Computer Studies Paper 1 Questions and Answers - Cekenas Pre Mocks 2022

Share via Whatsapp

Instructions to candidates:

  1. Write your name, admission number and name of your school in the spaces provided.
  2. This paper consist of TWO sections, A and B.
  3. Answer ALL the questions in section A.
  4. Answer question 16 and any other THREE questions from section B.
  5. All answers should be written in the spaces provided on the question paper.
  6.  This paper consists of 12 printed pages.
  7. Candidates should check the question paper to ascertain that all the pages are printed as indicated and no questions are missing.
  8. Candidates should answer the questions in English.

Section

Question

Maximum Score

Candidate’s Score

A

1 – 15

40

 

B

16

15

 

17

15

 

18

15

 

19

15

 

20

15

 

Total Score

 


QUESTIONS

SECTION A (40 marks)

  1. Speech recognition devices are used to capture natural sound and convert the input into digital form. State two problems related to speech recognition devices. (2 marks)
  2. One classification of software is system software
    1.                      
      1. What is meant by system software (1 mark)
      2. Give one example of system software. (1 mark)
    2.                    
      1. Name one other software classification (1 mark)
      2. Give one example of this type of software (1 mark)
  3. Last year 2020 when corona virus was declared a pandemic internationally most companies allowed employees to telework or work at home and communicate with the office using the Internet. List the hardware, software and services required to access and use the Internet. (3 marks)
  4. Suggest any three reasons why reservation systems are not yet fully implemented by bus operating companies in Kenya (3 marks)
  5. Name the three constituent parts of a computer file. (3 marks)
  6. State two reasons for system reboot. (2 marks)
  7. Differentiate between Batch processing and real time processing modes. (2 marks)
  8. Outline three ways computers can be used to enhance marketing. (3 marks)
  9. Most computerized security systems make use of biometric analysis. Name three physical features of human beings that can be considered in this analysis. (3 marks)
  10. Differentiate between high definition multimedia interface and Firewire interface. (2 marks)
  11. Give two reasons why powder and liquid extinguishers are not recommended unlike gaseous extinguishers. (2 marks)
  12. Differentiate between Bcc and cc in an email. (2 marks)
  13. Since the invention of the first generation of digital computers, much advancement has been realized in the sector of information and technology. Explain two characteristics which have been improved from the first generation to the modern computers. (2 marks)
  14. Give three reasons why a mobile phone is regarded to as a computer. (3 marks)
  15. The following is an excel worksheet showing the performance of students in Tana class.

    A

    B

    Adm

    C

    Student name

    D Cat1/50

    E Cat2/50

    F

    Total /40

    G

    Exam / 60

    H

    Total

    1 4321 DollineMbesa 30 28 (a) 45 (b)
    2 4333 SelinaMbugua 20 29   55  
    3 4330 Winnie Wanjema 25 26   50  
    4 4322 MagaretWambari 27 24   43  
    5 4324 FaniNjuguna 28 24   42  
    6   Maximum (c)        
    7   Minimum          
    8   Average (d)        
    9              
    Using the above worksheet write the formula to calculate the values in cells labeled. (4 marks) 

SECTION B
Answer question 16 (compulsory) and any other three questions from this section

  1.                        
    1. State and describe two types of error that can occur in programming (2 marks)
    2. Differentiate between compiler and interpreter as used in programming. (2 marks)
    3. Name the two major developments during the second generation programming languages (2 marks)
    4. Study the pseudocode below and answer the questions that follow.
      Start
      N=0
      X=0
      While n < 3
      Repeat
      X = X + 1
      Until x < 2
      N = N +1
      End while
      Print N, X
      Stop
      1. What will be the output from the program (2 marks)
      2. Draw a flowchart that was used to come up with the following pseud code (7 marks)
  2.                        
    1. List three advantages of wireless technology (3 marks)
    2. The computer is to be networked, name one extra device that should be fitted on every computer to enable this to happen (1mark)
    3. Data transmission via the internet is done using a mode known as packet switching. Describe this data transmission mode. (2 marks)
    4. The diagram below shows four common network topologies A, B, C and D.
      d sfsfsfs
      1. Name the network topologies A, B, C and D (4 marks)
        A
        B
        C
        D
      2. Explain what happens if server X in topology A fails (1 mark)
      3. List two advantages with network topology B (2 marks)
      4. List two disadvantages associated with network topology D (2 marks)
  3.                        
    1. In order to generate information from data items, a set of processing activities have to be performed on the data items in a specific sequence depending on the desired result. Draw a well labeled diagram to illustrate data processing cycle. (2 marks)
    2. A data entry clerk experiences some common errors when typing. Most of the time, she finds that:
      1. After every calculation, the result is less than the expected number of digits required e.g. 345.7896543 the result is given as 345.789.
      2. Different characters are typed wrongly, for example instead of typing 12873457 she types 128734S7.
        Identify the two types of errors commonly experienced by the clerk during data processing in (i) and (ii) above respectively. (2 marks)
    3. Briefly describe any three electronic data processing modes: (6 marks)
    4. State three ways a user can ensure data accuracy is maintained during data processing (3 marks)
    5. State two advantages of a computerized filing system as used in data processing. (2 marks)
  4.                            
    1. Define a database model (1 mark)
    2. List two advantages of using database systems (2 marks)
    3. In a database system, data integrity ensures the correctness and completeness of the data in the database. Differentiate the following types of integrity constraints:
      1. Validity integrity (1 mark)
      2. Entity integrity (1 mark)
      3. Referential integrity (1 mark)
    4. Briefly describe the three database models (3 marks)
    5. Using diagrams describe the following three types of relationships. (3 marks)
      1. One – to – one
      2. One – to – many
      3. Many – to – many
    6. Explain any three features of database. (3 marks)
  5.                    
    1. State three standard coding scheme used computing and electronic systems. (3 marks)
    2. Convert each of the following numbers
      1. 101.0012 to decimal. (3 marks)
      2. 5E6H to octal. (3 marks)
      3. Add 110.012 to 11001.01012 (2 marks)
    3. Using two’s compliment perform the following arithmetic leaving your answer in binary form. (4 marks)
      1310 - 1010


MARKING SCHEME

  1. Speech recognition devices are used to capture natural sound and convert the input into digital form. State two problems related to speech recognition devices. (2 marks)
    1. Recognition rate is slow – the number of words in English and the number of words which can be said at a given point (known as branching factor) mean that response rates are still relatively slow.
    2. Limited vocabularies – most systems are still limited to words in isolation; connected speech is much harder to get right than segmented speech. A computer may not respond to a voice command that has speech related problems like accents, Inflations and varying tones.
    3. Speaker variability–The speed, pitch, range, rhythm. Intonation, loudness and pronunciation of an individual can vary (especially if they a have a cold).
    4. Homophones – Some words e.g. see and sea, sound the same.
    5. Problems of speech context – A computer cannot understand different contexts and meanings of speech because it is ‘literal minded’.
    6. Background noise –Can upset voice input without a shielded mouthpiece on the microphone.
  2. One classification of software is system software
    1.                              
      1. What is meant by system software (1 mark)
        • System software refers to the programs that control the performance of the computer.
      2. Give one example of system software. (1 mark)
        • Utility programs, O/S, compilers and interpreters
    2.                                    
      1. Name one other software classification (1 mark)
        • Application software
      2. Give one example of this type of software (1 mark)
        • Word processors, spreadsheet, DBMS, DTP
  3. Last year 2020 when corona virus was declared a pandemic internationally most companies allowed employees to telework or work at home and communicate with the office using the Internet. List the hardware, software and services required to access and use the Internet. (3 marks)
    • Data terminal
    • Transmission media
    • Internet service providers
    • Internet s/w
  4. Suggest any three reasons why reservation systems are not yet fully implemented by bus operating companies in Kenya (3 marks)
    • Computer illiteracy among customers
    • Lack of trust in online transactions
    • Lack of fast communication network
    • Low penetration of communication infrastructure
    • High initial cost of hardware and software required for systems
    • Lack of skilled programmes to develop the systems locally
  5. Name the three constituent parts of a computer file. (3 marks)
    • Character
    • Record
    • File
  6. State two reasons for system reboot. (2 marks)
    1. Recover from a problem such as system hung, grub
    2. So that the computer can handle maintenance services such as backing up and restoring data
    3. Due to power outage
    4. Add or remove hardware
    5. Customize CMOS settings or Change Kernel parameters
    6. Repair system configuration files
    7. Allow auto update files to run
  7. Differentiate between Batch processing and real time processing modes. (2 marks)
    • Batch processing is where data is first collected and data collected is processed/at once
    • Real-time —data is processed so quickly such that the results (output) produced are able to influence, control, or affect the outcome of the activity currently taking place
  8. Outline three ways computers can be used to enhance marketing. (3 marks)
    1. E-commerce
    2. Electronic presentation
    3. Advertising
  9. Most computerized security systems make use of biometric analysis. Name three physical features of human beings that can be considered in this analysis. (3 marks)
    • Eyes pattern
    • Finger prints
    • Voice
    • Computer technology advances so rapidly that the life of computer is just a few years.
    • The increasing turnover rate of computer equipment results in a rapidly growing waste stream that is hazardous to our environment
  10. Differentiate between high definition multimedia interface and Firewire interface. (2 marks)
    • High definition interface is an interface used for transmitting digital audio and video data from computer to a projector, TV or audio device. Firewire It is similar to USB but has a higher transmission rate hence it is suitable for streaming video from digital cameras to a computer
  11. Give two reasons why powder and liquid extinguishers are not recommended unlike gaseous extinguishers. (2 marks)
    1. Liquid –based extinguisher may cause rusting and corrosion of computer components
    2. Powder particles may increase friction, clogging and wearing of movable computer parts
  12. Differentiate between Bcc and cc in an email. (2 marks)
    • In cc, all the recipients of the mail are able to see other recipients of the same mail. Bcc: In Bcc, all recipients of the mail are not able to see other recipients.
  13. Since the invention of the first generation of digital computers, much advancement has been realized in the sector of information and technology. Explain two characteristics which have been improved from the first generation to the modern computers. (2 marks)
    • Size: Computers are becoming smaller and smaller since they involve Very Large Scale Integration of electronic components leading to the introduction of very small computers like palmtops, notebooks and laptops.
    • Speed: Computers are becoming faster in processing of data due to invention of very high speed processors.
    • Storage Capacity: This has been increased. Initial devices could only store several kilobytes and they took long to store and retrieve data.
    • Energy consumption and heat emission: The modern computers consume little energy and emit little heat.
  14. Give three reasons why a mobile phone is regarded to as a computer. (3 marks)
    • It is electronic
    • It has a display unit
    • It has a keypad
    • It has memory for storage
    • It is programmable
  15. Using the above worksheet write the following formula to calculate the values in cells labeled
    1. = (D1+E1/100)*40) (1 mark)
    2. = sum(F1:G1) (1 mark)
    3. = MAX(H1:H6) (1 mark)
    4. = AVG (H1:H6) (1 mark)
  16.                        
    1. State and describe two types of error can occur in programming (2 marks)
      1. Syntax errors- are mistakes in the programming language’s keywords or control structures. They show up when the program is being entered.
      2. Runtime errors- show up when the program is run. The program begins to run but the computer cannot carry out one of the instructions and crashes.
      3. Logical errors-occur when the program runs but produces wrong results. They show up when the program is being tested.
    2. Differentiate between compiler and interpreter as used in programming.(2 marks)

      Compiler

      Interpreter

      Translates the entire source code all at once before execution

      Translate the source code line by line

      Execution is faster

      Execution is slower

      They require large space

      Requires less space

    3. Name the two major developments during the second generation programming languages (2 marks)
      1. Introduction of structured programming style
      2. The use of control structures
  17.                          
    1. Study the pseudocode below and answer the questions that follow.
      Start
      N=0, X=0
      While n < 3 Repeat
      X = X + 1 Until x < 2
      N = N +1
      End while
      Print N, X
      Stop
      1. What will be the output from the program (2 marks)
        • X - 4
        • N - 3
      2. Draw a flowchart that was used to come up with the following pseud code (7 marks)
        flow chart yagvda
  18.              
    1. List three advantages of wireless technology (3 marks)
      • Flexible as compared to bounded media i.e devices can be moved around without losing access to the network
      • Can span large geographical areas easily
      • Can take place via satellite even very remote areas that do not have high cost physical infrastructure like telephone lines
    2. The computer is to be networked, name one extra device that should be fitted on every computer to enable this to happen (1mark)
      • NIC (network interface Card)
    3. Data transmission via the internet is done using a mode known as packet switching. Describe this data transmission mode. (2 marks)
      • Refer to the process over the network of breaking down into discrete systematic steps the data transmission process and at each step a certain action takes place.
    4. The diagram below shows four common network topologies A, B, C and D
      1. Name the network topologies A, B, C and D (4 marks)
        • A – Hierarchical /tree
        • B – Token-ring
        • C-Bus/line/multi-drop
        • D-Star
      2. Explain what happens if server X topology A fails. (1 mark)
        • Terminal 4, 5, 6 cease to function or cut off from the network.
      3. List two problems associated with network topology B. (2 marks)
        • Difficult to trouble shoot
        • Duplication of resources
        • Packets collision causing data distortion
        • When a terminal fails the network fails
        • To add a terminal one has to disable the network
      4. List two disadvantages associated with network topology D (2 marks)
        • Uses many cables
        • If the server fails the entire system fails
        • All communication must pass through server
        • Difficult to implement in a wide area of long distance.
  19.                                
    1. In order to generate information from data items, a set of processing activities have to be performed on the data items in a specific sequence depending on the desired result. Draw a well labeled diagram to illustrate data processing cycle. (2 marks)
      18 ssfsfssf
    2. A data entry clerk experiences some common errors when typing. Most of the time, she finds that:
      1. After every calculation, the result is less than the expected number of digits required e.g. 345.7896543 the result is given as 345.789.
      2. Different characters are typed wrongly, for example instead of typing 12873457 she types 128734S7.
        Identify the two types of errors commonly experienced by the clerk during data processing in (i) and (ii) above respectively. (2 marks)
        1. Truncation error
        2. Misreading error
    3. Briefly describe any three electronic data processing modes: (6 marks)
      1. Multiprogramming – More than one program are executed apparently at the same time by a single processor
      2. Real-time – involves processing of incoming data as soon as it occurs, up – data the transaction file and gives an immediate response that would affect the current as they happen.
      3. Online processing- data is processed immediately it is received
    4. State three ways a user can ensure data accuracy is maintained during data processing (3 marks)
      • Using modern data capture devices (direct data capture) such as barcode readers, optical character readers, digital cameras etc., which capture/enter data with minimum user involvement.
      • Design user interfaces that minimizes chances of invalid data entry.
      • Double entry checks
      • Use of error detection and correction software when transmitting and processing data.
      • Use of automated data verification and validation routines in the data processing system.
    5. State two advantages of a computerized filing system as used in data processing. (2 marks)
      1. Information takes up much less space than the manual filing
      2. It is much easier to update or modify information
      3. It offers faster access and retrieval of data
      4. It enhances data integrity and reduces duplication
      5. It enhances security of data if proper care is taken to secure it.
  20.                              
    1. Define a database model (1 mark)
      • The arrangement of data in a file which determine the access method.
    2. List two advantages of using database systems (2 marks)
      • Control of data redundancy
      • Maintain data consistency
      • Sharing of data
      • Improved date integrity
      • Economy of scale
      • Improved security
    3. In a database system, data integrity ensures the correctness and completeness of the data in the database. Differentiate the following types of integrity constraints:
      1. Validity integrity (1 mark)
        • Ensure that the data fields contain the correct data type
      2. Entity integrity (1 mark)
        • Primary key cannot have empty values.
      3. Referential integrity (1 mark)
        • A foreign key can only have the values of the relevant primary key.
    4. Briefly describe the three database models (3 marks)
      1. Hierarchical model – Records in the database can be related in one parent only but can have more child records.
        hierachy afaf
      2. Network – any record can be related with any other record.
        dfdfgdg sdfsfs
      3. Relational model – all data is logically structured within tables.
    5. Using diagrams describe the following three types of relationships. (3 marks)
      • One to one – for any member of A there is only one member of B and for any member in B there is one member of A.
        1 sdada
      • One to many – for a single member of A, there may be multiple associations with it B but for any B member there is only one member of A associated with it.
        2 adada
      • Many to many – for member in A there may be more members of B and for any member in B there may be many members of A
        3 adada
    6. Explain any three features of database. (3 marks)
      1. Tables – holds related records, organised in rows and columns
      2. Forms – data capture tool
      3. Queries – statement used to extract, change analyses or request for a specific data from one or more tables
      4. Reports – provides the user with a means to specify the output layout and what is to be output/printed
  21.                        
    1. State three standard coding scheme used computing and electronic systems. (3 marks)
      ASCII
      BCD
      EBCDIC
    2. Convert each of the following numbers
      1. 101.0012
        Whole part =>( 1 x 20) + ( 0 x 21) + ( 1 x 23) = 1 + 0 + 8 = 9
        Fraction part => ( 0 x 21) + ( 0 x 2-2) + ( 1 x 23) = 2-3 = 0.125
        ∴ 101.0012 = 9.12510
    3.                        
      1.  5E6H to octal. (3 marks)
        5E6H 010111100110
        010 111 100 110
        2       7    4      6
        27468
      2. 110011.0101
        + 110.0100
        111001.10012
    4. 1310 to binary
      13 – 16 13 – 8 5 – 4 1 – 2 1-1
      6 1 1 0 1
      1310 = 011012 → 8-bit → 000011012
      1010 to binary
      10 – 16 10 – 8 2 – 4 2 – 2 0 – 1
      0 1 0 1 0
      =010102 8-bit 000010102
      Ones complement of 000010102 → 111101012
      Two’s complement 111101012
                                              +1
                                    111101102
      1310 + (-1010) = 000011012
      + 1111011012
      (1) 000001012
      = 000001012
Join our whatsapp group for latest updates

Download Computer Studies Paper 1 Questions and Answers - Cekenas Pre Mocks 2022.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest