Computer Studies Paper 1 Questions and Answers - MECS Pre Mock Exams 2023

Share via Whatsapp

INSTRUCTIONS TO CANDIDATES

  1. Answer all questions in section A
  2. In section B, answer question 16(compulsory) and any other three questions
  3. Candidates should check the question papers to ascertain that all the pages are printed as indicated and that no questions are missing
  4. Candidates should answer the questions in English

FOR EXAMINER’S USE ONLY

SECTION

QUESTION

CANDIDATE’S SCORE

A

1-15

 

B

16

 

 

 

 

 

 

 

                       TOTAL SCORE

 



QUESTIONS

SECTION A (40 Marks)
Answer all questions in this section

  1. Identify the computer generation that is associated with each of the following characteristics
    1. Use of computers that imitate human intelligence (1 mark)
    2. Used of punched cards for data input (1 mark)
    3. Use of Large Scale integrated circuits (1 mark)
    4. Use of cloud storage (1 mark)
  2. Distinguish between line spacing and character spacing as used in word processors (2 marks)
  3. Although super computers have greater processing capabilities than main frame computers, large communications companies prefer main frame computers for management of their data and operations State two reasons for this preference (2 marks)
  4. After purchasing a laptop, Mary realized that it could not connect to the internet through a wireless access point State three possible causes for the failure in connection (3 marks)
  5. Aisha found one of her favourite movies on a youtube channel State three advantages of downloading the movie to the computer hard disk and watching it from there instead of streaming it live from the youtube channel (3 marks)
  6. State two circumstances that necessitate encryption of data in computer systems (2 marks)
  7. A student saved a document in a memory card Later on the memory card crashed and therefore the work got lost State three precautions that the student should have taken to ensure that the work was not lost (3 marks)
    7 dadad
  8. Purity inserted a picture labelled S in a publication she designed as shown in the figure below
    She applied different transformations to achieve the results labelled W, X and Y
    8 dada
    State the transformation applied in each case
    W (1 mark)
    X (1 mark)
    Y (1 mark)
  9. Kennedy inserted a flash disk in a computer to print out a document stored in it but the error message “USB not recognized” appeared on the screen of the computer State two possible causes of the error message (2 marks)
  10.                  
    1. Ben noticed that a USB mouse in one of the desktop computers in the computer lab could not move the pointer on the screen State two ways he could solve that problem (2 marks)
    2. Suzzie, a secretary at Achievers secondary school carries out her daily duties using computers and suffers repetitive strain injury State two ways she would use to reduce repetitive strain injury(2 marks)
  11. Sarah, a system analyst in Excel Company has decided to use document review in order to collect data necessary for developing a new information system for the company State three reasons that could have influenced her decision to use this method (3 marks)
  12. Explain two ways in which growth of the internet has contributed to an increase in computer crimes (2 marks)
  13. When constructing a school’s database, Mark set the data type “number” for the field “marks” Name three field properties that he can set for this data type in order to limit values entered in the field (3 marks)
  14. State two ways in which errors that occur during data processing are threat to data integrity (2 marks)
  15. Wireless Fidelity (WiFi) has become one of the most popular modes of internet connection in recent days State two reasons for this trend (2 marks) 

SECTION B (60 Marks)
Answer question 16 (Compulsory) and any other three questions

  1.                    
    1. State three characteristics of third generation languages that distinguish them from all other high level programming languages (3 marks)
    2. Program documentation is categorized as either technical documentation or user –oriented documentation Classify each of the following documentation components as either technical or user oriented
      1. Program flowchart (1 mark)
      2. Error handling procedures (1 mark)
      3. Source code (1 mark)
    3. The figure below shows a flowchart Use it to answer the questions that follow:
      16 sddada
      1. Name the control structure used in the flowchart (1 mark)
      2. Determine all the outputs of the flowchart if the input is the number is five (3 marks)
      3. Write a pseudocode for the flowchart above (5 marks)
  2.                              
    1. The table below shows items extracted from Computer Studies subject score calculations spreadsheet Use it to answer questions (i) to (ii)
       

      A

      B

      C

      D

      1

      Paper

      Weight

      Score

      Weighted Score

      2

      Paper one

      0.3

      80

      24

      3

      Paper two

      0.4

      70

      28

      4

      Paper three

      0.3

      60

      18

      5

             

      6

      Average Weighted Score

      22.66

      Using cell references only, write a function that may have been used to compute the following:
      1. the weighted score in D3 (2 marks)
      2. Average weighted score in cell D6 (2 marks)
    2. Explain how social engineering is a threat to data security (2 marks)
    3. State the function of each of the following parts of a spreadsheet window
      1. Formula bar (1 mark)
      2. Name box (1 mark)
    4. State two functions of a select query in a database (2 marks)
    5. State two characteristics of command line operating systems that make them suitable for configuring computer networks (2 marks)
    6. When purchasing a word processing software, Atieno was advised to consider its user friendliness State three features that the software should have for her to conclude that it is user friendly: (3 marks)
  3.                  
    1. State two characteristics of open systems that make them better than closed systems (2 marks)
    2. State the function of each of the following during system construction:
      1. Programming language (1 mark)
      2. Invalid data (1 mark)
    3. Explain two reasons an organization may change an existing information system (4 marks)
    4.  A school decided to change from a manual examination processing system to an online examination processing system using parallel change over strategy State three challenges they are likely to face when using this changeover strategy (3 marks)
    5. Peter was assigned the responsibility of designing the school magazine State two reasons why he would prefer to use DTP software and not a word processor (2 marks)
    6. The use of ICT has affected every aspect of human life either negatively or positively State two ways in which ICT has negatively affected the music industry (2 marks)
  4.                  
    1. A bank with many networked branches uses a data processing mode whereby each branch does its processing independently and then forwards the results to a central computer at the headquarters for final processing
      1. Identify this data processing mode (1 mark)
      2. State two advantages of this data processing mode (2 marks)
    2. State two reasons why accumulation of dust should be avoided in the computer lab (2 marks)
    3. For each of the following, identify the most appropriate internet service:
      1. Real time exchange of text messages (1 mark)
      2. Personal website for sharing personal opinions on a particular subject (1 mark)
      3. Enable people in different geographical locations to hold live meetings (1 mark)
    4. Tom a network designer was tasked to set up a local area network for Mwangaza Technical institute He was provided with 4 computers, coaxial cables, 1 printer and 2 terminators With aid of a well labelled diagram, design the most appropriate network topology that could have been set up by Tom (3 marks)
    5. State two circumstances that may necessitate a network administrator to use a bridge in LAN (2 marks)
    6. Explain a reason why single mode fibre optic cable is preferred for long distance transmission of data signals (2 marks)
  5.                  
    1. One of the characteristics of solid state drives (SSD) is the use of electronic circuits to store data Explain how binary logic is used to represent data in these devices (2 marks)
    2. Convert 170510 to its binary equivalent (3 marks)
    3. Using twos complements and 8 bit notation, perform the following subtraction:
      2910 – 1510 (4 marks)
    4. Perform the following binary arithmetic
      11101011 – 100110 + 10100111
      leave your answer in decimal notation (4 marks)
    5. State two challenges associated with the use of voice input for securing computer systems (2 marks)


MARKING SCHEME

QN

RESPONSES

MARKS

1.

  1. Fifth Generation
  2. 1st and 2nd generation
  3. 4th generation
  4. 5th generation                                             

1

1

1

1

2.

Line spacing refers to the vertical distance between lines of text while character spacing refers to the fixing of characters too close/condense or far apart/expanding from each other

Accept correct illustration   (Award 2 or 0)

2

3.

  • Main frames are cheaper/affordable than super computers
  • Main frames support many peripheral devices
  • Mainframes have large storage capacities to support storage of the high volumes of data in those companies  (First 2 × 1)

3

4.

  • Lack of  or faulty PCMCIA card
  • Lack of or corrupted network card drivers/network software
  • Lack of login credentials
  • The laptop was not configured to access the AP   (First 3 × 1)

3

5.

  • There will be no interruptions from adverts or network down times that can occur in live streaming
  • She can watch it at her own convenience i.e. even when there is no internet connection
  • She will save on internet connection costs required for live stream every time she wants to watch it.  (First 3 × 1)

3

6.

  • When entering passwords /user authentication codes
  • When securing data that is on transit  (First 2 × 1)

2

7.

  • Scan the memory card for viruses/install antivirus
  • Restricting the use of the memory card so as to minimize chances of virus attacks
  • Back up the data in another storage media
  • Avoid filling the memory card to full capacity
  • Use data recovery software to reconstruct lost data  (First 3 × 1)                 

3

8.

  • W – Cropping/trimming
  • X – Rotating/ Reflection
  • Y - Resizing

1

1

1

9.

