0% found this document useful (0 votes)
26 views13 pages

Comp-1 QNS

This document is a Computer Studies examination paper for Form 4 students, specifically the K.C.S.E Paper 1 Theory for September 2022. It includes instructions for candidates, a breakdown of sections A and B with various questions covering topics such as microcomputer technology, programming, system development, and networking. The paper consists of 13 printed pages and requires candidates to answer all questions in section A and select additional questions from section B.

Uploaded by

isaackombo90
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views13 pages

Comp-1 QNS

This document is a Computer Studies examination paper for Form 4 students, specifically the K.C.S.E Paper 1 Theory for September 2022. It includes instructions for candidates, a breakdown of sections A and B with various questions covering topics such as microcomputer technology, programming, system development, and networking. The paper consists of 13 printed pages and requires candidates to answer all questions in section A and select additional questions from section B.

Uploaded by

isaackombo90
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Name:………………………….……………………… Index Number :………….……....

…………

Adm No. …………..…………… Class …….…………………………………

451/1
COMPUTER STUDIES
Paper 1
THEORY
SEPT 2022
Time: 2 ½ Hours

FORM 4 END OF TERM 2 EXAMINATION


Kenya Certificate of Secondary Education (K.C.S.E)
451/1
COMPUTER STUDIES
Paper 1
THEORY
SEPT 2022
Time: 2 ½ Hours

INSTRUCTIONS TO CANDIDATES
 Answer ALL the questions in section A
 Answer question 16 (compulsory) and ANY OTHER THREE questions from
section B.
For Official Use Only
Question Maximum score Actual score
1-16
17
18
19
20
TOTAL SCORE

This paper consists of 13 printed pages. Candidates should check the question paper to ensure that
all the printed pages are printed as indicated and no questions are missing.

SECTION A: (40 MARKS)

1 TURN OVER.
Answer ALL questions in the spaces provided

1. i) Explain the emerging trends in microcomputer technology in relation to Size (1 mark)

…………………………………………………………………………………………………………

ii) Name four categories of input devices (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

2. State three ways in which computers have been used to fight the spread of corona virus in Kenya.
(3marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

3. A Form four student wants to send a large document to a printer.


a) State the name for the area of memory that the document is sent to immediately from RAM.
(1 mark)
…………………………………………………………………………………………………………
b) As the printer runs out of paper during printing, the operating system sends a signal back to
the computer to stop temporarily. Name this function of the operating system (1 mark)

…………………………………………………………………………………………………………

4. i) Give two advantages of the higher number of pixels per square centimeter. (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

ii) Differentiate between Data interface cable and power cable. (1 mark)
…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

iii) Explain two differences between serial and parallel communication ports of a computer.

2 TURN OVER.
(2 marks)
…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

5. i) What is line spacing as used in word processing? (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

ii) Describe any two line spacing specification used in Microsoft Word. (2 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

iii) Name the two documents used in mail merge. (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

iv). With reference to the concept of graphics as used in Microsoft word. Explain the difference
between object linking and embedding? (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

6. Who am I?

i) Am is skilled in software/program development as per requirement and technical operations of


Computer hardware. I also develop and update both system and application software together with
the associated documentations. (1 mark)

…………………………………………………………………………………………………………

ii) Am is skilled in designing computer hardware and also improves on existing ones. (1 mark)

…………………………………………………………………………………………………………

7. During the COVID 19 pandemic, the government advised the citizens to use electronic funds
transfer and other popular mobile phone money transactions to make payments.

3 TURN OVER.
i) State two ways how the above method of conducting business would help to curb on the spread of
the disease. (2 marks)
…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

ii) What is the meaning of Electronic Funds Transfer? (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

8. Define the term dual booting as used in computing. (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

9. Differentiate between cropping and grouping. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

10. Other than flow chart, state two other tools that can be used to represent an algorithm . (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

11. Differentiate between a deadlock and interrupt as used in operating system. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

12. (a) Securem is a company that deals with providing security services to its clients. Name any two
Ways the company can protect its computer network from hackers. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………
4 TURN OVER.
(b) State four characteristics of a suitable password. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

13. During system development the system analyst should consider the correct requirement
Specifications for the new system. State any four outcomes that may result from using incorrect
requirement specifications. (2 marks)
…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

14. (a) Define the term Computer Aided Design. (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(b) List two advantages of using Computer Aided Design. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

15. Explain two arithmetic errors that may occur during computerized data processing. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

5 TURN OVER.
SECTION B (60 marks)

Answer question 16 and ANY OTHER THREE questions from this section in the spaces provided.
16. (a) Give two examples of syntax errors in programming. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(b) With aid of a diagram, explain the “Repeat Until” construct as used in structured programming

(3 marks)

(c) Classify the following programming languages according to their category: (3 marks)

Programming language Category

HTML

JAVA

JAVASCRIPT

PASCAL

VISUAL BASIC

LISP

6 TURN OVER.
d) Study the pseudocode below and answer the questions that follow.
Start
N=0
X=0
While N < 3
Repeat
X=X+1
Until X < 2
N = N +1
End while
Print N, X
Stop

(i) What will be the output from the program (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(ii) Draw a flowchart that was used to come up with the following pseudo code (5marks)

7 TURN OVER.
17. (a) State the stage in system development life cycle where each of the following activities are
Carried out:

i. Identifying shortcomings of a system. (1 mark)

…………………………………………………………………………………………………………

ii. Preparing the system migration plan (1 mark)

…………………………………………………………………………………………………………

iii. Identifying the technologies that may be used in the proposed system. (1 mark)

…………………………………………………………………………………………………………

(b) State and explain THREE components of an expert system. (3 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(c) E-mail technology has become a very important part of today’s communication. Explain any
three problems associated with using e-mail technology for communication. (3 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(d) Sarafina wants to download her favorite movie from YouTube. State any three factors that
may determine how long it will take her to complete the download. (3 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

e). Most computerized security systems make use of biometric analysis. Name physical features of
human beings that can be considered for this analysis. (3 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

8 TURN OVER.
18. The following Digital Club Member details were to be entered in a database: Name, Date of
registration, Registration fee and Class.

(a) Prepare a suitable structure showing field names and their field types (4 marks)

Field Data type

Name

Date of registration

Registration fee

Class

(b) Name one other field that the Club Patron may need to add to uniquely identify the records
(1 mark)

…………………………………………………………………………………………………

(c) Write the statement that can be used to select members of the class form 3. (2 marks)

Name Date of Registration fee Class


registration

Criteria/
Expression

(d) The following is an extract from a spreadsheet created to manage sales. Use it to answer the
questions that follow.
A B C D

1 ITEM NAME UNIT PRICE UNITS SOLD

2 HDD 300 GB 7,500 2

3 Optical Drive 4,500 8

4 DELL Latitude core i5 44,500 3

5 DDR4 8GB RAM 10,000 4

6 Lenovo Yoga Smart Tab 28,953 1

(i) Write a formula that will compute the number of items whose unit price whose price more than
10,000 (3 marks)

9 TURN OVER.
…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(ii) If the formula =$B2*C$2 was placed in D2, state the output if copied to D3. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(iii) Write the cell referencing used in c(ii) above. (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(iv) Write the data type that is stored in cell C5 and A6 respectively (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

19. a) Define the term attenuation as used in networking and data communication. (1 mark)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

b) The following are figures of networking cables. Identify each. (2 marks)

Figure 1 Figure 3

Figure 2 Figure 4

Figure 1 Figure 2

Figure 3 Figure 4

10 TURN
OVER.
c) (i) Give two examples of network software (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(ii) In a network setup, list any two items that may be referred to as data terminal equipment.
(2 marks)
…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

d) Explain the following terms as used in networking (4 marks)

(i) Remote Communication

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(ii) Distributed processing

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

e) State four functions of a server in a network (4 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

11 TURN
OVER.
20. a (i) Define the term accreditation as used in education. (2marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

(ii) Explain two factors you would consider before enrolling for an ICT course in a College
(2marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

b) Describe three guidelines that should be followed when conducting an interview during
information gathering (3marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

c) Convert the following number systems (4 marks)


37.62510 to binary

12 TURN
OVER.
d) Using Two’s compliment, perform the following arithmetic operation leaving your answer in
decimal.
3910-1910 (4 marks)

*THIS IS THE LAST PRINTED PAGE*

13 TURN
OVER.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy