Computer Revision
Computer Revision
INTRODUCTION TO COMPUTERS
1. (a) Clearly define a computer
- A computer is an electronic device that operates (works) under the control of programs stored
in its own memory unit
- An electronic device that accepts data, as input and transforms it under the influence of a set of
special instructions called programs, to produce the desired output (referred to as information)
(b) Give one reason why a computer is referred to as an electronic device
- It uses electrical signals to process data
- It is made up of electronic components and uses electric energy to operate
2. Explain the following terms as used in computer science
(i) Data
A collection of raw facts, figures or instructions that do not have much meaning to the user
(ii) Program
A computer program is a set of related instructions which specify how data is to be processed
A set of instructions used to guide a computer through a process
(iii) Data processing
It is the process of collecting all terms of data together & converting them into information
(iv) Information
Data which has been refined summarized & manipulated in the way you want it, or into a more
meaningful form for decision- making
3. State any three functions of a computer
- Accepting data
- Processing the data
- Producing information
4. Explain the following input/ output terms as used in computer systems. Give an example for each
(a) Read - To transfer data from an input device to the computer, e.g. the computer
Reads data from a disk, a keyboard, etc
- To move or copy data from backing storage to the main
Storage
(b) Write - To transfer information from the computer to an output
Device e.g. the computer writes output on a printer or onto a disk.
- To move or copy data from the main storage to a backing storage
1
- Motherboard
- Power supply unit
- Main memory
- Hard disk
- Disk drives
- Battery
- Buses
- Input/ output ports
- Video card
- Expansion slots
(c) Give two differences between tower – style and desktop system units
- Tower style system unit is designed to stand alone or to be placed on the floor, desktop
units lie on the desk with the monitor placed on top
- Tower style units have more space for expansion than the typical desktop unit(2 mks)
7. Computers have evolved through a number of generations. List any 4 characteristics of the first
generation of computers.
- Large in physical size
- Relied on thermionic valves (vacuum tubes) to process and store data
- Consumed a lot of power
- Produced a lot of heat
- The computers constantly broke down due to the excessive heat generated; hence were
short- lived, and were not very reliable
- Their internal memory capacity/ size was low
- Processing speed was very slow
- Very costly
- Used magnetic drum memory
2
- Used integrated circuits in their memory
- They were faster than second generation computers
- RAM memory capacity was 2 GB
- Slightly smaller in size than 1 & 2nd generation computers
st
10. State the differences between desktop computers and laptop computers
- Desktop is designed to be used when placed on a desk in an office environment. A
laptop can be used comfortably when placed on the User’s lap
- A laptop is small & portable; desktop computers are not portable
(b) Give two reasons why smaller computers like Laptops tend to be more expensive than
Desktop computers
- The technology of producing smaller devices is expensive
- They are convenient because they are portable
- They have advanced power management capabilities (they consume less power since a
laptop can operate on rechargeable batteries
12. Which category of computers would you place an N- series Nokia phone
3
- Microcomputer/ palmtop
15. State a specific example where each of the following types of computers can be used
(a) Supercomputer
- Weather forecasting
- Petroleum research
- Defense and weapon analysis
- Aerodynamic design and simulation
4
16. (a) Define a microcomputer ( 1 mk)
- A computer who’s CPU (processor) has been implemented with a microprocessor
17. Explain four reasons which make microcomputers suitable for personal computing work
- Reduced cost, i.e. are cheaper than the minicomputers & mainframe computers
- Have high processing speed
- Are small in size (occupy less office space)
- Are more energy efficient (i.e. consume less power)
- Are more reliable in doing various functions than the early mainframe computers
- Are versatile (i.e. can be used for many different tasks)
18. (a) Identify and explain five areas where computers are used to process data ( 10 mks)
Supermarkets
- For stock control i.e. records of what is in store, what has been sold, and what is out of stock
- For calculating customer’s change
- For production of receipts
- It can be used as a barcode reader
Banks
- Manage financial transactions through the use of special cash dispensing machines called
ATMs used for cash deposit & withdrawal services
- Processing of cheques
- For preparation of payrolls
- Better record keeping & processing of documents
- Provide electronic money transfer facilities
Homes
- Entertainment e.g. watching movies, playing music, playing computer games
- For storing personal information/ documents
- For calculating & keeping home budgets
Industries
- To monitor and control industries processes through the use of robots
- For management control, i.e. to keep track of elders, bills and transactions
- For advertisement purposes, which enable an industry to attack more customers
Police stations
- Matching, analyzing & keeping databases of fingerprints
- For taking photographs & other identification details
- For record keeping
5
- For face recognition, scene monitoring & analysis which help the police carry out criminal
investigations speedily
Transport industry
- Airports; to control the movement of aircrafts, their take off & landing using radar equipment
- For making reservations (booking purposes)
- Storing flight information
- Automobile traffic control; to monitor vehicle traffic in busy towns
- In Railways corporations; to coordinate the movement of goods & wagons
- In shipping control, for efficient management of fleets, cargo handling & communication
Offices
- For receiving & sending of information through e- mails, fax, etc
- Production of documents
- Keeping of records
21. List down three safety precautions one should observe when entering a computer laboratory
(3 mks)
- Avoid smoking or exposing computers to dust
- Avoid carrying foods & drinks/ beverages to the computer room
- Avoid unnecessary movements as you may accidentally knock the peripheral devices
- Only authorized people should enter the computer room
- Computers users should be trained on how to use computers frequently
- Computer illiterates should not be allowed to operate the computers
- collect any waste papers which might be lying in the computer room & put them into the
dustbin
- Shut the door of the computer room properly
22. Describe the ideal environment for a computer to work properly (3 mks)
- Should be free from dust, water and magnets
- Should be kept in well ventilated rooms with optimum (medium) humidity
23. Explain why smoke and Dust particles are harmful to a computer
6
- Dust and smoke particles settle on storage devices and may scratch them during read/ write
operation
- It affects the cooling of the computer
24. Identify three facilities that will ensure proper ventilation in a room
- Large & enough windows and doors
- Installing fans
- Installing air conditioning system
- Avoid overcrowding of either machines or people in the room
25. Why must foods and beverages be kept out of the computer room?
- Food particles may fall into the moving parts of the computer and damage them. Liquids may
spill into the computer parts causing rusting or electrical faults
26. Why would it not be good to install Powder or Water – based fire extinguishers in the computer
room?
- Powder particles settle on storage devices and may scratch them during read/ write operation
- Water causes rustling of metallic parts and short – circuits if used
27. (a) State one reason why a computer needs to be connected to a stable power supply
(1 mk)
- To prevent damage to the computer’s secondary storage media
- To avoid damage and loss of important data or information such as application software stored
on the media
- Prevent loss of data/ information that had not been saved before the failure
(b) List down four functions of the uninterruptible Power Supply (UPS) (4 mks)
- It prevents sudden power surges that might destroy the computer
- It supplies power to the Computer during blackouts and brownouts
- It provides stable (clean) power supply
- Alerts the user of power loss (by beeping)
- Allows the user to save his/ her work, and switch off the system using the correct procedure
28. Mention two things that are likely to cause strain- in the computer room
- Poor lighting of the room
- Bright monitors
- Flickering monitors
- Very bright wall paints reflect too much light
29. Identify three proper sitting postures while using the computer
- Adopt relaxed and straight back position to avoid bending forward or learning far backwards
- The feet should be firmly placed flat on the floor
- The seat must be high enough allowing the eyes to be the same level with the top of the
Screen
- The seat must have a straight backrest that allows someone to sit upright. This prevents muscle
pains & backaches caused by poor sitting posture
- The height of the chair or working surface must be high enough such that your forearms are
parallel with the floor and your wrists are straight.
- The seat must be high enough relative to the table to enable the user use the hands on the
peripheral devices comfortably.
30. State two methods of minimizing dust in a computer laboratory
- Fit the computer room with special curtains to reduce entry of dust particles
- Cover the floor with carpets in order to absorb dust
- Regular cleaning of the laboratory
7
- Cover the computer devices with dust covers when cleaning the room
31. Name two main causes of fire in the computer laboratory and give the precautions that should be
taken to guard against them
- Inflammable chemical such as those used to clean the computer equipment
Keep the chemicals away in store after use
- Open wires/ cables
- Ensure that all electrical wires are properly insulated
- Ensure that the computer room has a gaseous fire extinguisher containing carbon dioxide in
case of any accidents
- Smocking
33. List three things that can spoil a printer if they are not of the correct specification, and explain
what damage may be caused
(i) Printer Paper: Different printers have different sensitivity to printing papers. Using the wrong
quality paper in a particular printer can make the paper get stuck
(ii) Cartridges & Ribbons: Printers are very specific to manufacture’s cartridges & ribbons
Use of clones or imitations ( i.e., the wrong make & model) can damage the printer mechanism
(iii) Refilling of cartridges or re- inking of ribbons: It can spoil the printer due to leakage or use of
poor quality materials
34. Explain three ways that computer technology could make office more efficient (3 mks)
- There is easier & faster retrieval of data, i.e. they reduce the time and effort needed to access
and retrieve information
- Increased accuracy of data
- Better presentation of data
- Ensure faster processing of data
- Ensures economic use of storage space
35. (a) Explain the steps you would follow to set up a new computer
- Gently and carefully connect the interface cable of each device to the correct port and to the
device.
- Connect the computer to the source of power and switch it on.
- Observe boot up information on the screen to see whether Power-On Self Test (POST) displays
any error message. A successful boot means that the computer was properly setup.
(b) Outline three reasons why it is important to first shut down the computer before turning it off
- To avoid damaging storage devices that may still be in use
- To avoid damaging system and application files
- To avoid loss of data and information ( 3 mks)
36. A computer must go through the process of booting/ initialization before use
(a) Briefly explain the term “computer booting”.
Booting refers to the starting up of a computer. It is the entire process that makes the computer
ready for use.
(b) Explain what happens in the computer during the booting process
8
When the power is switched on, internally, it first checks whether all the components are in
good working condition, i.e. the RAM, CMOS (BIOS), hard disk & floppy disk drive
controllers, and the keyboard. If no problem is found, it then loads the operating systems
(b) List four types of keys found on a computer keyboard, giving an example of each
(4 mks)
- Function/ command keys (F1- F12)
- Alphanumeric Keys (A-Z, 0-9)
- Numeric keypad (0-9)
- Cursor control keys (PgUp, PgDn, Home, end, Arrow keys)
- Special PC keys (Ctrl, Shift, Alt, Ins, Enter, Spacebar, Caps lock, Num
lock, etc)
- Editing keys (Del, Backspace, and spacebar)
(c) Name the keyboard keys that will help you: (2 mks)
(i) Type the upper character in a key - SHIFT Key
(ii) Execute a selected command - ENTER Key
COMPUTER SYSTEMS
1. Define the following terms as used in computing
(i) System
A collection of independent entities that collectively work together to achieve a desired goal
(ii) Computer system
A collection of entities that work together to process and manage information using computers
A collection of hardware software and live- ware all working together in data inputting,
processing and production of required output from a computer
2. Differentiate between a computer and a computer system
A computer is made up of both hardware and software, while a computer system integrates
hardware, software and user
3. (a) List and explain three functional elements of a computer system ( 6 mks)
Hardware
9
They are the physical & tangible devices that make up a computer systems, e.g system unit,
input devices, output devices and storage devices
Software
These are programs & data used in a computer system that enable it perform a number of
specific functions, e.g. operating systems, application programs, utility programs, programming
languages & device drives
10
4. (a) Give two main functions of a computer input device. (2 marks)
- Accepts data & instructions from the user and sends them into the CPU. V
- Converts data into a form that the computer can understand (i.e., machine-
Sensible/readable form)
(b) Give an example of a: (3 marks)
(i). Device that reads data (scanning device).
- Scanner,
- Digital cameras,
- Barcode readers.
~ Credit/smart card readers,
- Kimball tag readers.
- OMR, OCR, MICR, etc
(ii). Keying device.
- Keyboard,
- Keypad.
OH). Pointing device.
- Mouse.
- Trackball.
- Light pen
- Joystick.
(h). Voice input device.
- Microphone.
(v). Printing device.
- Printer.
- Plotter.
5. State two advantages of using a mouse instead of a keyboard. (2 marks)
- The mouse is easy & convenient to use.
- Modern software includes an option to use it.
- It selects a position on screen much more quickly than a keyboard.
6. Outline any two advantages of a light pen as an input device, (2 marks)
- It is a faster input device because it involves just pointing on the screen and selecting options.
- Can be used to draw images on the screen.
~ It is light and easily portable (saves energy).
- A light pen will result in few errors.
7. (a) What are computer scanning devices? (2 marks)
These are devices that enter (capture) data into the computer directly.
(b) Name the type of scanner used: (2 marks)
(i). To capture prices of goods at points of sale terminals in supermarkets and superstores.
Barcode reader
(ii).To grade multiple choice examination
Optical mark reader (OMR)
-12- Computer studies
8. Mr. Otieno a French teacher used speech method to store students oral answers to an exam into a
computer
(a) What is a speech input?
It is a type of input where a microphone connected to a computer system is used to enter data in
form of spoken words into the computer
(b) State two advantages and two disadvantages of using this method of data input
(4 mks)
Advantages
11
- Voice input is fast
- Its suitable for people with special needs especially those with impaired hands
- Can be used in emergency situations
Disadvantages
- Voice input is complex to develop
- Voice input does not take care speech related problems such as accents, tone etc
- The response rates of speech input devices are relatively slow
- Most speech input devices can recognize a limited, standard vocabulary of spoken words, and
the voice of only one speaker
- Cannot differentiate words that have same sounds (homophones)
9. Name two examples of scanning (data capture) devices used at point of scale terminals in
supermarkets
- Barcode reader
- Light pen
- Cash registers
11. List five factors one would consider when selecting a data input device (4 mks)
- The needs of the user
- Type of data to be input
- Volume of data to be entered
- Input speed
- Cost, i.e. the initial cost of the input device & cost of using the device on a day – to – day basis.
- Availability & reliability of the data entry device
- Accuracy required
- Availability of space
- Appropriateness of the device in reference to where it is to be used
12
12. Describe three functions performed by the CPU ( 3 mks)
(i) It carries out processing of data
(ii) System control- it controls the sequence of operations within the computer
(iii) It gives commands to all parts of the computer
(iv) It controls the use of the Main Memory in storing of data & instructions
(v) Storage of data- It provides temporary storage (RAM) & permanent storage (ROM)
13. Explain the functions performed by each of the following central processing unit elements
(i) Control Unit ( 2 mks)
- Interpreting instructions
- Issuing control instructions to the operating system
(iii) Registers
- Holds data and instructions temporarily just before and after processing
14. In reference to ALU, explain the meaning of logic operations and give an example of this
processing operation
Logic operation is the ability to compare two quantities or numbers to determine which is
greater than, less than, equal to, or not equal to the other.
It also involves the testing for existing of a condition encountered during the processing of an
application & altering the sequence of instructions accordingly.
16. (a) Name the basic unit used to measure the processing speed of a computer( 1 mk)
Hertz (Hz)
(b) A computer processor speed is measured in Hertz. What fraction of a second is the
following?
(i) 1. Nanosecond
1 1__________
1 x 109 = 1,000,000,000 seconds
13
(ii) 1. Microsecond
1 = 1________
6
1 x 10 1,000,000 seconds
(b) State any two types of computer drives, giving an example of a storage device used by each
( 3 mks)
Hard disk drive (HDD) - Floppy Disk drive (FDD)
CD- ROM drive - DVD – ROM drive
Tape drive - Zip drive
USB port – for flash disk
20. (a) Give two reasons why there are many forms of computer storage devices ( 2 mks)
- Permanency of storage
- Cost of implication
- Capacity of storage systems
14
- Hard disk
- Zip disks
- Jazz disks
- Flash disks
- Video Compact Disk (VCD)
- Digital video Disks (DVD’s)
- Punched cards
- Optical discs (e.g., Compact Disks LS- 120 super disks, optical card, optical tape)
24. (a) State three advantages of using hard disks as medium of storage
- They provide permanent storage of data
- They have a large storage capacity
- Are cheap per unit of storage
- Are rewritable (provide read & write facilities)
- Are very fast compared to other secondary storage devices in terms of data transfer
(b) Describe three precautions you would take to avoid damaging the hard disk ( 3mks)
- Do not drop the disk drive
- Do not expose it to strong heat
- Do not expose it to dust/ smoke particles
- Do not unprocedurally switch off the computer
(c) Describe the structure of a hard disk in reference to cylinders, tracks and sectors
15
The surface of hard disk is divided into circles called Tracks. Parallel tracks on several platters
are called cylinders
The tracks are further subdivided into sectors. Several sectors can be grouped to form clusters.
25. State two reasons why Magnetic tapes are not commonly used as computer data storage medium
today
- Are slow when retrieving data. This is because of the linear storage of data o the tape.
- Do not fully use their recording surface due to inter- record Gaps
16
28. (a) Calculate the capacity in MB of a two sided floppy disk with 6 sectors per surface, and 512
bytes per sectors
No. of sectors = (2 sides x 6 sectors)
= 12 sectors
If 1 sector = 512 bytes
(12 x 512) = 6,144 bytes
1,000,000 bytes 1 MB
6,144
1,000,000 = 0.006144 MB
(b) A double – sided disk contains 40 tracks on each side. The tracks are divided into 9 sectors of
512 bytes each. What is the total capacity of the disk in megabytes? ( 2mks)
Total tracks = (40 x 2) = 80
Total sectors = (80 x 9) = 720
Total bytes (720 x 512) = 368, 640 bytes
29. By giving examples, differentiate between primary and Secondary Computer storage
( 3 mks)
17
It stores special functions (facilities) peculiar to a given machine
It stores character generators for printers & Video displays
It stores instructions used in special – purpose computers & computerized fuel pumps
(b) Give three characteristics of ROM
It can only be read, but cannot be written to (i.e., the user can only read the information in the
ROM, but cannot write on it unless it is a special type of ROM).
Provides permanent or semi permanent storage of instructions & data from the manufacturer.
It is non volatile memory
Forms a small proportion of the main storage ( i.e. it contributes 30% of the internal Memory).
Stores essential files for starting the computer (Bootstrap programs)
(c) Name two different types of ROM
- Masked ROM
- Programmable Read- Only Memory (PROM)
- Erasable Programmable Read- Only Memory (EPROM)
- Electrically Alterable Read- Only Memory (EAROM)
(b) Name the two types of RAM clearly starting their differences (3 mks)
18
(i) Identify the name of the devices
Flash Disk
(ii) List down two advantages of this device over a floppy disk in storage ( 2 mks)
- Smaller in size than a floppy disk, hence, easily portable
- Has a high data storage capacity compared to a floppy disk
- Flash disks are more reliable than floppy disks
(b) Give two advantages of a digital Versatile Disk over a normal Compact disk
- DVD has a larger storage capacity than a CD ( 2 mks)
- A DVD offers better data storage quality
(b) Show two differences between a CRT monitor and a flat- panel display
- CRT monitor uses a cathode ray tube to display information, while a flat panel does
19
not.
- CRT has a protruding back, while a flat panel does not.
- Flat panel displays are light & easily portable, while CRT’s are heavy
- CRT can display a wide range of colours, while a flat panel displays a limited number
of colours
- CRT consumes more electrical power than flat panel displays
- The screen of a flat panel is much thinner & smaller than that of a CRT
- The screen resolution of a CRT is adjustable, while that of a flat panel is often set
(c) Give there examples of flat- panel monitors available in the market today
- Liquid crystal displays (LCD)
- Electro luminescent (EL)
- Gas plasma
- Thin Film Transistor (TFT)
(c) Give two advantages of the higher number of pixels per square centimeter (2 mks)
- Higher screen resolution
- Displays of sharp & clear images
- The screen is able to display a higher number of different images
38. Distinguish between impact and non impact printers and give two examples of each
Impact printers print by striking mechanism & are noisy, e.g Dot matrix, Daisy wheel, and Golf
Ball, drum and chain printer.
Non- impact printers print either by laser, ink or thermal transfer mechanism & are silent, e.g.
Laser, Inkjet, thermal printer, electrostatic and xerographic
20
- Economical in maintenance
- It is very silent
40. Highlight four factors one should consider when purchasing a printer (4 mks)
- Cost involved i.e. the printer’s buying price, cost of maintenance & cost of consumable items
like printing papers, ribbons/ cartridges
- Volume of printing expected ( speed of the printer)
- Quality of printing e.g. ability to print graphics & colour
- Capability of the selected printer, i.e. multiple copy production, paper size, etc
- Compatibility with other computers
- Environment in which the printer will operate
- Ease of maintenance
- Reliability of the printer
- Application it is required for (i.e. purpose/ use of the printer)
- Type of paper used by the printer
- Documentation
- Availability
43. George connected new multimedia speakers to his computer and tried to play his favorite music
CD, but no sound came out. Suggest two problems that might have occurred ( 2 mks)
- Volume control was too low
- Loose or improper connection to the sound card
- Speakers not powered
- Multimedia not supported
21
- Lack of analogue cable connecting the optical drive to the motherboard or sound card
- Sound card drivers not installed
46. State the function of the power supply unit found in the system unit (1 mk)
- It supplies stable power to the motherboard and other internal devices of a computer
- Converts the potentially dangerous alternating current (AC) into a steady low- voltage direct
current (DC) usable by the computer.
47. (a) Name any two peripheral devices which get their power supply through ports
- Keyboard
- Mouse
(b) State the type of port that would commonly be used to connect the following devices
(i) Mouse - PS/2, Serial, or USB
(ii) Modem - Serial
(iii) External CD drive - Parallel
48. (a) Explain two differences between serial and parallel communication ports of a computer
- Serial ports have 9 pins, while parallel ports have holes for 9 or 25 pins
- Parallel cables transmit several bits of data simultaneously, while serial cables transmit
One bit at a time
- Serial cables are slower than parallel cable
- Serial cables allow for 2 ways communication (i.e. communication to and from the computer
and the device connected to it) while parallel cables usually offer 1- way communication.
(b) Give two major advantages of a USB interface cable over other cables in the computer
- It is light & convenient to carry
- It provides faster transmission of high – quality data
- Its serial nature enables it to connect devices a longer distance away
- The USB port can be used to connect a wide range of peripheral devices due to its common
universal interface
22
49. Outline three precautions one should take when assembling a computer
- Disconnect all diverts from the power source before starting to work on them
- Never work alone because you may need help in ease of energy
- Discharge ant static electricity that might have built up on the hands by touching an earthed
metallic object and wearing an anti- static wrist member.
50. State six factors which you would consider when selecting computer hardware for an
organization
- Cost of the system
- Processor type and speed
- Storage capacity of hard disk & RAM memory size
- Warranty (service contract)
- Upgradeability of the computer
- Compatibility of the system
- Portability (light to carry)
- User needs
- Popularity of the hardware manufacturer
- Availability of spare parts
- Multimedia capability
51. List down any four hardware components you can add or upgrade in a computer system
(4 mks)
- Processor (CPU)
- Ports e.g. USB ports/ SCSI ports
- Hard disk
- DVD drives/ tape drives
- RAM memory
- Expansion slots
(b) Why is it important to carefully study a warranty before committing yourself by signing it?
In order to negotiate on sensitive items like duration, after sales services etc.
53. What are clones with reference to computers and what is their disadvantage?
- Clones are locally assembled computers
Disadvantages
23
- Their components are not optimized to work with each other
- They are not as reliable as their brand names like IBM, Compaq, Hewlett Packard (HP), Dell,
Gateway etc.
(b) Small and large scale organizers are turning to the use of in- house developed software for the
processing activities rather than use of standard software
They are usually customized (tailored) to perform a specific job or solve only specific
processing tasks in one organization
(ii) Give two reasons that may be influencing these organizations for such a decision
( 2 mks)
- The user gets well tested program, which he/ she is able to use with confidence
- The program provides all the facilities required to solve a particular problem
- The purchaser has direct control over the package, as he/ she is involved in its
Production
- The user is able to quickly implement the results obtained from the use of the package
- They can easily be modified to meet specific user’s needs without involving expert
programmers.
55. Differentiate between single- purpose programs and integrated software
- Single – purpose software is developed for only one purpose, while integrated software is a
suite of more than one program and can be used to carry out a variety of tasks
58. (a) Explain why documentation is necessary for any software package
It contains details on how to install use and maintain the software. It also shows the purchaser
how the program can be used to solve particular problem as well as provide the user with
assistance on using the program.
24
(b) A firm intends to purchase new software. List three items of documentation that should
accompany the software
- A license
- Installation guide
- User manual (guide)
- Reference manual
- Warranty
- Upgrades
- Service pack
OPERATING SYSTEMS
1. The central processor and peripheral devices of a computer system are coordinated by the
operating system
(a) Define the term ‘operating system’
A set of computer programs that normally reside in the main memory and used to control the
basic computer hardware resources & the operation of the entire system
The main program that controls the execution of user applications, and enables the user to
access the hardware & software resources of the computer
2. Name the two latest operating systems from Microsoft corporation ( 2 mks)
- Windows 8
- Windows 10
25
(iv) Error reporting and interrupt handling- The OS reports any errors that occur during
program execution.
(v) Management of CPU time:
In a multi- taking system where several user programs share the computer resources, the
processing is done according to the job priorities allocated and in a continuous process until
all the jobs in the queue within the memory are executed. This ensures that the CPU does not
remain idle at any given time.
(vi) Manages the input and output devices
The OS controls the allocation of I/O devices and tries to resolve any conflicts that arise. It also
monitors the state of each I/O device and signals any faults detected
(vii) File management
OS is concerned with the logical organization of the files in the computer & provides ways for
sorting, retrieving & sharing of the files
It also provides a means of protecting the data files & programs against unauthorized access
and corruption.
(viii) It controls the selection & operation of the hardware devices used for input, output & storage
(ix) It interfaces the user to the system’s hardware, i.e. it provides a quick means of communication
between the computer user and his programs
(x) Logging & accounting
The OS keeps records (internal logs) on how the computer resources (e.g. CPU time, memory,
peripherals) are being used
It also keeps a complete record of all what happens during processing (usually in the form of a
printed log)
4. What is an interrupt?
An interrupt is break from the normal sequential flow of instructions processing in a program
7. A computer user may interact with a computer either through Graphical User Interface
(GUI) or though typed commands
(a) Give one advantage of using GUI based operating system over a command line interface
( 1 mk)
User friendliness
Easy to learn & use even by those who do not have much knowledge about them
One does not need to master any commands
26
It is faster to work with than a command line interface as it only relies on clicking the icons by
use of a pointing device
(b) Some computer systems still use command line interfaces. State two advantages of command
line interface
- They are more flexible than menu- driven interfaces
- There is security of data as only those who know how to use the commands will access
it.
- They use cheap hardware & software facilities
- One has a better control over the system resources
(b) Window
A rectangular area on a computer screen in which text, graphical images or the contents of a
folder or disk may be displaced
(c) Icon
A little picture on the computer screen representing a program, disk file folder or any other item
(d) Sidekick menu
A submenu that appears either on the right or left of a main menu
(e) Taskbar
A long bar/ strip that runs across the desktop and displays the start button and any other active
tasks.
(f) Task
Any activity taking place in windows and is displayed on the taskbar, e.g. running program
(3 mks)
27
12. Identify three factors you would consider when choosing an operating system for use in a
computer ( 3 mks)
(i) Hardware configuration of the computer, e.g. RAM memory size, Hard disk capacity, type of
processor, etc
(ii) Basic design of the computer – It is an IBM compatible, or apple computer?
(iii) Hardware compatibility
(iv) User (type of work to be done), i.e. the applications intended for the computer
(v) User friendliness or human computer interface, i.e. it is command line based, Menu driven or
graphical user interface?
(vi) Availability in the Markey, e.g. Microsoft Windows based operating systems are very common
(vii) Portability
(viii) Cost- how expensive the OS is
(ix) Reliability, i.e. can it run without crashing (stop responding to commands)?
(x) The method of communicating with the computer, e.g. the number of peripherals
(xi) The method of operating the computer
13. Explain how windows organizes information in reference to files and folders
It stores related data & information records into files, and related files into folders & subfolders
14. (a) Distinguish between systems files and application files ( 2 mks)
System files hold critical system information while application files hold programs data
(b) State the extensions used signifying the following file types (2 mks)
(i) Driver or system file - DLL, SYS, INI
(ii) Batch file – BAT
15. (a) List and explain down the three parts of the windows Taskbar ( 3 mks)
Start button - Provides access to the start menu
Task Manager - Displays buttons of currently running tasks
System tray - displays icons of applications that automatically start and run in the
background
(b) Outline the procedure of renaming a file or folder using windows operating system
(3 mks)
Method 1:
In an explorer window, click the file/ folder you want to rename
Click on file, choose rename
Type the new name, then press enter
Method 2:
In an explorer window, right- click the file/ folder you want to rename
Choose Rename from the shortcut menu that appears
Type the new name, then press Enter
16. (a) What is a dialog box?
Window that appears temporarily to request or supply information. It contains options (settings)
one must select to complete a task
28
Textbox- a box you can type data in
List box – a box that contains a list of options, one of which is selected
Checkbox- a small, square box that can be selected or cleared. It appears with an option that
you can turn on or off. When the checkbox is selected, a selected, a checkbox ( or )appears
in the box
Radio button – a round button that can either be blank or can contain a dot. If the button
contains a dot, it is selected.
Pull down menu – A box with a downward – pointing triangular button at its right end ().
When the triangular button is clicked, it displays a menu.
Command button- A button that can click to carry out or cancel the selected action. E.g. the OK
or cancel button.
17. (a) Define ‘ folder/ directive tree’
Directory tree is the hierarchical arrangement of folders and storage locations from the root
downwards.
(b) Give two examples of root directories you know (1 mk)
- A:\
- C:\
- D:\
- E:\
(c) Give three uses of sub- directories or subfolders (3 mks)
- Used to store files that are not required currently until they are needed again
- Used to store the files of one program separately from the files of another program
- It allows each user to keep his/ her files separately, even if all the users are using the same
systems.
29
18. The Hierarchical system represented below shows how a school organizes its files. Study it
and answer the questions below.
(ii) Explain two methods you can use in windows to back up data into a storage device
(2 mks)
- Using copy and paste commands on the Edit Menu
- Using the send to command on the file menu
- Using the backup facility to compress the data into another disk
(b) Identify two reasons why a user needs to know the space available for data storage in the hard
disk
- To know the amount of data that can be stored in the hard disk
- To know how much space is left in the hard disk in case a new programs needs to be installed
- To detect the likelihood of a virus infection
20. Name the command one would use to repair cross- linked files in graphical user interface
software ( 1mk)
Scandisk
21. (a) Explain the team Disk Defragmenter, and give two advantages of this feature ( 3 mks)
Disk defragmenter is a tool that is used to re- arrange scattered files & folders on a storage
media
Advantages
- Rearranges scattered folders & files on storage media
- Reduces the time by the read / write head to locate files or folders on the storage media
This speed up access to files & folders, hence, makes files to open more quickly
- Consolidates related data close to each other, hence, frees space on the storage media
30
Compressing is creating more space on a disk by squeezing disk contents (files) into a smaller
storage location on the disk.
Defragmenting is rearranging scattered related files/ folders closer to each other on the surface
of a storage unit.
22. Give two reasons why a new disk must be formatted before using it (2 mks)
- To prepare a new disk so that files can be stored on it
- To create sectors & tracks for the storage of data
- To create/ prepare a new root directory and file allocation tables on the disk
- To remove/ delete any existing files or information stored on the disk, if it is no longer needed
- To determine the effective storage capacity of the disk, i.e. formatting enables the user to know
how much data the disk can hold.
- It can also check for bad sectors on the new disk.
(b) Give two reasons why the hard disk may be partitioned
- To install more than one operating systems on the same disk
- For the purposes of backup on the same disk, so that if one partition fails the other will still be
working.
31
WORD PROCESSING
4. Explain the difference between overtypes and insert mode in word processing
(2mks)
Type over deletes the current text at cursor position and inserts new text.
Inserting pushes the old text away as new text is inserted at cursor position.
5. Veronica tried to retrieve a document file following all the steps correctly. The filename did not
appear in file list box. State three causes for this.
(3mks)
- The file may not have been saved
- The file may have been deleted
- The file may be located in a different folder from the one she was trying to
retrieve from (or may have been moved).
32
- The file may have been destroyed by a computer virus.
6. Mwikali selected a paragraph in word processing. Explain what happened after pressing the
following keys on the keyboard: (3mks)
i) CTRL + B -Changes the paragraph to bold/removes bold from paragraph
ii) CTRL +A -the whole document is selected
iii) CTRL+ U -the selected text is underlined/removes underline from the
selected text.
7. Precisely explain the role of the following editing features of a word processor;
(3mks)
i) Find and replace -To find words that you want replaced by others
ii) Undo and redo- Undo reverses the previous/latest action, while redo
does the undone action
iii) Thesaurus -It gives suggestion of words or phrases with similar meaning
(synonyms), and sometimes antonyms to the selected word.
iv) Autocorrect -It checks for wrongly spelled words, and automatically replaces
them with the correct ones as set by the user.
8. Give the steps you would use to find and replace the occurrence of a particular word in Microsoft
Word. (4mks)
- Click on edit, select find (or replace)
- Type the word you want to replace with in the replace with box
- Click replaces or Replace all if you want to replace all the occurrences of that word in your
document at once.
9. Name and explain the use of any three buttons found in a spell-check dialog box
(6mks)
Change: Accepts the current selection in the suggestions box
Ignore Once: Leaves the highlighted error unchanged (if the highlighted
word is a valid word) & finds the next spelling or grammar error
Ignore all: retains all the occurrences of the same word or phrase in the document from
another language, e.g. a Kiswahili.
Add: Adds the highlighted word in the Suggestions box to the Custom dictionary.
10. Clearly explain the meaning of the following terms as used in word processing:
(7mks)
33
Applying various styles to enhance the appearance of a document
b) Give any five document formatting features of a word processor.
(5mks)
- Bolding
- Font colouring
- Text alignment
- Font type
- Setting tabs
- Underlining
- Italicizing
- Font size.
34
v) At least – the minimum line spacing that is needed to fit the largest
font or graphic on the line.
vi) Multiple- a line spacing that is increased or decreased by a
percentage that you specify . (4mks)
16. Give any four text alignment features (4 mks)
- Left alignment
- centre alignment
- Right alignment
- Justified
17. List any thee sources of graphics that can be used in Microsoft word. (3mks)
- From Microsoft clip gallery
- From Scanner
- By drawing using the Drawing tools available in Ms-World
- Import from another file
18. a) Explain the concept of graphics that can be used in Microsoft word.
(3mks)
Getting ready-made objects and text from other applications into the word
processor.
b) What is the difference between object linking and embedding? (2mks)
In linking, the object imported can only be edited in the original
application from which it was created.
In embedding, the object imported becomes part of the current application
and can be edited there.
19. Give a reason why it may be necessary to merge cells in a table. (1mk)
To create larger cells in a table without increasing the height or width of the existing cells.
35
before printing a document? (2mks)
Select a paper size depending on the document page size needed
To comply with printer capabilities
23. Outline any three main features that make word processors popular
programs.
(3mks)
Saving of documents for future reference
Printing of multiple documents after editing
formatting of documents into required form
Mailing features such as mail merging of standard document with another saved file.
36
SPREADSHEETS
1. What is electronic spreadsheet software? (2mks)
A computer program that looks like the manual ledger sheet with rows & columns for entering data
that can be manipulated mathematically using formulae.
2. Give any two application programs classified as spreadsheets. (2mks)
Microsoft Excel
Lotus 123
-Corel Quattro Pro
-super calculators
-Multiplan
-VP-Planner
-VisiCalc
3. Differentiate between the traditional analysis ledger sheet and an electronic
spreadsheet. (5mks)
An electronic spreadsheet;
- Has a large worksheet for data entry & manipulation as compared to manual worksheet
- Has inbuilt formulae (called functions) that are non-existent in manual worksheets
- Uses the power of the computer to quickly carry out operations
- Has better document formatting & editing qualities than a manual worksheet
- Utilizes the large storage space available on computer storage devices to save & retrieve
documents.
- Can easily be modified, while manual spreadsheets involve a lot of manual calculations & are
very difficult to amend
- The user can very quickly & efficiently perform complicated computations using the
information stored in an electronic spreadsheet.
- Enables the user to produce neat work
- Offers graphical representation of data leading to comprehensive decisions.
- It is accurate in its calculations & allows automatic recalculation on formulae. For a manual
worksheet, changing one value means rubbing the result & writing the correct one again.
4. Explain five application areas where spreadsheet software can be used.
(5mks)
i) Accounting: - spreadsheet software can be used by accountants to record
their daily transactions & also keep financial records, e.g. they can record
sales & purchases, produce invoices, compile financial statements, calculate profits, prepare
budgets, etc.
ii) Data management: - a spreadsheet enables data & information to be
arranged neatly in tables, produced easily and also kept up-to-date, e.g. one can edit, save , sort,
filter, use forms to enter and view records, and worksheet data.
iii) Scientific applications: - spreadsheets can be used by scientists &
researchers to compile and analyze their results.
iv) Statistical analysis: - spreadsheets provide a set of statistical
Functions/tools that can be used to develop complex statistical or
engineering analyses, e.g., teachers can compile their students’ marks and
produce results.
v) Forecasting: - using the ‘what if’ analysis technique, spreadsheets can be
used to find out the effect of changing certain values in a worksheet on the other cells. This
helps in financial forecasting, budgeting, etc.
5. State five features of spreadsheets that are useful in financial modeling. (5mks)
Have inbuilt functions & formulae which can be used to perform most mathematical statistical,
trigonometric or financial calculations
37
Allows automatic recalculation on formulae
#have ability to perform ‘what if’ analysis, which can be used to find out the effect of changing
certain values in a worksheet on the other cells
Have the ability to sort & filter data
Have a data validation facility, which ensures that the correct data is entered into the
spreadsheet.
Have a chart facility that can be used to draw Line graphs, Bar charts, Pie charts, Histograms,
etc.
Some spreadsheets have a SOLVER facility that is used to uncover the best uses of scarce
resources so that desired goals such as profit can be maximized, or undesired goals such as cost
can be minimized.
They enabled printing of entire worksheets, portions of a worksheet or several worksheets
within the shortest time possible
Have the ability to summarize data using Consolidation and Pivot tables.
iii) Cell
A box formed when a row & a column intersect in a worksheet where the data is entered
7. Explain the following concepts as used in spreadsheets: (4mks)
i) Automatic recalculation
This is whereby an electronic spreadsheet will adjust the result of a formula automatically when
the values are changed, so that they correspond with the different input.
38
Mary Anne and Hellen Wanjiku are single whereas Francis Kihara, Lena Achieng and Mwangi
Peter are married.
Construct a worksheet showing the above information. Use appropriate column headlings
(6mks)
A B C D
1 AGROVET COMPANY
2 NAMES AGE DEPARTMENT STATUS
3 Mary Anne 23 Research Single
4 Francis Kihara 45 Personnel Married
5 Lena Achieng 90 Research Married
6 Hellen 45 Computer Single
Wanjiku
7 Mwangi Peter 34 Computer Married
8
b) For each of the following, state the type of cell reference. (4 mks)
i) A5 Relative reference
ii) $F$5 Absolute row reference (only the row reference is absolute)
iii) H$21 Absolute column reference (only the column reference is
absolute)
iv) $D7 Absolute row reference (only the row reference is absolute)
11. a) A formula to add the contents of B5 and C4 was entered in Cell F5.
what will it become when it is copied to Cell H8? (1 mk)
= D8 +E7
39
13. The fist column in the table below contains formulas as entered into cell D46. In the second
column, enter the formulas as they would appear when copied to cell B56.
(4mks)
Cell Al A2 A3 C1 C2 C3
Entry 5 7 10 10 15 15 =SUMIF
(C1:C3 “<>
10”,Al:A3)
40
State the value displayed in G1 (2mks)
Solution:
= SUMIF (Cells to be tested/evaluated, expression that defines which cells will be added,
actual cells to be added).
= 7+10 = 17
15. Study the worksheet below and answer the questions that follow:
A B C D E F
1
2 SKYWAYS AGENCIES
3 PRODUCT REGION 1 REGION 2 REGION 3 REGION 4 TOTAL Sale
i) Write functions that can be entered to get total, maximum, and average of
each region. (3 mks)
Total = Sum (B4:B8)
Maximum: = Max (B4:B8)
Average: = Average (B4: B8)
ii) Write down the function that returns the number of sales in the four regions
whose value is greater than or equal to 2000. (1 mk)
= SUMIF (B4:E4, “>=2000”) (1mk)
iii) The function = sum (B4:E4) is entered at F5 and then copied to F8. Write down the function as it
appears in the destination cell. (2mks)
= sum (B7:E7)
16. a) What is a chart wizard in spreadsheets? (1mk)
A chart wizard is a step by step procedure of designing spreadsheet charts.
41
DATABASES
1. a) Define a database. (2mks)
A collection of related files organized to provide consistent and controlled access
to the data items.
A collection of related data elements stored together under one logical structure so as to provide
a consistent & controlled access to the items.
A collection of information related to a particular subject or purpose
A common data pool, maintained to support the various activities taking place within the
organization.
b) List four examples of database programs in the market today. (2mks)
Microsoft Access
Oracle
FoxPro
Dbase
2. State the components of a Database hierarchy in ascending order. (2mks)
Character (alphabets, numbers and special characters)
42
5. State the use of the following objects in databases. (3mks)
i) Tables To store related records
ii) Forms They act as screens for entering, changing & viewing data
in tables
iii) Query Searching for specific records/Data manipulation/Selecting
6. a) Define the term normalization as used in database design. (2mks)
Normalization is the process of trying to eliminate storage of duplicate
values in a database.
b) State three objectives of normalization. (3mks)
To relate different tables in a database
To ease the retrieval of data from a relational database
Breaking up multi theme tables into smaller workable tables
7. Give three advantages of separating data from the applications that use the data in database
design. (3mks)
You can retrieve recorded data easily
You can do calculations in an easy way
Creating of queries, forms, reports will be easy by using data separation.
8. Differentiate between:
i) Primary key and relationship (2mks)
Primary key is a field or a set of fields that can be used to uniquely identify each individual
record in a table. It is used to relate a table to the foreign keys in other tables.
43
b) List any two methods used to secure data in a database (2mks)
Password protection
User and group permissions
User-level security
Data encryption
12. The following car details are to be entered in a database: Make, Date-of-manufacture, colour, and
cost.
a) Prepare a suitable database structure showing field names and their field data types
(5 mks)
Field name Data type
ID (Primary key) Auto Number
Make text
Date of manufacture Date/time
Colour Text
Cost Currency
b) Explain how you index the data such that cars of the same make and colour are together.
(2mks)
Create a query to show same make and colour
c) Write a statement that can be used to select cars of colour green. (2mks)
Create a query. In the colour field, and in the Criteria row, write “green”
d) Give an instruction that would:
i) Select cars whose cost is between 500,000/= and 1,000,000/= (3mks)
Create a query. In the cost field, and in the criteria row, write “.>500000
and <1000000”
ii) Determine the average cost of all cars. (3mks)
Create a query. Choose average of costs “Avg” option in the total section.
44
DESKTOP PUBLISHING (DTP)
45
5. What commands are used in place of portrait and landscape page orientation in PageMaker?
(1mk)
i. Portrait-tall;
ii. Landscape-wide
1. The first computer Network was set up by ARPA in the United States of America. What is the
full meaning of the acronym ARPA (1mk)
Advanced Research Projects Agency
2. Your manager wishes to be connected to the Internet. He already has a powerful personal
Computer (PC), a printer, and access to a Telephone line. However, he understands that he will
need a Modem.
State why a modem is required to connect him to the internet. (2mks)
A modem enables one to connect to the Internet and access information by transmitting data
from one computer to another across telephone lines.
3. The Internet connects millions of computers and telecommunication devices that have different
hardware and software configurations. For these incompatible devices to be able to
communicate, a protocols? (1mk)
A protocol is a set of rules that govern how tow computers can send and receive data on a
network
Special communication rule that government sending and receiving of messages by computers
on a network
b) Name the two most common protocols for the Internet, and state their functions.
(3mks)
Transmission control Protocol (TCP); - It governs how data is transferred from one place to
another
Internet Protocol (IP); - It is used to provide routing from one network to another (i.e. it
enable data to be sent& received by the different computers on a network)
4. a) Explain the following terms as used in internet:
i) Website ( ½ mk)
A collection /group of related Web pages belonging to an organization or
individual
ii) Browse/Surf the web. ( ½ mk)
46
Moving around and between the Web pages
5. a) What is meant by the term e-learning? (1mk)
This is learning through interaction with special programs on the
computer.
b) A school intends to set-up an e-learning system. List three problems that are likely to be
encountered. (3mks)
- Lack of capital
- Lack of skilled manpower (required technology to run & support the e-learning system)
- Spread of computer viruses
- Availability of pornographic material & literature to the students from the internet.
6. a) Identify the parts of the following e-mail address labelled A, B, C and D (4mks)
lat @africaonline . co.ke
A B C D
Disadvantages
- the initial installation cost is higher
- Messages may be lost before they can be read due to virus infection
- Messages may not be kept for future reference due to the high cost of storage
(2mks)
8. a) What is a search engine? (2mks)
Google .com
47
Yahoo. Com
Hotmail.com
Excite.com
9. Briefly describe four factors contributing to slow Internet access and growth in Kenya.
(6mks)
i) Cost: - for effective use of internet, a powerful & costly computer is
needed. The cost of installing internet services, telephone bills is also high hence discouraging
internet growth.
ii) Illiteracy: - Many people are computer illiterate and therefore have no idea
of computer internet services.
iii) Inadequate infrastructure: - Lack of infrastructures such as telephone
services in rural areas also hinders growth of internet access. Lack of electricity discourages
people from installing internets in their offices.
iv) lack of awareness of the existence of such services by the public.
