0% found this document useful (0 votes)
51 views11 pages

CS F4 Paper 2

Uploaded by

shammahmsy40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views11 pages

CS F4 Paper 2

Uploaded by

shammahmsy40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

ABOVE AND BEYOND

FIRST CHOICE GROUP OF SCHOOLS


GENERAL CERTIFICATE OF EDUCATION ORDINARY LEVEL
COMPUTER SCIENCE 4021/02
FORM 4 TIME: 2 HOURS 3O MINUTES
END OF TERM EXAMINATION 2024

TIME: 2 HOURS 3O MINUTES

INSTRUCTIONS TO CANDIDATES

Write your name, Centre number and candidate number in the space provided on the answer sheet/answer
booklet.

Answer ALL questions

If you use more than one sheet of paper fasten the sheets together

INFORMATION FOR CANDIDATES

Marks in all questions are shown in brackets [ ]

You are reminded to use good English and clear presentation in your answers

The total number of marks for this paper is 100

FIRST CHOICE GROUP OF SCHOOLS EXAMINATIONS BOARD ©


1(a) RAM is said to be volatile .What is meant by the term volatile?
…………………………………………………………………………………………………
………………………………………………………………………………………………… [2]
(b) State any 3 differences between RAM and ROM
…………………………………………………………………………………………………....
……………………………………………………………………………………………………..
…………………………………………………………………………………………………......
…………………………………………………………………………………. ……………...[3]
(c) State any one secondary storage device.
………………………………………………………………………………………………… [1]
2 (a) Describe the term Open Source Software and give one example.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………… [2]

(b) Explain any three advantages of using Open Source Software.


1……………………………………………………………………………………………………
……………………………………………………………………………………………………..
2……………………………………………………………………………………………………
…………………………………………………………………………………………………….
3…………………………………………………………………………………………………..
………………………………………………………………………………………………….[3]
3 (a) Most businesses have adopted e-business for carrying out their day to day operations.
Define the term e-business
……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………… [2]
(b) Give any three benefits of e-business to the business.
1.…………………………………………………………………………………………………
…………………………………………………………………………………………...............
2…………………………………………………………………………………………………..
…………………………………………………………………………………………………….
3……………………………………………………………………………………………………
………………………………………………………………………………………………….[3]

(c) Outline any three risks to the business for adopting e-business
1…………………………………………………………………………………………………..
……………………………………………………………………………………………………..
2……………………………………………………………………………………………………
……………………………………………………………………………………………………..
3………………………………………………………………………………………………........
………………………………………………………………………………………………….[3]
4 (a) What is an expert system?

……………………………………………………………………………………………………
………………………………………………………………………………………………….[2]
(b) Outline and explain any three components of an expert system.

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………….[6]

5 (a) What is a binary number and give one example.

……………………………………………………………………………………………………
………………………………………………………………………………………………….[2]
(b) Convert the following to denary. Show all workings.
(i) 1011

Answer …………………………………………………………………………………………[2]
(ii) 110101

Answer………………………………………………………………………………………… [2]
(b) Convert the following to hexadecimal numbers to binary. Show working
(i) D4

Answer………………………………………………………………………………………….[3]
(ii) 16F

Answer………………………………………………………………………………………….[3]
(c) With the aid of a diagram, illustrate the OR gate and the truth table.

[3]
6 (a) Discuss any two data verification techniques.
1……………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………...[2]
………………………………………………………………………………………………………………………
2……………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………...[2]
(b) List any three ways of protecting data from hackers.
1…………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………………
2………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………
3…………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………..[3]
(c) Outline any three measures an organization can use to recover lost data.

1……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………..
2……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………..
3……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………...[3]
7(a) Differentiate simplex and full duplex transmission mode.

……………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
………………………………………………………………………………………………………………….[4]

(b) Explain any two characteristics of twisted pair transmission media.


………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………...[2]

(c) List any three layers of the OSI model.


1……………………………………………………………………………………………………………………
2……………………………………………………………………………………………………………………
3………………………………………………………………………………………………………………….[3]

(d) Explain any two advantages of Internet.


1……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………..
2……………………………………………………………………………………………………………………
………………………………………………………………………………………………………………… [2]

(e) Describe the following devices required to set up a computer network.

Switch………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
Router……………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………...[4]

(f) What is an Internet Service Provider (ISP)?


……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………[2]
8 (a) Define feasibility study
…………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………...[2]
(b) Describe the Design stage of the SDLC.
………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………...[5]

(c) Outline the types of test data that can be used during program testing phase.
1…………………………………………………………………………………………………………………..
2……………………………………………………………………………………………………………………
3………………………………………………………………………………………………………………….[3]

9 (a) What is an algorithm.


……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………...[2]

(b) Describe any two features of an algorithm


1……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………..
2…………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………...[4]

(c) Write an algorithm for a program that determines if the number entered is an odd or even number.

[10]
(d) Differentiate the terms,
(i) Constant and Variable
……………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………...[2]
(ii) Local variable and Global Variable
……………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………………...
………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………[2]

10. Define a database .


………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………[2]
TOTAL 100

END

You might also like