COMPUTER STUDIES PAPER 1 - KCSE 2019 MASENO MOCK EXAMINATION (WITH MARKING SCHEME)

Share via Whatsapp

INSTRUCTIONS TO CANDIDATES:

  • This paper consists of TWO sections A and
  • Answer ALL the questions in section A.
  • Answer question 16 and any other THREE questions from section

SECTION A; (40 MARKS)
Answer all the questions in the spaces provided

  1. Anthony, a student at Kericho Technical College defined a computer as “an electronic device which accepts, processes data and produce information depending on its decisions”. Was this student right? Explain you answer.             (1Mrk)
  2. Output from the computer can normally be in several forms. Give the difference between Soft copy and Hard copy. (2mks)
  3. Define the term program documentation.    (2mks)
  4. State any two types of documentation created in system development.                  (2mks)
  1. What is data security?              (1mk)
  2. Explain any two ways in which computers have been made user-friendly for persons that are physically challenged. (4mks)
  3. Explain the meaning of the following terms as used in computer data transmission. (3Mks)
    1. Simplex transmission
    2. Half duplex transmission
    3. Full duplex transmission
  1. What are the four major parts of a Database System?                (4 Mks)
  2. Give the difference between machine language and assembly language.       (2Mks)
  3. Define the term robot.                         (1Mrk)
  4. Differentiate between a drive and a device driver.    (2Mks)
  5.  
    1. Differentiate between an electronic spreadsheet and the traditional analysis sheet
    2. Explain how you would change the name of a worksheet in Microsoft Excel. (3Mks)
  6. State three reasons why it is important observe safety precautions and practices in a computer laboratory. (3mks)
  7.  
    1. List two examples of Desktop Publishing Software.                                     (1mrk)
    2. Differentiate between Save and Save As as used in most windows applications.         (2mks)
  8. Define the following internet related terms. (5 Marks)
    1. Internet Protocol
    2. Search engine
    3. Browser
    4. E-learning
    5. Uniform Resource Locator

SECTION B: (60 MARKS)
Answer question 16 and any other three questions

  1.  
    1. Define the term control structure.                                        (2mks)
    2. Study the following pseudocode and answer the questions that follow.
      Start
      N = 0
      X = 0
      While N < 3
                  Repeat
                              X = X + 1
                  Until X = 2
                  N = N + 1
      End while
      Stop
      1. Determine the value of N and X. (5mks)
      2. Draw a flowchart of the above pseudocde. (8mks)
  2.  
    1. State any three reasons why people may resist the introduction of computers at their place of work.  (3mks)
    2. State two operational methods of an organizational ensuring the security of data. (2mks)
    3. Explain the components of an expert system.  (6mks)
    4. Explain the role of feed back in a system. (2mks)
    5. List two theories of system development. (2mks)
  3.  
    1. Briefly explain the following terms as used in spreadsheet                                (4mks)
      1. Cell
      2. Range
      3. Value
      4. Function
    2. List three paragraph formatting features of word processors. (3mks)
    3. Explain the difference between the printing of multiple pages and multiple copies. (2mks)_
    4. Distinguish between a worksheet and a work book         (2mk)
    5. Explain four examples of action query. (4mks)
  1.  
    1. Explain any three benefits of using ATMs in banking industry. (6mks)
    2. Explain two advantages of advertising on web instead of using an advertising brochure.
    3. Mention any three ways of ensuring efficient back up of data. (3mks)
    4. Give any two benefit of hacking to an organization’s computer system. (2mks)
  2.  
    1. Perform the following binary arithmetic.
      1. 10111012 + 1001002 - 11111012 (4mks)
      2. 56/8 - 82/5 using ones complement. (4mks)
    2. Differentiate between data validation and data verification. (2mks)
    3. List three factors that determine the methods of data access in a computer. (3mks)
    4. Give any two characteristics of mater file. (2mks)


MARKING SCHEME

NO

QUESTION / ANSWER

SCORE REMARK

1

Anthony a student at Mireri Technical College defines a computer as “an electronic device which accepts, processes data and produce information depending on its decisions.” Was this student   right? Explain your answer.
No 1/2 computers cannot1/2 make their own decisions

1mk

2

Output from the computer can normally be in several forms. Give the difference between Soft copy and Hard copy.

  • Soft copy output that is intangible e.g. sound light and on screen.
  • Hardcopy output on hard /tangible materials e.g. papers and microform

2mks

3

Define the program documentation
Tutorials, instruction and reference information provided to explain how to install and use, and maintain software

2mks

4

State any two types of documentation created in system development

  • Programmer oriented
  • User oriented
  • Technician oriented.            

Any two @ 1mk

5.

What is data security?

  • Protection of programs and data in computers and communications systems against unauthorized modification, destruction, disclosure or transfer whether accidental or intentional.

1mk

6.

Explain any two ways in which computers have been made user-friendly for persons that are physically challenged.

  • Use of voice recognition devices for the handicapped
  • Use Braille
  • Use of magnifies to enlarge output

Any two explained @ 2 max 4

No 1mk

7

The meaning of the following terms as used in computer data transmission.

  1. Simplex transmission.
    Date is transmitted in one direction only.
  2. Half duplex transmission
    Data is transmitted in two directions but only in one direction at a time.
  3. Full duplex transmission
    Data is exchanged between two devices in both directions simultaneously.

@1mk each

8

What are the four major parts of a database system?

  • Data
  • Hardware
  • Software
  • Users /liveware

1 @1mk each

9.

Give the difference between machine language and assembly language

  • Machine language is the computers own binary base language.
  • Assembly language is a low level language consisting of mnemonic codes and symbolic addresses corresponding to machine language instructions.                

@ 2mrks both must be right to score

10

Define the term robot.

  • Is a computer controlled device that mimics human intelligence in carrying out routine task

@1mk

11

Differentiate between a drive and a device driver.

  • A drive is a device that is used to read or write information on a computer storage, while device drive is software instructions that enable communication between computer and other devices

@2mrk both must be right

12.

  1. Differentiate between an electronic spreadsheet and the traditional analysis sheet
    Manual spreadsheet are paper and pen spreadsheets in which error correction is normally hard while electronic spreadsheets are computer base spreadsheets which are easier to work with.                                                                                               
  2. Explain how you would change the name of a worksheet in Microsoft excel
    Right click on the name tab of the worksheet to be renamed, select rename then type the new name                     

@2mark both must be right

 

 

 

Each step @1mrk. There must be flow

13.

State three reasons why it is important observe safety precautions and practices in a computer laboratory.

  • To product the computers
  • To protect the users
  • To provide conducive environment for computers and users.

@1mk each

Accept any precaution that protect the user or computer and link.

14

  1. List two examples of desktop publishing softwares.
    • Quarkxpres
    • PageMaker
    • Adobe in design
    • Corel Ventura
    • Sent page plus
    • Adobe PageMaker
    • Microsoft publisher
    • Corel draw        
  2. Differentiation between save and save as as used in most windows applications.
    Save command is used to save changes in an already saved document. Save as command is used to save a new unnamed document or to save an existing document using a new name.                       

Any 1st 2 @ 1mk
@2marks both must be right

15.

Define the following internet related terms.

  1. Internet protocol
    Set of rules that govern the use of the internet.
  2. Search engine
    Computer software that compiles list of documents on the World Wide Web and their contents.
  3. Browser
    Program that allows a computer to locate, down load and display. Document containing text graphics sounds videos, animation located on a computer network.
  4. E- learning
    Learning over the internet.
  5. Uniform resource location.
    A method of naming files or place on the internet. 

@1mk

 

SECTION B.

 

16.

  1. Define the term control structure.      (2mks)
    Are block of statements that determine how statements are executed.
  2. Study the following pseudocode and answer the questions that follow.
    Start
    N = 0
    X = 0
    While N < 3
                Repeat
                            X = X + 1
                Until X = 2
               N = N + 1
    End while
    Stop
    1. Determine the value of N and X.                                 (5mks)
      X = 5, N = 4
    2. Draw a flowchart of the above pseudocde.  (8mks)
      bs6grcvxd

 


Must show the working each stage @1mk. Else only answer shown award 1mk
Initialization symbol. 1mk
While 1
Process 2
Until 1
Start 1
Flow 1
Logic 1

17

  1. State any three reasons why people may resist the introduction of computers at their place of work.   (3mks)
    • Job replacement - brings about elimination of jobs.
    • Job displacement - process of replacing manpower with computerization
    • Computer illiteracy - Lack of computer knowledge.
    • Resistance to change — People want to continue working manually resist new and advanced methods.                            
  2. State two operational methods of an organizational ensuring the security of data.  (2mks)
    • Password control
    • Use of antivirus
    • Use access levels —filters information that one can view.
  3. Explain the components of an expert system.    (6mks)
    • Knowledge base: holds information about a particular subject
    • Inference engine: controls the search for information in the knowledge base
    • User interface: is the display screen that enables the user interact with system
  4. Explain the role of feed back in a system(2mks)
    • Helps the system to adopt to changes in the environment in order to give the expected output.
    • Helps to see whether the system is achieving its objectives.
  5. List two theories of system development.(2mks)
    • Traditional approach
    • Rapid application development
    • Structured approach

Any 1st 3 @ 1mk each
Any 1st two @ 1mk1 @ 2mk award 1mk for state
1st @ 2mk
Any 1st 2 @ 2mks

18

  1. Briefly explain the following terms as used in spreadsheet (4mks)
    • Cell — An intersection between a row and a column
    • Range — A rectangular arrangement of cells specified by the address of its top left and bottom right cells, separated by colon (:)
    • Value — Numbers that can be manipulated mathematically.
    • Function: Inbuilt predefined formulae that the user can quickly use instead of having to create a new one each time a calculation has to be carried out.      
  2. List three paragraph formatting features of word processors. (3mks)
    • Indentation
    • Drop cap
    • Alignment
    • Line spacing
  3. Explain the difference between the printing of multiple pages and multiple copies. (2mks)
    • Printing more than one page
    • Printing several copies of the same page
  4. Distinguish between a worksheet and a work book(2mk)
    • Work sheet is the working area in Microsoft Excel program. Work book is a collection of worksheet.
  5. Explain four examples of action query. (4mks)
    • make table query: used to create query from existing table
    • Delete query: used to automatically delete record or records from the source data.
    • Append query: used to automatically add a record or records to a table
    • Update query: used to automatically update records

Each @ 1mk

19

  1. Explain any three benefits of using ATMs in banking industry.  (6mks)
    • Can be accessed at any branch
    • Easy transaction and convenient as they can be used to pay bills
    • No much queuing as in case of bank clarks
    • Confidentiality of transaction
  2. Explain two advantages of advertising on web instead of using an advertising brochure. (4mks)
    • Can be updated faster
    • Provide interactive communication as compared to brochures that are one way
    • Have wide coverage
    • Possible use of multi media
  3. Mention any three ways of ensuring efficient back up of data. (3mks)
    • Making regular backup
    • Backup on removable media
    • Keeping backup media in separate location
    • Setting up automatic backup intervals
  4. Give any two benefit of hacking to an organization’s computer system. (2mks)
    • reveals the weaknesses of the system
    • identify areas that need patching
    • may explain leakage incidences of data

Any 1st three explained @ 2mk
Any 1st 2 explained @ 2mks
Any 1st 3@1mk each

20

  1. Perform the following binary arithmetic.
    1. 10111012 + 1011002 - 11111012                                           (4mks)
      1011101 + 101100 = 10001001……….2mks
      10001001 – 1111101= 00001101……..2mks
    2. 5 6/8 - 8 3/12 using ones complement.  (4mks)
      5.75 – 8.25
      101.11 – 1000.01…….1mk
      Ones complement of 1000.01……0111.10…….1mk
      101.11 + 0111.10……..1101.11………1mk
      Back to ones complement 0010.01…..1mk
  2. Differentiate between data validation and data verification.(2mks)
    data verification is the checking data input manually comparing the input with source data, while data validation is the checking of data against predetermined data limit.
  3. List three factors that determine the methods of data access in a computer. (3mks)
    • The amount of data to be accessed at a time
    • The size of the file to be accessed
    • The type of storage media
  4. Give any two characteristics of mater file.      (2mks)
    • Contain permanent data
    • Always updated by transaction file

Both must be correct to score

                                                

Join our whatsapp group for latest updates

Download COMPUTER STUDIES PAPER 1 - KCSE 2019 MASENO MOCK EXAMINATION (WITH MARKING SCHEME).


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest