COMPUTER STUDIES PAPER 1 - KCSE 2019 MOCK EXAMINATION - KAKAMEGA

Share via Whatsapp

SECTION A

  1. Define the following terms as used in word processing. (3 marks)
    1. word wrap
    2. Justification
    3. Drop cap
  2. State three advantages of using computers in performing day to day’s tasks. (3marks)
  3. Wanja operates a bookshop in a town. Lately he is finding the task of managing daily transactions manually overwhelming.
    1. Identify the type of management information system that Wanja should acquire (2 marks)
    2. State two benefits that Wanja will gain from using such a system (2 marks)
  4. State three hardware considerations that need made before installing an operating system (3marks)
  1. Before the end of every month an electricity service provider sends out field officers to take consumer meter readings. The data collected by the officers is then keyed into the computer. The system then generates utility bills which are printed and sent to the consumers.
    1. State two transcription errors that are likely to occur during meter reading or input (2 marks)
    2. State two ways such errors can be avoided (1 mark)
  2. State three editing tools that are available in most standard word processing software (3 marks)
  3. Information security should be enforced both physically and logically.
    1. Differentiate between the two security mechanisms (2 marks)
    2. State two physical security techniques (2 marks)
  4. Explain three types of system buses found on the computer system board (3 marks)
  5. Explain three types of system buses found on the computer system board (3 marks)
  6. Highlight the dangers associated with the following:
    1. Exposing computers to high humidity (1marks)
    2. Purchasing software before assessing requirements (1marks)
    3. Using foreign flash disks on the computer. (1marks)
  1. Differentiate between a filter and a query in a database (1 marks)
  2. The payroll system is both a financial system and a human resources system. Explain this statement.  (2marks)
  3. Explain the importance of the following spreadsheet operations.
    1. Freezing columns (1mark)
    2. Data validation (1 mark)
  4. List two ways in which computer technology can be used in law enforcement (1 marks)
  5. In reference to aviation technology, state two advantages of using simulation in training pilots (2mks)

SECTION B (60 MARKS)
Answer question 16(compulsory) and any other THREE questions from this section.

  1.  
    1. State the stage of program development in which:
      1. A flowchart would be drawn
      2. The programmer would check whether the program does as required
      3. The user guide would be written
      4. The requirements specifications would be written
    2. A programmer uses program design tools to design a program that can list the odd numbers between 0 and 100.
      1. Write a pseudo code for this problem.                                                                                                      (5mks)
      2. Draw a flow chart for the pseudo code in 16 b) (i) above.                                                      (6mks)
    3.  
      1. State one difference between system and program flowchart. (2 marks)
      2. Study the follow flowchart then answer the questions that flow. 
        Q16CCOMP1QSNS                              
      3. Identify the type of flowchart that is represented by the flowchart in figure2
      4. Name all the flowchart symbols used in this flowchart.
  1.  
    1. Define the term network topology Network topology can be viewed in two ways . Name and Explain the two ways.    (5mks)
    2. Explain two factors you would consider before enrolling for an ICT course in a College.                                                (2mks)
    3. Outline the seven open systems interconnection (OSI ) reference model Layers in their order in network.                                                         (4 mks)
    4. Differentiate the function SUM and SUMIF as used in spreadsheet.   2mks
    5. State two advantages of using fiber optic cables.                                                   (2mks)
  1. A systems analyst has been asked by a doctor to computerize the records she keeps about her patients.     He must first of all collect information about the existing system.
    1. Describe four methods he could use to collect this information.   4mks
    2. Once the whole system has been designed it will need to be implemented.
      1. Describe two methods of implementation that could be used.   2mks
        Described Any two from:
      2. Write down two reasons why one of the methods you gave in (b) (i) is better than the other.
    3. After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated.
      Any two from:                                                                                                                         ( 2mks)
    4. State one difference between system flowchart and program flowchart.         (2 marks)
  1.  
    1. Describe each of the following data processing methods and give an example of Where they are used.            (6mks)
      1. Online processing 
      2. Batch processing – 
      3. Real-time
    2. differentiate between the following:                                                                                     (6mks)
      1. Logical file and physical file
      2. Master file and back-up file
      3. Random and indexed sequential file organization methods.
    3. An organization is facing threats to data integrity. Explain three ways how the threats can be minimized. (3mks)
  1.  
    1. Give one reason why data and information in a computer system needs to be converted to other number systems other than binary.     (1mks)
    2. Explain one reason for use of binary in digital technology.                        (1mks)
    3. Using twos complement, workout :       1510 - 810   in binary form.   (4mks)
    4. Using BCD coding system convert 796 to binary.      (3mks)
    5. Differentiate Database administrator and web administrator.       2mks
    6. Define the term accreditation as used in education.     2mks


MARKING SCHEME

  1. Define the following terms as used in word processing.                                               (3 marks)
    1. word wrap
      it is a formatting feature which makes the text to move to the next line automatically
    2. Justification
      It is an alignment feature where both left and right are aligned
    3. Drop cap
  2. State three advantages of using computers in performing day to day’s tasks. (3marks)
    • It has high speed of processing tasks
    • It is flexible
    • Has high storage space
  1. Wanja operates a bookshop in a town. Lately he is finding the task of managing daily transactions manually overwhelming.
    1. Identify the type of management information system that Wanja should acquire  (2 marks)
      electronic
    2. State two benefits that Wanja will gain from using such a system              (2 marks)
      • High storage
      • High processing speed
      • Efficiency
  1. State three hardware considerations that need made before installing an operating system      (3marks)
    • Compatibility
    • Availability
    • User need
    • User friendliness
  1. Before the end of every month an electricity service provider sends out field officers to take consumer meter readings. The data collected by the officers is then keyed into the computer. The system then generates utility bills which are printed and sent to the consumers.
    1. State two transcription errors that are likely to occur during meter reading or input  (2 marks)
      • Transposition
      • Misreading
    2. State two ways such errors can be avoided          (1 mark)
      • Dry checking
      • Using of test data
      • Using debugging utilities
  1. State three editing tools that are available in most standard word processing software (3 marks)              
    • Do and redo
    • Spelling and grammar checker
    • Thesaurus
    • Insert mode
    • Type over mode
  1. Information security should be enforced both physically and logically.
    1. Differentiate between the two security mechanisms                      (2 marks)
      Physical security   ensures the content is not tapered with while logical security refers to securing the meaning of the information
    2. State two physical security techniques                                   (2 marks)
      • Burglar proofing
      • Security personnel
      • Security cameras (cctv)
  1. Explain three types of computer buses found on the computer system board    (3 marks)
    • Control bus
    • Address bus
    • Data bus
  1. State four disk management tool found in most operating systems          (3 marks)
    • Defragmentation
    • Partitioning
    • Disk Scanning
    • Disk formatting
    • Disk compression
    • Disk backup
    • Disk diagnostic
  1. Highlight the dangers associated with the following:
    1. Exposing computers to high humidity                             (1marks)
      Rusting of the parts of the metallic computer
    2. Purchasing software before assessing requirements                               (1marks)
      • May be a pirated software
      • Using foreign flash disks on the computer.                                   (1marks)
      • May multiply viruses
  1. Differentiate between a filter and a query in a database                               (1 marks)
    Filter if a formatting tool that extract part of the record from the table while query is a database object used to extract information from the database
  1. The payroll system is both a financial system and a human resources system. Explain this statement.    (2marks)
    It is used to perform finance calculations and what if analysis  and also used to update and provide financial records for the workers
  1. Explain the importance of the following spreadsheet operations.
    1. Freezing columns                                             (1mark)
      It enable the use to view only required records at atime
    2. Data validation                                                  (1 mark)
      Ensures the records are valid as per the user need
  1. List two ways in which computer technology can be used in law enforcement     (1 marks)
    • Surveillance, crime detection and prevention
    • Scene monitoring by the police
    • Storage of biometric information for investigation of crimes
  2. In reference to aviation technology, state two advantages of using simulation in training pilots  (2mks)
    • Safety
    • Less costly

SECTION B (60 MARKS)
Answer question 16(compulsory) and any other THREE questions from this section.

  1.  
    1. State the stage  of program development in which:
      1. A flowchart would be drawn
        Design
      2. The programmer would check whether the program  does  as required
        Testing
      3. The user guide would be written
        Documentation
      4. The requirements specifications would be written
        Analysis

    2. A programmer uses program design tools to design a program that can list the odd numbers between 0 and 100.
      1. Write a pseudo code for this problem.                                                                                                      (5mks) 
                                                                        Start                                                      Marks award
                                                                        Odd=1                                                  * Start/ stop – 1 mk
                                                                        Repeat                                                    Repeat/ until -1 mk
                                                                        Write odd                                               correct statements -3 mks
                                                                        Odd= Odd+2                                      *Also accept use of other control statements
                                                                        Until odd =99                                        such as while…DO 
      2. Draw a flow chart for the pseudo code in 16 b) (i) above.                                                      (6mks) 
        MSSSSSQ166CCCCC

        System flowchart

        Program flowchart

         A program flowchart details the flow through a single program

        A system flowchart will show the flow through a system(A is made up of many programs).

        . Each box in the flowchart will represent a single instruction or a process within the program

        Each box will represent a program or a process made up of multiple programs. 

        A system flow chart describes the flow of data through a complete data-processing system

        describe the flow of data through a particular computer program in a data processing system

        Describe the relationship between inputs, processing, and outputs for a system.

        Describe the sequence of logical operations performed in a computer program.

                                                                                           
        1 mark for each correct symbol  and procedure in the symbol   (1x 6=6)
      3. - integer, Real, Char, String, Boolean
    3.  
      1. State one difference between system and program flowchart.  (2 marks)
        Any one at 2 marks. Difference must be shown
      2. Study the follow flowchart then answer the questions that flow.
        Q16CCOMP1QSNS
        1. Identify the type of flowchart that is represented by the flowchart in figure2
          System flow chart ( ½  mark)
        2. Name all the flowchart symbols used in this flowchart.
          @ ½ mark each. Each name must be associated with the appropriate symbol.
          (2 ½ marks)
  2.  
    1. Define the term network topology .   Network topology can be viewed in two ways . Name and Explain the two ways.                                 (5mks)
      Network topology:
      - Refers to the way computers and other devices have been arranged on a network   or how  data passes from one computer to another on a network.
      -refers to the physical arrangement of the network, especially the  location of the computers, other devices and how the cables are run between the devices.
      1. Logical/Signal topology.
        Deals with the way data passes from one device to the next on the network.
        Examples of logical topologies are Ethernet and token ring.
      2. Physical topology.
        Refers to the physical layout arrangement of components on the network.
        The most common physical topologies are the bus, the star, the ring and the mesh.
    2. Explain two factors you would consider before enrolling for an ICT course in a college.        (2mks)
      • - Job opportunities.
      • - Where the examinations offered are recognized.
      • - The organization offering the course.
    3. Outline the seven open systems interconnection ( OSI ) reference model Layers in their order  in network.             (4 mks)                             
      • Application layer
      • Presentation Layer
      • Session Layer
      • Transport layer
      • Network Layer
      • Data Link Layer
      • Physical Layer

         (each  ½ mk *7 = 3 ½  then ½ mk for correct  numbering starting with 7 instead of 1)
    4. Differentiate  the function  SUM  and SUMIF as used in spreadsheet.   2mks
      -SUM  :- Adds values in a range of cells and returns the results
      - SUMIF  :- Adds values in a range of cells that meets the specified condition and returns the results.
    5. State two advantages of using fiber optic cables.                                                   (2mks)
      1. Noise resistance: It is immune to EMI.
      2. Less signal attenuation: signal can run for miles without requiring regeneration.
      3. Higher bandwidth: fibre optic cable can support dramatically higher bandwidths (and hence data rate) than all other cables.
      4. Smaller and lighter than copper cable hence space limited situations.
      5. Can be used in hazardous (highly flammable) places because they do not generate electrical signals.
      6. Very fast (in light form)   
  1. A systems analyst has been asked by a doctor to computerize the records she keeps about her patients.      He must first of all collect information about the existing system.
    1. Describe four methods he could use to collect this information.   4mks
      Any four from:
      Observation
      Questionnaires
      Interviews
      Collecting documents/document review
      @ ½ mark each (2 marks)
    2. Once the whole system has been designed it will need to be implemented.
      1. Describe two methods of implementation that could be used.    2mks 
        Described Any two from:
        parallel running
        direct changeover
        pilot running
        phased implementation.
        @ 1 mark each (2 marks)
      2. Write down two reasons why one of the methods you gave in (b)  (i)  is better than the other.( 2 marks)
        MSSCOMP1Q18BII
    3. After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated.
      Any two from:                                                                                                                          ( 2mks)
      to make sure user requirements have been met
      to identify any shortcomings
      to identify possible improvements
    4. State one difference between system flowchart  and program flowchart.          (2 marks) 

      System flowchart

      Program flowchart

       A program flowchart details the flow through a single program

      A system flowchart will show the flow through a system(A is made up of many programs).

      . Each box in the flowchart will represent a single instruction or a process within the program

      Each box will represent a program or a process made up of multiple programs. 

      A system flow chart describes the flow of data through a complete data-processing system

      describe the flow of data through a particular computer program in a data processing system

      Describe the relationship between inputs, processing, and outputs for a system.

      Describe the sequence of logical operations performed in a computer program.

      Any one at 2 marks. Difference must be shown
    5. Study the following  flowchart then answer the questions that follow.
      Figure 2
      1. Identify the type  of flowchart that is represented above  in figure2
        System flow chart                                                      ( ½  mark)
      2. Name all the flowchart symbols used in this flowchart  (e) figure 2  above.
        @ ½ mark each. Each name must be associated with the appropriate symbol.
         (2 ½ marks)
  1.  
    1. Describe each of the following data processing methods and give an example of where used.                  (6mks)
      1. Online processing – Data is processed immediately it is received e.g. internet banking, online payment system using credit card.
      2. Batch processing – Data is accumulated as a group then it is processed as one/ a group.  Eg in payroll system
      3. Real-time – Computer processes the incoming data as soon as it occurs, up to dates the transactions file and gives an immediate response, that would affect the events as they happen e.g. making reservations for airlines seats, hotels etc.
    2. Make a clear difference between:-                                                                                                         (6mks)
      1. Logical file and physical file – Viewed in terms of what data items it contain and details of what processing operations may be performed on the data items.  Physical files is one that is viewed in terms of how data is stored on a storage media and hoe the processing operations are made possible.
      2. Master file and back-up file – Master file is the main file that contains relatively  permanent records about particular items or entries.  Back-up file is used to hold copies of data or information from the fixed storage (hard disk)
      3. Random and indexed sequential file organization methods.
        Random – Also direct file organization records are stored randomly but accessed directly on a storage medium.  Indexed sequential records are stored and accessed in a particular order using an index used to enable the computer to locate individual records on storage media.
    3. An organization is facing threats to data integrity.  Explain three of how the threats can be minimized.  (3mks)
      - Backup data preferably on external storage media.
      - Control access to data by enforcing security measures.
      - Design user interface that minimize unauthorized access.
      - Using error detection and correction software when transmitting data.
      - Use devices that directly capture data from the source such as bar code readers.
      - Digital cameras, optical CR.
  1.  
    1. Give one reason why data and information in a computer system needs to be converted to other number systems other than binary.    (1mks)
      - Higher number systems are used in computing to reduce the streams of binary into  manageable form.
      - Help to improve the processing speed.
      - Optimize memory usage.
    2. Explain one reason for use of binary in digital technology.                                                             (1mks)
      - It is easier to develop devices that understand binary language.
      - Device a designed using binary logic are simple more reliable and consume the energy.
    3.  
      1. Using twos complement, workout :       1510 - 810   in binary form.   (4mks)
        = 15+(-8)
        Convert 810 to its binary equivalent then write its two’s complement
        15 =  11111  , To 8 bit =00011111
        8=  1000
        To 8bit = 00001000
        11110111 BitwiseNOT of 8 =1’C
        2’C =    11110111+1 = 11111000
        00001111 + 11111000
        ( 1)  00000111          
        Overflow is ignored        = 000001112 
        And in binary form the difference Is a positive  number (000001112  (710)
    4. Twos complement is the most popular way of representing negative numbers in  computer
      Systems.   Give an advantage of using this method.
      - There are no two ways of representing a zero as in the case with the other two methods
      - Effective addition and subtraction can be done even with numbers that are represented with a sign bit without a need for extra circuitries to examine the sign of an operand.
      1. Using BCD coding system convert 796 to binary.  

        2

        7

        Rem

        2

        9

        Rem

        2

        6

        Rem

        2

        3

        1

        2

        4

        1

        2

        3

        0

        2

        1

        1

        2

        2

        0

        2

        1

        1

         

        0

        1

        2

        1

        0

         

        0

        1

               

        0

        1

             
                                                                                      (3mks)                                                           
        79610 = 0111100101102
    5. Differentiate Database administrator and web administrator.                                     (2mks)
      Database administrator is responsible for updating and maintaining records in an database system and ensure data is organized in a way for easy access retrieval and update.
      Web administrator is responsible for designing, updating and maintaining the organizations website.
    6.  
      1. Define the term accreditation as used in education.     2mks
        Accepted / recognized/confirmed by the grant of charters by state/accrediting bodies                                         
        - Registered
        -The process of recognizing an institution as being able to offer degrees and diplomas.                                                                                                                                                      
Join our whatsapp group for latest updates

Download COMPUTER STUDIES PAPER 1 - KCSE 2019 MOCK EXAMINATION - KAKAMEGA.


Tap Here to Download for 50/-




Why download?

  • ✔ To read offline at any time.
  • ✔ To Print at your convenience
  • ✔ Share Easily with Friends / Students


Get on WhatsApp Download as PDF
.
Subscribe now

access all the content at an affordable rate
or
Buy any individual paper or notes as a pdf via MPESA
and get it sent to you via WhatsApp

 

What does our community say about us?

Join our community on:

  • easyelimu app
  • Telegram
  • facebook page
  • twitter page
  • Pinterest