Computer Studies Paper 1 Kenya High Post Mock Exams 2020 - Questions and Answers

Share via Whatsapp

INSTRUCTIONS TO CANDIDATES

  • This paper consists of TWO sections A and B
  • Answer all questions in section A.
  • Answer question 16 (Compulsory) and any other THREE questions in section B.
  • All answers should be written in the spaces provided in the question paper

SECTION A (40 MARKS)
Answer all questions from this section in the spaces provided

  1. List the components of a computer system hardware. (2 Marks)
    ……………………………………………………………………………………………………………………………………………………………………………………………………………………………
  2. Describe the term key to storage systems (1 Mark)
    ……………………………………………………………………………………………………………………………………………………………………………………………………………………………
  3. One classification of software is system software
    1.   
      1. What is meant by system software (1 Mark)
        …………………………………………………………………………………………………………………………………………………………………………………..………………………………………
      2. Give one example of system software. (1 Mark)
        ……………………………………………………………………………………………………………………………………………………………..……………………….……………………………………
    2.   
      1. Name one other software classification (1 Mark)
        ……………………………………………………………………………………………………………………………………………………………………………………………………………………………
      2. Give one example of this type of software (1 Mark)
        …………………………………………………………………………………………………………………………………………………………………………………………………………………………
  4.   
    1. What do you understand by the term database management system? (DBMS)? (1 Mark)
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………….
    2. Define the following terms as used in a database. (2 Marks)
      1. Primary Key
        ………………………………………………………………………………………………………………
      2. Record
        ………………………………………………………………………………………………………………
  5. Differentiate between COMports and LPT ports (2 Marks)
    ……………………………………………………………………………………………………………………………………………………………………………………………………………………………
  6. List three factors to consider when deciding on the choice of electronic data processing method (3 Marks)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  7. Ventilation is an important practice in the computer lab because it enhances proper circulation of air.
    Outline three ways in which air is regulated in the computer room. (3 Marks)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  8. What do the following control measures against computer crime involve? (4 Marks)
    1. Audit trail
      ……………………………………………………………………………………………………………….
    2. Data encryption
      ………………………………………………………………………………………………………………..
    3. Log files
      ……………………………………………………………………………………………………………
    4. Passwords
      ……………………………………………………………………………………………………………
  9. Highlight the use of find and replace features in word processors. (2 Marks)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  10. Explain why two’s complement is preferred to one’s complement in computing. (1 mark)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  11. Computers have evolved through a number of generations. List any three characteristics of the first generation of computers. (3 marks)
    ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  12. List four formatting techniques used in Ms excel (2 Marks)
    ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
  13. List four examples of flat panel displays. (2 Marks)
    ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  14. Explain the following terms as used in the word processing. (4 Marks)
    1. Indenting
      ……………………………………………………………………………………………………………….
    2. Alignment
      ……………………………………………………………………………………………………………….
    3. Footnote
      ……………………………………………………………………………………………………………….
    4. Endnote
      ………………………………………………………………………………………………………………..
  15. Describe the role of an operating system in
    1. Memory management
      ………………………………………………………………………………………………………………..
    2. Job scheduling
      …………………………………………………………………………………………………………………
    3. Error handling
      ……………………………………………………………………………………………………………..
    4. Resource control
      ………………………………………………………………………………………………………………..

