Instructions
- This paper consists of TWO sections; A and B
- Answer all questions in sections A.
- Answer question 16 and any other three questions from section B.
QUESTIONS
SECTION A (40 MARKS)
Answer all the questions in this section in the spaces provided
- State any two peripheral devices that are powered by the system unit. (1mark)
- The following are symbols of some keys found on the keyboard. Name the keys represented by the symbols. (2marks)
- Explain any three functions of system software in a computer (3marks)
- As a computer student you have been asked to assist in buying an input device. State any four
factors to consider when buying input devices. (4marks) -
- The Arithmetic Logic Unit, The Control Unit and the Main Memory use electrical pathways or links called buses. Describe the three types of buses. (3marks)
- What is the role of special purpose memories in the microprocessor? (1 mark)
- Outline the three differences between primary memory and secondary memory. (3mks)
- State two advantages of integrated software as opposed to single purpose. (2marks)
-
- Define the term mail merging (1 mark)
- Name two files that are created in mail merging process (1marks)
-
- Distinguish between a workbook and a worksheet as used in spreadsheets (2marks)
- What is the meaning of “what if analysis” with respect to spreadsheet? (1mak)
- Define the following terms in relation to internet (2marks)
- Downloading
- Hyperlink
- Benjos was instructed by his teacher while typing a Microsoft word document to replace all the occurrences of the word MS with Microsoft. Highlight the steps to do this (3marks)
- What is the difference between logical and physical file? (2marks)
- Explain any three types of computer processing files. (6marks)
- Give a reason why HTML is not considered as a true programming language. (1mark)
-
- Define the following computer crimes
- Piracy (1mark)
- Industrial espionage (1mark)
- Define the following computer crimes
SECTION B (60 MARKS)
Answer questions 16 (COMPULSORY) and any other three questions in this section
-
- Draw a flowchart for a program that is to prompt for N numbers, accumulate the sum and them find the average. The output is the accumulated totals and the average. (5marks)
- Write a pseudo code for the above program. (4marks)
- State three types of control structures use in programming. (3marks)
-
-
- Subtract 1102 from 110102 (1mark)
- Find the sum of binary number 101.1012 and 110.1002 (1mark)
-
- Convert binary number 11010110.10012 into octal number.(1mark)
- Convert binary number 11010110.10012 into hexadecimal number.(1mark)
- Convert the following numbers to their decimal equivalent
- 11.0112 (2marks)
- 0.110112 (2marks)
-
- Convert 3BD16 to Octal. (3marks)
- Using one’s complement, calculate 510 – 910. use six bit in your calculation. (3mks)
- State the following types of transcription errors: (2marks)
- 3455 instead of 3456
- Simth instead of Smith
-
-
- State and explain the following types of relationship as used in database design
-
- Explain the difference between primary key and an index key as used in database application (2 marks)
- Outline the functions of a primary key (2marks)
- Describe the following types of database model
- Network model (2marks)
- Relational model (2marks)
- State and explain the following types of relationship as used in database design
-
-
- What is an operating system? (1mark)
- Maintaining security is one of the functions the operating system. Explain how the operating system maintains security (2marks)
- Explain how an operating system controls I/O devices. (2marks)
- What does the following control measures against computer crime involve? (5marks)
- Audit trail
- Data encryption
- Log files
- Passwords
- Firewall
- Briefly explain what happen during power on self test (POST) (3marks)
- Explain the functions of complementary metal-oxide semiconductor (CMOS) (2marks)
-
-
- State two advantages and two disadvantages of the ring network topology
Advantage (2marks)
Disadvantages (2marks) - State two roles and responsibilities of the following ICT professional:
Network Administrator. (2mks) - The worksheet below shows sales for the month of July by the employees of Newtech information center. Use it to answer the questions that follow.
A
B
C
D
E
F
1
First name
Second name
Sales in sh.
Sales in sh.
Sales in sh.
2
Yonah
Kassim
2000.12510
12000
25000
3
Jose
Kiddo
7200.1741
5000
10000
4
Kelvin
Joro
1500.131
700
5000
5
Lores
Ayona
2600.1011
8500
4000
6
Bett
Gilbert
2000.1200
2000
4500
7
Osoro
Kiplat
1001.0113
5500
6600
8
Zainad
Jad
500.1211
6000
7500
9
Hassan
Makotti
400.10010
8000
2000
10
Jonnie
Imran
3111.0110
7000
15000
11
12
Write the correct expression:- In cell D3 that would print “PROMOTE” if the amount of sales is greater than
sh. 1600 and DEMOTE” if not (2mks) - In cell E3 that would print remark “WINNER” if sales are the highest and
“MEMBER” if not (5mks) - Expression to count students whose second name starts with letter J. (4 marks)
- In cell D3 and D7 that would round the values in cell C3 into zero decimal place and C7 into 2 decimal places (2marks)
- In cell D3 that would print “PROMOTE” if the amount of sales is greater than
- State two advantages and two disadvantages of the ring network topology
Download Computer Studies Paper 1 Questions - Kapsabet Boys Post Mock 2023 Exams.
Tap Here to Download for 50/-
Get on WhatsApp for 50/-
Why download?
- ✔ To read offline at any time.
- ✔ To Print at your convenience
- ✔ Share Easily with Friends / Students