of 65% in four tests and not less than 70% in Mathematics. All applicants must for the interview. Draw a flowchart that would read the scores for each applicant and determine whether an applicant is successful or not. (10mks)
-
- with the aid of a diagram, describe time sharing mode as used in a computer data processing (5mks)
- A company’s management has opted to use computers to process data. State four factors that the management needs to consider when selecting the company data processing mode. (4mks)
- Explain the purpose of each of the following in system documentation:
- User manual (1mk)
- Sample data (1mk)
- Table descriptions (1mk)
-
- State the role of each of the following data communication devices
- Repeater (1mk)
- Router (1mk)
- Figure 3 shows a network based on the bus topology.
- Identify the component P (1mk)
- State the function of the component labeled P (2mks)
- Students of Matuga secondary school formed an environmental club with a goal of taking part in environmental conversation activities. Outline three ways in which they can use the internet to achieve this goal. (3mks)
-
- A company has three branches A, B and C where A is the headquarter. The local area network (LAN) at A is directly connected to the LAN at B also directly connected to the LAN at C. Explain two benefits of having the LAN at B also directly connected to the LAN at C. (4mks)
- State three ways in which a company can protect its computer network from hackers (3mks)
- State the role of each of the following data communication devices
-
- The following is an extract from a document created using a word processor.
Identify six formats that have been applied on the extract. (3mks) - State three tools in a word processor that would help a user to minimize spelling mistakes when creating a document (3mks)
- The following is an extract of a spreadsheet created to manage sales. Use it to answer the questions that follow.
A
B
C
D
1
ITEM NAME
UNIT PRICE
UNITS SOLD
2
Bed
12,300
2
3
Wardrobe
16,000
4
4
Blanket
5,000
4
5
Mattress
7,000
5
6
Table
10,000
3
- Write a formula that will compute the number of items whose unit price is more than 10, 000. (3mks)
- if the formula =$B2 * C$2 was placed in D2, state the output if it was copied to D3. (1mk)
- A school administers examinations to all students in science, humanities and languages. Use the entities: EXAMINATIONS, STUDENTS, SCIENCES, HUMANITIES and LANGUAGES to illustrate a network database model. (4mks)
- The following is an extract from a document created using a word processor.
-
- Describe the octal number system. (2mks)
- Convert each of the following to the number system indicated:
- 111.1012 to decimal (3mks)
- 14.687510 to binary (4mks)
- Convert the number -1710 into 8-bit:
- Signed magnitude representation. (2mks)
- Two’s compliment (2mks)
- Perform the arithmetic operation. (2mks)
110.112 + 11.0112
MARKING SCHEME
SECTIONA(40 marks) | |||
QNS | RESPONSES | MARKS | |
1. | Function of:- | ||
(a)Hardware: To perform tasks of inputting, storage, outputting, processing | |||
during data processing and communication. | 1 | ||
(b)Software:-Instructs the hardware/computer on what to do during data | 1 | ||
Processing. | |||
-Provides interface between hardware and live ware. | |||
-Accept functions of software based category i.e. system/ | |||
application/ working/uses. | 1 | ||
(c)Live ware: Meant to design or operate a computer. | |||
2. | Problems arising from use of unsuitable computer desk.
(First 2 x 2) | 4 | |
3. | Categories of system software
| (First 2 x1) 2 | 1 |
4. | Two factors to consider when evaluating warranty
(First 2 x 2) | 4 |
5. | Three ways of using computers in electing school captain
(Any3 x 1) | 3 | ||||
6. | Figure1:Bring to front or bring to back Used when the target graphic is hidden by other objects. When clicked, the target graphic is brought to the front. Figure2:Textwrap It is used when a graphic is placed within the text area and the user needs to define how the text flows around the graphic. | 1
1 | ||||
7. | Distinction of GUI and command line operating systems
(Any2 x 2 ) | 4 |
8. | A system flow chart symbols
|
1 1 |
9. | Ways of adjusting a document to fit a page
(Any3 x 1) | 3 |
10. | Role of network administrator
(First 3 x 1) | 3 |
11. | Impact of mobile phones
(First 3 x 1) | 3 |
12. | Items that an email must have:
| 2 |
13. | Direct input methods
| 2 |
14. | Insecurity arising from hardware failure
(First 2 x 1) | 2 |
15. |
| 1 1 |
SECTIONB(60marks) | ||
16. | (a) Advantages of using low-level language
(First 2 x 1) (b) Three tools that can be used to develop an algorithm
(First 3 x 1) | 2
3 |
c) ![]() | ||
17 | (a) Time-sharing mode This is a processing mode in which a central processor serves two or more users with different requirements. The processor time is divided equally among the tasks in the queue. A user whose task requirements are more than is apportioned is send back to the queue. For example, four jobs requiring times t1, t2, t3and t4to complete is apportioned equal time in each round until when they are done. | |
(b) Factors to consider when selecting data processing mode
(First 4 x 1) 4 | ||
(c) (i)Purpose of user manual | ||
(ii) Purpose of sample data Before the system is implemented, it has to be confirmed that it is functional. Sample data is meant to be used to test whether the system is giving desired output. | ||
(iii) Purpose of table descriptions They are details of table structures that the system will require for the purpose of designing the actual tables. | ||
18 | (a)(i)Repeater A device used to re-construct data signal during data transmission to its Original strength/amplify/boost/regenerate. |
(ii) Router
| 1 | |
(b)(i)The component P is the terminator. | 1 | |
(ii)Terminator in a backboneisusedtopreventdatasignalfrombouncingback/absorbsignals. | 2 | |
(c)Use of internet in environmental conservation club
(First 3 x 1) | 3 | |
(d)(i)Benefits of linking branch B and C
(First 2 x 2) | 4 | |
(ii)Ways to protect company network from hackers
(Any3 x 1) | 3 | |
19. | (a)Formats applied | 3 |
(b)Tools for proofreading
(Any3 x 1) | 3 | |
(c)(i) =@ or + Count if (B2: B6, “>10,000”)(B2:B6)Argument range- 1(>10,000) Criteria - 1 (ii)AtD3 | 3 2 | |
(d) | 4 | |
20. | (a)Characteristics of octal number system.
(Any2 x 1) | 2 |
b) i) ![]() | 3 | |||
(ii)14.687510to binary Decimal portion=0.1011-1 | ||||
4 | ||||
(c)(i) 1710= 10001 or 100012-1 | 2 | |||
(ii) 1710= 10001 Reverse bits 1 1 1 0 1 1 1 0-1 + 1 1 1 1 0 1 1 1 1 Number is 11 1 0 11 1 12- | 2 | |||
(d) 110.112+11.0112 | 2 |
Download Computer Studies Paper 1 Questions and Answers - Sunrise 2 Evaluation Mock Exams 2022.
Tap Here to Download for 50/-
Get on WhatsApp for 50/-
Why download?
- ✔ To read offline at any time.
- ✔ To Print at your convenience
- ✔ Share Easily with Friends / Students
Join our whatsapp group for latest updates