COMPUTER STUDIES PAPER 1 - 2017 MURANG'A MOCK EXAMINATION

Share via Whatsapp

SECTION A (40 MARKS)

  1. State two practices to be observed in order to ensure the safety of the computer user (2mks)
  2. State the function of the following keys on the computer key board      (2mks)
    1. Insert
    2. Delete
  3. Name three responsibilities that are carried out by a network administration  (3mks) 
  4. List and describe three guidelines that should be followed when conducting an interview during information gathering (3mks)
  5.  
    1. Define portability as used in software selection    (1mk)
    2. List four ways of acquiring software in an organization  (2mks)
  6.  
    1. Subtract 1102 from 110102      (1mk)
    2. Find the sum of binary number 101.1012 and 110.1002  (1mk)
    3. Convert binary number 11010110.10012 into octal number.  (1mk)
  7. List three uses of DVDs    (3mks)
  8. State the function of each of the following
    1. Network Interface Card     (1mk)
    2. Modem               (1mk)
    3.  Repeaters               (1mk)
  9. How does an operating system manage computer memory    (2mks)
  10. List four factors to be considered when purchasing an operating system   (2mks)
  11. Write a PSEUDO CODE to compute the area of a circle   (2mks)
  12.  
    1. List three ways by which you can provide a common link or relationship between the tables in a database software  (3mks)
    2. What is referential integrity     (1mk)
  13. List four types of publications that ca be designed using DTP software    (2mks)
  14.  
    1. List four stages in data collection  (2mks)
    2. What is meant by the following    (2mks)
      1. Reference file
      2. Report
  15. Explain the following terms    (2mks)
    1. Computer fraud
    2.  Alteration

SECTION B (Answer question 16 and any other three questions from this section)

  1. Study the flowchart below and answer the questions that follow.
    p1q15.PNG
    1. Name the control structure shown in the flow chart   (2mks)
    2.  Assuming the user keys in 8 and 14 when prompted to enter values for M and N respectively, determine the printed values of P,Q,x and y (4mks)
    3.  Write a pseudo code that would be used in place of the flowchart.(9mks)
  2.  
    1. List three advantages and three disadvantages of fibre optic cable  (6mks)
    2. Describe the following signals and state where each is applied in network communication. (4mks)
      1. Analog
      2. Digital
    3.  Name two types of coaxial cables  (2mks)
    4.  
      1. Distinguish between microwave and satellite transmissions  (2mks)
      2. Give an example of internet protocol         (1mk)
  3. The information below is maintained by the sales lady at the school canteen. Study it and answer the questions that follow.
       A  B  C
     1  Item  Units(kg)  Value(Ksh)
     2  oranges  12  2000
     3  mangoes  13  1000
     4  tomatoes  12  1400
     5  cabbages  15  2500

    1. Describe the basic data types used in this spreadsheet (4mks)
    2. Provide a single formula that would be used to
      1. Count the number of items whole units are equal; to 15  (2mks)
      2. Sum the values of items whole units are equal to 12  (2mks)
    3.  
      1. List and describe four areas of application of spreadsheets  (4mks)
      2. Explain data range legend and axis as used in spreadsheet charts  (3mks)
  4. A computer diskette in drive A has folders for MEMOS for an administrator. Each of these folders is labelled according to the relevant months. The secretary created the folders for each  months memo for each of access. Study the table below

    MEMO 1

    MEMO 2

    MEMO 3

    Warning

    Lateness

    Assembly

    Inaccuracies

    Auditing

    Fraud

    Careless talk

    Inefficient

    Meeting


    1. Assuming that the secondary was working from the diskette, draw the corresponding tree structure   (6mks)  
    2.  
      1. The secretary wanted to create a folder to store a memo in Fraud folder. State the path for that folder    (2mks)
      2. Suggest how the secretary can ensure that the work in that diskette is not spoilt (1mk)
      3. The content of the file is not viewed by any other person apart from her.(1mk)
    3.  
      1. List any two devices under the control of the operating system   (2mks)
      2. Explain how each one of these devices are controlled by the OS
  5.  
    1. List and describe four strategies for converting from an old system to a new system (4mks)
    2.  
      1. Distinguish between private data and confidential data  (2mks)
      2. What can be done to stop illegal access to a computer laboratory by unauthorized people (3mks)
    3.  
      1. List four areas that would be considered in the requirement specification  (4mks)
      2. Name any two areas covered in a feasibility report during system analysis and design. (2mks)
Join our whatsapp group for latest updates

Download COMPUTER STUDIES PAPER 1 - 2017 MURANG'A MOCK EXAMINATION.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest