Questions
SECTION A (40 MARKS)
- What is meant by
- Analogue data
- Digital data (4mks)
- Distinguish between transcription and transposition types of errors and give an example of each (4mks)
-
- what are peripheral devices? (1mk)
- Give two examples of peripheral devices (1mk)
-
- What meant by the term user-friendly as used in software development? (1mk)
- Distinguish between the terms single-tasking and multi-user as used in operating systems (2mks)
- What actions should be taken in case of a fire outbreak in the computer laboratory? (4mks)
-
- What is an Internet Service Provider? (1mk)
- An employee in a business company is charged with the responsibility of putting the company advertisements on the Internet.
- State the professional title of the employee. (1mk)
- Give an example of software used by this employee to carry out the above task. (1mk)
- Differentiate between COM ports and LPT ports (2mks)
- Explain two ways in which ICT can enhance commerce. (2mks)
- Explain the following software terms:
- Portability (1 mk)
- Modularity (1 mk)
-
- State two application areas of a desktop publishing software. (2mks)
- Explain the following graphic terms:
- Rotate (1 mk)
- Crop (1mk)
-
- List two arithmetic operations that can be performed on a row of numeric data in a word processing table. (1 mk)
- In each case of (a) above, write the expression used. (2mks)
- List two methods of gathering information during system development process.(2mks)
- Name three types of optical disks. (3mks)
- The diagram below shows a formatted plate surface of a storage disk.
Shade and label:- one sector ( 1mk)
- One block
- The diagram below shows a formatted plate surface of a storage disk.
Shade and label:- One sector
- One block
SECTION B (60 MKS)
Answer question 16 and any other three questions from this section in the space provided
-
- Study the flowchart below and answer the questions that follow
- Name the control structures used in the flowchart (2mks)
- Determine the values of M, N, P and Q. (4 mks)
- Write the pseudo code for the flowchart (7mks)
- List four functions of an assembler (2 mks)
- Study the flowchart below and answer the questions that follow
-
- Distinguish between the following sets of terms as used in spreadsheets. (2mks)
- Worksheet and workbook
- Filtering and sorting
- State one way in which a user may reverse the last action taken in a spreadsheet package. (1 mk)
- The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, and A, B, C. respectively
A B C D E F G H 1 Name Hours
WorkedPay Per
HourBasic
PayAllowances Gross
PayTax
DeductionsNet
Pay2 Korir 12 1500 3 Atieno 28 650 4 Mutiso 26 450 5 Asha 30 900 6 Maina 18 350 7 Wanjiku 22.5 250 8 Wayama 24.5 250 9 Olesane 17 180 10 Moset 33 700 TOTALS
Use the following expressions to answer the questions that follow:- Basic pay = hours worked x pay per hour
- Allowances are allocated at 10% of basic pay
- Gross pay = basic pay + allowances
- Tax deductions are calculated at 20% of gross pay
- Net pay = Gross pay – tax deductions.
Write formulae using cell references for the following cells;(5mks)- D2
- E4
- F10
- G7
- H5
-
- State three ways of moving round the page in a Desktop Publishing window. (3mks)
- State two ways on how information & Communication Technology (ICT) can be used to reduce the spread of HIV/AIDS (2mks)
- Distinguish between the following sets of terms as used in spreadsheets. (2mks)
-
- Describe the following terms with reference to security of data: (2mk)
- Log files
- Firewalls
- A student‟ database comprises of students‟ details table and fees received table as shown below:
Student's details table
Surname Middle name First Name Admission Number Course
Fees Received Table
Date Amount Receipt No. - State the primary key field for each table. (2mks)
- State the field, which should serve as the linking field for the two tables
- Describe the following terms with respect to computer security:
- Logic bombs (2mks)
- Physical security (2mks)
- Tapping (2mks)
- List three functions of antivirus software. (3mks
- Describe the following terms with reference to security of data: (2mk)
- Define the following web related terms:
-
- Web browser (1mk)
- Hyperlink (1mk)
- Hypertext document (1mk)
- List six activities performed on the web (3mks)
- Below is an email address:
ggitau @moest .edu.ke
↓ ↓ ↓
A B C
Name the parts labeled:- A
- B
- C
-
- A computer C directory has folders for form 1, form 2, Form 3 and form 4. Each class has student‟s folders labeled according to their number. The students create their own folder for the subject the are studying based on the table shown below
Form 1 Form 2 Form 3 Form 4 OS SP Pr. ADB WP DTP
DBInternet - Assuming there is one student per class, draw the corresponding directory tree structure. (6mks)
-
- a form four student wants to create a folder to store her project.
State the path for that project folder. (2 mks) - Suggest how the student can ensure that
- Work is not lost in case the hard disk fails. (1mk)
- The project is not copied by other students. (1mk)
- a form four student wants to create a folder to store her project.
-
- Other than I/O devices, list other three devices under the control of the operating system. (3mks)
- Explain any one of the devices named in C (i) above (1mk)
- Define the term trouble shooting (1mk)
- State and explain three ways that can be followed to replace the current system (6mks)
Marking Scheme
- What is meant by:
- Analogue data: Data that is based on physical variations such as loudness and
pitch, electoral voltages etc - Digital Data- Data, which use the computer‟s binary number systems 0 and 1
- Analogue data: Data that is based on physical variations such as loudness and
- Distinguish between transcription and transportation types of errors and give an example of each
- A transcription error is a specific type of data entry error that is commonly made by human operators or by optical character recognition (OCR) programs
E.g. Name: Stamley (wrong) instead of Stanley (Correct) - A transposition error is an error caused by reversing two or more digits of an amount while posting transactions. These are almost always human in origin
An Example is ZIP code: 57429 (wrong) instead of 54729 (correct)
- A transcription error is a specific type of data entry error that is commonly made by human operators or by optical character recognition (OCR) programs
-
- What are peripheral devices? (1mks)
- Any device connected externally to the CPU
- Any device connected externally to the CPU
- Give two examples of peripheral devices (1mk)
- Mouse, Monitor, Keyboard, printer etc
- What are peripheral devices? (1mks)
-
- What is meant by the term user – friendly as used in software development?
- Software that is easier to use or work with (1mk)
- Software that is easier to use or work with (1mk)
- Distinguish between the terms single- tasking and multi- user as used in operating systems (1mks)
- Single tasking – the O/S allows one program to be processed at a time
- Multi – user an O/S that allows several tasks/ programs to be simultaneously
- What is meant by the term user – friendly as used in software development?
- What actions should be taken in case of a fire outbreak in the computer laboratory? (4mks)
- Switch off main electrical supply
- Vacate the room
- Inform master in charge
- Call for help
- Try to extinguish using the appropriate fire extinguisher (not water)
-
- What is an internet service provider?
- A company that provides internet services. Connects users to the internet
- An employee in a business company is charged with the responsibility of putting the company advertisement on the internet
- State the professional title of the employee (1 mk)
- Web administrator, web designer
- Give an example of software used by this employee to carry out the above task (1 mk)
- HTML, Dream weaver, MS Front Page
- HTML, Dream weaver, MS Front Page
- State the professional title of the employee (1 mk)
- What is an internet service provider?
- Differentiate between COM ports and LTP ports
- COM port also known as a serial port transmits data bit by bit
- LTP port also known as a parallel port transmits multiple bits simultaneously at a time.
- Explain two ways in which ICT can enhance commerce
- Through better advertisement on the internet
- Through better services in retail shops via point of sale terminals
- Through electronic funds transfer
- Explain the following software terms
- Portability (1mk)
- Ability of a software to work/ function in several computer hardware and O/S platforms (
- Modularity
- Ability of software to be broken down into several sections for easier understanding and maintenance.
- Ability of software to be broken down into several sections for easier understanding and maintenance.
- Portability (1mk)
-
- State two applications areas of desktop publishing software. (2mks)
- Posters
- Book publishing
- Card design
- Explain the following graphic terms
- Rotate- to turn an image through an angle (1mk)
- Crop – to trim the edges of an angle (1mk)
- State two applications areas of desktop publishing software. (2mks)
- Distinguish between margins and borders as used in word processing (2mks)
- A border is a decorative frame that surrounds a page or elements on a page. The border can be a simple rule line or an elaborate set of lines and curves. A border can be composed of repeating graphic elements. Borders can be used to set apart, draw attention or unify disparate elements.
- Margin The blank space that surrounds the text on a page or the boundary line or the area immediately inside the boundary or the blank space that surrounds the text on a page.
-
- List two arithmetic operations that can be performed on a row of numeric data in a word processing table
- +,-,x,/
- +,-,x,/
- In each case of (a) above, write the expression used (2mks)
- = Function name (left) or = function name (right) e.g. = sum (left) (2mks)
- = Function name (left) or = function name (right) e.g. = sum (left) (2mks)
- List two arithmetic operations that can be performed on a row of numeric data in a word processing table
- List two methods of gathering information during system developments process. (2mks)
- Observations - Interviews
- Automatic data capture - Studying reports
- Name three types of optical disks ( 3 mks)
- CD- ROM
- CD- RW
- CD- R
- CD – W
-
- Study the flowchart below and answer the questions that follow
- Name the control structures used in the flowchart.
- Selection
- Sequencing
- Determine the values of M, N, P and Q.
M………17………………..N……………….17…………………..
P………..17………………..Q……………….17…………………. - Write the pseudo code for the flowchart
START
Initialize M=6, N=17
P= M-N
Q= N+M
IF P>Q THEN DO
N=M
Q=N
P=M
ELSE
M=N
Q=M
P=N
PRINT N,M,P,Q
STOP
- Name the control structures used in the flowchart.
-
- Distinguish between the following sets of terms as used in spreadsheets
- Worksheet and workbook
- Worksheet – The working area in an electronic spreadsheet on which a user enters the spreadsheet data.
- Workbook – A spreadsheet file. A workbook can obtain severalworksheets
- Filtering and sorting
- Data filtering is a way of organizing spreadsheet data for ease of analysis.
- Often spreadsheet filters are used to “hide” rows of data that do not meetcertain specified criteria. This allows you to analyze (e.g. count, observe etc) only certain “Filtering” groups of data.
Data sorting: Is a way of arranging record according to one of the fields in either ascending or descending order.
- Worksheet and workbook
- State one way in which a user may reverse the last action taken in a spreadsheet package (1 mks)
- Use the undo command (ctrl + z)
- The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, and A, B, C respectively.
Write formulae using cell references for the following cells- D2 = B2 * C2
- E4 = 10% * D4 or 10% * (B4 * C4)
- F10 = D10 + E10
- G7 = 20% * F7
- H5 = H5 – G
-
- State three ways of moving round the page in desktop publishing window (3 mks)
- Use cursor keys
- use mouse scroller
- Use scroll buttons (horizontal and vertical)
- State two ways on how information & communication technology (ICT) can be used to reduce the spread of HIV/ AIDS ( 2 mks)
- Through advertisements on the Internet
- Through creation of posters
- Through discussion groups on the internet
- State three ways of moving round the page in desktop publishing window (3 mks)
- Distinguish between the following sets of terms as used in spreadsheets
-
- Describe the following terms with reference to security of data:
- Log files
- A file that lists actions that have occurred. For example, web servers maintain log files listings every request made to the server. With log file analysis tools, its possible to get a good idea of where visitors are coming from, how often they return and how they navigate through a site.
- Firewalls. (1mark)
- A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy. Firewalls can either be hardware and/or software based.
- A firewall!\s basic task is to control traffic between computer networks with different zones of trust. Typical examples are the Internet which is a zone with no trust and an internal network which is (and should be) a zone with high trust. The ultimate goal is to provide controlled interfaces between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle and separation of duties
- Log files
-
- State the primary key field for each table.
- Student table- Admission Number
- Fees Received table - Receipt Number
- State the field, which should serve as the linking field for the two tables.
- Admission number
(Note: Make Admission Number a foreign key in the fees table
- Admission number
- State the primary key field for each table.
- Describe the following terms with respect to computer security:
- Logic bombs (2 Marks)
- A computer virus that is activated after a series of event/commands/date
- Physical security (2 Marks)
- Threats that threaten the physical nature of computer equipment e.g. Fire,
- Lightening water, building access etc
- Tapping. (2 Marks)
- Telephone tapping (or wire tapping/wiretapping) is the monitoring of telephone and Internet conversations by a third party, often by covert means. The telephone tap or wire tap received its name because historically, the monitoring connection was applied to the wires of the telephone line of the person who was being monitored and drew off or tapped a small amount of the electrical signal carrying the conversation
- Telephone tapping (or wire tapping/wiretapping) is the monitoring of telephone and Internet conversations by a third party, often by covert means. The telephone tap or wire tap received its name because historically, the monitoring connection was applied to the wires of the telephone line of the person who was being monitored and drew off or tapped a small amount of the electrical signal carrying the conversation
- Logic bombs (2 Marks)
- List three functions of antivirus software.
- Identify a virus/Warn
- Heal/Clean a virus
- Prevent/Protect infection
- Quarantine infected file
- Describe the following terms with reference to security of data:
-
- Define the following web related terms:
- Web browser (1 mark)
- A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
- A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
- Hyperlink (1 mark)
- This is the clickable link in text or graphics on a Web page that takes you to another place on the same page, another page, or whole other site.
- This is the clickable link in text or graphics on a Web page that takes you to another place on the same page, another page, or whole other site.
- Hypertext document (1 mark)
- A document usually web document (file) where the user interacts with the whole document using hyperlinks
- A document usually web document (file) where the user interacts with the whole document using hyperlinks
- Web browser (1 mark)
- List six activities performed on the web (3 marks)
- Browsing for information
- Communication via email and chat groups
- Electronic commerce.
- Advertising of goods and services.
- Transfer of information thro' FTP
- An institution has ten stand alone computers.
- Suggest with reasons the most appropriate topology required to interconnect the computers. (3 marks)
- Bus
Reason: Easy to set up, Low cost in terms of cabling QR - Star
Reason: Speed of data transmission is high, Easy to troubleshoot via central hub or switch
- Bus
- State the necessary steps required to connect the computers to the Internet. (4 marks)
- Connect server to modem (router) and telephone/or use satellite dish/or radio
- Get an ISP to configure the Internet protocol
- Configure the rest of the computers to Internet access through a peer-topeer configuration or a client-server configuration.
- Suggest with reasons the most appropriate topology required to interconnect the computers. (3 marks)
- Below is an email address:
Name the parts labeled:- The local-part of the address/username
- host name domain-part
- generic (organizational) top level domain
- country code top level domain
- Define the following web related terms:
-
-
-
- A form four student wants to create a folder to store to project State the path for flat project folder. (2 marks)
C:\FORM4\STUDNO\ADB\PROJECT - Suggest how the student can ensure that: -
- work is not lost in case the hard disk fails. (1 mark)
- Keep backup copies of the project on offline secondary storage media.
- The project is not copied by other students. (1 mark)
- Use passwords for opening and modifying the project
- Use passwords for opening and modifying the project
- work is not lost in case the hard disk fails. (1 mark)
- A form four student wants to create a folder to store to project State the path for flat project folder. (2 marks)
-
- Other than I/O devices, list other three devices under the control of the operating
- Main memory
- CPU/Processor
- Secondary storage
- Communication device
- Explain any one of the devices named in c(i) above. (1mrk)
- Other than I/O devices, list other three devices under the control of the operating
- Define the term trouble shooting
- Systematic approach to locating the cause of a fault in an electronic circuit or system
-
Download Computer Studies Paper 1 Questions and Answers - Form 4 End Term 1 Exams 2022.
Tap Here to Download for 50/-
Get on WhatsApp for 50/-
Why download?
- ✔ To read offline at any time.
- ✔ To Print at your convenience
- ✔ Share Easily with Friends / Students