Top Student Computer Predictions Qs
Top Student Computer Predictions Qs
COMPUTER PREDICTIONS
(SERIES 1)
FOR MARKING SCHEMES
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
17
18
B
19
20
TOTAL SCORE
SECTION B (60MARKS)
Answer question 15 and any other three questions
15. Study the flowchart below and answer the question that follow
(a) List the various outputs from the flowchart above. Show your working.
(5mks)
(b) Write a pseudo code for the flowchart. (6mks)
(c) State two advantages and disadvantages of high level languages. (4mks)
16. You are provided with two types of DTP tools
(R) (Q)
i) Give the formula that can be used to obtain product of B2 and D2. (lmk)
ii) State cell data type that represent cell B1 (1mk)
18 (a) (i) Explain three components of satellite (6mks)
(ii) State two advantages of 18 a(i) above media (2mks)
(iii) List three examples of radio waves signals (3mks)
(b) Explain two reasons why optical cables have become best choice for local area
network. (4mks)
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
Instructions to schools
The information contained in this document is to enable the headteacher of the school and
the teacher in charge of the computer studies (451) to provide adequate preparation for
this year’s computer studies practical examination, paper 451/2
Each school offering computer studies (451) should ensure that:
1. Each candidate is provided with a computer which has:
• A DVD/RW or a CD/RW disk drive.
• DVD/RW or CD/R or CD/RW
• The following software installed o DTP e.g. Ms publisher or
PageMaker o Word processor e.g. Ms word o Database e.g. Ms
Access
o Spreadsheet e.g. Ms Excel
2. There should be enough computers and fast printers to enable the candidates to
take the examination in NOT MORE THAN TWO SESSIONS.
3. Computers provided should be IBM compatibles.
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
INSTRUCTIONS TO CANDIDATES
a) Write your name and index no in the spaces provide above.
b) Sign and write the date of examination in the spaces provided above
c) This paper consists of TWO sections A and B
d) Answer all questions in Section A
e) Answer question 16 and any other THREE questions from Section B
f) This paper consists of 13 printed pages, ascertain if all papers are printed
SECTION A (40 MARKS)
Answer all the questions in this section
1. State two functions of each of the following computer keyboard keys as used in Ms
Word
(a) Shift key (2mks)
(b) Enter key (2mks)
2. Give a reason why an organization would be more secure to share files using
intranet instead of internet (2mks)
3. Explain the following disk management utilities
(a) Disk compression (2mks)
(b) Disk clean up (2mks)
4. Distinguish between special and embedded computers (2mks)
.exe (2mks)
File type-
Function -
(d) Nyokadi created a folder in local C with the following sub folders and files
C/>
Revision folder
(i) What will happen if an attempt is made to delete humanities folder while History file
is open (1mk)
(ii) State two advantages of this file organization structure (2mks)
For marking scheme,contact Mdm Mariam@0746711892
Page 11
(iii) Nyokadi copied this structure in a flash disk. He accidentally deleted Humanities
folder. He attempted to open the recycle bin to restore, but the folder was no where to
be found. Explain this phenomena. (1mk)
18. The worksheet below shows sales for the month of July by the employees of
Newtech information center. Use it to answer the questions that follow.
A B C D E F
1 First Second Sales in sh
name name
2 Yonah Kassim 2000.12510
3 Jose Kiddo 7200.1741
4 Kelvin Joro 1500.131
5 Lores Ayona 2600.1011
6 Bett Gilbert 2000.1200
7 Osoro Kiplat 1001.0113
8 Zainad Jad 500.1211
9 Hassan Makotti 400.10010
10 Jonnie Imran 3111.0110
11
12
Write the correct expression:
(i) In cell D3 that would print “PROMOTE” if the amount of sales is greater than
sh. 1600 and DEMOTE” if not (2mks)
(ii) In cell D3 that would print remark “WINNER” if sales are the highest and
“MEMBER” if not (5mks)
(iii) In cell D3 and D7 that would round the values in cell C3 into zero decimal place
and C7 into 2 decimal places (2mks)
(d) Explain the following cell data types in spreadsheet:
Labels (1mk)
Values (1mk)
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
Students enrollment
Student ID St name Sex Date Course
enrolled code
SECT- 01 Gladys Cherop Female 12/05/2011 D-SECT
INT – 03 James Mucheru Male 16/05/2011 D-INT
ACCT - 04 Peter Marangi Male 18/05/2011 D-ACCT
SECT - 06 Jane Kamene Female 17/05/2011 D-SECT
Exams offered
Exam code Ex name
01 Opener
02 Midterm
03 Endterm
Exam performance
Exam record Student ID Exam code Semester Score
no
1 SECT – 01 01 2 75
2 INT – 03 02 2 80
3 ACCT – 04 01 2 65
4 SECT – 01 02 2 70
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
<NAME>, <ADMNO>
<ADDRESS>
<TOWN>
Dear <NAME>
Name Class Adm. CAT CAT CAT Total Average Class Remark
No: 1 2 3 Position
Keya Beverly E 7984 80 70 59
Abonyo Ann W 7896 75 55 72
Baraka Jedida E 8092 86 59 75
Alenge E 7460 80 79 70
Catherine
Musihega W 7892 76 75 80
Carren
Hassan Eunice E 7800 38 48 25
Soita Naomi W 8490 37 51 29
Wafula W 8184 30 86 75
Phanice
Sisa Gentrix E 8082 25 27 20
Waithera E 8083 30 25 25
Scolastica
For marking scheme,contact Mdm Mariam@0746711892
Page 27
Siboboti Sarah W 8047 39 24 25
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
1. The computer processing cycle involves a four step process List them. (2mks)
2. The CPU consists of control unit and arithmetic logic unit State the functions of
the two units. (2mks)
3. Name and explain the two types of primary memory.
4. State the functions of the following keys in a computer key board
(i)Pause (lmk)
(ii)Function keys (lmk)
5. (i)Explain the importance of microphones combined with speech recognition
device such as voice output. (2mks)
(ii)State the main disadvantage of the above method of data input. (2mks)
6. The most popular type of electronic data storage currently is magnetic disk storage
such as hard disk or Winchester disk. Give reason as to why they are popular
(2mks)
7. Outline two advantages of hard disk over floppy disk. (2mks)
8. One stage of system development is system testing. Outline the advantages of this
stage before implementation. (1mk)
(a) Convert 111,011 2 to a decimal notation. (2mks)
(b) State one advantage of using binary number system in computers. (1mk)
9. State one function of each of the following terms. (3mks)
(i) Buffer
(ii) An accumulator
(iii) Cache memory
(iv)When using wizard to create a form. list four forms layout that you can use,
(2mks)
15. Distinguish between the following terms as used in DTP (4mks)
For marking scheme,contact Mdm Mariam@0746711892
Page 30
(i) Tracking and kerning
(ii) Stroke and fill
SECTION B (60 MARKS)
Answer question 16 and any other three questions from this section
16.(a) Define the following terms
(i) Structured programming (1mk)
(ii) Constants (1mk)
(iii) Variable (lmk)
(b)Distinguish between dummy data and real data as used in system testing (2mks)
(c)Mr. Nyongesa borrowed a loan of 200,000 from Ndege chai cooperative society at
a rate of 10%payable in 2 years flat rate. Draw a flow chart that can be used to
develop a computer program that will keep track of monthly repayments (5mks)
(d)Write the pseudocode for the flowchart in question (c) above. (5mks)
16. (a) Define the following computer crimes
(i) Piracy (lmk)
(ii)Industrial espionage (lmk)
(b) Explain two ways of protecting data and information against unauthorized access
(4mks)
(c) Explain two functions of network operating system. (4mks)
(d) Differentiate between a repeater and a router as used in computer networking.
(2mks)
(e) List down three duties of a computer trainer (5mks)
17. (a) Explain any two types of human computer Interface. (4mks)
(b) State four basic requirements of a standard computer laboratory (4mks)
(c) Out line three types of job opportunities that are available in the computing field
(3mks)
(d)(i) Differentiate between video conferencing and telecommuting as used in
communicating System. (2mks)
(ii) Highlight two advantages of telecommuting. (2mks)
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
10 45 89 90 20
2 45 70 80 45
3 89 90 90 20
4 78 9 90 50
5 67 89 60 90
6 67 90 7 80
7 34 78 70 90
8 23 50 38 90
9 23 15 67 20
DOS
BOARDING
10 Yes 20 JEMBE
2 No 11 PANGA
3 Yes 1 SLASHER
5 No 15 RAKE
6 Yes 22 BASIN
7 Yes 11 BROOMS
8 Yes 90 RAKE
(e)Design a query that would display the following fields as shown below and write
down the formulae for getting the total score and criteria for extracting the records
below (10 Marks)
Admin
•
After completing this chapter, students will be able to.
•
Explain why it is important to be computer literate
•
Define the term computer
•
Identify the components of a computer
•
Explain why a computer is a powerful tool
•
Differentiate among the various categories of software
•
Explain the purpose of a network
•
Discuss the uses of the Internet and the World Wide Web
•
Describe the categories of computers and their uses
CHAPTER OVERVIEW
This chapter presents a broad survey of concepts and terminology related to computers.
The idea of computer literacy is introduced. Students discover what a computer is and
what it does. They learn about the components of a computer, the power of computers,
computer software and networks and the internet. Categories of computers are
identified, including personal computers, minicomputers, mainframe computers and
super computers. Students find out how people employ computers from home users to
large business users. Finally they learn how people use computers to provide
information. Reading and understanding the material in this chapter should help
students better understand these topics as they are presented in more detail in the
following chapters.
The vocabulary of computing is all around you. Before the advent of computers,
memory was the mental ability to recall previous experiences; storage was an area
where you kept out-of-season clothing; and
When you hear the word computer, initially you may think of those found in the
workplace - the computers used to create business letters, memos, and other
correspondence; calculate payroll; track inventory; or generate invoices, In the course of
a day or week, however, you encounter many other computers. Your home, for instance,
may contain a myriad of electronic devices, such as cordless telephones, VCRs, handheld
video games, cameras, and stereo systems that include small computers.
Computers help you with your banking in the form of automatic teller machines (ATMs)
used to deposit or withdraw funds. When you buy groceries, a computer tracks your
purchases and calculates the amount of money you owe; and sometimes generates
coupons customized to your buying patterns.
Even your car is equipped with computers that operate the electrical system, control the
temperature, and run sophisticated antitheft devices.
Computers are valuable tools. As technology advances and computers extend into every
facet of daily living, it is essential you gain some level of computer literacy. To be
successful in today's world, you must have a knowledge and understanding of computers
and their uses.
(a).Hang indent the paragraph starting with 'the vocabulary of computing......'by 2 cms.
(3 Marks)
(b).Change the line spacing of text under 1.1 . Computer literacy to 2" and save the
document as : Literacy. (4 Marks)
(c). Change the title' Chapter 1: Introduction to Computers 'to toggle case (2 Marks)
(d). Animate the OBJECTIVES to have a blinking background save as A; Blink
(3 Marks)
(e) Print Computers and : Literacy. (2 Marks)
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
(a) What would the flow chart generate as output if the value of N at input was
(i) 6? (2mks)
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
INSTRUCTIONS TO CANDIDATES
-Type your name and index number in the spaces provides above
-Sign and write the date of examination in the spaces provided in the answer
sheet Password should not be used while saving in the Compact disk.
-Answer all questions.
-Make a print of the answer sheet provided -
-Hand all the print out and the Compact
disk.
(h) Create a query to display the following details: Adm no, First name, Last name,
Fee paid.
Save as FEE PAID. (5mks)
(i) Display a list showing the Last name and the Fee balance for all students who
owe the college over 10,000/= given that the total fees for each course is 30,000.
Save as SEND
HOME. (5mks)
(j) Certificates are to be given only those who have completed their course and
have paid the full amount. Create a query, having the Adm No, First name, Last
name and course for all students to be awarded the certificates. Save as
GRADUANTS. (5mks)
(k) Prepare reports for STUDENTS DETAILS, FEE PAYMENT, FEE PAID,
SEND HOME,
QUESTION 2(50MKS)
PK is new transportation company. The managing director would like to produce
an advert to enable him to reach out to local towns.
a). Prepare a publication layout with the following specification:
(i) Paper size A4
(ii) Orientation Portrait
(iii) Number of pages 1
(iv) Margins 0.5 inches all round
(v) Create column guides to subdivide the page into two columns
(vi) Space between columns 0.3 inches (6mks)
b). Produce the publication as shown in the sample. All the text are in Times New
Roman size 12 except.
(a) PK in the logo Size 28
(b) Unbeatable Size 20
(c) You can’t compare Size 14
(d) Working hours Size 22
(e) Passenger Ticket shading is Accent 4
(f) Fill pattern for working hours is 5% (44mks)
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
A 1 -15
B 16
17
18
19
20
TOTAL SCORE
1 WESTLINK COMPUTER
BOOKS CENTRE
2 TITLE PRICE NO. SOLD COST
10
i) Write down the formula used to find the price of the cheapest book. (1mk)
ii)Write down the formula used to determine the total sales for the book titled’ computer
applications (1mk)
iii)Write down the formula used determine the average price of the all books (2mks)
d)State any four advantages of using an electronic spreadsheet as compared to a
traditional spreadsheet. (2mks)
e)Differentiate between a column chart and a bar chart as used in spreadsheets (4mks)
f)Define the term gutter in relation to column setting in DTP (1mk)
18. a) Name and describe four main application areas of artificial intelligence in ICT
(12mks)
b) State three advantages of automated production in manufacturing industries.
(3mks)
19 a) Describe any two roles of the following career opportunities in the ICT field
(8mks)
i) Systems analyst
ii) Information system manager
iii) Network administrator
iv) Computer trainer
b) Distinguish between a primary key and a foreign key as used in DBMS. (2mks)
For marking scheme,contact Mdm Mariam@0746711892
Page 51
c) What do the term header and footer mean? (2mks)
d) What do you understand by the terms attenuation and baseband signal. (2mks)
20. a) Define the following terms. (3mks)
i) Record
ii) File
iii) Database
b) i) List any three ways of dealing with a virus on a computer. (3mks)
ii) Explain the functions performed by (2mks)
a) The control unit
b) Arithmetic and logic unit (ALU)
c) Convert the 5228 to its base 10 equivalent (2mks)
d)Using long division methods convert 6710 into binary. (2mks)
e)Outline three disk management activities. (3mks)
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
1 50
2 50
1. The information below was extracted from CMC vehicle selling business
Buyer Buyer Buyer Vehicle Vehicle Vehicle Vehicle Buyer Amount
Name Address Town Reg Type Make price Number paid
NO
peter 254 Nakuru KAJ Matatu Nissan 1200000 B001 800000
001
john 678 Eldoret KAJ Bus Mazda 2400000 B002 2000000
002
Ken 963 Nairobi KAJ Saloon Toyota 800000 B003 600000
003
Peter 147 Nakuru KAJ Pick up Peugeot 1000000 B004 700000
004
Roy 456 Bungoma KAJ Lorry Isuzu 3000000 B005 2000000
005
Glen 789 Webuye KAJ Pick up Toyota 1800000 B006 1600000
006
John 678 Eldoret KAJ Bus Scania 7500000 B002 7500000
007
Ken 963 Nairobi KAJ Matatu Toyota 1300000 B003 1300000
008
Phillip 159 Kisumu KAJ Saloon Nissan 900000 B007 900000
009
Peter 254 Nakuru KAJ Pick up Isuzu 1500000 B001 1200000
010
Ken 357 Kisumu KAJ Saloon Peugeot 700000 B008 700000
011
Glen 789 Webuye KAJ Bus Isuzu 10000000 B006 9500000
012
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
1. Write your name and index number in the spaces provided above
2. This paper consists of two sections A and B.
3. Answer ALL questions in section A.
4. Answer question and any other THREE questions from section B.
5. All answers should be written in the spaces provided on the question paper.
A 1 - 15
B 16
17
18
19
20
TOTAL SCORE
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
QUESTION ONE
(a) Create a new database, save it on a removable storage medium and name it school
database
(b) Create a Table in the school database with the following (3mks)
FIELD NAME DATA TYPE FIELD SIZE/FORMAT
ADM-NO Text 10
Name Text 15
Surname Text 15
Tel - No Number Long Integer
Date of Birth Date/time Medium date
Fee – Paid Currency Currency
Foreigner Yes/No Yes/No
For marking scheme,contact Mdm Mariam@0746711892
Page 62
(c) Make the “ADM_Number” Field as the Primary Key (2mks)
(d) Save the table as Student’s Table (2mks)
(e) Open the “Students Table” and enter the following records (3mks)
ADM - Name Surname Tel - Date of Fee - Foreigner
NO. No. Birth paid
4567 John Maina Muiru 55- 19/09/1990 25000 No
67543
4576 Mary Mutua 44- 20/12/1991 27000 No
Nthenya 23456
4398 Mark Okech Otieno 22- 13/03/1992 20000 No
65473
5678 Peter Rick Ben 11- 15/06/1994 29000 Yes
76742
4378 Joan Liz Patel 13- 18/09/1990 26000 Yes
89734
4897 Peter Amos Ben 33- 17/04/1993 20000 Yes
37482
4643 Muoka Nzioki 44- 12/12/1991 23000 No
Muoki 45362
(f) Insert the record given below as record 4 (2mks)
4120 Rabecca Kalewa Ben 44-24242 13/10/1900 27000 No
(g) Delete Mary Nthenya record from the database file (2mks)
(h) Sort the table in Ascending order by surname (2mks)
(i) Move the Date - of- Birth and Tel - No fields so that the Date - of- Birth field is
now directly after the surname field (4mks)
(j) Change the field size of the Surname to 20 (lmk)
(k) (i) Create a Form with all fields on the Students Table (2mks)
(ii) Name the form Students Entries (lmk)
(iii) Insert unbound control named fee - Balance to show the fee balances of all
students given the total fee is 35000 and Fee - balance = Total _Fee - Fee
_Paid (4mks)
For marking scheme,contact Mdm Mariam@0746711892
Page 63
(1) Insert a picture in the form in way that all text is visible (3mks)
(m) (i) Create a report based on the Student’s Table showing the Fields Name,
Surname and Tel No. (3mks)
(ii) Name the report Telephone list (lmk)
(n) Insert a picture in the report Header (2mks)
(o) (i) Create query _l showing all fields of those students whose surname is Ben
(4mks)
(ii) Create query _2 showing all fields of those students born after 1991 (3mks)
(iii) Create query 3 showing only the Student’s Name, Student’s Surname and
Student’s Date of birth (3mks)
(p) Print Students tables Entries form, Telephone list, query_1, query_2 and
query_3. (3mks)
QUESTION TWO
Using DTP software, create the following document as it is. Save it as software in drive
A. Print your publication. (50 marks)
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
451/1
COMPUTER STUDIES
Paper 1
(THEORY)
July / August 2012
Time 2 ½ HOURS
451/1
COMPUTER STUDIES
Paper 1
(THEORY)
July / August 2012
Time 2 ½ HOURS
• Write your Name, Index Number and School in the spaces provided above
• This paper consists of Two sections A and B.
• Answer ALL questions in Section A.
• Answer question 16 and any other THREE questions from Section B.
• All answers should be written in the spaces provided on the question paper..
2. With reference to quality of print, noise, level and cost, compare a dot matrix with a laser printer.
(3mks)
7. Computers process digital data through a process called coding. State and explain three coding
systems. (3mks)
(b) Write the following formulae as absolute with reference to cell G20, = F 10 + G20. (lmk)
9. Define modular programming and state two advantages of modular programming. (2mks)
10. While using a word processor, you realize that the contents of the document don’t fit on one page.
They exceed to the other page by three lines. Suggest three possible ways you can make the
document fit one page. (3mks)
11. State the function of each of the following:
(a) Network protocol (lmk)
(b) Hub (lmk)
12. Differentiate between the following pairs as used in database design.
(a) Validation rule and validation text (2mks)
(ii) 1? (2mks)
(b) Write a Pseudocode that does the same thing as the flowchart above. (7mks)
17. (a) Describe the ways in which a computer can represent a positive and negative number.
(2mks)
(b) A particular computer stores numbers in a single 8 — bit word. How would it represent
O.312510?
NAME……………………………………ADM NO…………………………………
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
INSTRUCTIONS TO CANDIDATES
• This paper consists of TWO Sections A and B
• Answer all questions in Section A
• Answer question 16 (compulsory) and any other THREE question in section B
• All answers should be written in the space provided in the question paper
16
B 17
18
19
20
Total Score
1. (a) A computer laboratory should be constantly kept dust and smoke free.
Specify two effects that dust would have on the operation of computers.(2 marks)
(b) Why should you first switch on the UPS before switching on the system unit and
the monitor? (1 mark)
2. Explain the meaning of backup. (2 marks)
3. State the following types of transcription errors. (2 marks)
(a) 3455 instead of 345
(b) Smith instead of simth.
4. (a) State three ways used to represent a negative number. (3 marks)
(b) Perform the following binary arithmetic giving the answer in decimal notation.
1110.0111 + 1101001.011 (2 marks
5. Distinguish between data privacy and data integrity as used in computing. (2 marks)
6. Differentiate between a primary key and a foreign key while designing a database.
(2 marks)
7. Distinguish between ‘count’ and ‘countif’ functions as used in spreadsheets.(2 marks)
8. Match the following statements with repeater, router or a bridge. (2 marks)
STATEMENT DEVICE
(a) Operates at data link layer
(b) Determine the best path for data to follow
(c) Regenerates signals
(d) Forwards everything which it doesn’t
recognize
Answer question 16 (compulsory) and any other THREE questions from this section.
16. (a) Study the flowchart below and answer the questions that follows.
Start
Enter: N, M
= M: Y = N
N, M
P = y - : Q = - y
PRINT: P, Q, , y
Stop
(i) State the name of the control structure shown in the flowchart.(1 mark)
(ii) Assuming the user keys in 8 and 14 when prompted to enter the values for
m
and N respectively, determine the printed values of P, Q, and y.(4 marks)
(iii) Write the pseudocode that would be used in place of the flowchart.
(5 marks)
(b) What is the difference between looping and selection. (2 marks)
(c) Name the stage of program development cycle when: (3 marks)
(i) A user guide would be written.
(ii) A programmer dry-runs the code.
(iii) System charts would be drawn.
17. (a)What is Virtual reality? (1 mark)
(b)Explain the following interactive sensory equipment used in virtual reality.(2 marks)
(i) Head gear.
(ii) Body suit.
(c) (i) What is Artificial Intelligence? (1 mark)
(ii) State and explain three components of an experts system. (6 marks
(d) Most computerized security systems make use of Biometric analysis, name three
physical features of human beings that can be considered in this analysis.
18. (a) Explain two coding schemes used in data representation techniques. (4 marks)
(b) Using one’s and two’s complement work out 14 – 9.
(i) One’s complement. (2 marks)
(b) Explain the following terms as used in disk management using operating system:
(i) Disk defragmentation. (2 marks)
(d) State two properties that an operating system displays about a file. (2 marks)
20. (a) The diagram below shows four common network topologies A, B, C and D.
A B
X
(c) Describe the following network services and identify their applications.(4 marks)
(i) Voice mail.
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
A) using an appropriate word processing, type the following passage and save it in
diskette as DATA SECURITY (10mks)
Data security and control
External threats
i) Fire. Floods, earthquakes and other natural disasters, These are the
potential threats hut are not the most common external problems,
ii) Theft of equipment- theft of pc’s laser printers and even memorychips
after a Break into a building are very common.
iii) Espionage (intelligence) - information in the wrong hands can do a lot of
damage. Example access to a payroll or accounting information is
restricted so such information should be shielded from external and
internal spies.
Internal threats
Internal threat would include
i) hacking
ii) Fraud
iii) Hardware failure
iv) Corruption of databases
Viruses load and run without the user requesting them to run: and cause
considerable damage e.g.
i) Modifying other program
ii) Hiding inside other programs with an aim of spreading to other
machine
iii) Destroying data and programs.
It is a computer code which usually designed to carry out two tasks:
i) To replicate itself’ from one computer s stem to another.
ii) To locate itself’ within a computer system in such a way as to make it
possible for it to amend or destroy programs and data files, by
interfering with the normal processes of the operating system.
Questions
(i) Copy the original document (data security) to the next page. (2mks)
(ii) Format the headings as follows: (6mks)
Front Font type Underline bold
Size
Data security and 14 Times New Yes Yes
control Roman
External threats 14 Monotype None Yes
corsiva
Internal threats 14 Default Yes No
SECURITY
The following is a worksheet extracted from business Join venders.. They have come
together to do a business of selling computer accessories.
Names Cost Sales Gross Expenditure Reserves Net Remarks
profit profit
Benson 700 350 450
Betwel 400 700 50
Kimwat 200 900 200
Amos 300 1000 300
Tembur 100 500 100
Korir 400 600 40
Towett 600 850 55
Maritim 500 350 70
Kerich 200 350 45
Beney 500 1000 40
Danson 600 900 170
Kones 900 1000 20
Koech 100 800 130
Additional Information.
(a) Gross profit = Sales - Cost
(b) Net profit = gross profit – (expenditure + reserves)
(c) Reserves = 10% gross profit
(d) Remarks are: “very good vendor,” “good vendor” “domain vendor” burden vendor”
“Quite vendor”
REQUIREMENT
(i) Create the workbook and enter the details, save as vendor (15mks)
(ii) a) Keep the title of the workbook to be JOIN VENDORS and format it to
be bold, font size 14 and align at 200 (4mks)
b)Format the figures in sale column to 2 decimal places (2mks)
c)Insert two rows between Tembur and Korir and enter the records below:
(5mks)
- Name Bii, cost l00, sales 500 and expenditure 10.
- Name Mutai. cost 800. sales 2000 and expenditure 80.
(iii) Use sum function to calculate gross profit for each member (3mks)
(iv) Use product function to calculate reserves for each member (3mks)
(v) Use “IF function” and net profit to analyses the vendors, taking the following
remarks: (6mks)
(a) If net profit >=500, then “very good vendor”
(b) If net profit>400, then “good vendor”
(c) If net profit <= 300, then “domain vendor”
(vi) (a) Use names of the vendor and cost to insert a line graph. keep the
title of the graph to be PRODUCTIVE ANALYSIS, format it
and place it in a
separate sheet. (5mks)
(b) Save the changes as productive analysis (2mks)
(c) Print the “Join vendor” and “productive analysis” including gridlines
(4mks)
NAME……………………………………ADM NO…………………………………
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
A 1-15
B 16
17
18
19
20
TOTAL SCORE
SECTION A: (40 MARKS)
Answer all the questions in this section
1. A computer should be connected to a stable power supply. Highlight two reasons.
(2marks)
2. (a)Give four characteristics of cathode ray tube monitors. (2
mark)
(b)Name two examples of flat panel display (FPD). (2 marks)
3. Optical storage media are preferred as compared to magnetic media give
four reasons. (2
mark)
4. Many organizations nowadays use in-house developed programs. Highlight
four disadvantages of standard software over in house developed, software. (2
marks)
5. Briefly explain classification of operating system by human computer interface.
(3 marks)
6. Differentiate the following:
(i) Insert mode and type over mode (2 marks)
(ii) Text alignment and indentation.
(2 marks)
7. (a) Explain the functions of the following spreadsheet inbuilt functions.
(i) SUM IF (1 mark)
(ii) COUNT (1 mark)
(b)Explain the following errors as displayed in a spreadsheet cell (2 marks)
i) ####
ii) ## NAME!
iii) ##NUM!
iv)## DIV/O!
8. Controls in database can either be bound or unbound. Explain. (2
marks)
9. State three ways of moving round the page in a desktop publishing window.
(3 marks)
10. Why is it difficult to detect and prevent computer crimes? Give four reasons.
(2 marks)
11. Mrs. Jane decided to use electronic data processing method to analyze her data.
Highlight four
factors to consider while choosing the method to use. (2 marks)
(a) State two disadvantages of mesh topology. (1 mark)
(b)Name two functions of network operating system. (1 mark)
12. (a) Define the term Artificial Intelligence. (1 mark)
(b)List four areas where artificial intelligence is applicable (2 marks)
13. (a) Give four features of micro computers and ICT in future. (2 marks)
(b)Name two advantages of automated manufacturing. (1 mark)
14. Highlight three type of job opportunities that are available in the field of
computer software.
(3 marks)
SECTION B (60MKS)
Answer question 16 compulsory and any other three questions from this section
I 6. (a) Define the following terms
(i) Structured programming (I mark)
(ii) Constants (I mark)
(iii) Variable (l marks)
b) Distinguish between dummy data and real data as used in system testing
(2 marks)
c)Mr. Etarukot borrowed a loan of 200,000 from Akukuranut cooperative society at
a rate of l0%payable in 2 years flat rate. Draw a flow chart that can be used to
develop a computer program that will keep track of monthly repayments. (5mks)
d)Write the pseudo code for the flowchart in question (c) above. (5mks)
17. (a) Define the term simulation. (1 mark)
(b) Highlight four areas where simulation is applicable. (2
marks)
(c) Give four disadvantages of a good system analyst.
(2 marks)
(d) Name four qualities of a good system analyst. (2
marks)
(e) What do you understand by the term Artificial Neural Network? (2
marks)
(f) Give two features of neural networks. (2
marks)
(g) Explain the following conditions
(i) Computer Vision Syndrome (CVS) (2
marks)
(ii) Repetitive Stress Injury (RSI) (2
marks)
18. (a) Briefly explain the following terms as used in networking. (2 marks)
(i) Distributed processing. (2 marks)
(ii)Remote communication. (2 marks)
(b) Many people today prefer use of cell phones instead of fixed lines. List four
advantages of cell phones. (2 mark)
(c) Distinguish between logical and physical network topology (2
marks)
(d) A school decided to replace its administration system. The current system
had restricted reporting facilities. The school is considering using parallel
running and direct changeover.
(i) Explain the terms parallel running and direct changeover.
(2 marks)
(ii) Give four disadvantages of direct changeover
(e) Name three tasks carried out during system changeover. (2
marks)
19. a) Give and explain two computational errors committed during data
processing. (2 marks)
(b) Highlight four ways of minimizing threats to data integrity. (2
marks)
(c) Name three risks associated with distributed data processing system.
(3 marks)
(d) Differentiate between logical and physical computer files. (2
marks)
(e) Give two advantages of compiling a program rather than interpreting it.
(2 marks)
(f) Highlight four errors detecting methods used in program development.
(2 marks)
(g) Give four benefits of structural programming. (2 marks)
20. (a) Internet connects millions of computers and telecommunication devices that
have different
software and hardware configurations.
(i) Explain how these devices work together. (2 marks)
(ii) Name four telecommunication devices used. (2 marks)
(b) Outline four ways of preventing piracy with regard to data and information.
(2 marks)
(c) Perform the following operations.
(i) 7ABEX to denary. (2 marks)
(ii) 3710 -1310 using two’s compliment giving your answer to 8 binary
digit. (3 marks)
(d) List and explain the three parts of the window taskbar. (3 marks)
(e) Give two reasons why the hard disk may be partitioned. (1 mark)
NAME……………………………………ADM NO…………………………………
SCHOOL…………………………………..CLASS…………………………………
DATE………………………………………
INSTRUCTIONS TO CANDIDATES
-Write your name and index number in the spaces provided above.
-Sign and write the date of examination in the spaces provided above.
-Write the name and the version of the software used foe each questions attempted in the
answer sheet
-Answer all the question
-All questions carry equal marks
-Passwords should not be used while saving in the diskette/removable media.
-All answers must be saved in your diskette/removable media
-Make a print out and tie /staple them together
-Hand in all the printout and the diskette/removable media
1. A consultancy firm keeps its details in a computer database. The information below
contains details obtained from two tables of the database. Study the tables and
answer the questions that follow.
EMPLOYEE EMPLOYEE DEPARTMENT JOB SALARY
ID NAME TITLE
7369 Mark Koech Research Clerk 48,000
7499 Philip Meme Sales Sales Salesman 16,000
7521 Mohamed Ali Research Salesman 12,500
7566 Kennedy Operating Manager 39,750
7698 Simiyu Operating Manager 38,500
7782 David Kamau Accounting Manager 34,500
7788 Titus Ole Research Analyst 30,000
7821 Simiani Operations Analyst 25000
John Onyango
Patel Shah
Department table
DEPARTMENT DEPARTMENT LOCATION
CODE NAME
10 Accounting Nairobi
20 Research Nakuru
30 Sales and marketing Mombasa
40 Operations Kisumu
Required
(a) Create a database that can be used to store the above data and save it
as ALMAC in the disk provided.
(l0mks)
(b) Using appropriate key and foreign keys, create a relationship between
the two tables. Enter referential integrity between the tables.
(4mks)
(c) Validate the primary key entry to exactly four and two character for the
employee ID and dept code fields respectively. (4mks)
(d) Create a form for each table and use it to enter records shown in the
tables above. Save the form as employee form and depart form
respectively.(8mks)
(e) It is required that the dates on when the employees were hired be
included in the database. Koech was hired on 10/6/98, Merne in 15/8/96,
Muhammed in 16/3/96, Onyango on 9/3/03, the rest were hired on 13/3/04.
Insert a new field name it date of hire in the employees table and enter the
records.(8mks)
(f) (i) Create a query that displays employees who were employed after
year 2000. Save the query as LATEST EMPLOYEES.
(8mks)
(ii) Sort latest employees query in ascending order using the employee’s
name. (2mks)
(g) Create a report that dispays the employee name, job title, department, name
and salary, grouped according to location. Save the report as EMPLOYEES
REPORT. (4mks)
(h) Print
(i)Employees and department tables designs
(ii)Employee and department forms
(iii)Latest employees query
(iv)Employees report. (2mks)
2. The following is an extract of soil samples collected from a given agricultural
station in kilograms (KG)
Figure 1