      SECTION B (60 MARKS)
  16.   
    1. State the three basic types of program control structures. (3 Marks)
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
    2. Draw a flowchart which will simulate the processing of student’s report. The simulation should be such that the user repeatedly inputs marks per subject for six subjects using a looping control structure. The computer processes the total marks and mean score of the student.
      NOTE:
      1. It is assumed that the student does six subjects
      2. The output required are: Average score and total marks
    3. Differentiate between analogue and digital data. (2 Marks)
      ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    4. Outline three advantages of using computers for data processing over other types of office and business equipment.
      ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  17.   
    1. Convert the following numbers to their decimal equivalent. (6 Marks)
      1. 11.0112
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      2. 12.158
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      3. A3.3/6
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. Outline four ways in which data integrity may be maintained. (4 Marks)
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
    3. Explain four advantages of using questionnaires as a fact finding tool. (4 Marks)
      ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    4. What is the role of a recycle bin? (1 Mark)
      ………………………………………………………………………………………………………………
  18.   
    1. Masai teacher’s college has decided to automate its library for effective services to the students. Identify four methods they are likely to use to gather information during system development. (4 Marks)
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
    2. What do the following terms mean in relation to internet? (4 Marks)
      1. Downloading
        ………………………………………………………………………………………………………………..
      2. Hyperlink
        ………………………………………………………………………………………………………………..
      3. Web browsers
        ……………………………………………………………………………………………………………….
      4. Internet service providers
        ………………………………………………………………………………………………………………
    3. Differentiate between sorting and filtering as used in electronic spreadsheet program (2 Marks)
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………....
    4. What do the following terms mean
      1. Spam mail
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      2. Disk
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      3. Onboard moderm
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    5. What does the term WIMP mean as used in computing?
      ……………………………………………………………………………………………………………………………………………………………………………………………………………………………..
  19.   
    1. Define a database model (1Mark)
      ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. List four advantages of using database systems (2marks)
      ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    3. In a database system, data integrity ensures the correctness and completeness of the data in the database. Differentiate the following types of integrity constraints:
      1. Validity integrity (1mark)
        ………………………………………………………………………………………………………………
      2. Entity integrity (1mark)
        ……………………………………………………………………………………………………………….
      3. Referential integrity (1mark)
        ………………………………………………………………………………………………………………
    4. Briefly describe the three database models (3 Marks)
      ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    5. Using diagrams describe the following three types of relationships. (3Marks)
      1. One – to – one
      2. One – to – many
      3. Many – to – many
    6. File organization refers to the arrangement of records on secondary storage. Briefly describe the following file organization methods. (3 Marks)
      1. Serial
        …………………………………………………………………………………………………………..
      2. Sequential
        ………………………………………………………………………………………………………….
      3. Random
        …………………………………………………………………………………………………………..
  20.   
    1. Your School has decided to replace its library control system. The current system was implemented ten years ago but has restricted reporting facilities and has a text – based interface. The school intends to replace the old system with a new computerized system, and is now considering both ‘parallel running ‘ and ‘direct changeover’
      1. Briefly explain the terms parallel running and direct change over as used in system implementation. (2 Marks)
        …………………………………………………………………………………………………………………………………………………………………………………………………………………………
      2. Give two disadvantages of direct changeover overparallel running (1 Marks)
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
      3. Identify two main risks of direct changeover during system implementation (2 Marks)
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      4. Mention any two advantages of running both the manual system and the computerized system simultaneously (2 Marks)
        ………………………………………………………………………………………………………………………………………………………………………………………………….…………………………..
      1. What is a website? (2 marks)
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………
      2. Name three facilities that are needed to connect to the internet. (3 Marks)
        ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
    2. State three ways students can benefit by having internet in a school (3 Marks)
      ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………


MARKING SCHEME

  1.   
    • Input – accepts in data and converts it into computer understandable form
    • Processor – manipulates data into information
    • Storage – holds data, instruction and information in the computer.
    • Output – gives the results of processing to the user
  2. These are microcomputers - based systems that take in data from the VRU (Keyboard, mouse and monitor) and store it in diskettes
  3.   
    1. System software refers to the programs that control the performance of the computer.
    2. Utility programs, O/S, compilers and interpreters
    3. Application software
    4. Word processors, spreadsheet, RBMS
  4.   
    1. DBMS – collection of data programs (software) that help one retrieve data and perform operations on it. It involves creating, modifying, deleting and adding data files and using this data to generate reports.
    2.   
      1. Primary key – an attribute of a relation that uniquely identifies all the other attributes
      2. Record – collection of related fields (data items)
  5.   
    • Com – ports are used for serial cables
    • LPT ports are used for parallel cables connection
  6.   
    • Suitability of accumulating data
    • Response time
    • Cost of initial installation and operations
    • Ease of development and subsequent maintenance
  7.   
    • Avoid overcrowding of either machines or users in the room
    • Ensuring that the room has enough ventilation points like windows
    • Installing air conditioners
  8.   
    • Audit trail – Careful study of an information system by experts to establish all weaknesses in a system that could lead to security threat.
    • Data encryption - Combination of letters and characters that deter unauthorized access
    • Log files – special files that keep a record of events on the use of computer resources
    • Password – combination of characters that deter unauthorized user from accessing data.
  9. It is used to look for specified words in a document and replacing them with alternative.
  10. There is only one way of representing a zero unlike in ones compliment
  11.   
    • Large in physical size
    • Used thermionic valves
    • Consumed a lot of power
    • Constant breakdown
    • Low memory and processing speed
    • Cost was high
  12.   
    • Change text colour
    • Change font size
    • Change font style
    • Text alignment
  13.   
    • Gas plasma
    • Electro luminiscent
    • Thin film transistors
    • Liquid crystal display
  14.   
    • Identing – move text away from the left margin
    • Alignment – placing text on page relative to right, left or centre of the page
    • Footnote – additional piece of information printed at bottom of page
    • End note – notes collected under separate heading at end of chapter in a document
  15.   
    1. Load application programs from external storage in to main memory. Also note the part of main memory in use and free
    2. Prepares jobs for continuous execution determining the first task to be done and last one.
    3. Reports errors that occur during execution
    4. Control use computer hardware by system software and application programs.

      SECTION B
  16.   
    1. Sequence
      Selection
      Iteration

    2. 1
    3. Analog is continuous in nature. While digital is discrete in form
    4.   
      • Computers are fast
      • Produce more accurate results
      • Produce neat work
      • Are more efficient
  17.   
    1.  
      1. (20x1) + (21x1) + (2-1 x 1) + (2-3 x 1)
      2. 2 + 1 + 0+0.25 + 0.125
        = 3.37510
        (1x81) + (2x80) + (1x8-1) + (5x8-2)
        8 + 2 +1/8 +5/64
        = 10 13/6410 or 10.20310
        (10x161) + (3x160) + (3x16-1)
        160 + 3 + 3/16
        = 163 3/1610
    2.   
      • Back up data
      • Control data access
      • Design interface that minimize invalid data entry
      • Use data capture service
    3.   
      • Can reach many respondents
      • Give many responses
      • Saves time
      • Minimjze biasness
    4. Contain the deleted files
  18.  
    1.  
      • Questionnaires
      • Interviews
      • Observations
      • Note taking
      • Study available documents
      • Tape recording
    2.   
      1. Process of transferring information from remote computer to local storage.
      2. Text or picture in an electronic document
      3. Applications that enable a person to access the internet.
      4. Companies that offer internet services to end users.
    3. Sort is to arrange data in a predefined order either ascending or descending. While filtering is a quick and efficient method of finding and working with a subject within a list.
    4.   
      1. A mail sent to many people indiscriminately.
      2. Flat circular plate covered in a magnetic which is able to store data on concentric tracks.
      3. Modem fixed on mother board
    5. Windows icons mouse and pointing devices
  19.   
    1. The arrangement of data in a file which determine the access method.
    2.   
      • Control of data redundancy
      • Maintain data consistency
      • Sharing of data
      • Improved date integrity
      • Economy of scale
      • Improved security
    3.   
      1. Ensure that the data fields contain the correct data type
      2. Primary key cannot have empty values.
      3. A foreign key can only have the values of the relevant primary key.
    4.   
      1. Hierarchical model – Records in the database can be related in one parent only but can have more child records.
        2
      2. Network – any record can be related with any other record.
        3
      3. Relational model – all data is logically structured within tables.
    5. One to one – for any member of A there is only one member of B and for any member in B there is one member of A.
      4
      One to many – for a single member of A, there may be multiple associations with it B but for any B member there is only one member of A associated with it.
      5
      Many to many – for member in A there may be more members of B and for any member in B there may be many members of A
      6
    6.   
      • Serial – records are placed on the disk with no particular order.
      • Sequential – records are placed on disk according to a specific field
      • Random – A hash function calculates the address of the page in which the record is to be stored based on one or more of the fields.
  20.   
    1.  
      1.   
        • Parallel running – both old and new systems run in parallel to each other
        • Direct changeover – complete replacement of the old system with the new system in one move.
        • It may be inconveniencing incase the new system fails/face problem.
        • The users may not have gained enough confidence to run the new system.
      2.    
        • Incase of system failure
        • If testing was not thoroughly done.
        • Requires training on new programs
        • Requires new hardware and software (costs)
      3.     
        • Promotes confidence as a result of same input and output
        • Training is done to enable familiarization
        • Reliable in terms of testing
    2. Collection /group of related WebPages belonging to an organization or individual
    3.   
      • Internet software
      • Telecommunication facilities
      • Modem
      • Internet service provider
      • TCP/IP protocol
    4.  
      • Exchange programs with students in other schools
      • E-learning
      • Research widely

Download Computer Studies Paper 1 Kenya High Post Mock Exams 2020 - Questions and Answers.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Join our whatsapp group for latest updates
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest