Computer Studies Paper 1 Questions and Answers - Maranda Post Mocks 2020/2021

Share via Whatsapp

SECTION A: 40 MARKS

Answer all the questions in this Section

  1. A sales man in Moyale uses Electronic mail to communicate with Head office in Nairobi. Mention three item that the Sales man must have to use this facility. (3marks)
  2. One of the functions of computers is to process and provide storage for information. Describe how doctors and nurses would benefit from the use of computers in hospitals (3marks)
  3. Distinguish between Simulation and Virtual reality (2marks)
  4. Mention three main components of an expert system (3marks)
  5.  At times computer give unexpected results when performing operations in arithmetic. Explain what might have happened if the error message 'Arithmetic Overflow' appear on the screen (2marks)
  6. Antistatic Bag, Antistatic wrist member , screw driver and pliers are tools required during basic computer setup and cabling. Briefly describe the functions of Antistatic wrest member and pliers (2marks)
  7. James wanted to purchase genuine software to be installed in his personal computer. Name three items that must accompany the software to proof that the software is genuine, original and from a trustworthy source (3marks)
  8. State the difference between Make table Query and Append query in Databases (2marks)
  9. Mention three causes of syntax error in a computer program (3marks)
  10. Tom a student from Klemo Secondary school sat for his KCSE in the year 2018 and passed well but did not join the university due to financial problems. In the year 2020 he was advised by a friend to a pursue course under the TVET program. List any three ICT related courses that Tom may apply for (3marks)
  11. Kipasi Secondary school upgraded their computer lab by installing modern computers. Mention how the school management will control theft of hardware and software from the lab (3marks)
  12. Explain the following terms as used in Desktop publishing
    1. Overflow (1mark)
    2. Master page(1mark)
  13. Mention three sources of graphic objects with reference to Word processors (3marks)
  14. Dama a secretary at Jusa Secondary caries out her daily duties using computers and suffered from wrist strain. State two ways she would reduce wrist strain (3marks)
  15. Mr. Baraka games teacher at Chianda High School wants to invite several school for the hockey tournament. He was advised to use mail merging technique to create invitation letters for the respective schools identified. State three benefits of this technique (3marks)

SECTION B: 60 MARKS
ANSWER QUESTION NUMBER 16 ANY OTHER THREE QUESTIONS FROM THIS SECTION

  1.  
    1. Mention three limitations of machine language (3marks)
    2. Describe three methods usually used by a computer programmer to test a program (3marks)
    3. Study the following pseudo and answer the questions that follow
      1. Start
      2. Set count=0
      3. If count is less than 5 do
      4. Get value 1 and value 2
      5. If value 1 > Value2 Then
      6. Maximum =Value 1
      7. Else If Value 1<Value 2 Then
      8. Maximum =Value 2
      9. Else Go to 10
      10. Display Maximum
      11. Get the count and add one
      12. Stop
    4. State the purpose of the pseudo code (2marks)
    5. Draw a flowchart equivalent to the pseudo code (7marks)
  2.  
    1. Give two reasons to justify the use of binary number system in computing (2marks)
    2. Convert
      1. 110.1012 to decimal (2marks)
      2. 1AH to Octal (2marks)
    3. Using twos compliment show how the arithmetic below could be carried out on a eight bit notation computer (+4610 )+(-2910) (3marks)
    4. Get the value of X2 in this expression below (3mark)
      X2 + 78 = 9H
    5. 11012 is a binary representation of a negative number. Workout the likely positive equivalents in base ten (3marks)
    1. Student database comprises of students details table and fee received.
      Students' Details Table
      First Name
      Middle Name
      Admission Number
      Course Code

      Fee Received table
      Date
      Amount
      ReceiptNo
      Mode of Payment
      1. State the primary key for each table (2marks)
      2. Give the most appropriate data-type for Receipt. No and Mode of payment (2marks)
      3. Suggest how the date column can be validated to accept today's and earlier dates only (1mark)
      4. Describe how a relationship between the two tables can be established (3marks)
    2. A student was typing a document using word processor.
      1. She typed the word school as SHOOL. Describe how she would correct the error (2mark)
      2. When she tries to type letter C between letter S and H, letter H was deleted which to her was wrong. Explain the cause of this problem (2marks)
    3. Mention any three formulas that be added to Ms-Word table to perform simple calculations (3marks)
  3.  
    1. List three approaches used in Rapid Application Development during system development(3marks)
    2. What is system entropy (1mark)
    3. Explain four factors to consider when designing a file during requirement specification (4marks)
    4. Briefly describe three types of change over strategies a system analyst may adopt during implementation (3marks)
    5. State the difference between Bcc and Cc as used in email and Internet (2marks)
    6. State the function of each of the following feature with regard to email
      1. Draft
      2. Trash
  4.  
    1. With reference to Operating System explain the following terms
      1. Error handling (1mark)
      2. Multitasking (1mark)
      3. Interrupt handling (1mark)
    2. Kingjames saved a document in his computer during the lesson. At the end of the lesson the teacher instructed him to delete the document, Kingjames looked for the document and was not able to locate the document. Describe three parameters that would help located the document (3marks)
    3. State three functions of a recycle bin (3marks)
    4. Give IS unit for measuring the following
      1. Memory (1mark)
      2. Processor speed (1mark)
    5. Describe four functions of electronic spreadsheet (4marks)


Marking Scheme

Q Description Marks Awarded
1.

A sales man in Moyale uses Electronic mail to communicate with Head office in Nairobi. Mention three item that the sales man must have to use this facility

  • Computer
  • Internet connectivity
  • Browser
  • Email address for sender and Receiver
Award 1 mark each max 3
2.

One of the functions of computers is to process and provide storage for information. Describe how doctors and nurse would benefit from the use of computers in hospitals.

  • Use of computer software to store diagnosis data and patient records
  • Use of laser technology to perform surgery
  • Telemedicine services for patients acts as a reminder
  • Communication using sms, emails, tweeter, WhatsApp
  • Ultrasound and MRI services are supported by computer platform

Note that full marks will be awarded when the candidate includes the technology without technology award zero

Award 1 mark each max 3 
3. Distinguish between Simulation and Virtual reality
Simulation is the science of representing the behavior of a real life situation by using computerized model while Virtual reality refer to a condition in which a person becomes psychologically immersed in an artificial environment generated by a computer
Award 1 mark each max 3
4. 

Mention three main components of an expert system

  • Knowledgebase
  • User interface
  • Inference engine
Award 1 mark each max 3
5. At times computer give unexpected results when performing operations in arithmetic Explain what might have happened if the error message "Arithmetic Overflow appear on the screen .
  • It is a type of computational error that occur when the results from a calculation is too large to be stored in the allocated memory space
Award 2marks max 3
6. Antistatic Bag, Antistatic wrist member, screw driver and pliers are tools required during basic computer setup and cabling. Briefly describe the functions of Antistatic wrest member and pliers
  • Antistatic wrest member is used to discharge static electricity
  • Pliers is used for holding objects firmly
Award 1mark each max 2
7. James wanted to purchase genuine software to be installed in his personal computer. Name three items that must accompany the software to proof that the software is genuine, original and from a trustworthy source
  • Certificate of authenticity
  • Software License
  • Genuine Installation key
Award 1mark each max 3
8. State the difference between Make table Query and Append query in Databases.
  • Make table query creates a new table from a dynaset while Append
    query adds data in a table from one or more table
Award 2marks max 2
9. Mention three causes of syntax errors in a computer program
  • Grammatical error.
  • Punctuations
  • Misspelling of reserve words and variable
  • Improper naming 
Award 1mark each max 3
10. Tom a student from Klemo Secondary school sat for his KCSE in the year 2018 and passed well but did not join the university due to financial problems. In the year 2020 he was advised by a friend to a pursue course under the TVET program. List any three ICT-related courses that Tom may apply for
  • Diploma in Computer studies
  • Diploma in ICT
  • Certificate in ICT
Award 1mark each max 3
11. Kipasi Secondary school upgraded their computer lab by installing modern computers. Mention how the school management will control theft of hardware and software from the lab
  • Employee-security officers
  • Install CCTV camera
  • Set alarming systems
  • Use swipe cards
  • Biometric systems
Award 1mark each max 3
12. Explain the following terms as used in Desktop publishing .
  • Overflow is a situation where the line of text place in a textbox cannot be accommodated in the textbox
  • Master page contain text and graphic elements that will appear on all pages of a publication
Award 1mark each max 2
13. Mention three sources of graphic objects with reference to Word processors
  • Microsoft clip gallery
  • Scanner camera
  • Import from another file.
  • Drawing using drawing tools available in M/s word.
Award 1 mark each max 3
14. Dama a secretary at Jusa Secondary carries out her daily duties using computer and-suffered-from-wrist-strain-State-two-ways-she-would-reduce wrist pair
  • Taking regular breaks
  • Use ergonomic keyboard
  • Use standard furniture
Award 1 mark each max 3
15. Mr. Baraka games teacher at Chianda High school wants to invites several schools for Hockey tournament. He was advised to use mail merging technique to create invitation letters for the respective schools identified. State three benefits of this technique
  • Produce uniform format for all the letter.
  • Save time Only one letter needs to be created, as the rest are automatically generated
  • Pass accurate inform to all the recipients.
  • The standard letter/template can be saved and reused.
Award 1 mark each max 3

16. 

     
  1. Mention three limitations of machine language
    • Machine dependent
    • Difficult and cumbersome to use and leam/Not user-friendly.
    • Require highly trained expert to develop and maintain the programs
    • Difficult to debug programs.
  2. Describe three methods usually used by a computer programmer to test a program
    • Desk checking involves going through the program while on paper before entering it in the program editor window.
    • Using debugging facilities these are utilities provided by the programming language that assist programmers in detecting syntax errors .
    • Use test data this involves carrying out a trial run on the new program using a set of test data to check whether the system will give out the desired output when fed with the correct data
  3. Study the following pseudo and answer the questions that follow
    1. Start
    2. Set count=0
    3. If count is less than 5 do
    4. Get value 1 and value 2
    5. If value 1 > Value2 Then
    6. Maximum =Value 1
    7. Else If Value 1<Value 2 Then
    8. Maximum =Value 2
    9. Else Go to 10
    10. Display Maximum
    11. Get the count and add one
    12. Stop
  4. State the purpose of the pseudo code .
    • The pseudo code will prompt the user to enter value 1 and 2 then compare the two values and print the maximum value or the largest .
    • This activity will be repeated provide the value of Count is less than 5
  5. Draw a flowchart equivalent to the pseudo code

          Pseudo chart

Award 1 mark each max 3

Award 2marks max 3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 
 
17.
  1. Give two reasons to just the use of binary number system in computing
    • Complexity of the natural language.
    • Binary system can represent all forms of data
    • Devices that use binary system are reliable.
    • Binary system based devices are energy efficient and small in size
  2. Convert
    1. 110.1012 to decimal
      (22x 1)+(21x 1)+(20× 0)
      4+2+0 = 6
      0.101 = (0.5+0+0.125) +6 = 6.87510
    2. 1AH to Octal
      1 = 0001    A=1010
      00     011         010
      0        3               2
             =328
  3. Using twos compliment show how the arithmetic below could be carried out on a eight bit notation computer
    (+4610)+(−2910)
             46 = 101110
             29 = 11101
                      00011101
                      11100010+1
    11100011+00101110 =100010001
  4. Get the value of X2 in this expression below
    X2+78=9H
    X2 = 1001-0111
    X2=00102
  5. 11012 is a binary representation of a negative number. Workout the likely positive equivalents in base ten
    First Assumption is prefixing a sign bit to the number therefore the last digit is a sign bit
    The number is 101= 4+1
                                     5
    The second assumption is the number 1101 is a one complement of a positive number therefore recomplement
        1101 = 0010
                        2
    The third assumption is the number 1101 is a two complement of a positive number therefore subtract one then recomplement
    1101-1 = 1100
                   11 = 3                

Award 1mark each max 2

 

M1 1mark A 1mark

 

M1 1mark A 1mark

 

M1 1mark
M2 1mark  A 1mark

 

 

M1 1mark
M2 1mark A 1mark

 

Award 1mark each max 3

 

 

 

 

 
 18.
  1. Student database comprises of students details table and fee received
    Students' Details Table
    First Name
    Middle Name
    Admission Number
    Course Code
    Fee Received table
    Date
    Amount
    ReceiptNo
    Mode of Payment
    1. State the primary key for each table
      • Admission Number
      • Receipt Number
    2. Give the most appropriate data type for Receipt No and Mode of payment
      • ReceiptNo - Text
      • Mode of payment - Lookup wizard/Text
    3. Suggest how the date column can be validated to accept today's and earlier dates only
      • ←Date ()
    4. Describe how a relationship between the two tables can be established
      • The relationship can be established by link Admission number and receipt No.
      • The relationship created will be one to One relationship.
      • Therefore one student is entitled to one receipt number
  2. A student was typing a document using word processor.
    1. She typed the word school as SHOOL. Describe how she would correct the error
      • Using spelling and grammar checkers
      • By creating the insertion point between S and then type letter C
    2. When she tries to type letter C between letter S and H, letter H was deleted which to her was wrong Explain the cause of this problem
      • The type mode is set to type over-mode therefore it will automatically
        replace the existing text by deleting them
  3. Mention any three formulas that be added to Ms-Word table to perform simple calculations
    • Average
    • Sum
    • Count
    • Product

 

 

 

 

 

 

Award 1mark each max 2

Award 1mark each max 2

Award 1mark each max 1

Award 1mark each max 1

 

 19
  1. List three approaches used in Rapid Application Development during system development
    • Prototyping
    • JAD
    • SWAT
  2. What is system entropy.
    • Refer to how the system become useless over time with reference to
      functionality
  3. Explain-four factors to consider when designing a file during requirement specification
    • Key attribute
    • Types of data
    • Field length
    • Back up and recovery
  4. Briefly describe three types of change over strategies a system analyst may adopt during implementation;
    • Direct changeover
    • Parallel
    • Phase
    • Pilot
 
     
     

 


Download Computer Studies Paper 1 Questions and Answers - Maranda Post Mocks 2020/2021.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Join our whatsapp group for latest updates
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest