Computer
Computer
studies
Quick revision for KCSE 2015
Model Test Papers
(Papers 1 and 2)
All
With elaborate
Marking scheme
compiled by
Table of content
Content Page
1
Test Paper 1 3
Test paper 2 9
Marking Scheme TP1 11
Marking Scheme TP2 18
Test Paper 3 20
Test paper 4 24
Marking Scheme TP3 30
Marking Scheme TP4 43
Test Paper 5 44
Test paper 6 48
Marking Scheme TP5 52
Marking Scheme TP6 62
Test Paper 7 64
Test paper 8 72
Marking Scheme TP7 89
Marking Scheme TP8
Test Paper 9 92
Test paper 10 97
Marking Scheme TP9 100
Marking Scheme TP 10 113
2
Test paper 1
1. Give importance of having the following in computer laboratory;- (3marks)
i) Standard furniture in the laboratory
ii) Antiglare screen/ monitor
iii) UPS
2. Distinguish between ROM and RAM (2marks)
3. Explain the following computer crimes (2marks)
(i) Fraud.
(ii) Alteration
4. (a) Define
(i) Firewalls (1mark)
(ii) Data encryption (1mark)
5. Differentiate between the following terms as used in word processing (3marks)
(a) Drop Cap and Case
(b) Superscript and subscript
(c) Indent and tab
6. (a) State and explain any one type of computer processing file (1mark)
(b) List any two file organization methods (2marks)
3
10. Differentiate between baseband and broadband signal as used in networking (2marks)
a) Baseband signal
b) Broadband signal
11. Explain how the operating system controls the following resources (3marks)
i) Processor
ii) Main memory
iii) Input and output devices
12. What is deadlock in reference to operating systems (1mark)
13. (a) The most popular type of electronic data storage currently us magnetic disk storage such as hard disk
or Winchester disk. Give reasons as to why they are popular. (2marks)
(b) Outline two advantages of hard disk over floppy disk. (2marks)
(e) A car rental firm leases its cars for Kshs. 2500.00 per day. The manager gives a discount based on the
number of days that the car is rented. If the rental period is greater than or equals to 7 days then a 25%
discount is given. Write a peudocode to accept a car number and the rental period, and calculate the total
amount earned by the company when a car is leased. (7marks)
4
17. (a) Subtract 01112 from 10012 (2marks)
(b) Using two’s compliment, subtract 7 from 4 and give the answer in binary notation. (4marks)
(c) Convert
i) 91C16 to octal (3marks)
ii) 3778 to hexadecimal (3marks)
iii) 9.62510 to binary (3marks)
18. A school computer laboratory is scheduled to undergo major renovations. The lab is schedule to receive
new computer whose specifications are given below:-
Pentium IV 2.8GHz processor
40GB HDD
3 ½ FDD
256MB RAM
56 x CD ROM
17” SVGA TFT monitor
The computers are going to be networked and will be able to browse the internet.
a. Explain what is meant by the terms:-
(2marks)
i) FDD
ii) HDD
iii) SVGA
iv) TFT
a) The computer is to be networked, name one extra device that should be fitted on every computer to
enable this to happen (1mark)
b) The computer is to receive internet facilities through the server on a dial; up system. Name and describe
the function of a special device that needs to be connected to the server to complete the connection.
(1mark).
c) (i) The school has to apply star topology to link up the computer. List two advantages of this type of
topology. (1mark)
(ii) Name the central device used to connect the computers in this topology. (1mark)
d) List two other types of topologies that the school could have opted for (1mark)
e) List four advantages of using a network (2marks)
f) (i) Data transmission via the internet is done using a mode known as packet switching. Describe this
5
data transmission mode (1mark)
(ii) Name two other modes of transmission (1mark)
g) (i) The school’s LAN is done using UTR cable. List two advantages of using this type of cable.
(1mark)
(ii) List two advantages of using fibre cable in networking (1mark)
h) Data flows in the school’s LAN in a duplex manner. Discuss two other types of data transmission in
network giving examples (2marks)
19. (a) Consider the topologies demonstrated in the diagram below.
6
(i) Identify the network topologies (3marks)
A
(ii) In topology A, identify the network device that should be at the end point 1 and 2 (1mark)
(iii) Which of the above topologies is likely to be used in a wide area network?
(1mark)
(iv)Highlight three disadvantages of topology B. (3marks)
(v) Identify the device labeled X in topology A (1mark)
(b) State two main classes of network software (2marks)
(c ) Study the spreadsheet below and answer the questions that follow
A B C D
7
1 WESTERN
COMPBOOK
CENTRE SALES
2 BOOK TITLE PRICE PER BOOK BOOKS SOLD
3 DBASE IV 400.00 145
4 LOTUS FOR DUMMIES 460.00 15
5 OFFICE WORD IN 3 DAYS 300.00 65
6 LEARN C++ IN 3 DAYS 700.00 100
7 TEACH YOURSELF PASCAL 700.00 200
8 COMPUTER STUDIES 500.00 300
9 THE CLEVER FOOL 300.00 10
COMUTER
10
i) Write down the formula that can be used to find the price of the most costly book (1mark)
ii) Write down the formula that can be used to determine the total sales for the book titled COMPUTER
STUDIES (1mark)
iii) Write down the formula that can be used to determine the average price of the books. (1mark)
iv) Write down the formula in cell D6 that can be used to find the new price per book if they went up by a
percentage written in cell B 10 and the formula has to be entered only in cell D3 then be copied to others.
(1mark)
v) Write down the output in D7 if in B6 is 10% (1mark)
(d) State any four advantages of using an electronic spreadsheet as compared to a traditional worksheet.
(2mark)
8
Test paper 2
QUESTION 1
M/s Ann Momanyi, an ICT consultant with Makueni Distributors is in the process of developing a Management
Information System (MIS) for the company. Currently, she is designing sales database using three tables namely: -
customers, products and transactions. The details for each table are given below:-
Customers Products Transactions
Customer ID Product ID TransID
CustomerName ProductDescription clientName
PostalAddress Packaging TransacDate
Town UnitPrice Product
Phone Stock Quantity
Questions
a) Create a database named MIS and in it create three relations (12marks)
b) Identify the most appropriate field as the primary key in each table (3marks)
c) Establish relationships among the three tables and enforce the referential integrity (6marks)
d) Create a form for each table. Save the forms as Customer Form, Product Form and Transaction
Form. (9marks)
e) Use the respective forms to enter the following records in each table (6marks)
CUSTOMER TABLE
CustomerID Customer Name Postal Address Town Phone
H001 Andrew Mwove 209 Mutituni 200870
H002 Erick Onsongo 68 Nyamira 248567
H003 Brenda Nyabuti 100 Bomet 789678
H004 Lydiah Winzaa 250 Mwingi 778009
H005 Jeff Ogero 330 Keroka 666790
H006 Maureen Makuthu 550 Kakeani 780906
PRODUCT TABLE
ProductID Product description Packaging Unit price Stock
AA001 Cooking oil 20kg Gal 16000 80
AA003 Rice 50kg bags 4500 60
AB004 Detergents 5 litres 11000 40
AC006 Fertilizer 50kgs bags 4700 30
AA007 Mineral water 1.5litres 8200 400
TRANSACTION TABLE
CustomerID Client Name TranscDate Products Quantity
1001 Andrew Mwove 06/04/2007 Cooking oil 6
9
1002 26/4/2007 Mineral water 8
1003 Erick Onsongo 23/04/2007 Detergents 10
1004 14/4/2007 Cooking oil 12
1005 Maureen Makuthu 02/05/2007 Rice 4
1006 08/05/2007 Fertilizer 3
1007 Erick Onsongo 16/05/2007 Detergents 25
e) Create a query that displays the customer Name, Product Description, Quantity, Unit price and
calculates field total payable by each customer. Save the query as MISQuery (5marks)
f) Generate a report from MISQuery. Save the report as MISReport (4marks)
g) Print the Customers, Products, Transaction table’s design, MISQuery and MISReport (5marks)
QUESTION 2
1. (a) Create a new workbook and name it as form 2 computer exams (1mark)
Name Class Adm. No. CAT 1 CAT 2 CAT 3 Total Average Class Remark
position
Maina John E 7984 80 70 59
Ken Korir W 7896 75 55 72
Bernard K E 8092 86 59 75
John Soi E 7460 80 79 70
Kipsang Bett W 7892 76 75 80
Mitei E E 7800 38 48 25
Mark J W 8490 37 51 29
Koech Ben W 8184 30 86 75
James W E 8082 25 27 20
Abuya Ken E 8083 30 25 25
Leonard W 8047 39 24 25
10
(ii) Save the chart on a new sheet and name it graphical analysis (1mark)
(j) Print
(i) The filtered lower group (1mark)
(ii) The chart (1mark)
(iii) Term one results sheet
(1mark)
Marking scheme
Test paper 1
1. Give importance of having the following in computer laboratory. award 3marks each 1 mark
i) Standard furniture in the laboratory
To avoid poor posture during machine use this may lead to strain, injury and limb fatigue
ii) Antiglare screen/ monitor
To avoid eye strain and fatigue caused by over bright cathode ray tube monitors (CRT)
iii) UPS
Temporary power supply to the computer to allow the user to save the work (power back up)
Stabilize power (clean unstable power supplied from the main source to clean stable voltage)
2. ROM (Read Only Memory) it is used to store programmed instruction and data permanently or
semi permanently.
Data and instruction stored in Rom are those required to remain uncharged for long period of time
RAM (Random Access Memory) its content can be read directly regardless of the sequence in which
it is stored.
Its content is held temporarily and if content lost, is lost once the computer is turned off.
3. Explain the following computer crimes (2marks)
(i) Fraud – Use of computer to conceal information or cheating other people with the aim of getting
money. (1x1 = 1mk)
(ii) Alteration – Changing the data or information without permission with an aim of missing informing
others. (1x1 = 1mk)
4. (a) Define
(i) Firewalls 1mk
It is a program or hardware or a combination of both that filters the information coming through the
internet into a computer
Or
It is a program that filters the information coming through the internet into a computer
(ii) Data encryption 1mk
It is the encoding of data during storage or transmission so that it cannot be understood by those who
do not have encryption key.
The word scrambling can be used in place of encoding or
Software or device that filters data between different networks by enforcing the host network access
control policy.
5. Differentiate between the following terms as used in word processing (3marks)
Drop cap is a large character at the start of paragraph that occupies more than one line downwards
while text case is capitalization of text ( you can switch from either lower or uppercase)
A superscript appears just above the rest of the characters while subscript appears just below other
characters while subscript appears just below other characters
11
An indent is a white space at the beginning of each line while tabs are used to add uniform spacing in
the line of text
6. (a) Computer processing file
(i) Master file – Is the main file that contains permanent records of a particular entry.
(ii) Transaction – Working file whose information is expected to change regularly – i.e. daily
(iii) Reference
(vi)Back up
(v) Sort
(vi)Report ½ mk stating , ½ mk explanation
(b) List any two organization methods (2marks)
Hierarchical file organization
Horizontal
7. (a) Webpage - a page in a website (1mark)
(b) Blog – a website which enables one to post or submit his or her personal details to a website; so that
the details can be accessed from the website. (1mark)
(c) Hyperlinks – text or graphic which opens another webpage or website when clicked (1mark)
(d) Web portal - a website that function as a point of access to information on the World Wide Web
8. (a) DTP - has several design templates for various publications
- Is more powerful in manipulating graphics / texts
- Enables formatting and manipulation of individual text and frames separately
- Enable complex document format printing
(b) Differentiate between the following
(i) Kerning – fixing visual denseness of pairs of character in text
Tracking– spacing between characters in text
Margins – space around the text in the four edges of a document
Column guides – non printable guides for column layout
9. Simulation – process of creating a model of a real object, concept in order to experiment the behavior of
a real object
10. Baseband signal – Digital signal transmitted through a digital channel without modulation ( 1mk)
Broad band - A group of analog signals transmitted through a common channel but with varying signal
frequency
(1mk)
11. Explain how the operating system controls the following resources (3marks)
i) Processor – the O.S assigns tasks one by one to avoid completion
ii) Main memory – the OS determines which task should occupy the main memory at any given time
iii) Input and output devices – the OS controls data input and information output
12. What is deadlock in reference to operating systems (1mark)
Is a situation that results when several tasks complete for a resource which is held and not being released
for use by another task.
13. (a) A magnetic disk is a direct access storage media (DASD) that permits the computer to find
data directly on the disk
(b) Hard disk provides greater storage capacity than the floppy disk. (1mark)
Hard disk operates or much higher retrieval speed
14. Define the following computer crimes
a) Making illegal copies of copy righted software information or data (1mark)
b) Industrial espionage – Spying in your computer to get information that can use to counter finish a
competitor (1mark)
15. Explain two ways of protecting data and information against unauthorized access (2marks)
Password protection – A password to open or exit the database file i.e. lets any user who wishes to do
any action (2mark)
12
Data encryption – If the database is to be sent electronically encryption secures the data from un
authorized access
User and group permission to users on data base object such as queries form and reports
User level security – this feature is used to assign permission to users in order to limit user access to
certain database object
SECTION B (60MARKS)
16. (a) list two examples of
(i) Third generation languages (2marks)
Pascal
FORTRAN
BASIC
COBOL
(ii) Object oriented languages (2marks)
Simula
Small talk
Java
C++
(b) Define (2marks)
i) Object code
It is a machine code produced by a computer
It is an output of a translator
It is a translated source code
Translated program code
ii) Source code
This is a program written in the specific programming language
Un translated program code
Program in human understandable
(c) Differentiate between a compiler and an interpreter (2marks)
Compiler Interpreter
Fast in translation Relatively slow translate line by line
Translate whole program at once Translate line by line take less memory
Take up large memory space Take less memory every time program is run
hence
Saves time because Exe file is saved Every time program is run hence consume time
(a) START
PRINT ENTER CAR NUMBER
PRINT ENTER NUMBER OF DAYS
IFNUMBEROFDAYS>=7THEN
(NUMBER OF DAYS X 2500) – (NUMBER OF DAYS X 2500) 25%
ELSE
NUMBER OF DAYS X 2500
END IF
17. (a) Subtract 01112 from 10012 (2marks)
00102
(b) Using two’s compliment, subtract 7 from 4 and give the answer in binary notation. (4marks).
13
7 = 1112
4 = 1002
-4 in two’s compliment is 100
\ 111
100
+ 1011
The resulting answer is 011 since the overflow is ignored. In decimal notation that is 310
(c) Convert
i) 91C16 to octal (3marks)
9 1 C
1001 0001 1100
9.62510 = 1001.1012
18. A school computer laboratory is scheduled to undergo major renovations. The lab is schedule to receiver
new computer whose specifications are given below:-
Pentium IV 2.8GHz processor
40GB HDD
3 ½ FDD
256MB RAM
56CD Rom
17” SVGA TFT monitor
The computers are gong to be networked and will be able to browse the internet.
a) Explain what is meant by the terms:- (2marks)
i) FDD
An acronym for floppy disk drove which the computer possesses for 3 ½ size disks
ii) HDD
14
An acronym for hard disk which the computer possess and its storage size is 40GB
iii) SVGA
An acronym for thin film transistor monitor type
iv) TFT
An acronym for thin film transistor monitor type
b) The computer is to be networked, name one extra device that should be fitted on every computer to
enable this to happen (1mark)
NIC (network interface Card)
c) The computer is to receive internet facilities through the server on a dial; up system. Name and
describe the function of a special device that needs to be connected to the server to complete the
connection. (1mark).
A modem
d) (i) The school has to apply he star topology to link up the computer. List two advantages of this
type of topology. (1mark)
Easy to configure
Allows centralization of key networking resources like concentration and servers
Gives network administration focal point for network
(iii) Name the central device used to connect the computers in this topology. (1mark)
Hub
e) List two other types of topologies that the school could have opted for (1mark)
Bus topology
Ring topology
Mesh topology
Tree/ hierarchical topology
15
- Does not suffer from E.M.I
- Flexible in size.
iii) Data flows in the school’s LAN in a duplex manner. Discuss two other types of data transmission in
network giving examples (2marks)
- Hard duplex (Bi – directional)
- Data flows in both direction but only one direction at a time.
- Simplex
- Data flows in one direction on the communication media.
19. (a) Consider the topologies demonstrated in the diagram below.
(i) A-Free/ hierarchical topology
B – Ring topology
C – Mesh topology
(ii) Point 1 and 2 (1mark).
Terminator
(iii) Mesh topology
(iv)Highlight three disadvantages of topology B. (3marks)
Modifying the topology is difficulty
Trouble shooting is difficult
One device breakdown affects the whole system
(v) Identify the device labeled X in topology A (1mark)
Hub
(b) State two main classes of network software (2marks)
Network protocol
Network operating system
(c) Briefly describe the following as used in networking (4marks)
v) Repeaters - A device that receives signals from one send it to another segment. (4 marks)
vi) Network hub – a device that connects computer onto network.
vii) Fibre optic cables – transmission media that transmits data using light.
viii) Network interface card (NIC) – a device inside the system box linking them onto transmission
media.
20. (a) Define the following terms
(i) Database ( ½ mark)
It is a collection of data stored for organizational use
(ii) Database management system ( ½ mark)
A collection of programs required storing, organizing and retrieving data from a database
(iii) Hierarchical database (1mark)
A database structure where data is organized like a family tree having branches made up of parent
and child records with each parent record having several child records and never vice versa
(iv)Relational database (1mark)
A database structure in which data is organized in two dimensional tables called relations where an
element in any one table can be related to another piece of data in another table as long as they have a
common data element.
Diagram
(v) Network database (1mark)
Diagram
(b) List the advantages of using an electronic database system for storage of data over the file
approach. (4marks).
Data is input only once and is made available to the many files
Avoids duplication of files
Avoids duplication of tasks at different points hence being economical
16
Due to shared records, there is reduced processing time, reduction in use of hardware and lead to ‘Ö
More efficient use of data processing personnel ‘Ö
Leads to improved flow of data that is valuable to management as it is comprehensive (encompassing all)
‘Ö
Leads timely and accurate reporting of data to all maintenance centres ‘Ö
Reduction of paper costs ‘Ö
Saving on storage space ‘Ö
(c ) Study the spreadsheet below and answer the questions that follow
A B C D
1 WESTERN
COMPBOOK
CENTRE SALES
2 BOOK TITLE PRICE PER BOOK BOOKS SOLD
3 DBASE IV 400.00 145
4 LOTUS FOR DUMMIES 460.00 15
5 OFFICE WORD IN 3 DAYS 300.00 65
6 LEARN C++ IN 3 DAYS 700.00 100
7 TEACH YOURSELF PASCAL 700.00 200
8 COMPUTER STUDIES 500.00 300
9 THE CLEVER FOOL 300.00 10
COMUTER
10
i) Write down the formula that can be used to find the price of the most costly book (1mark)
= large ((c3:c9),1) or = max (c3..c9)
ii) Write down the formula that can be used to determine the total sales for the book titled
COMPUTER STUDIES (1mark)
=b8*c8
iii) Write down the formula that can be used to determine the average price of the books. (1mark)
=ave(B3.B9) or + (B3 + B4 ÷ B5 + B6 + B7 + B8 + B9)/7
iv) Write down the formula in cell D6 that can be used to find the new per book if they went up by a
percentage written in cell B 10 and the formula has to be entered only in cell D3 then be copied to
others. (1mark)
=b6*$B$10
v) Write down the output in D7 if in B6 is 10% (1mark)
770
(d) State any four advantages of using an electronic spreadsheet as compared to a traditional
worksheet. (2mark)
Utilizes powerful aspects of computer like speed, accuracy and efficiency to enable the user quickly
accomplish his/ her tasks
Have inbuilt formulae called functions that enable the user to quickly manipulate mathematical data
Have better document formatting capabilities
Automatically adjust the result of a formula if the values in a worksheet are changed i.e. automatic
recalculation
Enables the user to produce neat work because traditional papers, pencil, rubber and calculator are put
aside.
Utilities the large storage space on computer storage devices to save or retrieve documents.
17
Marking scheme
Test paper 2
MARKING SCHEME
QUESTION 1
The question tested the candidates’ ability to do the following in a database
a) Award full marks for a created database with three tables bearing all the fields (3 x 4 = 12mks)
b) (b) award 1mk for each identified primary key fields in each table (1 x 3 = 3mks)
c) Award 2mks for each established relationship between the three tables (2 x 3 = 6mks)
d) Award 3mks for the form of each table ( 3 x 3 = 9mks)
e) Award 2mks for correct entry in each form (2 x 3 = 6mks)
f) Award 1mk for each identified field in the query i.e. customer Name, Product Description, Quantity, Unit
Price and calculated field total payable by each customer and 1mk for saving with appropriate name (1 x
5 =5mks)
g) Award 4mks for a clearly generated report (4mks)
h) Award 1mk for each of the printed customers, products, transaction tables designs, query and the report
(1 x 5 = 5mks)
Question 2
a) Saving the workbook with correct name (1mk)
- Using a different name
- Using default name book n no mark
b) All data entered correctly (15mks)
- Every wrong entry ½ mk
- More than 6 wrong entries -8mks
c) Remaining the sheet to “term one result” 1mk
- Default name sheet, no mark
18
d) (i) Correct totals and formula 1mk
(ii)Correct average and formula 1mk
- Manual calculation no mark
e) Correct subtotal Function award 5mks
f) (i)Correct use of IF function to attain 3 conditions 5mks
(ii)Correct formula and ranking (1 x 3)3mks
(iii)Correct use of the “count IF” function (1 x 2) 2mks
g) – sorting list of class position in ascending order 2mks
- Sorting list by classes position in descending order 1mk
- No sorting, no mark
h) (i) Copying to new worksheet and renaming the new sheet 2mks
(ii)Filtering the “lower group”
- Display students from “E” class
- Students with average less than 50 4mks
- Filter shows a all students from E class
- Filter shows all student with average less than 50 2mks
i) (i) The chart is
- A bar graph
- Show 3 cats
- Shows names of students
- Title is TERM ONE COMPUTER RESULTS 3mks
- Missing a point - ½ mk
(ii)Legend placed at the bottom of chart 1mk
(iii)Saving chart on a new sheet and renaming the sheet graphical analysis (1/2 x 2) 1mk
- Saving chart as an object on the worksheet ½ mk
j) Printing
(i) The lower group from “E” class 1mk
(ii) The chart 1mk
(iii) Term one results sheet 1mk
19
Test paper 3
(b) Assume that cell F5 to F10in a spreadsheet contains numeric value of salary earned by some workers
and cell F12 contains the value of 5%. Write a formula that will be used to increase the value stored in cell
F5 by 5 percent; (3mks)
7. Identify the underlined parts of the following email address: [email protected]. (2mks)
a b c d
8. (a) Distinguish between READ and WRITE as used in storage media. (2mks)
(b) State TWO functions of Inter Record Gap (IRG) in magnetic tapes. (2mks)
20
9. Define pixels as used in monitor (2mks)
i. Good ergonomics
11. Highlight two measures that need to be put in place to avoid risks associated with electric shock
(2mks)
ii) Explain briefly how the token ring network functions (2mks)
SECTION B (60MKS).Answer question 16 and any other three questions in this section
b). A trader bought a car from a manufacturer and later sold the car to another person. Design a pseudocode
that will accept the buying price and the selling price of the car, determine whether the trader made a
profit /or loss, calculate the profit/loss and display it. (5mks)
21
b) Design a flowchart for the above case. (7mks)
17. a) Distinguish between physical and logical topology, giving an example in each case.(2mks)
b) High Height Academy wanted to network computers in their school’s computer Laboratory so that they
can share resources. The computer laboratory has 30 computers.The schools’ network administrator wanted
all computers on the network to act as servers and clients at the same time where there was no dedicated
server.The computers and other devices were each to be connected to a common switch.
i) Identify the category of local area network that was proposed by the network administrator.
(1mk)
ii) State two disadvantage associated with the proposed network category. (2mks)
iii) What category of LAN would you advice the administrator to use and why? (3mks)
iv) Identify the type of topology was to be used in the networking and state two advantages of this network
topology. (3mks)
18. a) List four ways in which data integrity can be compromised. (4mks)
b) Distinguish between Logical file structure and physical file structure. (2mks)
d) Give four general rules that must be observed to keep within the law when working with data and
information. (4mks)
22
e) Describe Computer based simulation, giving an area of application and an advantage for simulation
program. (3mks)
19. a) A teacher had a document of 20GB in a hard disk. 4He wants to transfer the document into a CD of
700MB. Determine the number of CD’s he requires. (3mks)
(b) Using twos complements compute the following using 8 bits binary (4mks)
2010 – 2510
c)Subtract the following binary numbers using the One’s Compliment method. (3mks)
(11101)2 – (1010)2
23
Test paper 4
1. a) Using a word processor type the passage below as it appears and save it as Society (40 marks)
S
ociety has failed and parents have not played their role fully in raising their children. This is
according to Jeff Ngari, a counseling psychologist and a deacon with the Reformed Catholic
Church. Jeff says the issue of teenage mothers is so big that it should be considered a cry for
help. He adds that today’s children, lack the guidance they require when it comes to having
independent social interactions.
“The idea is not to block them from And just like the rest of society, parents
forming their own relationships, but to have not been spared by the wave of moral
make them understand what it means to be decay and thus, according to Jeff, they
in a relationship, especially with the have failed as role models for their
opposite sex, and how far this relationship children. Due to this, many teenagers are
should go,” says Jeff. picking up social ills from their parents-the
very people they are supposed to look up
to.
“For instance, a teenager who has seen his or her mother repeatedly sleep out or come home in the
wee hours of the morning will most likely be excited about staying out late out of curiosity, “he says,
adding, “this is happening to most of our homes today.”
24
children, and this is
likely to be seen as a
normal thing by
children, especially
teenagers. As a result,
there are many avenues
through which
teenagers can explore
the issue of sex and the
greatest worry that girls
need to be rescued.
25
Most teenage mothers experience rejection and abuse by their families, friends and
wider community, including the church. “No wonder these girls
abandon their babies either in toilets or litter bins. The effects of
rejection can be fatal-rejection by society is the worst thing
anybody can suffer. It kills from within. That is why teenage
motherhood is a cry for help and family support is very
important, as the result is children giving birth to, and trying to
raise babies.”
In Kenya, four in every 10 women who die from unsafe abortion are adolescents; 70% of
adolescents engage in high-risk unprotected sex. This is according to a research paper
presented by Dr. Richard 0. Muga of the National Co-ordinating Agency for Population and
Development, Nairobi-Kenya, 2006.
The alarming figures are why Margaret Muyanga, a counseling psychologist, says open
communication between teenagers and parents can be very instrumental in curbing any post-
pregnancy abortion or even worse, suicidal tendencies.
d) Look for the word alarming and replace it with the word surprising (3marks)
26
e) Using the word count feature count the number of characters with spaces in the passage
25 (2 marks)
f) Insert alphabetical capital letter page numbers at the top left side of the two documents(2
marks)
g) Print the two documents Society and Society 2 (2 mark
2. Below is a cash statement for the first half of the year for WIDGET Manufacturing Co. Ltd for the year 2013.
Enter the data into a worksheet as shown. Save your work as Widget XLS
A B C D E F G H
4 ASSUMPTIONS
5 Interest rate 9%
9 CASH ON 43,000
HAND
10
11 INCOME
14 Total sales
15 Interest
income
16
17 Total income
27
18
19 EXPENSES
20 Cost of goods
sold
28
29 Total
expenses
30
31 Net income
32 Net cash on
hand
b. Calculate the total sales for the month of January and use it to calculate the total for the month of
Feb-Jun
(1ma
rk)
c. Using the assumed interest rate calculate the interest income of cash at hand given that the
formula is interest =
(Interest rate X cash on hand) /12. Project the interest for the months Feb-June
(2marks)
(2marks)
28
e. Calculate the total income and the total expenses for the months Jan-June (2marks)
f. (i) Calculate the net income given that
net income=total income-total expenses
(ii) Calculate the net cash on hand for Jan-June given that the net cash on hand=cash on hand + net
income
g. Project cash on hand for the months of Feb-June given that the cash on hand at the beginning of
the month= net cash on hand at the end of the previous month
h. Calculate the totals for each item (2marks)
i. In its own worksheet generate a line graph to compare the total income and total expenses for
Widget Manufactures (4marks)
j. Rename the work sheet as Widget 13 and chart as chart 13 (1mark)
k. Print Widget 13 and chart 13 (2marks)
29
Marking scheme
Test paper 3
SECTION A
30
20. Outline TWO purposes /uses of optical disks (2mks)
For distributing large amounts of data at low costs.
For distribution of new or upgraded versions of software products.
For archiving data that is not frequently used and is considered important.
For distribution of electronic versions of reading materials e.g. E-books, journals
conference proceedings e.t.c.
Storage of multimedia applications e.g. Video clips, sounds, music, animations e.t.c.
WORM disks are used to store proprietary information for companies.
22. Identify the underlined parts of the following email address: [email protected].
a b c d
(2mks)
Alicen – the identifiable name of the user with a mail address.
gmail – the server computer where the mailbox services are hosted stored.
Co – the type of organization which hosts the mail server.
Ke- the country where the host server is located.
23. (a) Distinguish between READ and WRITE as used in storage media. (2mks)
READ – The process where data/instructions are retrieved from a storage device.
WRITE – To transfer data/instructions on a storage media.
(b) State TWO functions of Inter Record Gap (IRG) in magnetic tapes. (2mks)
To separate records stored in the magnetic tape to avoid mix-up of data.
Allows proper timing of record access.
24. Define pixels as used in monitor (2mks)
A dot on the screen used to display information
26. Highlight two measures that need to be put in place to avoid risks associated with electric shock
(2mks)
Avoid using liquids
31
Ensure that there are no naked wires
ii) Explain briefly how the token ring network functions (2mks)
Adjacent computers are joined to each other to form a complete ring and the
communication is done through a packet called token which is held by a computer
System tray
Task manager
Pointer
Icons
menu
32
SECTION B
31
(i). It is flexible.
(ii).Structured programs are easier to read.
(iii). Programs are easy to modify because; a programmer can change the details of
a section without affecting the rest of the program.
(vii). Debugging is easier because; each module can be designed, coded & tested
independently.
b)A trader bought a car from a manufacturer and later sold the car to another person. Design a
pseudocode that will accept the buying price and the selling price of the car, determine whether the
trader made a profit
START
INPUT Bp, Sp
IF Bp<Sp THEN
Profit= Sp-Bp
PRINT Profit
Else
Loss=Bp-Sp
PRINT Loss
33
STOP
32
START
Is SP >BP ?
NO Loss= BP-SP
Profit= SP-BP
PRINT Loss
STOP 34
33
17. a) Distinguish between physical and logical topology, giving an example in each case.(2mks)
i) Physical topology refers to the physical layout of computers on a network e.g. star, ring,
bus, etc.
ii) Logical topology refers to the way data is passed from one device to the next on the
network. Examples include; Ethernet and token ring.
Laboratory so that they can share resources. The computer laboratory has 30 computers.
The schools’ network administrator wanted all computers on the network to act as servers and
clients at the same time where there was no dedicated server.The computers and other devices
were each to be connected to a common switch.
i) Identify the category of local area network that was proposed by the network administrator.
(1mk)
- Peer – to- peer network.
ii) State two disadvantage associated with the proposed network category. (2mks)
(i). It is difficult to locate information stored in the connected computers due to Shared
level security.
(ii). Difficult to update documents and files.
(iii). It is expensive to train staff on how to share resources, as each user is an administrator.
(iv). It is difficult to maintain security, as it is the user’s responsibility to ensure that only
authorized individuals can access their data.
(v). Can’t maintain a large number of computers.
iii) What category of LAN would you advice the administrator to use and give two reasons why?
(3mks)
35
-Server-based networks
(i). There is security since the Server controls the resources the clients need to access.
(ii). It can support a large number of users.
(iii). The server can be optimized to hand out information as fast as possible.
(iv). Fewer connections are required by the clients to get the resources.
(v). Easier to maintain backup for files (synchronization of files).
(vi). Cost effective as client workstations don’t need large hard disk (storage capacity).
iv) Identify the type of topology that was to be used in the networking and state two advantages
-Star topology
i) Files.
ii) Storage media e.g. hard disk.
iii) Programs.
iv) Printers.
18. a) List four ways in which data integrity can be compromised. (4mks)
36
iv. Hardware malfunctions.
v. Fraud.
vi. Malicious deletion or changing of data.
b) Distinguish between Logical file structure and physical file structure. (2mks)
Logical files.-A Logical file is a type of file viewed by the user in terms of what data items it
contains &what processing operations may be performed on the stored data items.
34
Physical files.-A Physical file is viewed in terms of how the data items found in a file are
arranged on the surface of the storage media (e.g., disk, tape), and how the stored data items can
be processed.
Refers to the science of identifying an individual through their body characteristics such as face
geometry, hand geometry, iris or rental scans or voice patterns.
d) Give four general rules that must be observed to keep within the law when working with data and
information. (4mks)
i. Data should not be disclosed to other people without the owner’s permission.
ii. Data and information should be kept secured against loss or exposure.
iii. Data and information should not be kept longer than necessary.
iv. Data and information should be accurate and up to date.
v. Data and information should be collected, used and kept for specified lawful purposes.
e) Describe Computer based simulation, giving an area of application and an advantage for
Computer based simulation refers to the science of representing the behavior of a real-life
situation by using computerized models.
Simulation programs are mostly used in educational areas where practical skills have to
be learnt like training drivers, pilots, engineers etc.
(i) Simulation software can be used to provide the learner with clear illustrations
about
19. a) A teacher had a document of 20GB in a hard disk. He wants to transfer the document into a CD
of 700MB. Determine the number of CD’s he requires. (3mks)
i) CD-R (Recordable).
A CD-R holds data permanently, i.e., once written, it cannot be erased or overwritten.
CD-R can be used to store or backup a lot of data (about 650MB), thus making it suitable
It is possible to record data on a CD-RW more than once. With CD-RW drive you can
(i). Used to store data & instructions that is not needed immediately (or not currently in use)
38
by the CPU. This helps in creating space for another data to be stored in the memory.
(ii). Used for transportation & distribution of data & software, i.e., for transferring files from
one machine to another.
(iii). Used to back up files (keep copies of data & programs) for safe-keeping.
Whatever is in memory is lost (or can be corrupted) when the computer or the power
supply
is switched off. Disks can therefore be used to store programs & data, which can be
2 24 0 0.35 x 2 = 0.70
2 6 0 √ 0.40 x 2 = 0.80
2 3 1 0.80 x 2 = 1.60
2 1 1 0.60 x 2 = 1.20
= 11002√1
= 1100.010112√1
6 A B
39
6 x 256 + 10 x 16 + 11 x 1 √1
1536 + 160 + 11
b) Using twos complements compute the following using 8 bits binary (4mks)
2010 – 2510
20 25
2 20 0 2 25 1
2 10 0 2 12 0
2 5 1 2 6 0
2 2 0 2 3 1
2 1 1 2 1 1
0 0
000101002 = 000110012
20 + (-25)
000110012
111010112
+ 1
000101002
+ 11100111
111110112
c)Subtract the following binary numbers using the One’s Compliment method. (3mks)
40
(11101)2 – (1010)2
1 1 1 0 1
+ 1 0 1 0 1
11 0 0 1 0
Overflow
Add the overflow digit to the Least Significant Digit of the sum to get the difference.
1 1 1 0 1
+1 0 1 0 1
1 0 0 1 0
1+
1 0 0 1 1 Difference
6 0 5 7
41
= (6x83) + (0x82) + (5x81) + (7x80)
Sum = 3072 + 0 + 40 + 7
= 3119
Rem
16 12 12 (C =12 in decimal)
0
311910C2F16
Marking scheme
Test paper 4
1.
42
i) Well typed and spell checked document (20 marks)
ii) Drop caps in margin paragraph 1 award 2 marks (2 marks)
iii) Two columns in paragraph 2 without a line between (2marks)
iv) Well punctuated paragraph 3 (2marks)
v) Three columns in paragraph four with line between, inserted callout
with centered text (6
marks)
vi) Inserted right clip art and tightly wrapped across the two paragraphs (4 marks)
vii) Inserted right border in the last paragraph ONLY (2 marks)
b) Copied Society to another page and saved as Society 2 (2marks)
c) Changed paragraph starting with “For instance………. “to bold italic (2marks)
e) Using the word count feature counted characters with spaces= 2797 (2 marks)
f) Inserted alphabetical capital letter page numbers at the top left side
2.
g) =B32
h) Proper auto fill of formulae and functions ( 2marks )
i) Proper graph ( 4 marks )
j) Renaming (2
marks )
k) Printing ( 2marks )
Test Paper 5.
1. (a) What is a peripheral device? (2 marks)
(b) Give two examples of peripheral devices. (1mark)
43
2. State any six characteristics of the fifth generation computers. (3 marks)
3. Explain the term hard disk crashing (2 marks)
4. Give two ways of erasing contents of a cell in a worksheet. (1marks)
5. List three control structures used in programming language. (3 marks)
6. Distinguish between a file and a folder as used in windows operating system. (2 marks)
7. While on an environmental conservation trip, students were told never to dispose
off laptop batteries carelessly in landfills. Describe potential environmental hazards associated
with those batteries. (2 marks)
8. Differentiate between the Insert mode and the overtype mode as used in Microsoft
word processing. (2 marks)
9. A signal wave has three salient properties; Frequency, wavelength and amplitude.
Describe each one of them. (3 marks)
10. (a) Differentiate between single mode and multimode fiber optic cables. ( 2 marks)
(b) State one application area for each mode of fiber optic cables. (2marks)
11. Fig. 2.4 shows electronic pathways on a section of a motherboard. Study the
Illustration and answer the question that follows.
Start
S=1
Y = Y/10
S=S+1
Y< NO
10 ?
YES
S
Stop
(I) Give the expected output from the flowchart when the value of Y is:
45
(i) 48 (2 marks)
(ii) 9170 (2 marks)
(iii) – 800 (2 marks)
(II) Write the pseudocode that can be used to create a program represented by the above
Flowchart. (5 marks)
17. (a) The magnitude of a number can be determined using three parameters. Using
Examples, describe the three parameters. (3 marks)
(b) Using two’s complement, show how the arithmetic below would be carried out on
a 8 – bit computer system.
(+54) – (+29). (5 marks)
(c) Using one’s complement, perform the following binary arithmetic leaving the answer in
decimal notation. (5 marks)
11012 - 1001012
(d) Differentiate between a word and a word length as used in data representation. (2 marks)
18. (a) Write down the three letter file name extensions (e.g sys) that are normally
associated with the following file type.
(i) A simple ASCII text file. (1 mark)
(ii) A Microsoft word document. (1 mark)
(iii) A digital photograph (1 mark)
(iv) A Microsoft power point presentation (1 mark)
(v) A bit mapped image. (1 mark)
(c) A scanner is quite a useful input device. Describe three useful tasks which a scanner
can fulfill. (3 marks)
(c) Describe two types of scanner that are used for inputting data into a computer. (4marks)
(d) (i) Previously scanners were connected to a computer via the parallel port,
but this has be replaced by USB. Briefly explain the difference between
these two ports. (2marks)
(ii) Explain why USB has been preferred over parallel port. (1 mark)
46
(i) System Entropy (1 mark)
(ii) System feedback. (1 mark)
(c) State two advantages and two disadvantages of using interview as a method of
data collection.
Advantages. (2 marks)
Disadvantages. (2 marks)
(d) Under what circumstances would a questionnaire be best suited for data
collection. (3 marks)
20. (a) List two devices used in wireless communication. (2marks)
(b) Explain the following communication devices:
(i) Hubs. (1 mark)
(ii) Modem (1 mark)
(iii) Codec (1 mark)
47
Test paper 6
1. FutureTech Company Ltd deals with sales of three types of electronic goods namely television sets,
radio systems and DVD players. Below is a table showing details of April 2013 sales.
TV 15%
Tax Rates DVD 12%
Radio 8%
Required:
(a) Enter the data in a worksheet and save it as CD-R: \FutureTec. (16 marks)
(b) Format the worksheet as follows:
(i) Center the Title across columns. (2 marks)
(ii) The text should be Arial, 18 points, bold and centered within
a box. (2 marks)
(iii) Column Headings to be wrapped within the cells and centered
horizontally and vertically. (2 marks)
(iv) The Unit Price to be in two decimals and currency prefix Ksh. (4 marks)
(c) Use appropriate cell references to calculate:
(i) The Subtotal, rounded to two decimals places. (2 marks)
(ii) The TAX is based on the type of the item. Use the rates given in
the table above to calculate tax payable on each item sold. (2 marks)
(iii) The Net Amount, which is the subtotal less tax. (2 marks)
(d) Sort the worksheet in ascending order according to category. (2 marks)
(e) Calculate the subtotals and grand total for the three types of electronic
goods. (6 marks)
(f) On a separate sheet, create a bar graph that compares sales for the three
types of electronic goods. Label it appropriately. (6 marks)
48
(g) Print the worksheet showing all formulae used instead of values and
the graph. (4 marks)
49
HIGH SEASONS is a holiday resort firm. It has several branches all over the
world. In order to keep track of its employees, a database to organize employee
information is required.
(a) Create a database file and save it as SEASONS in the removable storage
provided. (2 marks)
(ii) Make the field Employee No. the primary key and save the table as
EMPLOYEES. (3 marks)
(c) (i) Create a form based on the EMPLOYEES table and save it as
EMPLOYEESFORM. (4 marks)
(d) Modify the EMPLOYEES table by adding two new fields: (2 marks)
(e) (i) Create another table containing the following fields: (2 marks)
Field Name Field Type
HouseID AutoNumber
Number of Rooms Number
50
Location Text
Rent Currency
(ii) Make the field HouseID the primary key and save the table as HOUSES.( 2 marks)
(h) (i) Create a columnar report with portrait orientation from the
EMPLOYEESQUERY. Save the report as EMPLOYEESREPORT. (4 marks)
(ii) Enter a function to compute the salaries grand total displayed in the
report. (3 marks)
51
Marking scheme
Test paper 5
52
27. – Most laptop batteries contain heavy toxic metals such as cadmium. This can cause substantial
pollution by leaching to underwater tables when land filled and/or air pollution when incinerated.
The laptop batteries therefore require special care during disposal any many countries are now
operating recycling programs to capture and reprocess the old batteries.[3 marks]
28. The Insert Mode is the normal typing mode where the typed character at the cursor
position pushes the rest of the text to the right. On the contrary, the overtype mode is where the
typed character inserted at the cursor position deletes the character on the right of the cursor.
[2 marks]
29. Frequency of a wave is the number of cycles (vibrations) that the wave makes per second. It is
measured in Hertz (Hz). [1 mark]
Wavelength is the distance between two adjacent crests or troughs, and is measured in metres
(M). [1 mark]
Amplitude is the maximum displacement disturbance) of the medium from equilibrium (rest)
caused by the wave. [ 1 mark]
30. (a) A single mode fibre optic cable has a very thin core hence; it can only receive a single ray of
light while a multimode fibre optic cable has a thick core and can receive multiple light rays.
Light in the multimode cable attenuates faster than in the single mode.[ 2 marks]
(b) Applications of each mode. [2marks]
Single mode fibre optic cables are used for long distance transimission like in undersea
Multimode fibre optic cables are used for short distances like when laying backbones for
campus networks.
31. (a) Buses: These are electrical pathways etched on the system board and used to transmit data and
control signals. [1mark]
Address bus: This is the pathway used to locate the storage position in a memory where
53
Data bus: This is the pathway where the actual data transfer takes place.
32. In order to avoid device conflict, an operating system typically assigns each hardware resource in a
computer a unique identifier. For example, in Microsoft windows this identifier is referred to as
Interrupt Request (IRQ). [2 marks]
33. (a) Garbage In Garbage Out(GIGO) means that the accuracy and integrity of
information available after processing depends on the integrity of data entered
into system. [2 marks]
(c) Four operations undertaken to safeguard data integrity. [2 marks]
Control data access both physically and electronically.
Provides users with easy to use data input mechanisms
Use data detection and correction measures.
Use antivirus software to protect data from being corrupted.
34. (a) The first letter of the paragraph is a drop cap. [1mark]
(b) Drop cap is used to capture attention and for emphasis. [1mark]
35. A mouse pointer is the arrow used to point to or select an item on the screen,
while an Insertion pointer is the blinking cursor that shows where the next
character is to be Inserted [2 marks]
54
(e) Study this flowchart and use it to answer the questions that follow.
Start
S=1
Y = Y/10
S=S+1
Y< NO
10 ?
YES
S
Stop
(I) Give the expected output from the flowchart when the value of Y is:
(i) 48 [2 marks]
Solution:
Y = 48
= 48/10
= 4.8
4.8 <10 YES
Y = 4.8
S=1
55
(ii) 9170 [2 marks]
Solution:
Y = 9170
= 9170/10
= 917
917 <10 NO
؞S=S+1
=1+1
S=2
917/10 = 91.7
91.7 < 10 NO
؞S=2+1=3
Y = 91.7/10 = 9.17
9.17 < 10 YES
؞S=3
(iii) – 800 [2 marks]
-800/10 = -80
-80 < 10 YES
؞S=1
(II) Solution to the pseudocode used to create a program represented by
the flowchart. [5 marks]
Start
S=1
Ready
Repeat Y
Y = Y/10
IF (Y <10) THEN
S=S+1
ENDIF
UNTIL Y < 10
PRINT S
Stop
37. (a) Three parameters that determines the magnitude of a number [3 marks]
56
Absolute value: Magnitude of a digit in the number line. For example, digit 2 in 423, has
Place value: Position of a digit in the number, whether ones, tens, hundreds and so on. For
example, digit 2 in 423, has a place value of tens hence the total value is 20.
Base value: Radix of the number system that is being used. For example, 32 and 310 mean
three base two and three base ten respectively, and have different values.
(c) Using two’s complement, show how the arithmetic below would be carried out on
a 8 – bit computer system.
(+54) – (+29). [5 marks]
Solution;
+5410
2 54 Rem
2 27 0
2 13 1
2 6 1
2 3 0
2 1 1
2 0 1
Copy upwards
+5410 = 1101102
+2910
2 29 Rem
2 14 1
2 7 0
2 3 1
2 1 1
2 0 1
Copy upwards
+2910 = 111012
(+5410) – (+2910) = 1101102 – (111012)
001101102 – 000111012 (write into 8 – bits)
57
001101102+ (111000102) (1C’s)
+ 12 (2’Cs
001101102 + 111000112
001101102
+ 111000112
(1)000110012
Ignore the
overflow
(+5410) – (+2910) = (1101102) – (111012) = 000110012
(c) Using one’s complement, perform the following binary arithmetic leaving the answer in decimal
notation. (5 marks)
11012 - 1001012
Solution:
000011012 - 001001012 (write into 8 – bits)
000011012+ (110110102) (1C’s)
000011012
+ 110110102
(1)11001112
Sign bit
2-7 26 25 24 23 22 21 20
1 1 1 0 0 1 1 1
1 x 2-7 1 x 26 1 x 25 0 x 24 0 x 23 1 x 22 1 x 21 1 x 20
1 x -128 1 x 64 1 x 32 0 x 16 0x8 1x4 1x2 1x1
-128 64 32 0 0 4 2 1
58
(d) A word is a group of bits accessed as a unit whereas a word length is the number of bits in a
word. [2 marks]
38. (a)
(vi) A simple ASCII text file. [1 mark]
txt
USB comprises only four conductors ( in one cables, two used for data and two for
power and many devices can be connected using USB. [1 mark]
60
(iii) Codec is a device that converts an analog signal to digital form for transmission
Via a digital medium [1 mark]
(iv) Bridge is a network device that selectively determines the appropriate
Network segment for which a message is meant for delivery through
Addressing filtering. [1 mark]
(c) (i) Bandwidth is the maximum amount of data that a transmission medium
can carry [1 mark]
(ii) Attenuation is the decrease in magnitude and energy as a signal
progressively moves along a transmission medium. [1 mark]
(d) Videotex is a two way system for using television screen to display data
stored in central computer databases while Teletext is similar to videotext
but is only one way(Refers to a computerized service whereby news and other information
are provided on television screens to subscribers. However, teletext is a one way
communication (simplex) which means that the subscriber cannot communicate back to the
service provider. [2marks]
(g) (i) Virtual reality is a way for humans to visualize, manipulate and interact
with computers and extremely complex data. [1 mark]
Video Mapping: The user watches a monitor that shows his body’s interaction with the
world.
Immersive Systems: They completely immerse the user personal viewpoint insider the
virtual world, often equipped with head mounted display.
61
Marking scheme
Test paper 6
(iii) correct cells wrapped heading 2 (ii) Records entry to the Form 6
(iv) Unit price prefix with Ksh 4 d) Table modification with two fields 2
added
c) (i) Subtotal rounded with two D. 2 e) (i) Table: HOUSES with correct fields 2
places
62
Integrity
Report: EMPLOYEESREPORT 1
63
Test paper 7
1. (a) A computer laboratory should be constantly kept dust and smoke free.
Specify two effects that dust would have on the operation of computers. (2 marks)
(b) Why should you first switch on the UPS before switching on the system unit and the
monitor? (1 mark)
64
(b) Smith instead of simth.
…………………………………………………………………...
(b) Perform the following binary arithmetic giving the answer in decimal notation.
5. Distinguish between data privacy and data integrity as used in computing. (2 marks)
6. Differentiate between a primary key and a foreign key while designing a database. (2 marks)
STATEMENT DEVICE
areas. (2 marks)
(a) Competition.
65
(b) Pace of growth.
(c) Surf.………………………………………………………………………………………
12. In Kenya Tea Packers Company, several people are employed as record clerks, typists and
messenger. The company intends to introduce a computerized system in all the departments.
Suggest three reasons that would make workers unhappy with the new system. (3 marks)
15. For each of the following file organization methods, state an appropriate storage medium:
(2 marks)
(a) Serial.……………………………………………………………………………………
66
(b) Random.…………………………………………………………………………………
Answer question 16 (compulsory) and any other THREE questions from this section.
16. (a) Study the flowchart below and answer the questions that follows.
Start
Enter: N, M
= M: Y = N
N, M
P = y - : Q = - y
PRINT: P, Q, , y
67
Stop
(i) State the name of the control structure shown in the flowchart. (1 mark)
(ii) Assuming the user keys in 8 and 14 when prompted to enter the values for m
and N respectively, determine the printed values of P, Q, and y. (4 marks)
(iii) Write the pseudocode that would be used in place of the flowchart. (5 marks)
(b) Explain the following interactive sensory equipment used in virtual reality.(2 marks)
68
(c) (i) What is Artificial Intelligence? (1 mark)
(d) Most computerized security systems make use of Biometric analysis, name three
physical features of human beings that can be considered in this analysis.
18. (a) Explain two coding schemes used in data representation techniques.(4 marks)
A………………………………………………………………………………………….
69
B………………………………………………………………………………………….
C………………………………………………………………………………………….
D………………………………………………………………………………………….
F…………………………………………………………………………………………..
Explain the following terms as used in disk management using operating system:
…………………………………………………………………………………….
(b) What will happen if you attempt to delete a folder while a file contained in it is Open?
(1 mark)
A B
X
(d) State two properties that an operating system displays about a file. (2 marks)
C D
20. (a) The diagram below shows four common network topologies A, B, C and D.
70
Server Terminal Printer
(i) Name the network topologies labeled A, B, C and D. (4 marks)
(iv) List two disadvantage associated with network topology labeled D.(2 marks)
71
(b) Differentiate between Internet and World Wide Web. (2 marks)
(c) Describe the following network services and identify their applications. (4 marks)
Test paper 8
Question 1
Munjiru is a secretary for the Entrepreneurs Club. She has been told to use a Database
Management System (DBM) to help the club maintain records on the club’s members.
(a) (i) Create a database table (or file) that has the following fields of data for each member
last name, first name, membership number, date of registration, membership fee paid,
(ii) Make the membership number record identifier (the primary key) (2 marks)
72
(iii) Index on membership number. (1 mark)
(b) Input the following data to the above table: (10 marks)
Member
Ordinary
Member
Member with
concessionar
y rates
1500.00
Member to
pay
1500.00
73
Katiku Peter Yec/067 15.05.97 0.00 25 71710 Ordinary
Member
Defaulter
Member,
fully
paid
Member,
fully paid
Member for
6
Month only
Member
(c) (i) Insert the field called “more than 4000” that will accommodate Y for
(ii) Indicate in these new fields those members who have paid more than
sh.4000.00 with Y otherwise N. (3 marks)
74
(d) (i) Create a query that contains the field Membership Number, Last Name,
Date of registration, Membership fee paid and status for all members who
have paid less than sh.4000.00 and registered after 15/4/1995 or are above
(ii) Write on the paper provided the query expression you used. (2 marks)
(e) (i) Excluding the status field, create a report for all members and
2. The following is a worksheet extracted from business partner’s vendors. They have
PARTNER’S VENDORS
Names Cost Sales Gross profit Expenditure Reserves Net profit Remarks
75
Mary Wayudo 250 850 70
Additional information
(e) Use “IF function” and net profit to analyse the vendors, taking the
following remarks: (6 marks)
(f) Use names of the vendor and cost to insert line graph, keep the title
of the graph to be PRODUCTIVE ANALYSIS, format it and place
76
it in a separate sheet. (5 marks)
Test paper 7
SECTION A: (40 MARKS)
Question 1
(b) Why should you first switch on the UPS before switching on the system unit
Meaning of backup.
Making of copies of data, programs incase the originals are corrupted or lost
It is used to protect data from accidental erasure or hardware problems.
Question 3
Misreading errors
(b) Smith instead of simth
Transposition
Question 4
(b) Perform the following binary arithmetic giving the answer in decimal notation
1110.0111
1101001.0110 +
110111.1101
119.8125 or 11913/16
Data privacy -keep data secretly so that unauthorized people don't access it
Data integrity- correctness, completeness and accuracy of data
Question 6 Difference between a primary key and a a foreign key while designing a database
78
Question 8
STATEMENT DEVICE
(a). Operates at data link layer Bridge
(b). Determine the best path for data to follow Router
(c). Regenerates signals Repeater
(d). Forwards every thing which it doesn't recognize Bridge
Question 9
(b) Competition
Ability to advertise on the internet
Improve quality of goods
Reduced operational cost
Question 10
Question 11
(a) Sign IN - Enter user name and password to authenticate the access to e-mail account
(b) Search engine -Site used for searching material from the internet
(d) Sign up - Registering to have an account for e-mail or other communication media
79
Question 12
Suggest three reasons that would make workers unhappy with the new system. (3
marks)
Job replacement
Retraining on use of computers
Side effect of using computer
Loss of status Quo
Question 13
Hard disk
Floppy disk
Jaz disk
Zip disk
Magnetic tape
Question 14
Control the use of the main memory in storing data & information
Processing and manipulation of data into useful information
Manages execution of instructions
Give commands to all parts of the computer
Control the sequence of operations within the computer
Question 15
(a) Serial
Computer Paper 1 2
80
SECTION B: (60 MARKS)
Answer Question 16 and any other three questions from this section.
Question 16
BEGIN
Read M,N
Set = M;
Set y = N;
P = y - ;
Q = - y;
IF P >Q THEN;
Set P = ;
Set Q = y;
ELSE
Set P = y;
Set Q = ;
ENDIF
PRINT P, Q, , y;
END
(b) Looping executes the same block of code (module) again and again until a
certain condition is fulfilled, while selection execution of a statement(I)
81
depends on a condition that returns true or false ( yes / No) (Well explained
2mks)
Question 17
by a computer system.
(b) Explain the following interactive sensory equipment used in virtual reality: (2
marks)
Channels images and sounds from the source to the eyes and ears of the wearer
hence producing a 3-D effect in the virtual world.
Made of conductor wires that sense body movement and relay data into the virtual
reality system.
Making computers perform tasks that could otherwise require intelligence if performed
by human beings.
Interference engine - software which controls how knowledge is searched and accessed
82
from the knowledge base.
Computer Paper 1 3
(d) Physical features of human beings that can be considered in Bio metric analysis. (3
marks)
Eyes pattern
Finger prints
Voice
Question 18
14 – 9
14 00001110
00001110
+ 11110110
(1) 00000100
+ 1
0000010 1
14 – 9
14 00001110
11110111
+ 00001110
(1) 11110111
00000101
Divide in to 4 bits
1011/1110/0011
1011-ll thus B
1110 = 14 thus E
0011-3
C - Parallel port
D - Serial port
E - VGA port
Question 19
84
Manages secondary and primary memories
Process of deleting and removing files on the hard disk that may no longer be
needed
e.g. files on cache, internet files, instoration files
c) What will happen if you attempt to delete a folder while a file contained in it is Open?
(1 mark)
The process will be aborted and error message displayed to alert to first
close the open file in that folder before attempting to delete.
Question 20
85
(i) Name the network topologies labeled A, B, C and (4 marks)
A. Tree/Hierarchy
B. Ring
C. Bus/Multi drop
D. Star
of the network
- Extra cost of cabling as each terminal must be cabled separately to the hub.
86
b) Differentiate between Internet and World Wide Web. (2 marks)
millions of computers together globally, forming a network in which any computer can
communicate with any other computer as long as they are both connected to the Internet.
Information that travels over the Internet does so via a variety of languages known as
protocols.
The World Wide Web, or simply Web, is a way of accessing information over the
medium
of the Internet It is an information-sharing model that is built on top of the Internet. The
Web
uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit
data.
Web services, which use HTTP to allow applications to communicate in order to exchange
business logic, use the Web to share information. The Web also utilizes browsers, such as
Internet Explorer or Netscape, to access Web documents called Web pages that are linked
to each other via hyperlinks. Web documents also contain graphics, sounds, text and
video.
In its simplest form it mimics the functions of an answering machine, uses a standard
telephone handset for the user interface, and uses a centralized, computerized system
Voicemail systems are much more sophisticated than answering machines in that
they can:
two-way video and audio transmissions simultaneously. It has also been called
Marking Schemee
Test paper 8
88
1. (a) (i) Creating table and entering the data (4 marks)
e. (i) Creating the report and giving the right title. (12 marks)
2. Excel
(f) Generating line graph with vendor name and cost and title as
PRODUCTIVE ANALYSIS as in the separate sheet. (6 marks)
90
JOIN VENDORS
91
Test paper 9
SECTION A (40 marks)
1.(a) Headache, back and neck pain may result from use of computers. Explain two ways in which
back and neck pain can be minimized. (2mks)
(b) State how computer have been made more users friendly for persons that are:
B…………………………………………………………………………………………………………
C…………………………………………………………………………………………………………
92
D…………………………………………………………………………………………………………
(ii) On the diagram above, indicate the direction of data flow using arrows (1mks)
3. KASSU High School intends to purchase new computer to be used by students in the e-learning
room for accessing digital learning resources and personal research. Advise the school on two
computer hardware system specification features to consider as a measure of enhancing performance
of the computers. (2mk) 4. Describe the
following terms as used in Microsoft Word. (1mks)
8(a) A systems analyst is responsible for the introduction of a new computerized system after the
software has been written and tested, and its hardware purchased. Describe any ONE method of
introducing this new computerized system. (2mks)
(b) File conversion, in system development, refers to modifying or changing the format of files when
a new system is introduced e.g. from manual to computerized. State any THREE factors considered
before the file conversion process. (3mks)
93
9. The cartoon below suggests that computers will replace people. Give any THREE reasons why this
may happen. (3mks)
The office
It was more
party isn’t Yeah….I
what it used fun a lot with
think you’re
to be, Owino people, right?
right, Joe
10. A video rental shop uses a computerized system to record which videos have been loaned out.
When a video is loaned out, the customers’ data is recorded on computer file. Describe TWO
computer processing files that will be needed to store permanent customer records and temporary
records that keep on changing. (4mks)
94
SECTION B (60 marks)
Answer question 16 and any other THREE questions from this section in the spaces provided.
16. a) State the THREE basic types of program control structures. (3 marks)
b) Draw a flowchart which will simulate the processing of Student's report. The simulation should
be such that the user repeatedly inputs marks per subject for eight subjects using a looping control
structure. The computer processes the total marks and mean score of the student.
2. The outputs required are; Average score and Total marks. (7 marks)
(b) Kunta would like to send photos to Kinte via e-mail. Outline the steps Kunta would follow to
send the photos as file attachments (3marks)
(c) Differentiate between the following in relation to data security and control (4 marks)
(d) Computer crimes include Trespass, Hacking, Piracy and Sabotage. Highlight each of them.
(4 marks)
(ii) Use one’s compliment to solve the following sum: - 12+25 (2 Marks)
(b) Using six bits find the two’s complement representation of -2710 (5 marks)
(c) Find the difference in the following binary numbers; (4 marks)
(i) 111011-10001
(ii) 100011.101-1001.10
95
19. (a) (i) Define Data Communication. (2 marks)
(ii) In relation to data communication, distinguish between DTE and DCE with an example of
each
(3marks)
(b) Communication media can be classified into guided media or Unguided media. List any TWO
examples in each case (2 marks)
(c) Using an illustration, explain how fibre optic cable transmits data. (4 marks)
(d) (i) List any TWO hardware devices that make up a bus network. (2 marks)
20. (a) (i) State any THREE factors you would consider before installing an operating system.
apart from cost. (3 marks)
(ii) Distinguish between software installation and software configuration in relation to
operating system (2 marks)
(b) Abraham would like to distinguish between System Tray and Task Manager.
(d) Mobile Operating System (OS) is software that allows Smart phones, Tablet PCs and other
devices to run applications and programs. List any THREE examples of Mobile Operating Systems
96
Test paper 10
1. The data in the tables below was extracted from KASSU football league management system.
Table 1: TEAMS TABLE
TeamID TeamName
01 KASSU High
02 Sunshine School
03 Kabarak High
04 Sacho High
05 Nairobi High
06 Nakuru High
07 Baringo High
97
(ii) Create relationships between the tables
(4½Marks)
(iii) Use form to enter data into the tables
(10½Marks)
(b) (i) Create a query to display the fixtures for the league (3
Marks)
(c) Create a query and use it to generate a report for a league which displays Games played,
Won, Drawn, Lost, Goals For, Goals Against, Goals difference and Points taking note that
a win earns a team 3 points, draw 1 point and a loss 0 points
(15 Marks)
(d) Print the:
(i) Three tables
(ii) Output for query results on Fixtures
(iii) The league report (3Marks)
2. The KASSU bank of Kenya (KBK) exchange rates on a certain day for foreign currencies
against the Kenya shillings (Kshs) were as follows
98
(a) Using a spreadsheet package, represent the above information in one worksheet and saveit as
KASSU
(13mks)
(b) Using formulae with absolute and relative cell references, determine the total profit made
by each trader.
(14mks)
(c) Round off the profit for each trader to zero decimal places
(2mks)
(d) Generate a form and use it to add details for Wesley with the following details
Name U.S Dollars Sterling Euros S.A Rands Swedish
Pounds Kroner
Wesley 69.8 140.5 96.75 10.4563 10.4689
(13mks)
(e) Use a function to determine the trader who got the highest profit (3mks)
(g) Print the worksheet, the form (Print screen of it) and the graph (2mks)
99
Marking scheme
Test paper 9
1.(a)Headache, back and neck pain may result from use of computers. Explain two ways in which
back and neck pain can be minimized. (2mks)
Furniture should be high enough to enable eyes of the user to be level with the top of
screen
(b) State how computer have been made more users friendly for persons that are:
100
A- Input device – used to enter data into the computer
B- Control unit- Manages and coordinates activities of the computer system.
C- ALU - Perform arithmetic and logical operations on data during data processing
D –Primary memory/main memory –
Store data and instructions that are directly accessible and required for data
processing.
Store intermediate results during data processing
3. KASSU High School intends to purchase new computer to be used by students in the e-learning
room for accessing digital learning resources and personal research. Advise the school on two
computer hardware system specification features to consider as a measure of enhancing performance
of the computers. (2mk)
Column is not wide enough to accommodate the value or a negative date/time is used.
(d) ( 3 marks)
(i) Enforcing Referential integrity
To ensure that all records entered in the related table exist in the primary table.
7.Differentiate between the following Margins and column guides as used in DTP (2mks)
101
Margins marks text areas on the page along the edges
Column guides divide the pages into several fields, used to define the printable areas
8.(a)A systems analyst is responsible for the introduction of a new computerized system after the
software has been written and tested, and its hardware purchased. Describe ONE method of
introducing this new computerized system.
(2mks)
(i) Parallel – A system of change-over where the old system is run parallel with the new
for a set period of time.
(ii) Phased – this involves changing from the old system in stages rather than all at once
based on location of firm, subsystem or subfile.
(iii) Straight – This the complete replacement of the old by the new system at one go.
(b) File conversion, in system development, refers to modifying or changing the format of files when
a new system is introduced e.g. from manual to computerized. State THREE factors
considered before the file conversion process.
(3mks)
(i) Whether the new system requires a new operating system and/or hardware.
(ii) Whether you need to create new database files for the new system e.g. manual to
electronic files.
(iii) Whether you need to install new application software.
9.The cartoon suggests that computers will replace people. Give THREE reasons why this may
happen.
(3mks)
10. A video rental shop uses a computerized system to record which videos have been loaned out.
When a video is loaned out, the customers’ data is recorded on computer file. Describe TWO
computer processing files that will be needed to store permanent customer records and
temporary records that keep on changing.
(4mks)
102
Master files - Contains all the permanent data/records you keep about something
e.g. videos, which transactions are processed.
Transaction files – Contains data about what has happened. These are files that
contain input and output data for holding temporary incoming or outgoing data.
Used to update dynamic data on master files.
11. Define overflow error with respect to computation of data (1mk)
This error type will usually happen on older machines whose memory capacity is over shadowed
by the capacity of the result of calculations.
12. Mention one ICT job that a college graduate can get in the video rental shop with regard to
records management. (1mk)
Database administrator
Data control clerk
Answer question 16 and any other THREE questions from this section in the spaces provided.
21. a) State the three basic types of program control structures. (3 marks)
- Sequence.
- Selection.
- Iteration (looping)
103
b) Draw a flowchart which will simulate the processing of Student's report. The simulation should
be such that the user repeatedly inputs marks per subject for eight subjects using a looping control
structure. The computer processes the total marks and mean score of the student.
3. The outputs required are; Average score and Total marks. (7 marks)
START
COUNT=1
TotalMark=0
READ Mark
TotalMark=TotalMark+Mark
Is
NO COUNT=COUNT+1
COUNT=
8?
YES
AverageMark=TotalMark/COUNT
PRINT AverageMark
PRINT TotalMark
STOP
104
c) Construct a pseudo code for the above flowchart. (5 marks)
BEGIN
FOR COUNT= 1 TO 8 DO
READ Mark
TotalMark=TotalMark+Mark
AverageMark=TotalMark/COUNT
PRINT Name
PRINT AverageMark
PRINT TotalMark
(ii) Explain the impact of the internet in the information security (2marks)
-Private and confidential information is constantly at risk from hackers, crackers and fraudsters who
carryout their trade on the internet.
(b) Kunta would like to send photos to Kinte via e-mail. Outline the steps Kunta would follow to
send the photos as file attachments (3marks)
105
-Click the send button.
(c) Differentiate between the following in relation to data security and control (4 marks)
-Password is an encoded string of characters that enables a person to be positively identified before
being given access while,
-Biometric authentication relies on a unique aspect of human features like finger prints, iris or
arrangement of facial features. It is one of the most secure authentication mechanisms because no two
people can have the same features.
-Privacy refers to an individual’s right to control access to data or information belonging to himself
or herself.
-Confidentiality refers to the means of protecting private or corporate data or information from
unauthorized access or disclosure.
(d) Computer crimes include Trespass, Hacking, Piracy and Sabotage. Highlight each of them.
(4 marks)
-Trespass means the unauthorized physical access to ICT assets or also accessing information
digitally without permission.
-Hacking is the forceful access to information held in computers by breaking access control codes like
passwords.
-Piracy is a form of intellectual property theft which means illegal copying of software, information or
data.
106
-Sabotage is the illegal destruction of data and information with the aim of crippling service delivery
or causing great loss to an organization.
6 -110
7 -111
6 -110
1 1011 1110 = 1 B E 16
(ii) Use one’s compliment to solve the following sum: - 12+25 (2 Marks)
+ 00011001
(1)00001100
+ 1
000001101 = 13
34=100010
(b) Using six bits find the two’s complement representation of -2710 (5 marks)
107
(c) Find the difference in the following binary numbers; (4 marks)
(i) 111011-10001
(ii) 100011.101-1001.10
(ii) In relation to data communication, distinguish between DTE and DCE with an example of each
(3marks)
-Data Terminal Equipment (DTE) is a device that can send/receive data e.g a printer or
microcomputer while
-Data Communication Equipment –Data Circuit/Terminal Equipment (DTE) is a device that facilitates
serial data communication e.g Modem.
ADDITIONAL INFO
Data terminal equipment is an end instrument that converts user information into signals or reconverts
received signals. These can also be called tail circuits. A DTE device communicates with the data
circuit-terminating equipment. The DTE/DCE classification was introduced by IBM.
Data Terminal Equipment (DTE) is any equipment that is either a source or destination for digital
data. DTE do not generally communicate with each other to do so they need to use DCE to carry out
the communication. DTE does not need to know how data is sent or received; the communications
details are left to the DCE. A typical example of DTE is a computer.
Data Communications Equipment (DCE) can be classified as equipment that transmits or receives
analogue or digital signals through a network. DCE works at the physical layer of the OSI model
taking data generated by Data Terminal Equipment (DTE) and converting it into a signal that can then
be transmitted over a communications link. A common DCE example is a modem which works as a
translator of digital and analogue signals.
108
DCE may also be responsible for providing timing over a serial link. In a complex network which uses
directly connected routers to provide serial links, one serial interface of each connection must be
configured with a clock rate to provide synchronisation.
(b) Communication media can be classified into guided media or Unguided media. List any TWO
examples in each case (2 marks)
(c) Using an illustration, explain how fibre optic cable transmits data. (4 marks)
-Light pulses carrying data are projected into the cable at the source in such a manner that the angle
of incidence is greater than the critical angle of the core. The light in the core tries to penetrate total
cladding. Since the cladding is of higher refractive index, total internal reflection occurs. The light is
kept within the core, bouncing off the boundary of the core and cladding until it reaches the
destination as shown.
(d) (i) List any TWO hardware devices that make up a bus network. (2 marks)
-Terminator
109
-Terminals (nodes)
-If a cable breaks in any one section of the bus it will bring down the entire network.
-The more the number of computers connected to the bus, the higher the chances of collision hence,
the more the delays in data transmission.
▸ The cable length is limited. This limits the number of network nodes that can be connected.
▸ This network topology can perform well only for a limited number of nodes. When the number of
devices connected to the bus increases, the efficiency decreases.
▸ It is suitable for networks with low traffic. High traffic increases load on the bus, and the network
efficiency drops.
▸ It is heavily dependent on the central bus. A fault in the bus leads to network failure.
▸ It is not easy to isolate faults in the network nodes.
▸ Each device on the network "sees" all the data being transmitted, thus posing a security risk.
25. (a) (i) State any THREE factors you would consider before installing an operating system.
(3 marks)
-Installation is the process of copying program files into a computer so that they can be executed,
while
-Configuration refers to the process of fine tuning or defining options provided by the installed
software.
110
(b) Abraham would like to distinguish between System Tray and Task Manager.
-System tray is a section of the taskbar located at the right most part and shows icons of tasks running
in the background but are not displayed on the screen. While,
-Task manager is the empty strip on the taskbar where the buttons of currently running tasks are
displayed.
-Kernel is the core of an operating system responsible for the management of hardware and software
and OS resources. While,
-Shell is the interface provided for the user to interact with the operating system.
-A PAGE is a fraction of process. One process may have one or several pages.
(d) Mobile Operating System (OS) is software that allows Smart phones, Tablet PCs and other
devices to run applications and programs. List any THREE examples of Mobile Operating Systems
(3 marks)
111
Apple iOS,
- Google Android,
- Research in Motion’s BlackBerry OS,
- BlackBerry's Playbook OS
- Nokia’s Symbian,
- Nokia's Maemo OS,
- Nokia's MeeGo OS, LiMo OS, Tizen,
- Hewlett-Packard’s webOS (formerly Palm OS)
- Microsoft’s Windows Phone OS,
- Microsoft’s Windows 8,
- Palm's webOS,
- Samsung's Bada OS,
- The Jolla's Sailfish OS
- Mozilla's Firefox OS.
Marking scheme
Test paper 10
1. (a) Distinguish between Optical scanners and Magnetic ink scanners. (2mks)
2. (a) Explain the difference between digital signal and analog signal in data communication. (2mks)
(b) Give two ways in which computers are used in communication industry. (2mks)
3. (a) Name two special purpose memories found either inside or outside the microprocessor. (2mks)
(b) Differentiate between a margin guide and a column guide as used in D.T.P. (2mks)
8. Explain the meaning of the following terms as used with DTP. (4mks)
(i) Crop.______________________________________________________________________
Embedded object.______________________________________________________________
10. State two advantages of using wireless transmission media to connect to the internet. (2mks)
12. Make a clear difference between Log file and Firewall. (2mks)
13. Explain the meaning of the terms below as used in data security and controls. (3mks)
(ii) Fraud._______________________________________________________________________
(iii) Eavesdropping.________________________________________________________________
14. Make a clear difference between the following information gathering methods. (2mks)
(a) Observation.__________________________________________________________________
(b) Questionnaire.________________________________________________________________
Answer question 16(compulsory) and any other THREE questions from this section.
16. Mwangi deposits 8500 shillings in a microfinance company at an interest rate of 15% per annum. At
the end of each year, the interest earned is added to the deposit and the new amount becomes
(a) Write an algorithm for a program that would track the growth of the deposits over a period
17. (a) Define the term network topology and explain the two types of topology. (5mks)
(c) Name the parts labeled A, B, C and D in the diagram below. (2mks)
B __________________________________________________________________________
C___________________________________________________________________________
D __________________________________________________________________________
(d) Explain the meaning of the following terms as used in signal transmission. (2mks)
(ii) Give two examples of spreadsheet packages available in the market today. (2mks)
(iii) Explain the following terms as used in spreadsheet.
What IF analysis. (2mks)
Cell. (1mk)
Formula. (1mk)
Pie-chart. (1mk)
(b) State one way in which a user may reverse the last action taken in a spreadsheet package.
(1mk)
19. (a) Describe each of the following data processing methods and give an example of where used.
(6mks)
(c) An organization is facing threats to data integrity. Explain three of how the threats can be
minimized. (3mks)
20. (a) Give two reasons why data and information in a computer system needs to be converted to
(b) Explain two reasons for use of binary in digital technology. (2mks)
(ii) Explain two factors you would consider before enrolling for an ICT course in a
college. (2mks)
Test paper 12
1. (a) Using a Word Processing package, type the congratulatory note below as it
appears and save it as CONGRATS in a disk provided.
(15mks)
Kenya Pipeline Co. Ltd
P.O. Box 5678
Nanyuki
(Insert today’s date)
Yours faithfully,
Daniel Mahinda
PERSONNEL
(b) Create a data source with the following details and use it with the note you have
just typed to generate personal notes to the company’s named personnel.
Save it as Details in your disk. (15mks)
(c) Insert data fields in main document and generate the notes for the employees.(14mks)
(e) Generate envelope labels for these notes with the fields of names and address. (9mks)
(f) Print the labels. (6mks)
2. A firm keeps its details in a computer database. The information below contains details obtained from
two tables of the database. Study the tables and answer the questions that follow.
Employees table
Department Table
Required:
(a) Create a database that can be used to store the above data and save it as
MACAL in the disk provided. (10mks)
(b) Using appropriate primary and foreign keys create a relationship between
the two tables. Enforce referential integrity between the tables. (4mks)
(c) Validate the primary key entry to exactly four and two characters for the
EmployeeID and DeptCode fields respectively. (4mks)
(d) Create a form for each table and use it to enter the records shown in the
tables above. Save the forms as EmployForm and DepartForm
respectively. (6mks)
(e) It is required that the dates on which the employees were hired be included
in the database. Koech was hired on 10/06/1998. Meme on 15/08/1996.
Mohamed on 16/03/1996, Onyango on 09/03/2003, the rest were hired on
13/03/2004. Insert a new field, name it Date of Hire in the Employees
table and enter the field. (5mks)
(f) Create a query that displays employees who were employed after year
2000, save the query as LatestEmployees. (4mks)
(g) Create, a, Report that displays the Employee Name, Job title Department
name and Salary, grouped according to location.
Save the report as EmployeeReport. (4mks)
(h) (a) Create a query to display the employees and their job description.
Save it as EMPTYPE. (4mks)
(b) Create a pie chart based on the query in h(a) above to display the
proportions of employees in various job descriptions.
Save the report as CHART. (4mks)
(i) Print:
(i) Employees and Department table designs.
(ii) Employee and Department forms.
(iii) LatestEmployees Query.
(iv) EmployeesReport.
(v) The Chart
Marking scheme
Test paper 11
1. (a) Distinguish between Optical scanners and Magnetic ink scanners. (2mks)
magnetic ink scanner is used to capture data written using magnetic ink
one place to another with ease. Software portability refers to the ability to
2. (a) Explain the difference between digital signal and analog signal in data communication. (2mks)
Analog signal is made up of continuous varying waveform while digital signal is made
(b) Give two ways in which computers are used in communication industry. (2mks)
and goods.
- Airtime industry, computers are heavily used in air traffic control and surveillance
3. (a) Name two special purpose memories found either inside or outside the microprocessor. (2mks)
- Buffer – Act as interface between very fast processor and slow input and output devices.
- Registers – temporarily holds data instructions just before and after processing.
ALU temporarily while address register temporarily holds next piece of data waiting
to be processed.
- Formatting refers to applying various styles or features to enhance the documents appearance.
Such features include as bold, color, underline, changing fonts (type, style) to improve text
appearance.
- Editing refers to making necessary changes to an existing document either manually or through
- Pasteboard is a large area where you place text and graphical objects before
(b) Differentiate between a margin guide and a column guide as used in D.T.P. (2mks)
While the column guide helps to divide a page into columns that make the
- Password protection.
- Data encryption.
8. Explain the meaning of the following terms as used with DTP. (4mks)
(ii) Embedded object – A separate file not created in the program in use but in another
(iii) Master page - A page used to design a general layout that needs to be applied in all
the other pages.
(iv) Tool box – A set of buttons that contain various tools used to create and manipulate
publication.
Website – A group of related web pages or other resources located on a web server.
Web portals – Web site that brings information together from diverse source in a uniform way.
10. State two advantages of using wireless transmission media to connect to the internet. (2mks)
- Allows mobility.
12. Make a clear difference between Log file and Firewall. (2mks)
Log file – Special system files that keep a record of events on use of the computer
Firewall – Device or software system that files the data and information exchanged
13. Explain the meaning of the terms below as used in data security and controls. (3mks)
(i) Information security – Ensuring of safety of data and information against threats.
14. Make a clear difference between the following information gathering methods. (2mks)
(c) Questionnaire - Special purpose document that allows a person to collect information
and opinions from the people who receive and respond to it.
16. Mwangi deposits 8500 shillings in a microfinance company at an interest rate of 15% per annum. At
the end of each year, the interest earned is added to the deposit and the new amount becomes
(a) Write an algorithm for a program that would track the growth of the deposits over a period
of five years. (6mks)
Start
Set year to 0
Deposit = Total
Year = Year + 1
Start
END WHILE
Principal = initial
deposit year = 0
Is year
Interest = deposit X
interest rate
Deposit = total
Year = year + 1
Print deposit
Print year
Stop
(c) List four Selection Controls used in writing a program. (2mks)
IF …… THEN
IF …. THEN….ELSE
Nested IF
Case
17. (a) Define the term network topology and explain the two types of topology. (5mks)
specially the location of the computers, other devices and how the cables are run
between the.
Deals with the way data passes from one device to the next on the network.
The most common physical topologies are the bus, the star, the ring and the mesh.
(iii) Routers
Routers are used to connect separate networks. It makes the use of an internet
protocol and assumes that all the attached devices on the network use the same
communication architecture and protocol.
(iv) Repeaters
It receives a signal from one segment of the network, cleans it to remove any
a link receive the signal before it becomes too week or corrupted, regenerates the original
bit pattern, and puts the refreshed signals back onto the link.
(c) Name the parts labeled A, B, C and D in the diagram below. (2mks)
A –Transmitter earth station
B - Uplink
C – Satellite in space
D - Downlink
(d) Explain the meaning of the following terms as used in signal transmission. (2mks)
(iv) Attenuation
It’s the loss of signal strength during transmission i.e. when an electromagnetic
signal is transmitted along any medium, it gradually become weaker at greater distances;
this is referred to as attenuation. To solve this problem amplifier is
used. The amplifier boosts the signals and extends the transmission distance.
(v) Noise
Random electrical signals that can be picked up by the transmission medium
(ii) Less signal attenuation: signal can run for miles without requiring regeneration.
(vi) Higher bandwidth: fibre optic cable can support dramatically higher bandwidths
(and hence data rate) than all other cables.
(vii) Smaller and lighter than copper cable hence space limited situations.
(viii) Can be used in hazardous (highly flammable) places because they do not
generate electrical signals.
(ii) Give two examples of spreadsheet packages available in the market today. (2mks)
- MS excel.
- Corel Quattro Pro.
- Lotus 1-2-3
- Open office calc.
This involves changing the value of one of the arguments in a formula to see
the difference the change would make on the result of the calculation.
Cell. (1mk)
Formula. (1mk)
a new value.
Pie-chart. (1mk)
(d) State one way in which a user may reverse the last action taken in a spreadsheet package.
- Undo command
- Control + Z 1mk)
that to together produce a new value while a function is an inbuilt formula for
19. (a) Describe each of the following data processing methods and give an example of
would affect the events as they happen e.g. making reservations for
(i) Logical file and physical file – Viewed in terms of what data items it contain
and details of what processing operations may be performed on the data items. Physical
files is one that is viewed in terms of how data is stored on a storage
(v) Master file and back-p file – Master file is the main file that contains relatively
permanent records about particular items or entries. Back-up file is used to
hold copies of data or information from the fixed storage (hard disk)
Random – Also direct file organization records are stored randomly but accessed directly
on a storage medium. Indexed sequential records are stored and accessed
be minimized. (3mks)
- Use devices that directly capture data from the source such as bar code readers.
20. (a) Give two reasons why data and information in a computer system needs to be converted
- Higher number systems are used in computing to reduce the streams of binary into
manageable form.
(b) Explain two reasons for use of binary in digital technology. (2mks)
- Device a designed using binary logic are simple more reliable and consume the energy.
2 28 Rem 2 17 Rem
2 14 0 2 8 1
7 0 2 4 0
2 3 1 2 2 0
2 1 1 2 1 0
2 0 1 0 1
01110 +
Overflow 1
10112
2 3 1 2 4 1 2 3 0
2 1 1 2 2 0 2 1 1
0 1 2 1 0 0 1
0 1
79610 = 011110010112
Responsible for updating records in an international system and ensure data is organized
The process of recognizing an institution as being able to offer degrees and diplomas.
(ii) Explain two factors you would consider before enrolling for an ICT course in a
college. (2mks)
- Cost.
- Job opportunities.
- Where the examinations offered are recognized.
- The organization offering the course.
Marking scheme
Test paper 12
1. (a) Correct creation of a database. (10mks)
First name 2
Last name 2
Address 2
Job title 2
Amount 2
15mks
First name 1
Last name 1
Address 2
5mks