0% found this document useful (0 votes)
48 views

Computer

Uploaded by

2532vbu
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Computer

Uploaded by

2532vbu
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 137

Computer

studies
Quick revision for KCSE 2015
Model Test Papers
(Papers 1 and 2)
All
With elaborate

Marking scheme

compiled by

Mr. Njuguna Mwangi

Teacher St francis Girls High school mangu

Table of content

Content Page

1
Test Paper 1 3

Test paper 2 9
Marking Scheme TP1 11
Marking Scheme TP2 18

Test Paper 3 20
Test paper 4 24
Marking Scheme TP3 30
Marking Scheme TP4 43

Test Paper 5 44
Test paper 6 48
Marking Scheme TP5 52
Marking Scheme TP6 62

Test Paper 7 64
Test paper 8 72
Marking Scheme TP7 89
Marking Scheme TP8

Test Paper 9 92
Test paper 10 97
Marking Scheme TP9 100
Marking Scheme TP 10 113

Test Paper 11 115


Test paper 12 121 Markin
Scheme TP 11 124
Marking Scheme TP 12 136

2
Test paper 1
1. Give importance of having the following in computer laboratory;- (3marks)
i) Standard furniture in the laboratory
ii) Antiglare screen/ monitor
iii) UPS
2. Distinguish between ROM and RAM (2marks)
3. Explain the following computer crimes (2marks)
(i) Fraud.
(ii) Alteration
4. (a) Define
(i) Firewalls (1mark)
(ii) Data encryption (1mark)
5. Differentiate between the following terms as used in word processing (3marks)
(a) Drop Cap and Case
(b) Superscript and subscript
(c) Indent and tab
6. (a) State and explain any one type of computer processing file (1mark)
(b) List any two file organization methods (2marks)

7. Describe the following terms as used in internet.


(a) Webpage (1mark)
(b) Blog (1mark)

(c) Hyperlinks (1mark)

(d) Web portal (1mark)


8. (a) Give four advantages of DTP over a word processor (2marks)
(b) Differentiate between the following
(i) Kerning and tracking (2marks)

(ii) Margins and column guides (2marks)

9. Define the term simulation (1mark)

3
10. Differentiate between baseband and broadband signal as used in networking (2marks)
a) Baseband signal
b) Broadband signal
11. Explain how the operating system controls the following resources (3marks)
i) Processor
ii) Main memory
iii) Input and output devices
12. What is deadlock in reference to operating systems (1mark)
13. (a) The most popular type of electronic data storage currently us magnetic disk storage such as hard disk
or Winchester disk. Give reasons as to why they are popular. (2marks)
(b) Outline two advantages of hard disk over floppy disk. (2marks)

14. Define the following computer crimes


a) Piracy (1mark)
b) Industrial espionage (1mark)
15. Explain two ways of protecting data and information against unauthorized access (2marks)
SECTION B (60MARKS)
Answer question 16 and any other three questions

16. (a) list two examples of


(i) Third generation languages (2marks)
(ii) Object oriented languages (2marks)
(b) Define (2marks)
i) Object code
ii) Source code
(c) Differentiate between a compiler and an interpreter (2marks)

(e) A car rental firm leases its cars for Kshs. 2500.00 per day. The manager gives a discount based on the
number of days that the car is rented. If the rental period is greater than or equals to 7 days then a 25%
discount is given. Write a peudocode to accept a car number and the rental period, and calculate the total
amount earned by the company when a car is leased. (7marks)

4
17. (a) Subtract 01112 from 10012 (2marks)
(b) Using two’s compliment, subtract 7 from 4 and give the answer in binary notation. (4marks)

(c) Convert
i) 91C16 to octal (3marks)
ii) 3778 to hexadecimal (3marks)
iii) 9.62510 to binary (3marks)
18. A school computer laboratory is scheduled to undergo major renovations. The lab is schedule to receive
new computer whose specifications are given below:-
Pentium IV 2.8GHz processor
40GB HDD
3 ½ FDD
256MB RAM
56 x CD ROM
17” SVGA TFT monitor
The computers are going to be networked and will be able to browse the internet.
a. Explain what is meant by the terms:-
(2marks)
i) FDD
ii) HDD
iii) SVGA
iv) TFT
a) The computer is to be networked, name one extra device that should be fitted on every computer to
enable this to happen (1mark)
b) The computer is to receive internet facilities through the server on a dial; up system. Name and describe
the function of a special device that needs to be connected to the server to complete the connection.
(1mark).
c) (i) The school has to apply star topology to link up the computer. List two advantages of this type of
topology. (1mark)
(ii) Name the central device used to connect the computers in this topology. (1mark)

d) List two other types of topologies that the school could have opted for (1mark)
e) List four advantages of using a network (2marks)

f) (i) Data transmission via the internet is done using a mode known as packet switching. Describe this

5
data transmission mode (1mark)
(ii) Name two other modes of transmission (1mark)

g) (i) The school’s LAN is done using UTR cable. List two advantages of using this type of cable.
(1mark)
(ii) List two advantages of using fibre cable in networking (1mark)
h) Data flows in the school’s LAN in a duplex manner. Discuss two other types of data transmission in
network giving examples (2marks)
19. (a) Consider the topologies demonstrated in the diagram below.

6
(i) Identify the network topologies (3marks)
A

(ii) In topology A, identify the network device that should be at the end point 1 and 2 (1mark)
(iii) Which of the above topologies is likely to be used in a wide area network?
(1mark)
(iv)Highlight three disadvantages of topology B. (3marks)
(v) Identify the device labeled X in topology A (1mark)
(b) State two main classes of network software (2marks)

(c) Briefly describe the following as used in networking (4marks)


i) Repeaters
ii) Network hub
iii) Fibre optic cables
iv) Network interface card (NIC)
20. (a) Define the following terms
(i) Database ( ½mark)
(ii) Database management system ( ½ mark)
(iii) Hierarchical database
(1mark)
(iv)Relational database (1mark)
(v) Network database (1mark)
(b) List the advantages of using an electronic database system for storage of data over the file approach.
(4marks).

(c ) Study the spreadsheet below and answer the questions that follow

A B C D

7
1 WESTERN
COMPBOOK
CENTRE SALES
2 BOOK TITLE PRICE PER BOOK BOOKS SOLD
3 DBASE IV 400.00 145
4 LOTUS FOR DUMMIES 460.00 15
5 OFFICE WORD IN 3 DAYS 300.00 65
6 LEARN C++ IN 3 DAYS 700.00 100
7 TEACH YOURSELF PASCAL 700.00 200
8 COMPUTER STUDIES 500.00 300
9 THE CLEVER FOOL 300.00 10
COMUTER
10

i) Write down the formula that can be used to find the price of the most costly book (1mark)
ii) Write down the formula that can be used to determine the total sales for the book titled COMPUTER
STUDIES (1mark)
iii) Write down the formula that can be used to determine the average price of the books. (1mark)
iv) Write down the formula in cell D6 that can be used to find the new price per book if they went up by a
percentage written in cell B 10 and the formula has to be entered only in cell D3 then be copied to others.
(1mark)
v) Write down the output in D7 if in B6 is 10% (1mark)
(d) State any four advantages of using an electronic spreadsheet as compared to a traditional worksheet.
(2mark)

8
Test paper 2
QUESTION 1
M/s Ann Momanyi, an ICT consultant with Makueni Distributors is in the process of developing a Management
Information System (MIS) for the company. Currently, she is designing sales database using three tables namely: -
customers, products and transactions. The details for each table are given below:-
Customers Products Transactions
Customer ID Product ID TransID
CustomerName ProductDescription clientName
PostalAddress Packaging TransacDate
Town UnitPrice Product
Phone Stock Quantity

Questions
a) Create a database named MIS and in it create three relations (12marks)
b) Identify the most appropriate field as the primary key in each table (3marks)
c) Establish relationships among the three tables and enforce the referential integrity (6marks)
d) Create a form for each table. Save the forms as Customer Form, Product Form and Transaction
Form. (9marks)
e) Use the respective forms to enter the following records in each table (6marks)
CUSTOMER TABLE
CustomerID Customer Name Postal Address Town Phone
H001 Andrew Mwove 209 Mutituni 200870
H002 Erick Onsongo 68 Nyamira 248567
H003 Brenda Nyabuti 100 Bomet 789678
H004 Lydiah Winzaa 250 Mwingi 778009
H005 Jeff Ogero 330 Keroka 666790
H006 Maureen Makuthu 550 Kakeani 780906

PRODUCT TABLE
ProductID Product description Packaging Unit price Stock
AA001 Cooking oil 20kg Gal 16000 80
AA003 Rice 50kg bags 4500 60
AB004 Detergents 5 litres 11000 40
AC006 Fertilizer 50kgs bags 4700 30
AA007 Mineral water 1.5litres 8200 400

TRANSACTION TABLE
CustomerID Client Name TranscDate Products Quantity
1001 Andrew Mwove 06/04/2007 Cooking oil 6

9
1002 26/4/2007 Mineral water 8
1003 Erick Onsongo 23/04/2007 Detergents 10
1004 14/4/2007 Cooking oil 12
1005 Maureen Makuthu 02/05/2007 Rice 4
1006 08/05/2007 Fertilizer 3
1007 Erick Onsongo 16/05/2007 Detergents 25
e) Create a query that displays the customer Name, Product Description, Quantity, Unit price and
calculates field total payable by each customer. Save the query as MISQuery (5marks)
f) Generate a report from MISQuery. Save the report as MISReport (4marks)
g) Print the Customers, Products, Transaction table’s design, MISQuery and MISReport (5marks)

QUESTION 2
1. (a) Create a new workbook and name it as form 2 computer exams (1mark)
Name Class Adm. No. CAT 1 CAT 2 CAT 3 Total Average Class Remark
position
Maina John E 7984 80 70 59
Ken Korir W 7896 75 55 72
Bernard K E 8092 86 59 75
John Soi E 7460 80 79 70
Kipsang Bett W 7892 76 75 80
Mitei E E 7800 38 48 25
Mark J W 8490 37 51 29
Koech Ben W 8184 30 86 75
James W E 8082 25 27 20
Abuya Ken E 8083 30 25 25
Leonard W 8047 39 24 25

(b) Enter the following data in sheet 1 (15marks)


(c) Rename the sheet as term one result (1mark)
(d) Find:
(a) Totals (1mark)
(b) Average (1mark)
(e) Use the subtotals function to find the average of each class (5marks)
(f) (i) Use the IF function to award marks as follows (3marks)
 A student whose average is above or equal 65 is given “excellent”
 An average of 55 or above but less than 65 award “average work”
 An average less than 55 award “work below average”
(ii) Award position to students basing on the average scored (3marks)
(iii) On the last rows, enter formulas to count students from both classes
(2marks)
(g) Sort the student list by class position in ascending order (2marks)
(h) (i) Copy the entire worksheet onto sheet 2 and rename it “lower group” (2marks)
(ii) Filter “lower group” sheet to display students from “E” class and whose average score is below 50
(6marks)
(i) Draw a bar graph to display the following information (3marks)
- The three cats
- Names
- Titles as “TERM ONE COMPUTER RESULTS”
(i) Place the legend at the bottom of the graph (1mark)

10
(ii) Save the chart on a new sheet and name it graphical analysis (1mark)
(j) Print
(i) The filtered lower group (1mark)
(ii) The chart (1mark)
(iii) Term one results sheet
(1mark)

Marking scheme

Test paper 1
1. Give importance of having the following in computer laboratory. award 3marks each 1 mark
i) Standard furniture in the laboratory
 To avoid poor posture during machine use this may lead to strain, injury and limb fatigue
ii) Antiglare screen/ monitor
 To avoid eye strain and fatigue caused by over bright cathode ray tube monitors (CRT)
iii) UPS
 Temporary power supply to the computer to allow the user to save the work (power back up)
 Stabilize power (clean unstable power supplied from the main source to clean stable voltage)
2. ROM (Read Only Memory) it is used to store programmed instruction and data permanently or
semi permanently.
 Data and instruction stored in Rom are those required to remain uncharged for long period of time
 RAM (Random Access Memory) its content can be read directly regardless of the sequence in which
it is stored.
 Its content is held temporarily and if content lost, is lost once the computer is turned off.
3. Explain the following computer crimes (2marks)
(i) Fraud – Use of computer to conceal information or cheating other people with the aim of getting
money. (1x1 = 1mk)
(ii) Alteration – Changing the data or information without permission with an aim of missing informing
others. (1x1 = 1mk)
4. (a) Define
(i) Firewalls 1mk
 It is a program or hardware or a combination of both that filters the information coming through the
internet into a computer
Or
 It is a program that filters the information coming through the internet into a computer
(ii) Data encryption 1mk
 It is the encoding of data during storage or transmission so that it cannot be understood by those who
do not have encryption key.
 The word scrambling can be used in place of encoding or
 Software or device that filters data between different networks by enforcing the host network access
control policy.
5. Differentiate between the following terms as used in word processing (3marks)
 Drop cap is a large character at the start of paragraph that occupies more than one line downwards
while text case is capitalization of text ( you can switch from either lower or uppercase)
 A superscript appears just above the rest of the characters while subscript appears just below other
characters while subscript appears just below other characters

11
 An indent is a white space at the beginning of each line while tabs are used to add uniform spacing in
the line of text
6. (a) Computer processing file
(i) Master file – Is the main file that contains permanent records of a particular entry.
(ii) Transaction – Working file whose information is expected to change regularly – i.e. daily
(iii) Reference
(vi)Back up
(v) Sort
(vi)Report ½ mk stating , ½ mk explanation
(b) List any two organization methods (2marks)
 Hierarchical file organization
 Horizontal
7. (a) Webpage - a page in a website (1mark)
(b) Blog – a website which enables one to post or submit his or her personal details to a website; so that
the details can be accessed from the website. (1mark)
(c) Hyperlinks – text or graphic which opens another webpage or website when clicked (1mark)
(d) Web portal - a website that function as a point of access to information on the World Wide Web
8. (a) DTP - has several design templates for various publications
- Is more powerful in manipulating graphics / texts
- Enables formatting and manipulation of individual text and frames separately
- Enable complex document format printing
(b) Differentiate between the following
(i) Kerning – fixing visual denseness of pairs of character in text
Tracking– spacing between characters in text
Margins – space around the text in the four edges of a document
Column guides – non printable guides for column layout
9. Simulation – process of creating a model of a real object, concept in order to experiment the behavior of
a real object
10. Baseband signal – Digital signal transmitted through a digital channel without modulation ( 1mk)
Broad band - A group of analog signals transmitted through a common channel but with varying signal
frequency
(1mk)
11. Explain how the operating system controls the following resources (3marks)
i) Processor – the O.S assigns tasks one by one to avoid completion
ii) Main memory – the OS determines which task should occupy the main memory at any given time
iii) Input and output devices – the OS controls data input and information output
12. What is deadlock in reference to operating systems (1mark)
Is a situation that results when several tasks complete for a resource which is held and not being released
for use by another task.
13. (a) A magnetic disk is a direct access storage media (DASD) that permits the computer to find
data directly on the disk
(b) Hard disk provides greater storage capacity than the floppy disk. (1mark)
Hard disk operates or much higher retrieval speed
14. Define the following computer crimes
a) Making illegal copies of copy righted software information or data (1mark)
b) Industrial espionage – Spying in your computer to get information that can use to counter finish a
competitor (1mark)
15. Explain two ways of protecting data and information against unauthorized access (2marks)
 Password protection – A password to open or exit the database file i.e. lets any user who wishes to do
any action (2mark)

12
 Data encryption – If the database is to be sent electronically encryption secures the data from un
authorized access
 User and group permission to users on data base object such as queries form and reports
 User level security – this feature is used to assign permission to users in order to limit user access to
certain database object
SECTION B (60MARKS)
16. (a) list two examples of
(i) Third generation languages (2marks)
 Pascal
 FORTRAN
 BASIC
 COBOL
(ii) Object oriented languages (2marks)
 Simula
 Small talk
 Java
 C++
(b) Define (2marks)
i) Object code
 It is a machine code produced by a computer
 It is an output of a translator
 It is a translated source code
 Translated program code
ii) Source code
 This is a program written in the specific programming language
 Un translated program code
 Program in human understandable
(c) Differentiate between a compiler and an interpreter (2marks)
Compiler Interpreter
Fast in translation Relatively slow translate line by line
Translate whole program at once Translate line by line take less memory
Take up large memory space Take less memory every time program is run
hence
Saves time because Exe file is saved Every time program is run hence consume time

(a) START
PRINT ENTER CAR NUMBER
PRINT ENTER NUMBER OF DAYS
IFNUMBEROFDAYS>=7THEN
(NUMBER OF DAYS X 2500) – (NUMBER OF DAYS X 2500) 25%
ELSE
NUMBER OF DAYS X 2500
END IF
17. (a) Subtract 01112 from 10012 (2marks)
00102
(b) Using two’s compliment, subtract 7 from 4 and give the answer in binary notation. (4marks).

13
7 = 1112
4 = 1002
-4 in two’s compliment is 100
\ 111
100
+ 1011
The resulting answer is 011 since the overflow is ignored. In decimal notation that is 310
(c) Convert
i) 91C16 to octal (3marks)

9 1 C
1001 0001 1100

100 100 011 100


4 4 3 4
91C16 = 44348
ii) 3778 to hexadecimal (3marks)
3 7 7
011 111 111

0000 1111 1111


0 F F
\ 3778 = FF16
iii) 9.62510 to binary (3marks)
9 = 1001
0625 x 2 = 1.25 WRITE 1
0.25 x 2 = 0.5 WRITE 0
0.5 x 2 = 1.0 WRITE 1

9.62510 = 1001.1012

18. A school computer laboratory is scheduled to undergo major renovations. The lab is schedule to receiver
new computer whose specifications are given below:-
Pentium IV 2.8GHz processor
40GB HDD
3 ½ FDD
256MB RAM
56CD Rom
17” SVGA TFT monitor
The computers are gong to be networked and will be able to browse the internet.
a) Explain what is meant by the terms:- (2marks)
i) FDD
 An acronym for floppy disk drove which the computer possesses for 3 ½ size disks
ii) HDD

14
 An acronym for hard disk which the computer possess and its storage size is 40GB
iii) SVGA
 An acronym for thin film transistor monitor type
iv) TFT
 An acronym for thin film transistor monitor type
b) The computer is to be networked, name one extra device that should be fitted on every computer to
enable this to happen (1mark)
 NIC (network interface Card)
c) The computer is to receive internet facilities through the server on a dial; up system. Name and
describe the function of a special device that needs to be connected to the server to complete the
connection. (1mark).
 A modem
d) (i) The school has to apply he star topology to link up the computer. List two advantages of this
type of topology. (1mark)
 Easy to configure
 Allows centralization of key networking resources like concentration and servers
 Gives network administration focal point for network
(iii) Name the central device used to connect the computers in this topology. (1mark)
 Hub
e) List two other types of topologies that the school could have opted for (1mark)
 Bus topology
 Ring topology
 Mesh topology
 Tree/ hierarchical topology

f) List four advantages of using a network (2marks)


 Improves reliability e.g. incase one computer breaks down, users can still access data and information
from other computer on network
 Resources sharing i.e. data/ information, files, printers, modems, programs etc can be attached to the
network for access by all users
 Distributed processing facilities
 Remote communication i.e. transfer of data signals between two communication devices located
differently
 Cost effectiveness. Although initial cost of laying down the network components may be expensive
the savings experienced and the value added to service delivery make them a
g) (i) Data transmission via the internet is done using a mode known as packet switching. Describe
this data transmission mode (1mark)
 Refer to the process over the network of breaking down into discrete systematic steps the data
transmission process and at each step a certain action takes place.
(ii) Name two other modes of transmission (1mark)
Simplex Mode
Half Duplex and Full Duplex
h) (i) The school’s LAN is done using UTR cable. List two advantages of using this type of cable.
(1mark)
- Don’t have shield that prevent electromagnetic interference (EMI)
- Cheap (not costly)
(ii) List two advantages of using fibre cable in networking (1mark)
- Hard to tap (security)
- Immune to effects of moisture and light.

15
- Does not suffer from E.M.I
- Flexible in size.
iii) Data flows in the school’s LAN in a duplex manner. Discuss two other types of data transmission in
network giving examples (2marks)
- Hard duplex (Bi – directional)
- Data flows in both direction but only one direction at a time.
- Simplex
- Data flows in one direction on the communication media.
19. (a) Consider the topologies demonstrated in the diagram below.
(i) A-Free/ hierarchical topology
B – Ring topology
C – Mesh topology
(ii) Point 1 and 2 (1mark).
Terminator
(iii) Mesh topology
(iv)Highlight three disadvantages of topology B. (3marks)
 Modifying the topology is difficulty
 Trouble shooting is difficult
 One device breakdown affects the whole system
(v) Identify the device labeled X in topology A (1mark)
 Hub
(b) State two main classes of network software (2marks)
 Network protocol
 Network operating system
(c) Briefly describe the following as used in networking (4marks)
v) Repeaters - A device that receives signals from one send it to another segment. (4 marks)
vi) Network hub – a device that connects computer onto network.
vii) Fibre optic cables – transmission media that transmits data using light.
viii) Network interface card (NIC) – a device inside the system box linking them onto transmission
media.
20. (a) Define the following terms
(i) Database ( ½ mark)
 It is a collection of data stored for organizational use
(ii) Database management system ( ½ mark)
 A collection of programs required storing, organizing and retrieving data from a database
(iii) Hierarchical database (1mark)
 A database structure where data is organized like a family tree having branches made up of parent
and child records with each parent record having several child records and never vice versa
(iv)Relational database (1mark)
 A database structure in which data is organized in two dimensional tables called relations where an
element in any one table can be related to another piece of data in another table as long as they have a
common data element.
Diagram
(v) Network database (1mark)
Diagram
(b) List the advantages of using an electronic database system for storage of data over the file
approach. (4marks).
 Data is input only once and is made available to the many files
 Avoids duplication of files
 Avoids duplication of tasks at different points hence being economical

16
 Due to shared records, there is reduced processing time, reduction in use of hardware and lead to ‘Ö
 More efficient use of data processing personnel ‘Ö
 Leads to improved flow of data that is valuable to management as it is comprehensive (encompassing all)
‘Ö
 Leads timely and accurate reporting of data to all maintenance centres ‘Ö
 Reduction of paper costs ‘Ö
 Saving on storage space ‘Ö
(c ) Study the spreadsheet below and answer the questions that follow
A B C D
1 WESTERN
COMPBOOK
CENTRE SALES
2 BOOK TITLE PRICE PER BOOK BOOKS SOLD
3 DBASE IV 400.00 145
4 LOTUS FOR DUMMIES 460.00 15
5 OFFICE WORD IN 3 DAYS 300.00 65
6 LEARN C++ IN 3 DAYS 700.00 100
7 TEACH YOURSELF PASCAL 700.00 200
8 COMPUTER STUDIES 500.00 300
9 THE CLEVER FOOL 300.00 10
COMUTER
10

i) Write down the formula that can be used to find the price of the most costly book (1mark)
= large ((c3:c9),1) or = max (c3..c9)
ii) Write down the formula that can be used to determine the total sales for the book titled
COMPUTER STUDIES (1mark)
=b8*c8
iii) Write down the formula that can be used to determine the average price of the books. (1mark)
=ave(B3.B9) or + (B3 + B4 ÷ B5 + B6 + B7 + B8 + B9)/7
iv) Write down the formula in cell D6 that can be used to find the new per book if they went up by a
percentage written in cell B 10 and the formula has to be entered only in cell D3 then be copied to
others. (1mark)
=b6*$B$10
v) Write down the output in D7 if in B6 is 10% (1mark)
770
(d) State any four advantages of using an electronic spreadsheet as compared to a traditional
worksheet. (2mark)
 Utilizes powerful aspects of computer like speed, accuracy and efficiency to enable the user quickly
accomplish his/ her tasks
 Have inbuilt formulae called functions that enable the user to quickly manipulate mathematical data
 Have better document formatting capabilities
 Automatically adjust the result of a formula if the values in a worksheet are changed i.e. automatic
recalculation
 Enables the user to produce neat work because traditional papers, pencil, rubber and calculator are put
aside.
 Utilities the large storage space on computer storage devices to save or retrieve documents.

17
Marking scheme

Test paper 2

MARKING SCHEME
QUESTION 1
The question tested the candidates’ ability to do the following in a database
a) Award full marks for a created database with three tables bearing all the fields (3 x 4 = 12mks)
b) (b) award 1mk for each identified primary key fields in each table (1 x 3 = 3mks)
c) Award 2mks for each established relationship between the three tables (2 x 3 = 6mks)
d) Award 3mks for the form of each table ( 3 x 3 = 9mks)
e) Award 2mks for correct entry in each form (2 x 3 = 6mks)
f) Award 1mk for each identified field in the query i.e. customer Name, Product Description, Quantity, Unit
Price and calculated field total payable by each customer and 1mk for saving with appropriate name (1 x
5 =5mks)
g) Award 4mks for a clearly generated report (4mks)
h) Award 1mk for each of the printed customers, products, transaction tables designs, query and the report
(1 x 5 = 5mks)
Question 2
a) Saving the workbook with correct name (1mk)
- Using a different name
- Using default name book n no mark
b) All data entered correctly (15mks)
- Every wrong entry ½ mk
- More than 6 wrong entries -8mks
c) Remaining the sheet to “term one result” 1mk
- Default name sheet, no mark

18
d) (i) Correct totals and formula 1mk
(ii)Correct average and formula 1mk
- Manual calculation no mark
e) Correct subtotal Function award 5mks
f) (i)Correct use of IF function to attain 3 conditions 5mks
(ii)Correct formula and ranking (1 x 3)3mks
(iii)Correct use of the “count IF” function (1 x 2) 2mks
g) – sorting list of class position in ascending order 2mks
- Sorting list by classes position in descending order 1mk
- No sorting, no mark
h) (i) Copying to new worksheet and renaming the new sheet 2mks
(ii)Filtering the “lower group”
- Display students from “E” class
- Students with average less than 50 4mks
- Filter shows a all students from E class
- Filter shows all student with average less than 50 2mks
i) (i) The chart is
- A bar graph
- Show 3 cats
- Shows names of students
- Title is TERM ONE COMPUTER RESULTS 3mks
- Missing a point - ½ mk
(ii)Legend placed at the bottom of chart 1mk
(iii)Saving chart on a new sheet and renaming the sheet graphical analysis (1/2 x 2) 1mk
- Saving chart as an object on the worksheet ½ mk
j) Printing
(i) The lower group from “E” class 1mk
(ii) The chart 1mk
(iii) Term one results sheet 1mk

19
Test paper 3

1. (a) Give any TWO uses of a joystick (2mks)

(b)Define what direct data capture device is (1mk)

2. State the meaning of computer malware (1mk)

3. (a) Differentiate between cropping and resizing as used in DTP. (2mks)

(b) Assume that cell F5 to F10in a spreadsheet contains numeric value of salary earned by some workers
and cell F12 contains the value of 5%. Write a formula that will be used to increase the value stored in cell
F5 by 5 percent; (3mks)

4. State THREE application areas of speech output devices (3mks)


5. Outline TWO purposes /uses of optical disks (2mks)

6. Differentiate between distributed processing and multi-processing (2mks)

7. Identify the underlined parts of the following email address: [email protected]. (2mks)
a b c d

8. (a) Distinguish between READ and WRITE as used in storage media. (2mks)

(b) State TWO functions of Inter Record Gap (IRG) in magnetic tapes. (2mks)

20
9. Define pixels as used in monitor (2mks)

10. Give an explanation why computer laboratory should have (2mks)

i. Good ergonomics

ii. Uninterruptable power supply

11. Highlight two measures that need to be put in place to avoid risks associated with electric shock
(2mks)

12. a) Explain two functions of network servers (2mks)

b) i) Define the term crosstalk as used in networking (2mks)

ii) Explain briefly how the token ring network functions (2mks)

13. State two disadvantages of robots in an industry (2mks)

14. Explain two parts of a task bar (2mks)

15. Describe TWO elements of Graphical User Interface (2mks)

SECTION B (60MKS).Answer question 16 and any other three questions in this section

16.(a). Highlight three advantages of structured programming. (3mks)

b). A trader bought a car from a manufacturer and later sold the car to another person. Design a pseudocode
that will accept the buying price and the selling price of the car, determine whether the trader made a
profit /or loss, calculate the profit/loss and display it. (5mks)

21
b) Design a flowchart for the above case. (7mks)

17. a) Distinguish between physical and logical topology, giving an example in each case.(2mks)

b) High Height Academy wanted to network computers in their school’s computer Laboratory so that they
can share resources. The computer laboratory has 30 computers.The schools’ network administrator wanted
all computers on the network to act as servers and clients at the same time where there was no dedicated
server.The computers and other devices were each to be connected to a common switch.

i) Identify the category of local area network that was proposed by the network administrator.

(1mk)

ii) State two disadvantage associated with the proposed network category. (2mks)

iii) What category of LAN would you advice the administrator to use and why? (3mks)

iv) Identify the type of topology was to be used in the networking and state two advantages of this network
topology. (3mks)

v) Identify four resources that will be shared on the network. (2mks)

c) List two disadvantages of fiber optic cable. (2mks)

18. a) List four ways in which data integrity can be compromised. (4mks)

b) Distinguish between Logical file structure and physical file structure. (2mks)

c) Describe biometric security. (2mks)

d) Give four general rules that must be observed to keep within the law when working with data and
information. (4mks)

22
e) Describe Computer based simulation, giving an area of application and an advantage for simulation
program. (3mks)

19. a) A teacher had a document of 20GB in a hard disk. 4He wants to transfer the document into a CD of
700MB. Determine the number of CD’s he requires. (3mks)

b) Discuss the two types of Compact disks. (4mks)

c) State any three disadvantages of a magnetic diskette. (3mks)

d) Highlight three characteristics of a flash memory. (3mks)

e) Discuss any two functions of secondary devices (2mks)

20. a) Compute the value of x in the following expressions

(i) 24.3510 = X2 (3mks)

(ii) 6ABH = X10 (2mks)

(b) Using twos complements compute the following using 8 bits binary (4mks)

2010 – 2510

c)Subtract the following binary numbers using the One’s Compliment method. (3mks)

(11101)2 – (1010)2

d)Convert 60578 to Hexadecimal. (3mks)

23
Test paper 4

1. a) Using a word processor type the passage below as it appears and save it as Society (40 marks)

S
ociety has failed and parents have not played their role fully in raising their children. This is
according to Jeff Ngari, a counseling psychologist and a deacon with the Reformed Catholic
Church. Jeff says the issue of teenage mothers is so big that it should be considered a cry for
help. He adds that today’s children, lack the guidance they require when it comes to having
independent social interactions.

“The idea is not to block them from And just like the rest of society, parents
forming their own relationships, but to have not been spared by the wave of moral
make them understand what it means to be decay and thus, according to Jeff, they
in a relationship, especially with the have failed as role models for their
opposite sex, and how far this relationship children. Due to this, many teenagers are
should go,” says Jeff. picking up social ills from their parents-the
very people they are supposed to look up
to.

“For instance, a teenager who has seen his or her mother repeatedly sleep out or come home in the
wee hours of the morning will most likely be excited about staying out late out of curiosity, “he says,
adding, “this is happening to most of our homes today.”

Jeff says many parents relationships that leave


are engaging carelessly very little to the
in extra-marital PRE-MARITAL AND EXTRA
imagination MARITAL
of their
SEX IS DANGEROUS

24
children, and this is
likely to be seen as a
normal thing by
children, especially
teenagers. As a result,
there are many avenues
through which
teenagers can explore
the issue of sex and the
greatest worry that girls
need to be rescued.

25
Most teenage mothers experience rejection and abuse by their families, friends and
wider community, including the church. “No wonder these girls
abandon their babies either in toilets or litter bins. The effects of
rejection can be fatal-rejection by society is the worst thing
anybody can suffer. It kills from within. That is why teenage
motherhood is a cry for help and family support is very
important, as the result is children giving birth to, and trying to
raise babies.”

“In the course of my career, I have met mature women who


tell me they had abortions when they were very young
and they still feel guilty decades later. Some even go to the extent of saying, ‘My first-born
would be this or that age.’ It is very painful.”

In Kenya, four in every 10 women who die from unsafe abortion are adolescents; 70% of
adolescents engage in high-risk unprotected sex. This is according to a research paper
presented by Dr. Richard 0. Muga of the National Co-ordinating Agency for Population and
Development, Nairobi-Kenya, 2006.

