Computer Studies
Computer Studies
Computer Studies
- A computer is an electronic device that operates (works) under the control of programs
- An electronic device that accepts data, as input and transforms it under the influence of
a set of special instructions called programs, to produce the desired output (referred to
as information)
(i) Data
A collection of raw facts, figures or instructions that do not have much meaning to the
user
(ii) Program
processed
Page 1 of 239
(iii) Data processing
It is the process of collecting all terms of data together & converting them into
information
(iv) Information
Data which has been refined summarized & manipulated in the way you want it, or into
- Accepting data
- Producing information
4. Explain the following input/ output terms as used in computer systems. Give an example
for each
(a) Read - To transfer data from an input device to the computer, e.g. the computer
Storage
Page 2 of 239
5. State four different parts that make up a computer (2 mks)
- System unit
- Monitor
- Keyboard
- Mouse
- Printer
- Modem
- Scanner
- Speakers
- Graph plotters
This is the casing that houses the internal components of the computer such as the CPU
(b) List four devices located under the cover of the system unit
- Motherboard
- Main memory
- Hard disk
- Disk drives
- Battery
Page 3 of 239
- Buses
- Video card
- Expansion slots
(c) Give two differences between tower – style and desktop system units
- Tower style system unit is designed to stand alone or to be placed on the floor,
desktop units lie on the desk with the monitor placed on top
- Tower style units have more space for expansion than the typical desktop units
(2 mks)
- The computers constantly broke down due to the excessive heat generated;
- Very costly
Page 4 of 239
8. Briefly explain the classification of computer according to historical development
(generations)
- The computers constantly broke down due to the excessive heat generated;
- Very costly
- They consumed less power & produced less heat than the first generation
computers
Page 5 of 239
- RAM memory capacity was 32 KB
- Could support remote communication facilities/ more than one user at the same
time
- Used large scale integrated (LSI) circuits & very large scale integrated (VLSl)
- Magnetic disks, bubble memories & optical disks were used for storage
Page 6 of 239
- Are designed/ constructed using parallel architectures, 3 –D circuit design &
superconducting materials
- Use advanced hard disks and optical disks for storage, e.g. DVDs
- Power
10. State the differences between desktop computers and laptop computers
size
Page 7 of 239
- PCs are becoming small and portable, e.g. personal Digital Assistant (PDA).
(b) Give two reasons why smaller computers like Laptops tend to be more
- They have advanced power management capabilities (they consume less power
12. Which category of computers would you place an N- series Nokia phone
- Microcomputer/ palmtop
- It has a keypad
- It is programmable
- Bathroom scale
- Thermometer
Page 8 of 239
- Speedometer
- Robots
- An automatic pilot
- A word processor
15. State a specific example where each of the following types of computers can be used
(a) Supercomputer
- Weather forecasting
- Petroleum research
Page 9 of 239
- Hospitals
- Airports (i.e., in Airline reservation systems for booking & storing flight information)
- Space industry
Page 10 of 239
(c) List three factors to be considered when purchasing a microcomputer (3 mks)
- Type of processor
- Processing speed
- Number of users who can access the computers at the same time
17. Explain four reasons which make microcomputers suitable for personal computing work
- Reduced cost, i.e. are cheaper than the minicomputers & mainframe computers
- Are more reliable in doing various functions than the early mainframe computers
18. (a) Identify and explain five areas where computers are used to process data ( 10 mks)
Supermarkets
- For stock control i.e. records of what is in store, what has been sold, and what is out of
stock
Page 11 of 239
- For production of receipts
Banks
- Manage financial transactions through the use of special cash dispensing machines
- Processing of cheques
Homes
Industries
- For management control, i.e. to keep track of elders, bills and transactions
Police stations
- For face recognition, scene monitoring & analysis which help the police carry out
Page 12 of 239
Transport industry
- Airports; to control the movement of aircrafts, their take off & landing using radar
equipment
communication
Offices
- Production of documents
- Keeping of records
Page 13 of 239
20. (a) Define the term ‘ computer laboratory’ ( 2 mks)
installation of computers, and provide a safe conducive environment for teaching &
(b) Give two factors to be considered when preparing a computer laboratory (2 mks)
- Security of computers
21. List down three safety precautions one should observe when entering a computer
laboratory (3 mks)
- Avoid unnecessary movements as you may accidentally knock the peripheral devices
- collect any waste papers which might be lying in the computer room & put them into
the dustbin
Page 14 of 239
22. Describe the ideal environment for a computer to work properly (3 mks)
23. Explain why smoke and Dust particles are harmful to a computer
- Dust and smoke particles settle on storage devices and may scratch them during read/
write operation
24. Identify three facilities that will ensure proper ventilation in a room
- Installing fans
25. Why must foods and beverages be kept out of the computer room?
- Food particles may fall into the moving parts of the computer and damage them.
Liquids may spill into the computer parts causing rusting or electrical faults
26. Why would it not be good to install Powder or Water – based fire extinguishers in the
computer room?
- Powder particles settle on storage devices and may scratch them during read/ write
operation
Page 15 of 239
27. (a) State one reason why a computer needs to be connected to a stable power supply
(1 mk)
- To avoid damage and loss of important data or information such as application software
- Prevent loss of data/ information that had not been saved before the failure
(b) List down four functions of the uninterruptible Power Supply (UPS) (4 mks)
- Allows the user to save his/ her work, and switch off the system using the correct
procedure
28. Mention two things that are likely to cause strain- in the computer room
- Bright monitors
- Flickering monitors
29. Identify three proper sitting postures while using the computer
- Adopt relaxed and straight back position to avoid bending forward or learning far
backwards
Page 16 of 239
- The feet should be firmly placed flat on the floor
- The seat must be high enough allowing the eyes to be the same level with the top of the
Screen
- The seat must have a straight backrest that allows someone to sit upright. This prevents
- The height of the chair or working surface must be high enough such that your forearms
are parallel with the floor and your wrists are straight.
- The seat must be high enough relative to the table to enable the user use the hands on
- Fit the computer room with special curtains to reduce entry of dust particles
- Cover the computer devices with dust covers when cleaning the room
31. Name two main causes of fire in the computer laboratory and give the precautions that
- Ensure that the computer room has a gaseous fire extinguisher containing carbon
Page 17 of 239
- Smocking
- To prevent mixing diskettes that are used everyday with those used for long- term
33. List three things that can spoil a printer if they are not of the correct specification, and
(i) Printer Paper: Different printers have different sensitivity to printing papers. Using the
wrong quality paper in a particular printer can make the paper get stuck
(ii) Cartridges & Ribbons: Printers are very specific to manufacture’s cartridges & ribbons
Use of clones or imitations ( i.e., the wrong make & model) can damage the printer mechanism
(iii) Refilling of cartridges or re- inking of ribbons: It can spoil the printer due to leakage or
34. Explain three ways that computer technology could make office more efficient (3 mks)
- There is easier & faster retrieval of data, i.e. they reduce the time and effort needed to
Page 18 of 239
35. (a) Explain the steps you would follow to set up a new computer
- Gently and carefully connect the interface cable of each device to the correct port and
to the device.
- Observe boot up information on the screen to see whether Power-On Self Test (POST)
displays any error message. A successful boot means that the computer was properly
setup.
(b) Outline three reasons why it is important to first shut down the computer before
turning it off
36. A computer must go through the process of booting/ initialization before use
Booting refers to the starting up of a computer. It is the entire process that makes the
(b) Explain what happens in the computer during the booting process
When the power is switched on, internally, it first checks whether all the components
are in good working condition, i.e. the RAM, CMOS (BIOS), hard disk & floppy disk
drive controllers, and the keyboard. If no problem is found, it then loads the operating
systems
Page 19 of 239
(c) Give and explain two types of booting
It happens when a computer which was originally off is switched on by pressing the
The Computer starts by checking all its components to determine whether they are
functioning properly
This happens when a computer that was originally on is forced to restart by pressing the
restart button on the system unit by pressing a combination of keys on the keyboard
(d) What type of memory is used to store the boot up program (the first program to
An input device that lets the user enter commands into the computer for execution by
typing
(b) List four types of keys found on a computer keyboard, giving an example of each
( 4 mks)
Page 20 of 239
- Alphanumeric Keys (A-Z, 0-9)
- Special PC keys (Ctrl, Shift, Alt, Ins, Enter, Spacebar, Caps lock, Num
lock, etc)
(c) Name the keyboard keys that will help you: (2 mks)
Page 21 of 239
COMPUTER SYSTEMS
(i) System
goal
A collection of entities that work together to process and manage information using
computers
A collection of hardware software and live- ware all working together in data
3. (a) List and explain three functional elements of a computer system ( 6 mks)
Hardware
They are the physical & tangible devices that make up a computer systems, e.g system
Software
Page 22 of 239
These are programs & data used in a computer system that enable it perform a number
These are the people who coordinate the various activities which are necessary to make
a computer system perform useful tasks e.g. data entry clerks, computer operators,
(b) Draw a well – labeled diagram showing the functional units of computer hardware
Page 23 of 239
4. (a) Give two main functions of a computer input device. (2 marks)
- Accepts data & instructions from the user and sends them into the CPU. V
- Converts data into a form that the computer can understand (i.e., machine-
Sensible/readable form)
- Scanner,
- Digital cameras,
- Barcode readers.
- Keyboard,
- Keypad.
- Mouse.
- Trackball.
- Light pen
- Joystick.
- Microphone.
Page 24 of 239
- Printer.
- Plotter.
- It is a faster input device because it involves just pointing on the screen and selecting
options.
These are devices that enter (capture) data into the computer directly.
superstores.
Barcode reader
Page 25 of 239
8. Mr. Otieno a French teacher used speech method to store students’ oral answers to an
(b) State two advantages and two disadvantages of using this method of data input
(4 mks)
Advantages
- Its suitable for people with special needs especially those with impaired
hands
Disadvantages
- Voice input does not take care speech related problems such as accents, tone etc
- Most speech input devices can recognize a limited, standard vocabulary of spoken
Page 26 of 239
- For people with special needs or disabilities (e.g. the handicapped especially those with
impaired hands.
- Emergency situations
- For house/ office or car security where voice activated locks are used for access control
9. Name two examples of scanning (data capture) devices used at point of scale terminals in
supermarkets
- Barcode reader
- Light pen
- Cash registers
These are documents produced as output and which can be re-used as input by the computer
(b) Name any two data capture techniques that make use of turnaround documents
(2 mks)
Page 27 of 239
- Optical Mark Recognition (OMR)
11. List five factors one would consider when selecting a data input device (4 mks)
- Input speed
- Cost, i.e. the initial cost of the input device & cost of using the device on a day – to –
day basis.
- Accuracy required
- Availability of space
(ii) System control- it controls the sequence of operations within the computer
(iv) It controls the use of the Main Memory in storing of data & instructions
(v) Storage of data- It provides temporary storage (RAM) & permanent storage (ROM)
Page 28 of 239
13. Explain the functions performed by each of the following central processing unit elements
- Interpreting instructions
(iii) Registers
- Holds data and instructions temporarily just before and after processing
Page 29 of 239
14. In reference to ALU, explain the meaning of logic operations and give an example of this
processing operation
Logic operation is the ability to compare two quantities or numbers to determine which
is greater than, less than, equal to, or not equal to the other.
It also involves the testing for existing of a condition encountered during the processing
- Accumulator
- Instruction
- Address register
- Storage register
16. (a) Name the basic unit used to measure the processing speed of a computer ( 1 mk)
Hertz (Hz)
(b) A computer processor speed is measured in Hertz. What fraction of a second is the
Following?
(i) 1. Nanosecond
1 1__________
(ii) 1. Microsecond
Page 30 of 239
1 = 1________
A communication path/ medium within the computer that connects the basic computer
each other.
A parallel collection of conditions that carry data & control signals from one element to
another
(b) State the functions of each of the following computer bus ( 3 mks)
Data bus- carries data from the processor to memory during the write operations and from
Address bus- it conveys addresses, i.e it carries the address of the memory location or
Control bus- it carries the timing & control signals necessary to coordinate the activities of
This is the electronic board where all electronic components such as processor, memory chips,
- Processor (CPU)
Page 31 of 239
- SIMM/DDR sockets
- Memory chips
- BIOS
- Interface chips
- Buses
A drive is a computer device for reading data from or writing data into a storage media
(b) State any two types of computer drives, giving an example of a storage device used by
each (3 mks)
20. (a) Give two reasons why there are many forms of computer storage devices ( 2 mks)
- Permanency of storage
- Cost of implication
- Floppy disk
- Cassette tapes
- Hard disk
- Zip disks
- Jazz disks
- Flash disks
- Punched cards
- Optical discs (e.g., Compact Disks LS- 120 super disks, optical card, optical tape)
Primary storage devices are accessed directly by the CPU, while secondary storage is
not
Fixed disks are mounted inside the computer system unit, e.g. Hard disk.
Removable disks are not hosed inside the system unit & are portable, e.g. floppy disk,
Page 33 of 239
(ii) Flash disk
A high capacity plug-in portable storage device. Usually attached at the USB port of the
computer
High capacity disk that resembles a floppy disk, but is slightly larger and thicker in size
23. (a) Compare a floppy disk and zip disk in relation to size ( 2 mks)
A floppy disk is physically small in size and capacity, while a zip disk is slightly large
- Not reliable
24. (a) State three advantages of using hard disks as medium of storage
- Are very fast compared to other secondary storage devices in terms of data transfer
Page 34 of 239
(b) Describe three precautions you would take to avoid damaging the hard disk ( 3mks)
(c) Describe the structure of a hard disk in reference to cylinders, tracks and sectors
The surface of hard disk is divided into circles called Tracks. Parallel tracks on several
The tracks are further subdivided into sectors. Several sectors can be grouped to form
clusters.
25. State two reasons why Magnetic tapes are not commonly used as computer data storage
medium today
- Are slow when retrieving data. This is because of the linear storage of data o the tape.
- Do not fully use their recording surface due to inter- record Gaps
Page 35 of 239
(ii) Volatile memory and non- volatile memory
RAM is a temporary and rewritable memory, while ROM is a permanent and read only
memory.
Hard disk is a hard metallic platter used to store data and is encased in a metallic
housing (casing)
In magnetic storage media, data is recorded using magnesium, while in optical storage
Hardcopy is printed copy, e.g. printout on paper such as letters while softcopy is
MICR uses magnetic technology to read magnetic characters, while OCR uses laser/
Page 36 of 239
27. Explain four rules for handling magnetic disks
- Keep magnetic away from excessive heat. This is because heat energy weakens the
- Store the media in their cases when not in use in order to protect/ safeguard their
recording surfaces against environmental influences such as dust, touch, direct sunlight,
radiations, etc
- Never bring them near moving or strong magnetic bodies. Such bodies might
impossible
- When mounting the media into its reading/ writing unit, avoid brushing the recording
- Put on the power before mounting the media and off after removing the media from the
drive.
28. (a) Calculate the capacity in MB of a two sided floppy disk with 6 sectors per surface,
= 12 sectors
Page 37 of 239
1,000,000 bytes 1 MB
6,144
1,000,000 = 0.006144 MB
(b) A double – sided disk contains 40 tracks on each side. The tracks are divided into 9
sectors of 512 bytes each. What is the total capacity of the disk in megabytes? ( 2mks)
368, 640
1,048, 576
= 0.352 MB
29. By giving examples, differentiate between primary and Secondary Computer storage
( 3 mks)
Page 38 of 239
Primary Memory Secondary Memory
1. Used for holding data & instructions 1. Used for storing backup information
5. It has low/ limited storage capacity 6. It is non- volatile i.e. stores data
store temporary programs & data E.g. punched cards, magnetic tapes,
7. The speed of the processor depends floppy disks, hard disks, etc
storage
It stores Firmware (bootstrap instructions) - the essential files the computer uses while
Page 39 of 239
It stores the system data & instructions that are necessary for the normal functioning of
It stores translation programs (code converters) used for converting a user’s program
It stores instructions used in special – purpose computers & computerized fuel pumps
It can only be read, but cannot be written to (i.e., the user can only read the information
Provides permanent or semi permanent storage of instructions & data from the
manufacturer.
Forms a small proportion of the main storage ( i.e. it contributes 30% of the internal
Memory).
- Masked ROM
Page 40 of 239
31. (a) Outline three characteristics of Random Access Memory (RAM)
- Stores data & programs temporarily during the times when they are needed in the Main
- Provides “read & write facilities” i.e. it allows instructions to be written, read out & to
be changed at will.
- The contents in RAM are user – defined, i.e. the user dictates what is to be contained in
the RAM
- It is a volatile memory
(b) Name the two types of RAM clearly starting their differences (3 mks)
A static RAM can retain its data/ content as long as power is provided to the memory
- Dynamic RAM can only hold its content for a short while even when power is on.
Therefore, in order to maintain its content/ data, a DRAM must undergo the refreshing
- SRAM chips are physically large & much more expensive than DRAM chips
Page 41 of 239
- Dynamic RAM has a much higher packing density than SRAM, i.e., a DRAM chip is
able to store more information than a SRAM chip of the same size.
Flash Disk
(ii) List down two advantages of this device over a floppy disk in storage ( 2 mks)
Page 42 of 239
- LS- 120 super disk
- Optical card
- Optical tape
(b) Give two advantages of a digital Versatile Disk over a normal Compact disk
- Softcopy
- Hardcopy
- Monitors
- Printers
- Plotters
- Sound cards
- Digital projectors
- Storage devices
Page 43 of 239
(c) Identify three Functions of computer devices
- Convert the coded results produced by the computer to human- readable form
- Used to display the results of all the data that has been processed from the computer
- It converts machine- coded outputs results from the processor into a form that can be
understood by people
(b) Show two differences between a CRT monitor and a flat- panel display
- CRT monitor uses a cathode ray tube to display information, while a flat panel does
not.
- Flat panel displays are light & easily portable, while CRT’s are heavy
- CRT can display a wide range of colours, while a flat panel displays a limited number
of colours
- The screen of a flat panel is much thinner & smaller than that of a CRT
- The screen resolution of a CRT is adjustable, while that of a flat panel is often set
Page 44 of 239
(c) Give there examples of flat- panel monitors available in the market today
- Gas plasma
Pixels (picture elements) are dots on the screen that form characters and images
(c) Give two advantages of the higher number of pixels per square centimeter (2 mks)
Are usually low- speed printers that print one character at a time?
- Dot matrix
- Thermal
Page 45 of 239
- Daisy wheel
- Inkjet
- Golf ball
38. Distinguish between impact and non impact printers and give two examples of each
Impact printers print by striking mechanism & are noisy, e.g Dot matrix, Daisy wheel,
Non- impact printers print either by laser, ink or thermal transfer mechanism & are
A page printer prints documents page by page, while a line printer prints documents
line by line
- Economical in maintenance
- It is very silent
Page 46 of 239
- Involves expensive multiply colour printing
40. Highlight four factors one should consider when purchasing a printer (4 mks)
- Cost involved i.e. the printer’s buying price, cost of maintenance & cost of consumable
- Capability of the selected printer, i.e. multiple copy production, paper size, etc
- Ease of maintenance
- Documentation
Page 47 of 239
- Availability
- Produces large graphical designs of high quality, which are east to read & use
- Can print on large sized papers, e.g. papers e.g. Al, Which a normal printer cannot
- One can receive the output even when a few meters away from the computer
- Errors are easily corrected, e.g. if used in a camera, one know when the film or
43. George connected new multimedia speakers to his computer and tried to play his favorite
music CD, but no sound came out. Suggest two problems that might have occurred
(2mks)
Page 48 of 239
- Speakers not powered
- Lack of analogue cable connecting the optical drive to the motherboard or sound card
(a) Port
A special kind of socket found at the back of a computer used to connect an external
peripheral device such as a printer, monitor, mouse, scanner, modem, flash disk, etc to
These are special cables that connect all the peripheral devices to the motherboard and
the CPU. They transmit data signals and information to and from the devices
Page 49 of 239
(c) Power cable
46. State the function of the power supply unit found in the system unit (1 mk)
- It supplies stable power to the motherboard and other internal devices of a computer
- Converts the potentially dangerous alternating current (AC) into a steady low- voltage
47. (a) Name any two peripheral devices which get their power supply through ports
- Keyboard
- Mouse
(b) State the type of port that would commonly be used to connect the following devices
48. (a) Explain two differences between serial and parallel communication ports of a
computer
- Serial ports have 9 pins, while parallel ports have holes for 9 or 25 pins
- Parallel cables transmit several bits of data simultaneously, while serial cables transmit
Page 50 of 239
- Serial cables are slower than parallel cable
- Serial cables allow for 2 ways communication (i.e. communication to and from the
computer and the device connected to it) while parallel cables usually offer 1- way
communication.
(b) Give two major advantages of a USB interface cable over other cables in the computer
- The USB port can be used to connect a wide range of peripheral devices due to its
49. Outline three precautions one should take when assembling a computer
- Disconnect all diverts from the power source before starting to work on them
- Never work alone because you may need help in ease of energy
- Discharge ant static electricity that might have built up on the hands by touching an
50. State six factors which you would consider when selecting computer hardware for an
organization
Page 51 of 239
- Upgradeability of the computer
- User needs
- Multimedia capability
51. List down any four hardware components you can add or upgrade in a computer system
(4 mks)
- Processor (CPU)
- Hard disk
- RAM memory
- Expansion slots
A warranty is an agreement between the buyer and the seller that spells out terms and
A warranty is usually the duration in which your computer is supposed to work without any
problem.
Page 52 of 239
(b) Why is it important to carefully study a warranty before committing yourself by
signing it?
In order to negotiate on sensitive items like duration, after sales services etc.
- How comprehensive is the warranty- good warranty should cover all the parts of the
Computer.
- Liability agreement e.g. how long should the supplier take to repair a fault or replace
the product, and if he/ she delays, who bears the cost.
53. What are clones with reference to computers and what is their disadvantage?
Disadvantages
- They are not as reliable as their brand names like IBM, Compaq, Hewlett Packard (HP),
Page 53 of 239
54. (a) What is standard software?
These are programs developed, packaged and then made available for purchase either
(b) Small and large scale organizers are turning to the use of in- house developed
software for the processing activities rather than use of standard software
These are programs that are uniquely designed & written by the user or a software
house under contract, to meet the specific needs of a particular user or organization.
They are usually customized (tailored) to perform a specific job or solve only specific
(ii) Give two reasons that may be influencing these organizations for such a decision
( 2 mks)
- The user gets well tested program, which he/ she is able to use with confidence
- The program provides all the facilities required to solve a particular problem
- The purchaser has direct control over the package, as he/ she is involved in its
Production
- The user is able to quickly implement the results obtained from the use of the package
Page 54 of 239
- They can easily be modified to meet specific user’s needs without involving expert
programmers.
- Single – purpose software is developed for only one purpose, while integrated software
is a suite of more than one program and can be used to carry out a variety of tasks
(i) Authenticity
It is the genuineness, validity or legitimacy of software. The copy of the software you
developer.
(ii) Portability
It refers to whether a program can be copied or installed in more than one computer
In hardware, the computer device should be sufficiently small & light to carry
In software, portability refers to whether a program can be copied from one computer to
58. (a) Explain why documentation is necessary for any software package
It contains details on how to install use and maintain the software. It also shows the
purchaser how the program can be used to solve particular problem as well as provide
Page 55 of 239
(b) A firm intends to purchase new software. List three items of documentation that
- A license
- Installation guide
- Reference manual
- Warranty
- Upgrades
- Service pack
Page 56 of 239
OPERATING SYSTEMS
1. The central processor and peripheral devices of a computer system are coordinated
A set of computer programs that normally reside in the main memory and used to
control the basic computer hardware resources & the operation of the entire system
The main program that controls the execution of user applications, and enables the user
to access the hardware & software resources of the computer
- Processor
- Memory (RAM)
- Communication devices
- Files
(c) There are several types of operating systems in use today. State two examples of
- Windows
- MacOS
- Unix
Page 57 of 239
- Linux
2. Name the two latest operating systems from Microsoft corporation ( 2 mks)
- Windows XP
- Windows Vista
- Loads application programs from an external storage into the available locations in the
- It keeps track (monitors) of the parts of the memory that are in use, and those which are
free
The processor can only execute one program at any one time. Therefore, in a multi-
tasking system access to the CPU must be carefully control & monitored. The OS must
decide, which program will be allowed into the system, and for how long
(iii) Job scheduling- it schedules & loads programs in order to provide a continuous
sequence of processing. This is necessary when more than one application program is
(iv) Error reporting and interrupt handling- The OS reports any errors that occur during
program execution.
Page 58 of 239
In a multi- taking system where several user programs share the computer resources,
the processing is done according to the job priorities allocated and in a continuous
process until all the jobs in the queue within the memory are executed. This ensures
that the CPU does not remain idle at any given time.
The OS controls the allocation of I/O devices and tries to resolve any conflicts that
arise. It also monitors the state of each I/O device and signals any faults detected
OS is concerned with the logical organization of the files in the computer & provides
It also provides a means of protecting the data files & programs against unauthorized
(viii) It controls the selection & operation of the hardware devices used for input, output &
storage
(ix) It interfaces the user to the system’s hardware, i.e. it provides a quick means of
The OS keeps records (internal logs) on how the computer resources (e.g. CPU time,
It also keeps a complete record of all what happens during processing (usually in the
4. What is an interrupt?
Page 59 of 239
An interrupt is break from the normal sequential flow of instructions processing in a
program
6. Giving an example in each case, explain the following types of operating systems
A system that allows only one user to run one user program at a time in an interactive,
A multi- user computer system can allow interactive facilities to several at a time. A
Multi- tasking Computer system can allow more than one program which are in the
7. A computer user may interact with a computer either through Graphical User
(a) Give one advantage of using GUI based operating system over a command line interface
( 1 mk)
User friendliness
Page 60 of 239
Easy to learn & use even by those who do not have much knowledge about them
It is faster to work with than a command line interface as it only relies on clicking the
(b) Some computer systems still use command line interfaces. State two advantages of
- There is security of data as only those who know how to use the commands will access
it.
(a) Desktop
Desktop is mostly an empty screen that appears when windows starts and has some
standard icons that show that the computer is ready for use.
Page 61 of 239
(b) Window
A rectangular area on a computer screen in which text, graphical images or the contents
(c) Icon
A little picture on the computer screen representing a program, disk file folder or any
other item
(e) Taskbar
A long bar/ strip that runs across the desktop and displays the start button and any other
active tasks.
(f) Task
Any activity taking place in windows and is displayed on the taskbar, e.g. running
program (3 mks)
Page 62 of 239
11. State two differences between Disk Operating System (DOS) and Windows operating
system ( 2 mks)
DOS Windows
12. Identify three factors you would consider when choosing an operating system for use
in a computer ( 3 mks)
(i) Hardware configuration of the computer, e.g. RAM memory size, Hard disk capacity,
(iv) User (type of work to be done), i.e. the applications intended for the computer
(v) User friendliness or human computer interface, i.e. it is command line based, Menu
(vi) Availability in the Markey, e.g. Microsoft Windows based operating systems are very
common
(vii) Portability
Page 63 of 239
(ix) Reliability, i.e. can it run without crashing (stop responding to commands)?
(x) The method of communicating with the computer, e.g. the number of peripherals
13. Explain how windows organizes information in reference to files and folders
It stores related data & information records into files, and related files into folders &
subfolders
14. (a) Distinguish between systems files and application files ( 2 mks)
System files hold critical system information while application files hold programs data
(b) State the extensions used signifying the following file types (2 mks)
15. (a) List and explain down the three parts of the windows Taskbar ( 3 mks)
System tray - displays icons of applications that automatically start and run in the
background
Page 64 of 239
(b) Outline the procedure of renaming a file or folder using windows operating system
(3 mks)
Method 1:
Method 2:
In an explorer window, right- click the file/ folder you want to rename
List box – a box that contains a list of options, one of which is selected
Checkbox- a small, square box that can be selected or cleared. It appears with an option
that you can turn on or off. When the checkbox is selected, a selected, a checkbox (
Page 65 of 239
Radio button – a round button that can either be blank or can contain a dot. If the
Pull down menu – A box with a downward – pointing triangular button at its right end
Command button- A button that can click to carry out or cancel the selected action. E.g.
Directory tree is the hierarchical arrangement of folders and storage locations from the root
downwards.
- A:\
- C:\
- D:\
- E:\
- Used to store files that are not required currently until they are needed again
- Used to store the files of one program separately from the files of another program
- It allows each user to keep his/ her files separately, even if all the users are using the
same systems.
Page 66 of 239
18. The Hierarchical system represented below shows how a school organizes its files.
The F2 directory has the files: classlist.doc, Districts.xls, and the tribe.mdb. Write down the
A:\SCHOOL\EXAMS\F2\Districts.xls (2 mks)
It means making of duplicate copies of data or programs from the hard disk into storage
media so that in case the system fails, or originals are corrupted or lost, the data can be
Page 67 of 239
(ii) Explain two methods you can use in windows to back up data into a storage device
(2 mks)
- Using the backup facility to compress the data into another disk
(b) Identify two reasons why a user needs to know the space available for data storage in the
hard disk
- To know the amount of data that can be stored in the hard disk
- To know how much space is left in the hard disk in case a new programs needs to be
installed
20. Name the command one would use to repair cross- linked files in graphical user
Scandisk
21. (a) Explain the team Disk Defragmenter, and give two advantages of this feature ( 3
mks)
Disk defragmenter is a tool that is used to re- arrange scattered files & folders on a
storage media
Advantages
- Reduces the time by the read / write head to locate files or folders on the storage media
Page 68 of 239
This speed up access to files & folders, hence, makes files to open more quickly
- Consolidates related data close to each other, hence, frees space on the storage media
Compressing is creating more space on a disk by squeezing disk contents (files) into a
Defragmenting is rearranging scattered related files/ folders closer to each other on the
22. Give two reasons why a new disk must be formatted before using it (2 mks)
- To create/ prepare a new root directory and file allocation tables on the disk
- To remove/ delete any existing files or information stored on the disk, if it is no longer
needed
- To determine the effective storage capacity of the disk, i.e. formatting enables the user
It is the process of dividing a large physical disk into 2 or more partitions/ volume
(b) Give two reasons why the hard disk may be partitioned
Page 69 of 239
- For the purposes of backup on the same disk, so that if one partition fails the other will
still be working.
The printer is not responding to the print command. Explain three possible causes for the
anomaly. (3 marks)
- The printer may not have been set as the default printer.
- The data interface cable to the printer could be loose. Make sure it is firm at the ports.
- The printer could still be off. Switch it on, and it will start printing.
- The wrong printer could have been selected. Select the right printer in the print dialog
- Can be used to restore files & folders accidentally deleted from the computer.
Page 70 of 239
WORD PROCESSING
A computer program that enables a person to create, retrieve, edit, format, and print text
based documents
b) List two common examples of word processing software widely used in the market
today. (2 mks)
-Microsoft word
-WordPerfect
-Lotus WordPerfect
-WordStar
-WordPad
Correcting typing mistakes using a word processor is easy; it is hard to correct mistakes
on a typewriter.
Producing multiple copies of the same page is possible using a word processor, but it is
Text formatting features are available on a word processor, e.g. front size, font type,
The documents created can be stored in the computer for future reference
Page 71 of 239
Typing using a word processor is easier & more efficient because most of the actions
are automatic. For example; the word wrap feature automatically takes the text cursor
to the beginning of the next line once it reaches the end of the current line.
A new page is automatically inserted after reaching the end of the current page
Grammar& spelling mistakes can be checked & a text-editing tool that provides
A word processor allows mail merging, which makes it possible to produce similar
It is a document that acts as a blue print or outline for other documents of the same
type. It contains the standard text, graphics and formatting for use in all documents of
this type.
(2mks)
4. Explain the difference between overtypes and insert mode in word processing
(2mks)
Type over deletes the current text at cursor position and inserts new text.
Inserting pushes the old text away as new text is inserted at cursor position.
Page 72 of 239
5. Veronica tried to retrieve a document file following all the steps correctly. The filename
did not appear in file list box. State three causes for this.
(3mks)
- The file may be located in a different folder from the one she was trying to
6. Mwikali selected a paragraph in word processing. Explain what happened after pressing
selected text.
7. Precisely explain the role of the following editing features of a word processor;
(3mks)
i) Find and replace -To find words that you want replaced by others
ii) Undo and redo- Undo reverses the previous/latest action, while redo
iii) Thesaurus -It gives suggestion of words or phrases with similar meaning
Page 73 of 239
iv) Autocorrect -It checks for wrongly spelled words, and automatically replaces
8. Give the steps you would use to find and replace the occurrence of a particular word in
- Type the word you want to replace with in the replace with box
- Click replaces or Replace all if you want to replace all the occurrences of that word in
9. Name and explain the use of any three buttons found in a spell-check dialog box
(6mks)
Ignore Once: Leaves the highlighted error unchanged (if the highlighted
word is a valid word) & finds the next spelling or grammar error
Ignore all: retains all the occurrences of the same word or phrase in the document
Add: Adds the highlighted word in the Suggestions box to the Custom
dictionary.
10. Clearly explain the meaning of the following terms as used in word processing:
(7mks)
Page 74 of 239
ii) Blocking text- Selecting a group of text in order to work with it as a
titles, etc that appears above the top margin of every page in a document or in a section
vii) Footer-It is a standard text or information that appears below the bottom
(5mks)
- Bolding
- Font colouring
- Text alignment
- Font type
- Setting tabs
- Underlining
Page 75 of 239
- Italicizing
- Font size.
Non-printing but visible text-limiting borders that mark the distance that text starts on a
A hard page break is inserted on a page even before the end of the page, e.g. by
For a Soft page break, the text cursor moves or creates a new page automatically when
Page 76 of 239
AutoCorrect automatically replaces mistyped words with the correct ones as set by the
user.
14. Explain how a paragraph can be moved from one page to another using a word
processor. (4mks)
- Click Cut on the Edit menu/ standard toolbar, (or Press CTL + ‘X’)
- Click to place the insertion point here you want to put the text
(3mks)
iv) Exactly – a fixed line spacing that word does not adjust
v) At least – the minimum line spacing that is needed to fit the largest
Page 77 of 239
vi) Multiple- a line spacing that is increased or decreased by a
- Left alignment
- centre alignment
- Right alignment
- Justified
17. List any thee sources of graphics that can be used in Microsoft word. (3mks)
- From Scanner
18. a) Explain the concept of graphics that can be used in Microsoft word.
(3mks)
Getting ready-made objects and text from other applications into the word
processor.
Page 78 of 239
19. Give a reason why it may be necessary to merge cells in a table.(1mk)
To create larger cells in a table without increasing the height or width of the existing
cells.
b) Give two advantages of mail merge over copy and pasting several times to
(2mks)
(2mks)
In Portrait, text & graphics are printed with the longest side of the page
Page 79 of 239
vertically upright, while in Landscape, text & graphics are printed with the longest side
b) State two reasons why it is necessary to specify the correct paper size
23. Outline any three main features that make word processors popular
programs.
(3mks)
Mailing features such as mail merging of standard document with another saved file.
Page 80 of 239
SPREADSHEETS
A computer program that looks like the manual ledger sheet with rows & columns for
Microsoft Excel
Lotus 123
-super calculators
-Multiplan
-VP-Planner
-VisiCalc
spreadsheet. (5mks)
An electronic spreadsheet;
- Has a large worksheet for data entry & manipulation as compared to manual worksheet
- Has inbuilt formulae (called functions) that are non-existent in manual worksheets
- Has better document formatting & editing qualities than a manual worksheet
- Utilizes the large storage space available on computer storage devices to save &
retrieve documents.
Page 81 of 239
- Can easily be modified, while manual spreadsheets involve a lot of manual calculations
- The user can very quickly & efficiently perform complicated computations using the
manual worksheet, changing one value means rubbing the result & writing the correct
one again.
(5mks)
their daily transactions & also keep financial records, e.g. they can record
sales & purchases, produce invoices, compile financial statements, calculate profits,
arranged neatly in tables, produced easily and also kept up-to-date, e.g. one can edit,
save , sort, filter, use forms to enter and view records, and worksheet data.
engineering analyses, e.g., teachers can compile their students’ marks and
Page 82 of 239
produce results.
used to find out the effect of changing certain values in a worksheet on the other cells.
5. State five features of spreadsheets that are useful in financial modeling. (5mks)
Have inbuilt functions & formulae which can be used to perform most mathematical
#have ability to perform ‘what if’ analysis, which can be used to find out the effect of
Have a data validation facility, which ensures that the correct data is entered into the
spreadsheet.
Have a chart facility that can be used to draw Line graphs, Bar charts, Pie charts,
Histograms, etc.
Some spreadsheets have a SOLVER facility that is used to uncover the best uses of
scarce resources so that desired goals such as profit can be maximized, or undesired
Have the ability to summarize data using Consolidation and Pivot tables.
Page 83 of 239
6. Define the following terms as used in a worksheet: (3mks)
i) Columns
These are the fields that make up the worksheet of a spreadsheet, and are
identified by letters.
ii) Rows
These are the records that form a worksheet, and are identifies by numbers.
iii) Cell
A box formed when a row & a column intersect in a worksheet where the data is
entered
i) Automatic recalculation
automatically when the values are changed, so that they correspond with the different
input.
‘What if’ analysis is a feature in spreadsheets that is used to find out the
order to see the difference the change would make on the result of the calculation.
Page 84 of 239
iii) Sheet tabs
These are names of the worksheets that appear at the bottom of the worksheet window.
iv) Worksheet
Labels
Values
Functions
Formulae
9. An Agrovet Company wants to analyze its employee’s personal details using Microsoft
Excel. The company has five employees: Mary Anne, Francis Kihara, Lena Achieng,
Hellen Wanjiku, and mwangi Peter. Their ages are 20, 45, 90, 45 and 34 years
Mary Anne and Hellen Wanjiku are single whereas Francis Kihara, Lena Achieng and
headlings
(6mks)
Page 85 of 239
A B C D
1 AGROVET COMPANY
Kihara
Wanjiku
A cell reference is the identity of a cell in a worksheet. A cell is identified by use of the
b) For each of the following, state the type of cell reference. (4 mks)
i) A5 Relative reference
ii) $F$5 Absolute row reference (only the row reference is absolute)
absolute)
Page 86 of 239
iv) $D7 Absolute column reference (only the column reference is
absolute)
11. a) A formula to add the contents of B5 and C4 was entered in Cell F5.
= D8 +E7
When we move to cell H8 from F5, the column changes by 2 while the
row changes by 3. The formula = B5 +C4 is also updated likewise. This is because of
relative referencing.
=R20C7
12. Differentiate between relative and absolute cell reference as used in Ms-excel.
(2mks)
Relative cell referencing means the referencing means that the references of cell used in
a formula are relative to the location of the cell where the formula is placed, e.g. E3=
C3* D3. this tells Excel to multiply the contents of C3 by D3 which have been defined
in relation to E3.
Absolute cell addressing means reference is made to one or more cells in a way which
Page 87 of 239
13. The fist column in the table below contains formulas as entered into cell D46. In the
second column, enter the formulas as they would appear when copied to cell B56.
(4mks)
=D1 =B11
Cell Al A2 A3 C1 C2 C3
Entry 5 7 10 10 15 15 =SUMIF
(C1:C3 “<>
10”,Al:A3)
Page 88 of 239
State the value displayed in G1 (2mks)
Solution:
= SUMIF (Cells to be tested/evaluated, expression that defines which cells will be added,
= 7+10 = 17
15. Study the worksheet below and answer the questions that follow:
A B C D E F
2 SKYWAYS AGENCIES
Sale
9 Total
10 Maximum
11 Average
Page 89 of 239
i) Write functions that can be entered to get total, maximum, and average of
ii) Write down the function that returns the number of sales in the four regions
iii) The function = sum (B4:E4) is entered at F5 and then copied to F8. Write down the
= sum (B7:E7)
the items.
Page 90 of 239
DATABASES
A collection of related data elements stored together under one logical structure so as to
A common data pool, maintained to support the various activities taking place within
the organization.
Microsoft Access
Oracle
FoxPro
Dbase
Page 91 of 239
Database (Logical collection of files)
ii. Relational database: Related data items are stored or organized together in structures
iii. Hierarchical database: The data items are organized in hierarchical (tree-like)
structure. The records are stored in multiple levels, where units further down the system
iv. Network database: It allows a data element (or record) to be related to more than one
other data element/record. Links are used to express the relationship between different
Sorting involves arranging of records in a logical order in the database. It can either be
A collection of programs used to store & retrieve data, and manage files or records
Page 92 of 239
b) Give the two classes of database software. (2mks)
Corporate database software:-Are designed for big corporations that handle large
ii) Forms They act as screens for entering, changing & viewing data
in tables
values in a database.
7. Give three advantages of separating data from the applications that use the data in
Page 93 of 239
8. Differentiate between:
Primary key is a field or a set of fields that can be used to uniquely identify each
individual record in a table. It is used to relate a table to the foreign keys in other
tables.
Tabular – the records are displayed from left to right across the page, and
the labels appear at the top of each column, with each row representing a new record.
Columnar – the fields for each record are displayed down a column, i.e. each value is
9. State three types of relationships that can be used to link tables in databases.
(3 mks)
One-to-One
One-to-many
Many –to-Many
10. Explain how ‘parents’ and ‘child’ tables are related in relational database. (4mks)
A parent table is the one that has the primary key of the relationship, while a child table
Parent and child tables are related through a common field that links the two tables.
Page 94 of 239
11. a) Describe four major shortcomings of the conventional (paper )file
Boredom & time wastage especially when searching for a particular item
In order to carry out any file processing task(s), all the related files have to be processed
Password protection
User-level security
Data encryption
12. The following car details are to be entered in a database: Make, Date-of-manufacture,
a) Prepare a suitable database structure showing field names and their field data types
(5 mks)
Page 95 of 239
Make text
Colour Text
Cost Currency
b) Explain how you index the data such that cars of the same make and colour are together.
(2mks)
c) Write a statement that can be used to select cars of colour green. (2mks)
Create a query. In the colour field, and in the Criteria row, write “green”
Create a query. In the cost field, and in the criteria row, write “.>500000
and <1000000”
Create a query. Choose average of costs “Avg” option in the total section.
Page 96 of 239
DESKTOP PUBLISHING (DTP)
etc by marking areas for text and graphical objects using specialized programs installed
on a desktop computer.
b) Give any three examples of desktop publishing software available in the market
today. (3mks)
- Adobe PageMaker
- Adobe Photoshop
- Adobe illustrator
- Ventura
- Microsoft Publisher
- CorelDraw
- Harvard graphics
2. Identify four different types of publications that can be produced using desktop
- Cards, e.g. for special occasions such as weddings, graduations, congratulations, etc
- Newsletters
- Newspapers
- Calendars
- Advertisements/Posters
Page 97 of 239
- Magazines
- Certificates
- Notices
- Catalogues
- Pamphlets
- Books
- Brochures
Pasteboard is where text & objects are placed for editing before transferring them to the
printable area; Printable page refers to the area enclosed in margin guides.
(2mks)
Margins mark text areas on the page along the edges, while column guides
divide the page into several fields. They are used to define the printable area.
Change case is changing text from upper to lower case, sentence, title, or toggle case,
while drop cap refer to making the first character in a line bigger and drops down to
Page 98 of 239
d) Kerning and tracking. (2mks)
while Kerning is fixing particular pairs of letters that are too close or too far apart from
each other.
A stroke refers to a line style, while a fill refers to applying background pattern such as
5. What commands are used in place of portrait and landscape page orientation in
PageMaker? (1mk)
i. Portrait-tall;
ii. Landscape-wide
i. Rotating
ii. Skewing
iii. Reflecting
Text wrap is controlling the flow of text over or around a graphical object.
Page 99 of 239
Make the text jump the object to the next page or column
Allow to text to jump over the object and continue on the same page
Create a rectangular text wrap around all the sides of the object.
1. The first computer Network was set up by ARPA in the United States of America. What
A modem enables one to connect to the Internet and access information by transmitting
3. The Internet connects millions of computers and telecommunication devices that have
A protocol is a set of rules that govern how tow computers can send and receive data on
a network
computers on a network
(3mks)
Transmission control Protocol (TCP); - It governs how data is transferred from one
place to another
Internet Protocol (IP); - It is used to provide routing from one network to another (i.e.
i) Website ( ½ mk)
individual
computer.
b) A school intends to set-up an e-learning system. List three problems that are
- Lack of capital
- Lack of skilled manpower (required technology to run & support the e-learning system)
- Availability of pornographic material & literature to the students from the internet.
(4mks)
A B C D
B Name of the host computer in the network on which the e-mail account is
hosted
- Microsoft Outlook
- Outlook express
- Microsoft exchange
- Eudora
mails. (6mks)
Advantages
i) Cheap & economical: -It costs almost nothing to transmit and e-mail
message over the network. There is no need for stamps, envelopes, etc
iv) Efficient:- A message prepared only once can be sent to several people
convenient for him/her & the recipients can respond at their convenient times.
vi) Cheaper in preparing the message: - Most e-mail users accept less well-formatted
messages and slight typing errors are overlooked, unlike in business letters which are
Disadvantages
- Messages may be lost before they can be read due to virus infection
- Messages may not be kept for future reference due to the high cost of storage
(2mks)
Google .com
Yahoo. Com
Hotmail.com
Excite.com
9. Briefly describe four factors contributing to Internet access and growth in Kenya.
(6mks)
needed. The cost of installing internet services, telephone bills is also high hence
ii) Illiteracy: - Many people are computer illiterate and therefore have no idea
services in rural areas also hinders growth of internet access. Lack of electricity
Data security – the protection of data & information from accidental or intentional
computer.
The use of computer hardware or software for illegal activities, e.g., stealing, forgery
defrauding, etc.
b) Explain the meaning of each of the following with reference to computer crimes.
(7mks)
i) Cracking – use of guesswork over and over again trying to look for
weak access points in software in order to get access to data & information
3. Outline four ways of preventing piracy with regard to data and information.
(4mks)
- Enact & enforce copyright laws and other regulatory frameworks that protect the
(2 mks)
Controlling the movement of storage media (e.g. floppy disks, flash disk, etc) in and
Antivirus software helps to detect and remove the viruses from the computer
controlling the movement of floppy disks ensures that infected disks are not inserted
into computers.
5. Computer systems need maximum security to prevent an unauthorized access. State six
precautions that you would expect an organization to take to prevent illegal access to its
Lock the doors, (i.e. keep the computers in a strong room, which should remain firmly
Install security alarms at strategic access points so as to alert the security personnel in
Use of special voice recorders that would be able to analyse the voice of a trespasser &
check against the database containing the voice patterns of valid users
Enforce data & information access control policies on all employees to control access
to data
Use file passwords to prevent any person from getting access to the electronic files
6. Give four rules that must be observed in order to keep within the law when
- Should be collected, used & kept for specified lawful purposes (e.g., data should not be
- The owner of the data has a right to know what data is held by the person or
- Data should not be transferred to other countries without the owner’s permission
- Do not collects irrelevant and overly too much information for a purpose.
(3 mks)
- Name
- Date of birth
- ID. Number
- Residence
- Address
- Phone number
1. With the aid of a diagram, explain the difference between a digital signal and an analogue
signal. (2mks)
form.
over the telephone ling. At the receiving end, the modem attached to the
receiving computer converts (demodulates)the analogue signal back to the original digital
form.
(4mks)
value.
iv) word - The total number of bits that a single register of a particular
- Devices designed using binary logic are simple, more reliable & consume less
energy.
5. Distinguish between Binary and Octal number systems, and give an example of each.
(2mks)
Binary (base 2) system has just two states usually called “ON” and “OFF” or “0”
and “1”, Octal (base 8) system has eight different characters, I.e, 01234567.
6. Perform the following computer arithmetic. In each case, show how you arrive at your
answer.
i) 4510 (2mks)
2 45 Rem
2 22 1
2 11 0
2 5 1
2 2 1
2 1 0
1 1
4510 = 1011012
2 4 Rem
2 2 0
2 1 0
1 1
=0.112
0.75 x 2 = 1.50 1
= 1002 = 100.112
(7x81) + (7x80)
56 + 7 = 6310
2 63 Rem
2 31 1
2 31 1
2 15 1
2 7 1
2 3 1
1 1
` =1111112
2 2 0
2 1 0
1 1
410 = 1002
1002
112 +
1112 1112
3 Rem
2 1 1
1 1
310 = 112
= 1407F16
82 81 80
7 6 7
7x82 + 6 x 81 + 7 x 80
448 + 48 + 7 = 50310
503 Rem
16 31 7
16 1 15
1 1
7678 = 1 F716
8. Use One’s compliment to solve the following the following sum: - 510 (2mks)
2 2 1
2 1 0
1 1
2 34 Rem
2 17 0
2 8 1
2 4 0
2 2 0
2 1 0
1 1
34 10 =1000102 (2mks)
2 3 1
2 1 1
1 1
=1112
0.12 x2 0.250 0
0.500x2=1.000 1
= 0.0012
= 111.0012 (1mk)
25 24 23 22 21 20
1 0 1 1 0 1
=32 + 8 + 4+ 1
=4510
=2+0½+¼
7 0 2
=32. [0.125]
= 32.12310
7 A B
000 111 0 11 . 0 1 0
=73.28
8 57 Rem
8 7 1
8 7 1
2 7 7
0.4 x 8 = 3.2 3
=718 71.318
00101110 +
101012
1102
11112
000010002 - 000001012
Step 2: Add the binary equivalent of the first value to the Two’s complement of
00001000
11111011 +
Step 1
7 A E
Step 2
2 4033 Rem
2 2016 1
2 1008 0
2 504 0
2 252 0
2 126 0
2 63 0
2 31 1
2 15 1
2 7 1
2 3 1
2 1 1
1 1
403310 = 1111110000012
1. With an aid of a diagram, explain the stages of the data processing cycle.
(6mks)
Data Collection
Data Input
Data processing
Output of ‘information’
Data collection involves getting the data/facts needed for processing from the point of
Output is the production of the required information, which may be input in future.
Data capture is the process of obtaining data in a computer-sensible form for at the
point of origin (the source document itself is prepared in a machine-sensible form for
input)
Data collection involves getting the original data to the ‘processing centre’, transcribing
it, converting it from one medium to another, and finally getting it into the computer.
Data creation
Data transmission
Data preparation
Input validation
Sorting
b) Give and explain two transcription and two computational errors committed
Misreading errors: -they occur when the user reads source document incorrectly,
thus entering wrong values, e.g. a user may confuse 5 in the number 586 with S, and
Transposition errors: - they result from incorrect arrangement of characters (i.e., putting
characters in the wrong order especially when keying data onto a diskette), e.g. the user
Overflow errors: -An overflow occurs if the result from a calculation is too large
to fit in the allocated memory space, e.g., if the allocated memory space is able to store
an 8-bit character, then an overflow will occur if the result of the calculation gives a 9-
bit number.
Data integrity refers to the dependability, timeliness, availability, relevance, accuracy &
completeness of data/information
Hotel reservations
Banking systems
Advantages
Fast &reliable
Disadvantages
Real time systems usually use 2 or more processors to share the workloads, which is
expensive.
(2mks)
CPU bound jobs require more of the CPU time to process these jobs. Most of the work the I/O
devices perform is on the Input; and Output; hence, they require very little CPU time.
8. Most companies are now shifting from the use of geographically distributed personal
computers. This method of data processing is known as Distributed Data Processing (DDP)
Required:
-Files
-Application software
-Data/information/messages
Banks
iii) List down two benefits and three risks that might be associated with the distributed data
Benefits
The use of low cost minicomputers minimizes the cost in data processing
The design & implementation of the system is less complex due to decentralization
Risks
(2mks)
A Multi-programming system allows the user to run 2 or more programs, all of which
(2mks)
10. State at least four advantages of storing data in computer files over the manual filing
system (4mks)
Cheaper
(2mks)
A logical file is viewed in terms of what data items it contains and what
A physical file is viewed in terms of how the data items found in a file are
12. Arrange the following components of the information system data hierarchy in ascending
order of complexity:
13. In a computer based information system, state the purpose of the following files, and give
i) Report file- It contains a set of relatively permanent records extracted from the data in a
master file.
They are used to prepare reports, which can ve printed at a later date, e.g. report on
student’s class performance in the term, extract of students who have not cleared their
the computer’s fixed storage or main file for security purposes e.g. a copy of all the
iii) Reference file - Used for reference purposes. It contains records that are fairly
iv) Sort file – used to sort/rank data according to a given order, e.g. ranking position in a
class of students.
It is the way records are arranged (laid out) within a particular file or any secondary
key field, while in serial; the records are stored in the order they come into the file, and
In random file organization, records are stored in the file randomly and accessed
directly, while in indexed –sequential, the records are stored sequentially but accessed
Section A
i) Computer Program
ii) Programming
writing of computer programs. The language must be understood by the computer for it
to execute.
particular language
language.
These are the basic programming languages, which can easily be understood by the
understandable form.
They are not portable, i.e. , a program written for one computer cannot be installed and
languages (3mks)
Easily portable, i.e. they can be transferred between computers of different families and
More flexible, hence they enhance the creativity of the programmer and increase his/her
Easy to modify
They are user-friendly & problem –oriented, hence can be used to solve problems
Visual Basic
Delphi Pascal
Cobol
Access Basic
iv) Purpose of the program, i.e. application areas such as education, business,
scientific, etc.
v) Execution time: High –level languages are easy to read, understand & develop; hence,
they require less development time. Machine code & Assembly languages are
relatively difficult to read, understand and develop; hence, they are time-consuming.
vii) Popularity: - the language selected should be suitable and /or successful in the market
development time.
Object code is a program that is in machine readable form obtained from a source
while pseudo code is a set of structured English like statements that describe the
it. (2mks)
- Interpreters translate the program each time it runs, hence slower than compiling.
Complied programs can be saved on a storage media. It does not require any further
translation any time the program is run, hence executes faster than interpreted
programs.
- Interpreter translation takes less memory, while compiled programs require more
Problem recognition
Problem definition
Program design
Program coding
Program documentation
10. (a) Give two reasons why it is necessary to have a program design. (2mks)
It identifies the exact order in which the processing tasks will be carried out so as to
11. a) State any four rules/guidelines that should be followed when drawing
A flowchart should have only one entry (starting point) and one exit point
Avoid overlapping the lines used’ to show the flow of logic as this can
They are convenient especially for long algorithms which span over several
pages.
b) Logical Errors
get the desired results e.g. they may occur as a result of misuse of logical
operators.
statements, which are not projecting towards the desired goal. Such statements
which the answer is known. If the program does not give the correct answers, it
(6mks)
ii) Operator –oriented documentation: - It is a manual that enables the user to learn
-Sequence
-Selection/decision
-Iteration/looping
(3mks)
Boolean
Expression Stop
Counter Increment
This is the technique of program design that allows large programs to be broken down
Modules or sub-routines
Breaks (splits) a large program into smaller sub-programs (modules) each able to solve
a particular/specific problem
Programs are easy to modify because; a programmer can change the details of a section
Modules are easy to test & debug (i.e correct mistakes/errors). This is because; each
Use of modules can be named in such a way that, they are consistent & easy to find in
documentation
It is flexible.
IF…THEN
IF…THEN…ELSE
Nested IF
CASE …OFF
A-Decision box
B- Process symbol
An array is a data structure that stores several data items of the same type.
a) IF….THEN…. selection
would:
START
IF Y=0 THEN
ELSE
Quotient = X/Y
PRINT X, Y, Quotient
ENDIF
STOP
Flowchart
Quotient=x/Y
If …then...Else
22. Draw a flowchart for a program that is to prompt for N numbers, accumulate the sum
and them find the average. The output is the accumulated totals and the average.
converts the celcius into Fahrenheit and then calculate the average weekly temperatures.
START
INPUT temperature in 0C
F = 32 + (9c/5)
INPUT temperature in 0C
Cumulative = Cumulative + 0F
END WHILE
Average = Cummulative/7
PRINT average
Stop
year, the interest earned is added to the amount on deposit and this becomes the new
Develop a pseudo code to determine the year in which the amount accumulated first
exceeds 2,000. Also for each year, print the year (starting from 1), the deposit, the
Interest earned, and the total accumulated at the end of the year.
START
Set Year to 0
REAPEAT
Year= Year + 1
Deposit = total
STOP
a) What will be the value of the sum when printed? Show how you arrive at your answer.
(5mks)
R Term Sum
0 0x20 0 + 0=0
1 1x21 = 2 0+2=2
2 2x22 = 8 2 +8 =10
3 3x23 = 24 10 + 24 = 34
and 3% on shares that do not meet this target. However, no interest is paid on deposits in
iii) Display the interest and total savings on the screen for particular members of the
society. (7mks)
START
ELSE
ENDIF
STOP
27. a) Study the flowchart below and answer the questions that follow:
b) What will be the output if the statement in the decision box is changed to?
(3mks)
i) M100
iii) M = 100
c) Modify the flowchart to print the sum of all the outputs. (9mks)
benefits. Employees with more than 10 year’s experience get an additional pay of 10% of their
basic salary. Bonuses are given as per employees’ sales of the month as:
>200,000 15%
Below 100,000 5%
Draw a flowchart for the program that will calculate Gross salary and output each employee’s
In Soft systems, goals and objectives are not clearly defined. In hard systems, goals &
objectives are clearly defined and the outcomes from the processes of the systems are
predictable
Soft systems are usually the human activity systems; their boundaries keep on
changing.
(5mks)
operate within a specific framework, limits or space. The system receives inputs
Subsystems: - A system does not exist alone, but it is made up of different components
and giving outputs. E.g. a manufacturing firm gets inputs in form of raw materials
from the environment and transforms them into finished products which are released
Process:- a system usually transforms or processes data from one state to another.
System entropy (decay);a system must have controls which help it not to operate
beyond its boundaries. The controls enable the system to adapt to changes in the
environment in order to give the expected output or to perform to the expected level.
that work together to support and improve the day-today operations of a business.
Invention of new systems which are more successful than the existing ones
Problems: - the user may encounter some difficulties in the operations of the
existing system
external influences.
Some of his duties include: assuring quality, keeping within schedule & budgeting.
i) System control
level.
operational data, analyze it, and generate reports that can be used to support the
The structure of the old system is not changed in anyway; hence; hence, the weaknesses
of the old system are not corrected and are carried forward to the new system.
quickly capture user requirements by designing system interfaces in the presence of the
user.
-Information gathering
-Requirements specification
-System design
-System implementation
10. Define the term Feasibility study as used in system development. (2mks)
This is a special study carried out to establish the costs and benefits of a proposed
new system.
11. You are required to develop a registration system for a particular school. State
two ways in which you would gather the information required for the system
development. (2mks)
-Observation
-Use of questionnaires
-The person being observed may perform differently or change his/her behaviour
-The work being observed may not involve the level of difficulty or volume
-The need to be on the site where the activities are taking place consumes a lot of time.
-Some activities may take place at odd times causing a scheduling inconvenience for
the analyst.
Use of questionnaires gives the respondents privacy; hence, there is likelihood that
14. a) Explain the importance of using automated methods in fact finding. (1mk)
Automated method of data collection can be used in areas which are not easily
accessible.
15. Mention the four factors that may be considered in order to design a good file.(4mks)
o Input specifications
o Hardware specifications
o Software specifications
16. State four factors that may be considered in order to design a good file. (4mks)
An attribute is a unique characteristic of a record for which a data value can be stored in
the system database. E.g., a student record has attributes such as Name, admission
18. State two methods/tools that a system analyst may use to design a system. (2mks)
- Structured charts
19. Explain three tasks that are carried out during system implementation. (3mks)
- File conversions
- Staff training
- Project management
- Changeover strategies.
20. Your school has decided to replace its library control system. The current system was
implemented ten years ago but has restricted reporting facilities and has a text-based
interface. The school intents to replace the old system with a new computerized system,
a). (i) Briefly explain the terms parallel running and direct changeover as used in system
implementation. (2mks)
other (a the same time) for sometime until users have gained confidence in the new
system. Data is processed on both systems in order to compare their performance, and
Direct changeover is a complete replacement of the old system with the new system in
one bold move. The old system is stopped & abandoned and the new system starts
operating immediately.
(ii) Give two disadvantages of direct changeover over parallel running. (1mk)
o It may be very inconveniencing (or, the organization will incur huge losses) in
o The users may not have gained enough confidence to run the new system.
o The weaknesses of the old system may not be corrected & may still be
(iii) Mention any two advantages of running both the manual system ad the
o If the outputs from the two systems are similar, confidence in the ICT systems.
telephone cables, or Satellites) for the purpose of communication and sharing of resources.
telecommunication channels
A Multiplexer enables sending of multiple data signals over the same medium, either
A Modern converts a digital signal to analogue form, so that it can be transmitted over
Advantages
- Sharing of risks.
- It is not time-consuming.
Disadvantages of networking
- Security threats e.g., hacking, which posses a great danger to loss of information
Failure of the central computer does not affect the operations of the other terminals
There is faster processing of data since each machine can process & store its data
examples in each.
In bounded media, data signals are transmitted from the source to the destination through a
restricted pathway, e.g., two open wire cables, twisted pair cables, Coaxial cables, fiber
optic cables.
Unbounded media transmits data without physical connections, e.g. microwave, satellite,
6. State what is meant by each of the following data transmission media, and give two
A twisted pair cable is made up of 2 insulated copper wires twisted around each other
in a spiral pattern. This prevents electromagnetic fields from developing around the
Advantages
Disadvantage
Coaxial cables consist of two conductors which are insulated and shielded to provide
Advantages
o They have a large bandwidth (up to 1 Gbps) compared to twisted pair cables
o They are more resistant to radio and electromagnetic interference than twisted
pair cables
Disadvantages
iii) Fibre optic cables is made of transparent glass and uses light to transmit data
Advantages
Disadvantages
one point to another. Instead a transmitting antenna & a receiver aerial are used
Advantages
o Can be used in very remote areas that do not have high cost physical
o Flexible.
Disadvantages
NIC creates a physical link between the computer and the transmission media.
ii) Gateway
Gateways provide access to the Wide area networks & the Internet.
iii) Bridge
A repeater receives a weak signal on the network, cleans and amplifies it for
transmission over the next portion of the network. Signals become weak due to
attenuation
9. a) Study the diagram below and answer the questions that follow:
Satellite communication
B -Satellite in space
C -Down link
D -Up link
- It is fast
- It is convenient because; it provides a large constant line of sight to each station Hence,
there is no need to keep on moving the parabolic dish so as to track the line of sight
- Can be in very remote areas that do not have high cost physical infrastructure like
Network topology refers to the arrangement of the computers, printers and other
Logical (signal) topology deals with the way data passes from one device to the next on
the network
Physical topology refers to the physical arrangement (layer out) of devices on the
network.
ICT- refers to the integration of computers and telecommunication facilities for the
purpose of communication.
ii) Transport systems, e.g. air traffic control, shipping control, automobile traffic
control
iii) Entertainment systems, e.g. used in showing movies, playing music, &
computer games.
iv) Scientific research, i.e. weather forecasting, medical research, military & space
exploration.
3. State two ways in which a computer may be used in efficient running of a hospital.
- To access foreign expertise or labour, i.e. to get in touch with consultants or surgeons in
4. a) Name the type of processing that would be required by a payroll system. (1mk)
Batch processing
- Error checking procedures can e established to ensure accuracy & security of data
5. a) Write down all the input and output devices of an ATM machine of Pesa-point in
Kenya.
- Keyboard
- Printer
Monitor
Printer
Fewer errors made by employees, i.e. correct prices are used at the point of entry
It ensures faster entry of data, since the attendant does not have to enter details
manually.
a) Biometric analysis
This is the study, measurement & analysis of human biological characteristics. It uses a
computer and a biometric device to recognize & analyze features of human body parts
b) Telecommuting
- A computer
- A microphone
- Speakers
E-commerce is a way of doing business where the transactions are carried out
environment (2mks)
- A company can access customers all over the world, and is not limited by space &
wagons
- Reduces operating costs of small business as they can establish websites where they can
auction their good & services. This also increases their sales.
10. Describe how computing has been applied to each of the following areas:
- Used by railway corporations to coordinate the movement of their goods & wagons
- Used in airline industry for air traffic control, surveillance of airspace using radar
equipment
lights.
information
Scene monitoring & analysis to help the police in arresting traffic offenders and
criminals.
11. Suggest how computers may in future be made more user-friendly for persons
that are:
a) Blind (1mk)
of the user
b) Without hands
recognition devices.
12. Give at least four reasons why a firm may decide to computerize its operations
- Increased efficiency
- Reduced cost.
(4mks)
Computerization (2mks)
In job replacement, the unskilled workers may be replaced with the skilled ones. In
job displacement, some employees may be displaced/ moved to new working areas
as the computer may serve to perform tasks that may be performed by several
people.
capacity.
i) Expert systems
This is the use of electronic devices & software to emulate the learning process of
areas
- Reduced costs
- Greater output
6. State three reasons why users may resist the introduction of information and
(i) Fear of change- people are creatures of habit, hence are afraid of change
(ii) Fear of losing their jobs: By installing the computer into an organization, employees
(iii) Fear of failure – Since the computer is very new in a given working environment, the
people will be afraid that they might never get used to it.
(iv) Loss of control: The management fear that once a computer system is implemented,
1. Give a brief description of the following careers available in the computing field.
(i) A Software engineers is one who is skilled in software development and technical
He develops and updates both system and application software together with the
associated documentations.
A data processing manager is the person who usually is in charge of the overall running
He plans, monitors and controls the personnel, ensures that resources and labour are
3. (a) Sate three public universities where one can further her computer studies ( 3 mks)
- Nairobi university
- Moi University
- Kenyatta University
- Egerton University
- Maseno university
- Maintains, updates & modifies information on the websites to meet new demands by
the users.
- Monitors the access & use of internet connection by enforcing security measures
- Training people on how to use a computer & the various application programs
5. Explain two factors one would consider before enrolling for an ICT course in a college
- Marketability of the course, i.e. whether it offers courses recognized both locally and
internationally.
- Job opportunities
Paper 1 (theory)
2 ½ hours
INSTRUCTIONS TO CANDIDATES
A 1- 15
16
17
18
19
20
TOTAL SCORE
1. Computer systems are built from three types of physical components: processors,
- Decodes instructions
2. Threats to the safety of computer system take many forms such as: white- collar
Give one way as to how each of these forms of threat can be controlled ( 2 mks)
- Use of policies
- Use of passwords
- Use of firewalls
- Use of UPS
- Use of backups
- Contingency plans
(iii) Vandalism
- Tighten security measures, e.g. use of alarm systems, fitting, burglar- proof doors
- Punitive measures.
(iv) Carelessness
- Regular backups
3. (a) Explain the term nibbles as used in data representation in computers ( 1 mk)
(b) Perform the following binary arithmetic, giving the answers in decimal notation
(3 mks)
1110.0111
1101001.011 +
1110111.1101
1001011.011
111.111 –
1000011.100
Machine language uses machine codes (binary digits) that consist of 0’s & 1’s, whereas
machine code.
(b) State the type of translator necessary for a program written in: ( 2 mks)
Interpreter or compiler
Assembler
5. Briefly explain the purpose of the following types of program documentation: ( 3 mks)
This is a manual provided for an end user to enable him/ her use the program. It is
I is used by someone who already knows how to use the program but needs to be
feature.
This is a single sheet or card small enough to fit into a pocket, which the user may
keep handy for help with common tasks carried out with as program.
- Validation of input
- Comment statements
- Indentations
- Online help
7. (a) Distinguish between labels and formulae with respect to spreadsheets ( 2 mks)
values, cell references, functions and arithmetic operators whose calculations results to
a numeric value.
8. List three differences between Wide Area Networks (WAN) and local Area Networks
(LAN) ( 3 mks)
flowchart
An expert system is computer software that mimics human expertise in a particular area
of specialization
- Knowledge base
- Explanation facility
- User interface
11. Give reasons why optical disks are better storage media compared to floppy
diskettes
- More secure against alteration, i.e. they require writers to alter their contents
- More robust, i.e. can resist temperature, electromagnetic fields and not affected by
- Cheaper per unit of storage. Optical disks can be used for storage of large volumes of
Copying is making a duplicating copy of text, moving is relocating/ transferring text from
In copying the original text is left intact, while in moving all the selected text is transferred
- Portrait
- Landscape
- Delete
- Backspace
- Search facility that enables the user to scan through the records in the database so as to
- Forms (input screens) for viewing and entering data into a table
- Sorting facility, which enables the user to organize & arrange the records within the
database.
- Query facility
- Data validating facility, which ensures that, the correct data is entered into the database
Answer question 16 and any other three questions from this section
16. Study the flowchart below and answer the questions that follow:
(a) Write a high level language program for the above flowchart ( 7 mks)
Program ABC;
Uses WinCRT;
VAR
A, B C COUNT: INTEGER;
BEGIN
A: 0
B=1
REPEAT
Writeln (B)
C: = A+B;
A: = B
B: = C;
UNTIL COUNT = 10
END
OR
VAR
A, B, C, COUNT: INTEGER;
BEGIN
A: =0;
B: = 1
FOR COUNT: 0 TO 10 DO
Begin
Writeln (B);
C: A + B
A: = B;
End;
END
(c) Modify the flowcharts so that it adds up all its outputs and displays the sum obtained
(3 mks)
Pentium II
20 GB hard disk
Full multimedia
Refers to the type (colour) and size (17 – inch) of the screen
(b) Which operating system might be pre- installed in this computer and why? (2 mks)
Reason- the office suite can only work under windows environment (3 mks)
- Speakers (headphones)
- Microphone
- TV Tuner card
- Editing card
- Digital camera
- A RAM of 32 MB or higher
- AutoCAD
- ArchCAD
- Draffics
- 3 Dmacs
- UNIX
- Novell NetWare
- Microsoft Windows NT
(b) List any three items that may be referred to as data terminal equipment in a network
( 3 mks)
- Servers
- Dummy terminals
- File servers
- Printers
- Modems
- Terminators
- It is fast
- Easy to troubleshoot cable problems. If two machines are not communicating, the
Disadvantages
19. (a) A company has decided to computerize their operations. They have decided to
purchase packages instead of developing their own programs. Give three advantages
Advantages of packages
- They are cheaper to purchase as the cost of developing them is effectively shared
Disadvantages of packages
- The purchaser is not in direct control of the software because he/ she is not involved in
developing it.
- Packages are produced to meet general needs, hence may not deal with the specific user
or company needs.
copyright acts.
- Packages include extra facilities which may not be required by an individual user or
company
- Some packages have capabilities which will require the user to develop them further.
- It is easy to forget the commands to use the package, especially if it is not used
frequently.
(b) (i) Explain why a value such as 6112334445555 may be displayed as ####### when
LaserJet Printer (or any impact printer) it is fast & produces quality printouts
OR
Plotters
Verification is checking data manually to ensure/ ascertain that it has been transcribed
Validation involves subjecting data to checks built in a program to check for its
(b) Draw a labeled diagram to illustrate the internal structure of a diskette. (4 mks)
(c) Give two differences between post Office Mail electronic mail ( E- mail) ( 2 mks)
Paper 1 (theory)
2 ½ hours
INSTRUCTIONS TO CANDIDATES
A 1- 15
16
17
18
19
20
TOTAL SCORE
- A compiler translates the entire program at once as a unit before execution can begin.
An Interpreter translates one instruction of the source program at a time. The translated
- An interpreter translates the program each time it is needed for execution; compiled
- For an Interpreter, syntax errors are reported & corrected before the execution can
continue.
For a compiler, syntax errors are reported & corrected after the source code has been
Data is stored in computers in binary form. The computer’s CPU carries arithmetic &
This is because; binary numbers has only two digits, 0 & 1, which make it suitable for
4. What is meant by the term dry running as used in program development? (2 mks)
5. A computer teacher has put a rule that diskettes should not be used in the computer
laboratory
(b) State two alternatives that can be used to achieve the same objective (2 mks)
- Laser printers use thermal technology while dot matrix is an impact printer
- Laser jets use Toner cartridges while dot matrix use ribbons
- Data input
- Processing
- Output of information
This is a program used frequently by the computer to carry out routine jobs
Utility software is used to manage computer files, diagnose and repair computer
- Text editors
- Sort utility
- Language translators
- Loader
- Copy utility
- Linker
- Dump utility
- Diagnostic tools
processing on data before transmitting what is beyond their processing abilities to the
central computer.
- A dump terminal is one which does not have any of its own processing capabilities/
power. It relies on the processing capabilities of the central computer that serves it.
- Updates the database by adding new record, modifying the existing records & deleting
- Responsibilities for the security of data in the database (i.e. designs & sets up security
- Ensures facilities for retrieving data and structuring reports are appropriate to the needs
of the organization
- In charge of the overall running of the data processing departments, e.g. he is in charge
Source program is the program as written by the programmer using an editor program
Object program is the program in machine code (or binary form) produced by a
compiler or assembler after translating the source program, and can be readily and can
12. (a) In DOS, what are the following commands used for?
(b) What happens when the following commands are typed in the DOS environment?
A B C
1 Item Amount
2 Fare 200
3 Stationery 50
4 Bread 300
5 Miscellaneous 150
6 Total
The student intends to have spent half the amount by mid- term
(a) Given that the value 0.5 is typed in cell B9, write the shortest formula that would be
typed in cell C2 and then copied down the column to obtain half the values in column B.(1
mks)
= B2*$B9
(b) Write two different formulae that can be typed to obtain the total in cell B6 and then
OR
= B2 + B3 + B4 + B5
- Indexing
- Sorting
- Filtering
- Querying
- Updating of records
- Report generation
15. List three parts that constitute an array definition statement ( 3 mks)
- Array name
- Range, which contains the initial value & the final value
- Data type
Answer question 16 and any other three questions from this section
16. Bidii wholesalers has two categories of customers for order processing, category ‘A’
obtains 10% discount on all orders up to Kshs 10,000 otherwise the discount is 20% on
the entire order. Category “B’ obtains 30% discount on all orders if the debt repayment
is ‘good’ otherwise the discount is 15%. Draw a flowchart for the order processing. (15
mks)
- Expert systems, e.g. medical diagnosis, engine repair, legal defense etc
to work from home. Such working using a PC as a remote terminal is often described as
teleworking. State three advantages and three disadvantages of working from home.
( 12 mks)
Advantages
- Reduces traveling expense (i.e. saves traveling time, risk and cost)
- Suitable for people with disabilities, because they are able to overcome the barrier of
- People can live where they choose without the worry of having to move towns and
- Privacy threats
- Lack of control and supervision. The workers have to be able to motive themselves to
- Isolated employees may be exploited in an environment where they can’ t easily get
18. (a) Explain three ways by which computer users can protect their eyes from harmful
- Using antiglare (radiation filter) screens that are specially tinted to reduce the radiation
- Wearing special spectacles when using computers in order to control the light intensity.
- Avoid using flickering monitors as they can cause extreme eye strain that can damage
eyesight.
- Very bright wall paints reflect too much light into the user’s eyes.
processing method
- Cost pf acquiring the relevant hardware, software, storage media, etc the cost of
maintenance
- Operation speed
(c) Explain time sharing data processing mode, giving two advantages and two
disadvantages (6 mks)
Time sharing is a processing mode where a central processor services 2 or more users
- Reduces processor idle time. This is because the processor doesn’t have to wait for the
- Helpful to small companies which cannot afford purchasing a computer & the related
facilities. The company can be served at a fee through time- sharing processing mode.
- The user of the system can benefit from the computer facilities through remote
terminals
19. A school bought a computer system. The hardware items supplied include: a 800 MHz
disk, a floppy disk drive, a CD – Read/ write drive, a mouse, a modem, an inkjet printer and a
joystick.
The software supplied include: an operating system, a BASIC interpreter and the following
- Keyboard
- Mouse
- Joystick
- It means that, the system cock has a speed of 800 million oscillations per second
( 2 mks)
(ii) 64 MB of RAM
This is a measure of the storage capacity of the primary memory/ Random access
- 120 Gigabytes
(c) Some of the students in the school use the computer to do homework. Name the
Spreadsheets
Word processor
Art
(i) Which two hardware items are needed to produce sound? (2 mks)
- Sound card
- Speakers
Joystick (1 mk)
20. A school organizes its work in directories. The director WP contains the files CATS, EXAMS
and ASSIGNMENTS. The directory of SP contain the spreadsheet files. The directory DB
contains the database files. The directory PROG is contained in the OTHERS directory. The
directory WP also contains the PERSONAL directory. Given that the directory STUDENT
(a) Draw the directory tree structure with C as the root (7 mks)
(2 mks)
C: STUDENT\DB>
C:\STUDENT\OTHERS\PROG>
(d) Give two reasons for storing files in directories and subdirectories (2 mks)
- To avoid accidental deletion/ erasure of files when the files in C are being deleted.
(e) Give two disadvantages of using command driven interfaces as compared to menu
- The user is required to master the format/ syntax of all commands and their usage
perfectly.
Paper 1 (theory)
2 ½ hours
INSTRUCTIONS TO CANDIDATES
A 1- 15
16
17
18
19
20
TOTAL SCORE
Process of preparing a new disk for use by imprinting empty tracks & sectors on the
surface of the disk that can be recognized and access by a particular operating system
(b) Indicate whether the following devices are used for input or output
( 2 mks)
2. (a) Explain why the following controls should be implemented for computer based
systems ( 2 mks)
(i) Back- ups - Backups can be used to recover/ restore/ prevent lost data
(b) For each of the following give one reason why they are not allowed in a computer
laboratory ( 2 mks)
(i) Smoking
operation
Food particles may fall into the moving parts of the computer and damage them
3. Distinguish between real, integer and character data types as used in programming:
Real:
Integer
Characters
very good, good, fair and fail depending on the average mark. Write a formula that can
be used to count ALL students who have the remark “very good”. (3 mks)
They act as high speed storage locations. They are used to hold data and instructions
- Linux
- Microsoft windows 98
- UNIX
- OS/2
- Microsoft Windows Me
- Novell Netware
- Microsoft Windows XP
- Macintosh OS
6. (a) A serial file comprises of records placed in positions 1 to 10. State the position of the
The end- of – file marker is the position immediately after the last record, i.e. position 11
7. (a) Name the control structure depicted by the flowchart below ( 1 mk)
This is where both the existing and the new systems are run
concurrently/simultaneously (at the same time) for a period of time until users have
gained confidence in the new system. Data is processed on both systems in order to
This is a complete replacement of the existing system with the new system in one bold
move. The existing system is stopped & abandoned and the new system starts
operating immediately.
i) AA (5: 50)
and self-correction
10. Name two types of relationships that can be applied in database design. (2mks)
- One to one
- Many to Many
a) Indenting
b) Alignment
c) Word wrap
A facility that word processor use to automatically move the text cursor to the
beginning of the next line when it reaches the right margin automatic rolling of text to
the next line when you reach the end of the line.
12. Outline two ways in which computers can be used in hotels. (2mks)
Reservation/booking of rooms
Communication
Security
This is a data encoding system that uses 4 binary digits to represent an individual decimal digit.
Number 4 5 1
45110 = 010001010001BCD
15. State two health issues that may result from prolonged use of computers. (2mks)
eyestrain/eye fatigue
finger deformation
Back strain.
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS FROM THIS SECTION
Program design
ii) The programmer would check whether the program does as required program
Testing
Program testing
Program documentation
Problem definition/analysis
A=30
B=28
B=A
A= B
Write A, B
A= 30, B= 30 (2mks)
(5mks)
VAR
Begin
Writeln ( R); ½
END
- Tabs - columns
Highlighting:
- Selecting or marking a given of text e.g., a word, sentence or paragraph, in order to work
with it
- Highlighting is temporary.
Bolding:
- making the selected text appear darker then the rest of the text
- Bolding is permanents.
c) The following information shows the income and expenditure for “behayote”
matatu
for five days. The income from Monday to Friday was Ksh. 4,000, 9,000, 10,000, 15,000,
and 12,000 respectively while the expenditure for the same period was Kshs. 2,000, e, 000,
A B C
(Ksh) (Ksh)
= B3-C3
II Total income
= MAX(C3:C7)
1001
0111 –
(b) Using two's complement, subtract 7 from 4 and give the answer in decimal
notation. (4 marks)
2 4 Rem
2 2 0
1 0
1 1
=000001002
2 7 Rem
2 3 1
1 1
1 1
=111110002
=11111000
1+
11111001
Step 5: Add the binary equivalent of the first value to the Two's complement of
00000100
11111001 +
11111101 = 111111012
9 1 B
8 2331 Rem
8 291 3
8 36 3
8 4 4
4 4
82 81 80
3 7 6
192+56+6= 25410
16 254 Rem
16 15 14
15 15
3768=FE16
2 9 Rem
2 4 1
2 2 0
1 0
1 1
0.625x2-1.25 1
0.250x2 = 0.50 0
0.50x2 =1.00 1
0.62510-1012
9.62510= 1001.1012
Display all the files beginning with P and have extension of .BAT in drive B:
(b) (i) With the aid of a diagram, explain hierarchical (tree) network topology.
(3 marks)
A child node has only one parent but a parent node can have more than one child.
topology. (4 marks)
Advantages
Disadvantages
50. (a) Name and explain the function of the keyboard keys represented by the following
symbols.
Used in Word processors to move certain text or the cursor at set intervals on the
It is used as a RETURN key. When pressed at the end of a text line or paragraph in a
word processor, it forces the text cursor to move to the next line or paragraph.
computer to carry out (execute) a command that has been typed or selected on the
screen.
It can be used for changing cases, e.g., to get single capital letters.
It is used to get the punctuation marks on top of the Number keys or the symbols
Used for shortcuts in combination with other keys, e.g., SHIFT + DEL
- In engineering, e.g.
- Design of bridges.
- Aviation training.
- Missile launch.
- Space exploration.
- Vehicle accidents.
them.
It enables the manufacturers identify weaknesses of the real situation or object, hence;
Reduces risks - it allows some activities that would otherwise be expensive &
Faster.
Convenient. .
- Standardizing learning.
(3 marks)