The document is an examination paper for Form 2 Computer Studies at Newlight Senior Boys, covering various topics such as data confidentiality, security threats, e-commerce, and database concepts. It includes multiple sections with questions requiring definitions, descriptions, and explanations related to computer systems and software. The exam is structured into two sections, with Section A consisting of 70 marks and Section B 30 marks, allowing students to demonstrate their understanding of computer studies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
48 views7 pages
End of Term 2 Form 2 - 2022 (Computer)
The document is an examination paper for Form 2 Computer Studies at Newlight Senior Boys, covering various topics such as data confidentiality, security threats, e-commerce, and database concepts. It includes multiple sections with questions requiring definitions, descriptions, and explanations related to computer systems and software. The exam is structured into two sections, with Section A consisting of 70 marks and Section B 30 marks, allowing students to demonstrate their understanding of computer studies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7
NEWLIGHT SENIOR BOYS
END TERM 2 EXAMS (2022) – FORM 2
COMPUTER STUDIES TIME: 2HOURS NAME………………………………………………………ADM NO. ………………………. SECTION A – 70 MARKS Answer all questions in this section 1. Define the following terms (3mks) i. Data confidentiality ……………………………………………………………………………………… ……………………………………………………………………………………… ii. Data security ……………………………………………………………………………………… ……………………………………………………………………………………… iii. Data control ……………………………………………………………………………………… ……………………………………………………………………………………… 2. a) Describe any two security threats to data in a computer system (4mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… b) Suggest any two possible measures that can be put in place to protect data against each threat you have described in (a) above (4mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… 3. a) Differentiate between data encryption and data interception (2mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… Newlight Senior Boys Page 1 of 7 DEP. Of Information Technology ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… b) State four advantages of E-commerce (2mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… c) Give the distinction between sign in and sign up as used in electronic mail (3mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… 4. a) List any five documents that can be produced using word processing software (5mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… b) Explain each part of the following e-mail address (4mks) [email protected] ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… c) List three points to illustrate the importance of the internet (3mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… 5. Your school board of Governors are considering computerizing the school’s system but some of them don’t understand how information in files will be stored. i. Explain to the board the meaning of a database and its functions (4mks)
Newlight Senior Boys Page 2 of 7 DEP. Of Information Technology
……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ii. Give them two examples of database models they can adopt to develop the system (2mks) ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… iii. Explain to them the following terms that will be frequently used in their database (3mks) a. File ………………………………………………………………………………… …………………………………………………………………………………. b. Record ………………………………………………………………………………… …………………………………………………………………………………. c. Form ………………………………………………………………………………… …………………………………………………………………………………. 6. a) Explain the difference between primary key and foreign key (2mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… b) Describe how a fire wall works (2mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… c) The formula =B20-200 was typed in a cell B25, and copied to E25. Write the formula as it appears in the destination cell (3mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… Newlight Senior Boys Page 3 of 7 DEP. Of Information Technology 7. a) When Microsoft word is started a blank document appears on the screen. i. Name and explain any three features on this screen (6mks) ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ii. Describe how one can change the color of a typed text (2mks) ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… 8. a) Distinguish between buffers and registers (2mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… b) Describe the arithmetic and logic unit (ALU) of the central processing unit (3mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… 9. a) Discuss the input devices of the computer hardware system (3mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… b) Explain what happens when you format a disk (2mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… 10. a) Sang’ale, the managing director of Dida Suppliers LTD wants to automate the company’s operations. He invited a programmer to come up with a software that could help to monitor company’s operations. i. Give the type of software developed by the programmer (1mk) Newlight Senior Boys Page 4 of 7 DEP. Of Information Technology ……………………………………………………………………………………… ii. State two disadvantages of the software developed by the programmer (2mks) ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… iii. Compare and contrast the software that was developed and Microsoft office (3mks) ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… …………………………………………………………………………………….... b) The programmer later after developing the software, he requested the manager to purchase some hardware that the program could run on i. Identify any three hardware the company should buy (3mks) ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… i. State two negative effects to employees after the automation of the company’s operations (2mks) ……………………………………………………………………………………… ……………………………………………………………………………………… ……………………………………………………………………………………… SECTION B – 30 MARKS ANSWER ANY TWO QUESTIONS 11. The table below is an extract from a database. Use it to answer the following questions Names Maths Computer studies gender Jackson 78 80 M Kimeu 68 70 M Atieno 72 92 F Wafula 62 75 M Average i. Name the table view(2mks) ……………………………………………………………………………………………… ii. Name the record that will appear first if the records are sorted in descending order by computer studies (3mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… Newlight Senior Boys Page 5 of 7 DEP. Of Information Technology iii. State the criteria used in extracting the following information a. Calculating the average for math (2mks) ………………………………………………………………………………………… …………………………………………………………………………………………. b. Displaying all records starting with K (2mks) …………………………………………………………………………………………. c. Displaying all records of male gender (3mks) ………………………………………………………………………………………… …………………………………………………………………………………………. 12. a) Discuss the following start menu items (10mks) i. programs menu ……………………………………………………………………………………… ……………………………………………………………………………………… …………………………………………………………………………………….... ii. Log Off ……………………………………………………………………………………… ……………………………………………………………………………………… iii. Turn off ……………………………………………………………………………………… ……………………………………………………………………………………… iv. Stand by ……………………………………………………………………………………… …………………………………………………………………………………….... v. Control panel ……………………………………………………………………………………… ……………………………………………………………………………………… b) Explain the following disk management utilities (5mks) i. Disk Defragmentation ……………………………………………………………………………………………… ……………………………………………………………………………………………… …………………………………………………………………………………………….... ii. Disk Compression ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… 13. a) Discuss in details the central processing unit of a computer (10mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… Newlight Senior Boys Page 6 of 7 DEP. Of Information Technology ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… …………………………………………………………………………………………….... b) Describe the ideal environment for a computer to work properly (5mks) ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………………………………… ……………………………………………………………………….
Newlight Senior Boys Page 7 of 7 DEP. Of Information Technology