Computer Studies Paper 1 Questions and Answers - Mincks Group of Schools Mock Examinations 2022

Share via Whatsapp

Instructions to Candidates

  1. This paper consists of two sections A & B
  2. Answer all the questions in section A
  3. Answer question 16 and any other three questions in section B

QUESTIONS

SECTION A(40 MARKS)
Answer ALL questions in this section in the spaces provided

  1. Define term artificial intelligence (1mk)
  2. List three roles of system analyst (3mks)
  3. Outline three way IEBC will use technology to ensure free and fare election (3mks)
  4. Write the following acronymes in full
    1. WIFI
    2. HDMI
  5.                      
    1. List two reasons why USB interface has become popular than other interfaces(2mks)
    2. Give three disadvantage of using serial file organisation (3mks)
  6. Name three common malicious programs that are harmful to computers (3mks)
  7. Define the term deadlock as used in operating system (1mk)
  8. Give any three categories of functions that are available in ms excel (3mks)
  9. Differentiate between count and count if functions as used in ms excel (2mks)
  10. Explain why liquid-based powder fire extinguishers are discouraged in a computer laboratory (2mks)
  11. Explain the following terms as used in computer crimes (2mks)
    1. Piracy
    2. Industrial espionage
  12. List three advantages of using fibre optic cable in networking (3mks)
  13. Explain two database models (4mks)
  14.                    
    1. Give three ways in which ICT can be used to conserve forests (3mks)
    2. Give three factors to consider when selecting ICT related career (3mks)
  15. List four sub categories of system software (4mks)

SECTION B (60 MARKS)
Answer question 16 and any other three questions in this sections

  1.                  
    1. List two examples of
      1.  Third generation languages (2mks)
      2. Object oriented programming languages (2mks)
    2. Differentiate between source code and object code (2mks)
    3. Draw a flow chart that will take two numeric values X and Y compare the two numbers to give the following output:
      If X is more than Y, the program should compute the difference of the two numbers
      If X is less than Y, the program should compute the sum of the two numbers
      If X is equal to Y, the program should compute the product of the two numbers   (7mks)
    4. List two repetitive control structures (2mks)
  2.                
    1. Differentiate between the following as used in data communication
      1. Baseband and broadband (2mks)
      2. Multi-plexing and demulti-plexing (2mks)
    2. ABC company intends to start their operations across all the East African Countries
      1. Recommend to them the most ideal computer network that they should use (1mk)
      2. List three challenges the company is likely to encounter while using the network(3mks)
      3. With an example state three networking elements that the company will need for them to implement the network (6mks)
    3. Give one advantage of using unbound media for networking (1mk)
  3. Study the worksheet below and answer the questions that follow

    1

    A

    B

    C

    D

    E

    F

    2

    SKY WAYS AGENCIES

    3

    Product

    Region 1

    Region 2

    Regions 3

    Region 4

    TOTAL

    4

    Rexona

    3400

    3700

    4000

    4100

     

    5

    Lifeboy

    2500

    2600

    2100

    2500

     

    6

    Omo

    6000

    6100

    6300

    1600

     

    7

    Ushindi

    1200

    1500

    1400

    6400

     

    8

    Carmel

    7000

    6900

    7200

    8000

     

    9

    Total

             

    10

    Maximum

             

    11

    Average

             
    1. Write functions that can be entered to get total, maximum and average of each region (3mks)
    2. Write down the function that returns the number of sales in the four regions whose values is greater than or equal to 2000 (2mks)
    3. The prices for region 4 were reduced with n% value which was placed in cell C13 Write a formulae to calculate the new price of product Rexona and applied to other products in the same region (3mks)
    4. Differentiate between stroke and fill as used in DTP (2mks)
    5.                    
      1. Define text wrap (1mk)
      2. List four ways you can wrap text on an object (4mks)
  4.                  
    1. State three ways in which a signed binary number can be represented (3mks)
    2. Convert the following numbers into binary form
      1. 24710 (2mks)
      2. 9AC16 (2mks)
    3. Using two complements compute 2710 - 1310 and leave your answer in binary form (use 8 bits) (3mks)
    4. Differentiate between logical file and physical file (2mks)
    5. Explain three parameters that can be used to measure data integrity (3mks)
  5.                
    1.                  
      1. State the importance of information fact finding in system development (1mk)
      2. State any two advantages and two disadvantages of using interview method for information gathering (4mks)
    2. Explain three system development theories and methods (6mks)
    3. Your school wishes to replace the original system with an information system
      1. With a reason, advise the school on the best change over strategy to implement(2mks)
      2. Give two challenges the school may encounter while implementing the new system 

MARKING SCHEME

  1. Define the term artificial intelligence. (1mk)
    • Depicting human like behaviour.
  2. List three roles of a system analyst. (3mks)
    • Reviewing the current manual system
    • Working with programmers to construct and test the system.
    • Co-ordinating training of users of the new system.
  3. Outline three ways which IEBC will use technology to ensure free and fair elections. (3mks)
    • Bio metrics
    • Use of password to access servers
    • Controlled access privileges.
  4. Write the following acronyms in full. (2mks)
    • WIFI - wireless fidelity
    • HDMI - High Definition Multimedia Interface.
  5.                  
    1. List two reasons why USB interface has become popular than other types . (2mks)
      • Flexibility
      • Compatibility
      • Can connect more than
    2. Give three disadvantages of using serial file organization. (3mks)
      • Cumbersome to search for specific record
      • Wastage of space
      • Does not support modern high speed requirements.
  6. Name three common types of malicious programs that are harmful to computers. (3mks)
    • Virus
    • Worm
    • Back doors
    • Trojan horse
  7.  Define the term dead lock as used in operating systems. (1mk)
    • A situation where a particular job holds a requested resource and refuses to release it yet it is requesting for another resource.
  8. Give any three categories of functions that are available in ms-excel. (3mks)
    • Mathematical functions
    • Logical
    • Statistical
    • Date & time
  9. Differentiate between count and count if functions as used in ms-excel. (2mks)
    • Count - Counts cells with values
    • Count if - conditionally counts cells with values.
  10. Explain why liquid based and powder based fire extinguisher are discouraged in a computer laboratory. (2mks)
    • Liquid - cause corrosion
    • short circuit
    • Powder - clogging of computer movable parts
  11. Explain the following terms as used in computer crimes.
    • Piracy - illegal copying
    • Industrial espionage - spying on a competitor
  12. List three advantages of using fibre optic cables in networking. (3mks)
    • Immunize to EMI and eaves dropping
    • Fast
    • Supports high bandwidth
    • Suitable backbone because they do not suffer from low attenuation
    • Suitable for use in highly flammable systems.
    • Smaller and lighter than copper.
  13. Explain any two database models. (4mks)
    • Relational - records are stored in tables
    • Hierarchical - single path used to access records
    • Network model - several links used to access one record.
  14.                  
    1. Give three ways in which ICT can be used to conserve forests. (3mks)
      • Surveillance
      • Research
      • Creating awareness.
    2. Give three factors to consider when selecting ICT related careers. (3mks)
      • Cost of training
      • Location of the institution
      • Physical look and management of the college
      • Whether it offers ICT courses recognized
      • Certification both locally or internationally.
    3. List four sub categories of system software. (4mks)
      • Operating system
      • Firmware
      • Utility ware
      • Networking software
  15.              
    1. List two examples of (2mks)
      1. Third generation languages
        • FORTRAN
        • COBOL
        • Basic
        • C
        • Ada
      2. Object oriented programming languages. (2mks)
        • C++
        • Java
        • Small talk
    2. Differentiate between source code and object code. (2mks)
      • Source code - a program which has not been translated that is in program editor window.
      • Object code is a program that has been translated.
    3. Draw a flow chart that will take two numeric values X and Y . compare the two numbers to give the following output:
      • If X is more than Y, the program should compute the difference of the two numbers.
      • If X is less than Y, the program should compute the sum of the two numbers.
      • If X is equal to Y, the program should compute the product of the two numbers. (7mks)
        comp ssfsf
    4. List two repetitive control structures. (2mks)
      • For….do loop
      • While …do
      • Repeat….until
  16.                  
    1. Differentiate between the following as used in data communication.
      1. Base band and broadband
        • Baseband - signal generate and fed into the transmission medium directly without modulation.
        • Broadband - signal is sent over the transmission medium using a particular frequency.
      2. Multiplexing and demultiplexing
        • Multiplexing - processing of sending multiple data signals through the same medium.
        • Demultiplexing - is the process of splitting multiplexed signal back into multiple channels.
    2. ABC company intends to start their operations across all the East African countries.
      1. Recommend to them the most ideal computer network that they should use. (1mk)
        • Wide area network
      2. List three challenges the company is likely to encounter while using the network. (3mks)
        • Compute crimes - hacking, sabotaging etc.
        • Over reliance of nilco
        • Expenses due to the new running and installation costs.
        • Some employees will require to be trained.
      3. With an example, state three networking elements that the company will need for them to implement the network. (6mks)
        • Data communication media e.g bound, unbound media
        • Communication devices e.g data ternal equipment I.e computer, mobile phones etc.
        • Data circuit terminating equipment I.e modems, switches and routers.
        • Network software e.g network operating system protocols
    3. Give one advantage of using unbound media for networking. (1mk)
      • Flexibility
      • Covers a wide physical location
      • Cheap
  17. Study the worksheet below and answer the questions that follow.

    1

    A

    B

    C

    D

    E

    F

    2

    SKY WAYS AGENCIES

    3

    Product

    Region 1

    Region 2

    Regions 3

    Region 4

    TOTAL

    4

    Rexona

    3400

    3700

    4000

    4100

     

    5

    Lifeboy

    2500

    2600

    2100

    2500

     

    6

    Omo

    6000

    6100

    6300

    1600

     

    7

    Ushindi

    1200

    1500

    1400

    6400

     

    8

    Carmel

    7000

    6900

    7200

    8000

     

    9

    Total

             

    10

    Maximum

             

    11

    Average

             
    1. Write functions that can be entered to get total, maximum and average of each region. (3mks)
      • Total = Sum(B4:B8)
      • Maximum = Max(B4:B8)
      • Average = Average(B4:B8)
    2. Write down the function that returns the number of sales in the four regions whose value is greater than or equal to 2000. (2mks)
      • = Sum IF(B4: E4, ">2000")
    3. The prices for region 4 were reduced with n% value which was placed in cell C1. Write a formulae to calculate the new price of product Rexona and applied to other product in the same region. (3mks)
      • =E4 - (E4 * & C & 13)
    4. Differentiate between stroke and fill as used in DTP. (2mks)
      • Stroke - outline
      • Fill - shading
    5. Define the term text wrap . (1mk)
      • Refers to moving text around the object.
    6. Give four ways you can wrap text on an object. (4mks)
      • Infront
      • Back /behind
      • Tight
      • Square
      • Through
  18. State three ways in which a signed binary number.
    1. Can be represented (3mks)
      • Prefixing a sign bit
      • Using ones complement
      • Using twos complement.
    2. Convert the following numbers into binary form
      1. 24710 (2mks)
        18 adaae 1
        24710 = 10111111112
      2. 9AC16 (2mks)
        9 A C
        1001 1010 1100
        9 A C16 = 1001101011002
    3. Using twos complements compute 2710 - 1310 and leave your answer in binary form
      (use 8 bits) (3mks)
      c adadada
    4. Differentiate between logical and physical files. (2mks)
      • Logical the file is viewed in terms of data items it contain and details of processing operations that can be performed on the data items while physical file is one that is viewed in terms of actual data stored on storage media.
    5. Explain three parameters that can be used to measure data integrity. (3mks)
      • Accuracy - how close an approximation is to the actual value.
      • Timeliness - relative accuracy of data in respect to the current state for which it is needed.
      • Relevance - the data entered must be relevant to the processing needs and expectations.
  19.                
    1.              
      1. State the importance of information (fact finding) in system development. (1mk)
        • So as to understand the problem and finding out any constraints that may limit the solution.
      2. State any two advantages and two disadvantages of using interview method when used for information gathering. (4mks)
        Advantages
        • You can seek for clarification in case the response is not clear.
        • You can read non-verbal question.
        • You can cover much more than what you had initially planned.
        • The interviewee can offer solutions to the current problem.
          Disadvantages
        • It is expensive
        • Time consuming
        • Some respondents may not be free to open up.
    2. Explain three system development theories and methods. (6mks)
      1. Traditional approach.
        • This approach relies on the skills and experience of individual staff members. There is no formal documented methodology to be followed.
      2. Rapid application development.(RAD)
        • This in a highly interactive approach that uses prototyping and active user involvement.
      3. Structured system development
        • This follows sequential stages I.e waterfall, IV-model, spiral and interative model
    3. Your school wishes to replace the original system with an information system.
      1. With a reason , advice the school on the best change over strategy to implement. (2mks)
        • Parallel - safe and secure
        • Phased - safe and secure
        • Direct changeover - saves time and resources.
      2. Give two challenges the school may encounter while implementing the new system.(2mks)
        • Loss of data
        • High cost of operations and implementation.

Download Computer Studies Paper 1 Questions and Answers - Mincks Group of Schools Mock Examinations 2022.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Join our whatsapp group for latest updates
Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?