  • Unsuccessful installation/loading of the flash disk drivers
  • Faulty USB port
  • The flash disk may contain malicious file (virus); therefore, the system cannot read it.
  • Corrupt/infected drivers  (First 2 × 1)                 

2

10. a)

  • Place the mouse on a flat surface/mouse pad
  • Connect the mouse on another port
  • Restart/ warm boot the computer
  • Run a virus scan  (First 2 × 1)                 

2

b)

  • Use standard furniture
  • Take frequent breaks
  • Use of wrist pad
  • Use of ergonomic keyboards
  • Adopt a proper sitting posture  (First 2 × 1)                 

2

11.

  • The need not to interrupt the normal running of the current system, document review is unobtrusive.
  • The need to get broad coverage; documents cover a long span of time, many events, and many settings
  • The need to reduce costs since many documents are in the public domain, especially with the advent of the Internet they are freely obtainable without the authors’ permission.
  • The need to save on time since document analysis is less time-consuming (First 3 × 1)                                                                                                                                                                         

3

12.

  • Internet has provided a platform where people can increase their skills in computers and also the related crimes
  • Growth of the internet has led to many organizations and individuals putting their data online which entices computer crimes such as hacking, tapping, fraud, etc.
  • Through the internet people commit crimes and clear all digital evidence making it difficult to prosecute them, this encourages more computer crimes.
  • Growth of internet has led to complex crimes which are difficult for law enforcement agencies to investigate, this encourages more crimes. (First 2 × 1) 

2

13.

  • Validation rule
  • Format
  • Field size
  • Decimal places
  • Required
  • Allow zero length

(Do not accept input mask, validation text, caption, indexed ) (First 3 × 1)  

3

14.

  • Errors make values deviate from the actual value thus affecting the accuracy and completeness of data
  • Errors make data become irrelevant e.g. errors in exam marks results make the results irrelevant since they will misrepresent the performance of the student.  (First 2 × 1) 

Guide for marking: look out for whether a candidate relates errors to any of the measures of data integrity i.e. accuracy, completeness, relevance and timeliness.

2

15.

  • Offers flexibility in connection
  • Covers wide geographical area
  • Easy to remove or add nodes
  • Enables communication in areas where laying cables is not feasible (First 2 × 1) 

2

 

SECTION B (60 MARKS)

 

16.a)

  • They are structured/procedural
  • They use control structures
  •  Divide a large task into smaller sub programs/ they are modular

(Do not accept characteristics that are generic to all high level programming languages such as portable, easy to debug, user friendly etc.)  (First 3 × 1)                                                                                                                                               

3

b)

  1. technical
  2. User oriented
  3. technical

1

1

1

c) i)

While Loop/Looping/repetition

1

ii)

1st Iteration

number = 5, product = 1, Value = 5

Is 5 = 0 ?   No

Product = 5 * 1 = 5

Value = 5 – 1 = 4

2nd Iteration

product = 5, Value = 4

Is 4 = 0 ?   No

Product = 4 * 5 = 20

Value = 4 – 1 = 3

3rd  Iteration

product = 20, Value = 3

Is 3 = 0 ?   No

Product = 20 * 3 = 60

Value = 3– 1 = 2

4th Iteration

product = 60, Value = 2

Is 2 = 0 ?   No

Product = 60 * 2 = 120

Value = 2– 1 = 1

5th Iteration

product = 120, Value = 1

Is 1 = 0 ?   No

Product = 120 * 1 = 120

Value = 1– 1 = 0

6th Iteration

product = 120, Value = 0

Is 0 = 0 ?   Yes Exit loop

Product = 120

Number = 5
6 correct iterations @ ½ marks = 3 marks

3

     

iii)

START                           

           INPUT number  ½

           Product = 1           ½

           Value = number     ½

           WHILE Value = 0 DO    ½

                         Product = value * product   ½

                          Value = Value – 1               ½

           ENDWHILE                                      ½

           OUTPUT number, product                ½

STOP                                                                

                                                              Logic flow = 1

5

17. a)

  1. = PRODUCT (B3, C3)  or = PRODUCT (B3:C3)
  2. = AVERAGE (D2:D4)

  For each case, award 1 mark for correct function name & 1 mark for correct range

2

2

b)

Through social engineering computer criminals are able to solicit for private and confidential data such information system login details from unsuspecting persons which they use to get unauthorized access to data.

2

c)

  1. Displays the content of the active cell/selected cells
  2. Displays the cell address of the active/ selected cell

1

1

d)

  • To perform calculations on fields
  • To search and obtain records that meet a certain criteria (First 2 × 1)

2

e)

  • They give the user better control over system resources
  • They offer better security of data since only those who know commands can use the computer
  •  The commands are executed faster since they are easier for the CPU to process. (First 2 × 1)
 

f)

  • Use of WIMP
  • Availability of help facility/user guide
  • It should have data recovery facilities such as undo & redo
  • It should have automated facilities such as auto save, autocorrect, autocomplete, word wrap etc.   
  • Provide facilities to adjust the user interface settings  (First 3 × 1)                  

3

18. a)

  • They exchange inputs and outputs with the environment
  • They get feedback from the environment which make them able to adapt to changes in their environment (First 2 × 1)                   

2

b)

  1. For coding the system/creating a system’s program
  2. to test whether the program accepts data that is out of the expected range

1

1

c)

  • New directives from the management
  • Change in user needs
  • Problems – undesirable situations that prevent the organization from meeting its goals
  • New opportunities   - a chance to improve on internal processes
  • New technology                                                                     

Award 1 mark for stating and 1 mark for explanation   (First 2 × 2)                                                      

4

d)

  • There will be great administrative strains as the user will do most of the tasks twice
  • The benefits of the new system will not be fully realized immediately
  • There will incur higher costs for the changeover  (First 3 × 1)                                                      

3

e)

  • Every item on a page is contained in a frame and can be edited and formatted independently.
  • Stories can be contained in a single frame or threaded between several frames
  • Frames need to follow in a logical sequence. E.g. a story on pg 1. May be continued on pg 8.
  • Master pages are used to set a common layout which may be repeated on several pages, e.g. Logo, page numbers
  • Multiple stories from different authors can be handled with ease.
  • Wide range of templates is available e.g. brochures, booklets, posters business cards (First 2 × 1)                                                       

2

f)

  • Increase piracy
  • Reduced creativity

2

19. a)

  1. Distributed data processing mode

1

ii)

  • Enables faster processing since data processing is shared among computing nodes
  • In case of data loss only a small portion of data is lost
  • Failure at one point may not affect the entire system (First 2 × 1)                                                      

2

b)

  • Dust may cause clogging of movable parts of a computer such as fans, keyboards
  • Dust may scratch storage devices leading to data loss
  • Dust increase friction in movable parts of a computer leading them to wear out.(First 2 × 1)                                                      

2

c)

  1. instant messaging services/SMS/email/social media platforms
  2. Blog
  3. Video conferencing/teleconferencing

1

1

1

d)

19 d ajdnajda

Evidence of a backbone/bus cable  - 1 mark

Two terminators on the ends of the backbone – 1 mark

Nodes connected to the bus – 1 mark

3

e)

  • To extend a LAN beyond its length limit
  • To segment a LAN in order to reduce data traffic
  • To connect network segments (First 2 × 1)                                                      

2

f)

  • The single mode has a smaller core that allows light to be transmitted in only one direction leading to faster data transmission.

2

20. a)

  • SSD consist of IC’s (millions of transistors). Each transistor can only represent two states i.e. ON and OFF.  A high voltage in the circuit represents ON state interpreted as 1 while low voltage represents OFF state interpreted as 0. The sequence of ON’s and OFF’s forms electrical signals that the computer can understand

2

b)

2

17

2

8R1

2

4R0

2

2R0

2

1R0

2

0R1

                  1710 = 100012

0.05 × 2 = 0.10

0.10 × 2 = 0.20

0.20 × 2 = 0.40

0.40 × 2 = 0.80

0.80 × 2 = 1.60

0.60 × 2 = 1.20

0.20 × 2 = 0.40      0.05 = 0. 0000112  so 17.05 = 10001.0000112

1

1

1

c)

2

29

2

14R1

2

7R0

2

3R1

2

1R1

2

0R1

2

15

2

7R1

2

3R1

2

1R1

2

0R1

                2910 = 101112                                                           1510 =11112

 8bit notation     00010111                                                               00001111

00010111 – 00001111

Twos complements 11110000 + 1 = 11110001

              00010111 + 11110001 = (1) 00001000

  Ignore the overflow bit;  00001000

 

d)

11101.011 – 100.110 = 11000.101

11000.101 + 10100.111 = 101101.100

(1 × 25) + (0 × 24) + (1 × 23) +(1 × 22) + (0 × 21) + (1 × 20) + (1 × 2-1) +

(0 × 2-2)+ (0 × 2-3)

32 + 8 + 4 + 1 + 0.5 = 45.5

1

1

1

1

e)

  • Data entry may be affected by background noise
  • It does not care Speech related problems such as change in tone, accent may affect data entry
  • Its complex to develop such systems
 

 

 

Join our whatsapp group for latest updates

Download Computer Studies Paper 1 Questions and Answers - MECS Pre Mock Exams 2023.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?