The alarming figures are why Margaret Muyanga, a counseling psychologist, says open
communication between teenagers and parents can be very instrumental in curbing any post-
pregnancy abortion or even worse, suicidal tendencies.

b) Copy the Society to another page and save it as Society 2 (2marks)

c) Change the paragraph starting with “For instance……….“ to bold italic


(2marks)

d) Look for the word alarming and replace it with the word surprising (3marks)

26
e) Using the word count feature count the number of characters with spaces in the passage
25 (2 marks)

f) Insert alphabetical capital letter page numbers at the top left side of the two documents(2
marks)
g) Print the two documents Society and Society 2 (2 mark

2. Below is a cash statement for the first half of the year for WIDGET Manufacturing Co. Ltd for the year 2013.
Enter the data into a worksheet as shown. Save your work as Widget XLS

A B C D E F G H

1 WIDGET MANUFACTURING COMPANY LIMITED

2 CASH FLOW ANALYSIS 2013

4 ASSUMPTIONS

5 Interest rate 9%

6 Cost of goods 55%

8 Jan-13 Feb-13 Mar-13 Apr-13 May-13 Jun-13 TOTAL

9 CASH ON 43,000
HAND

10

11 INCOME

12 Sales of 83,394 110,237 114,563 117,329 123,291 108,345


Goods

13 Sales of 6,432 10,234 11,784 76,123 10,523 11,239


services

14 Total sales

15 Interest
income

16

17 Total income

27
18

19 EXPENSES

20 Cost of goods
sold

21 Rent 9,755 8,923 8,923 8,923 8,923 8,923

22 Salaries 19,849 15,234 15,234 15,234 15,234 15,234

23 Taxes 1,204 1,094 1,094 1,094 1,094 1,094

24 Supplies 2,050 2,050 2,050 2,050 2,050 2,050

25 Advertising 8,983 12,047 12,047 12,047 12,047 12,047

26 Travel 1,432 1,432 1,432 1,432 1,432 1,432

27 Misc. 500 500 500 500 500 500

28

29 Total
expenses

30

31 Net income

32 Net cash on
hand

b. Calculate the total sales for the month of January and use it to calculate the total for the month of
Feb-Jun
(1ma
rk)

c. Using the assumed interest rate calculate the interest income of cash at hand given that the
formula is interest =
(Interest rate X cash on hand) /12. Project the interest for the months Feb-June
(2marks)

d. Calculate the cost of goods given that:


Cost of goods=% cost of goods X total sales then use it to project the cost of goods for the months
Feb-June

(2marks)
28
e. Calculate the total income and the total expenses for the months Jan-June (2marks)
f. (i) Calculate the net income given that
net income=total income-total expenses

(ii) Calculate the net cash on hand for Jan-June given that the net cash on hand=cash on hand + net
income

g. Project cash on hand for the months of Feb-June given that the cash on hand at the beginning of
the month= net cash on hand at the end of the previous month
h. Calculate the totals for each item (2marks)
i. In its own worksheet generate a line graph to compare the total income and total expenses for
Widget Manufactures (4marks)
j. Rename the work sheet as Widget 13 and chart as chart 13 (1mark)
k. Print Widget 13 and chart 13 (2marks)

29
Marking scheme

Test paper 3
SECTION A

16. (a) Give any TWO uses of a joystick (2mks)


 In computer games
 Used in computer aided design(CAD)/Computer aided manufacturing(CAM)
 In training simulation
 In airline simulation
 In controlling of some toys
(b) Define what direct data capture device is (1mk)
 It’s a device that captures data directly from the source document without a conversion
stage.
17. State the meaning of computer malware (1mk)
 A malicious program designed to harm or disrupt the normal functioning of a computer
system e.g. clogging computer memory, unjustified background programs, replicating
files etc.
18. (a) Differentiate between cropping and resizing as used in DTP. (2mks)
 Cropping: Hiding unwanted or unnecessary parts of a graphic so that the required
part
is only displayed.
 Resizing: adjusting the size of a graphic.
(b Assume that cell F5 to F10 in a spreadsheet contains numeric value of salary earned by some
workers and cell F12 contains the value of 5%. Write a formula that will be used to increase the
value stored in cell F5 by 5 percent which will then be copied to other cells.
(3mks) =F5*(1+$F$12) or =F5+ (F5*$F$12)
19. State THREE application areas of speech output devices (3mks)
 Learning aids, games and toys- e.g. handheld devices for foreign language translation
and other computer-assisted learning (CAL).
 A talking voltmeter – used to test electronic components. This helps an operator with
fewer visual tasks, so helping to prevent accidents.
 Lifts – messages can be used in lifts to greet visitors, tell them which floor they are on.
 Emergency messages
 In public address systems
 In cars – ‘you’re running out of petrol’, ‘your oil is low’ etc
 In household appliances – washing machines, vacuum cleaners – ‘the tub is
overloaded...’
 Answering services.
 In situations where you cannot look or are too busy – spoken dashboard information
for a pilot or a car driver.
 Text-to-speech translations (reading machines) – for blind or disabled people an
alternative to braillle.
29

30
20. Outline TWO purposes /uses of optical disks (2mks)
 For distributing large amounts of data at low costs.
 For distribution of new or upgraded versions of software products.
 For archiving data that is not frequently used and is considered important.
 For distribution of electronic versions of reading materials e.g. E-books, journals
conference proceedings e.t.c.
 Storage of multimedia applications e.g. Video clips, sounds, music, animations e.t.c.
 WORM disks are used to store proprietary information for companies.

21. Differentiate between distributed processing and multi processing (2mks)


 Distributed processing – rather than a large central computer, several smaller
computers, linked together by data communications media, are located in different parts
of the organization and may share a database. Data can sent to and from head office or
other branches as required.
 Multiprocessing – two or more CPUs present in the same computer system share the
workload of data supplied to that computer for processing.

22. Identify the underlined parts of the following email address: [email protected].
a b c d
(2mks)
Alicen – the identifiable name of the user with a mail address.
gmail – the server computer where the mailbox services are hosted stored.
Co – the type of organization which hosts the mail server.
Ke- the country where the host server is located.

23. (a) Distinguish between READ and WRITE as used in storage media. (2mks)
 READ – The process where data/instructions are retrieved from a storage device.
 WRITE – To transfer data/instructions on a storage media.
(b) State TWO functions of Inter Record Gap (IRG) in magnetic tapes. (2mks)
 To separate records stored in the magnetic tape to avoid mix-up of data.
 Allows proper timing of record access.
24. Define pixels as used in monitor (2mks)
A dot on the screen used to display information

25. Give an explanation why computer laboratory should have (2mks)


iii. Good ergonomics
To protect the users from strains caused by poor sitting posture

iv. Uninterruptable power supply


To protect computers from power instabilities

26. Highlight two measures that need to be put in place to avoid risks associated with electric shock
(2mks)
Avoid using liquids

31
Ensure that there are no naked wires

27. a) Explain two functions of network servers (2mks)


Avails resources to the clients

Responds to clients request

Ensures security of the computers

b) i) Define the term crosstalk as used in networking (2mks)

Unwanted coupling between signal paths

ii) Explain briefly how the token ring network functions (2mks)

Adjacent computers are joined to each other to form a complete ring and the
communication is done through a packet called token which is held by a computer

that wants to pass a message

28. State two disadvantages of robots(2mks)


Installation cost is too high

Requires electricity/supply of power to operate

People lose jobs in industries

Needs frequent maintenance to keep it running

29. Explain two parts of a task bar (2mks)


Start button

System tray

Task manager

30. Describe TWO elements of Graphical User Interface (2mks)


Window

Pointer

Icons

menu

32
SECTION B

31

16.a). Highlight three advantages of structured programming. (3mks)

(i). It is flexible.
(ii).Structured programs are easier to read.
(iii). Programs are easy to modify because; a programmer can change the details of
a section without affecting the rest of the program.

(iv). It is easier to document specific tasks.


(v).Use of modules that contain standard procedures throughout the program saves
development time.
(vi). Modules can be named in such a way that, they are consistent and easy to find
in documentation.

(vii). Debugging is easier because; each module can be designed, coded & tested
independently.

b)A trader bought a car from a manufacturer and later sold the car to another person. Design a
pseudocode that will accept the buying price and the selling price of the car, determine whether the
trader made a profit

/or loss, calculate the profit/loss and display it. (5mks)

START

ENTER buying Price, selling price

INPUT Bp, Sp

IF Bp<Sp THEN

Profit= Sp-Bp

PRINT Profit

Else

Loss=Bp-Sp

PRINT Loss

33
STOP

32

Design a flowchart for the above case.

START

ENTER Buying Price ,BP and


Selling Price ,SP

Is SP >BP ?

NO Loss= BP-SP

Profit= SP-BP

PRINT Loss

PRINT profit YES

STOP 34
33

17. a) Distinguish between physical and logical topology, giving an example in each case.(2mks)

i) Physical topology refers to the physical layout of computers on a network e.g. star, ring,
bus, etc.
ii) Logical topology refers to the way data is passed from one device to the next on the
network. Examples include; Ethernet and token ring.

b) High Height Academy wanted to network computers in their school’s computer

Laboratory so that they can share resources. The computer laboratory has 30 computers.

The schools’ network administrator wanted all computers on the network to act as servers and
clients at the same time where there was no dedicated server.The computers and other devices
were each to be connected to a common switch.

i) Identify the category of local area network that was proposed by the network administrator.
(1mk)
- Peer – to- peer network.

ii) State two disadvantage associated with the proposed network category. (2mks)

(i). It is difficult to locate information stored in the connected computers due to Shared
level security.
(ii). Difficult to update documents and files.
(iii). It is expensive to train staff on how to share resources, as each user is an administrator.
(iv). It is difficult to maintain security, as it is the user’s responsibility to ensure that only
authorized individuals can access their data.
(v). Can’t maintain a large number of computers.

iii) What category of LAN would you advice the administrator to use and give two reasons why?
(3mks)
35
-Server-based networks

(i). There is security since the Server controls the resources the clients need to access.
(ii). It can support a large number of users.
(iii). The server can be optimized to hand out information as fast as possible.
(iv). Fewer connections are required by the clients to get the resources.
(v). Easier to maintain backup for files (synchronization of files).
(vi). Cost effective as client workstations don’t need large hard disk (storage capacity).

iv) Identify the type of topology that was to be used in the networking and state two advantages

of this network topology.


(3mks)

-Star topology

i. Allows key networking resources such as concentrators & servers to be centralized.


ii. Easy to configure.

iii. Simple to control.


iv. It can be extended easily, since a workstation is simply connected to the hub.
v. Provides flexibility in adding or deleting devices.

v) Identify four resources that will be shared on the network. (2mks)

i) Files.
ii) Storage media e.g. hard disk.
iii) Programs.
iv) Printers.

c) List two disadvantages of fiber optic cable. (2mks)

i) Connectivity devices and the media are expensive.

ii) Installation is because the cable must be carefully handled.

iii) it is relatively complex to configure.

18. a) List four ways in which data integrity can be compromised. (4mks)

i. Human error e.g. inaccurate data entry, accidental deletion.


ii. Natural disasters such as fires, floods and earthquakes.
iii. Worms and viruses.

36
iv. Hardware malfunctions.
v. Fraud.
vi. Malicious deletion or changing of data.
b) Distinguish between Logical file structure and physical file structure. (2mks)

Logical files.-A Logical file is a type of file viewed by the user in terms of what data items it
contains &what processing operations may be performed on the stored data items.

34

Physical files.-A Physical file is viewed in terms of how the data items found in a file are
arranged on the surface of the storage media (e.g., disk, tape), and how the stored data items can
be processed.

c) Describe biometric security. (2mks)

Refers to the science of identifying an individual through their body characteristics such as face
geometry, hand geometry, iris or rental scans or voice patterns.

(ii)`Installation is difficult because the cable must be carefully handled.

d) Give four general rules that must be observed to keep within the law when working with data and
information. (4mks)

i. Data should not be disclosed to other people without the owner’s permission.
ii. Data and information should be kept secured against loss or exposure.
iii. Data and information should not be kept longer than necessary.
iv. Data and information should be accurate and up to date.
v. Data and information should be collected, used and kept for specified lawful purposes.
e) Describe Computer based simulation, giving an area of application and an advantage for

simulation program. (3mks)

Computer based simulation refers to the science of representing the behavior of a real-life
situation by using computerized models.

Simulation programs are mostly used in educational areas where practical skills have to
be learnt like training drivers, pilots, engineers etc.

(i) Simulation software can be used to provide the learner with clear illustrations
about

a certain concept or skill.


37
(ii) Advantages:

Reduces cost where expensive devices are being used.

19. a) A teacher had a document of 20GB in a hard disk. He wants to transfer the document into a CD
of 700MB. Determine the number of CD’s he requires. (3mks)

(20 x 1000) MB = 20000

700 MB 700 = 28.57 ⋍29 CD’s

b) Discuss the two types of Compact disks. (4mks)

i) CD-R (Recordable).

A CD-R holds data permanently, i.e., once written, it cannot be erased or overwritten.

CD-R can be used to store or backup a lot of data (about 650MB), thus making it suitable

for businesses that need to record/ store a lot of information.

ii) CD-RW (ReWriteable).

It is possible to record data on a CD-RW more than once. With CD-RW drive you can

also erase the contents of a CD and re-write new information to it.

c) State any two disadvantages of a magnetic diskette. (3mks)

i) Small storage capacity consultable for storing files.


ii) Limited life span ( 2 years at most)
iii) Slow read/write speeds.

d) Highlight three characteristics of a flash memory. (3mks)

i. Physically very small.


ii. Highly portable.
iii. High data capacity
iv. High data transfer speed to the devices they are part of or attached to.

e) Discuss any two functions of secondary devices (4mks)

(i). Used to store data & instructions that is not needed immediately (or not currently in use)
38
by the CPU. This helps in creating space for another data to be stored in the memory.

(ii). Used for transportation & distribution of data & software, i.e., for transferring files from
one machine to another.

(iii). Used to back up files (keep copies of data & programs) for safe-keeping.
Whatever is in memory is lost (or can be corrupted) when the computer or the power
supply

is switched off. Disks can therefore be used to store programs & data, which can be

retrieved when needed.

(iv). Used to install new software.

20. a)(i) 24; 3510 = x2

2 24 0 0.35 x 2 = 0.70

2 12 0 0.70 x 2 = 1.40 copy down wards = 010112

2 6 0 √ 0.40 x 2 = 0.80

2 3 1 0.80 x 2 = 1.60

2 1 1 0.60 x 2 = 1.20

= 11002√1

= 1100.010112√1

(ii) 6 ABH = x10

6 A B

6 x 162 10 x 161 11 x 160

(6 x 162) + (10 x 161) + (11 x 160)

39
6 x 256 + 10 x 16 + 11 x 1 √1

1536 + 160 + 11

= 170710√ (1mk) – Award 0 if no radix

b) Using twos complements compute the following using 8 bits binary (4mks)

2010 – 2510

20 25

2 20 0 2 25 1

2 10 0 2 12 0

2 5 1 2 6 0

2 2 0 2 3 1

2 1 1 2 1 1

0 0

000101002 = 000110012

20 + (-25)

000110012

111010112

+ 1

1110011002 One’s complement

000101002

+ 11100111

111110112

c)Subtract the following binary numbers using the One’s Compliment method. (3mks)
40
(11101)2 – (1010)2

Compliment the digits of the negative number, and then add.

1 1 1 0 1

+ 1 0 1 0 1

11 0 0 1 0

Overflow

Add the overflow digit to the Least Significant Digit of the sum to get the difference.

1 1 1 0 1

+1 0 1 0 1

1 0 0 1 0

1+

1 0 0 1 1 Difference

d) Convert 60578 to Hexadecimal. (4mks)

First, convert the given octal number to decimal (base 10).

83 82 81 80 Assign the powers to base 8.

6 0 5 7

41
= (6x83) + (0x82) + (5x81) + (7x80)

Sum = 3072 + 0 + 40 + 7

= 3119

Therefore, 60578 311910

Then convert the resulting decimal number to the Hexadecimal.

Rem

16 3119 15 (F =15 in decimal)

16 194 2 Copy upwards

16 12 12 (C =12 in decimal)

0
311910C2F16

Therefore, 60578C 2 F16

(Accept converting first the octal number to binary, then to hexadecimal)

Marking scheme
Test paper 4
1.

42
i) Well typed and spell checked document (20 marks)
ii) Drop caps in margin paragraph 1 award 2 marks (2 marks)
iii) Two columns in paragraph 2 without a line between (2marks)
iv) Well punctuated paragraph 3 (2marks)
v) Three columns in paragraph four with line between, inserted callout
with centered text (6
marks)

vi) Inserted right clip art and tightly wrapped across the two paragraphs (4 marks)
vii) Inserted right border in the last paragraph ONLY (2 marks)
b) Copied Society to another page and saved as Society 2 (2marks)

c) Changed paragraph starting with “For instance………. “to bold italic (2marks)

d) Replaced alarming with the word surprising (2 marks)

e) Using the word count feature counted characters with spaces= 2797 (2 marks)

f) Inserted alphabetical capital letter page numbers at the top left side

of the two documents (2 marks)

g) Printed documents Society and Society 2 (2 marks)

2.

a) Correct entered data (30 marks )


b) Totals sales =sum(B12:B13) ( 2 marks )
c) Correct use of the formulae to calculate interest. =(B9*D$9) ( 2marks )
d) = (D$6*B14) ( 2marks )
e) =SUM (B14:B15)
( 2marks )
f) I) =(B17-B29)
II ) =(B$3+B$31) ( 2marks )

g) =B32
h) Proper auto fill of formulae and functions ( 2marks )
i) Proper graph ( 4 marks )
j) Renaming (2
marks )
k) Printing ( 2marks )

Test Paper 5.
1. (a) What is a peripheral device? (2 marks)
(b) Give two examples of peripheral devices. (1mark)

43
2. State any six characteristics of the fifth generation computers. (3 marks)
3. Explain the term hard disk crashing (2 marks)
4. Give two ways of erasing contents of a cell in a worksheet. (1marks)
5. List three control structures used in programming language. (3 marks)

6. Distinguish between a file and a folder as used in windows operating system. (2 marks)
7. While on an environmental conservation trip, students were told never to dispose
off laptop batteries carelessly in landfills. Describe potential environmental hazards associated
with those batteries. (2 marks)
8. Differentiate between the Insert mode and the overtype mode as used in Microsoft
word processing. (2 marks)
9. A signal wave has three salient properties; Frequency, wavelength and amplitude.
Describe each one of them. (3 marks)
10. (a) Differentiate between single mode and multimode fiber optic cables. ( 2 marks)
(b) State one application area for each mode of fiber optic cables. (2marks)
11. Fig. 2.4 shows electronic pathways on a section of a motherboard. Study the
Illustration and answer the question that follows.

Fig.2.4: Section of a motherboard.

(a) What name is given to the pathway? (1 mark)


(b) Explain three types of the pathways in (a) above. (3 marks)
12. Explain how an operating system such as Microsoft windows ensures that there is
no hardware conflict. (2 marks)
13. (a) You may have come across the term ‘Garbage in Garbage out’ (GIGO).
Explain the meaning of this statement with regard to data processing. (2 marks)
(b) State four operations you would undertake to safeguard data integrity. (2 marks)
44
14. In the text extract in Fig.4.5 below, the first character occupies more than one line.

Scientific discoveries are truly amazing. Take for


example the recent discovery that the white flashes
in storms are caused by gamma rays emitted when
electrons and positrons combine. This is the clearest
evidence yet that matter and anti-matter exist in our
world!
Fig. 4.5: Text extract
(b) State the formatting feature used for the first character. (1 mark)
(c) Explain the importance of using the formatting feature in (a) above. (1 mark)
15. Differentiate between mouse pointer and insertion pointer. (2 marks)
SECTION B (60 marks)
Answer Question 16 and any other three questions from this section in the spaces provided.
16. (a) Define the term ‘problem definition’ (1 mark)
(b) In any given circumstance, there are several reasons that may motivate a programmer
to identify a problem worth solving. State three such reasons. (3 marks)
(c) Study this flowchart and use it to answer the questions that follow.

Start

S=1

Y = Y/10

S=S+1

Y< NO
10 ?

YES
S

Stop

(I) Give the expected output from the flowchart when the value of Y is:

45
(i) 48 (2 marks)
(ii) 9170 (2 marks)
(iii) – 800 (2 marks)
(II) Write the pseudocode that can be used to create a program represented by the above
Flowchart. (5 marks)
17. (a) The magnitude of a number can be determined using three parameters. Using
Examples, describe the three parameters. (3 marks)
(b) Using two’s complement, show how the arithmetic below would be carried out on
a 8 – bit computer system.
(+54) – (+29). (5 marks)
(c) Using one’s complement, perform the following binary arithmetic leaving the answer in
decimal notation. (5 marks)
11012 - 1001012

(d) Differentiate between a word and a word length as used in data representation. (2 marks)
18. (a) Write down the three letter file name extensions (e.g sys) that are normally
associated with the following file type.
(i) A simple ASCII text file. (1 mark)
(ii) A Microsoft word document. (1 mark)
(iii) A digital photograph (1 mark)
(iv) A Microsoft power point presentation (1 mark)
(v) A bit mapped image. (1 mark)
(c) A scanner is quite a useful input device. Describe three useful tasks which a scanner
can fulfill. (3 marks)
(c) Describe two types of scanner that are used for inputting data into a computer. (4marks)
(d) (i) Previously scanners were connected to a computer via the parallel port,
but this has be replaced by USB. Briefly explain the difference between
these two ports. (2marks)
(ii) Explain why USB has been preferred over parallel port. (1 mark)

19. (a) Differentiate between the following characteristics of a system:


(i) Hard system and Soft system. (2marks)
(ii) Boundary and Environment. (2marks)
(iii) Open and Closed system. (2marks)
(b) Define the following terms as used in system development.

46
(i) System Entropy (1 mark)
(ii) System feedback. (1 mark)
(c) State two advantages and two disadvantages of using interview as a method of
data collection.
Advantages. (2 marks)
Disadvantages. (2 marks)
(d) Under what circumstances would a questionnaire be best suited for data
collection. (3 marks)
20. (a) List two devices used in wireless communication. (2marks)
(b) Explain the following communication devices:
(i) Hubs. (1 mark)
(ii) Modem (1 mark)
(iii) Codec (1 mark)

(iv) Bridge (1 mark)

(c) Describe the following terms with respect to data communication.


(i) Bandwidth (1 mark)

(ii) Attenuation (1 mark)

(d) Distinguish between videotex and teletext. (2marks)


(e) (i) What is virtual reality? (1 mark)
(ii) Explain four uses of virtual reality. (4 marks)

47
Test paper 6
1. FutureTech Company Ltd deals with sales of three types of electronic goods namely television sets,
radio systems and DVD players. Below is a table showing details of April 2013 sales.

FutureTech Company Ltd.


Sales as per 30th April 2013
Category Type Item Description Unit Sold Sub- Tax Net
Code Price Total Amount
TV001 TV 21” LG TV 16000 8
TV003 TV 38”Samsung TV 60000 2
RD001 Radio JVC 3CD Changer 21000 12
DV001 Radio Philips DVD 5500 6
Player
TV004 TV 14” JVC TV 11000 22
DV002 Radio LG DVD Player 6200 18
TV005 TV 21” Sony TV 15800 14
DV003 DVD Sony DVD Player 4500 20
RD002 Radio Panasonic Radio 3200 30
RD003 Radio Samsung Radio 4700 8
Player
TV007 TV 14” ZEC TV 8200 4
DV001 Radio Panasonic DVD 6500 16
Player

TV 15%
Tax Rates DVD 12%
Radio 8%
Required:
(a) Enter the data in a worksheet and save it as CD-R: \FutureTec. (16 marks)
(b) Format the worksheet as follows:
(i) Center the Title across columns. (2 marks)
(ii) The text should be Arial, 18 points, bold and centered within
a box. (2 marks)
(iii) Column Headings to be wrapped within the cells and centered
horizontally and vertically. (2 marks)
(iv) The Unit Price to be in two decimals and currency prefix Ksh. (4 marks)
(c) Use appropriate cell references to calculate:
(i) The Subtotal, rounded to two decimals places. (2 marks)
(ii) The TAX is based on the type of the item. Use the rates given in
the table above to calculate tax payable on each item sold. (2 marks)
(iii) The Net Amount, which is the subtotal less tax. (2 marks)
(d) Sort the worksheet in ascending order according to category. (2 marks)
(e) Calculate the subtotals and grand total for the three types of electronic
goods. (6 marks)
(f) On a separate sheet, create a bar graph that compares sales for the three
types of electronic goods. Label it appropriately. (6 marks)

48
(g) Print the worksheet showing all formulae used instead of values and
the graph. (4 marks)

49
HIGH SEASONS is a holiday resort firm. It has several branches all over the
world. In order to keep track of its employees, a database to organize employee
information is required.

(a) Create a database file and save it as SEASONS in the removable storage
provided. (2 marks)

(b) (i) Create a table containing the following fields: (4 marks)

Field Name Field Type


EmployeeNo. AutoNumber
Date of Birth Date/Time
Grade Text

(ii) Make the field Employee No. the primary key and save the table as
EMPLOYEES. (3 marks)

(c) (i) Create a form based on the EMPLOYEES table and save it as
EMPLOYEESFORM. (4 marks)

(ii) Use the form to enter the records below: (6 marks)

EmployeeNo. Date_of_Birth Grade


1 5/15/1960 G
2 4/28/1978 H
3 10/30/1972 R
4 12/5/1975 H
5 2/28/1974 G
6 1/3/1970 G
7 11/24/1956 H
8 3/10/1984 G
9 4/4/1956 S
10 8/11/1964 R

(d) Modify the EMPLOYEES table by adding two new fields: (2 marks)

Field Name Field Type


Salary(Shs) Currency
Address Text

(e) (i) Create another table containing the following fields: (2 marks)
Field Name Field Type
HouseID AutoNumber
Number of Rooms Number

50
Location Text
Rent Currency

(ii) Make the field HouseID the primary key and save the table as HOUSES.( 2 marks)

(f) Create a relationship that enforces referential integrity. (4 marks)

(g) (i) Create a query and save it as EMPLOYEESQUERY based on the


EMPLOYEES table that would display all the employee’s in
Grade H, R and their salaries. (4 marks)

(ii) Sort the records in the EMPLOYEESQUERY in alphabetical of


Grade field. (3 marks)

(h) (i) Create a columnar report with portrait orientation from the
EMPLOYEESQUERY. Save the report as EMPLOYEESREPORT. (4 marks)

(ii) Enter a function to compute the salaries grand total displayed in the
report. (3 marks)

(iii) Insert a header EMPLOYEES IN GRADE H AND R in the report


having font size 20pts to the left of the page. (2 marks)

(i) Print the EMPLOYEES Table, HOUSES Table, EMPLOYEESFORM,


EMPLOYEESQUERY and EMPLOYEESREPORT. (5 marks)

51
Marking scheme
Test paper 5

SECTION A (40 marks)


21. (a) Peripheral device are external devices that are connected to the system unit through
ports with the help of data interface cables. [Award 2 marks]
(b) – Printers
- Mouse
- Scanner
- The keyboard [award 1 mark for any two devices given]
22. Six characteristics of the fifth generation computers. [3 marks]
 The technology used was superconductor and parallel processing.
 Voice recognition devices were introduced.
 Artificial Intelligence was introduced.
 Internet was fully developed
 Distributed computing system was developed
 Smaller but high capacity storage device(flash disk) was introduced.
 Information and Communication Technology (ICT) was developed.
 Expert Systems and natural language among others were introduced
23. Hard disk crashing refers to the permanent damage of the read/write head of
the hard disk [2 marks]
24. Two ways of erasing contents of a cell in a worksheet. [1marks]
 Delete
 Backspace
25. Three control structures used in programming language. [3 marks]
 Selection
 Iteration/Repetition
 Sequence
26. A file is a collection of related data or information stored in one location and given a unique name
while a folder is a named storage area where the user can store related files to enable easy access.
[2 marks]

52
27. – Most laptop batteries contain heavy toxic metals such as cadmium. This can cause substantial
pollution by leaching to underwater tables when land filled and/or air pollution when incinerated.
 The laptop batteries therefore require special care during disposal any many countries are now
operating recycling programs to capture and reprocess the old batteries.[3 marks]

28. The Insert Mode is the normal typing mode where the typed character at the cursor
position pushes the rest of the text to the right. On the contrary, the overtype mode is where the
typed character inserted at the cursor position deletes the character on the right of the cursor.
[2 marks]
29. Frequency of a wave is the number of cycles (vibrations) that the wave makes per second. It is
measured in Hertz (Hz). [1 mark]
 Wavelength is the distance between two adjacent crests or troughs, and is measured in metres
(M). [1 mark]
 Amplitude is the maximum displacement disturbance) of the medium from equilibrium (rest)
caused by the wave. [ 1 mark]
30. (a) A single mode fibre optic cable has a very thin core hence; it can only receive a single ray of
light while a multimode fibre optic cable has a thick core and can receive multiple light rays.
Light in the multimode cable attenuates faster than in the single mode.[ 2 marks]
(b) Applications of each mode. [2marks]
 Single mode fibre optic cables are used for long distance transimission like in undersea

(submarine) cables or laying long distance backbones.

 Multimode fibre optic cables are used for short distances like when laying backbones for

campus networks.

31. (a) Buses: These are electrical pathways etched on the system board and used to transmit data and
control signals. [1mark]

(b) Three types of the pathways in (a) above. [3 marks]


 Control bus: This is the pathway for timing and controlling functions sent by the control

unit to other parts of the system.

 Address bus: This is the pathway used to locate the storage position in a memory where

the data to be processed next is to be found.

53
 Data bus: This is the pathway where the actual data transfer takes place.

32. In order to avoid device conflict, an operating system typically assigns each hardware resource in a
computer a unique identifier. For example, in Microsoft windows this identifier is referred to as
Interrupt Request (IRQ). [2 marks]
33. (a) Garbage In Garbage Out(GIGO) means that the accuracy and integrity of
information available after processing depends on the integrity of data entered
into system. [2 marks]
(c) Four operations undertaken to safeguard data integrity. [2 marks]
 Control data access both physically and electronically.
 Provides users with easy to use data input mechanisms
 Use data detection and correction measures.
 Use antivirus software to protect data from being corrupted.
34. (a) The first letter of the paragraph is a drop cap. [1mark]
(b) Drop cap is used to capture attention and for emphasis. [1mark]
35. A mouse pointer is the arrow used to point to or select an item on the screen,
while an Insertion pointer is the blinking cursor that shows where the next
character is to be Inserted [2 marks]

SECTION B (60 marks)


Answer Question 16 and any other three questions from this section in the spaces provided.
36. (a) Problem definition refers to the identification of a problem that needs to be solved through
computerization. [1 mark]
(d) Reasons that may motivate a programmer to identify a problem worth solving.[3 marks]
- Problems or undesirable situations that prevent an individual or an organization from
achieving its purpose.
- Opportunity to improve the current operations. It can be argued that any unexploited
opportunity is a problem.
- A new directive given by the management or government requiring a change in the status
quo.

54
(e) Study this flowchart and use it to answer the questions that follow.

Start

S=1

Y = Y/10

S=S+1

Y< NO
10 ?

YES
S

Stop

(I) Give the expected output from the flowchart when the value of Y is:
(i) 48 [2 marks]
Solution:
Y = 48
= 48/10
= 4.8
4.8 <10 YES
Y = 4.8
S=1
55
(ii) 9170 [2 marks]
Solution:
Y = 9170
= 9170/10
= 917
917 <10 NO
‫؞‬S=S+1
=1+1
S=2
917/10 = 91.7
91.7 < 10 NO
‫؞‬S=2+1=3

Y = 91.7/10 = 9.17
9.17 < 10 YES
‫؞‬S=3
(iii) – 800 [2 marks]
-800/10 = -80
-80 < 10 YES
‫؞‬S=1
(II) Solution to the pseudocode used to create a program represented by
the flowchart. [5 marks]
Start
S=1
Ready
Repeat Y
Y = Y/10
IF (Y <10) THEN
S=S+1
ENDIF
UNTIL Y < 10
PRINT S
Stop
37. (a) Three parameters that determines the magnitude of a number [3 marks]

56
 Absolute value: Magnitude of a digit in the number line. For example, digit 2 in 423, has

an absolute value of 2 according to its value in a number line.

 Place value: Position of a digit in the number, whether ones, tens, hundreds and so on. For

example, digit 2 in 423, has a place value of tens hence the total value is 20.

 Base value: Radix of the number system that is being used. For example, 32 and 310 mean

three base two and three base ten respectively, and have different values.

(c) Using two’s complement, show how the arithmetic below would be carried out on
a 8 – bit computer system.
(+54) – (+29). [5 marks]
Solution;
+5410

2 54 Rem
2 27 0
2 13 1
2 6 1
2 3 0
2 1 1
2 0 1
Copy upwards
+5410 = 1101102
+2910
2 29 Rem
2 14 1
2 7 0
2 3 1
2 1 1
2 0 1
Copy upwards
+2910 = 111012
(+5410) – (+2910) = 1101102 – (111012)
001101102 – 000111012 (write into 8 – bits)

57
001101102+ (111000102) (1C’s)
+ 12 (2’Cs
001101102 + 111000112
001101102
+ 111000112
(1)000110012

Ignore the
overflow
(+5410) – (+2910) = (1101102) – (111012) = 000110012

(c) Using one’s complement, perform the following binary arithmetic leaving the answer in decimal
notation. (5 marks)
11012 - 1001012

Solution:
000011012 - 001001012 (write into 8 – bits)
000011012+ (110110102) (1C’s)

000011012
+ 110110102
(1)11001112
Sign bit

Convert of decimal notation.


2-7 26 25 24 23 22 21 20
1 1 1 0 0 1 1 1

2-7 26 25 24 23 22 21 20
1 1 1 0 0 1 1 1
1 x 2-7 1 x 26 1 x 25 0 x 24 0 x 23 1 x 22 1 x 21 1 x 20
1 x -128 1 x 64 1 x 32 0 x 16 0x8 1x4 1x2 1x1
-128 64 32 0 0 4 2 1

-128 +64 + 32 + 0 + 0 + 4 + 2 + 1 =-128 +103 = -2510

58
(d) A word is a group of bits accessed as a unit whereas a word length is the number of bits in a
word. [2 marks]
38. (a)
(vi) A simple ASCII text file. [1 mark]
 txt

(vii) A Microsoft word document. [1 mark]


 doc

(viii) A digital photograph [1 mark]


 jpg

(ix) A Microsoft power point presentation [1 mark]


 ppt

(x) A bit mapped image. [1 mark]


 bmp

(b) Three useful tasks a scanner can fulfill. [3 marks]


 Can transfer drawings and pictures into the computer.
 Can read text into a word processor, with the help of OCR software’s.
 Can make copies of documents.
(c) Description of two types of scanner used for inputting data into a computer. [4marks]
OMR (Optical Mark Recognition): uses a light source to scan marks on a sheet of paper e.g.
multiple choice test papers.
Barcode Read: used to scan information contained in a barcode, converting it to useful data
inside the computer.
(d) (i) Difference between Parallel and USB ports. [2marks]
 Parallel is slow, sending one byte of data at a time while

 USB is a fast serial connection which sends data in a steady stream.

(ii) USB has been preferred over parallel port

 USB comprises only four conductors ( in one cables, two used for data and two for
power and many devices can be connected using USB. [1 mark]

39. (a) The differentiate between following characteristics of a system:


(i) In hard system, goals and objectives are clearly defined while in soft system,
goals and objectives are not clearly defined [2marks]
(ii) Boundary is the space within which the system operates while
Environment is the entity that is outside the boundary but interacts
59
with the system. [2marks]
(iii) An open system receives input and gives output to the environment
While closed system does not. [2marks]
(b) Definition of the following terms as used in system development.
(i) System Entropy refers to the natural decay of system over time. [1 mark]
(ii) System feedback refers to having outputs from a process of the system
given back to the system for control purposes. [1 mark]
(c) Two advantages and two disadvantages of using interview as a method of
data collection.
Advantages. [2 marks]
 Provide immediate response
 Analyst can observe non-verbal information from the respondents.
 Analyst can frame questions differently to individuals depending on
their level of understanding.
 The response rate are high.
Disadvantages. [2 marks]
 Costly and time consuming when used on a large number of people.
 Success highly depends on the analyst’s experience
 May not be practical when respondents are in diverse locations
 Interview may fail due to personal questions being asked.
 The respondents may feel that they are being grilled by the analyst.
(f) Under what circumstances would a questionnaire be best suited for data
collection. [3 marks]
 When the number of people involved is large.
 When a restricted amount of information is required from many people.
 When the target populations is in diverse locations.
40. (a) Two devices used in wireless communication. [2marks]
 Access Point (AP)
 Wireless Antennae
(b) Explanations of the following communication devices:
(i) Hubs is a component that connects computers on a network and is able
to relay signals from one computer to another on the same network.[1 mark]
(ii) Modem is a device that converts a signal from digital to analog form for
the purpose of transmission over the analog media. [1 mark]

60
(iii) Codec is a device that converts an analog signal to digital form for transmission
Via a digital medium [1 mark]
(iv) Bridge is a network device that selectively determines the appropriate
Network segment for which a message is meant for delivery through
Addressing filtering. [1 mark]

(c) (i) Bandwidth is the maximum amount of data that a transmission medium
can carry [1 mark]
(ii) Attenuation is the decrease in magnitude and energy as a signal
progressively moves along a transmission medium. [1 mark]

(d) Videotex is a two way system for using television screen to display data
stored in central computer databases while Teletext is similar to videotext
but is only one way(Refers to a computerized service whereby news and other information
are provided on television screens to subscribers. However, teletext is a one way
communication (simplex) which means that the subscriber cannot communicate back to the
service provider. [2marks]
(g) (i) Virtual reality is a way for humans to visualize, manipulate and interact
with computers and extremely complex data. [1 mark]

(ii) Four uses of virtual reality. (4 marks)

 Window On World Systems(WOW): Some systems use conventional


computer to display the visual world.

 Video Mapping: The user watches a monitor that shows his body’s interaction with the
world.

 Telepresence: Variation on visualizing complete computer generated worlds.


this technology links remote sensors in the real world with the senses of human
operator.

 Immersive Systems: They completely immerse the user personal viewpoint insider the

 virtual world, often equipped with head mounted display.

61
Marking scheme
Test paper 6

Question 1 SPREADSHEET MKS Question 2 DATABASE MK


S

a) Document typing and saving 16 a) Creating database named SEASONS 2

b) (i) Creation of Table: EMPLOYEES 4

b) (i)Title centre across columns 2 (ii) Primary key: EmployeeNo. 3

(ii) correct formatting 2 c) (i) Form: EMPLOYEESFORM 4

(iii) correct cells wrapped heading 2 (ii) Records entry to the Form 6

(iv) Unit price prefix with Ksh 4 d) Table modification with two fields 2
added

c) (i) Subtotal rounded with two D. 2 e) (i) Table: HOUSES with correct fields 2
places

(ii) Correct calculation on Tax 2 (ii) Primary key: HouseID 2


payable

(iii) Net Amount 2 f) Relationship enforces referential 4

62
Integrity

d) Sorting in Ascending order 2 g) (i) Query: EMPLOYEESQUERY 4


with grade H & R with Salaries

e) Correct Subtotal and Grand total for 6 (ii) Sort Records: 3


three types of electronic goods EMPLOYEESQUERY in
alphabetical of Grade

h) (i) Columnar Report Portrait: 4


EMPLOYEESREPORT

(ii) Correct Function: for salaries 3


grand total in the Report

f) Well labeled bar graph 6 (iii) Correct Header: EMPLOYEES 2


IN GRADE H AND R in the
Report

i) Print: Tables: EMPLOYEE, HOUSES 2

g) Worksheet printout, showing all 4 Form: EMPLOYEESFORM 1


formulae and functions used
Query: EMPLOYEESQUERY 1

Report: EMPLOYEESREPORT 1

Total marks 50 Total marks 50

63
Test paper 7

SECTION A: (40 MARKS)

Answer ALL the questions in this section in the space provided.

1. (a) A computer laboratory should be constantly kept dust and smoke free.

Specify two effects that dust would have on the operation of computers. (2 marks)

(b) Why should you first switch on the UPS before switching on the system unit and the
monitor? (1 mark)

2. Explain the meaning of backup. (2 marks)

3. State the following types of transcription errors. (2 marks)

(a) 3455 instead of 3456……………………………………………………………………..

64
(b) Smith instead of simth.
…………………………………………………………………...

4. (a) State three ways used to represent a negative number. (3 marks)

(b) Perform the following binary arithmetic giving the answer in decimal notation.

1110.0111 + 1101001.011 (2 marks)

5. Distinguish between data privacy and data integrity as used in computing. (2 marks)

6. Differentiate between a primary key and a foreign key while designing a database. (2 marks)

7. Distinguish between ‘count’ and ‘countif’ functions as used in spreadsheets. (2 marks)

8. Match the following statements with repeater, router or a bridge. (2 marks)

STATEMENT DEVICE

(a) Operates at data link layer

(b) Determine the best path for data to follow

(c) Regenerates signals

(d) Forwards everything which it doesn’t


recognize

9. Explain the impact of Information Technology on organization in each of the following

areas. (2 marks)

(a) Competition.

65
(b) Pace of growth.

10. List two roles performed by system analyst. (2 marks)

11. Explain the following internet related terms. (4 marks)

(a) Sign IN.…………………………………………………………………………………..

(b) Search engine.……………………………………………………………………………

(c) Surf.………………………………………………………………………………………

(d) Sign up……………………………………………………………………………………

12. In Kenya Tea Packers Company, several people are employed as record clerks, typists and
messenger. The company intends to introduce a computerized system in all the departments.
Suggest three reasons that would make workers unhappy with the new system. (3 marks)

13. State two magnetic Storage devices. (2 marks)

14. State three functions of Central Processing Unit. (3 marks)

15. For each of the following file organization methods, state an appropriate storage medium:

(2 marks)

(a) Serial.……………………………………………………………………………………

66
(b) Random.…………………………………………………………………………………

SECTION B: (60 MARKS)

Answer question 16 (compulsory) and any other THREE questions from this section.

16. (a) Study the flowchart below and answer the questions that follows.

Start

Enter: N, M

 = M: Y = N
N, M

P = y - : Q =  - y

P=y No Yes P=x


P > Q?
Q=x Q=y

PRINT: P, Q, , y

67
Stop
(i) State the name of the control structure shown in the flowchart. (1 mark)

(ii) Assuming the user keys in 8 and 14 when prompted to enter the values for m
and N respectively, determine the printed values of P, Q,  and y. (4 marks)

(iii) Write the pseudocode that would be used in place of the flowchart. (5 marks)

(b) What is the difference between looping and selection. (2 marks)

(c) Name the stage of program development cycle when: (3 marks)

(i) A user guide would be written.

A programmer dry-runs the code.

(ii) System charts would be drawn.

17. (a) What is Virtual reality? (1 mark)

(b) Explain the following interactive sensory equipment used in virtual reality.(2 marks)

(i) Head gear.

(ii) Body suit.

68
(c) (i) What is Artificial Intelligence? (1 mark)

(ii) State and explain three components of an experts system. (6 marks)

(d) Most computerized security systems make use of Biometric analysis, name three
physical features of human beings that can be considered in this analysis.

18. (a) Explain two coding schemes used in data representation techniques.(4 marks)

(b) Using one’s and two’s complement work out 14 – 9.


(i) One’s complement. (2 marks)

(ii) Two’s complement. (2 marks)

(c) Work out the hexadecimal equivalent of 1011111000112 (2 marks)

(d) Identify the following types of ports. (5 marks)

A………………………………………………………………………………………….

69
B………………………………………………………………………………………….

C………………………………………………………………………………………….

D………………………………………………………………………………………….

F…………………………………………………………………………………………..

19. (a) Explain two functions of an operating system. (4 marks)

Explain the following terms as used in disk management using operating system:

(i) Disk defragmentation. (2 marks)

…………………………………………………………………………………….

(ii) Disk clean up. (2 marks)

(b) What will happen if you attempt to delete a folder while a file contained in it is Open?
(1 mark)
A B
X

(d) State two properties that an operating system displays about a file. (2 marks)

(e) Give four advantages of storing files in folders. (4 marks)

C D
20. (a) The diagram below shows four common network topologies A, B, C and D.

70
Server Terminal Printer
(i) Name the network topologies labeled A, B, C and D. (4 marks)

(ii) Explain what happens if server X in topology A fails. (1 mark)

(iii) List two problems associated with network topology B. (2 marks)

(iv) List two disadvantage associated with network topology labeled D.(2 marks)

71
(b) Differentiate between Internet and World Wide Web. (2 marks)

(c) Describe the following network services and identify their applications. (4 marks)

(i) Voice mail.

(ii) Video conferencing.

Test paper 8

Question 1

Munjiru is a secretary for the Entrepreneurs Club. She has been told to use a Database

Management System (DBM) to help the club maintain records on the club’s members.

Perform the following operations just like Munjiru would.

(a) (i) Create a database table (or file) that has the following fields of data for each member

last name, first name, membership number, date of registration, membership fee paid,

age, telephone number and a memo field status. (4 marks)

(ii) Make the membership number record identifier (the primary key) (2 marks)

72
(iii) Index on membership number. (1 mark)

(iv) Save table as ClubI. (1 mark

(b) Input the following data to the above table: (10 marks)

Last First Membershi Date of Membershi Ag Telephon Status


name p p e e
name registratio
number n fee paid number

Munjiru Margare Yec/002 11.08.93 5000.00 45 573223 Fully paid


t
Founder

Member

Salim Said Yec/101 15.07.98 5000.00 50 568880 Fully paid

Ordinary

Member

Kamau John Yec/007 01.01.94 2000.00 65 443311 Senior


citizen

Member with
concessionar
y rates

Onyang Victor Yec/031 10.02.96 4000.00 37 747419 Ordinary


o
Member to
pay

1500.00

Ali Majid Yec/055 19.10.96 3500.00 32 720122 Ordinary

Member to
pay

1500.00

73
Katiku Peter Yec/067 15.05.97 0.00 25 71710 Ordinary

Member

Defaulter

Korir Kelvin Yec/098 05.03.98 5000.00 38 767822 Ordinary

Member,
fully

paid

Wafula Joyce Yec/023 23.04.95 5000.00 43 500655 Ordinary

Member,
fully paid

Kikoto Mary Yec/048 09.06.96 2000.00 28 543421 Temporary

Member for
6

Month only

Vijhu Machu Yec/074 29.11.97 1000.00 55 811015 Honorary

Member

(c) (i) Insert the field called “more than 4000” that will accommodate Y for

Yes and N for No. (3 marks)

(ii) Indicate in these new fields those members who have paid more than
sh.4000.00 with Y otherwise N. (3 marks)

(iii) Save table as Club2. (1 mark)

74
(d) (i) Create a query that contains the field Membership Number, Last Name,

Date of registration, Membership fee paid and status for all members who

have paid less than sh.4000.00 and registered after 15/4/1995 or are above

35 years of age. (9 marks)

(ii) Write on the paper provided the query expression you used. (2 marks)

(iii) Save the query as ClubQ. (1 mark)

(e) (i) Excluding the status field, create a report for all members and

give it the title: ENTEREPRENEURS CLUB. (12 marks)

(ii) Save the report as ClubR. (1 mark)

2. The following is a worksheet extracted from business partner’s vendors. They have

come together to do a business of selling computer accessories.

PARTNER’S VENDORS

Names Cost Sales Gross profit Expenditure Reserves Net profit Remarks

Samson Too 700 350 450

Victor Onyango 400 700 50

James Ahenda 200 950 250

Peter Kimaiyo 300 650 300

Alice Visaho 100 300 100

Salome Nyarago 400 550 50

Joseph Opiyo 650 600 40

Sonia Wambui 555 885 55

75
Mary Wayudo 250 850 70

Leah Wanjera 500 360 54

Joy Maelo 700 350 45

Mohammed Dida 900 1000 180

Kevin Momanyi 850 950 25

Michael Karanja 110 700 50

Hilda Njeri 350 800 150

Additional information

(i) Reserves is 10% of Gross Profit.


(ii) Net profit = Gross profit – (Expenditure + Reserves)
(a) Create a workbook and enter the details as above. Save as Vendor. (20 marks)

(b) Keep the title of the workbook to be PARTNER’S VENDORS and


format it to be bold, font size 14 and align at 45°. (3 marks)

(c) Format the figures in sale column to 2 decimal places. (2 marks)

(d) Use appropriate formulae/function to calculate:

(i) Gross profit for each member. (3 marks)

(ii) Reserves for each member. (3 marks)

(iii) Net profit for each member. (3 marks)

(e) Use “IF function” and net profit to analyse the vendors, taking the
following remarks: (6 marks)

(i) If net profit > = 500, then “V.good vendor”


(ii) If net profit >400, then “Good vendor”.
(iii) If net profit < = 300, then “Dormant vendor”.

(f) Use names of the vendor and cost to insert line graph, keep the title
of the graph to be PRODUCTIVE ANALYSIS, format it and place

76
it in a separate sheet. (5 marks)

(g) Print the “PARTNER’S VENDOR” and “PRODUCTIVE ANALYSIS”


chart. (4 marks)

Test paper 7
SECTION A: (40 MARKS)

Question 1

(a) Effects that dust would have on the operation of computers

• Dust may cause malfunction of read/write heads of the drive


• Dust May cause failure of a fan that cools the processor

(b) Why should you first switch on the UPS before switching on the system unit

and the monitor?

• Because the computer get power from the UPS


77
Question 2

 Meaning of backup.
 Making of copies of data, programs incase the originals are corrupted or lost
 It is used to protect data from accidental erasure or hardware problems.
Question 3

Types of transcription errors

(a) 3455 instead of 3456

 Misreading errors
(b) Smith instead of simth

 Transposition
Question 4

(a) Three ways used to represent negative number


 Ones complement
 Twos complement

(b) Perform the following binary arithmetic giving the answer in decimal notation

1110.0111

1101001.0110 +

110111.1101

119.8125 or 11913/16

Question 5 Difference between data privacy and data integrity as used in


computing

 Data privacy -keep data secretly so that unauthorized people don't access it
 Data integrity- correctness, completeness and accuracy of data
Question 6 Difference between a primary key and a a foreign key while designing a database

 Primary key-unique field that identifies a record in a database


 Foreign key-a primary key in another table once the tables are linked

Question 7 Difference between 'count' and 'count if functions as used in spreadsheets

 Count- counts cells that contain values in a range of cells


 Count if- counts cells that meet a given criteria in a range of cells.

78
Question 8

Match the following statements with repeater, rooter or a bridge

STATEMENT DEVICE
(a). Operates at data link layer Bridge
(b). Determine the best path for data to follow Router
(c). Regenerates signals Repeater
(d). Forwards every thing which it doesn't recognize Bridge

Question 9

The impact of information Technology on organization in each of the following areas

(b) Competition
 Ability to advertise on the internet
 Improve quality of goods
 Reduced operational cost

(c) Pace Growth


 Reduced cost
 Reduced need for man power
 Reduced space requirement
 Greater output

Question 10

Roles performed by system analyst

 Analyses and assesses suitability of a system for computerization


 Programmers builds on the analyst results to create a new computer based system
 Trains staff on the new system
 He collects facts from the users
 Works hand in hand with programmers to create a new computer based program

Question 11

Explain the following internet related terms (4


marks)

(a) Sign IN - Enter user name and password to authenticate the access to e-mail account

(b) Search engine -Site used for searching material from the internet

(c) Surf - Browsing or accessing internet resources.

(d) Sign up - Registering to have an account for e-mail or other communication media
79
Question 12

Suggest three reasons that would make workers unhappy with the new system. (3
marks)

 Job replacement
 Retraining on use of computers
 Side effect of using computer
 Loss of status Quo

Question 13

Magnetic Storage devices (2


marks)

 Hard disk
 Floppy disk
 Jaz disk
 Zip disk
 Magnetic tape

Question 14

Functions of Central Processing Unit (3


marks)

 Control the use of the main memory in storing data & information
 Processing and manipulation of data into useful information
 Manages execution of instructions
 Give commands to all parts of the computer
 Control the sequence of operations within the computer

Question 15

State an appropriate storage medium: (2


marks)

(a) Serial

 You can store text files in hard disk, diskettes, or CD


(b) Random

 Binary files can be stored in hard disk or CD

Computer Paper 1 2

80
SECTION B: (60 MARKS)

Answer Question 16 and any other three questions from this section.

Question 16

(a) (i) Selection control structure

(ii) The printed values are

P=8, Q=14, x-8 and y=14

The pseudo code is as follows

BEGIN

Print "enter the value of M and N”;

Read M,N

Set  = M;

Set y = N;

P = y - ;

Q =  - y;

IF P >Q THEN;

Set P = ;

Set Q = y;

ELSE

Set P = y;

Set Q = ;

ENDIF

PRINT P, Q, , y;

END

(b) Looping executes the same block of code (module) again and again until a
certain condition is fulfilled, while selection execution of a statement(I)

81
depends on a condition that returns true or false ( yes / No) (Well explained
2mks)

(c) (i) Documentation

(ii) Testing and Debugging

(iii) Program Design (1 for each correct answer


given)

Question 17

(a) What is Virtual reality? (1 mark)

Is where a person gets psychologically immersed in an artificial environment generated

by a computer system.

(b) Explain the following interactive sensory equipment used in virtual reality: (2
marks)

(i) Head gear.

 Channels images and sounds from the source to the eyes and ears of the wearer
hence producing a 3-D effect in the virtual world.

(ii) Body suit

 Made of conductor wires that sense body movement and relay data into the virtual
reality system.

(c) (i) What is Artificial Intelligence? (1 mark)

 Making computers perform tasks that could otherwise require intelligence if performed
by human beings.

(ii) State and explain three components of an experts system. (6 marks)

 Knowledge base - stores knowledge in form of roles as facts concerning a certain


subject interest.

 Interference engine - software which controls how knowledge is searched and accessed
82
from the knowledge base.

 User interference - enables the user to interact with the system.

Computer Paper 1 3

(d) Physical features of human beings that can be considered in Bio metric analysis. (3
marks)

 Eyes pattern
 Finger prints
 Voice

Question 18

(a) Explain two coding schemes. (4 marks)

 ASCII - 7 bit character coding scheme


 BDC - 4 bits representation of numeric values only.
 EBCDIC - 8 bits character coding scheme

(b) Using one's and two's complement work out 14-9

(i) One's complement (2 marks)

14 – 9

14  00001110

9  00001001  one complement = 11110110

00001110

+ 11110110

(1) 00000100

+ 1

0000010 1

(ii) Two's complement (2 marks)

14 – 9

14  00001110

9  0000100 1  one’s complement = 11110110


83
+ 1

11110111

+ 00001110

(1) 11110111

00000101

(c) Work out the hexadecimal equivalent of 1011111000112

Divide in to 4 bits

1011/1110/0011

Work out the hexadecimal of each group

1011-ll thus B

1110 = 14 thus E

0011-3

Join the representation BE3 16

(d) A-ps/2 mouse port


B - LAN Port

C - Parallel port

D - Serial port

E - VGA port

Question 19

a) State and explain four functions of an operating system


Schedules task in processor

Controls use of computer resources

Coordinates between input/ output devices

Sequences jobs for the processor

Deals with errors during program execution

84
Manages secondary and primary memories

b) Explain the following terms as used in disk management using operating


system:
(i) Disk defragmentation. (2 marks)

 Process of putting together scattered files to fasten access speed


(ii) Disk clean up (2 marks)

 Process of deleting and removing files on the hard disk that may no longer be
needed
e.g. files on cache, internet files, instoration files

c) What will happen if you attempt to delete a folder while a file contained in it is Open?
(1 mark)

 The process will be aborted and error message displayed to alert to first
close the open file in that folder before attempting to delete.

d) Properties that an operating system displays about a file. (2


marks)
 File name
 Date created/ modified
 Size of file on disk
 File location

e) Advantages of storing files in folders. (4


marks)
 Files are orderly arranged
 Some files can be stored in different folder
 Accidental deletion is avoided
 Same files are easily stored in same folder.
 Enables quick access of files.

Question 20

The diagram below shows four common network topologies A, B, C

85
(i) Name the network topologies labeled A, B, C and (4 marks)

A. Tree/Hierarchy
B. Ring
C. Bus/Multi drop
D. Star

(ii) Explain what happens if server X in topology A fails. (1 mark)

The terminal connected to X will be affected/stop communicating with the rest

of the network

(iii) List two problems associated with network topology B. (2 marks)

- Difficult to trouble shoot"- Failure of one terminal results in network


breakdown

- Extra cost of extra NIC card.

(iv) List two disadvantages associated with network topology D. (2


marks)

- Failure of central device/server results in total collapse of network

- Extra cost of cabling as each terminal must be cabled separately to the hub.

86
b) Differentiate between Internet and World Wide Web. (2 marks)

The Internet is a massive network of networks, a networking infrastructure. It connects

millions of computers together globally, forming a network in which any computer can

communicate with any other computer as long as they are both connected to the Internet.

Information that travels over the Internet does so via a variety of languages known as
protocols.

The World Wide Web, or simply Web, is a way of accessing information over the
medium

of the Internet It is an information-sharing model that is built on top of the Internet. The
Web

uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit
data.

Web services, which use HTTP to allow applications to communicate in order to exchange

business logic, use the Web to share information. The Web also utilizes browsers, such as

Internet Explorer or Netscape, to access Web documents called Web pages that are linked

to each other via hyperlinks. Web documents also contain graphics, sounds, text and

video.

c) Describe the following network services and identify their applications

i. Voice mail (2 Marks)


Voice Mail (or voice matt, voice mail VMS, sometimes called message bank) is

a centralized system of managing telephone messages for a large group of people.

In its simplest form it mimics the functions of an answering machine, uses a standard

telephone handset for the user interface, and uses a centralized, computerized system

rather than equipment at the individual telephone.

Voicemail systems are much more sophisticated than answering machines in that

they can:

- Answer many phones at the same time


- Store incoming voice messages in personalized mailboxes associated
with the
user's phone number
87
- Enable users to forward received messages to another voice mailbox
- send messages to one or more other user voice mailboxes
- Add a voice introduction to a forwarded message
-Store voice messages for future delivery
- Make calls to a telephone or paging service to notify the user a message has
arrived
in his/her mailbox

- Transfer callers to another phone number for personal assistance


- Play different message greetings to different callers.

ii. Video conferencing. (2 marks)


A videoconference (also known as a video teleconference) is a set of interactive
telecommunication technologies which allow two or more locations to interact via

two-way video and audio transmissions simultaneously. It has also been called

visual collaboration and is a type of groupware.

Marking Schemee

Test paper 8
88
1. (a) (i) Creating table and entering the data (4 marks)

(ii) Setting a primary Key (2 marks)

(iii) Setting index (2 marks)

(iv) Saving table (1 mark)

(b) Input the following data (10 marks)

(c) (i) Insert field for yes and No (2 marks)


(ii) Indication of those who have paid more than 4000 (2 marks)
(iii) Saving table with Appropriate name (1 mark)

(d) (i) Creating a querry (9 marks)

(ii) Writing the querry expression (2 marks)

(iii) Saving querry with the appropriate name. (1 mark)

e. (i) Creating the report and giving the right title. (12 marks)

(ii) Saving report with the appropriate name.


(I mark)

2. Excel

(a) Create a workbook and saving as Vendor (20


marks)

(b) Show workbook title as PARTNER'S VENDORS. To be bold, font size


14 and align at 45° (3 marks)

(c) Sales figures in 2 decimal places. (2 marks)

(d) Formulae/function to calculate:

(i) Gross profit for each member (3 marks)


89
(ii) Reserves for each member (3 marks)

(iii) Net profit for each member (3 marks)

(e) IF function to displaying remarks

(i) If net profit >=500, then "V. good vendor" (2 marks)

(ii) If net profit >400, then "Good vendor" (2 marks)

(iii) If net profit <-300, then "Dormant vendor" (2 marks)

(f) Generating line graph with vendor name and cost and title as
PRODUCTIVE ANALYSIS as in the separate sheet. (6 marks)

(g) Printing "PARTNER'S VENDOR" and "PRODUCTIVE ANALYSIS"


chart (4 marks)

90
JOIN VENDORS

Names Cost Sales Gross profit Expenditure Reserves Net Remarks


profit
Benson 700 350.00 -350.00 450 -35 -765.00 Dorman vendor
Kirui
Momanyi 400 700.00 300.00 50 30 220.00 Good vendor
John
Ndege 200 950.00 750.00 250 75 425.00 V good vendor
James
Bethwel 300 650.00 350.00 300 35 15.00 Dorman vendor
Tembur
Amos 100 300.00 200.00 100 20 80.00 Dorrnan vendor
Kimeu
Korir 400 550.00 150.00 50 15 85.00 Dorman vendor
Josphat
Dans on 650 600.00 -50.00 40 -5 -85.00 Dorman vendor
Omweri
Nyagwara 555 885.00 330.00 55 33 242.00 Good vendor
Charles
Kones 250 850.00 600.00 70 60 470.00 V good vendor
Kelvin
Lenny 500 360.00 -140.00 54 -14 -180.00 Dorman vendor
Kariuki
Alfred 700 -350.00 -350.00 45 -35 -360.00 Dorman vendor
Mobisa
Omar 900 1000.00 100.00 180 10 -90.00 Dorman vendor
Hassan
Ocholla 850 950.00 100.00 25 10 65.00 Dorman vendor
Fred
Viction 110 700.00 590.00 50 59 481.00 V good vendor
Areba
Jack 350 800.00 450.00 150 45 255.00 Good vendor
Kemei

91
Test paper 9
SECTION A (40 marks)

Answer all questions in this section in the spaces provided.

1.(a) Headache, back and neck pain may result from use of computers. Explain two ways in which
back and neck pain can be minimized. (2mks)

(b) State how computer have been made more users friendly for persons that are:

(i) Blind…………………………………………………… ……………… (1/2mk)


(ii) Without hands………………………………………………………… (1/2mk)
2. The diagram below represents the essential features of a computer system. Study the diagram and
answer the questions that follow:

(a) (i) Name and describe the following components (4mks)


A…………………………………………………………………………………………………………

B…………………………………………………………………………………………………………

C…………………………………………………………………………………………………………

92
D…………………………………………………………………………………………………………

(ii) On the diagram above, indicate the direction of data flow using arrows (1mks)

3. KASSU High School intends to purchase new computer to be used by students in the e-learning
room for accessing digital learning resources and personal research. Advise the school on two
computer hardware system specification features to consider as a measure of enhancing performance
of the computers. (2mk) 4. Describe the
following terms as used in Microsoft Word. (1mks)

(a) Text wrapping


b) Column breaks (1mks)

5.(a) What are the following errors as displayed in a spreadsheet cell

(i) #### (1mk)


(ii) ##NUM! (1mk)
(b) State the importance of the following terminologies as used in database.

(i) Enforcing Referential integrity ( 1 marks)

(ii) Validation rule ( 1 marks)

7. Differentiate between Margins and column guides as used in DTP (2 mks)

8(a) A systems analyst is responsible for the introduction of a new computerized system after the
software has been written and tested, and its hardware purchased. Describe any ONE method of
introducing this new computerized system. (2mks)
(b) File conversion, in system development, refers to modifying or changing the format of files when
a new system is introduced e.g. from manual to computerized. State any THREE factors considered
before the file conversion process. (3mks)

93
9. The cartoon below suggests that computers will replace people. Give any THREE reasons why this
may happen. (3mks)

The office
It was more
party isn’t Yeah….I
what it used fun a lot with
think you’re
to be, Owino people, right?
right, Joe

10. A video rental shop uses a computerized system to record which videos have been loaned out.
When a video is loaned out, the customers’ data is recorded on computer file. Describe TWO
computer processing files that will be needed to store permanent customer records and temporary
records that keep on changing. (4mks)

11. Define overflow error with respect to computation of data (1mk)


12. Mention one ICT job that a college graduate can get in the video rental shop with regard to
records management. (1mk)
13.(a) Define an ‘electronic office’ (1mk)
14. Give any THREE common office tasks that ICT could help in doing them. (3mks)
15. State any TWO advantages of using computers in computer aided design (CAD) (2mks)

94
SECTION B (60 marks)

Answer question 16 and any other THREE questions from this section in the spaces provided.

16. a) State the THREE basic types of program control structures. (3 marks)
b) Draw a flowchart which will simulate the processing of Student's report. The simulation should
be such that the user repeatedly inputs marks per subject for eight subjects using a looping control
structure. The computer processes the total marks and mean score of the student.

Note. 1. It is assumed that the student does eight subjects.

2. The outputs required are; Average score and Total marks. (7 marks)

c) Construct a pseudo code for the above flowchart. (5 marks)

17. A) (i) What is a Blog in relation to internet services (2marks)


(ii) Explain the impact of the internet in the information security (2marks)

(b) Kunta would like to send photos to Kinte via e-mail. Outline the steps Kunta would follow to
send the photos as file attachments (3marks)

(c) Differentiate between the following in relation to data security and control (4 marks)

(i) Password and biometric authentication.

(ii) Privacy and Confidentiality.

(d) Computer crimes include Trespass, Hacking, Piracy and Sabotage. Highlight each of them.
(4 marks)

18. ( a)(i) What is the hexadecimal equivalent of 6768 (2 Marks)

(ii) Use one’s compliment to solve the following sum: - 12+25 (2 Marks)

(iii) Convert 34.17510 to its binary equivalent. (2 Marks)

(b) Using six bits find the two’s complement representation of -2710 (5 marks)
(c) Find the difference in the following binary numbers; (4 marks)
(i) 111011-10001

(ii) 100011.101-1001.10

95
19. (a) (i) Define Data Communication. (2 marks)
(ii) In relation to data communication, distinguish between DTE and DCE with an example of
each

(3marks)

(b) Communication media can be classified into guided media or Unguided media. List any TWO
examples in each case (2 marks)

(c) Using an illustration, explain how fibre optic cable transmits data. (4 marks)

(d) (i) List any TWO hardware devices that make up a bus network. (2 marks)

(ii) State TWO disadvantages of bus networks. (2 marks)

20. (a) (i) State any THREE factors you would consider before installing an operating system.
apart from cost. (3 marks)
(ii) Distinguish between software installation and software configuration in relation to
operating system (2 marks)

(b) Abraham would like to distinguish between System Tray and Task Manager.

(i) Where are these TWO found? (1 mark)

(ii) How are they different? (2 marks)

(c) In relation to operating system, differentiate between;

(i) Kernel and Shell. (2 marks)

(ii) Process and Page. (2 marks)

(d) Mobile Operating System (OS) is software that allows Smart phones, Tablet PCs and other
devices to run applications and programs. List any THREE examples of Mobile Operating Systems

96
Test paper 10
1. The data in the tables below was extracted from KASSU football league management system.
Table 1: TEAMS TABLE

SchoolCode School Name Address Tel No RegFee


01 KASSU High Box 0012 024542148 50000
02 Sunshine Box 2454 025485267 35000
School
03 Kabarak High Box 458 025478756 47000
04 Sacho High Box 635 032547855 24000
05 Nairobi High Box 2446 032458754 12000
06 Nakuru High Box 6589 015487564 14000
07 Baringo High Box 1254 031204543 50000

Table 2: FIXTURES TABLE

TeamID TeamName
01 KASSU High
02 Sunshine School
03 Kabarak High
04 Sacho High
05 Nairobi High
06 Nakuru High
07 Baringo High

Table 3: RESULTS TABLE

TeamID TeamName Goals For Goals


Against
01 KASSU High 6 6
02 Sunshine 5 2
School
03 Kabarak High 5 4
04 Sacho High 2 5
05 Nairobi High 4 3
06 Nakuru High 1 1
07 Baringo High 0 6

(a) (i) Create a database named “KASSU” to store data above


(14 Marks)

97
(ii) Create relationships between the tables
(4½Marks)
(iii) Use form to enter data into the tables
(10½Marks)
(b) (i) Create a query to display the fixtures for the league (3
Marks)
(c) Create a query and use it to generate a report for a league which displays Games played,
Won, Drawn, Lost, Goals For, Goals Against, Goals difference and Points taking note that
a win earns a team 3 points, draw 1 point and a loss 0 points
(15 Marks)
(d) Print the:
(i) Three tables
(ii) Output for query results on Fixtures
(iii) The league report (3Marks)

2. The KASSU bank of Kenya (KBK) exchange rates on a certain day for foreign currencies
against the Kenya shillings (Kshs) were as follows

Currency KBK Mean Rate (Kshs)


1 US Dollar 67.0222
1 sterling pound 137.7984
1 Euro 96.6552
1 S.A Rand 10.3100
1 Sweddish Kroner 10.4509
John, Gilbert, Geofrey, Weldon and Bernard trade in buying and selling of foreign
currencies. On that day they bought the following foreign currencies from KBK.

Name U.S Dollars Sterling Euros S.A Rands Swedish


Pounds Kroner
John 400 200 340 1200 290
Gilbert 500 400 400 2000 3000
Geofrey 200 600 300 4000 5000
Weldon 600 200 200 1000 3000
Bernard 400 200 600 2000 1000

They then sold their foreigner currencies at the following rates

Name U.S Dollars Sterling Euros S.A Rands Swedish


Pounds Kroner
John 70.5 139.0 96.7910 10.4213 10.6725
Gilbert 69.0 138.5 96.79 10.5712 10.2676
Geofrey 70.0 141.5 96.76 10.3974 10.7432
Weldon 69.55 139.0 96.80 10.6371 10.5942
Bernard 69.5 138.5 96.40 10.7218 10.6155

98
(a) Using a spreadsheet package, represent the above information in one worksheet and saveit as
KASSU
(13mks)
(b) Using formulae with absolute and relative cell references, determine the total profit made
by each trader.
(14mks)

(c) Round off the profit for each trader to zero decimal places
(2mks)

(d) Generate a form and use it to add details for Wesley with the following details
Name U.S Dollars Sterling Euros S.A Rands Swedish
Pounds Kroner
Wesley 69.8 140.5 96.75 10.4563 10.4689

(13mks)

(e) Use a function to determine the trader who got the highest profit (3mks)

(f) Format the first table as follows:


• Set the direction of the labels to 45degrees (2mks)
• Centre vertically all the records (1mk)

(g) Print the worksheet, the form (Print screen of it) and the graph (2mks)

99
Marking scheme

Test paper 9
1.(a)Headache, back and neck pain may result from use of computers. Explain two ways in which
back and neck pain can be minimized. (2mks)

 Use of standard furniture


Sit to have upright backrest.

 Furniture should be high enough to enable eyes of the user to be level with the top of
screen
(b) State how computer have been made more users friendly for persons that are:

(iii) Blind - Use of braille keyboard (1/2mk)


(iv)Without hands - use of microphone/speech recognition devices (1/2mk)
2.The diagram below represents the essential features of a computer system. Study the diagram and
answer the questions that follow:

(b) (i) Name the components (2mks)

100
A- Input device – used to enter data into the computer
B- Control unit- Manages and coordinates activities of the computer system.
C- ALU - Perform arithmetic and logical operations on data during data processing
D –Primary memory/main memory –
 Store data and instructions that are directly accessible and required for data
processing.
 Store intermediate results during data processing
3. KASSU High School intends to purchase new computer to be used by students in the e-learning
room for accessing digital learning resources and personal research. Advise the school on two
computer hardware system specification features to consider as a measure of enhancing performance
of the computers. (2mk)

 Consider hard disk capacity


 Consider RAM capacity
 Consider processor/computer speed
4. Describe the following terms as used in Microsoft Word.
(b) Text wrapping
(1mks)
Text wrap is a feature that enables a text wrap to surround a picture or diagram with text.

(c) Column breaks (1mks)


Feature which is used to force the insertion pointer to move a new column in a page automatically.

5. (a)Explain the following errors as displayed in a spreadsheet cell

(i) #### (1mk)

Column is not wide enough to accommodate the value or a negative date/time is used.

(ii) ##NUM! (1mk)

Use of invalid numeric values.

(d) ( 3 marks)
(i) Enforcing Referential integrity
To ensure that all records entered in the related table exist in the primary table.

(ii) Validation rule


Restricts the values to be entered in a field

7.Differentiate between the following Margins and column guides as used in DTP (2mks)

101
Margins marks text areas on the page along the edges

Column guides divide the pages into several fields, used to define the printable areas

8.(a)A systems analyst is responsible for the introduction of a new computerized system after the
software has been written and tested, and its hardware purchased. Describe ONE method of
introducing this new computerized system.
(2mks)
(i) Parallel – A system of change-over where the old system is run parallel with the new
for a set period of time.
(ii) Phased – this involves changing from the old system in stages rather than all at once
based on location of firm, subsystem or subfile.
(iii) Straight – This the complete replacement of the old by the new system at one go.

(b) File conversion, in system development, refers to modifying or changing the format of files when
a new system is introduced e.g. from manual to computerized. State THREE factors
considered before the file conversion process.
(3mks)
(i) Whether the new system requires a new operating system and/or hardware.
(ii) Whether you need to create new database files for the new system e.g. manual to
electronic files.
(iii) Whether you need to install new application software.
9.The cartoon suggests that computers will replace people. Give THREE reasons why this may
happen.

(3mks)

(i) Computers tend to be fast in doing jobs


(ii) Computers are better in repetitive routines/jobs e.g. mass production
(iii) Computers are accurate.
(iv) Computers are better in complex calculations
(v) Computers are very reliable.
(vi) Computer systems can perform boring e.g. monitoring control systems, highly
sensitive or dangerous jobs.
(vii) Computer systems can store large amounts of data without forgetting.
(viii) Computers reduce waste and cut costs.

10. A video rental shop uses a computerized system to record which videos have been loaned out.
When a video is loaned out, the customers’ data is recorded on computer file. Describe TWO
computer processing files that will be needed to store permanent customer records and
temporary records that keep on changing.
(4mks)
102
 Master files - Contains all the permanent data/records you keep about something
e.g. videos, which transactions are processed.
 Transaction files – Contains data about what has happened. These are files that
contain input and output data for holding temporary incoming or outgoing data.
Used to update dynamic data on master files.
11. Define overflow error with respect to computation of data (1mk)
This error type will usually happen on older machines whose memory capacity is over shadowed
by the capacity of the result of calculations.

12. Mention one ICT job that a college graduate can get in the video rental shop with regard to
records management. (1mk)
 Database administrator
 Data control clerk

13.(a) Define an ‘electronic office’ (1mk)


Also known as automated office. A term used to describe the application of ICT (computers and
communications equipment) to improve the work efficiency of a typical office. This work
involves information processing – collection, processing, storing and presentation of information.
14.Give any THREE common office tasks that ICT could help in doing them. (3mks)
(i) Making travel reservations for the boss.
(ii) Preparation and sending of memos to office personnel.
(iii) Sending mails to regional customers.
(iv)Update personnel records.
(v) Analyze monthly sales.
15.State any TWO advantages of using computers in computer aided design (CAD)
(2mks)
(i) Easy to store and retrieve drawings.
(ii) Easy to make changes
(iii) Easy to test since most packages come with features for testing designs.
(iv)Saves on costs since models can be used to draw construction schedules.
(v) Stored design can be sued to produce control instructions for machines which will
make the product.
(vi)Quick production of drawings and plans.

SECTION B (60 marks)

Answer question 16 and any other THREE questions from this section in the spaces provided.

21. a) State the three basic types of program control structures. (3 marks)

- Sequence.
- Selection.
- Iteration (looping)

103
b) Draw a flowchart which will simulate the processing of Student's report. The simulation should
be such that the user repeatedly inputs marks per subject for eight subjects using a looping control
structure. The computer processes the total marks and mean score of the student.

Note. 1. It is assumed that the student does eight subjects.

3. The outputs required are; Average score and Total marks. (7 marks)

START

READ Student’s Name

COUNT=1

TotalMark=0

READ Mark

TotalMark=TotalMark+Mark

Is
NO COUNT=COUNT+1
COUNT=
8?

YES
AverageMark=TotalMark/COUNT

PRINT AverageMark

PRINT TotalMark

STOP

104
c) Construct a pseudo code for the above flowchart. (5 marks)

BEGIN

READ Student’s Name

FOR COUNT= 1 TO 8 DO

READ Mark

TotalMark=TotalMark+Mark

END FOR or NEXT COUNT

AverageMark=TotalMark/COUNT

PRINT Name

PRINT AverageMark

PRINT TotalMark

ONE CAN ALSO USE REPEAT….UNTIL or WHILE…DO LOOPS

22. A) (i) What is a Blog in relation to internet services (2marks)


It is an internet site where a person can regularly post personal information, music, movies and
diaries and socially interact with people connected to the same.

(ii) Explain the impact of the internet in the information security (2marks)

-Private and confidential information is constantly at risk from hackers, crackers and fraudsters who
carryout their trade on the internet.

(b) Kunta would like to send photos to Kinte via e-mail. Outline the steps Kunta would follow to
send the photos as file attachments (3marks)

-Launch the e-mail program such as gmail, yahoomail, etc

-Click New or Compose to create a new e-mail.

-Click the file attachment button.

-Locate the photos to attach and click attach.

105
-Click the send button.

Any other appropriate procedure is allowed.

(c) Differentiate between the following in relation to data security and control (4 marks)

(i) Password and biometric authentication.

-Password is an encoded string of characters that enables a person to be positively identified before
being given access while,

-Biometric authentication relies on a unique aspect of human features like finger prints, iris or
arrangement of facial features. It is one of the most secure authentication mechanisms because no two
people can have the same features.

(ii) Privacy and Confidentiality.

-Privacy refers to an individual’s right to control access to data or information belonging to himself
or herself.

-Confidentiality refers to the means of protecting private or corporate data or information from
unauthorized access or disclosure.

(d) Computer crimes include Trespass, Hacking, Piracy and Sabotage. Highlight each of them.

(4 marks)

-Trespass means the unauthorized physical access to ICT assets or also accessing information
digitally without permission.

-Hacking is the forceful access to information held in computers by breaking access control codes like
passwords.

-Piracy is a form of intellectual property theft which means illegal copying of software, information or
data.

106
-Sabotage is the illegal destruction of data and information with the aim of crippling service delivery
or causing great loss to an organization.

23. ( a)(i) What is the hexadecimal equivalent of 6768 (2 Marks)

6 -110

7 -111

6 -110

1 1011 1110 = 1 B E 16

(ii) Use one’s compliment to solve the following sum: - 12+25 (2 Marks)

12= 1100 25= 11001 show your workings

=00001100 = 00011001 in 8bits

1’s complement=11110011 11110011

+ 00011001

(1)00001100

+ 1

000001101 = 13

(iii) Convert 34.17510 to its binary equivalent. (2 Marks)

34=100010

0.175x2=0.350 0.350x2=0.70 0.70x2=1.4 0.4x2=0.8 0.8x2=1.6 0.6x2=1.2

Therefore 34.175= 100010.001011

(b) Using six bits find the two’s complement representation of -2710 (5 marks)

27=11011 6 bits= 011011

2’s complement= 1’s complement 100100 +1=100101

107
(c) Find the difference in the following binary numbers; (4 marks)

(i) 111011-10001

(ii) 100011.101-1001.10

24. (a) (i) Define Data Communication. (2 marks)


-Is the process of transmitting encoded data from one point to another point in a computer network. In
most cases, the data is encoded using analog or digital means of transmission or storage.

(ii) In relation to data communication, distinguish between DTE and DCE with an example of each

(3marks)

-Data Terminal Equipment (DTE) is a device that can send/receive data e.g a printer or
microcomputer while

-Data Communication Equipment –Data Circuit/Terminal Equipment (DTE) is a device that facilitates
serial data communication e.g Modem.

ADDITIONAL INFO
Data terminal equipment is an end instrument that converts user information into signals or reconverts
received signals. These can also be called tail circuits. A DTE device communicates with the data
circuit-terminating equipment. The DTE/DCE classification was introduced by IBM.

Data Terminal Equipment (DTE) is any equipment that is either a source or destination for digital
data. DTE do not generally communicate with each other to do so they need to use DCE to carry out
the communication. DTE does not need to know how data is sent or received; the communications
details are left to the DCE. A typical example of DTE is a computer.

Other common DTE examples include:

 Printers  Dumb Terminals


 File and application servers
 Routers
 PCs

Data Communications Equipment (DCE) can be classified as equipment that transmits or receives
analogue or digital signals through a network. DCE works at the physical layer of the OSI model
taking data generated by Data Terminal Equipment (DTE) and converting it into a signal that can then
be transmitted over a communications link. A common DCE example is a modem which works as a
translator of digital and analogue signals.

108
DCE may also be responsible for providing timing over a serial link. In a complex network which uses
directly connected routers to provide serial links, one serial interface of each connection must be
configured with a clock rate to provide synchronisation.

Other common DCE examples include:

 ISDN adapters  Microwave stations


 Satellites (including base stations)
 NIC (network interface cards)

DCE is sometimes said to stand for Data Circuit-terminating Equipment.

(b) Communication media can be classified into guided media or Unguided media. List any TWO
examples in each case (2 marks)

-Two wire open lines cable -Radio waves

-Twisted pair cables -Microwaves

-Coaxial Cables -Infrared

-Fibre Optic Cables

(c) Using an illustration, explain how fibre optic cable transmits data. (4 marks)

-Light pulses carrying data are projected into the cable at the source in such a manner that the angle
of incidence is greater than the critical angle of the core. The light in the core tries to penetrate total
cladding. Since the cladding is of higher refractive index, total internal reflection occurs. The light is
kept within the core, bouncing off the boundary of the core and cladding until it reaches the
destination as shown.

(d) (i) List any TWO hardware devices that make up a bus network. (2 marks)

-The bus (backbone)

-Terminator
109
-Terminals (nodes)

(ii) State TWO disadvantages of bus networks. (2 marks)

-If a cable breaks in any one section of the bus it will bring down the entire network.

-The more the number of computers connected to the bus, the higher the chances of collision hence,
the more the delays in data transmission.

▸ The cable length is limited. This limits the number of network nodes that can be connected.
▸ This network topology can perform well only for a limited number of nodes. When the number of
devices connected to the bus increases, the efficiency decreases.
▸ It is suitable for networks with low traffic. High traffic increases load on the bus, and the network
efficiency drops.
▸ It is heavily dependent on the central bus. A fault in the bus leads to network failure.
▸ It is not easy to isolate faults in the network nodes.
▸ Each device on the network "sees" all the data being transmitted, thus posing a security risk.

25. (a) (i) State any THREE factors you would consider before installing an operating system.
(3 marks)

-The CPU specifications

-The Computers main memory

-The Hard disk space

-Application software compatibility

-Features of the OS version to be installed

(ii) Distinguish between software installation and software configuration in relation to


operating system (2 marks)

-Installation is the process of copying program files into a computer so that they can be executed,
while

-Configuration refers to the process of fine tuning or defining options provided by the installed
software.

110
(b) Abraham would like to distinguish between System Tray and Task Manager.

(i) Where are these TWO found? (1 mark)

-They are found in/on the TASKBAR

(ii) How are they different? (2 marks)

-System tray is a section of the taskbar located at the right most part and shows icons of tasks running
in the background but are not displayed on the screen. While,

-Task manager is the empty strip on the taskbar where the buttons of currently running tasks are
displayed.

(c) In relation to operating system, differentiate between;

(i) Kernel and Shell. (2 marks)

-Kernel is the core of an operating system responsible for the management of hardware and software
and OS resources. While,

-Shell is the interface provided for the user to interact with the operating system.

(ii) Process and Page. (2 marks)

-A PROCESS refers to an instance of a computer program that is being executed. While,

-A PAGE is a fraction of process. One process may have one or several pages.

(d) Mobile Operating System (OS) is software that allows Smart phones, Tablet PCs and other
devices to run applications and programs. List any THREE examples of Mobile Operating Systems

(3 marks)

Examples of mobile device operating systems include;

111
Apple iOS,
- Google Android,
- Research in Motion’s BlackBerry OS,
- BlackBerry's Playbook OS
- Nokia’s Symbian,
- Nokia's Maemo OS,
- Nokia's MeeGo OS, LiMo OS, Tizen,
- Hewlett-Packard’s webOS (formerly Palm OS)
- Microsoft’s Windows Phone OS,
- Microsoft’s Windows 8,
- Palm's webOS,
- Samsung's Bada OS,
- The Jolla's Sailfish OS
- Mozilla's Firefox OS.
Marking scheme
Test paper 10

Q SECTION ACTIVITY MARKS


1 a) (i) Creating a database name “KASSU” 1
(i) Table 1
-Creating and naming tables 1 Mark each (Check 3
correct naming in capital letters)
-Creating and naming fields
8 Fields each ½ Mark 4
-Correct Data types
SchoolCode, SchoolName, Address, TelNo: Text 2
RegFee: Currency 1
Table2
TeamID, TeamName: Text 1
Table3
TeamID: Text 1
GoalsFor& Goals Against: Number 1
(ii) PK – SchoolCode, TeamID and TeamIDeach ½ 1½
Mark 3
Correct 3 Relationships each 1 Mark
(iii) Creating data entry forms 3 @1Mark 3
Data Entry 15 @½ Mark 7½
B Query displaying Fixtures 3
Use of correct Fields 2
C Correct Query Formulae for Played, Won, Drawn, 12
Lost, Goal Difference and Points @2Marks 1
Naming of Queries 1 Mark
D (i) Printing tables 1
(ii) Printing Fixtures Results 1
(ii) Printing the League Report 1

2 A) a) Name saved as KASSU 1


Borders available for all entries 3
Data entered correctly with correct decimal places 9
and formatting of the tables
b) Check correct Absolute formulas and relative cell
references for each person
5 Relative cell References @ 1 Mark 5
At Least five Absolute cell Referencing @1Mark 5
3 Correct output @1 Mark 3
Correct Formatting 1 Mark 1

c) Decimal Places @2Marks 2


d) Check if form appears on the title bar and check
details if available @10Marks 10
Correctly entered details @3Marks 3
e) Correct Function Maximum @3Marks 3
Check to ensure maximum is available
f) Set Orientation 45 Degrees for all labels @2Marks 2
All records centered and Vertical Records @1Mark 1
Printing of Worksheet and the graph @1 Mark 2
For Form just check the availability on the title bar
Test paper 11
SECTION A: (40 MARKS)

Answer ALL the questions in this section in the space provided.

1. (a) Distinguish between Optical scanners and Magnetic ink scanners. (2mks)

(b) Differentiate between hardware and software portability. (2mks)

2. (a) Explain the difference between digital signal and analog signal in data communication. (2mks)

(b) Give two ways in which computers are used in communication industry. (2mks)

3. (a) Name two special purpose memories found either inside or outside the microprocessor. (2mks)

(b) Distinguish between an accumulator and an address register. (2mks)

4. Differentiate between formatting and editing as used in word processing. (2mks)

5. (a) Distinguish between a paste board and a printable page. (2mks)

(b) Differentiate between a margin guide and a column guide as used in D.T.P. (2mks)

6. (a) Define the term normalization as used in a database design. (1mk)

(b) Explain two objective of normalization. (2mks)

7. Describe two methods used to secure data in a database. (2mks)

8. Explain the meaning of the following terms as used with DTP. (4mks)

(i) Crop.______________________________________________________________________
Embedded object.______________________________________________________________

(iii) Master page.__________________________________________________________________

(iv) Tool box.____________________________________________________________________

9. Make a clear difference between a Website and Web portals. (2mks)

10. State two advantages of using wireless transmission media to connect to the internet. (2mks)

11. (a) What is a protocol? (1mk)

(b) Write the following in full:


TCP/IP, HTML, HTTP and FTP. (2mks)

12. Make a clear difference between Log file and Firewall. (2mks)

13. Explain the meaning of the terms below as used in data security and controls. (3mks)

(i) Information security.___________________________________________________________

(ii) Fraud._______________________________________________________________________

(iii) Eavesdropping.________________________________________________________________

14. Make a clear difference between the following information gathering methods. (2mks)

(a) Observation.__________________________________________________________________

(b) Questionnaire.________________________________________________________________

15. Explain the importance of control structure in program development. (1mk)


SECTION B (60 MARKS)

Answer question 16(compulsory) and any other THREE questions from this section.

16. Mwangi deposits 8500 shillings in a microfinance company at an interest rate of 15% per annum. At
the end of each year, the interest earned is added to the deposit and the new amount becomes

the deposit of that year.

(a) Write an algorithm for a program that would track the growth of the deposits over a period

of five years. (6mks)

(b) Draw a flowchart for above algorithms. (7mks)

(c) List four Selection Controls used in writing a program. (2mks)

17. (a) Define the term network topology and explain the two types of topology. (5mks)

(b) Define the following terms as used with network. (4mks)

(i) Routers _______________________________________________________________

(ii) Repeaters ______________________________________________________________

(c) Name the parts labeled A, B, C and D in the diagram below. (2mks)
B __________________________________________________________________________

C___________________________________________________________________________

D __________________________________________________________________________

(d) Explain the meaning of the following terms as used in signal transmission. (2mks)

(i) Attenuation ____________________________________________________________

(ii) Noise _________________________________________________________________

(e) State two advantages of using fiber optic cables. (2mks)

18. (a) (i) Define the term spreadsheet. (1mk)

(ii) Give two examples of spreadsheet packages available in the market today. (2mks)
(iii) Explain the following terms as used in spreadsheet.
What IF analysis. (2mks)

Cell. (1mk)

Formula. (1mk)

Pie-chart. (1mk)

Distinguish between the following sets of terms used in spreadsheet.

(i) Worksheet and workbook. (2mks)

(ii) Filtering and sorting. (2mks)

(b) State one way in which a user may reverse the last action taken in a spreadsheet package.
(1mk)

(d) Distinguish between a Formula and a function as used in spreadsheet. (2mks)

19. (a) Describe each of the following data processing methods and give an example of where used.

(6mks)

(i) Online processing _______________________________________________________

(ii) Batch processing ________________________________________________________

(iii) Real-time. _____________________________________________________________

(b) Make a clear difference between: (6mks)

(i) Logical file and physical file _______________________________________________


(ii) Master file and back-p file. ________________________________________________

(iii) Random and indexed sequential file organization methods. ______________________

(c) An organization is facing threats to data integrity. Explain three of how the threats can be
minimized. (3mks)

20. (a) Give two reasons why data and information in a computer system needs to be converted to

other number systems other than binary. (2mks)

(b) Explain two reasons for use of binary in digital technology. (2mks)

(c) Using ones complement, subtract 17 from 28. (5mks)

(d) Using BCD coding system convert 796 to binary. (5mks)

(e) Differentiate Database administrator and web administrator. (2mks)

(f) (i) Define the term accreditation as used in education. (2mks)

(ii) Explain two factors you would consider before enrolling for an ICT course in a

college. (2mks)
Test paper 12
1. (a) Using a Word Processing package, type the congratulatory note below as it
appears and save it as CONGRATS in a disk provided.
(15mks)
Kenya Pipeline Co. Ltd
P.O. Box 5678
Nanyuki
(Insert today’s date)

<<First Name>> <<Last Name>>


<<Address>>
Dear<<First Name>>

RE: CONGRATULATIONS (Georgia Font type Bold)


Due to your hard work and sacrifices you made this year, the Kenya Pipeline
Fraternity wishes to congratulate you for being voted the best <<Top Title>>
of the year. Please keep up the spirit. Enclosed is a cheque worth <<Amount>>
as appreciation for four excellent service.

Yours faithfully,

Daniel Mahinda
PERSONNEL

(b) Create a data source with the following details and use it with the note you have
just typed to generate personal notes to the company’s named personnel.
Save it as Details in your disk. (15mks)

George Nyaundi Carlos Odongo Henry Matara


P. O. BOX 5678 P. O. BOX 5678 P. O. BOX 5678
Nanyuki Nanyuki Nanyuki
Driver Health Officer Gateman
Ksh.2500

Monica Akinyi Benta Moraa Beth Wangoi


P.O. BOX 5678 P. O. BOX 5678 P. O. BOX 5678
Nanyuki Nanyuki Nanyuki
Typist Secretary Accountant
Ksh.2000 Shs.3000 Shs.4500

(c) Insert data fields in main document and generate the notes for the employees.(14mks)

(d) Print the notes. (6mks)

(e) Generate envelope labels for these notes with the fields of names and address. (9mks)
(f) Print the labels. (6mks)

2. A firm keeps its details in a computer database. The information below contains details obtained from
two tables of the database. Study the tables and answer the questions that follow.

Employees table

EmployeeID EmployeeName Department Job Title Salary


7369 Mark Koech Research Clerk 48000
7499 Philip Meme Sales Salesman 16000
7521 Mohamed Ali Sales Salesman 12500
7566 Kennedy Simiyu Research Manager 39750
7698 David Kamau Operations Manager 38500
7782 Titus Ole Simian Accounting Manager 34500
7788 John Onyango Operations Analyst 30000
7821 Patel Shah Operations Analyst 25000

Department Table

DeptCode Department Location


10 Accounting Nairobi
20 Research Nakuru
30 Sales & Marketing Mombasa
40 Operations Kisumu

Required:
(a) Create a database that can be used to store the above data and save it as
MACAL in the disk provided. (10mks)

(b) Using appropriate primary and foreign keys create a relationship between
the two tables. Enforce referential integrity between the tables. (4mks)

(c) Validate the primary key entry to exactly four and two characters for the
EmployeeID and DeptCode fields respectively. (4mks)

(d) Create a form for each table and use it to enter the records shown in the
tables above. Save the forms as EmployForm and DepartForm
respectively. (6mks)

(e) It is required that the dates on which the employees were hired be included
in the database. Koech was hired on 10/06/1998. Meme on 15/08/1996.
Mohamed on 16/03/1996, Onyango on 09/03/2003, the rest were hired on
13/03/2004. Insert a new field, name it Date of Hire in the Employees
table and enter the field. (5mks)

(f) Create a query that displays employees who were employed after year
2000, save the query as LatestEmployees. (4mks)

(g) Create, a, Report that displays the Employee Name, Job title Department
name and Salary, grouped according to location.
Save the report as EmployeeReport. (4mks)

(h) (a) Create a query to display the employees and their job description.
Save it as EMPTYPE. (4mks)

(b) Create a pie chart based on the query in h(a) above to display the
proportions of employees in various job descriptions.
Save the report as CHART. (4mks)

(i) Print:
(i) Employees and Department table designs.
(ii) Employee and Department forms.
(iii) LatestEmployees Query.
(iv) EmployeesReport.
(v) The Chart
Marking scheme
Test paper 11

1. (a) Distinguish between Optical scanners and Magnetic ink scanners. (2mks)

- Optical scanners capture data using optical or light technology, while

magnetic ink scanner is used to capture data written using magnetic ink

or coded onto a magnetic strip.

(b) Differentiate between hardware and software portability. (2mks)

Hardware portability refers to the ability of the computer to be carried from

one place to another with ease. Software portability refers to the ability to

install a programme in two or more computers.

2. (a) Explain the difference between digital signal and analog signal in data communication. (2mks)

Analog signal is made up of continuous varying waveform while digital signal is made

up of non continuous discrete waveform.

(b) Give two ways in which computers are used in communication industry. (2mks)

- Message transmission and reception is very fast and efficient.

- Telephone exchange relies of on computers to switch incoming outgoing mails.

- Railway corporations rely on computers to coordinate movements of their wagons

and goods.

- Airtime industry, computers are heavily used in air traffic control and surveillance

of air space using radar equipment as well as for reservation purpose.

3. (a) Name two special purpose memories found either inside or outside the microprocessor. (2mks)

- Cache memory – speeds up processing (fetch cycle).

- Buffer – Act as interface between very fast processor and slow input and output devices.

- Registers – temporarily holds data instructions just before and after processing.

(b) Distinguish between an accumulator and an address register. (2mks)


- An accumulator is a register that holds the results of the last processing step of the

ALU temporarily while address register temporarily holds next piece of data waiting

to be processed.

4. Differentiate between formatting and editing as used in word processing. (2mks)

- Formatting refers to applying various styles or features to enhance the documents appearance.

Such features include as bold, color, underline, changing fonts (type, style) to improve text

appearance.

- Editing refers to making necessary changes to an existing document either manually or through

the use of the inbuilt tools.

5. (a) Distinguish between a pasteboard and a printable page. (2mks)

- Pasteboard is a large area where you place text and graphical objects before

arranging them on the printable area.

- Printable area is the area surrounded by the margins on the pasteboard.

(b) Differentiate between a margin guide and a column guide as used in D.T.P. (2mks)

- Margin guide determines the printable area.

While the column guide helps to divide a page into columns that make the

publication look presentable.

6. (a) Define the term normalization as used in a database design. (1mk)

The process of trying to eliminate storage of duplication values in a database.

(b) Explain two objective of normalization. (2mks)

- To relate different tables in a database.

- To ease the retrieval of data from a relational database.

- Breaking up multi theme tables into smaller workable tables.


7. Describe two methods used to secure data in a database. (2mks)

- Password protection.

- User and group permissions.

- User – level security.

- Data encryption.

8. Explain the meaning of the following terms as used with DTP. (4mks)

(i) Crop – Trim import graphics.

(ii) Embedded object – A separate file not created in the program in use but in another

program and placed in the program in use.

(iii) Master page - A page used to design a general layout that needs to be applied in all
the other pages.

(iv) Tool box – A set of buttons that contain various tools used to create and manipulate
publication.

9. Make a clear difference between a Website and Web portals. (2mks)

Website – A group of related web pages or other resources located on a web server.

Web portals – Web site that brings information together from diverse source in a uniform way.

It offers specialized services such as searching, e-mail, sports.

10. State two advantages of using wireless transmission media to connect to the internet. (2mks)

- Allows mobility.

- Ease of set up.

- Not quite expensive to set up.

- Do not take any physical space.

11. (a) What is a protocol? (1mk)

Special communication rules that govern sending and receiving of messages by


computers on a network.

(c) Write the following in full: (2mks)


TCP/IP – Transmission Control Protocol/Internet Protocol

HTML – Hypertext Mark Up language.

HTTP – Hypertext Transmission Protocol

F.T.P - File Transfer Protocol.

12. Make a clear difference between Log file and Firewall. (2mks)

Log file – Special system files that keep a record of events on use of the computer

and resources of information system.

Firewall – Device or software system that files the data and information exchanged

between different networks by enforcing the host network access.

13. Explain the meaning of the terms below as used in data security and controls. (3mks)

(i) Information security – Ensuring of safety of data and information against threats.

(iv) Fraud – Stealing by false pretence.


(v) Eavesdropping – Tapping into communication channels to get information.

14. Make a clear difference between the following information gathering methods. (2mks)

(a) Observation – Requires the observer to participate or watch closely as a person

perform activities in order to learn about the system.

(c) Questionnaire - Special purpose document that allows a person to collect information
and opinions from the people who receive and respond to it.

15. Explain the importance of control structure in program development. (1mk)

They determine how statements are to be executed.

SECTION B (60 MARKS)

16. Mwangi deposits 8500 shillings in a microfinance company at an interest rate of 15% per annum. At
the end of each year, the interest earned is added to the deposit and the new amount becomes

the deposit of that year.

(a) Write an algorithm for a program that would track the growth of the deposits over a period
of five years. (6mks)

Start

Input initial deposit

Input interest rate

Set deposit to initial deposit

Set year to 0

While year  5Do

Interest = Deposit x Interest rate

Total = Deposit + interest

Deposit = Total

Year = Year + 1
Start
END WHILE

Print, deposit, year


Input Deposit
STOP

(b) Draw a flowchart for above


Input interest ratealgorithms. (7mks)

Principal = initial
deposit year = 0

Is year 

Interest = deposit X
interest rate

Total = deposit + interest

Deposit = total

Year = year + 1

Print deposit

Print year

Stop
(c) List four Selection Controls used in writing a program. (2mks)

IF …… THEN

IF …. THEN….ELSE

Nested IF

Case

17. (a) Define the term network topology and explain the two types of topology. (5mks)

Network topology specifically refers to he physical arrangement of the network,

specially the location of the computers, other devices and how the cables are run

between the.

(i) Logical/Signal topology.

Deals with the way data passes from one device to the next on the network.

Examples of logical topologies are Ethernet and token ring.

(ii) Physical topology.

Refers to the physical layout arrangement of components on the network.

The most common physical topologies are the bus, the star, the ring and the mesh.

(b) Define the following terms as used with network. (4mks)

(iii) Routers
Routers are used to connect separate networks. It makes the use of an internet

protocol and assumes that all the attached devices on the network use the same
communication architecture and protocol.

(iv) Repeaters
It receives a signal from one segment of the network, cleans it to remove any

distortion, boots it and then sends it to another segment. A repeater installed on

a link receive the signal before it becomes too week or corrupted, regenerates the original
bit pattern, and puts the refreshed signals back onto the link.

(c) Name the parts labeled A, B, C and D in the diagram below. (2mks)
A –Transmitter earth station

B - Uplink

C – Satellite in space

D - Downlink

E – Receiving earth station

(d) Explain the meaning of the following terms as used in signal transmission. (2mks)

(iv) Attenuation
It’s the loss of signal strength during transmission i.e. when an electromagnetic

signal is transmitted along any medium, it gradually become weaker at greater distances;
this is referred to as attenuation. To solve this problem amplifier is

used. The amplifier boosts the signals and extends the transmission distance.

(v) Noise
Random electrical signals that can be picked up by the transmission medium

and result in degradation of the data.

(e) State two advantages of using fiber optic cables. (2mks)

(i) Noise resistance: It is immune to EMI.

(ii) Less signal attenuation: signal can run for miles without requiring regeneration.

(vi) Higher bandwidth: fibre optic cable can support dramatically higher bandwidths
(and hence data rate) than all other cables.

(vii) Smaller and lighter than copper cable hence space limited situations.
(viii) Can be used in hazardous (highly flammable) places because they do not
generate electrical signals.

18. (a) (i) Define the term spreadsheet. (1mk)

Spreadsheet is a collection of sheets made up of rows and columns on which

numerical data is entered and manipulated.

(ii) Give two examples of spreadsheet packages available in the market today. (2mks)

- MS excel.
- Corel Quattro Pro.
- Lotus 1-2-3
- Open office calc.

(iii) Explain the following terms as used in spreadsheet.

What IF analysis. (2mks)

This involves changing the value of one of the arguments in a formula to see

the difference the change would make on the result of the calculation.

Cell. (1mk)

Intersection between a row and a column.

Formula. (1mk)

User defined expression that creates a relationship between cells to return

a new value.

Pie-chart. (1mk)

Graphical/representation/displays the contribution of each value to a grand total.

(c) Distinguish between the following sets of terms used in spreadsheet.


(i) Worksheet and workbook. (2mks)

Worksheet is a collection of rows and columns where data is entered.

Workbook is a collection of worksheets.

(ii) Filtering and sorting. (2mks)

Filtering is selecting data in a worksheet based on a criteria.

Sorting is arranging data in a certain order.

(d) State one way in which a user may reverse the last action taken in a spreadsheet package.
- Undo command

- Control + Z 1mk)

(d) Distinguish between a Formula and a function as used in spreadsheet. (2mks)


A formula is a sequence of values, cell references, names or operators in a cell

that to together produce a new value while a function is an inbuilt formula for

solving standard problems.

19. (a) Describe each of the following data processing methods and give an example of

where used. (6mks)

(iv) Online processing – Data is processed immediately it is received e.g.


internet banking, online payment system using credit card.

(v) Batch processing – Data is accumulated as a group


(vi) Real-time – Computer processes the incoming data as soon as it occurs,
up to dates the transactions file and gives an immediate response, that

would affect the events as they happen e.g. making reservations for

airlines seats, hotels etc.

(b) Make a clear difference between: (6mks)

(i) Logical file and physical file – Viewed in terms of what data items it contain

and details of what processing operations may be performed on the data items. Physical
files is one that is viewed in terms of how data is stored on a storage

media and hoe the processing operations are made possible.

(v) Master file and back-p file – Master file is the main file that contains relatively
permanent records about particular items or entries. Back-up file is used to
hold copies of data or information from the fixed storage (hard disk)

(iii) Random and indexed sequential file organization methods.

Random – Also direct file organization records are stored randomly but accessed directly
on a storage medium. Indexed sequential records are stored and accessed

in a particular order using an index used to enable the computer to locate

individual records on storage media.


(c) An organization is facing threats to data integrity. Explain three of how the threats can

be minimized. (3mks)

- Backup data preferably on external storage media.

- Control access to data by enforcing security measures.

- Design user interface that minimize unauthorized access.

- Using error detection and correction software when transmitting data.

- Use devices that directly capture data from the source such as bar code readers.

- Digital cameras, optical CR.

20. (a) Give two reasons why data and information in a computer system needs to be converted

to other number systems other than binary. (2mks)

- Higher number systems are used in computing to reduce the streams of binary into

manageable form.

- Help to improve the processing speed.

- Optimize memory usage.

(b) Explain two reasons for use of binary in digital technology. (2mks)

- It is easier to develop devices that understand binary language.

- Device a designed using binary logic are simple more reliable and consume the energy.

(c) Using ones complement subtract 17 from 28 decimal notation. (5mks)

2 28 Rem 2 17 Rem

2 14 0 2 8 1

7 0 2 4 0
2 3 1 2 2 0

2 1 1 2 1 0

2 0 1 0 1

2810 = 111002 1710 = 100012

2810 – 1710 = 11100

 01110 +

Overflow 1

10112

(d) Using BCD coding system convert 796 to binary. (5mks)

2 7 Rem 2 9 Rem 2 6 Rem

2 3 1 2 4 1 2 3 0

2 1 1 2 2 0 2 1 1

0 1 2 1 0 0 1

0 1

79610 = 011110010112

(e) Differentiate Database administrator and web administrator. (2mks)

Responsible for updating records in an international system and ensure data is organized

in a way for easy access retrieval and update.

(f) (i) Define the term accreditation as used in education. (2mks)

The process of recognizing an institution as being able to offer degrees and diplomas.
(ii) Explain two factors you would consider before enrolling for an ICT course in a

college. (2mks)

- Cost.
- Job opportunities.
- Where the examinations offered are recognized.
- The organization offering the course.
Marking scheme
Test paper 12
1. (a) Correct creation of a database. (10mks)

(b) (i) Using appropriate foreign primary key. (2mks)

(ii) Using appropriate foreign key. (2mks)

(c) Proper validation. (4mks)

(d) Each form with proper data entry. (4mks)

(e) Proper date entry. (5mks)

(f) Query well created. (4mks)

(g) Proper report with all details. (4mks)

(h) (a) Correct query. (4mks)

(b) Appropriate pie chart report. (5mks)

(i) Each correct print out 1 mark each.

2. (a) Entering the data as it is and using it as a main document. (10mks)

(b) Data source


Field name Marks

First name 2

Last name 2

Address 2

Job title 2

Amount 2

Saved data source 5

15mks

(c) Field insertion (2mks each, 14mks in total)

(d) For correctly printed notes (½mk each, 3mks in total)


(e) Data source for envelopes
Field name Marks

First name 1

Last name 1

Address 2

Saved data source 1

5mks

(f) Printed labels. (½mk each, 3mks in total)

You might also like