Computer Studies Paper 1 Questions and Answers - Asumbi Girls Highschool Pre-Mock Exams May-June 2022

Share via Whatsapp

INSTRUCTIONS TO CANDIDATES:

  • Write your name and index number in the spaces provided above.
  • Write the date of examination and sign in the spaces provided.
  • This paper consists of two sections.
  • Answer all the questions in section A.
  • Answer question 16 (compulsory) and any other three questions from section B.
  • All answers must be written in the spaces provided in this question paper.

FOR EXAMINER’S USE ONLY

SECTION

QUESTION

MAXIMUM SCORE

ACTUAL SCORE

A

1 – 15

40

 

 

 

B

16

15

 
 

15

 
 

15

 
 

15

 
   

TOTAL SCORE

 


QUESTIONS

SECTION A (40 MARKS)
ANSWER ALL THE QUESTIONS FROM THIS SECTION IN THE SPACES PROVIDED

  1. One of the functions of an operating system is to control computer resources. State three resources under operating system control (3 marks)
  2.                        
    1. The figure below shows the relationship between tables in a database.
      2 aygyduyadad
      Identify two primary keys and two foreign keys used in the relationships (2 marks)
    2. Distinguish between bound and unbound controls as used in database forms (2 marks)
  3. Explain why an impact printer is suitable for printing multiple copies (2 marks)
  4. State any four examples of document readers (2 marks)
  5.                              
    1. Define the term simulation (1 mark)
    2. List two educational areas where simulation programs can be used (1 mark)
  6. Explain two ways of protecting data and information against unauthorized access (2 marks)
  7. Explain two characteristics of good information (2 marks)
  8. Explain three types of errors that are likely to exist in a program (3 marks)
  9. State two roles of a network admistrator (2 marks)
  10. State three negative impacts of information communication technology on the environment (3 marks)
  11. Study the follow flowchart then answer the questions that flow.
    11 fdytad
    1. Identify the type of flowchart represented by the flowchart in figure (1 mark)
    2. Name the flowchart symbols labeled A, B,C and D in the flowchart. (2 marks)
  12. Mary a computer student noticed that every time a person enters the computer lab, the computer screen flickered. Identify three reasons why the monitor might be flickering (3marks)
  13.                    
    1. state the importance of column breaks as used in a word processor (1 mark)
    2. List any two line spacing specifications used in Ms- Word (1 mark)
  14. The first column in the table below contains the formula stored in cell C10 of a spreadsheet. Enter the formula as they would appear when copied to cell F15 of the same spreadsheet (2 marks)

    FORMULA IN C10

    FORMULA IN F15

    =A5*B5

     

     

    =4*B$6

     

     

  15.                            
    1. Differentiate between an analog and digital data signal (2 marks)
    2. The government of Kenya is in the process of laying out fibre optic cables throughout the country. State three advantages of fibre optic cables (3 marks) 

SECTION B( 60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS FROM THIS SECTION

  1.                              
    1. Draw a program flowchart that would accept and their sum. If the sum is greater than 200, it adds 30 to the sum, otherwise subtracts 20 from the sum. The program should then display the results (7 marks)
    2. Study the pseudo code below and determine its output (3 marks)
      STEP 1: T=0
      M=0
      K=1
      STEP 2 M=M+T
      T=T+5
      K=K+1
      STEP 3 REPEAT STEP 2 WHILE K<3
      WRITE M, T
      EXIT
    3.                        
      1. List two benefits of using interviews as a method of fact finding (2 marks)
      2. Explain three types of system change over strategies (3 marks)
  2.                          
    1. state three functions of a database management system (DBMS) (3 marks)
    2. if a database was to be created for a list, Tables, Forms, Queries and Reports are likely to be used. State the purpose of each of the objects (4 marks)
    3. The information below is maintained by Jessica Fruit store. Study it and answer the questions that follow:

      Product number

      Product name

      Qty in stock (kg)

      Value per unit (ksh)

      001

      Peach

      1000

      200

      002

      Oranges

      1200

      200

      003

      Mangoes

      1300

      100

      Write down the query statements you can use to list the following;
      1. Product names starting with letter P. (2 marks)
      2. Value per unit below 200. (2 marks)
    4. The following is a spreadsheet relating to a farmer (2 marks)
      d zdsddsd
      A function = IF (B2<200, “Not Viable”, IF (B2>300, “Moderate”, IF (B2>1000, “Viable”))). Give the appropriate result returned in cells C2, C3, C4 and C5
      Name four data types used in spreadsheets. (2 Marks)
  3.                          
    1. Explain the use of the following commands found in the spell check dialog box in reference to word processing (3 Marks)
      1. Change
      2. Ignore once
      3. Add
    2. State four font styles supported by Ms. Word (2marks)
    3. Work out the following binary arithmetic (2marks)
      1. 11101.0011+ 101.0112
      2. 101001.101012-110.011012
      3. Using twos complement, perform the following calculation. (4marks)
        2310 - 4110
      4. Convert 13.12510 to decimal. (2marks)
      5. A particular computer stores numbers in a single 8-bit word. How would it represent 0.312510? (2 marks)
  4.                                              
    1. Explain each of the following type of operating systems (4marks)
      1. Distributed
      2. Multi-user.
    2. List any two types of embedded operating systems used in modern cell phones (2marks)
    3. Most operating systems provide a file system. Mention any TWO file systems used in windows environment. (2 marks)
    4. Define the term interactive data processing. (1mark)
    5. Explain why input screens are better data entry designs than entering data directly a table. (2 marks)
    6. State two likely causes of data and program loss in a computer system? (2 marks)
    7. Explain the meaning of the following terms as used in data security (2marks)
      1. Fraud
      2. Alteration
  5.                      
    1. The figure below shows an extract of an e-mail application.
      20 a uygauyda
      State what is meant by the following (3 marks)
      1. Trash
      2. Spam
      3. Inbox
    2. Explain the following interactive sensory equipment used in virtual reality (2marks)
      1. Head gear
      2. Body suit
    3. Most computerized security systems make use of Biometric analysis, name three physical features of human beings that can be considered in this analysis (3marks)
    4.                      
      1. Define the term networking topology (1mark)
      2. Distinguish between logical and physical network topologies (2marks)
    5. Explain the functions of the following network devices (4marks)
      1. Network interface card (NIC)
      2. Gateway
      3. Bridge
      4. Repeater


MARKING SCHEME

SECTION A (40 MARKS)
ANSWER ALL THE QUESTIONS FROM THIS SECTION IN THE SPACES PROVIDED

  1. One of the functions of an operating system is to control computer resources. State three resources under operating system control (3 marks)

    Processor
    Input/output devices
    Application programs
    Storage devices
    Communication devices and ports

  2.                        
    1. The figure below shows the relationship between tables in a database.
      2 aygyduyadad
      Identify two primary keys and two foreign keys used in the relationships (2 marks)

      PK                                                                     FK

      AdmNo                                                           TermId

      TermCode                                                       AdmNo

    2. Distinguish between bound and unbound controls as used in database forms (2 marks)
      Bound controls are used to get data from a table or query while unbound controls do not get data from a table/query/link.
  3. Explain why an impact printer is suitable for printing multiple copies (2 marks)

    They have special hammers that produce characters on a piece of paper. And behind every paper, there is a coupon copy that produces characters on another paper.

  4. State any four examples of document readers (2 marks)

    OBR
    OMR
    OCR
    MICR

  5.                              
    1. Define the term simulation (1 mark)

      This is the process of creating a model of a real object/concept in order to experiment the behavior of a real object using a computerized model

    2. List two educational areas where simulation programs can be used (1 mark)

      Training drivers
      Training pilots
      Training engineers

  6. Explain two ways of protecting data and information against unauthorized access (2 marks)

    -Password protection –allows the user to open/ modify file/doc

    -Data encryption-only authorized user can decipher the code

    -User and group permission to user- user access levels

    -Firewalls- filters data and information exchanged between different networks

    -Security monitors-keeps tracks of activities performed using computer systems e.g. CCTV

    -Biometric security- only users whose attributes are identified can access

  7. Explain two characteristics of good information (2 marks)

    -Accuracy- should be as close to the actual value as possible

    -Timeliness- should be available when needed

    -Relevance- should be useful in order to give out the expected output

    -Completeness

  8. Explain three types of errors that are likely to exist in a program (3 marks)

    -Syntax errors- errors as a result of incorrect use of a programming language e.g. spelling, incorrect punctuation, use of reserved words etc.

    -Logical errors-errors that prevent the program from doing what it is expected to do

    -Runtime errors- results in unexpected/ premature end of a program e.g. an attempt to divide a number by zero

  9. State two roles of a network admistrator (2 marks)

    -Sets up a computer network

    -Maintain and enforce security measures on the networks

    -Monitor use of network resources

    -Maintain and troubleshoot network related problems

  10. State three negative impacts of information communication technology on the environment (3 marks)

    -The huge piles of garbage of dead computers and accessories causes pollution

    -Massive extraction of mineral resources for making computer parts

    -Energy consumption and radiation

    -Disposal of nickel-cadmium laptop batteries contain cadmium which leaks to  the underground water table

  11. Study the follow flowchart then answer the questions that flow.
    11 fdytad
    1. Identify the type of flowchart represented by the flowchart in figure (1 mark)

      System flow chart

    2. Name the flowchart symbols labeled A, B,C and D in the flowchart. (2 marks)
      1. Stored data
      2. Screen output/ display
      3. Manual input
      4. Document/report
  12. Mary a computer student noticed that every time a person enters the computer lab, the computer screen flickered. Identify three reasons why the monitor might be flickering (3marks)

    - There may be a loose connection to the computer hence flickering when touched

    -Cables maybe laid on the pathway hence flickering when stepped on.

    -Electrical interference from other electrical nearby devices

  13.                    
    1. state the importance of column breaks as used in a word processor (1 mark)

      Used to enforce an end of a column to start/ move the cursor at the beginning of the next paragraph

    2. List any two line spacing specifications used in Ms- Word (1 mark)

      -Single

      -Double

      -1.5

      -multiple

  14. The first column in the table below contains the formula stored in cell C10 of a spreadsheet. Enter the formula as they would appear when copied to cell F15 of the same spreadsheet (2 marks)

    FORMULA IN C10

    FORMULA IN F15

    =A5*B5

    =D10*E10

    =4*B$6

    =4*E$6

  15.                            
    1. Differentiate between an analog and digital data signal (2 marks)
      An analog data signal represents data that is continuous in nature while digital signal represents data that is non- continuous in nature
    2. The government of Kenya is in the process of laying out fibre optic cables throughout the country. State three advantages of fibre optic cables (3 marks) 

      -Not prone to electromagnetic interference

      -Supports a high bandwidth

      -Low attenuation thus suitable for long distance transmission

      -Smaller and lighter than copper cables

      -Do not generate electrical signals thus can be used in hazardous places

SECTION B( 60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS FROM THIS SECTION

  1.                              
    1. Draw a program flowchart that would accept and their sum. If the sum is greater than 200, it adds 30 to the sum, otherwise subtracts 20 from the sum. The program should then display the results (7 marks)
      c sssfsf
    2. Study the pseudo code below and determine its output (3 marks)
      STEP 1: T=0
      M=0
      K=1
      STEP 2 M=M+T
      T=T+5
      K=K+1
      STEP 3 REPEAT STEP 2 WHILE K<3
      WRITE M, T
      EXIT
    3.                        
      1. List two benefits of using interviews as a method of fact finding (2 marks)

        -Users can express their opinions in a detailed way

        -Non- verbal communication can be observed

        -Questions can be paraphrased for clarification

      2. Explain three types of system change over strategies (3 marks)
        -Parallel- both the old and the new systems operate together for a period of time before the old system is discarded.
        -Direct- the old system is discarded and the new one implemented immediately
        -Phased- the old system is gradually replaced in stages by the new system
        -Pilot- a section of the organization runs the new system while the rest runs the old system. 
  2.                          
    1. state three functions of a database management system (DBMS) (3 marks)

      - allows the user to add or delete records

      -update or modify existing records

      -organise data for easy access, retrieval and manipulation

      -acts as an interface between the database and other applications

      -enforce security for data in a database

      -keep statistics of data items in a database

    2. if a database was to be created for a list, Tables, Forms, Queries and Reports are likely to be used. State the purpose of each of the objects (4 marks)

      -Table- for storing data

      -Forms- data entry, editing and viewing the records

      -Queries-extracting data used on some criteria/ performing calculations

      -Reports- creating summaries for data/ performing calculations

    3. The information below is maintained by Jessica Fruit store. Study it and answer the questions that follow:

      Product number

      Product name

      Qty in stock (kg)

      Value per unit (ksh)

      001

      Peach

      1000

      200

      002

      Oranges

      1200

      200

      003

      Mangoes

      1300

      100

      Write down the query statements you can use to list the following;
      1. Product names starting with letter P. (2 marks)
        Like P* or P* in query design window
      2. Value per unit below 200. (2 marks)
        <200 in query design window.
    4. The following is a spreadsheet relating to a farmer (2 marks)
      d zdsddsd
      A function = IF (B2<200, “Not Viable”, IF (B2>300, “Moderate”, IF (B2>1000, “Viable”))). Give the appropriate result returned in cells C2, C3, C4 and C5
       1  Not viable
       2  Not viable
       3  Not viable
       4  Moderate
       5  Viable
      Name four data types used in spreadsheets. (2 Marks)

      -labels

      - Values

      - Formulae

      - Functions

  3.                          
    1. Explain the use of the following commands found in the spell check dialog box in reference to word processing (3 Marks)

      i) Change – replace a word with a spelling error with the given suggestion

      ii) Ignore once – leave a word with a spelling error without making any change

      iii) Add – used to add a new vocabulary in a list of suggestions into

    2. State four font styles supported by Ms. Word (2marks)
      • Bold
      • Bold italics
      • Italics regular
      • Underline
    3. Work out the following binary arithmetic (2marks)
      1. 11101.0011+ 101.0112

          11101.00112

        +00101.01102

         100010.10012

      2. 101001.101012-110.011012

        101001.101012

        000110.011012

        100011.010002

      3. Using twos complement, perform the following calculation. (4marks)
        2310 - 4110

        2310 - 4110

        23=000101112

        41=001010012             1s complement=110101102              

        2s complement=110101112  

        23-41=000101112+110101112=111011102

        {Decimal to binary conversions 1mark each (max 2)

        1s complement ½ mark

        2s complement ½ mark

        Addition 1 mark}

      4. Convert 13.12510 to decimal. (2marks)
        Whole number part

        2

        13

        Rem

        2

        6

        1

        2

        3

        0

        2

        1

        1

         

        0

        1

        1310=11012
        Therefore, 13.12510 = 1101.0012                     ½ mark

      5. A particular computer stores numbers in a single 8-bit word. How would it represent 0.312510? (2 marks)

        0.3125 x 2 = 0.6250 0

           0.6250 x 2    1.25               1

           025 x 2         0.50               0

           0.5 x 2          1.00                1

        = 0.01012

  4.                                              
    1. Explain each of the following type of operating systems (4marks)
      1. Distributed

        This is an operating system that manages a group of distributed computer system. Distributed computations are carried out on more than one machine.

      2. Multi-user.

        A multi-user operating system is one that allows for multiple users to use the same computer at the same time and/or different times. Examples include UNIX, Linux, MAC OS and Windows Server 2003.

    2. List any two types of embedded operating systems used in modern cell phones (2marks)

      -Android

      -Symbian

      -Windows

      -FreeBSD

      -Minix 3

    3. Most operating systems provide a file system. Mention any TWO file systems used in windows environment. (2 marks)

      FAT (file allocation table)

      FAT16

      FAT32

      NTFS (new technology file system)

    4. Define the term interactive data processing. (1mark)

      In interactive data processing there is continuous dialogue between the user and the computer. As the program executes, it keeps on prompting the user to provide input or respond to prompts displayed on the screen.

    5. Explain why input screens are better data entry designs than entering data directly a table. (2 marks)
      • Faster way of data entry
      • One record can be viewed at a time.
      • Data validation is possible
      • One is able to compute data.
    6. State two likely causes of data and program loss in a computer system? (2 marks)
      • Computer virus corrupting data and instructions
      • Uneven power supply to system components
      • Theft of data or programs
      • Disk crash
    7. Explain the meaning of the following terms as used in data security (2marks)
      1. Fraud
        use of computer to conceal information or cheat other people with the intention of gaining money or information
      2. Alteration
         the legal charging of data or information with the intention of misinforming authorized users or gaining
  5.                      
    1. The figure below shows an extract of an e-mail application.
      20 a uygauyda
      State what is meant by the following (3 marks)
      1. Trash

        Acts as a dust bin for your e-mail account where all deleted mails are stored before being permanently removed from the account

      2. Spam

        This is a folder in your account where all junk and suspicious mails received are stored

      3. Inbox

        This is a folder in your account where all genuine mails received are stored

    2. Explain the following interactive sensory equipment used in virtual reality (2marks)
      1. Head gear

        A device with tiny screens worn on the head, enable the weaver to view the virtual world.

      2. Body suit

        Worn by the user, enable the wearer to explorer the virtual world

    3. Most computerized security systems make use of Biometric analysis, name three physical features of human beings that can be considered in this analysis (3marks)
      • Finger prints
      • Voice recognition
      • Eye / facial recognition.
    4.                      
      1. Define the term networking topology (1mark)

        Refers to the arrangement of the computers, printers and other equipment connected on the network

      2. Distinguish between logical and physical network topologies (2marks)

        Logical (signal) topology deals with the way data passes from one device to the next in a network while physical topology refers to the physical arrangement (layout) of devices on the network

    5. Explain the functions of the following network devices (4marks)
      1. Network interface card (NIC)

        Creates a physical link between the computer and the transmission media

      2. Gateway

        Provides access to a wide area network

      3. Bridge
        Device that selectively determines segment where message is to be delivered
      4. Repeater

        Receives a weak signal cleans and amplifies it for transmission over the next position of the network

Join our whatsapp group for latest updates

Download Computer Studies Paper 1 Questions and Answers - Asumbi Girls Highschool Pre-Mock Exams May-June 2022.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest