SECTION A (40 MARKS)
- State two practices to be observed in order to ensure the safety of the computer user (2mks)
- State the function of the following keys on the computer key board (2mks)
- Insert
- Delete
- Name three responsibilities that are carried out by a network administration (3mks)
- List and describe three guidelines that should be followed when conducting an interview during information gathering (3mks)
-
- Define portability as used in software selection (1mk)
- List four ways of acquiring software in an organization (2mks)
-
- Subtract 1102 from 110102 (1mk)
- Find the sum of binary number 101.1012 and 110.1002 (1mk)
- Convert binary number 11010110.10012 into octal number. (1mk)
- List three uses of DVDs (3mks)
- State the function of each of the following
- Network Interface Card (1mk)
- Modem (1mk)
- Repeaters (1mk)
- How does an operating system manage computer memory (2mks)
- List four factors to be considered when purchasing an operating system (2mks)
- Write a PSEUDO CODE to compute the area of a circle (2mks)
-
- List three ways by which you can provide a common link or relationship between the tables in a database software (3mks)
- What is referential integrity (1mk)
- List four types of publications that ca be designed using DTP software (2mks)
-
- List four stages in data collection (2mks)
- What is meant by the following (2mks)
- Reference file
- Report
- Explain the following terms (2mks)
- Computer fraud
- Alteration
SECTION B (Answer question 16 and any other three questions from this section)
- Study the flowchart below and answer the questions that follow.
- Name the control structure shown in the flow chart (2mks)
- Assuming the user keys in 8 and 14 when prompted to enter values for M and N respectively, determine the printed values of P,Q,x and y (4mks)
- Write a pseudo code that would be used in place of the flowchart.(9mks)
-
- List three advantages and three disadvantages of fibre optic cable (6mks)
- Describe the following signals and state where each is applied in network communication. (4mks)
- Analog
- Digital
- Name two types of coaxial cables (2mks)
-
- Distinguish between microwave and satellite transmissions (2mks)
- Give an example of internet protocol (1mk)
- The information below is maintained by the sales lady at the school canteen. Study it and answer the questions that follow.
A B C 1 Item Units(kg) Value(Ksh) 2 oranges 12 2000 3 mangoes 13 1000 4 tomatoes 12 1400 5 cabbages 15 2500 - Describe the basic data types used in this spreadsheet (4mks)
- Provide a single formula that would be used to
- Count the number of items whole units are equal; to 15 (2mks)
- Sum the values of items whole units are equal to 12 (2mks)
-
- List and describe four areas of application of spreadsheets (4mks)
- Explain data range legend and axis as used in spreadsheet charts (3mks)
- A computer diskette in drive A has folders for MEMOS for an administrator. Each of these folders is labelled according to the relevant months. The secretary created the folders for each months memo for each of access. Study the table below
MEMO 1
MEMO 2
MEMO 3
Warning
Lateness
Assembly
Inaccuracies
Auditing
Fraud
Careless talk
Inefficient
Meeting
- Assuming that the secondary was working from the diskette, draw the corresponding tree structure (6mks)
-
- The secretary wanted to create a folder to store a memo in Fraud folder. State the path for that folder (2mks)
- Suggest how the secretary can ensure that the work in that diskette is not spoilt (1mk)
- The content of the file is not viewed by any other person apart from her.(1mk)
-
- List any two devices under the control of the operating system (2mks)
- Explain how each one of these devices are controlled by the OS
-
- List and describe four strategies for converting from an old system to a new system (4mks)
-
- Distinguish between private data and confidential data (2mks)
- What can be done to stop illegal access to a computer laboratory by unauthorized people (3mks)
-
- List four areas that would be considered in the requirement specification (4mks)
- Name any two areas covered in a feasibility report during system analysis and design. (2mks)
Download COMPUTER STUDIES PAPER 1 - 2017 MURANG'A MOCK EXAMINATION.
Tap Here to Download for 50/-
Get on WhatsApp for 50/-
Why download?
- ✔ To read offline at any time.
- ✔ To Print at your convenience
- ✔ Share Easily with Friends / Students