Computer P1
Computer P1
Instructions to candidates
(a) Write your name and index number in the spaces provided at the top of this page
(b) Sign and write the date of examination in the spaces provided above
(c) This paper consists of TWO sections; A and B.
(d) Answer question 16 and any other THREE questions from section B
(e) All answers should be written in the spaces provided on the question paper
(f) This paper consists of 18 printed pages
(g) Candidates should check the question paper to ascertain that all the pages are
printed as indicated and that no questions are missing.
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
3. One way in which an organization enforces security of its computer systems is by
restricting the use of removable media such as floppy disks and flash memories.
Give two reasons for this. (2 marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
5. When purchasing a computer, the clock speed, RAM size, hard disk size and
monitor size are often quoted. State the unit for measuring: (2 marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
7. A student saved a document in a diskette. Later on, the student found that the
diskette could not open and therefore the work got lost.
Give three precautions the student should have taken to ensure the work was not
lost. (3 marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..
8. Differentiate between relative cell referencing and absolute cell referencing
(2
marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
9. State two:
(a) functions of an email software; (1 mark)
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..
11. Describe the following types of relationships as used in Database design:
(4
marks)
(a) One-to-one
(b) One-to-many
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
12. State the stage of system development life cycle in which each of the following
activities take place:
…………………………………………………………………………………..
…………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
13. The figure below is a toolbar for a DTP package.
A: ……………………………………………………………………………..
………………………………………………………………………………..
B: ……………………………………………………………………………..
………………………………………………………………………………..
C: ……………………………………………………………………………..
………………………………………………………………………………..
14. State two roles of a programmer in system development life cycle (2 marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
15 (a) What is meant by disk defragmentation? (1 mark)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
SECTION B (60 marks)
Answer question 16 and any other THREE questions from this section in the spaces
provided
(i)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
(ii)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
(iii)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
(b) Below is an algorithm that is used to compute the values of R, S and T.
P=5
Q=6
INPUT
If N is GREATER OR EQUAL TO 10
R = P* Q
S=Q–P
T=P+Q+R+S
ELSE
R=P+Q
S=Q
T=R+S
END IF
PRINT R, S and T
From the algorithm, determine the output if the input value of n is:
(i) 7; (3 marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
(ii) 10 (3 marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
(c) Draw a flowchart for the algorithm in Question 16 (b) (6 marks)
17 (a) Convert each of the following binary numbers to decimal equivalent given
that the left most digit is a sign bit.
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
(b) Convert the decimal number 0.42 to 6 bit binary notation (4 marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
(c) Using two’s complement, subtract 1110 from 810, leaving your answer in binary
notation. (5 marks)
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
1 1 0 0 1 + 1 1 0 1 - 101
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
18 (a) State three techniques used by a network administrator to detect and
prevent computer crimes. (3
marks)
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
(b) A company in town wishes to link its offices together. The linking may be
through wireless or fibre optic network media.
(i) State two benefits that the company would gain from the use of
metropolitan area network (MAN). (2
marks)
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
(ii) State three advantages of using wireless over fibre optic network
media. (3
marks)
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
(c) State three ways in which computer virus infection can be prevented other than
through restricting the usage of removable storage media. (3 marks)
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
(c) The following records were extracted from two files that contained student data.
File A:
Reg. No. Student Name Sex Address
File B:
Reg. No. Fees payment Date of Payment
(i) Which of the two files above represents a Transaction file? (1 mark)
…………………………………………………………………………………..
…………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
(d) An airline uses an information system whereby if a passenger at station A books a
plane seat, this transaction is immediately shown at stations A and B such that no
other passenger can book the same seat.
…………………………………………………………………………………
(ii) State two advantages and two disadvantages of this data processing mode.
(4
marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
20 (a) With the aid of a diagram, describe the Hierarchical Database Model.
(4
marks)
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
(b) List three factors that should be considered when developing a database
application and give reasons why each should be considered.
(6 marks)
……………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
(c) (i) Name three types of validation checks during data entry (3 marks)
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………
…………………………………………………………………………………..
…………………………………………………………………………………..
………………………………………………………………………………….