0% found this document useful (0 votes)
85 views12 pages

Sabatia Cluster Computer Studies PP1 Qns

This document is an examination paper for Computer Studies, Year 2025, consisting of two sections: A and B. Candidates are instructed to answer all questions in Section A and question 16 plus any three from Section B, with a total of 11 printed pages. The paper includes various topics related to computer science, including programming, data processing, and database management.

Uploaded by

nelson ochieng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views12 pages

Sabatia Cluster Computer Studies PP1 Qns

This document is an examination paper for Computer Studies, Year 2025, consisting of two sections: A and B. Candidates are instructed to answer all questions in Section A and question 16 plus any three from Section B, with a total of 11 printed pages. The paper includes various topics related to computer science, including programming, data processing, and database management.

Uploaded by

nelson ochieng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

SABATIA CLUSTER EVAMS

451 - COMPUTER STUDIES – Paper 1


(THEORY)
Year 2025 - 2 ½ hours

NAME ……………………………………..…………….. CLASS …………………………………

ADM NO. …………….……….……..…..… DATE …………..…..……….. SIGN…………...

Instructions to candidates
a) Write your name and admission number in the spaces provided above.
b) Sign and write the date of examination in the spaces provided above.
c) This paper consists of two sections: A and B.
d) Answer all questions in section A.
e) Answer question 16 and any other three from section B.
f) All answers should be written in the spaces provided on the question paper.
g) This paper consists of 11 printed pages.
h) Do not remove any pages from this booklet.
i) Candidate should check the question paper to ascertain that all the pages are printed as
indicated and that no questions are missing.
j) Candidate should answer the questions in English.
k) Scientific but no-progammer calculator is allowed for this examination.

For Examiners Use Only


Section Question Maximum Score Candidate’s Score
A 1-15 40
16 15
15
B 15
15
TOTAL SCORE

Page 1
SECTION A (40 MARKS)
ATTEMPT ALL THE QUESTIONS IN THIS SECTION
1. The table below was created using a word processor. Use it to answer the questions that follow

NAME CAT 1 CAT 2 CAT 3 TOTAL


JOHN WASWA 52 42 48
ALICE KANJA 60 70 50
AVERAGE
a) Write a function to calculate the total for JOHN WASWA. (1 mk)

……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
a) Write a function to calculate the AVERAGE for the two students. (1 mk)

……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

2. James, a form four computer student was requested to advice the school administration on the most
suitable printer to be purchased.
a) State FOUR factors that James had to consider. (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
b) Identify TWO advantages of hard copy output over softcopy output. (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
3.(a) Differentiate between LPT and COM ports. (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(b) List TWO functions of UPS. (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
4. Masomo Bora form four students noticed some fire in the lab when they were doing their project.
(a) State FOUR measures that they were supposed to take. (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(b) Explain any TWO possible causes of the fire outbreak. (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
5. Using examples distinguish between a formula and a function as used in spreadsheets. (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

Page 2
6. The diagrams below represent different types of operating system classified according to user
Interface. Use them to answer questions that follow.

Fig. a
Fig. b
(i) State the operating system represented in:
(a) Fig. a (1 mk)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
(b) Fig. b (1 mk)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
(ii) Explain any TWO advantages of the operating system represented in Fig. a. (2mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

7. Distinguish between a webpage and a homepage. (2 mks)


……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

8. Use the binary value below to answer the questions that follow.
1101101111011001
a) Determine the number of bits in the above binary value. (1 mk)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
b) Determine the number of bytes in the above binary value. (1 mk)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
c) Determine the number of nibbles in the above binary value. (1 mk)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
9. Differentiate between batch and online processing. (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
10. State TWO examples of secondary storage devices that use random file organisation method
(2 mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
Page 3
12. Explain FOUR ways in which ICT can be used during interhouses competitions in your school.
(2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
13. Use the diagram below to answer questions that follow.

a) Name the parts labelled: (2 mks)


(i) b_________________
(ii) c_________________
(iii) d_________________
(iv) e_________________
b) Explain TWO disadvantages of this type of transmission (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
14. Distinguish between a primary key and an index as used in databases (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
15. (a) Define the term e-learning (1 mk)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(b) Explain TWO ways of making a password stronger (2 mks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

Page 4
SECTION B (60 MARKS)
Answer all question 16 and any other THREE from this section
16. (a) Distinguish between a compiler and an interpreter. (2 mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(b) State TWO advantages of high level languages over low level languages (2 mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(c) Name TWO methods of of testing the program for errors (2 mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(d) Use the flowchart below to answer questions that follow.

START

x=1
i=0

x=x+xi
i=i+1

F
i=4

PRINT x

STOP

Page 5
i) Determine the output of the above flowchart. (4 mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………

ii) Design a pseudocode of the above program. (5 mks)


……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………

17. a) State THREE ways of representing positive or negative numbers. (3 mks)


………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

b) Subtract 910 from 1510 using two’s complements. (4 mks)


………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

Page 6
c) Convert -710 to 8-bit binary number using one’s complement. (2 mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
d) Explain THREE control measures against piracy. (3 mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

d) The diagram belows describes one of the control measures against unauthorised access.
Use it to answer questions that follow.

Best
Best
Best wishes
wishes
a) Give the name of the control
wishes tseBmeasure represented in the above diagram. (1 mk)
………………………………………………………………………………………………
sehsiw
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

b) Describe any other TWO measures against unauthorised access. (2 mks)


………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
18. a) Distinguish between
(i) Replying and forwarding an email. (1 mk)
………………………………………………………………………………………………
Page 7
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(ii) Sign up and sign in as used in emails. (1mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

b) Below is an example of a URL. Use it to answer questions that follow

http:// www.masomobora.co.ke

a b
i) What is a URL? (1 mk)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
iii) Identify the parts labelled: (2mks)
a)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
b)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
c) With an aid of a diagram distinguish between analog and digital signals. (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
d) List TWO advantages of using intranet over internet in an organisation . (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
e) use the diagram below to answer questions that follow.

i) Identify the part labelled P. (1 mk)


………………………………………………………………………………………………
Page 8
………………………………………………………………………………………………

ii) Explain the function of the part labelled P. (1 mk)


………………………………………………………………………………………………
………………………………………………………………………………………………
iii) Give the name of the topology represented in the diagram above . (1 mk)

………………………………………………………………………………………………
………………………………………………………………………………………………
iv) State THREE disadvantages of the topology represented in the diagram above. (3 mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
19. Use the database tables below to answer the questions that follow.

CUSTOMERS TABLE
CUSTOMER NUMBER NAME TEL NO
9001 Jane 021142123
9002 Mike 023545532
9003 James 021462112
9004 Collins 058421123
9005 Joseph 032445512
9006 Ann 050112231

ORDERS TABLE
ORDER ID CUST NO DATE AMOUNT
352 9001 2/5/2023 20000
235 9002 6/4/2023 35000
532 9003 8/6/2023 11000
623 9004 9/6/2023 65000
521 9005 23/6/2023 25000
231 9006 30/6/2023 5000

a) State the most appropriate data types for each of the following fields (3 mks)
i) CUSTOMER NUMBER…………………………………………………………………
ii) NAME……………………………………………………………………………………
iii) TEL NO………………………………………………………………………………….
iv) ORDER ID……………………………………………………………………………….
v) DATE………………………………………...………………………………………….
vi) AMOUNT……………………………………………………………………………….
b) Determine the most appropriate primary key for each of the above tables. (2 mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

c) List TWO fields that can be used to create a relationship between the two tables. (1mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

Page 9
d) Identify the foreign key in the above database tables. (1 mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
e) During system implementation the management of Spring Supermarket decided to run both the
old system and the new system concurrently for sometime.
(i) Give the name of the changeover strategy that was used by the management of
Spring Supermaket. (1 mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

(ii) State any TWO disadvantages of the above changeover strategy. (2mks)

………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

(ii) Other than changover, list any other TWO activities performed during system
implementation. (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(iii) Explain TWO circumstances that may lead to development of a new information
system (2 mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(d) Describe the term system entropy (1 mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
20. At Kenya airways a customer may request for an airline booking information through a remote
Terminal or mobile phone. If a booking is made, the system immediately updates the reservation
files to avoid double booking and sends the response back to the customer immediately.
a) Identify the name of the data processing mode used at Kenya Aiways (1 mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
b) Give any TWO advantages of the data processing mode used at Kenya Aiways. (2 mks)
………………………………………………………………………………………………
Page 10
………………………………………………………………………………………………
c) Differentiate between a logical file and a physical file. (2 mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
d) List ONE way of minimising transcription errors . (1mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
e) Attendants at Maguna Supermarket in Kerugoya make use of EPOS to serve their customers.
(i) Write EPOS in full (1 mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(ii) State any TWO advantages of using EPOS. (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(iii) Apart from keyboard, monitor, mouse and system unit, highlight any other TWO
devices required at EPOS. (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
f) List THREE ways in which you can make text to fit in a DTP textbox . (3 mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
g) Explain how you can remove the below error in spreadsheets. (1 mk)

………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

Page 11
THE END

Page 12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy