Computer Studies Paper 1 Pre Mock Questions and Answers - Mokasa I Joint Examination July 2021

Share via Whatsapp

Instruction to candidates

  1. Write your name and index number in the space provided above.
  2. Sign and write the date of examination in the spaces provided above.
  3. This paper consists of two sections A and B.
  4. Answer all the questions in section A.
  5. nswer question 16 and any other three questions from section B.
  6. All answers should be written in the space provided in the question paper.
  7. This paper consists of 14 printed pages.
  8. Do not remove and pages from this booklet.
  9. Candidates should check the question paper to ascertain that all the pages are printed as indicated and that no questions are missing.
  10. Candidates should answer the questions in English.

For Examiner’s Use Only

Section

Question Number

Candidate’s Score

A

1-15

 

 

 

B

16

 

17

 

18

 

19

 

20

 

                                 Total Score

 



QUESTIONS

SECTION A (40 MARKS)
ANSWER ALL QUESTIONS IN THIS SECTION

  1. Name the two common types of system units and differentiate them. (2 marks)
  2. Define the following characteristics of a computer system. (2 marks)
    1. Versatile
    2. Reliable
  3. Digital computers work with digital content. Describe a digital device. (2 marks)
  4. Differentiate between third and fourth generation computers (2 marks)
  5.                              
    1. Mamboleo company is in the process of computerizing its services. List four measures that should be put into consideration to protect the users in their computerized areas. (2 marks)
    2. Give two reasons why powder and liquid extinguishers are not recommended unlike gaseous extinguishers. (2 marks)
  6. Without proper marketing, a business cannot survive in a competitive environment hence computers are being used in a number of ways to enhance marketing. List any three ways of ensuring this is effected. (3 marks)
  7. Differentiate between the following as used in computers. (3 marks)
    1. Tab Key
    2. Spacebar
    3. Clicking
  8. Control unit is an essential component of the CPU. Describe the functions of the control unit. (2 marks)
  9.                    
    1. Differentiate between buffers and Registers (2 marks)
    2. Speech recognition devices are used to capture natural sound and convert the input into digital form. State two problems related to speech recognition devices. (2 marks)
  10. Define Solid-state storage and give two examples. (2 marks)
  11.                            
    1. Explain how a pixel affects the resolution of a monitor. (1 mark)
    2. List two types of computer output on microform (COM). (2 marks)
  12. Differentiate between high definition multimedia interface and Firewire interface. (2 marks)
  13. A warranty is an agreement between the buyer and the seller. It spells out terms and conditions after selling a product in case of failure or malfunction. Describe any three basic requirements a good warranty should cover. (3 marks)
  14.                                  
    1. Differentiate between pasteboard and master page as used in DTP (2 marks)
    2. Differentiate between graphic-based and layout based desktop publishing software. (2 marks)
  15. Differentiate between Network database and Relational database. (2 marks)

SECTION B (60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS IN THIS SECTION

  1.                                   
    1. Define the following terms as used in programming (2 marks)
      1. Source code
      2. Object code
    2. Differentiate between Assembler and Interpreter as used in programming. (2 marks)
    3.  Identify the type of programming language used in the codes below; (1 mark)
      1. 1101 1101                          1011 1011
        1110 0001                          1100 0111
        0010 1110                          1011 0011
      2.  LDA A, 20
        ADD A, 10
        STO B, A
        NOP
    4. On the Nairobi-Nakuru highway, the Kenya Police have put speed cameras at a certain point to read the time a vehicle passes a point (A) on the road and then reads the time it passes a second point (B) on the same road. (Points A and B are 200 meters apart). The speed of the vehicle is calculated using:
      • Speed = 100/((time at point B-time at point A)) (Km/ hr)
      • The maximum allowed speed is 100 kilometers per hour.
      • 500 vehicles were monitored using these cameras over a 1-hour period.
        1. Write a pseudo code, which: (5 marks)
          • Inputs the start time and the end time for the 500 vehicles that were monitored
          • Calculates the speed for each vehicle using the formula above.
          • Outputs the speed for each vehicle and a message if the speed exceeded 100 km/hour.
            >=100km/hr “High Speed”
            <100km/hr “Normal Speed”
        2. Draw a flow chart for the above pseudo code. (5 marks)
  2.                         '
    1. In order to generate information from data items, a set of processing activities have to be performed on the data items in a specific sequence depending on the desired result. Draw a well labeled diagram to illustrate data processing cycle. (2 marks)
    2. A data entry clerk experiences some common errors when typing. Most of the time, she finds that:
      1. After every calculation, the result is less than the expected number of digits required e.g. 345.7896543 the result is given as 345.789.
      2. Different characters are typed wrongly, for example instead of typing 12873457 she types 128734S7.
        Identify the two types of errors commonly experienced by the clerk during data processing in (i) and (ii) above respectively. (2 marks)
    3. State two ways a user can ensure data accuracy is maintained during data processing. (2 marks)
    4.                      
      1. State three advantages of a computerized filing system as used in data processing. (3 marks)
      2. State two disadvantages of a serial file organization method in computing.(2 marks)
      3. Differentiate between distributed processing and interactive processing modes; stating one application area of each. (4 marks)
  3.                            
    1. Write the following acronyms in full as used in operating systems.
      1. GUI (½ mark)
      2. WIMP (½ mark)
    2. State three factors considered when choosing an operating system for use in a computer. (3 marks)
    3. An operating system manages and organizes a computer system using the following structures:
      File, Folder and Drive. State the meaning of the underlined items respectively. (3 marks)
    4.                    
      1. Differentiate between error handling and interrupt handling as used in operating systems.(2 marks)
      2. State three reasons why most network technicians prefer using command line operating systems to configure networking equipment. (3 marks)
    5. Disk management is one important aspect in secondary storage in computer systems. Explain the following tools used by an operating system to manage disks in the computer. (3 marks)
      1. Formatting
      2. Partitioning
      3. Defragmentation
  4.                  
    1. Define the following terms as used in networking. (3marks)
      1. Network
      2. Intranet
      3. Browser
    2. The World Health Organization is global entity that deals with health issues around the world. It has computer networks linking its regional and continental offices using internet. State two importance of the internet to such organization. (2 marks)
    3. Mr. Zuma, the Principal of a school wishes his school to have an internet connection in a bid to improve its service delivery. Mention four internet connectivity requirements that must be present to enable the connection. (2 marks)
    4. Explain the following as used in e-mail:
      • Inbox (1 mark)
      • Drafts (1 mark)
    5.                  
      1. Failure of information systems is a major concern in the security of data in computing systems. State two causes of such failure. (2 marks)
      2. Explain the following computer crimes.
        • Fraud (1 mark)
        • Industrial espionage (1 mark)
      3. Excluding passwords, state two other security control measures used to guard against unauthorized access to computers in a network. (2 marks)
  5.                    
    1. Convert the 1010.0112 to decimal equivalent. ( 3 marks)
    2. Perform the following number system conversions. (3 marks)
      1. 342.258 to binary.
      2. 50310 to hexadecimal (3 marks)
    3.          
      1. Compute the binary arithmetic given below: (3 marks)
        10111 + 10001 + 101
      2. Using 8-bit notation, perform the twos complement of 2510 -1510 , leaving your answer in binary. (4 marks)


MARKING SCHEME

SECTION A (40 MARKS)
ANSWER ALL QUESTIONS IN THIS SECTION

  1. Name the two common types of system units and differentiate them. (2 marks)
    1. Tower
    2. Desktop
      Desktop -the monitor is placed on top of the system unit. The tower type the monitor rests on the table
  2. Define the following characteristics of a computer system. (2 marks)
    1. Versatile
    2. Reliable
      Versatile- Computers are flexible in that they can be used to carry out different types of activities such as typing, calculations and playing music.
      Reliable – Computers are more reliable because they do not get tired or bored in the processing repetitive activities
  3. Digital computers work with digital content. Describe a digital device. (2 marks)
    • A digital device processes electronic signals that represent either a one (“on”) or a zero (“off”)
    • A digital device is an electronic device that can receive, store, process or send digital information IN discrete formats in binary representation.
  4. Differentiate between third and fourth generation computers (2 marks)
    • Third generation computers used electronic component called Integrated circuits (ICS) which is a single component that consist of thousands of transistors etched on a semiconductor called a Silicon Chip. It emitted less heat, were smaller in size, easier to program and maintain compared to second generation computers
    • Fourth generation computers used an electronic component called microprocessor. It was designed to allow thousands of transistors embedded into a silicon chip made up very large scale integration(VLSI) giving birth to central processing unit that power microcomputer. Fourth generation computers are characterized by very low emission of heat and are small in size and easier to use and maintain
  5.                              
    1. Mamboleo company is in the process of computerizing its services. List four measures that should be put into consideration to protect the users in their computerized areas. (2 marks)
      1. Power cables should be insulated
      2. Providing standard furniture
      3. Proper ventilation
      4. Painting the wall with less reflective paints.
      5. Overcrowding should be avoided.
    2. Give two reasons why powder and liquid extinguishers are not recommended unlike gaseous extinguishers. (2 marks)
      1. Liquid –based extinguisher may cause rusting and corrosion of computer components
      2. Powder particles may increase friction, clogging and wearing of movable computer parts
  6. Without proper marketing, a business cannot survive in a competitive environment hence computers are being used in a number of ways to enhance marketing. List any three ways of ensuring this is effected. (3 marks)
    1. Electronic Commerce or e-business
    2. Electronic presentation
    3. Advertising
  7. Differentiate between the following as used in computers. (3 marks)
    1. Tab Key
    2. Spacebar
    3. Clicking
      Tab Key- It is used to move the cursor at set horizontal intervals on the same line such as 0.5inch,1.0 inch e.t.c.
      Space bar- It is used to insert spaces between characters on words when typing
      Clicking- Pressing and releasing the left mouse button once. A click often selects an Icon or Menu.
  8. Control unit is an essential component of the CPU. Describe the functions of the control unit. (2 marks)
    1. The control unit is responsible for coordinating all the activities of the C.P.U
    2. To coordinate these activities, the control unit uses a system clock that sends command signals
  9.                    
    1. Differentiate between buffers and Registers (2 marks)
      1. Buffers are special memories that are found in input/output devices. Input data are held in the input buffer while processed output is held in output buffer.
      2. A register is located inside the microprocessor hold one piece of data at a time one inside the C.P.U e.g Accumulator, Instruction Register, Address Register and storage register
    2. Speech recognition devices are used to capture natural sound and convert the input into digital form. State two problems related to speech recognition devices. (2 marks)
      • Recognition rate is slow – the number of words in English and the number of words which can be said at a given point (known as branching factor) mean that response rates are still relatively slow.
      • Limited vocabularies – most systems are still limited to words in isolation; connected speech is much harder to get right than segmented speech. A computer may not respond to a voice command that has speech related problems like accents, Inflations and varying tones.
      • Speaker variability–The speed, pitch, range, rhythm. Intonation, loudness and pronunciation of an individual can vary (especially if they a have a cold).
      • Homophones – Some words e.g. see and sea, sound the same.
      • Problems of speech context – A computer cannot understand different contexts and meanings of speech because it is ‘literal minded’.
      • Background noise –Can upset voice input without a shielded mouthpiece on the microphone.
  10. Define Solid-state storage and give two examples. (2 marks)
    • A non-volatile storage that employ integrated circuits rather than mechanical, magnetic or optical technology. They are referred to solid state because they do not have movable parts in its read/write storage mechanism.
  11.                              
    1. Explain how a pixel affects the resolution of a monitor. (1 mark)
      • A pixel is the smallest unit of a digital image or graphic that can be displayed and represented on a digital display device. The higher the number of pixel, the clearer and excellent images formed on the screen. Less pixel results to less clearer and poorer display on the screen.
    2. List two types of computer output on microform (COM). (2 marks)
      • Microfiche
      • Microfilm
  12. Differentiate between high definition multimedia interface and Firewire interface. (2 marks)
    • High definition interface is an interface used for transmitting digital audio and video data from computer to a projector, TV or audio device.
    • Firewire It is similar to USB but has a higher transmission rate hence it is suitable for streaming video from digital cameras to a computer
  13. A warranty is an agreement between the buyer and the seller. It spells out terms and conditions after selling a product in case of failure or malfunction. Describe any three basic requirements a good warranty should cover. (3 marks)
    1. Scope of cover for example 4 months, 2years
    2. Callout response and liability agreement. For how long should the supplier take to repair a fault or replace the product and if he/she delays who beams the cost.
    3. Preventive maintenance for example regulating of service at intervals.
  14.                    
    1. Differentiate between pasteboard and master page as used in DTP (2 marks)
      • Pasteboard: The background that lies behind your document. It is a convenient space to put things if you need to move text or images between pages. You can also place items on the pasteboard until you decide where to position them on the page. Any text or images that you place on the pasteboard won't be printed.
      • Master page: A page used in designing the general layout that will be replicated in all other pages in the publication.
    2. Differentiate between graphic-based and layout based desktop publishing software. (2 marks)
      • Graphic based- They are specifically developed to edit and format graphic objects such as pictures and vector drawings.
      • Layout based- Are specifically developed to create different page layout designs for text and pictures.
  15. Differentiate between Network database and Relational database. (2 marks)
    • Network – model links are used to express the relationship between different data items, forming a network of items. Access to one item can be through multiple paths and from any item. Used to express the relationship between different data items forming a network of items. Access to one item can be through multiple paths from any item
    • Relational - Data items are stored together in structures called relations. In Relational database related data items are stored together in structures (relations or tables). Relationship can be created between tables such that a record or records from one table relates to another or other records in another table.

SECTION B (60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS IN THIS SECTION

  1.                          
    1. Define the following terms as used in programming (2 marks)
      1. Source code
        The program instructions entered in the program editor window that is not yet translated into machine readable form (binary language).
      2. Object code
        The program or source code that is already translated into machine readable form (binary language).It is produced by the assembly process (the production of a source code to machine form/binary).
    2. Differentiate between Assembler and Interpreter as used in programming. (2 marks)
      • Assembler(s) – it is a program or language processor that translates assembly language into machine language that the computer can understand and execute.
      • Interpreters – It is a translator program that translates source program one instruction at a time, completely translating and executing each instruction before it goes onto the next. Interpreters seldom produce object code but temporarily produce intermediate code which is not stored in main memory.
    3. Identify the type of programming language used in the codes below; (1 mark)
      1. 1101 1101 1011 1011
        1110 0001 1100 0111
        0010 1110 1011 0011
        • Machine Language
      2. LDA A, 20
        ADD A, 10
        STO B, A
        • NOP Assembly Language
    4. On the Nairobi-Nakuru highway, the Kenya Police have put speed cameras at a certain point to read the time a vehicle passes a point (A) on the road and then reads the time it passes a second point (B) on the same road. (Points A and B are 200 meters apart). The speed of the vehicle is calculated using:
      • Speed = 100/((time at point B-time at point A)) (Km/ hr)
      • The maximum allowed speed is 100 kilometers per hour.
      • 500 vehicles were monitored using these cameras over a 1-hour period.
        1. Write a pseudo code, which: (5 marks)
          • Inputs the start time and the end time for the 500 vehicles that were monitored
          • Calculates the speed for each vehicle using the formula above.
          • Outputs the speed for each vehicle and a message if the speed exceeded 100 km/hour.
            >=100km/hr “High Speed”
            <100km/hr “Normal Speed”

            Start
                    starttime=0
                    Endtime=0
                    Speed=0
                               For Vehicles=1 To 500 Do
                                                   Input Start Time
                                                   Input Stop Time
                                                   Speed =100/(End Time-Start Time)
                                                   Print Speed
                                                   If Speed >100 Then
                                                   Print Over Speeding
                                           Else
                                                    Print Normal Speed
                                         ENDIF
                               NEXT VEHICLE
                  ENDFOR
            STOP
        2. Draw a flow chart for the above pseudo code. (5 marks)
          FLOWCHCART U JYGAUYDG
  2.                                    
    1. In order to generate information from data items, a set of processing activities have to be performed on the data items in a specific sequence depending on the desired result. Draw a well labeled diagram to illustrate data processing cycle. (2 marks)
      Q17 UTFGAYTGDA
    2. A data entry clerk experiences some common errors when typing. Most of the time, she finds that:
      1. After every calculation, the result is less than the expected number of digits required e.g. 345.7896543 the result is given as 345.789.
      2. Different characters are typed wrongly, for example instead of typing 12873457 she types 128734S7.
        Identify the two types of errors commonly experienced by the clerk during data processing in (i) and (ii) above respectively. (2 marks)
      3. Truncation error
      4. Misreading error
    3. State two ways a user can ensure data accuracy is maintained during data processing. (2 marks)
      1. Using modern data capture devices (direct data capture) such as barcode readers, optical character readers, digital cameras etc., which capture/enter data with minimum user involvement.
      2. Design user interfaces that minimizes chances of invalid data entry.
      3. Double entry checks
      4. Use of error detection and correction software when transmitting and processing data.
      5. Use of automated data verification and validation routines in the data processing system.
    4.                            
      1. State three advantages of a computerized filing system as used in data processing. (3 marks)
        1. information takes up much less space than the manual filing
        2. it is much easier to update or modify information
        3. it offers faster access and retrieval of data
        4. It enhances data integrity and reduces duplication
        5. It enhances security of data if proper care is taken to secure it.
      2. State two disadvantages of a serial file organization method in computing. (2 marks)
        • It is cumbersome to access because you have to access all proceeding records before retrieving the one being searched.
        • Wastage of space on medium in form due inter-record gaps in storage.
        • It cannot support modern high speed requirements for quick record access.
      3. Differentiate between distributed processing and interactive processing modes; stating one application area of each. (4 marks)
        • Distributed:
          • Various geographically dispersed computers are linked by communication lines and all the computers linked belong to the same organization.
          • The computers are located at various departments or business sites for the individual departments or the business site to be served individually by its own computer resources.
          • All the branches have intelligent terminals (usually micro computers) linked to a big computer at the head office. Data from the branches is sent to the master where it is processed.
        • Interactive:
          • Occurs if the computer & the terminal user can communicate with each other.
          • It allows a 2-way communication between the user & the computer.
          • As the program executes, it keeps on prompting the user to provide input or respond to prompts displayed on the screen.
          • The user makes the requests and the computer gives the responses.
          • The data is processed individually and continuously, as transactions take place and output is generated instantly according to the request made by user.
  3.                              
    1. Write the following acronyms in full as used in operating systems.
      1. GUI - Graphical User Interface (½ mark)
      2. WIMP - Windows, Icons, Menus and Pointers/ pointing devices. (½ mark)
    2. State three factors considered when choosing an operating system for use in a computer. (3 marks)
      1. The hardware configuration of the computer e.g. Memory Capacity, processor speed & hard disk capacity.
      2. The application software intended for the computer.
      3. The user friendliness
      4. The documentation available
      5. The cost of the operating system.
      6. Reliability and security provided by the operating system.
      7. The number of processors & hardware it can support.
      8. The number of users it can support.
      9. The type of computers in terms of size and make. For example some earlier Apple computers would not run Microsoft Operating System.
    3. An operating system manages and organizes a computer system using the following structures:
      File, Folder and Drive. State the meaning of the underlined items respectively. (3 marks)
      • Files
        • A file is a collection of related data given a unique name for ease of access, manipulation and storage on a backing storage.
      • Folder
        • A named storage location where files are stored.
      • A container of files.
        • Also referred to as directories – Directories originate form a special directory called the root directory or folder.
      • Drives
        • A drive is a medium that is capable of storing and reading information that is not easily removed like a disk.
    4.                    
      1. Differentiate between error handling and interrupt handling as used in operating systems.(2 marks)
        • Error handling .
          • The OS has many ways of reporting to the user of any errors that occur during program execution. It does this by monitoring the status of the computer system & performing error checks on both hardware and software.
          • When the user makes an error, the OS through the Kernel determines the cause of the error, and prints diagnostic messages on the screen suggesting appropriate routines of how the error can be corrected.
          • In case of a fatal error that cannot be corrected, the program will be suspended permanently. E.g., the user program will prematurely terminate when it encounters an illegal operation, such as, dividing a no. by 0 or if it attempts to read a data file that had not been opened.
        • Interrupt handling
          • An Interrupt is a break from the normal sequential processing of instructions in a program.
          • Each hardware device communicates to the processor using a special number called the Interrupt Request number (IRQ). Therefore, when an interrupt occurs, control is passed to the Kernel, which determines the cause of the interrupt. The processor stops executing the current program to wait for the corrective response of the user. Control is returned to the program that was interrupted once corrective action has been taken.
      2. State three reasons why most network technicians prefer using command line operating systems to configure networking equipment. (3 marks)
        • A CLI can be a lot faster and efficient than any other type of interface.
        • It is secure since the expert only knows the commands.
        • A CLI requires less memory to use in comparison to other interfaces.
        • A CLI doesn't require high graphics, hence a low-resolution monitor can be used.
        • A CLI does not require Windows to run
    5. Disk management is one important aspect in secondary storage in computer systems. Explain the following tools used by an operating system to manage disks in the computer. (3 marks)
      1. Formatting
        • Writing electronic information (tracks and sectots) on the disk so that the computer can recognise the disk as a valid storage device and data can be stored.
        • The formatting process sets up a method of assigning addresses to the different areas. It also sets up an area for keeping the list of addresses. Without formatting there would be no way to know what data is where.
      2. Partitioning
        • The act or practice of dividing the storage space of a hard disk drive into separate data areas known as partitions.
      3. Defragmentation
        • Sometimes called defragging or disk optimisation is a software-controlled operation that reduces the amount of fragmentation in file systems by moving the scattered parts of files so that they once again are contiguous (attached).
        • the OS does this by physically organising the contents of the disk to store the pieces of each file close together and contiguously (elements of memory are said to be contiguous if they are adjacent to one another and appear to be connected).
  4.                      
    1. Define the following terms as used in networking. (3marks)
      1. Network
        • A collection 2 or more computers connected together using transmission media (e.g., telephone cables, or Satellites) for the purpose of communication and sharing of resources.
      2. Intranet
        • Internal corporate network that uses the infrastructure of the Internet and the World Wide Web.
      3. Browser
        • A browser (short for web browser) is a computer program/software that accesses webpages and displays them on the computer screen. It is the basic software that is needed to find, retrieve, view and send information over the internet.
    2. The World Health Organization is global entity that deals with health issues around the world. It has computer networks linking its regional and continental offices using internet. State two importance of the internet to such organization. (2 marks)
      • Communication with other organizations, with your members, with your staff, with your supporters and donors through e-mails, messenger, web pages, mail lists, web site message boards. The Internet greatly offers rapid communication on a global scale. It even delivers an integrated multimedia entertainment that any other mass medium cannot offer.
      • Publishing your message to the world using online books, journals, press releases, workshops, conferences, lectures. Websites with conference proceedings, PDF (Portable Document Format) files of your publications, blogs, newsfeeds e.t.c. support publishing.
      • Customer support - the people you are helping through your organization. It can help them when you aren't there: email, messenger, web pages, mail lists, and web site message boards. With video-conferencing, podcasting and other great web tools, you can even have workshops and classes online.
      • Research on news, issues, papers and literature relevant to your cause. Use of search engines to find materials world-wide, mail lists e.t.c.
      • Leisure activities – e.g. online games, videos or music.
      • A place to do business and many other commercial activities. E.g. e-bay, amazon.com, e.t.c.
    3. Mr. Zuma, the Principal of a school wishes his school to have an internet connection in a bid to improve its service delivery. Mention four internet connectivity requirements that must be present to enable the connection. (2 marks)
      • Transmission/Telecommunication/Network media
      • Data Terminal Equipments - A TCP/IP enabled computer with a web browser.
      • An account with an Internet Service Provider (ISP).
      • Networking equipment such as a modem, router or switch to connect the computer transmission media.
    4. Explain the following as used in e-mail:
      • Inbox: Stores incoming mails (1 mark)
      • Drafts: Stores a saved copy of e-mails (usually composed but unsent) for later use. (1 mark)
    5.                          
      1. Failure of information systems is a major concern in the security of data in computing systems. State two causes of such failure. (2 marks)
        • Hardware failure due to improper use.
        • Unstable power supply as a result of brownout or blackout and vandalism.
        • Network breakdown
        • Natural disaster
        • Program failure/crash
      2. Explain the following computer crimes.
        • Fraud (1 mark)
          • Fraud is the use of computers to conceal information or cheat other people with the intention of gaining money or information.
        • Industrial espionage (1 mark)
          • Involves spying on a competitor to get or steal information that can be used to finish the competitor or for commercial gain. The main aim of espionage is to get ideas on how to counter by developing similar approach or sabotage.
    6. Excluding passwords, state two other security control measures used to guard against unauthorized access to computers in a network. (2 marks)
      1. Audit trails
      2. Firewalls
      3. Proxy servers
      4. Log files/security monitors
      5. Encryption
      6. User access levels/Multilevel access
      7. Biometric security
  5.                  
    1. Convert the 1010.0112 to decimal equivalent. ( 3 marks)

      23

      22

      21

      20

       

      2-1

      2-2

      2-3

      1

      0

      1

      0

      .

      0

      1

      1

      8

      0

      2

      0

       

      0.5

      0.25

      0.125

      8+0+2+0                        0+0.25+0.125                                 Ans = 10.37510
    2. Perform the following number system conversions. (3 marks)
      1. 342.258 to binary.

        3

        4

        2

        .

        2

        5

         

        011

        100

        010

         

        010

        101

         

        011 100 010

        .

        010

        101

         
        Ans = 11100010.0101012
      2. 50310 to hexadecimal (3 marks)

         

        Divide

        Result

        INT

        DEC PART *16

        Hex

        Ignore decimal parts

        503/16

        31.4375

        31

        0.4375 X16 =7

        7=7

        31/7

        1.9375

        1

        0.9375 X 16 =15

        15=F

        1/16

        0.0625

        0

        0.0625 X 16 =1

        1=1

        Ans = 1F7
    3.                
      1. Compute the binary arithmetic given below: (3 marks)
        10111 + 10001 + 101

        Carry digit ˃

        1

        1

        1

        1

        1

         
         

        1

        0

        1

        1

        1

        1

        +

         

        1

        0

        0

        0

        1

         

        1 0

        0

        0

        0

        0

        0


        Carry digit ˃

         

        1

        1

        1

        1

        1

        1,1

         

        1

        0

        0

        0

        0

        0

        0

        -

               

        1

        0

        1

         

         

        1

        1

        1

        0

        1

        1

        Ans = 111011
      2. Using 8-bit notation, perform the twos complement of 2510 -1510 , leaving your answer in binary. (4 marks)
        25 = 00011001
        15 = 00001111
        Ones complement/Bitwise NOT 15 = 11110000
        Twos complement 15 (11110000 + 1) = 11110001
        Add the binary of 25 to the twos complement of 15 i.e. 00011001 + 11110001
        OVERFLOW KJYGAUGYD
        Ans = 00001010

Download Computer Studies Paper 1 Pre Mock Questions and Answers - Mokasa I Joint Examination July 2021.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Join our whatsapp group for latest updates
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest