Computer Studies Paper 1 Revision Booklet
Computer Studies Paper 1 Revision Booklet
Computer Studies Paper 1 Revision Booklet
PAPER 1
118 M 40 3
150 F 50 3
152 M 30 4
Given the following logical expression.
IF NOT ( (SEX = ‘F’) AND (MARKS =>50) and (CLASS=3))
Indicate the result of the expression when applied on the record with admission 150.
(2mks)
11. (a) List any two types of signals that can be used in data transmission. (1mk)
(c) The formula of finding the roots of a quadratic expression is given here below
root = -b+ b2 – 4ac
2a
In finding the roots, the values a, b, and c, are identified and then the discriminant i.e b 2 – 4ac is
calculated.
If the discriminant is negative, then the roots are termed as “imaginary”, otherwise the two roots
are calculated using the formula.
(i) Write a pseudo code that will solve the problem above. The values of a, b and c are
entered from the keyboard. (5mks)
(ii) Write a program using either Pascal or c languages to find the two roots.
(5mks)
17. (a) (i) Explain the meaning of the term file organization. (1mk)
………………………………………………………………………………………..
………………………………………………………………………………………..
(ii) Indicate the method of file access for the following file organisation methods.
Indexed sequential
Sequential
Serial
Random
(b) The diagram below shows the data processing cycle.
(i) List the six stages of data collection in their correct order. (3mks)
(ii) List any four data collection media that can be used to collect data.(2mks)
(iii) List and explain the three methods that can be used to accomplish the task of
processing data. (3mks)
(c) Explain the difference between:-
(i) Logical and physical files. (2mks)
………………………………………………………………………………………..
(ii) Transcription and transposition errors. (2mks)
18. Organisations use massive resources to develop information systems.
(a) (i) Define the term information system. (1mk)
(ii) Describe any three elements of an information system. (3mks)
(iii) What is the main purpose of an information system. (1/2 mk)
(b) During system analysis, information has to be gathered to enable the analyst understand the
system under study.
(i) Explain two methods available to an analyst to enable him gather information.
(2mks)
(ii) Give two advantages and two disadvantages for each of the answers in b (i) above.
(4mks)
(c) Documentation for any system developed is important.
(i) Explain the meaning of system documentation. (1mk)
(ii) Describe any two reasons why documenting a system is important(2mks)
(iii) What is system review? (1/2mk)
(iv) List two types of system maintenance. (1mk)
19. (a) Describe the use of the following buses. (3mks)
(i) Data bus
(ii) Address bus
(iii) Control bus
(b) In relation to the control unit of the CPU, explain the three stages of the fetch execute cycle.
(3mks)
(c) Describe THREE ways in which computers are used as industrial systems.
(41/2mks)
In relation to weather forecasting
(i) Write GIS in full. (1/2mk)
(ii) What is the use of GIS. (1mk)
(e) Use one’s complement to calculate. (31/2mks)
1101 – 11
MARKING SCHEME
SAMPLE PAPER 1
451/1
c) The formula of finding the roots of a quadratic expression is given here below
root = -b― b2 – 4ac
2a
In finding the roots, the values a,b, and c are identified and then the discriminant i.e.
b2 – 4ac is calculated
If the discriminant is negative , then the roots are termed as “ imaginary” otherwise the
two roots are calculated using the formula.
i) Write a pseudo code that will solve the problem above. The values of a, b and c
are entered from the keyboard .
START
Enter values a,b& c
Read a,b & c
Calculate discriminant using b2 - 4 x a x c
If discriminant o then
Display ‘ roots imaginary
Else
Calculate root 1 = -b + sqrt ( discriminant / 2 x a)
Calculate root 2 = - b – sqrt ( discriminant / 2 x a)
Display root 1 , root 2
END
( Award 1 mk for start & end)
( Award 1 mk for reading a,b & c)
( Award 1 mk for testing discriminant)
( Award 1 mk for proper calculation of roots)
( Award 1 mk for output of roots & imaginary
ii) Write a program using either Pascal or c languages to find the two roots
(5mrk)
- In Pascal;
Program quad ( input, output);
Var
Root1, Root2: real;
A,b,c : integer;
Begin
Writeln (‘ enter the value of a,,b and c’) ;
Readln (a,b,c);
If (sqr (b) 4 * a * c) then
Writeln (‘ Roots are imaginary’ );
else
Begin
Root 1: = -b+ sqrt (sqr(b) -4 *a*c/ ∕2 *a);
Root 2 : = -b-sqrt (sqr(b) -4 *a*c //2 *a);
writeln (‘Root1 = , Root1);
writeln (‘Root 2 = ‘, Root 2);
end;
end
i) List the six stages of data collection in their correct order (3 marks)
- Data creation
- Data transmission
- Data preparation ( Award ½ for each listed)
- Media conversion ( Deduct 1 mk if not in correct order)
- Data validation
- Sorting
ii) List any four data collection media that can be used to collect data(2mrks)
MICR
OCR – portable Encoding devices e.g tape recorders
Portable encoding devices e.g tape recorders.
Barcode readers ( wand scanner)
Key – to - diskette (Award ½ each)
iii) List and explain the three methods that can be used to accomplish the task of
processing data ( 3mks)
- Manual – No machine used – may be pen and paper
- Mechanical – simple machines are used to process data
- Electronic – Automatic devices that work under the guidance of programs are used
to process data e.g. computer.
( Award ½ for each listed method)
(Award ½ for each correct description)
c) Explain the difference between
i) Logical and physical files ( 2mks)
A logical file is a user view on the arrangement structure and processing of a file
while a physical file is the actual arrangement of a file on a storage device
( Award 1 for each part)
ii) Transcription and transposition errors ( 2mks)
- Add
1101
1100 +
11001 (Award 1 mk for correct addition)
- Carry end – round carry
1001
+ 1 (Award ½ for correct end- round carry
1010
Ans = 10102
SAMPLE PAPER 2
451/1
(3 Mk)
17. Use the following Ms Dos Screen to Answer the questions that follow:
Computer Studies
d) What command would make your prompt change to C:\>_ …………… (2 Mks)
(c ) Define: (6 Mks)
i). Pseudocode
ii). Assembler
iii). Object code
(d) Your principal is intending to install a simple Internet connection in the school. List down
the equipment/ services that she’ll require to achieve this (5 Mks)
MARKING SCHEME
Page 22 of 140
Computer Studies
SAMPLE PAPER 2
451/1
5 (a) A Spreadsheet is essentially ledger sheet that lets one enter, edit and manipulate numeric data 1
(b) Uses of spread sheets
- Statistical analysis e.g average, mean, median e.t.c
- Accounting – calculate profits, prepare budgets calculate depreciation and appreciation e.t.c
- Data management e.g. sorting, filtering, print e.t.c
Page 23 of 140
Computer Studies
6 a) Hardware
- Processor type and speed
- Memory capacity
- Secondary storage any two
- Warranty stated, ½
- Expansion and upgrades mark each
- User needs good explanation ½
- Cost mark each
- Compatibility
- Service and support
- Clones
b) Software
- Authenticity
- Rehability
- User needs Any two stated
- User friendliness ½ mark each
- System requirements
- Cost Good explanation
- Compatibility ½ mark each
- Portability
- Documentation
- Training
- upgrades
Page 24 of 140
Computer Studies
Fire walls are computer hardware and /or software that help to filter the information that is being
communicated 1
9. An information systems is a set of people,
a) procedures and resources that collect transforms and disseminates information in an organization 1
10. (i) when the person inputting the data is 1 handicapped e.g. has impaired hands
(ii) When the person inputting the data has no data input skills using other devices such as keyboard
and mouse
11. Administrative
- Job rotation
- Forced vacation
- Accessed information should be granted on need to know basis and not on rank basis
- Enhance accountability within the organization
- Have division of labour and segregation of duties
- Select your personnel competitively i.e. know your employees (any two 2)
12. - Consuit with managerial, Administrative and technical staff to determine information needs data
flows and system definitions
- Monitor systems to optimize performance perform back up and initiate recovery action in the case
of system failure
- Co-ordinate system updates
- Provide assistance in testing new equipment and systems
- Co-ordinates support work and training in system use and access (any two 2)
Page 25 of 140
Computer Studies
13. These are moral principles and values that govern the action and decisions of an individual or group 1
15. a) Is the process of generating personalised letters or documents by combining a main document
with existing data source 1
b) This is the feature that automatically moves a word or cursor to the beginning of the next line if
it does not fit at the end of the current line
16. a) It enables programmers to design packaged and manipulative programs which are able to run
on many different types of computer 1
START
REPEAT
PRINT “ Enter name and subject marks”
1 INPUT Name, Mathematics, English, Kiswahili, Biology, Chemistry, Business studies,
Computer studies History
1 SUM = Mathematics + English + Kiswahili + Biology + Chemistry + Business Studies +
History
AVG = sum
8
If (AVG> 80) And (AVG < 100) THEN Grade = ‘A’
Page 26 of 140
Computer Studies
1 ELSE
If (AVG > 70) and ( AVG < 79) THEN Grades = ‘B’
1 ELSE
If (AVG > 60) and (AVG <69) THEN Grade = ‘C’
1 ELSE
if (AVG > 50) and (AVG < 59) THEN Grade = ‘D’
1 ELSE
Grade = ‘E’ Total (7 mks)
END IF
END IF
END IF
END IF ½
START
½
Avg = sum/2
NO NO NO NO
AVG AVG AVG AVG
80 - 60 -
100? 70- 69 ? 50–
79 ? 59
½ ½ ½ ½
?
YES YES YES
YES
½ ½ ½ ½ ½
Name, Sum, AVG,
Grade
½
EXIT
?
YES
Page 28 of 140
STOP
Computer Studies
½
17. A) These are receive/transmit terminals installed at dispersed sites connecting to a central hub
via satellite using small diameter antenna dishes (0.6 to 3.8 meter) 1
OR
It is a telecommunications technology that uses geosynchronous satellites as relays for point to
point, point to multipoint or broadcast communications
OR
It is connecting two or more computers and other communication devices for purposes of
communication
d) Advantages
- Resources sharing
- Remote communication
- Distributed processing capability 3 any three
- Cost effective
- Reliable
Disadvantages
- Security issues
- High initial costs
Page 29 of 140
Computer Studies
e). Is the simulation of visualization of a real life situation using computer modeling techniques 2
18. a) a logical file is a type of file viewed in terms of what data items it contains and of what
processing operation may be performed on the data items while a physical file is one that is viewed
in terms of how data items while a physical file is one that is viewed in terms of how data is stored
on a storage media and how processing operations are made possible 2
b) (i) For easier updating of the master file (removes back – tracking)
(ii) For faster retrieval of relevant information any two (2)
(ii) For easier comparison of the two file
c) (i) Serial
This is a mode of data organization where records are put into the backing store e.g. magnetic tape
as they arrive, following one another i.e. first come first stored basis. It does not have regard of
sequence 1 correct explanation
1
Rec 1 Rec 2 Rec 3 Rec 4
(correct diagram 1
The records denoted Rec 1, Rec 2, Rec 3 and Rec 4 are stored one after the other according to how
they arrived at the magnetic tape. They are separated from one another by neted spaces called inter
record gaps (IRG)
Page 30 of 140
Computer Studies
(ii) Sequential
Records are placed into the backing store e.g. magnetic tapes with regard to a certain sequence
according to unique identifiers called key fields 1
XM XN XO XP
(correct diagram 1
X – indicates serial organization m,n,o,p, are unique identifies
(iii) index sequential
Records are organized following a sequence and then an index, which can be got using a mathematical
approach is assigned to individual records. It is used in disk
X011
11 Denotion 01, 02,03, 04 e.t.c indicates the individual
record index 1
X04
X02
X03
Iv Random
- it is employed on disks 1
- records are organized randomly
- record location is achieved through mathematical approach
- records are not related
Track Y
- Sector Z (Record stored here) 1
- When development time exceeds the planned would - be- time to acquire the package (any 3)
19 e- banking is the use of computerised systems in processing of customer transaction,
cheque clearance and processing, electronic funds transfer and other related activities 1
e- learning is a process where lessons and lecturers are presented from a central site and the
presentation is transmitted to remote conference terminals or displayed on TV screens, or even
through the internet
b) Advantages
- Individual learners gain access to world – class educational resources without traveling or taking
excessive time away from work and home
- The institution gets a new channel and revenue sources from students who might otherwise be
unable to take advantage of their offerings
- The institution is equipped with a new capability by which to raise the quality of life their students
- The institution plays a better role in enabling basic skills development and offering the retaining
that can provide a more qualified and adaptive labour market
- Student understanding and retention improve when student learn by experience
- Introduction of technologies such as interactivity modeling, simulation, virtual reality interfaces,
and gaming will help student experience the skill being taught
Disadvantages
- High initial cost
- Moral corruption e.g. by students visiting pornographic sites
c) (i) Joystick – an input device used for playing games 1
Flatted scanner:- an input device used to scan text, real objects or pictures. These are captured and
converted to electrical signals for storage 1
(ii) Biometric analysis:- is the study measurement and analysis of human biological characteristics for
identification e.g. finger prints, voice, lips, facial features like Iris colour e.t.c 1
Telecommuting:- home working or use of computerized system to work ones home these systems
(at work place are linked to the office 1
d) - Using my computer icon display the explorer window
- on the edit menu click copy
- select the drive or folder where you want the item to be copied
- from the edit menu click paste. Information or item is pasted to a new location
20. (a) An internet tool /facility used for navigating and locating sites in the internet e.g.
Page 32 of 140
Computer Studies
- Data independence
- Reduced program maintenance
- Provision of a host language interface utility
SAMPLE PAPER 3
Page 34 of 140
Computer Studies
15.
e.g. – [email protected]
edu
org
gov
co
16. Define the word protocol. 1mk
Answer question 16 and any other three questions from this section
17. a) Design a flowchart for a simple program that can be used to categorize people according to age. If
the person is above or equal18 years, output “Adult” otherwise output “Young” 8 mks
b) What is the difference between looping and selection. 2mks
c) Name the stage of program development cycle when: 2mks
Page 36 of 140
Computer Studies
18. a) (i) Give the name of the communication media depicted in the diagram below. 1mk
i) A hub
ii) A switch
ii) 2mks
iii) 2mks
i) Hand
iii) Cropping
c) Give three nonprinting guides used in PageMaker. 3mks
d) Describe how you can automatically kern a pair of characters. 4mk
MARKING SCHEME
Page 39 of 140
Computer Studies
SAMPLE PAPER 3
451/1
SECTION A. ( 40 MKS)
1. - Input devices
- Output devices
- Processing devices
- Storage devices
- Connecting devices
2. This is the preparing of a disk to store information / data ( 1mk)
3. a)
( 1mk)
b)
(1 mk)
4. Start button- this is on the extreme left end with a word start together with a Microsoft logo. It is
used to access programs as well as shut down the computer.
Task Manager – this is the middle part of the bar which displays any task / program that is
running
System tray- this is the right most part which bears the system clock
6. a) Real data type is a number with a fractional part / a decimal part while an integer is a whole
number without a fractional part
Page 40 of 140
Computer Studies
7. b) A source code is the program code written in a certain programming language which is yet
to be compiled / translated, whereas an object code is the binary translation achieved after
compiling a source code.
8. - Straight changeover
- Parallel changeover
- Phased changeover
9. - Number of people / users it can support at a given time
- Number of tasks / activities it can run at a given time
- The kind of interface it presents to the user
10. i) Automatic carry over to the next line of a word that does not fit at the end of a line hence
avoiding breaking up of words
ii) A feature used to enlarge the first letter of a paragraph so that it drops to cover 2 to more
lines in the paragraph.
11.
2 45 1
2 22 0
2 11 1
2 5 1
2 2 0
2 1 1
Hence 4510 1011012
12. a) A formular is constituted / constructed by the user while a function is a ready to use
formular
that comes with the program .
b) It counts the number of occurrences of the word “Eggs” in the range A10 to E10.
Page 41 of 140
Computer Studies
c) This is a key which explains the colour used in charts what it means. (Clear explanation 1mk)
13. a) -Flat files
- Hierarchical model
- Network model
- Relational model
- Object oriented model.
b) Format- determines the order information appears on the screen / printed.
Default value- a value that appears automatically in the datasheet or form if nothing is
entered by the user.
14. a) Adobe Page Maker
- Corel Draw
- Microsoft Publisher
- Ventura
b) A paste board is a large blank area where you place text and any graphical objects for the
purpose of rearranging them neatly before placing them on the printable area.
A printable area looks like a page surrounded by margins found on the pasteboard. Any text
or object found / placed here will be printed out.
Page 42 of 140
Computer Studies
SECTION B ( 60MKS)
(Question 16 and any other 3 questions)
17. a)
Start
No
Age
18?
Young
Yes
Adult
Page 43 of 140
Computer Studies
End
b) Looping executes the same block of code( module) again and again until a certain condition
is fulfilled,while selection execution of a statement(s) depends on a condition that returns
true or false ( yes / No) (well explained 2mks)
c) i) Documentation
ii) Testing and Debugging
iii) Program Design
iv) Implementation
d) - Assemblers
- Compilers
- Interpretors
17. a) i) Satellite ( 1mk)
ii) A – satellite in space
B- Downlink
C- Uplink
D- Receiving earth station
iii) -Eliminates the need to keep on moving the parabolic dish in a bid to track the line of
sight.
- It offers a large constant line of sight to earth stations
- The satellites transmits the signal to many recipient earth stations forming a
point-
to multipoint transmission.
b) - LAN
- MAN
- WAN
Page 44 of 140
Computer Studies
c) i) A hub also called a concentrator connects computers on a network enabling the relay of
signals from one computer to another on the same network.
ii) A switch forwards a packet directly to the address node ( a data terminal equipment
e.g. work station) without broad casting.
18. a) - Pointing
- Clicking
- Double clicking
- Drag and drop
b) Group Example
Function Keys F1, F5
Number Keys 1, 9
Alphabet Keys A, Z
Special Keys Esc, Enter
Screen Keys Pg up, scroll lock
Numeric key pad NumLock, 1
Page 46 of 140
Computer Studies
SAMPLE PAPER 4
COMPUTER STUDIES PAPER 1
451/1
Page 47 of 140
Computer Studies
8. Computer hardware components consists of control unit(CU), main memory(MM), arithmetic and
logic unit(ALU), secondary storage devices, input and output devices. Study the diagram below and
answer the question that follow.
MM B ALU
C D
(3mks)
FORMULA IN C10 FORMULA IN F15
=A5*B5
=A$5
Page 48 of 140
Computer Studies
=4*B$6
16. A programmer uses program design tools to design a program that can list the odd numbers between
0 and 100.
Page 49 of 140
Computer Studies
ii). Explain why using an ISDN connection to the internet eliminates the need for a modem.
(1mk)
iii). State THREE forms of communication that can be transmitted by an ISDN line.
(3mks)
18. a). (i) What is data privacy? (1mk)
ii). Give FOUR provisions of the Data Protection Act of 1984 regarding personal data.
(4mks)
b). List FOUR factors to be considered when choosing a data processing mode. (2mks)
c). (i) What is an expert system? (1mk)
ii). State TWO advantages and TWO disadvantages of using expert systems.
Advantages (2mks)
Disadvantages (2mks)
d). Explain the following terms as applied in internet communication.
i). Search Engine. (1mk)
ii). Uniform Resource Locator (URL) (1mk)
iii) Domain name (1mk)
19. a). List TWO characteristics of good information. (2mks)
b). (i). What is a database management system? (1mk)
ii). State and explain THREE database models. (3mks)
c). Describe the following types of files.
i). Master file. (2mks)
ii). Backup file. (2mks)
iii). Transaction file. (2mks)
d). Explain the file organization methods given below.
i). Serial. (1mk)
ii). Indexed sequential. (1mk)
iii). Random. (1mk)
20. a). Explain what is achieved by the following Dos commands. (2mks)
i). C:\>TYPE Class.dat
ii). C:\>DEL *.Doc
iii). A:\>COPY *.* C:\PRACTICE
iv). D:\>DIR M*.EXE
Page 50 of 140
Computer Studies
b). (i). Identify and explain TWO types of network topologies and for each, give TWO
advantages it has for its users. (6mks) ii).
Convert 39.7510 to binary. (4mks)
c). State and explain THREE types of program translators. (3mks)
Page 51 of 140
Computer Studies
MARKING SCHEME
SAMPLE PAPER 4
451/1
SECTION A
4. - License agreement
- Warranty
- User manual
- Reference guide
- Quick reference guide (1x3=3)
Page 52 of 140
Computer Studies
6. In serial transmission, bits are send one at a time over a single transmission line from
source to destination while in parallel, a group of bits are send at once over separate
lines (1x2=2)
7. a) Source code refers to the program in its original language either assembly or high
level while object code is the machine code equivalent ( ½ x2=1)
b) Machine language represents data and instruction in binary codes while assembly
language uses mnemonic codes to represent a computer operation
( ½ x2=1)
9. a) An error occurred during transmission as the total number of ones received are an
even number (1mk)
b) Transmission had no errors since the total number of ones form an odd number
(1mk)
11. a) i) Word wrap is a feature which enables text to automatically flow to the next
line if the end of the current one is reached (1mk)
Page 53 of 140
Computer Studies
b)
FORMULA IN C10 FORMULA IN F15
=A5 * B5 =D10 *E10 1 mk
13. a) Employees working from home through interlinked computers other than going to
office
(1mk)
b) - Management may fear difficulties of controlling a work force that is not in
office
- It is difficult to ensure that the involved staff fully understands the goals of
the organization and be loyal to it
- Employees may feel isolated and miss the social working environment
- It is difficult for employees to work in teams or even find help
- Some teleworkers may find it difficult to separate home from work
(1x3=3)
b) Advantages
- Information collected is reliable and accurate
- It is a good method for intensive investigation
Page 54 of 140
Computer Studies
SECTION B
16. a) i) Start Marks award
Odd=1 * Start/ stop – 1 mk
Repeat Repeat/ until -1 mk
Write odd correct statements -3 mks
Odd= Odd+2 *Also accept use of other control statements
Until odd =99 such as while…DO
Stop
ii)
Start
Odd = 1
Page 55 of 140
Stop
Computer Studies
Write odd
Odd = odd + 2
NO
Odd
99 YES
1 mark for each correct symbol and procedure in the symbol (1x 6=6)
Page 56 of 140
Computer Studies
ii) An ISDN line is capable of automatically accepting and converting digital signals to
analoge before transmission ( 1mk)
18. a) i) The act of making individual data accessible only to its owners and those permitted
(1mk)
ii) - Should be obtained and processed fairly and lawfully
- Personal data should be held for specified purposes
- Should not be used for any other reason other than the original purpose
- Personal data should be relevant and adequate
Page 57 of 140
Computer Studies
c) i) A computer program which performs tasks that would otherwise require skills of
a human expert if done by people (1mk)
Advantages
- The knowledge is always available
- It works faster
- Its decisions are based on logic and issues of emotions does not arise
(1x 2=2)
Disadvantages
- It is flexible as it may not take into account exceptional circumstances
- Human experts using it may tend to be over reliant on it
- Expensive to buy, install and maintain (1x2=2)
d) i) A program that enables one to search for particular information on the internet
(1mk)
ii) Specifies standard addresses for web pages or other devices on the web or internet
(1mk)
iii) Specifies the name of the file server on which the web resource is held(1mk)
Page 58 of 140
Computer Studies
b) i) A program that manages the storage, manipulation and access data from the data base
(1mk)
ii) Network: Data is represented as a collection of records and relationships joined by links
Hierarchical: Data and relationships among data are represented by linked records which
are organized as a collection of trees
Relational: Data is held as a collection of tables
Files: Data items are stored sequentially in one large file (1x3=3)
( Stating ½ mk
( Explaining ½ mk
c) i) A file that holds permanent data in an organization against which transactions are
processed (2mks)
ii) A file created from existing master files to store duplicate copies that can be used
to restore the original file in the event of loss or damage (2mks)
iii) A file that holds temporary incoming and outgoing data in an organization for a given
period of time (2mks)
d) i) Records are written onto the disk in the order in which they come with no
regard for sequence (1mk)
ii) Records are arranged on disk in sequence with an index added for easier access
(1mk)
iii) Records are arranged on disk randomly with no obvious relationships among them
(1mk)
20. a) i) Displays contents of the file class data on the screen
ii) Deletes all files with Doc extension from drive C
ii) Copies all files from drive A irrespective of their file extensions to a directory
in drive C called PRACTICE
Page 59 of 140
Computer Studies
iii) Displays all files in drive D whose names begin with M and have extension
EXE ( ½ x4=2)
Advantages
- If a cable for one computer fails, it does not affect the rest
- Performance is consistent even if the network is being heavily used
- Easier to add new work stations
- Passing of messages within the network is more
- Secure (1x2=2)
Bus topology: All work stations on the network share the same transmission medium
called a bus (1mk)
Advantages
- Relatively cheaper and easier to install as it requires the least amount of cable
- Easier to add new work stations without disrupting the network
- Failure of one computer does not affect the others on the network
(1x2=2mks)
c) Compiler: Translates a program written in a high level language to its machine code equivalent
Assembler: Translates a program written in assembly language to its equivalent machine code
Interpreter: Translates and executes high level language statements immediately they
are encountered (1x3=3)
Page 61 of 140
Computer Studies
SAMPLE PAPER 5
COMPUTER STUDIES PAPER 1
451/1
SECTION A (40 MARKS)
Answer all the questions in this section.
SUM = SUM + N
Yes
COUNT <
N
=10?
No
1. Write a pseudo code for the above flow chart. (2 mks)
2. Differentiate between optical andsum
magnetic scanning techniques used for input and give two examples
in each case. (2 mks)
3. Name the three main types of human computer interface. (1 ½ mks)
4. Distinguish between a folder and a subfolder. (1 mk)
5. Draw an illustration of a USB port and explain its function. (2 mks)
6. Differentiate between parallel and serial port interface cables. (1 mk)
7. a) Explain the following storage disks
i) Zip disks
ii) Jaz disks 1 mk
b) Give four examples of optical disks. (2 mks)
8. What do you understand by the following terms: 1 ½ mks
i) Industrial espionage
Page 62 of 140
Computer Studies
13. Windows operating system provides the use of tool to help in managing storage devices and media.
Distinguish between the following terms: 1 ½ mks
i) Disk defragmenter.
ii) Partitioning a disk
iii) Compressing.
14. a) Give two reasons for partitioning a disk. 1 mk
b) List two main types of desktop publishing software. 1 mk
c) Name any four database models. 2mks
15. a) Differentiate between functions and formulae. 1mk
b) Name four basic types of data used in a spreadsheet 2 mks
c) Differentiate between: 1 ½ mks
i) Cell referencing
ii) Relative references
iii) Absolute referencing
Page 63 of 140
Computer Studies
i) Simplex
ii) Full duplex
iii) Duplex
19. a) Describe the following careers in the computing field. 3 mks
a) Computer Engineers
b) Software engineers
c) Computer technician
b) Identify any three duties of an information system manager. 3mks
c) Giving an example, mention three categories of places where you can advance your computer
skills after sitting for your K.C.S.E. 3 mks
d) Mention any four formatting features used in Ms Word application. 2 mks
e) Define the term electronic spreadsheet. 1 mk
f) Explain the following terms as used in Ms Excel spread sheet package. 3 mks
i) Range
ii) What if analysis
iii) Automatic recalculation
20. a) Define the term information system. 1 mk
b) Outline three circumstances under which an organization may want may want to develop
a new information system. 3mks
c) List down any six characteristics of a system. 3 mks
d) Describe the term data processing. 1 mk
e) Outline five qualities of good information. 2 ½ mks
f) List three file organization methods in a computer. ½ mk
g) Briefly describe the following type of computer files. 3 mks
Page 65 of 140
Computer Studies
i) Master file
ii) Transaction file
iii) Back up file
MARKING SCHEME
Page 66 of 140
Computer Studies
SAMPLE PAPER 5
451/1
SECTION A 40MKS
1. For count – 1 to 10 Do
PRINT “ Enter a Number (N)’
INPUT N
Sum = Sum + N
END FOR
Display sum 2mks
Optical
2. These types of scanners capture data using light
A special type of concentrated beam of light is passed over the object, image or text which need
to be entereed inside the computer. The scanner converts it into digital form example
Optical mark recognition (OMR)
Optical bar recognition (OBR)
Optical character recognition (OCR) (1mk)
Magnetic scanner
Capture data by using magnetic technology
i.e. magnetic ink character recognition (MICR)
Magnetic strip recognition (1mk)
4. A folder is a named storage area where the user can store related files to enable easy access
½ mk*UG*
Page 67 of 140
Computer Studies
Sub folder – this is whereby a large folder is divided into smaller units called subfolders
Subfolder is within another folder ½ mk
5.
7. Zip disks
They are high capacity disks that resemble the floppy disks. They are slightly larger and thicker
in size .It can hold as much as 250MB ½ mk
Jaz disks
They are small portable disks with high storage capacity of about 1 GB to 2Gb.They are used to
store data that require large storage
Page 68 of 140
Computer Studies
8. i) Industrial espionage – Spying on your competitor to get information that you can use to counter
or finish competitor. The aim is to get ideas on how to counter by developing similar approach or
sabotage. ½ mk
ii) Eavesdropping
-Tapping into communication channels to get information ½ mk
iii) Surveillance
This is keeping of a profile of all computer activities done by another person ½ mk
9. (i) Surf / browse- It is the process of accessing internet resource like the web page and website
i) Hyperlink
It is a text on picture on an electronic document especially webpage that cause other web pages
to open when the link is clicked ½ mk
b) i) It regulates power from a unstable power source to the required stable voltage by eliminating surges
and blow outs ½ mk
ii) It temporarily provides power to the computer in case of sudden power failure ½ mk
10. i) Manual
ii) Mechanical
iii) Electronic ½ mk
b) Internet is a large network of networks that covers the whole world and enables millions of
computers from different organizations and people to communicate globally
1mk
c) World wide web
Electronic mail
Electronic commerce
Electronic learning ½ mk each
11.a) Microwave
Page 69 of 140
Computer Studies
Satellite
Radio transmission ½ mk each
b) Fourth generation
Make programming an easier task by presenting the programme with more programing tools i.e.
buttons, form e.t.c The Program selects graphical objects on the screen called control and uses them
to create design or a base form .Also application generator can work behind the scene to generate
necessary code. ½ mk
15
12.a) 10 - 810 binary form
Add
000001112 = 7 10 Ans ½ mk
Total 2 mks
Page 70 of 140
Computer Studies
Object code
Refers to the program code that is in machine readable ½ mk
Translator
Refer to language processors such as assembler, interpreters and compilers that counts the
source program into object code ½
mk
13. Disk Defragmenter- It is a tool used to rearrange scattered folder and files on a storage media in
order to speed up access to files and folders ½ mk
Partitioning a disk- Refers to the process of dividing a large physical disk into two or more
portrons called logical drives, and then they can be accessed as if it is a separate disk thus creating
more space.
½ mk
Compressing
Compressing storage media contents to fit in smaller space helps to create more free space on the
media
½ mk
14.a)1. When the user intends to install more than one operating system on the same disk install each other
on a separate partition ½ mk
2. For the purpose of backup on the same disk but different function, so that if one partition fails, the
others will be still working ½
mk
Page 71 of 140
Computer Studies
b) Graphical based ½ mk
Layout based ½ mk
c) Flat file
Net work
Hierachical
Relational ½ mk each
15.a) Functional are inbuilt predefined formula that the uses quickly uses instead of having to create a
new one each time a calculation has to be carried out ½
mk
Formular are user defined mathematical expressions that create relationship between cells and
return a value in chosen cells ½
mk
b) Lables
Values
Formulae ½ mk each
Functions
ii) Relative
This is when performing tasks that require referencing, you can use formulae whose cell referencing
keep on changing automatically depending on their position in the worksheets. ½ mk
d) Data Integrity
Refers to the accuracy and completeness of data entered in a computer or received from the
information system .It is measured in terms of accuracy, timelines and relevance of data ½
mk
e) Transcription errors
Occur during data entry such errors include misreading and transposition error ½ mk
Transposition errors
Incorrect arrangement of character i.e. putting characters in the wrong order 396 instead of 36g
g)i) Audit tail
This is a careful study of an information system by experts in order to establish or find out all the
weakness in the system that could lead to security threats and weak access point for orimestews ½
mk
ii) Data encryption
This is protection of data from being tapped listened or copied by mixing if up into a form that only
the sender and receiver can be able to understand ½ mk
SECTION B 60 MKS
16.a) Flowchart
(8mks)
Start
Read category
Page 73 of 140
Computer Studies
Category =
A? Y
Read order
N
Read repayment
N Order
10,000
N ?
Repaymen Disc = 0.2 x order
t = Good ? Y
Disc = order x 0.1
Disc = 0.15 x order
Y
Disc = 0.3 x order
Stop
7 mks
Start
Start
Get student
name
Get student
marks
Completed
Average Page 74 of 140
All
Print Student?
Calculate
reportAverage
pass
50%
End
Computer Studies
No
Yes
NO Print fail
Yes
Page 75 of 140
Computer Studies
- Star topology
- Bus topology
- Ring topology
- Mesh topology
- Tree / therarchical topology (1 x
3mks)
c) Fucntions of network operating system.
- Provides access to network resources
- Supports interprocess communication
- Enables nodes on the network to communicate with each other more efficiently
- Respond to requests from application programs running on the network
- Support network services like network card drivers and protocols
- Implementing networks security features (1x 4
mks)
d) i) E-mail
- This is the exchange of electronic letters, data and graphics on the internet (1mk)
ii) E-commerce
- This is a business strategy where goods and services are being sold over the internet .
- There is no physical, interaction between seller and buyer (1mk)
iii) E-learning
- This is learning through interaction with special programs on the computer.(1mk)
e) Ways of reducing piracy
- Enact laws that protect the owners of data and information against piracy
- Make software cheap enough to increase affordability
- Use licenses and certificates to identify originals
- Set installation passwords that deter illegal installation of software
(1x4)
18.a) Data communication
- Refers to the process of transmitting data signal from one point to another through
the network
(1mk)
b) i) Bandwidth
Page 76 of 140
Computer Studies
- This is the maximum amount of data that a transmission medium can carry at any
one time
(1mk)
ii) Attenuation
- This is the decrease in magnitude and energy as a signal progressively moves along a
transmission medium.
(1mk)
c) i)LAN
- Local area network is a computer network that spans a relatively small geographical
area like in one building or a school. Usually owned by an organization
(1mk)
ii) MAN
- Metropolitan area network is a network that cover a medium – size geographical area
like a town or a city
- They cover a radius of approximately 10km and have data rates of 100 mbps
(1mk)
iii) WAN
- Wide area networks cover unlimited geographical areas e.g. across states, entire
country or the whole world.
- Consists of many LANS and MANS connected together
(1mk)
iii) College – Institutes e.g. Rift valley and private colleges e.t.c
(1x3)
d) Formatting features
- Changing fonts (type, style and size)
- Changing text colour
- Underlining
- Bolding
- Italising ( ½ x 4)
(2mks
e) Defn. of electronic spreadsheet
- An electronic spreadsheet is an application software consisting of a series of rows
and columns that form cells and are used for the manipulation of numeric data
(1mk)
f) i) Range
- A range is a rectangular arrangement of cells specified by the address of its top left
and bottom right cells, separated by a colon(: ) e.g. (A1: B8)
(1mk)
ii) “What if” analysis
- This involves changing the value of one of the arguments in a formula to see the
difference the change would make on the result of the calculation
iii) Automatic recalculation
- This is a feature in electronic spreadsheet which automatically adjusts the result of a
formula if the values in worksheet are changed
(1mk)
20. a) Definition of information system
- An information system is an arrangement of people, data processes and information
that work together to support and improve the day-to-day operations in a business
and the decision making process
(1mk)
b) Reasons for developing a new information system
i) New opportunities- A chance to improve quality of internal processes and services delivery
in the organization
Page 79 of 140
Computer Studies
ii) Problems – Undesirable circumstances that prevent the organization from meeting its goals
iii) Directives - new requirements imposed by the government, management or external
influences
1x3 (1 mk each)
c) Characteristics of a system
- Is made up of various components which must work together as a unit to achieve its overall
goals
- Is made up of different sub-systems
- Has a space or boundary within which the components operate.
- Has a particular task to perform
- Transforms or process data from one state to another.
- It decays naturally over time due to improvement in technology
- It communicates with its environment by receiving inputs and giving outputs.
- It can receives input from and gives output to the environment or not. i.e (its either open or
closed system) ½x6
(3mks)
d) Data processing
- These are activities that are concerned with the systematic recording, arranging, filling,
processing and dissemination of facts relating to the physical events occurring in the
business using data processing aids such as computers
(1mk)
e) Qualities of good information
- Must be relevant for the intended purpose
- Must be accurate and comprehensive
- It is obtained from a reliable source
- It is communicated to the right person and in time
- it is understandable by the user ( ½ x 5) (2 ½
mks
f) File organization methods
- Sequential
- Random
- Serial
Page 80 of 140
Computer Studies
Page 81 of 140
Computer Studies
SAMPLE PAPER 6
COMPUTER STUDIES PAPER 1
451/1
SECTION A (40 marks)
Answer all questions in this section
1. State three classifications of micro computers when classified according to size. (3mks)
2. Give three main advantages of using computers for data processing functions over other types of office
and business equipments (3mks)
3. (a) What is disk partitioning? (2mks)
(b) Give two reasons for partitioning a disk. (2mks)
4. Give a reason for each of the following hardware considerations when selecting a computer system
(4mks)
(i) Processor speed.
(ii) Warranty.
(iii) Upgradeability and compatibility.
(iv)Portability.
5. Outline the functions of the following utility software (3mks)
(i) Loaders.
(ii) Debuggers.
(iii) Linkers.
6. Draw a diagram to illustrate the following. (3mks)
(i) USB Port.
(ii) Serial Port.
(iii) Parallel Port.
7. A computer operator in your school wanted to print a document but the printer could not print yet the
online light is on and the printer paper is correctly placed. Give the other possible reasons why the
printing process failed. (2mks)
8. Differentiate between office and magnetic scanning techniques and give two example of each.
(4mks)
Page 82 of 140
Computer Studies
16. You have been asked by a standard four mathematics teacher to generate a list of even numbers
between 0 and 201.
(a)
(i) Write a pseudocode used to solve this problem. (6mks)
(ii) Draw a flow chart for the program above. (5mks)
(b) List four data types used in structural programming. (4mks)
Page 83 of 140
Computer Studies
(ii)...................................................................................................................................................
(iii) .................................................................................................................................................
19. (a) Differentiate between a formula and a function as used in Excel. (2mks)
(b) What is the effect of the following function?
COUNTIF (A5:D5,”orange”). (2mks)
(c) The first column in the table below contains the formula stored in all C10 of a spreadsheet.
Enter the formula as they would appear when copied to cell F15 of the same spreadsheet.
(3mks)
FORMULA IN C10 FORMULA IN F15
=A56*B5
=A$5
=4*B$6
(d) (i) Explain the concept of distributed databases.
(2mks)
(ii) State two advantages of distributed databases. (2mks)
(e) Outline two uses of forms in database design. (2mks)
(f) List any two word processor software. (2mks)
20. (a) Indicate the method of file access for the following file organization methods. (2mks)
Page 85 of 140
Computer Studies
MARKING SCHEME
SAMPLE PAPER 6
451/1
1.
(i) Desktop computer
(ii) Laptop computer
(iii) Palmtop computer / notebook. (3mks)
2.
(i) Computers process data faster
(ii) Computers are more accurate
(iii) Computers are more efficient. (3mks)
3.
(a) This is the process of dividing a large physical disk into two or more partitions called logical
drives (1mk)
(b) (i) The user may intend to install more than one operating system on the same disk.
(ii) For purpose of backup on the same disk but different partitions.
4.
(i) A good computer must have high processor speed. (1mk)
(ii) It is important to understand the terms and conditions of after selling a product in case of failure
or malfunction that is whether the seller is ready to provide after sales services.
(1mk)
(iii) The best convention would be to buy a computer that can easily be upgraded to
accommodate emergent technologies. (1mk)
(iv)Smaller computer enhances mobility. (1mk)
5.
(i) Help in transferring an application from a secondary storage to a primary storage when running
the application. (1mk)
(ii) Help in tracing and removing errors from a program. (1mk)
(iii) Linkers enable several programs (modules) to subroutines to be connected when running
(1mk)
Page 86 of 140
Computer Studies
6.
(a)
(b)
(c)
7.
(a) Set a printer as a default.
(b) The printer may have been configured to the wrong port.
(c) Check the picking mechanism of the paper.
(Award 1 mark for each correct answer)
8.
(a) Optical scanners capture data using the principle of light. (1mk)
Examples - Optical mark recognition. (½mk )
- Optical bar recognition (½mk )
- Optical character recognition (½mk)
(b) Magnetic scanners capture data by using the principle 2 magnetism.
Examples – MICR (½mk )
- Magnetic strip recognition (½mk )
9.
(i) Displays al files in drive D whose names begin with P and have extension EXE.
(1mk)
(ii) Format drive A.
Page 87 of 140
Computer Studies
10.
(i) Command line interface. (1mk)
(ii) Menu driven interface. (1mk)
(iii) Graphical use interface (1mk)
11.
(i) It is a feature which enables text to automatically flow to the next line if the end of the current
one is reached. (1mk)
(ii) Thesaurus is a feature used to find synomus and autonymus. (1mk)
12. Telecommuting is a term used to refer to a situation where an employee works usually at home using a
computer connected to the workplace network. (1mk)
13.
(i) Source program refers to the program written in its original language (source code) either
assembly or high level. (2mks)
(ii) Object code is the machine code equivalent. It is the program in compute language.
(2mks)
14.
(a) Transforming of raw data to finished waited information. (2mks)
(b) Stages through which data passes before it becomes the finished and wanted information.
(2mks)
15.
Authenticity
Documentation
User needs
Reliability
User friendliness
Cost
Compatibility and system configurations
Portability
(Any correct answer award 1 mark)
1 x 4 = 4mks
Page 88 of 140
Computer Studies
SECTION B
16.
(a) Program Even numbers (input, output):
{Program used to generate even numbers between 0 and 201}
Var
Begin, ½mk
Even = 2 1mk
Repeat 1mk
Write even 1mk
Even = Even + 2 1mk
Until Even = 200 1mk
End. ½mk
* Also accept
use of other
control
structures such
as While… DO
(b) )
½
Page 89 of 140
Computer Studies
1
1
1
1
½
Page 90 of 140
Computer Studies
Disadvantages
Expensive and time consuming.
Interviews are difficult to prepare and organize.
The interviewee may be reluctant to answer some questions.
Subjective.
18.
(a) A computer program which performs tasks that would otherwise requires skills of human expert
if done by people. (2mks)
(b) (i) A robot is a computer controlled device usually in form of mechanical and is used to
manipulate objects. (2mks)
(ii)
They are accurate
They work under hazardous conditions
They can perform a wide variety of tasks
Are quite efficient
Are fast
Cannot get tired nor bored.
(Any correct answer award 1mk) 4mks
(c) (i)This is a person who is skilled in designing and developing computer components.
(d) (i) This is a person who is skilled in software development and technical operation of computer
hardware.
(ii) These are skilled persons who maintain, upgrade and repair computers to ensure that all the
devices are good working condition.
(iii) This is a person skilled in writing programs in high level language. (1mk)
Page 91 of 140
Computer Studies
(iv)System analyst whose responsibility is to design a new system, team up with programmers
to ensure smooth coding and carries out system review and maintenance.
(1mk)
(e)
(c)
FORMULA IN C:10 FORMULA IN F:15
= A5*B5 = D10 * E10
=A$5 =D$5
=4*B$6 =4 * E $ 6
(d) This is where database are created for different departments in an organizations in different
computers that are networked (2mks)
(ii) - Searching of items is fast. (1mk)
- No interference of other departments data (1mk)
(e) - used to enter data into tables.
- Display data from tables and queries.
(f) - Ms word
- WordStar
- word perfect etc
Page 92 of 140
Computer Studies
(d) This is the way in which computer and other devices have been arranged or how data is passed
from one computer to another. (2mks)
(e)
Star topology (½)
Bus topology (½)
Mesh topology (½)
Page 93 of 140
Computer Studies
SAMPLE PAPER 8
COMPUTER STUDIES PAPER 1
451/1
SECTION A (40marks)
1. Explain the following terms as used in information Technology with reference
to software purchase:-
i) User friendliness ( 1mk )
Refers to how easy the software is to use for the user.
ii) Authenticity ( 1mk )
The genuinessess , validity and / or legitimacy of the software.
2. In system development testing is one of the critical stages. Give three reasons
why the testing phrase is critical to the systems developer. ( 3mks )
- Helps to ensure that the logical and physical designs and environment are to the
users satisfaction
- Helps to detect and correct errors.
- Gives proof to those skeptical about the working of the system
- Helps to establish how the system works under various conditions allowing for full
description of the system capabilities.
3. Give three ways in which a magnetic tape differs from a magnetic disk
Magnetic disk Magnetic tape
-Tracks are concentric - Tracks are parallel and located lengthwise
-Move only in one play direction - Move in two directions( forward and
Backwards)
- Do not come in control with the read - Comes in contact with the read/ write
/ write head heed
- Have shorter access time - Have longer access time
Page 94 of 140
Computer Studies
6. State any two differences between function keys and special keys of a keyboard.
( 2mks )
Function keys Special keys
- Normally used single to execute a task. - Normally used in combination with
other
Keys the execute a task.
- Initiate frequently done task to occur - Give special instructions to the
computer.
7. i) Give any two differences between margin guides and column guides as used
in desktop publishing ( 2mks)
- Column guides help to divide the pages into columns that make the
publication look more organized and are witin a page, a normally pink
coloured while margin guides are around the edges of the printable page and
are normally blue in colour.
ii) what does the gutter in a word processor mean in relation to column settings? ( 1mk)
8. State any three advantage of using microwaves to transmit data. ( 3mks)
Page 95 of 140
Computer Studies
13. State any three reason why computers are a much more preferred machine to use
in an office and business than other office machines. ( 3mks )
- computers process data faster
- computers are more accurate
- computers are more efficient ( they utilize minimum resources to process data)
Page 96 of 140
Computer Studies
14. State any three factors to consider when preparing a computer laboratory ( 3mks)
SECTION B
16.a) i) State any two advantage of low level languages. ( 2mks )
- no translation
- processor execute them faster
- are stable and hardly crash down once written
ii) Explain in the following terms as used in high level languages.
Capsulation ( 1mk)
- Having data and functions that operate on the data within an object
Inheritance ( 1mk )
- child module based on parent modules takes on all features of the parent
module.
iii) Give any two examples of fouth generation languages. ( 2mks )
Visual basic, delphi pascal, visual COBOL,
Page 97 of 140
Computer Studies
b) Draw a flow chart that would be used to design a program that would evaluate the
value of F using the formula F = (5mks)
Start (1mk)
(1mk)
(1mk)
F = = f1 + f2
f1 + f2
c) From the flow chart developed in part ( b) above write a pseudocode to do the same
task as the flow chart ( 4mks )
Begin
Enter the values of f1 and f2 (1mk)
Calculate F
(1mk) F = f1 + f2 (1mk)
f1 f2
Output F - (1mk)
end
i) Hacking ( 1mk )
- Is breaking into a computer system to look at data, copy or modify data to
which the person has no authority to access.
ii) Tapping ( 1mk )
- Getting access to data while in transmission
b) Piracy is the worst computer crime that is scaring software developers out of
their wits. Suggest any ways that can be instituted to reduce to reduce piracy
( 4mks )
- Enact laws that protect developers of software against piracy
- Make software cheap enough to increase affordability
- Use licenses and certificates to identify originals
- Set installation passwords that deter illegal installation of software
- create install once software.
c) State any four measures that can be taken to detect, prevent computer crimes
and
seal security loopholes. ( 4mks )
Page 99 of 140
Computer Studies
- Audit trail
- Data encryption
- Log files
- Firewalls.
18. a) Network software comes in two main categories. Name them ( 2mks )
- Network operating system
- Network protocol
b) ( i) state any five unique network operating system software functions (5mk)
- Provides access to network resources
- Enable nodes to communicate with each other more efficiently
- Supports network services like network card drivers and protocols
- Implementats network security features.
19.a) Complete the table below that classifies errors that influence the accuracy of
data input and information output into / from a computer system ( 5mks )
ERRORS
work he has to install it with an operating system. State any six factors to consider
when choosing the operating system ( 6mks )
1. Hardware configurations ( memory size, type of processor; speed )
2. Basic design of the computer e.g IBM or IBM compatible or apple
3. Applications intended for the computer
4. User friendliness or human computer interface
5. Availability is the market
6. Lost
7. Reliability
b) With reference to disk management explain what is meant by the terms below.
i) Formatting ( 1mk)
- Preparing disks for data storage by creating sectors and tracks on the disk
surface.
SAMPLE PAPER 8
761430724973
9 OLESAN 17 180
10 MOSES 33 700
Use the following expressions to answer the questions that follow
ii Noise
iii) Attenuation
iv) Frequency (4mks)
c) State two advantages of and two disadvantages of wireless communication (4mks)
d) List down one major advantage of networking. (1mrk)
MARKING SCHEME
SAMPLE PAPER 8
451/1
1. i) Type of ROM once written by the manufacturer its contents cannot be deleted
ii) Type of Rom whole contents may be erased by exposing it to ultra violet light
2. i) To co-ordinate the activities of the computer system during the execution of a
program
ii) performing the operations like data transfer arithmentic calculations and decision-
making.
iii) State of instructions and data needed by the program currently being processed
3. a) Programming language that uses binary codes i.e. 1s and 0s
b) A low level programming language uses binary codes as processing codes while
high level programming languages uses mormonics i.e English like statements as
instructions.
4. a) - Suitable for handicapped people.
- Fast and easy method
b) - Printer port
- USB port
- Communication port
0010001
Page 109 of 140
Computer Studies
1s compl. 1101110
Add 1 +1
11011112
12. i) Algorithm is a set of rules used to solve a given task .Wrongly designed rules will
result to errors when executed.
ii) Transposition errors result from incorrect arrangement of characters e.g. writting 396
instead of 369
13. It provides Internet services and Internet communication.(Internet services provider)
14. a) When text automatically re-adjust itself to the next line.
b) - Microsoft word
- Word pad
- Word pro
- Omin – pro etc
Start
X,Y
No
YX
YES
Y = largest X = Largest
Stop
c) i) D2: _
= B2 X C2
ii) E4:_
= 10 % x D4
iii) F10:_
= D10 + E10
iv) H5 :_
= 20% X F7
d) i) – F2 key when pressed
- Using the formular bar
- Double clicking bar containing the data and editing
ii) Through the sending of E- mails to people to warn them watching of
videos(edvative ) in schools to advocate the young ones against dangers
19. START
PRINT “Enter 2 numbers X and Y”
INPUT X,Y
IF Y = 0 THEN
PRINT “ Error ! Division by zero”
ELSE
Quotient = X/Y
END IF
STOP
Start
X,Y
YES
Y =0
NO
ERROR :“DIVISION BY O”
QUOTIENT = x/y
Quotient
Stop
HUB C
A C
B D
D A
HuB
B C
b) i) Cross talk:
When two frequencies intercross one another
Page 115 of 140
Computer Studies
SAMPLE PAPER 9
COMPUTER STUDIES PAPER 1
451/1
SECTION A (40MKS)
ALL QUESTIONS IN THIS SECTION
1. Give any two differences between fourth and fifth computer generations (2mks)
2. List three ways in which computers are used in education. (3mks)
3. a) Define the term booting (Imk)
b)Explain the difference between cold and warm booting. (2mks)
4. State the use of
a)Tab key (Imk)
b) home key (Imk)
5. Distinguish between
(a) Web master and web designer ((Imk)
(b) Parallel and serial cables (Imk)
6 a) Define a computer memory (Imk)
b) Give three examples of special purpose memories (1 ½ mk)
c) Explain the difference between logical and physical files ( 2mks)
7. Perform the following binary operations giving your answer in decimal
a) 11101.11
11111.11 + (2mks)
b) 1111.11
1101.01 - (2mks)
8. a) What is search engine ? (lmk)
b) State three examples of search engine (1 ½ mks)
9. a), identity the program control structures represented by the flowchart segments above
i. ............................................... (1 mk)
i) Employees who have worked for the company for more than five years receive an additional pay
of 10% to their basic salary
ii) Monthly salary bonus based on monthly sales of air tickets are rated as shown in the table.
Monthly air tickets sales Bonus rate ( %)
Above 50,000 25
Between 25,000 and 50,000 15
Below 25,000 10
Draw a flowchart for a program that would be used to compute the gross salary then output each
employee's basic salary and show all the benefits (9mks).
MARKING SCHEME
SAMPLE PAPER 9
451/1
(1) Fourth generation fifth generation
• high memory capacity - very high memory
• cost high - very cost
• support task operation one after a tia .. - support parallel processing
• not based logical inference operation - make use of artificial intelligence
• make little use of artificial intelligence
(2) Accept
• computer aided instruction (CAM)
• computer assisted learning (CAL)
• e-learning
(3) Booting is the starting up of computer by loading up instruct from the memory
b) cold -starting a computer when power is originally off warm - restarting a computer when
power is originally on.
(4) Tab key is movement of the cursor at a given set intervals of five spaces at end the cursor
position
b) home key moves the cursor to the beginning of current line.
(5) Web designer develops and maintains websites and their serve while a web master is
responsible for all technical aspect of a websites e.g performance issues such as access and
approving sites contents, access rights of contents etc.
b) parallel cables transmits data faster but in a short distance unlike serial slow but transmit
data in long distance.
(6).
(a) is a unit of a computer, instruction.
(b)
• buffers
• registers
• cache memory
(c) Logical files - viewed terms of data items it contain and detail of what processing operation
performed on them.
Physical files viewed in terms of how data is ;a :
7 a) 11101.11
11111.11 +
111101.10
=(61.5)10
b) 1111.11
1101.01 –
10.01 =(2.5)10
8. a) Search engine are special websites that maintain a list of hyperlinks that
enables to transverse from one hyperlink to another when they find a new material.
b) Examples of search engine are
goggle
hotmail
yahoo
Start
Experiences Yes
Bonus =
salary x 10
No
No Bonns 1 = sales *
25/100
Yes Sales
25,000
Bonus = sales
* 10/100 No
Bonus = sales *
15 / 100
No Exit
Yes
Stop
9. Start
Q15(b)
Experience Yes
Bonus = Salary x 10
No
Sales Yes
50,000 >
No
Sales
Yes 25,000<
No
Bonus 3 = sales
* 10/100 Bonus 2 = sales
* 15/100
Stop
a) i) Repeat.. until
ii) For .. Do
iii) If .. Then.. Else
b) In (i) the condition is tested at the end of loop and hence loop statement is executed
once (ii) the condition is tested at the entry of the loop and the program exists if the
condition is evaluated to false.
10. a) = sum (A2:C2)
b) D2 = 1095
11.
a) CAM – Assembly in engineering products / vehicles
b) CAD- designing engineering product and archectural drawings / electrical circuit
board, motherboard , textile pattern design.
c) i) is a set of data items of the same type grouped together using identifiers.
ii) Properties of arrays.
arrays can be of any dimension
arrays can be of a character / integer
array can be puckered where character are packed.
16. a) i) information system is arrangement of people, data process and information that
work together to support and improve operation activities e.g. business and decision
making.
ii) Purpose of information system
Support and enhance information processing and communication.
Help in decision making by collecting operation data analysis, report
generation.
Enhances sharing of information
iii)
New opportunity
Problems
Directives
iv
System development
System operation
d) ` advantages
• flexible in operation
• can cover in a large geographical area
• can access a remote areas via satellites
disadvantages
• it is relatively difficult to establish and configure
• the initial cost is very high
18. a) i) Software engineer
• develop system and application software
• develop user and technical documentation for new software
• maintain and update the software to meet day to day requirement
ii) Computer trainer.
• train people on how to use computers
• develop training reference materials
• guide learners on how to use and acquire knowledge through research.
• Prepare learners with ICT examinations
b) effect of ICT on
i) job opportunities
• job creation i.e. new jobs are created
• job replacement i.e. replacing of computer illiterate people / workers
• displacement of jobs that were formerly manual
ii) environment
• energy
• consumption
• paper consumption
• radiation
• pollution
iii) Automated production
• assembly of vehicles in plants
• oil refineries
• food processing
• increased production
• creation of unemployment
c) Sequential – records are stored and accessed in a particular order sorted using a key
field.
Whereas indexed sequential uses both method random and sequential records are
arranged in key sequence and position marked with indexes
d) • numbering
• bulleting
• spacing
• alignment
• indentation
e) i) 00010110
f) (0010 1001)
Page 128 of 140
Computer Studies
SAMPLE PAPER 10
COMPUTER STUDIES PAPER 1
451/1
SECTION A ( 40 MARKS)
Attempt all questions in this section.
a) $H$5
b) H5
c) H $ 5
13. List three components of a spreadsheet. (3mks)
14. State two documents that are needed during the process of mail merging. (2mks)
15. State any two components of a world wide web. (2mks)
SECTION B ( 60 MARKS)
Answer questions 16 and any other three questions from this section
16. a) Define the following terms as used in programming. (2mks)
i) Assembler
ii) Pseudo-code
b) With the aid of flowchart segments, highlight two differences between the REPEAT….UNTIL
and WHILE…..DO statement structures. (4mks)
c) Give the name and use of the flowchart symbol below. (2mks)
A
A
i) Name …………………………………………………………………………………
ii) Use
d) It is required that numbers from 5 to 100 in the series 5,10,15….100 are multiplied and the
product displayed. Design a flowchart for solving the problem. (7mks)
17. a) The following diagram shows the stages of developing an information system.
REVIEW 7
IMPLEMENTATION 6
CONSTRUCTION 5
DESIGN 4
REQUIREMENT 3
SPECIFICATION
INFORMATION 2
GATHERING
PROBLEM 1
RECOGNITION
i) List any four methods that can be used to achieve the second stage in above. (4mks)
ii) List any four areas that have to be designed at the fourth stage. (4mks)
Page 132 of 140
Computer Studies
CUSTOMER 2 RESIDENCE
CUSTOMER 3
CUSTOMER 2 CUSTOMER 2 ID
CUSTOMER 3 CUSTOMER 3 1D
CUSTOMER 2 SOAP
CUSTOMER 3 TOOTHPASTE
i)
ii)
iii) CLADDING
CORE JACKET
CLADDING
b) State any two advantages of using medium (i) over medium (iii) (2mks)
c) Explain the difference between a bridge and a gateway.
d) Give the use of the following networking devices. (6mks)
i) Network interface card(NIC)
ii) Router
iii) Repeater
iv) Explain the difference between a data Terminal Equipment (DTE) and Data Circuit –
terminating Equipment (DCE) (2mks)
MARKING SCHEME
SAMPLE PAPER 10
451/1
Statements
Statement
No No
Stop
In repeat – until the statements are executed before the condition is tested while in
the while do the condition is tested before the statements are executed .
4 mks
c) i) Connectors
ii) Used to join the logical flow
(2mks)
17. a) i) Study of available documents
- Interview
- Questionnaires (Each 1 mk x 4 = 4mks)
- Observation
- Automated methods
ii) Flowcharts
- Data flow diagrams
- Entity relationship models
- Structured charts
b) Entropy
Controls (Well explained each 2 mks x 2 = 4mks)
c) - Supporting information processing
- Help in decision making
- Enable sharing information (Each 1 mk x 4 = 4mks)
18. a) i) Data entered in a particular column of a record
ii) Features of data e.g. format.
iii) Data of related features / attributes (Each 2 x 3 = 6mks)
b) Many – to – one
One – to – one
Many – to – many
c) i) Database management systems (1mk)
ii) - Keep data / store data
- Process data
- Analyse and output information (Each 1 mk x 3 = 3mks)
d) - Flat model
- Related model
- Hierarchical model 1 x 3 = 3mks
19. a) - Volatile
- Limited
- Very expensive
b) 128 = 16
8 2 = 8 Million nibbles (4mks)
c) i) - Joystick
- Mouse
- Light pen
ii) Digitiser
d) LED
Speakers (3mks)
Monitors
20. a) i) Twisted pair
ii) Coaxial (Each 1 mk x 3 = 3mks)
iii) Fibre optic
b) - Installation equipment is cheap.
- It is readily available in most building (2mks)
c) Bridge – a network device that selectively determine the appropriate network
segment for which a message is meant while a gateway is any device configured to
provide access to wide area networks or internet.
d) NIC- Creates physical link between the computer and the transmission media.
Router – Interconnects different networks and directs the transfer of data packets
from source to destination.
Repeater – boosts a weakening signal (6mks)
e) DTE is any device e.g. a computer workstation on a network, while a DCE ends /
marks the end of physical network circuit. (2mks)