48
- -use licenses and certificates of authenticity to identify originals
- Set installation passwords that prevent illegal installation of software.
4. a) What is a Computer virus? (2mks)
This is a program intentionally written to destroy data, information or the working of other
programs inn a computer system
b) i) State two ways through which computer viruses may be controlled.
(2 mks)
Running antivirus software programs regularly
Controlling the movement of storage media (e.g. floppy disks, flash disk, etc) in and out of the
computer room
Disabling the floppy disk drives
ii) Explain how each of the two ways listen in b (i) above assist in controlling computer
viruses. (2mks)
Antivirus software helps to detect and remove the viruses from the computer controlling the
movement of floppy disks ensures that infected disks are not inserted into computers.
5. Computer systems need maximum security to prevent an unauthorized access. State six
precautions that you would expect an organization to take to prevent illegal access to its
computer-based systems. (6mks)
Lock the doors, (i.e. keep the computers in a strong room, which should remain firmly locked
when nobody is using it).
Avoid welcoming strangers into the computer room
Use of personal identification cards
Use of fingerprint identification
Install security alarms at strategic access points so as to alert the security personnel in case of a
break in.
Use of special voice recorders that would be able to analyse the voice of a trespasser & check
against the database containing the voice patterns of valid users
Enforce data & information access control policies on all employees to control access to data
Use file passwords to prevent any person from getting access to the electronic files
Enforce network security measures, e.g. use of firewalls
Encrypt the data & information during transmission
Perform frequent audit trails to identify threats to data & information.
6. Give four rules that must be observed in order to keep within the law when
working with data and information. (4mks)
- It should be kept secure against loss or exposure
- Should not be kept longer than necessary
- Should be accurate and up-to-date
- Should be collected, used & kept for specified lawful purposes (e.g., data should not be used for
unlawful gain)
- The owner of the data has a right to know what data is held by the person or organization
having it.
- Data should not be transferred to other countries without the owner’s permission
- Do not collects irrelevant and overly too much information for a purpose.
7. An individual has a right to demand guarantee to privacy of personal information stored on a
computer. Give three such types of information.
(3 mks)
- Name
- Date of birth
- ID. Number
49
- Residence
- Address
- Phone number
5. Distinguish between Binary and Octal number systems, and give an example of each.
(2mks)
Binary (base 2) system has just two states usually called “ON” and “OFF” or “0”
and “1”, Octal (base 8) system has eight different characters, I.e, 01234567.
6. Perform the following computer arithmetic. In each case, show how you arrive at your answer.
50
4510 = 1011012
2 4 Rem
2 2 0
2 1 0
1 1
=0.112
0.75 x 2 = 1.50 1
0.50 x 2 = 1.00 1
= 1002 = 100.112
` =1111112
c) Use binary addition to solve the following: 410 +310 (2mks)
2 4 Rem
2 2 0
2 1 0
1 1
51
410 = 1002
Step 2: Add binary notations
1002
112 +
1112 1112
3 Rem
2 1 1
1 1
310 = 112
7 6 7
7x82 + 6 x 81 + 7 x 80
448 + 48 + 7 = 50310
503 Rem
16 31 7
16 1 15
1 1
7678 = 1 F716
8. Use One’s compliment to solve the following the following sum: - 510 (2mks)
2 5 Rem
52
2 2 1
2 1 0
1 1
2 34 Rem
2 17 0
2 8 1
2 4 0
2 2 0
2 1 0
1 1
34 10 =1000102 (2mks)
2 7 Rem
2 3 1
2 1 1
1 1
=1112
0.12 x2 0.250 0
0.20 x2= 0.500 0
0.500x2=1.000 1
= 0.0012
= 111.0012 (1mk)
25 24 23 22 21 20
1 0 1 1 0 1
53
= 2. {0.5 + 0.25} = 2.7510 1 (3mks)
7 0 2
7 A B
22 21 20 21 20 21
000 111 0 11 . 0 1 0
8 57 Rem
8 7 1
8 7 1
2 7 7
0.4 x 8 = 3.2 3
0.2 x 8 = 1.6 1 = 0.318
=718 71.318
54
11. a) Perform the following Binary arithmetic:
i) 11100111 + 00101110 (1mk)
11100111
00101110 +
(1) 00010101 =1000101012 (1 mk)
11111011 +
7 A E
Step 2
2 4033 Rem
2 2016 1
2 1008 0
2 504 0
2 252 0
2 126 0
2 63 0
2 31 1
2 15 1
2 7 1
2 3 1
2 1 1
1 1
403310 = 1111110000012
14. Write the following abbreviations in full: (4mks)
55
i) BIT -Binary digit
ii) BCD -Binary Coded Decimal
iii) ASCII -American Standard Code for information Interchange
iv) EBCDIC -Extended Binary Coded decimal Interchange Code
DATA PROCESSING
1. With an aid of a diagram, explain the stages of the data processing cycle.
(6mks)
Data Collection
Data Input
Data processing
Output of ‘information’
Data collection involves getting the data/facts needed for processing from the point of its origin
to the computer
Data Input- the collected data is converted into machine-readable form by an input device, and
send into the machine.
Processing is the transformation of the input data to a more meaningful form (information) in
the CPU
Output is the production of the required information, which may be input in future.
56
b) Give and explain two transcription and two computational errors committed
during data processing. (8mks)
Misreading errors: -they occur when the user reads source document incorrectly, thus
entering wrong values, e.g. a user may confuse 5 in the number 586 with S, and type S86
instead.
Transposition errors: - they result from incorrect arrangement of characters (i.e., putting
characters in the wrong order especially when keying data onto a diskette), e.g. the user may
enter 396 instead of 369 computational errors
Overflow errors: -An overflow occurs if the result from a calculation is too large to fit in
the allocated memory space, e.g., if the allocated memory space is able to store an 8-bit
character, then an overflow will occur if the result of the calculation gives a 9-bit number.
57
8. Most companies are now shifting from the use of geographically distributed personal computers. This
method of data processing is known as Distributed Data Processing (DDP)
Required:
i) Name any threes computing resources that can be distributed. (3mks)
-CPU (Processors) time
-Files
-Application software
-Data/information/messages
-Computer processing power
-Memory (computer storage)
-Input/Output devices, e.g. printers
-communication devices/communication ports
ii) Name four examples of industries and business organizations that extensively use distributed
processing systems. (4mks)
Banks
Computerized retails stores, e.g. supermarkets
Learning institutions with many departmental offices
Bureaus or communication cyber cafes
Airline reservation systems
iii) List down two benefits and three risks that might be associated with the distributed data
processing system. (5mks)
Benefits
The load on the host computer is greatly reduced
The use of low cost minicomputers minimizes the cost in data processing
Delays in data processing are reduced
Provides better services to the customers
There is less risk in case of system breakdown
The design & implementation of the system is less complex due to decentralization
The level of expertise required is less.
Risks
Data duplication is very common
Programming problems occur with microcomputers & minicomputers
Security threats, i.e. the data & information sent one the network from one place to
another can be tapped, or listened to by unauthorized parties
More training is needed for the users involved
It is expensive due to the extra cost of communication equipment.
58
10. State at least four advantages of storing data in computer files over the manual filing system
(4mks)
Stored information takes up less space
Easier to update and modify
Provides faster access and retrieval of data
Reduces duplication of data or stored records
Cheaper
Enhances data integrity (i.e. accuracy and completeness)
12. Arrange the following components of the information system data hierarchy in ascending order
of complexity:
Field, Database, Byte, Record, Bit, and file (4mks)
13. In a computer based information system, state the purpose of the following files, and give one
example where such a file may be required in a school.
(8mks)
i) Report file- It contains a set of relatively permanent records extracted from the data in a master
file.
They are used to prepare reports, which can ve printed at a later date, e.g. report on student’s
class performance in the term, extract of students who have not cleared their school fees, report
on absentees.
ii) Backup file- Used to backup data or to hold duplicate copies of data/information from the
computer’s fixed storage or main file for security purposes e.g. a copy of all the students
admitted in a school fees, report on absentees
iii) Reference file - Used for reference purposes. It contains records that are fairly permanent or
semi-permanent, e.g. Deductions in caution money, wage rates, tax deductions, employees
address, price lists etc.
iv) Sort file – used to sort/rank data according to a given order, e.g. ranking position in a class of
students.
14. a) What is file organization?
It is the way records are arranged (laid out) within a particular file or any secondary storage
device in a computer
b) Differentiate between the following file organization methods: (4mks)
i) Sequential and serial
In sequential file organization, records are stored in a sorted order using a
key field, while in serial; the records are stored in the order they come into the file, and are not
sorted in any way.
59
In random file organization, records are stored in the file randomly and accessed directly, while
in indexed –sequential, the records are stored sequentially but accessed directly using an index.
PROGRAMMING
Section A
1. Define the following terms: (3mks)
i) Computer Program
A computer program is a set of instructions that directs a computer on how
to process a particular task.
ii) Programming
Programming is the process of designing a set of instructions which can be used to perform a
particular task or solve a specific problem.
iii) Programming language
A programming language is a language (set of instructions) used in
writing of computer programs. The language must be understood by the computer for it to
execute.
2. Explain the meaning of the following as used in computer programming. (2mks)
i) Syntax -these are rules that govern the arrangement of commands in a
particular language
ii) Semantic - the meaning attached to every command in a particular
language.
3. a) What are low-level languages? Give their features. (4mks)
These are the basic programming languages, which can easily be understood by the computer
directly, or which require little effort to be translated into computer understandable form.
Features:
They are machine hardware-oriented
They are not portable, i.e. , a program written for one computer cannot be installed and used on
another computer of a different family
They use Mnemonic codes
They frequently used symbolic addresses.
60
b) List three examples of fourth generation programming languages. (3mks)
Visual Basic
Delphi Pascal
Cobol
Access Basic
vii) Popularity: - the language selected should be suitable and /or successful in the market with
respect to the problems to be solved.
viii) Documentation: - It should have accompanying documentation (descriptions on how to use the
language or maintain the programs written in the language
ix) Availability of skilled programmers: - The language selected should have a pool of readily
available programmers to ease the programming activity, and reduce development time.
61
- Interpreter translation takes less memory, while compiled programs require more memory as
the object code files are larger.
11. a) State any four rules/guidelines that should be followed when drawing
program flowcharts. (4mks)
A flowchart should have only one entry (starting point) and one exit point
The flowchart should be clear, neat and easy to follow
Use the correct symbol at each stage in the flowchart
The flowchart should not be open to more than one interpretation
Avoid overlapping the lines used’ to show the flow of logic as this can
create confusion in the flowchart
Make comparison instructions simple, i.e , capable of Yes/No answers
The logical flow should be clearly shown using arrows
Ensure that the flowchart is logically correct & complete
b) Give one advantage of pseudo codes over flowcharts (1mk)
Pseudo codes are easier to write and understand
They are convenient especially for long algorithms which span over several pages.
12. Explain the following types of computer program errors:
a) Syntax error (2mks)
These are programming errors/mistakes that occur due to incorrect/improper use of the
grammatical rules of a particular language
E.g., Punctuation mistakes, (i.e. omitting a comma or a semicolon), improper naming
of variables, wrong spellings of user defined and reserved words.
b) Logical Errors
These are errors that occur as a result of bad program design
Logical errors relate to the logic of processing followed in the program to
get the desired results e.g. they may occur as a result of misuse of logical operators.
c) Run-time (execution) error. (2mks)
Run-time (execution) errors. They occur when the programmer develops statements,
which are not projecting towards the desired goal. Such statements will create
deviations from the desired objectives
13. Explain four error detecting methods in program development (4mks)
i) Dry running (desk checking); - checking a program for errors by
62
making the corrections on a paper before entering it in the program editor.
ii) Translator system checking: - It involves the running of a translator
program (e.g., compiler or Interpreter) after entering the set of coded instructions in
order to detect any syntax errors.
iii) Use of debugging utilities: - It involves supplying data values to the program for which
the answer is known. If the program does not give the correct answers, it shows that it
contains some errors.
14. Describe three types of program documentation in reference to programming
(6mks)
i) User-oriented documentation: - It is a manual that enables the user
to learn how to install and use the program
ii) Operator –oriented documentation: - It is a manual that enables the user to learn how to
install and use the program.
iii) Programmer-oriented documentation: - This is a detailed documentation written for
skilled programmers. It provides the necessary technical information to help the
programmer in future modification of the program.
15. a) State three types of control structures use in programming. (3mks)
-Sequence
-Selection/decision
-Iteration/looping
b) Draw a simple flowchart diagram to illustrate the FOR-DO structure.
(3mks)
Boolean
Expression Stop
Counter
Increment
63
Modules are easy to test & debug (i.e correct mistakes/errors). This is because; each module
can be designed, coded & tested independently
It is easier to document specific tasks.
Use of modules can be named in such a way that, they are consistent & easy to find in
documentation
It is flexible.
Continuation of program
b) IF...THEN…ELSE selection
(2mks)
64
c)
21. a)
With aid
of a pseudo
code and a
START
PRINT (“Enter two numbers, X and Y”) Input X, Y
IF Y=0 THEN
PRINT ‘Error: division by zero’
ELSE
Quotient = X/Y
PRINT X, Y, Quotient
65
ENDIF
STOP
Flowchart
b)
Write
down the
assignment
statement used in
the
algorithm above.
(2mks)
Quotient=x/Y
66
23. Write a pseudo code that reads temperature for each day in a week, in degree Celsius, converts
the celcius into Fahrenheit and then calculate the average weekly temperatures. The program
should output the calculated average in degrees Fahrenheit.
START
INPUT temperature in 0C
SET Initial day to 0
WHILE Initial day <=6 DO
F = 32 + (9c/5)
INPUT temperature in 0C
Initial day = Initial day + 1
Cumulative = Cumulative + 0F
END WHILE
Average = Cummulative/7
PRINT average
Stop
24. Michael deposits 1,000 in a bank at an interest rat of 10% per year. At the end of each year, the
interest earned is added to the amount on deposit and this becomes the new deposit for the next
year.
Develop a pseudo code to determine the year in which the amount accumulated first exceeds
2,000. Also for each year, print the year (starting from 1), the deposit, the Interest earned, and
the total accumulated at the end of the year.
START
Input initial deposit, Interest rate, and Target deposit
Set Deposit to 1000
Set Year to 0
REAPEAT
Year= Year + 1
Interest = Deposit x 10%
Total = Deposit +Interest
Deposit = total
UNTIL Deposit > 2000
PRINT Deposit, Year
STOP
67
a) What will be the value of the sum when printed? Show how you arrive at your answer.
(5mks)
R Term Sum
0 0x20 0 + 0=0
1 1x21 = 2 0+2=2
2 2x22 = 8 2 +8 =10
3 3x23 = 24 10 + 24 = 34
26. Mwalimu savings society (MSS) Pays 5% interest on shares exceeding 100,000 shillings and 3%
on shares that do not meet this target. However, no interest is paid on deposits in the member’s
MSS bank account
a) Design a pseudo code for a program that would:
START
PRINT “Enter member Name, share and Deposit”
INPUT Name, Shares, Deposit
IF shares > 100,000 THEN
Interest = 0.05 x Shares
ELSE
Interest = 0.03 x Shares
ENDIF
Total savings =Deposit + shares +Interest
PRINT Name, Total savings, Interest
STOP
68
27. a) Study the
flowchart
below and
answer the
questions
that follow:
(3mks)
b) What will be the output if the statement in the decision box is changed to?
(3mks)
i) M100
Only one value, 11 will be printed 1
iii) M = 100
values
starting with 11 to
infinity, i.e. , 11, 22, 44,
………. 1
c) Modify the flowchart to print the sum of all the outputs. (9mks)
69
28. The gross salary of employees of Mutson Chemist is based on the Basic and additional benefits.
Employees with more than 10 year’s experience get an additional pay of 10% of their basic salary.
Bonuses are given as per employees’ sales of the month as:
>200,000 15%
100,000 – 200,000 10%
Below 100,000 5%
Draw a flowchart for the program that will calculate Gross salary and output each employee’s Basic
salary, gross salary and all benefits. (15 mks)
SYSTEMS DEVELOPMENT
70
1. What do you mean by a system? (2mks)
A system is a set of items, equipments, procedures, programs or techniques & people working
jointly with an aim of achieving common goals.
71
6. Define the following terms:
i) System control
A system control is a method by which a system adapts to changes in the environment
in order to give the expected output or perform at the expected level.
ii) System boundary
It is the scope/limits within which the system components operate
iii) Online analytical processing
The process whereby a computer-based information system is used to capture
operational data, analyze it, and generate reports that can be used to support the
decision making process in an organization
7. State one disadvantage of the Traditional approach in system development (1mk)
The structure of the old system is not changed in anyway; hence; hence, the weaknesses of the
old system are not corrected and are carried forward to the new system.
10. Define the term Feasibility study as used in system development. (2mks)
This is a special study carried out to establish the costs and benefits of a proposed
new system.
11. You are required to develop a registration system for a particular school. State
two ways in which you would gather the information required for the system development.
(2mks)
72
If the information to be gathered is located over widely spread geographical area.
If a large number of people are to be questioned, and the questions to be asked require short
answers, or are limited to Yes/No
Where 100% coverage is not essential
Where privacy (anonymity) of the respondents is to be maintained.
14. a) Explain the importance of using automated methods in fact finding. (1mk)
Automated method of data collection can be used in areas which are not easily
accessible.
b) Give one example of automated information gathering technique. (1mk)
-Use of a video camera to capture motion pictures
-Use of Tape recorder.
15. Mention the four factors that may be considered in order to design a good file.(4mks)
o Output specifications (i.e., output from the system)
o Input specifications
o Table/file structure specifications
o Hardware specifications
o Software specifications
16. State four factors that may be considered in order to design a good file. (4mks)
- Record key fields
- Data type for each field
- Length of each field
- Backup and recovery strategies.
17. Define the term “attribute” (1mk)
An attribute is a unique characteristic of a record for which a data value can be stored in the
system database. E.g., a student record has attributes such as Name, admission number, class,
etc.
18. State two methods/tools that a system analyst may use to design a system. (2mks)
- Use of system flowcharts
- Data flow diagrams
- Entity relationship models
- Structured charts
19. Explain three tasks that are carried out during system implementation. (3mks)
- File conversions
- Staff training
- Project management
- Changeover strategies.
73
20. Your school has decided to replace its library control system. The current system was
implemented ten years ago but has restricted reporting facilities and has a text-based interface.
The school intents to replace the old system with a new computerized system, and is now
considering both ‘Parallel running” and “direct changeover”.
a). (i) Briefly explain the terms parallel running and direct changeover as used in system
implementation. (2mks)
Parallel running is where both the old and the new systems are run in parallel to each other (a
the same time) for sometime until users have gained confidence in the new system. Data is
processed on both systems in order to compare their performance, and also cross-check the
results.
Direct changeover is a complete replacement of the old system with the new system in one bold
move. The old system is stopped & abandoned and the new system starts operating
immediately.
(ii) Give two disadvantages of direct changeover over parallel running. (1mk)
o It may be very inconveniencing (or, the organization will incur huge losses) in case the
new system fails or faces problems.
o The users may not have gained enough confidence to run the new system.
o The weaknesses of the old system may not be corrected & may still be transferred to
the new system.
o Loss of jobs for the workers whose departments are affected.
o If the new system fails, data recovery may be impossible.
(iii) Mention any two advantages of running both the manual system ad the computerized
system simultaneously. (2mks)
o If the outputs from the two systems are similar, confidence in the ICT systems.
o Users have time to familiarize themselves with the ICT systems.
o It is reliable because it enables thorough testing.
o Weaknesses in either of the systems are corrected.
-
74
- Running cost is low because of the minimal hardware required.
- Reliable and error-free.
- Enhances faster communication
- It is not time-consuming.
Disadvantages of networking
- High initial installation cost (i.e., expensive to install).
- Security threats e.g., hacking, which posses a great danger to loss of information
- Moral and cultural effects.
- Spread of terrorism, drug-trafficking and viruses.
- Over reliance on networks.
Disadvantage
o They suffer from high attenuation
o affected by electromagnetic fields
o It has low data transmission rates as compared to other cables
75
Advantages
o They have a large bandwidth (up to 1 Gbps) compared to twisted pair cables
o They can carry voice, data and video signals simultaneously
o They are more resistant to radio and electromagnetic interference than twisted pair
cables
Disadvantages
o They are hard to work with
o They are expensive to buy & install
iii) Fibre optic cables is made of transparent glass and uses light to transmit data signals
from one point to another on the network.
Advantages
o It is immune to electromagnetic interference, and eavesdropping.
o It is fast and supports high bandwidth
o It has low attenuation; hence, a long distance can be covered
o It is small & light.
Disadvantages
o Difficult & expensive to install
o Once broken, it is difficult & expensive to repair.
iv) Wireless/microwave/radio transmission. (3mks)
In wireless transmission, no physical connections are used to transmit data from one
point to another. Instead a transmitting antenna & a receiver aerial are used to facilitate
the communication
Advantages
o wireless networks can span large geographical areas easily
o Can be used in very remote areas that do not have high cost physical infrastructure like
telephone lines
o Flexible.
Disadvantages
o The initial cost is very high
o It is relatively difficult to establish or configure.
7. Explain the function of the following network devices:
i) Network interface card (NIC)
NIC creates a physical link between the computer and the transmission media.
ii) Gateway
Gateways provide access to the Wide area networks & the Internet.
iii) Bridge
This is a network device that selectively determines the appropriate network
segment for which a message is meant to be delivered.
iv) Repeater
A repeater receives a weak signal on the network, cleans and amplifies it for
transmission over the next portion of the network. Signals become weak due to
attenuation
8. List two advantages of cell phones over fixed lines. (2mks)
Are cheaper than fixed lines
Less prone to transmission errors
76
Can be used even where there are no telephone lines
Portable, i.e. can be carried around
9. a) Study the diagram below and answer the questions that follow:
i) Name the
communication
media depicted in the
above diagram. (1mk)
Satellite
communication
77
i) Financial systems, e.g. accounting, stock exchange, payroll, banking, etc,
ii) Transport systems, e.g. air traffic control, shipping control, automobile traffic
control
iii) Entertainment systems, e.g. used in showing movies, playing music, &
computer games.
iv) Scientific research, i.e. weather forecasting, medical research, military & space
exploration.
3. State two ways in which a computer may be used in efficient running of a hospital.
- Keeping records of incoming and outgoing patients
- In electro-cardiogram screening and monitoring, analyzing the sickness & checking
for damages, e.g. X-ray
- A computer controls life supporting machines
- For inventory control
- To access foreign expertise or labour, i.e. to get in touch with consultants or surgeons in
another country, thereby reducing traveling of patients & professionals.
4. a) Name the type of processing that would be required by a payroll system. (1mk)
Batch processing
5. a) Write down all the input and output devices of an ATM machine of Pesa-point in
Kenya.
- Keyboard
- The ATM card
- Screen (Visual display)
- Printer
78
7. Define the following terms:
a) Biometric analysis
This is the study, measurement & analysis of human biological characteristics. It uses a
computer and a biometric device to recognize & analyze features of human body parts such as
fingerprints, lips, voice iris colour, etc
b) Telecommuting
A situation where an employee works in a location that is remote from the
normal place of work either on full-time or part-time basis.
10. Describe how computing has been applied to each of the following areas:
i) Transportation systems. (2mks)
- Used by railway corporations to coordinate the movement of their goods & wagons
- Used in airline industry for air traffic control, surveillance of airspace using radar
equipment
- Used in shipping control
- Used in automobile traffic control in busy towns, i.e. to simulate the timing of traffic lights.
11. Suggest how computers may in future be made more user-friendly for persons
that are:
79
a) Blind (1mk)
- Development of Braille keyboards, or engraved keyboards
- Computers can be installed with talking software, i.e., can store voice patterns
of the user
b) Without hands
- Use of voice-activated commands.
- Computers can be installed with powerful multimedia system & speech
recognition devices.
12. Give at least four reasons why a firm may decide to computerize its operations
- Handling of errors easily
- Easy storage and retrieval of information
- Increased efficiency
- Higher quality work
- Reduced cost.
80
IMPACT OF ICT ON SOCIETY
1. Identify four problems associated with the introduction of computers in a society.
(4mks)
o Job displacement and replacement
o Computer crimes, e.g. piracy, fraud, hacking
o Health effects, e.g. repetitive strain injury, eye problems
o Cultural effects and immorality (DVD’s, pornographic literature on the Internet
2. Distinguish between “job replacement” and “job displacement” in reference to
Computerization (2mks)
In job replacement, the unskilled workers may be replaced with the skilled ones. In job
displacement, some employees may be displaced/ moved to new working areas as the
computer may serve to perform tasks that may be performed by several people.
81
(ii) Pace of growth (2 mks)
- Reduced costs
- Reduced need for manpower
- Reduced space requirement
- Greater output
6. State three reasons why users may resist the introduction of information and communication
Technology (ICT) to their place of work
(i) Fear of change- people are creatures of habit, hence are afraid of change
(ii) Fear of losing their jobs: By installing the computer into an organization, employees fear that
they might end up losing their jobs
(iii) Fear of failure – Since the computer is very new in a given working environment, the people
will be afraid that they might never get used to it.
(iv) Loss of control: The management fear that once a computer system is implemented, they might
lose control of the organization.
82
(i) Web administrator
- Develop & test websites
- Maintains, updates & modifies information on the websites to meet new demands by the users.
- Monitors the access & use of internet connection by enforcing security measures
- Downwards information needed by an organization or institution from internet websites
5. Explain two factors one would consider before enrolling for an ICT course in a college
- The cost of the course
- Marketability of the course, i.e. whether it offers courses recognized both locally and
internationally.
- Basic course requirement, e.g. qualifications
- Job opportunities
83
SAMPLE PAPER
INSTRUCTIONS TO CANDIDATES
This paper consists of TWO sections A and B
Answer ALL the questions in section A.
Answer questions 16 and any other THREE questions from section B
2. Threats to the safety of computer system take many forms such as: white- collar crime,
natural disasters, vandalism and carelessness.
Give one way as to how each of these forms of threat can be controlled ( 2 mks)
(i) White- collar crime
- Use of policies
- System auditing and use of log files
- Use of passwords
- putting in place punitive measures
- Data encryption
- Use of firewalls
84
- Use of fire- proof data saves
- Contingency plans
(iii) Vandalism
- Tighten security measures, e.g. use of alarm systems, fitting, burglar- proof doors
- Punitive measures.
(iv) Carelessness
- Better selection of personnel
- Improve employee training and Education Plus Agencies
- Limit access to data and computers
- Regular backups
- Use of UNDELETE and UNFORMAT utilities
3. (a) Explain the term nibbles as used in data representation in computers ( 1 mk)
A nibble is a group of 4 binary usually representing a numeric number.
(b) Perform the following binary arithmetic, giving the answers in decimal notation
(3 mks)
(i) 1110.0111 + 1101001.11
1110.0111
1101001.011 +
1110111.1101
85
This is a single sheet or card small enough to fit into a pocket, which the user may keep handy
for help with common tasks carried out with as program.
7. (a) Distinguish between labels and formulae with respect to spreadsheets ( 2 mks)
Labels are text consisting of alphanumeric characters, while a formula is a sequence of values,
cell references, functions and arithmetic operators whose calculations results to a numeric
value.
8. List three differences between Wide Area Networks (WAN) and local Area Networks (LAN)
( 3 mks)
- LAN is limited to a small geographical distance
- Data transmission speed in LANS is higher
- Cost of data transmission in LANs is small
- There are less transmission errors in LANs
9. Study the flowchart segment below and state the last value printed from the flowchart
( 1 mk)
An expert system is
computer software that
mimics human expertise
in a particular area of
specialization
86
(b) State any two components of an expert system (2 mks)
- Inference mechanism (for making decisions)
- Knowledge base
- Explanation facility
- User interface
11. Give reasons why optical disks are better storage media compared to floppy diskettes
- Have a high storage capacity
- More secure against alteration, i.e. they require writers to alter their contents
- More robust, i.e. can resist temperature, electromagnetic fields and not affected by water and
dust.
- Have a relatively high access speed
- Cheaper per unit of storage. Optical disks can be used for storage of large volumes of data,
hence making them economical.
- Have high data transfer rates
87
SECTION B (60 MARKS)
Answer question 16 and any other three questions from this section
16. Study the flowchart below and answer the questions that follow:
UNTIL COUNT = 10
END
OR
Program ABC (input, output);
USES Win CRT;
VAR
A, B, C, COUNT: INTEGER;
BEGIN
A: =0;
B: = 1
FOR COUNT: 0 TO 10 DO
Begin
Writeln (B);
C: A + B
A: = B;
B: = C’
End;
88
END
(c) Modify the flowcharts so that it adds up all its outputs and displays the sum obtained
(3 mks)
(b) Which operating system might be pre- installed in this computer and why? (2 mks)
Any version of windows, Linux, Macintosh, OS/2, UNIX, Solaris, Scounix
Reason- the office suite can only work under windows environment (3 mks)
89
- Microphone
- Sound card/ adapter
- TV Tuner card
- Editing card
- Digital camera
- VGA or SVGA graphics card and monitor
- A RAM of 32 MB or higher
(d) (i) What is meant by computer aided manufacture?
CAM is the use of computers in the manufacture of industrial products (2 mks)
(b) List any three items that may be referred to as data terminal equipment in a network
( 3 mks)
- Servers
- Dummy terminals
- File servers
- Printers
- Modems
- Terminators
(d) State three advantages and two disadvantages of mesh network topology ( 5 mks)
90
Disadvantages
- Difficult and expensive to install and maintain
- Very costly as it requires large amounts of cables ( or redundant links)
- Difficult to add more nodes when the network is large
- Difficult to isolate faults due to lack of a central control point
19. (a) A company has decided to computerize their operations. They have decided to purchase
packages instead of developing their own programs. Give three advantages and two
disadvantages of their approach. ( 5 mks)
Advantages of packages
- They are cheaper to purchase as the cost of developing them is effectively shared between
the purchases
- There is saving of the programming effort because; the company buys the software when
ready- made
- Packages are thoroughly tested
- Relatively quick results are obtained
Disadvantages of packages
- The purchaser is not in direct control of the software because he/ she is not involved in
developing it.
- Packages are produced to meet general needs, hence may not deal with the specific user or
company needs.
- Packages cannot be modified (customized) Due to the application of the developer’s copyright
acts.
- Packages include extra facilities which may not be required by an individual user or
company
- Packages may allow only a clumsy solution to the task at hand
- Some packages have capabilities which will require the user to develop them further.
- It is easy to forget the commands to use the package, especially if it is not used frequently.
(b) (i) Explain why a value such as 6112334445555 may be displayed as ####### when typed in
a cell on a spreadsheet ( 2 mks)
(c) With reasons, briefly describe the most appropriate type of printer or output device for the
output of: (6 mks)
(i) Customer invoices on multi- part stationery
Dot- matrix printer ( or any impact printer)
It produces sharp impact on both original land and the copies
91
20. (a) Distinguish between the following pairs of terms
(i) Data verification and data validation
Verification is checking data manually to ensure/ ascertain that it has been transcribed (written
out) correctly.
Validation involves subjecting data to checks built in a program to check for its appropriateness
or integrity before it is processed.
(b) Draw a labeled diagram to illustrate the internal structure of a diskette. (4 mks)
(d) Speed and accuracy are some of the advantages of using computers in banking. State three
other advantages of using computers in banking (3 mks)
- Makes it easy to access information
- It is easy to update records
- requires less space for storage of documents
- Improved data security & privacy
SAMPLE PAPER
INSTRUCTIONS TO CANDIDATES
This paper consists of TWO sections A and B
92
Answer ALL the questions in section A.
Answer questions 16 and any other THREE questions from section B
SECTION A ( 40 marks)
Answer all the questions in this section
4. What is meant by the term dry running as used in program development? (2 mks)
A method of checking a program for logical errors by making the corrections on a paper or
from the printouts
5. A computer teacher has put a rule that diskettes should not be used in the computer laboratory
93
(a) Give a reason for the rule
- To prevent the spread of viruses between the computers
- To prevent unauthorized copying of programs from or to the computers
- Students may carry immoral files using the diskettes
(b) State two alternatives that can be used to achieve the same objective (2 mks)
- Using diskless computers
- Use of antivirus software to detect/ clean viruses before use
6. List three differences between a laser printer and a dot matrix printer (3 mks)
- Laser printers are faster than dot matrix printers
- Laser printers are quiet while dot matrices are noisy
- Laser printers use thermal technology while dot matrix is an impact printer
- Laser jets use Toner cartridges while dot matrix use ribbons
- A laser printer is expensive than a dot matrix
- The print quality of a laser printer is better
94
- Updates the database by adding new record, modifying the existing records & deleting the
unnecessary records.
- Responsibilities for the security of data in the database (i.e. designs & sets up security measures
needed to control access to the organization’s data.
- Ensures the database meets the information needs of the organization
- Ensures facilities for retrieving data and structuring reports are appropriate to the needs of the
organization
- Responsible for documenting the manuals for users
12. (a) In DOS, what are the following commands used for?
(i) RD - Remove directory- means deleting a directory from the tree
(ii) DEL - deletes all files in a particular directory
(b) What happens when the following commands are typed in the DOS environment?
(i) CD Changes the directory one level up the directory tree
(ii) Dir It lists all the contents of the current directory
= B2*$B9
(b) Write two different formulae that can be typed to obtain the total in cell B6 and then copied to
cell C6.
= SUM (B2: B5) (2 mks)
OR
= B2 + B3 + B4 + B5
95
14. State three operations that can be performed on a relational database files (3 mks)
- Indexing
- Sorting
- Filtering
- Querying
- Updating of records
- Report generation
15. List three parts that constitute an array definition statement ( 3 mks)
- Array name
- Range, which contains the initial value & the final value
- Data type
E.g. Score: Array [1….50] of integer
16. Bidii wholesalers has two categories of customers for order processing, category ‘A’ obtains
10% discount on all orders up to Kshs 10,000 otherwise the discount is 20% on the entire order.
Category “B’ obtains 30% discount on all orders if the debt repayment is ‘good’ otherwise the
discount is 15%. Draw a flowchart for the order processing. (15 mks)
96
97
17. (a) List three application areas of artificial intelligence ( 3 mks)
- Expert systems, e.g. medical diagnosis, engine repair, legal defense etc
- Natural language processing
- Artificial neutral networks e.g. investment analysis, signature Analysis, etc
- Robotic/ perception systems
(b) With the improvement in price and performance of computers and communication
equipment it will be possible for people in various business organizations to work from home.
Such working using a PC as a remote terminal is often described as teleworking. State three
advantages and three disadvantages of working from home.
( 12 mks)
Advantages
- Reduces unnecessary travel to the place of work
- Reduces traveling expense (i.e. saves traveling time, risk and cost)
- There is less stress due to commuting inconveniences such as traffic jams
- Reduces office space, equipment and cost
- Extends working hours
- Suitable for people with disabilities, because they are able to overcome the barrier of not being
able to commute to an office
- People can live where they choose without the worry of having to move towns and break up
social & family networks in order to find suitable employment.
Disadvantages
- Lack/ unavailability of appropriate facilities to allow the work to be done
- There is poor security on home offices
- Privacy threats
- Lack of control and supervision. The workers have to be able to motive themselves to work
without supervision
- There is possible delegation of duties to unauthorized persons
- Isolated employees may be exploited in an environment where they can’ t easily get support
from co- workers
18. (a) Explain three ways by which computer users can protect their eyes from harmful emissions
from the computer screen ( 6 mks)
- Using antiglare (radiation filter) screens that are specially tinted to reduce the radiation from the
monitor or light that reaches the eye.
- Controlling light intensity by adjusting the brightness buttons on the screen
- Tilting the monitors so as not to face the user directly
- Wearing special spectacles when using computers in order to control the light intensity.
- Avoid using flickering monitors as they can cause extreme eye strain that can damage eyesight.
- Very bright wall paints reflect too much light into the user’s eyes.
- Taking frequent rests
(b) List three factors to be considered when deciding on the choice of an electronic data
processing method
- Type and size of business
- Timing aspects of the information produces
- Link between applications
- Volume of data records held in the organization
98
- Cost pf acquiring the relevant hardware, software, storage media, etc the cost of maintenance
- Operation speed
- Quality of output required
(c) Explain time sharing data processing mode, giving two advantages and two disadvantages
(6 mks)
Time sharing is a processing mode where a central processor services 2 or more users who have
different requirements.
19. A school bought a computer system. The hardware items supplied include: a 800 MHz processor, 64
MB of RAM, a sound card, speakers, a monitor, a keyboard, a 120 GB hard disk, a floppy disk drive, a
CD – Read/ write drive, a mouse, a modem, an inkjet printer and a joystick.
The software supplied include: an operating system, a BASIC interpreter and the following packages:
spreadsheets, graphics, word processor, art, database and games
99
(c) Some of the students in the school use the computer to do homework. Name the package
used to:
(i) Do calculations and draw graphs (1 mk)
Spreadsheets
20. A school organizes its work in directories. The director WP contains the files CATS, EXAMS and
ASSIGNMENTS. The directory of SP contain the spreadsheet files. The directory DB contains the
database files. The directory PROG is contained in the OTHERS directory. The directory WP also
contains the PERSONAL directory. Given that the directory STUDENT contains directories SP, DB,
WP and OTHERS
(a) Draw the directory tree structure with C as the root (7 mks)
(2 mks)
C: STUDENT\DB>
(d) Give two reasons for storing files in directories and subdirectories (2 mks)
- Management of the files will be easier
- Retrieving of certain files will be easier
- To avoid accidental deletion/ erasure of files when the files in C are being deleted.
(e) Give two disadvantages of using command driven interfaces as compared to menu driven
interfaces ( 2 mks)
100
- The user must know the command to type
- It is less user- friendly i.e. it is not easy to use
- The user is required to master the format/ syntax of all commands and their usage perfectly.
- Writing commands is time consuming
101
SAMPLE PAPER
INSTRUCTIONS TO CANDIDATES
This paper consists of TWO sections A and B
Answer ALL the questions in section A.
Answer questions 16 and any other THREE questions from section B
2. (a) Explain why the following controls should be implemented for computer based systems
( 2 mks)
(i) Back- ups - Backups can be used to recover/ restore/ prevent lost data
(ii) Password- Passwords control access to computer systems/ facilities
(b) For each of the following give one reason why they are not allowed in a computer laboratory
( 2 mks)
(i) Smoking
Smoke particles settle on storage devices and may scratch them during read/ write operation
It can cause fire
It deposits ash on devices causing malfunction
It affects the health of other users
(ii) Eating foods
Food particles may fall into the moving parts of the computer and damage them
3. Distinguish between real, integer and character data types as used in programming:
Real:
102
- Used for numeric values that may contain fractions/ decimals
- Has a higher range than integer
Integer
- Used for whole numbers
- Has a lower range than real
Characters
- Used for alphanumeric/ control/ signal/ graphical character
- Character uses fewer bits than a real or integer
4. The cells K3 to K10 of a worksheet contain remarks on students ’ performance such as very good,
good, fair and fail depending on the average mark. Write a formula that can be used to count
ALL students who have the remark “very good”. (3 mks)
=COUNTIF (K3:K10,’’Verry Good’’)
7. (a) Name the control structure depicted by the flowchart below ( 1 mk)
103
Selection control structure e.g., If-then-else
10. Name two types of relationships that can be applied in database design. (2mks)
- One to one
- One to many/ Many to One
- Many to Many
11. Explain the following terms as used in word processing: (3 mks)
a) Indenting
It is moving of line/paragraph text away from the left or right margin
Leaving a space at the beginning of a line/paragraph of text from the margin
b) Alignment
Refers to how text is positioned/lined up in a paragraph relative to the left, right or
centre of the page.
c) Word wrap
A facility that word processor use to automatically move the text cursor to the beginning of the
next line when it reaches the right margin automatic rolling of text to the next line when you
reach the end of the line.
12. Outline two ways in which computers can be used in hotels. (2mks)
Reservation/booking of rooms
Record keeping on sales and purchases (stock control)
104
Producing bills & payrolls
Marketing and advertising
Communication
Security
13. a) Explain binary coded decimal code of data representation. (1mk)
This is a data encoding system that uses 4 binary digits to represent an individual decimal digit.
45110 = 010001010001BCD
15. State two health issues that may result from prolonged use of computers. (2mks)
Harmful radiations that cause damage to eyesight/eye problems
eyestrain/eye fatigue
Headaches
Repetitive Strain Injury (RSI) i.e. arm strain, wrist strain
finger deformation
Back strain.
SECTION B (60 MKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS FROM THIS SECTION
ii) The programmer would check whether the program does as required program
A=30
Testing
iii) The user guide would be written
Program testing
A= B 105
Write A, B
A= 30, B= 30 (2mks)
106
Begin
Writeln (‘Input R1 and R2’); Readln (R1, R2) 1
END
17. a) List paragraph formatting activities in word processing. (3mks)
Highlighting:
- Selecting or marking a given of text e.g., a word, sentence or paragraph, in order to work with it
- Highlighting is temporary.
Bolding:
- making the selected text appear darker then the rest of the text
- To add emphasis to the text by thickening/darkening the characters
- Bolding is permanents.
c) The following information shows the income and expenditure for “behayote”
matatu
for five days. The income from Monday to Friday was Ksh. 4,000, 9,000, 10,000, 15,000, and
12,000 respectively while the expenditure for the same period was Kshs. 2,000, e, 000, 7,000,
5,000, and 6,000 respectively.
i) Draw a spreadsheet that would contain the information. Indicate the rows as 1, 2, 3…..And the
columns as a, B, C…. (4mks)
A B C
1 BEBA YOTE MATATU
2 Day Income Expenditure
(Ksh) (Ksh)
3 Monday 4,000 2,000
4 Tuesday 9,000 3,000
5 Wednesday 10,000 7,000
6 Thursday 15,000 5,000
7 Friday 12,000 6,000
107
= B3-C3
II Total income
= SUM(B3:B7) -OR- =B3 + B4 + B5 + B6 + B7
III Highest expenditure.
= MAX(C3:C7)
18. (a) Subtract 01112 from 10012
1001
0111 –
0010 =00102 =102
(b) Using two's complement, subtract 7 from 4 and give the answer in decimal notation.
(4 marks)
Step 1: Write it as 4 + (-7)
Step 2: Change the values to 8 binary digits.
2 4 Rem
2 2 0
1 0
1 1
=000001002
2 7 Rem
2 3 1
1 1
1 1
=0000011
Step 5: Add the binary equivalent of the first value to the Two's complement of the
second value.
00000100
11111001 +
11111101 = 111111012
9 1 B
108
8 2331 Rem
8 291 3
8 36 3
8 4 4
4 4
82 81 80
3 7 6
16 15 14
15 15
3768=FE16
2 9 Rem
2 4 1
2 2 0
1 0
1 1
0.625x2-1.25 1
0.250x2 = 0.50 0
0.50x2 =1.00 1
0.62510-1012
9.62510= 1001.1012
109
19. (a) Explain what the following DOS commands will do when executed.
(i) A:\>copy *.* B: (2 marks)
Copy all the files from drive A: to drive B:
(ii) C:\>ERASE *.DOC (2 marks)
Delete all files with extension .DOC from drive C:
(iii) B:\>DIR P*.BAT (2 marks)
Display all the files beginning with P and have extension of .BAT in drive B:
(iv) A:\>MD EXAMS (2 marks)
Creates a directory called EXAMS in drive A:
(b) (i) With the aid of a diagram, explain hierarchical (tree) network topology.
(3 marks)
It is connected in such a way that nodes are in different levels of control such that higher nodes
control those below them.
A child node has only one parent but a parent node can have more than one child.
The child nodes can only be accessed through the parents.
(ii) List two advantages and two disadvantages of hierarchical network
topology. (4 marks)
Advantages
- Provides centralized control.
- Enhances data security & privacy.
- Easy to isolate faults.
- Easy to add and remove nodes.
- If a non-critical node fails, partial communication is still possible.
Disadvantages
110
- Slow data movement along the branches.
- If the parent node fails, the child nodes are inaccessible.
- Difficult/sophisticated to implement in a wide area network.
50. (a) Name and explain the function of the keyboard keys represented by the following
symbols.
Used in Word processors to move certain text or the cursor at set intervals on the
Same line to the required position on the screen.
Used to move from one cell to another.
Used to move the cursor between options. ,
Used to indent text.
It is used as a RETURN key. When pressed at the end of a text line or paragraph in a word
processor, it forces the text cursor to move to the next line or paragraph.
It is used to issue completion commands to the computer. It is used to instruct the computer to
carry out (execute) a command that has been typed or selected on the screen.
It can be used for changing cases, e.g., to get single capital letters.
It is used to get the punctuation marks on top of the Number keys or the symbols
on top of certain keys .especially on the alphanumeric section.
Used for shortcuts in combination with other keys, e.g., SHIFT + DEL
111
- Entertainment, e.g., games.
(iii) State three advantages of computer based simulation. (3 marks)
Saves cost - it is an economical/cheap way of testing models before actually building them.
It enables the manufacturers identify weaknesses of the real situation or object, hence;
put the correct reinforcements to their designs
Reduces risks - it allows some activities that would otherwise be expensive & dangerous in
real-life situation to be put under test.
Faster.
Convenient. .
(c) Explain three ways in which computers have impacted on education.
- Standardizing learning.
- Has ensured quality output.
- Brought the need for retraining staff.
- Enabled distance learning,
- Created jobs, e.g., computer trainers.
- Causes job displacement and replacement.
(3 marks)
112