0% found this document useful (0 votes)
48 views7 pages

End of Term 2 Form 2 - 2022 (Computer)

The document is an examination paper for Form 2 Computer Studies at Newlight Senior Boys, covering various topics such as data confidentiality, security threats, e-commerce, and database concepts. It includes multiple sections with questions requiring definitions, descriptions, and explanations related to computer systems and software. The exam is structured into two sections, with Section A consisting of 70 marks and Section B 30 marks, allowing students to demonstrate their understanding of computer studies.

Uploaded by

Godfrey Mudavadi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views7 pages

End of Term 2 Form 2 - 2022 (Computer)

The document is an examination paper for Form 2 Computer Studies at Newlight Senior Boys, covering various topics such as data confidentiality, security threats, e-commerce, and database concepts. It includes multiple sections with questions requiring definitions, descriptions, and explanations related to computer systems and software. The exam is structured into two sections, with Section A consisting of 70 marks and Section B 30 marks, allowing students to demonstrate their understanding of computer studies.

Uploaded by

Godfrey Mudavadi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

NEWLIGHT SENIOR BOYS

END TERM 2 EXAMS (2022) – FORM 2


COMPUTER STUDIES TIME: 2HOURS
NAME………………………………………………………ADM NO. ……………………….
SECTION A – 70 MARKS
Answer all questions in this section
1. Define the following terms (3mks)
i. Data confidentiality
………………………………………………………………………………………
………………………………………………………………………………………
ii. Data security
………………………………………………………………………………………
………………………………………………………………………………………
iii. Data control
………………………………………………………………………………………
………………………………………………………………………………………
2. a) Describe any two security threats to data in a computer system (4mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
b) Suggest any two possible measures that can be put in place to protect data against each
threat you have described in (a) above (4mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
3. a) Differentiate between data encryption and data interception (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
Newlight Senior Boys Page 1 of 7 DEP. Of Information Technology
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
b) State four advantages of E-commerce (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
c) Give the distinction between sign in and sign up as used in electronic mail (3mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
4. a) List any five documents that can be produced using word processing software (5mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
b) Explain each part of the following e-mail address (4mks)
[email protected]
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
c) List three points to illustrate the importance of the internet (3mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
5. Your school board of Governors are considering computerizing the school’s system but
some of them don’t understand how information in files will be stored.
i. Explain to the board the meaning of a database and its functions (4mks)

Newlight Senior Boys Page 2 of 7 DEP. Of Information Technology


………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
ii. Give them two examples of database models they can adopt to develop the system
(2mks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
iii. Explain to them the following terms that will be frequently used in their database
(3mks)
a. File
…………………………………………………………………………………
………………………………………………………………………………….
b. Record
…………………………………………………………………………………
………………………………………………………………………………….
c. Form
…………………………………………………………………………………
………………………………………………………………………………….
6. a) Explain the difference between primary key and foreign key (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
b) Describe how a fire wall works (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
c) The formula =B20-200 was typed in a cell B25, and copied to E25. Write the formula
as it appears in the destination cell (3mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
Newlight Senior Boys Page 3 of 7 DEP. Of Information Technology
7. a) When Microsoft word is started a blank document appears on the screen.
i. Name and explain any three features on this screen (6mks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
ii. Describe how one can change the color of a typed text (2mks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
8. a) Distinguish between buffers and registers (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
b) Describe the arithmetic and logic unit (ALU) of the central processing unit
(3mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
9. a) Discuss the input devices of the computer hardware system (3mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
b) Explain what happens when you format a disk (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
10. a) Sang’ale, the managing director of Dida Suppliers LTD wants to automate the
company’s operations. He invited a programmer to come up with a software that could
help to monitor company’s operations.
i. Give the type of software developed by the programmer (1mk)
Newlight Senior Boys Page 4 of 7 DEP. Of Information Technology
………………………………………………………………………………………
ii. State two disadvantages of the software developed by the programmer (2mks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
iii. Compare and contrast the software that was developed and Microsoft office
(3mks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………....
b) The programmer later after developing the software, he requested the manager to
purchase some hardware that the program could run on
i. Identify any three hardware the company should buy (3mks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
i. State two negative effects to employees after the automation of the company’s
operations (2mks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
SECTION B – 30 MARKS
ANSWER ANY TWO QUESTIONS
11. The table below is an extract from a database. Use it to answer the following questions
Names Maths Computer studies gender
Jackson 78 80 M
Kimeu 68 70 M
Atieno 72 92 F
Wafula 62 75 M
Average
i. Name the table view(2mks)
………………………………………………………………………………………………
ii. Name the record that will appear first if the records are sorted in descending order by
computer studies (3mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
Newlight Senior Boys Page 5 of 7 DEP. Of Information Technology
iii. State the criteria used in extracting the following information
a. Calculating the average for math (2mks)
…………………………………………………………………………………………
………………………………………………………………………………………….
b. Displaying all records starting with K (2mks)
………………………………………………………………………………………….
c. Displaying all records of male gender (3mks)
…………………………………………………………………………………………
………………………………………………………………………………………….
12. a) Discuss the following start menu items (10mks)
i. programs menu
………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………....
ii. Log Off
………………………………………………………………………………………
………………………………………………………………………………………
iii. Turn off
………………………………………………………………………………………
………………………………………………………………………………………
iv. Stand by
………………………………………………………………………………………
……………………………………………………………………………………....
v. Control panel
………………………………………………………………………………………
………………………………………………………………………………………
b) Explain the following disk management utilities (5mks)
i. Disk Defragmentation
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………....
ii. Disk Compression
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
13. a) Discuss in details the central processing unit of a computer (10mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
Newlight Senior Boys Page 6 of 7 DEP. Of Information Technology
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………....
b) Describe the ideal environment for a computer to work properly (5mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………….

Newlight Senior Boys Page 7 of 7 DEP. Of Information Technology

You might also like