Comp P1 018
Comp P1 018
COMPUTER STUDIES
Paper 1
sTime: 2 ½ Hours
INSTRUCTIONS TO CANDIDATES
- Write your name, School and index number in the spaces provided above.
- This paper consists of Two sections A & B
- Answer ALL the questions in Section A
- Question 16 is compulsory
- Answer any THREE questions in section B
- All answers to ALL questions must be written in the spaces provided in the question paper
Page 1 of 11
SECTION A (40 MARKS)
Answer all the questions in this section in the spaces provided
1. State any two peripheral devices that are powered by the system unit. (1 mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
2. The following are symbols of some keys found on the keyboard. Name the keys represented by
the symbols. ( 2 mks)
________________ _____________
________________ _______________
4. As a computer student you have been asked to assist in buying an input device. State any four
factors to consider when buying input devices. (4mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
5. i. The arithmetic logic unit, the control unit and the main memory use electrical pathways or links
called buses. State and explain the three types of buses. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page 2 of 11
ii. What is the role of special purpose memories in the microprocessor? (1 mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
6. Outline the three differences between primary memory and secondary memory. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
7. Citing relevant examples state two advantages of integrated software as opposed to single
purpose. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
8. a. Define the term mail merging (1 mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
b. Name two files that are created in mail merging process (1mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
9. (a) Distinguish between a workbook and a worksheet as used in spreadsheets (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) What is the meaning of “what if analysis” with respect to spreadsheet? (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page 3 of 11
10. Define the following terms in relation to internet (2 mks)
i). Downloading
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
ii). Hyperlink
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
11. Benjos was instructed by his teacher while typing a Microsoft word document to replace
all the occurrences of the word MS with Microsoft. Highlight the steps to do this (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
12. What is the difference between logical and physical file? (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
13. Explain any three types of computer processing files. (6mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
14. Give a reason why HTML is not considered as a true programming language.
(1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page 4 of 11
15.(a) Define the following computer crimes
(i) Piracy (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(ii) Industrial espionage (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page 5 of 11
SECTION B (60 MARKS)
Answer questions 16 (COMPULSORY) and any other three questions in this section
16. (a) Draw a flowchart for a program that is to prompt for N numbers, accumulate the sum and
them find the average. The output is the accumulated totals and the average. (5 mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page 6 of 11
17. (a) i. Subtract 1102 from 110102 (1mk)
ii. Find the sum of binary number 101.1012 and 110.1002 (1mk)
ii. Using one’s complement, calculate 510 – 910. use six bit in your calculation. (3mks)
Page 7 of 11
(e) State the following types of transcription errors: (2 marks)
i. 3455 instead of 3456
18. (a) State and explain the following types of relationship as used in database design
(b) i. Explain the difference between primary key and an index key as used in database application
(2 marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page 8 of 11
ii. Outline the functions of a primary key (2 marks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
ii. Maintaining security is one of the functions the operating system. Explain how the
operating system maintains security (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) What does the following control measures against computer crime involve? (5 mks)
i. Audit trail
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
ii. Data encryption
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page 9 of 11
iii. Log files
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
iv. Passwords
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
v. Firewall
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(c) Briefly explain what happen during power on self test (POST) (3 mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Page 10 of 11
20. a) State two advantages and two disadvantages of the ring network topology
Advantage (2mks)
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….
Disadvantages (2mks)
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….
b) State two roles and responsibilities of each of the following ICT professionals
i) Webmaster (2mks)
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….
ii) Network Administrator (2mks)
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….
iii) Computer scientists (2mks)
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….
iv) System Administrator (2mks)
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….
v) Software Engineer (2mks)
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….
c) Explain the term accreditation as used in education (1mk)
……………………………………………………………………………………………………….
Page 11 of 11