Computer Studies Paper 1 Questions and Answers - Form 4 Term 1 Opener Exams 2023

Share via Whatsapp
Instructions to candidates   
  • This paper consists of TWO sections, A and B
  • Answer all questions in sections A.
  • Answer questions in English.
  • Answer question 16 and any other THREE questions from section B.

SECTION A (40 marks)    
Answer all questions in this section in the spaces provided.

  1.  
    1. Headache, back and neck pain may result from use of computers. Explain two ways in which back and neck pain can be minimized. (2mks)
    2. State how computer have been made more users friendly for persons that are:
      1. Blind             (½mk)
      2. Without hands… (½mk)
  2. The diagram below represents the essential features of a computer system. Study the diagram and answer the questions that follow:
    CSF42023T1P1Q2
    1. Name and describe the following components (4mks)
      1.  A
      2.  B
      3.  C
      4.  D
    2. On the diagram above, indicate the direction of data flow using arrows (1mks)
  3. Gianchere High School intends to purchase new computer to be used by students in the e-learning room for accessing digital learning resources and personal research. Advise the school on two computer hardware system specification features to consider as a measure of enhancing performance of the computers. (2mk)
  4. State two items that an electronic mail should have for it to be sent (2mk)
  5. A worker is unable to travel to the office but may still be able to do the office work through telecommuting.
    Explain why the worker may use each of the following:
    1. Email (1mks)
    2. Fax (1mks)
    3. Firewall (1mks)
    4. Digital camera (1mks)
  6. Explain the term search engine as used in the Internet. (2 mks)
  7. Explain two ways in which an operating system provides data security in a computer system 2mks)
  8. File conversion, in system development, refers to modifying or changing the format of files when a new system is introduced e.g. from manual to computerized. State any THREE factors considered before the file conversion process. (3mks)
  9. A student saved a document in a diskette. Later on, the student found that the diskette could not open arid therefore the work got lost. Give three precautions the student should have taken to ensure the work was not lost. (3mks)
  10. A video rental shop uses a computerized system to record which videos have been loaned out. When a video is loaned out, the customers’ data is recorded on computer file. Describe TWO computer processing files that will be needed to store permanent customer records and temporary records that keep on changing. (4mks)
  11. Define overflow error with respect to computation of data (1mk)
  12. What role is played by a reference file in data processing? (1mk)
  13. State one instance where batch processing could be applied (1mk)
  14. State three merits of distributed data processing modes. (3mks)
  15. State any TWO advantages of using computers in computer aided design (CAD) (2mks)

SECTION B (60 marks)   
Answer question 16 and any other THREE questions from this section in the spaces provided. 

  1.  
    1. State two qualities of a good pseudocode. (2 marks)
    2. With the aid of flowchart diagrams, describe each of the following programme control structures:
      1. Sequence
      2. Selection
    3. Draw a programme flowchart that would accept three numbers and find their sum. If the sum is greater than 200, it adds 30 to the sum, otherwise subtracts 20 from the sum. The programme should then display the results. (5 marks)
  2.  
    1.  
      1. What is a Blog in relation to internet services (2marks)
      2. Explain the impact of the internet in the information security (2marks)
    2. Kunta would like to send photos to Kinte via e-mail. Outline the steps Kunta would follow to send the photos as file attachments (3marks)
    3. Differentiate between the following in relation to data security and control (4 marks)
      1. Password and biometric authentication.
      2. Privacy and Confidentiality.
    4. Computer crimes include Trespass, Hacking, Piracy and Sabotage. Highlight each of them.  (4 marks)
  3.    
    1.  
      1. State two reasons for data representation in a computer (2 Marks)
      2. Define the following words as used in data representation in a computer (4 Marks)
        1. Nibble
        2. Word
        3. Byte
        4. Bit
      3.  
        1. Convert 3410 to its binary equivalent. (2 Marks)
        2. Convert 10010112 into decimal number system equivalent (2 marks)
      4.  
        1. Briefly explain how data is represented in a computer (3 marks)
        2. With the aid of a well labelled diagram, distinguish between analogue and digital signals (2 marks)
  4.  
    1. With the aid of a diagram, describe seven stages in system development life cycle (SDLC) in their logical sequence (7 marks)
    2.  
      1. What is a closed system?(1mark)
      2. Give three characteristics of a closed system (3 marks)
    3. State four roles played by an information system. (4 marks)
  5.  
    1.  
      1. State any four factors you would consider before installing an operating system. (4 marks)
      2.  
        1. State two reasons that causes computers to hang (2 marks)
        2. State solutions to the causes you listed 19. (ii) (1) above (2 marks)
    2. In relation to operating system, differentiate between Kernel and Shell. (2 marks)
    3. State any two characteristics of a computer file. (2 marks)
    4. Mobile Operating System (OS) is software that allows Smart phones, Tablet PCs and other devices to run applications and programs. List any THREE examples of Mobile Operating Systems (3 marks)


MARKING SCHEME

SECTION A (40 marks)
Answer all questions in this section in the spaces provided.

  1.  
    1. Headache, back and neck pain may result from use of computers. Explain two ways in which back and neck pain can be minimized. (2mks)
      • Use of standard furniture
      • Sit to have upright backrest.
      • Furniture should be high enough to enable eyes of the user to be level with the top of screen
    2. State how computer have been made more users friendly for persons that are:
      1. Blind…………………………………………………… ……………… (1/2 mk)
      2. Without hands………………………………………………………… (1/2 mk)
        • Blind - Use of braille keyboard (1/2mk)
        • Without hands - use of microphone/speech recognition devices (1/2mk)
  2. The diagram below represents the essential features of a computer system. Study the diagram and answer the questions that follow:
    1. Name and describe the following components (4mks)
      1. A- Input device- used to enter data into the computer
      2. B- Control unit -Manages and coordinates activities of the computer system.
      3. C- ALU-Perform arithmetic and logical operations on data during data processing
      4. D –Primary memory/main memory this includes the RAM and special type memories registers and cache memory. Store data and instructions that are directly accessible and required for data processing. Store intermediate results during data processing
    2. On the diagram above, indicate the direction of data flow using arrows (1mks)
      CSF42023T1P1Ans2
  3. Anestar High School intends to purchase new computer to be used by students in the e-learning room for accessing digital learning resources and personal research. Advise the school on two computer hardware system specification features to consider as a measure of enhancing performance of the computers. (2mk)
    • Consider hard disk capacity
    • Consider RAM capacity
    • Consider processor/computer speed
  4. State two items that an electronic mail should have for it to be sent. (2mk)
    • Receiver email
    • Email Subject
    • Message
  5. A worker is unable to travel to the office but may still be able to do the office work through telecommuting.
    1. Explain why the worker may use each of the following:
      1. Email (1mks)
        • to send and receive messages
      2. Fax (1mks)
        • To send and receive scanned text and images
      3. Firewall (1mks)
        • To prevent unauthorized access to or from a private network
      4. Digital camera (1mks)
        • To record videos and take photos
  6. Explain the term search engine as used in the Internet. (2 mks)
    • A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.
  7. Explain two ways in which an operating system provides data security in a computer system (2mks)
    • Provides user access level interface where the user must provide login details before access.
    • Has built in firewall software to deter unauthorized access from a private network.
    • Has log files that keeps track of all activities as they happen.
    • Has disk utility software that automatically runs when the computer is booting to repair any damages and recover lost data from the harddisk due to un-procedural shut down.
    • Has screen security systems such as a screen saver that automatically locks the computer if idle for a given period of time. This requires the user to access by proving login details.
    • Has a feature that allows the user to hide private and confidential files or even guard them with passwords.
  8. File conversion, in system development, refers to modifying or changing the format of files when a new system is introduced e.g. from manual to computerized. State any THREE factors considered before the file conversion process. (3mks)
    1. Whether the new system requires a new operating system and/or hardware.
    2. Whether you need to create new database files for the new system e.g. manual to electronic files.
    3. Whether you need to install new application software.
  9. A student saved a document in a diskette. Later on, the student found that the diskette could not open and therefore the work got lost. Give three precautions the student should have taken to ensure the work was not lost. (3mks)
    • Eject the diskette in the right procedure
    • Ensure that the computer is free from malware
    • Format the disk before saving
    • Ensure that the diskette is not in write protective mode.\
    • Avoid dust.
    • Do not expose the disk to sunlight and strong magnetic fields
    • Store the disk in a dry clean place.
  10. A video rental shop uses a computerized system to record which videos have been loaned out. When a video is loaned out, the customers’ data is recorded on computer file. Describe TWO computer processing files that will be needed to store permanent customer records and temporary records that keep on changing. (4mks)
    1. Master files
      • Contains all the permanent data/records you keep about something e.g. videos, which transactions are processed.
    2. Transaction files
      • Contains data about what has happened. These are files that contain input and output data for holding temporary incoming or outgoing data. Used to update dynamic data on master files.
  11. Define overflow error with respect to computation of data (1mk)
    • This error type will usually happen on older machines whose memory capacity is over shadowed by the capacity of the result of calculations.
    • When a number is too big, it is rounded of or truncated. The rounded off value leads to overflow errors.
  12. What role is played by a reference file in data processing? (1mk)
    • For look-up purposes. Look up information is stored in a separate file but is required during processing.
  13. State one instance where batch processing could be applied (1mk)
    • Processing of payroll
    • During manufacturing processes
    • Processing of examination results and analysis
    • Electricity and water billing system.
    • Statistical processes such as censures and voting.
  14. State three merits of distributed data processing modes. (3mks)
    • Fast in processing
    • Data is more secure
    • Programs and files are shared hence cheaper.
  15. State any TWO advantages of using computers in computer aided design (CAD) (2mks)
    • Easy to store and retrieve drawings.
    • Easy to make changes
    • Easy to test since most packages come with features for testing designs.
    • Saves on costs since models can be used to draw construction schedules.
    • Stored design can be sued to produce control instructions for machines which will make the product.
    • Quick production of drawings and plans.

SECTION B (60 marks)   
Answer question 16 and any other THREE questions from this section in the spaces provided.

  1.  
    1. State two qualities of a good pseudocode. (2 marks)
      • The statement must be short, clear and readable
      • The statements must not have more than one meaning i.e. should be unambiguous
      • The pseudo code lines should be clearly outlined and indented clearly
      • A pseudo code should show clearly the start and stop of executable statements and the control structures (to be discussed later in the section)
      • The input, output and processing statements should be clearly stated, using keywords such as
        Input: READ, OBTAIN, GET
        Output: PRINT, DISPLAY, SHOW
        Compute: COMPUTE, CALCULATE, DETERMINE
        Initialize: SET, INIT
        Add one: INCREMENT, BUMP
    2. With the aid of flowchart diagrams, describe each of the following programme control structures:
      1. Sequence
        • In this structure, the computer reads instructions from a program file starting from the first top line and proceeding downwards one -by -one to the end. This is called sequential programming execution i.e. Sequence control structure.
          CSF42023T1P1Ans16bi
      2. Selection
        • In selection control, execution of statements depends on a condition which is either a true or false
          There are four types of selection controls. Namely:
          IF.....THEN
          IF.....THEN.....ELSE
          NESTED IF
          CASE SECTION

          CSF42023T1P1Ans16bii
          Format:
          IF <condition> THEN
          Statements;
          ENDIF
          Picture
    3. Draw a programme flowchart that would accept three numbers and find their sum . If the sum is greater than 200, it adds 30 to the sum, otherwise subtracts 20 from the sum. The programme should then display the results. (5 marks)
      Draw a programme flowchart that would accept three numbers and find their sum
      CSF42023T1P1Ans16c
  2.  
    1.  
      1. what is a Blog in relation to internet services (2marks)
        • It is an internet site where a person can regularly post personal information, music, movies and diaries and socially interact with people connected to the same.
      2. Explain the impact of the internet in the information security (2 marks)
        • Private and confidential information is constantly at risk from hackers, crackers and fraudsters who carry out their trade on the internet.
    2. Kunta would like to send photos to Kinte via e-mail. Outline the steps Kunta would follow to send the photos as file attachments (3marks)
      • Launch the e-mail program such as gmail, yahoomail, etc
      • Click New or Compose to create a new e-mail.
      • Click the file attachment button.
      • Locate the photos to attach and click attach.
      • Click the send button.
        Any other appropriate procedure is allowed. One mark based any of the bolded keywords in logical order.
    3. Differentiate between the following in relation to data security and control (4 marks)
      1. Password and biometric authentication.
        • Password is an encoded string of characters that enables a person to be positively identified before being given access while,
        • Biometric authentication relies on a unique aspect of human features like finger prints, iris or arrangement of facial features. It is one of the most secure authentication mechanisms because no two people can have the same features.
      2. Privacy and Confidentiality.
        • Privacy refers to an individual’s right to control access to data or information belonging to himself or herself.
        • Confidentiality refers to the means of protecting private or corporate data or information from unauthorized access or disclosure.
    4. Computer crimes include Trespass, Hacking, Piracy and Sabotage. Highlight each of them. (4 marks)
      • Trespass means the unauthorized physical access to ICT assets or also accessing information digitally without permission.
      • Hacking is the forceful access to information held in computers by breaking access control codes like passwords.
      • Piracy is a form of intellectual property theft which means illegal copying of software, information or data.
      • Sabotage is the illegal destruction of data and information with the aim of crippling service delivery or causing great loss to an organization.
  3.  
    1.  
      1. State two reasons for data representation in a computer (2 Marks)
        • It is easier to construct electrical circuits based on binary. (on/off logic)
        • Digital devices are small in size thus use less energy
        • Digital devices are more reliable
      2. Define the following words as used in data representation in a computer (4 Marks)
        1. Nibble
          • A nibble is a group of 4-bits or half a byte
        2. Word
          • This is a group of bytes
        3. Byte
          • This is a group of bits preferably 8
        4. Bit
          • It is the smallest unit of digital information which is either a zero or a 1
      3.  
        1. Convert 3410 to its binary equivalent. (2 Marks)
          CSF42023T1P1Ans18a
        2. Convert 10010112 into decimal number system equivalent (2 marks)
          CSF42023T1P1Ans18b
      4.  
        1. Briefly explain how data is represented in a computer (3 marks)
          • Computer doesn’t understand neither do they process natural languages. They convert natural languages such as English; into the language they understand (Binary).
          • Binary systems are made up of 0s and 1s and they are the easiest to manipulate and store in a digital environment.
          • All storage and processing systems are formatted in binary nature to help computers interpret them.
          • Platforms that data must go through to communicate with hardware
            CSF42023T1P1Ans18biva
        2. With the aid of a well labelled diagram, distinguish between analogue and digital signals (2 marks)
          CSF42023T1P1Ans18bivb
  4.  
    1. With the aid of a diagram, describe seven stages in system development life cycle (SDLC) in their logical sequence (7 marks)
      CSF42023T1P1Ans19
      1. Problem recognition and definition
        • This is finding out whether the proposed system is worth looking at or pursuing. This is done by looking at the problem at hand and how the proposed system will find solutions to the problem.
      2. Information gathering
        • At this phase./stage relevant information is gathered using various means. This information shall be used to design the proposed system.
      3. Requirement specifications
        • All hardware and software considerations are assessed here also processing specifications, output/input specifications, file and data stores.
      4. System design
        • This stage involves using symbols and algorithms to comeup with a structure of the new system. Data flow diagrams, flowcharts, pseudocode, tables, queries, forms and reports are designed here.
      5. System construction
        • This involves use of a programming language or a database [DBMS] to build a system that was designed under system design.
      6. System implementation and testing
        • This is installing and testing the new system for the first time. Sample data is used to detect errors and correct them.
      7. System review and maintenance
        • This is trying check for any challenges they system may pose in future and troubleshooting any errors. Also finding out the desired output.
    2.  
      1. What is a closed system?(1mark)
        • This is a system that receives input but does not necessarily give the output.
        • The borders of a closed system are not clearly defined
      2. Give three characteristics of a closed system
        1. Limited Interaction: A closed system in computer technology is one that limits the interaction and communication with external devices or systems. This means that the system is self-contained and operates independently, without the need for external input or communication.
        2. Fixed Functionality: A closed system typically has fixed functionality, meaning that the system is designed to perform specific tasks and cannot be modified or expanded beyond its original design. This can limit the flexibility and adaptability of the system, but also ensures that it remains stable and consistent in its performance.
        3. Proprietary: A closed system is often proprietary, meaning that it is owned and controlled by a specific company or organization. This can limit access to the system and its components, as well as the ability to customize or modify the system as needed. Additionally, proprietary systems may require licensing or fees for use, making them less accessible to some users.
    3. State four roles played by an information system. (4 marks)
      • Supporting information processing ~ by enhancing tasks such as data collection, processing and communication
      • Helping in decision making ~ by collecting operational data, analyzing it and generating reports that can be used to support the decision making processing
      • Enable sharing of information
      • To plan and control the activities of the firm
  5.  
    1.  
      1. State any four factors you would consider before installing an operating system. (4 marks)
        • Hardware considerations such as memory, processor speed, make and harddisk space
        • user needs
        • Initial cost
        • warranty / end user licensing agreement
        • compatibility and upgradeability
        • user friendliness
        • Online support
        • Accessibility
        • Security of data
        • Multimedia capabilities.
      2.  
        1. State two reasons that causes computers to hang (2 marks)
          • Computer virus
          • Less memory
          • Opening too many programs at a go (multi-tasking)
          • Anti-malware/operating system updating behind the scenes
          • Too many requests to your computer from a local area network
        2. State solutions to the causes you listed 19. (ii) (1) above (2 marks)
          • Install anti-malware
          • Upgrade memory
          • Turn on auto updates only when the computer is idle
          • Avoid batch processing
    2. In relation to operating system, differentiate between Kernel and Shell. (2 marks)
      • A kernel is the central part of an operating system. It manages the operations of the computer and the hardware, most notably memory and CPU time.
      • A shell is a computer program which exposes an operating system's services to a human user or other program.
    3. State any two characteristics of a computer file. (2 marks)
      • Has properties such as size, date made and type of application it was made of.
      • Has an extension
      • has a unique name
    4. Mobile Operating System (OS) is software that allows Smart phones, Tablet PCs and other devices to run applications and programs. List any THREE examples of Mobile Operating Systems (3 marks)
      • Android
      • Sailfish OS
      • iOS
      • Chrome OS
      • EMUI
      • Experia UI
      • Color OS
      • Copperhead OS
      • Fire OS
      • Windows 8
Join our whatsapp group for latest updates

Download Computer Studies Paper 1 Questions and Answers - Form 4 Term 1 Opener Exams 2023.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest