Computer Studies Paper 1 Questions and Answers - Mokasa II Mock Exams 2022

Share via Whatsapp

Questions

Instructions to candidates

  • This paper consists of TWO sections; A and B
  • Answer all questions in sections A.
  • Answer question 16 and any other THREE questions from section B.

SECTION A (40MKS)
Answer all the questions in this section

  1. A computer must go through the process of booting before use. State what happens during Power On Self-Test (POST) (1mk)
  2. State two differences between a traditional mouse and a trackball (2mks)
  3. State any two circumstances where sound output devices would not be appropriate (2mks)
  4. Software can be categorized according to end user licence. Differentiate between a proprietary software and an open source software (2mks)
  5. State the function of each of the following features when creating a word processing document
    1. Word wrap (1mk)
    2. Watermark (1mk)
    3. Clipboard (1mk)
  6. Different types of cables are suitable for different applications
    Compp1q06
    1. Identify the cables in the diagram above (1mk)
    2. State one advantage of using the above cable (1mk)
  7. State any two factors to consider when selecting a computer for an organization (2mks)
  8.      
         
    Compp1q08
    1. Identify the following symbols as used in spreadsheet (3mks)
      1. ...........
      2. ..........
      3. ...........
    2. The formula D10*E12 was initially stored in in cell F10 of a spreadsheet. Write the formula as it would appear when copied to cell M20 of the same spreadsheet (1mk)
    3. Write a formula in cell E2 that can be copied to the other cells to display the positive adjusted marks for mathematics using the value in cell B6 (2 mks)
  9. The operating system is known to be very critical in the operation of a computer.
    1. State how the operating system handles errors in a computer (2 Marks)
    2. State the importance of the feedback mechanism in a system (1 mk)
    3. State one disadvantage of the feedback mechanism (1 mk)
  10. Differentiate between universal resource locator and hyperlink as used when connecting to the internet. (2 mks)
  11. A database is the best application to manage and manipulate organization data;
    1. Distinguish between a candidate key and a primary key in a database (2 mks)
    2. State any two functions of a query (2 mks)
  12. Give the function of cache memory (1mk)
  13. With aid of a flowchart, show a selection control structure. (2 mks)
  14.        
    1. An employee in a business company is charged with the responsibility of putting the company advertisement on the internet. State the profession title of the employee entitled with the task of uploading the advertisement on the internet (1mk)
    2. State any two roles of a system analyst. (2mk)
  15.    
    1. Describe how the operating system manages the computer Memory. (2mks)
    2. Elaborate the application of Artificial intelligence in Artificial neural network (2mks)

SECTION B (60mks)
Answer question 16 and any other three questions

  1.      
    1. Study the flowchart below and use it to answer questions that follow.
      1. Write a pseudocode for the flowchart below. (7 marks)
        Compp1q16ai
      2. Explain the purpose of the above flowchart. (2 mks)
      3. Determine the output from the flowchart if count is:
        1. 4 (2 mks)
        2. 12 (2 mks)
    2. Differentiate between object orientated programming and web scripting language. (2mks)
  2. Find the value of X in the question below (2mks)
    1. 16+ 1010= X2
    2. Perform the following binary operation (2mks)
      1010.11+111.10-101.11
    3. In a certain coding scheme ,each character occupies 7 bits .Letters of the alphabet are assigned consecutive codes. If letter N is represented by 1010010.Whatis the representation of letter A in this coding scheme? (2mks)
    4. Using 8 bit notation and the 2’s complement perform the following operation leaving your answer in decimal number (4mks)
      410+(-710)
    5. Differentiate between pure binary and BCD code as used in data representation (2mks)
    6. Brian a supermarket owner complains that management of daily sales is becoming overwhelming
      1. Advice Brian on a retail system that he needs to acquire (1mk)
      2. State two input devices that are used in the above stated retail system (2mks)
  3.  
    1. State and explain any two data transmission impairments (4mks)
    2. State the roles of the following devices/equipment used in networking (3mks)
      1. Brouter
      2. Data terminal equipment
      3. Repeater
  4. The diagram below shows a layout of a computer network as used in an industrial firm. A work station and a printer are located in every consultation room
    Compp1q18
    1. Identify the type of network topology depicted above (1mk)
    2. List any three disadvantages associated with the network topology identified in (a) above (3mk)
    3. An employee sneaked into the accounts office, gained access to the payroll and adjusted his salary for his personal gain.
      1. Identify two types of crimes the employee committed (2mks)
      2. Give two recommendations to the company to prevent such future occurrences (2mks)
  5.  
    1. The management of Mawingu county government opt to employ a Database administrator. State two roles of this employee. (2 mks)
    2.  
      1. Explain four circumstances that may necessitate an organization to develop a new information system. (8 marks)
      2. A school opted to use a changeover strategy where the new system and old system are run concurrently as the performances of the two systems are compared.
        1. Name the type of changeover approach above. (1 mark)
        2. Explain two benefits that the school may get as a result of this approach. (4 marks)
        3. A school evaluation system relies heavily data processing to rank students
  6.       
    1. Identify and describe the file organization applied by the evaluation system (2 Mks)
    2. State the data processing method applied by the evaluation system (1 Mk)
    3. State any two reasons for your data processing method choice in (20. b) above (2 mks)
    4. During data collection stage of data processing, data is verified and coded. Define the terms
      1. Verification (1 mk)
      2. Coding (1 mk)
    5. Jane is a copy typist at Majengo Holdings, she frequently confuses characters in hand written documents thus replacing them with different characters.
      1. State the type of data processing error Jane makes (1mk)
      2. State how she can overcome the error (1mk)
    6. Peter the technician connected and installed a scanner to the office computer but when testing he realized it was not responding to the scanning commands, state any two possible causes of the failure (2mk)
    7. Distinguish between disk compression and file compression (2 mks)
    8. The operating organizes data in a hierarchy. Give any two reasons for the hierarchical organization of data in a computer (2mks)

Marking Scheme

  1. A computer must go through the process of booting before use. State what happens during power on self-test (POST) (1mk)
    • Checks the existing drives , basic input/output devices such as keyboard, monitor and mouse
  2. State two differences between traditional mouse and trackball (2mks)
    • Trackball has a ball on top while traditional mouse has a ball underneath
    • Trackball does not need a flat surface to operate while a standard mouse needs a flat surface to operate.
  3. State any two circumstances where sound output devices would not be appropriate (2mks)
    • When in a noisy environment
    • When the output cannot be presented in audio form eg graphics
      Or any other correct response
      Circumstance @ 1 Mark
      Total = 2 * 1 Mark
      = 2 Marks
  4. Software can be categorized according to end user licence. Differentiate between proprietary and open source software (2mks)
    • Open source: the source code is freely made available to the users
    • Proprietary : Source code is hidden from the users
  5. State the function of each of the following features when creating a word processing document
    1. Word wrap (1mk)
      • Feature which automatically moves a text which does not fit in a line to the beginning of the next line
    2. Watermark (1mk)
      • Text or picture that appears behind a document Clipboard (1mk)
    3. Clipboard
      • Temporary location for storing data awaiting paste.
  6. Different types of cables are suitable for different applications
    1. Identify the cables in the diagram above (1mk)
      • Firewire
        Cable @ 1 Mark
    2. State one advantage of using the above cable (1mk)
      • To transfer power to the device through the same data transfer cable.
        Or any other correct response
        Advantage @ 1 Mark
        Total = 1 * 1 Mark
        = 1 Mark
  7. State any two factors to consider when selecting a computer for an organization (2mks)
    • Purchase price
    • Processor speed
    • Size and make
    • Warranty
  8.  
    1. Identify the following symbols as used in spreadsheet (3mks)
      • A - Borders
      • B -Find
      • C - Filter
    2. The formula D10*E12 was initially stored in in cell F10 of a spreadsheet. Write the formula as it would appear when copied to cell M20 of the same spreadsheet (1mk)
    3. Write a formula in cell E2 that can be copied to the other cells to display the positive adjusted marks for mathematics using the value in cell B6 (2 mks)
  9. The operating system is known to be very critical in the operation of a computer.
    1.            
      • The Operating system identifies errors that come about in the use of the computer system by the user, and in the execution of instructions. Once it identifies an error, it alerts the user of the errors by stating the error and possible causes, as well as a suggestion of a possible course of action to rectify the error.
        Error handling @ 2 Marks
    2. State the importance of the feedback mechanism in a system (1 mk)
      • Many unnecessary disturbances and noise signals from outside the system can be rejected.
      • The change in the performance of the system due to parameter variations is reduced.
      • The steady-state error of the system can be relatively small.
      • The transient behavior of the process can be easily manipulated.
      • The feedback is compared with the desired state in order to take corrective measures.
        Or any other correct response
        Importance @ 1 Mark
        Total = 1 * 1 Mark
        = 1 Mark
    3. State one disadvantage of the feedback mechanism (1 mk)
      • The system is complicated by the increased number of components, such as sensors and error detectors.
      • The overall gain of the system is reduced and must be compensated for in the design.
      • The system may not be stable (it may oscillate or depart greatly from the desired output), even though the comparable open-loop system is stable.
      • The error detector is necessary in order to compare two states.
        If there is a change in an Output, it will affect the system input.
        Or any other correct response
        Disadvantage @ 1 Mark
        Total = 1 * 1 Mark = 1 Mark
  10. Differentiate between universal resource locator and hyperlink as used when connecting to the internet. (2 mks)
    • url is a web address used to access a website while an Hyperlink is a text or picture on an electronic document which when clicked cause another webpage to open.
  11. A database is the best application to manage and manipulate organization data;
    1. Distinguish between a candidate key and a primary key in a database (2 mks)
      • A primary key is a unique field within a record that uniquely identifies it and is used for searching while A Candidate key is a column in a table that has all the characteristics of a primary key but it is not used as a primary key.
        Difference @ 2 Marks
    2. State any two functions of a query (2 mks)
      • A query can give you an answer to a simple question,
      • A query can be used to perform calculations in a database,
      • A query can be used to combine data from different tables,
      • A query can be used to add records in a table,
      • A query can be used to change records in a table
      • A query can be used to delete data from a table in database.
        Or any other correct response
        Function @ 1 Mark
        Total = 2 * 1 Mark
        = 2 Marks
  12. Give the function of cache memory (1mk)
    • Used to improve processing speed of the processor by holding data and instructions that are frequently required by the processor
  13. With aid of a flowchart, show a selection control structure. (2 marks)
  14.   
    1. An employee in a business company is charged with the responsibility of putting the company advertisement on the internet. State the profession title of the employee to carry out the above task (1mk)
      • Web administrator
    2. State two roles of a system analyst (2mk)
      • Review the current system and making recommendations on how to replace it with a more efficient one
      • Work with programmers to construct and test the system
      • Coordinate the training of users of the new system
  15.  
    1. Describe Memory management in relation to Operating system (2mks)
      • RAM is a scarce resource, Operating system determines which task remains in the main memory awaiting for execution and which one will be kicked out back to the secondary memeory.
      • It organizes the main memory into blocks of sizes called page frames .The processes are equaly divides into pieces that fit into page frames.
    2. Elaborate the application of Artificial intelligence in Artificial neural network (2mks)
      • Use of electronic device and software to emulate neurological structure of the human brain.
  16.      
    1. Study the flowchart below and use it to answer questions that follow
      1. Write a pseudocode from the flowchart. (7 marks)
        • Start
          Initialise sum=0
          Count=1
          Repeat
          If count=even, then
          Sum=Sum + count
          Else
          Count=Count+1
          End if
          Until count=20
          Print sum
          Stop
      2. Explain the purpose of this flowchart. (2 mks)
        • Used to find sum of even number in the first 20 natural numbers.
      3. Determine the output from the flowchart if count is:
        1. 4 (2 mks)
        2. 12 (2 mks)
           Count SUM 
           1
           2
           3
           4
           5
           6 11 
           7
          8 18
          9 -
          10 29
          11 -
          12 41
          13 -
    2. Differentiate between object orientated programming and web scripting language. (2mks)
      • Object-oriented languages are primarily based on the object. The objects constitute two parts: data and code. The data part contains attributes of objects, and the code part contains the functions or procedures.
      • Scripting languages are made up of scripts. These scripts are used for the automation of functions or actions. The scripts are designed for a specific runtime environment. Scripting languages include JavaScript, PHP, Python, Ruby, etc.
  17. Find the value of X in the question below (2mks)
    1. 168+10102=X2
      Step 1:
      Convert 168 to binart
       Octal
      168
      Binary 
      001
      110
      11102


      Step 2:
      Add the two binary numbers
        1010
        1110 
      110002
    2. Perform the following binary operation (2mks)
      1010.11+111.10-101.11
      • 1010.11 + 111.10 - 101.11
        1010.112
        +111.102
        10010.012
           -101.112
        1110.102
    3. In a certain coding scheme, each character occupies 7 bits. Letters of the alphabet are assigned consecutive codes. If letter N is represented by 1010010.Whatis the representation of letter a in this coding scheme? (2mks)
      • 10100102 = 8210
        Letter N is the 14th in the alphabet
        82 - 14 = 68 + 1 = 69 Since 0 is also a digit
        69 = 10001012
    4. Using 8 bit notation find the 2’s complement of the following operation (4mks)
      4+(-7)
      • Step 1: Convert the numbers into 8 bit binary.
        2       4          REM
        410 = 000001002 

        2        7          REM
        710 = 000001112

        Step 2:
        One's complement of the negative number - 710 = 11111002
        Add one to ones complement to get twos complement
        11111000
                 + 1
        11111001
        11111001
        000001002
        = 111111012

    5. Differentiate between pure binary and BCD code as used in data representation (2mks)
      • In pure binary the whole number is converted into binary while BCD code each individual digit is converted to binary represented using 4 bits
    6. Brian a supermarket owner complains that management of daily sales is becoming overwhelming
      1. Advice Brian on a retail system that he needs to acquire (1mk)
        • Point of sale system (POS)/Stock control system/EPOS
      2. State two input devices that are used in the above stated retail system (2mks)
        • Keyboard
        • Barcode scanner
        • Credit card reader
        • Mouse
        • Printer
  18.     
    1. State and explain data transmission impairments (4mks)
      • Attenuation-Loss of signal /weakening of the signal
      • Crosstalk/Noise
    2. State the roles of the following devices/equipment used in networking (3mks)
      1. Brouter
        • A device that determines the best path for data to flow and filter broadcast traffic to the local segment
      2. Network interface card
        • Provides connectivity between the PC and the networks physical medium.
        • Concentrator
  19. The diagram below shows a layout of a computer network as used in an industrial firm. A work station and a printer are located in every consultation room
    1. Identify the type of network topology depicted above (1mk)
      • Star topology
    2. List three disadvantages associated with the network topology identified in (a) above (3mk)
      • Costly because it requires one complete cable per computer
      • If the central hub fails the entire network will be down
      • Installation is time consuming because each node forms a segment of its own
    3. An employee sneaked into the accounts office, gained access to the payroll and adjusted his salary for his personal gain.
      1. Identify two types of crimes the employee committed (2mks)
        • Theft
        • Fraud
        • Sabotage
        • Alteration
        • Hacking
      2. Give two advice to the company to prevent such future occurrences (2mks)
        • Burglar proof the room
        • Use passwords
        • Biometric security
  20.    
    1. The management of Mawingu county government opt to employ a Database administrator. State two roles of this employee. (2 mks)
      • Developing database application.
      • Enforce database security measures to control access to data and information.
      • Updating the database
    2.  
      1. Explain four circumstances that may necessitate an organization to develop a new information system. (8 marks)
        • New opportunities- a chance to improve quality of internal process and service delivery in the organisation.
        • Problems- undesirable circumstance that prevent the organisation from meeting its goals.
        • Directives- new requirements imposed by the government, due to internal and external influence.
        • System failure – due to catastrophic breakdown of system.
      2. A school opted to use a changeover strategy where the new system and old system are run concurrently as the performances of the two systems are compared.
        1. Name the type of changeover approach above. (1 mark)
          • Parallel changeover
        2. Explain two benefits that the school may get as a result of this approach. (4 marks)
          • Old system is backup- incase the new system fails, the old one is available.
          • Adequate staff training – staff are given time to familiarize themselves with the new system.
          • Benchmark for performance- old system provided a benchmark for assessing the performance of the new system.
  21. A school evaluation system relies heavily data processing to rank students
    1. Identify and describe the file organization applied by the evaluation system (2 Mks)
      • Sequential file organisation
      • Sequential file organisation means that records are stored sequentially, one after the other. Records stored using sequential file organization normally are stored in ascending order or descending order, based on the value in the key field.
        File Organization @ 1 Mark
        Description @ 1 Mark
        Total = 1 Mark + 1 Mark
        = 2 Marks
    2. State the data processing method applied by the evaluation system (1 Mark)
      • Batch processing
    3. State any two reasons for your data processing method choice in (x. b) above (2 mks)
      • Batch processing is one where data is accumulated over a period of time
      • Data is processed as a group (batch) all at once.
      • There is minimal user interaction during processing
        Or any other correct response
        Reason @ 1 Mark
        Total = 2 * 1 Mark
        = 2 Marks
    4. During data collection stage of data processing, data is verified and coded. Define the terms
      1. Verification (1 mk)
        • This is the process of determining whether the collected data is correct as required for processing. If errors occurred in data collection, it is corrected at this stage.
          Definition @ 1 Mark
      2. Coding (1 mk)
        • This is the process of converting the verified data into machine-readable form so that it can be processed by the computer.
          Definition @ 1 Mark
    5. Jane is a copy typist at Majengo Holdings, she frequently confuses characters in hand written documents thus replacing them with different characters.
      1. State the type of data processing error Jane makes (1mk)
        • Misreading error
          Error @ 1 Mark
      2. State how she can overcome the error (1mk)
        • Misreading errors can be avoided by using modern data capture devices such as bar code reader, digital cameras etc which enter data with minimum user intervention.
        • Solution @ 1 Mark
    6. Peter the technician connected and installed a scanner to the office computer but when testing he realized it was not responding to the scanning commands, state any two possible causes of the failure (2mk)
      • The scanner may not be powered on
      • The scanner may not be compatible with the computer
      • Computer may not be properly configured
      • Or any other correct response
        Cause @ 1 Mark
        Total = 2 * 1 Mark
        = 2 Marks
    7. Distinguish between disk compression and file compression (2 mks)
      • Disk compression is the process creating more space on the disk by making files occupy less space on the disk while file compression is the process of using a file compression utility software to reduce the size of a fileDifference @ 2 Marks
    8. The operating organizes data in a hierarchy. Give any two reasons for the hierarchical organization of data in a computer (2mks)
      • For easier and faster management and location of files in the computer
      • It is convenient for breaking information to it’s simplest form
        Or any other correct response
        Reason @ 1 Mark
        Total = 2 * 1 Mark
        = 2 Marks
Join our whatsapp group for latest updates

Download Computer Studies Paper 1 Questions and Answers - Mokasa II Mock Exams 2022.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?