NAME: ………………………………………………………………. CLASS: …………………..
FORM 3 END TERM 1 2023
COMPUTER STUDIES
ANSWER ALL QUESTIONS 2 HOURS
1 Give 2 reasons for use of binary data in computer systems (2mks)
2 List 3 parameters used to represent the magnitude of a number (3mks)
3 Briefly explain the following terms (2mks)
(i) Bit
(ii) Byte
(iii) Nibble
(iv) Word
1
4 Define the following terms relating to the computer lab power supply (4mks)
(i) Brownout
(ii) Blackout
(iii) Transients
(iv) Power sag
5 Discuss the 3 parts of the task bar (3mks)
6 List 2 characteristic of 5th generation computers (2mks)
2
7 Discuss the following types of computer software: (2mks)
(i) System software
(ii) Application software
8 Discuss the following: (3mks)
(i) Disk formatting
(ii) Disk defragmentation
(iii) Disk partitioning
9 Give 2 functions of UPS (2mks)
10 Give any four document formatting features of a word processor. (2mks)
3
11 List 2 functions of the operating system (2mks)
12 Explain the following considerations when purchasing software (2mks)
(i) Authenticity
(ii) Portability
13 List 3 functions of the control unit: (3mks)
14 List 3 examples of special purpose computers (3mks)
15 List 2 types of flat panel display technologies. (2mks)
4
16 List 2 factors to consider when choosing a word processor (1mk)
17 Discuss the following types of typing modes in Ms word (2mks)
(i) Insert Mode
(ii) Type over mode
18 Discuss 3 types of computer buses (3mks)
19 Discuss 3 types of operating system according to user interfaces (3mks)
5
20 Differentiate between superscript and subscript (2mks)
21 What is a drop cap (1mk)
22 Differentiate between headers and footers (2mks)
23 What is mail merge (1mks)
24 List 3 components of a spreadsheet (3mks)
25 Differentiate between a formula and a function (2mks)
6
26 Differentiate between absolute and relative cell referencing (2mks)
27 Explain the following types of database models:
(i) Hierarchical model (2mks)
(ii) Network model (2mks)
(iii) Relational (2mks)
28 What is a primary key (1mk)
29 Discuss 3 non-printing guides in DTP (3mks)
7
30 List 4 requirements for internet connectivity (2mks)
31 Differentiate between sign-in and sign-up (2mks)
32 Differentiate between Uploading and Downloading a file (2mks )
33 List 2 types of computer virus (2mks)
34 Discuss the following types of computer crimes: (3mks)
(i) Hacking
(ii) Industrial espionage
(iii) Eavesdropping