0% found this document useful (0 votes)
15 views

Computer Studies - Computer Studies - Question Paper

The document is an examination paper for the Kenya Certificate of Secondary Education in Computer Studies for Form 4 students, scheduled for July 2025. It consists of two sections: Section A contains 14 questions worth 40 marks, covering various topics in computer studies, while Section B includes 5 questions worth 60 marks, requiring detailed answers on programming, spreadsheets, and internet safety. The paper assesses students' understanding of computer concepts, practical applications, and problem-solving skills.

Uploaded by

karatinagirlssec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Computer Studies - Computer Studies - Question Paper

The document is an examination paper for the Kenya Certificate of Secondary Education in Computer Studies for Form 4 students, scheduled for July 2025. It consists of two sections: Section A contains 14 questions worth 40 marks, covering various topics in computer studies, while Section B includes 5 questions worth 60 marks, requiring detailed answers on programming, spreadsheets, and internet safety. The paper assesses students' understanding of computer concepts, practical applications, and problem-solving skills.

Uploaded by

karatinagirlssec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Kenya Certificate of Secondary Education

OPENER EXAMINATION -2025


CODE 451/1 SUBJECT: COMPUTER STUDIES Paper 1
FORM 4

Name: …………………………………………….…… Adm No: ……….……

Class: ………………Candidate’s Signature: …….……..Date:

…..…/07./2025.

SECTION A (40 MARKS)


Answer ALL the questions in SECTION
1. For each of the following file organization methods state an appropriate storage medium
(2marks)
(i) Serial
.....................................................................................................................................................................

(ii) Random
.....................................................................................................................................................................

2. Suggest how technological advancement in ICT can be used to make the computer more user
friendly for persons that are (2marks)
(i) Blind
.....................................................................................................................................................................

(ii) Without hands


....................................................................................................................................................................

3. Describe how each of the following would affect the suitability of a room for use as a computer
room (2marks)
(i) Burglar proofed doors
.....................................................................................................................................................................

...................................................................................................................................................................

(ii) Availability of Taps and sinks


4. Give three methods that are used to transform an object in DTP (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

1
5. A computer student from Mbita High school typed Smith instead of Simth and 3455 instead of
3456

(i) Identify the type of error in each case (2mark)


.....................................................................................................................................................................

....................................................................................................................................................................

(ii) Explain how the error can be controlled (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

6. Typing in Ms-Word is easier and efficient. Give three features that make this possible (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

7. Describe three reasons why primary storage is not used for secondary storage (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

8. List two arithmetic operations that can be performed on a row of numeric in a word processing
table (2marks)

.....................................................................................................................................................................

9. One of the tasks of an operating system is to allow communication between the computer and the
user. Give three platforms created by operating systems to allow users to communicate with the
computer (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

10. Describe the following terms as used in data security (2marks)


(i) Threat
.....................................................................................................................................................................

....................................................................................................................................................................

(ii) Vulnerability
2
.....................................................................................................................................................................

.....................................................................................................................................................................

11. Give three ways you can wrap text on an object in DTP publication (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

12. Name three change case options supported by Ms-publisher (3marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

13. Describe two reasons which make laptops suitable for personal computing (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

14. State three damages that a computer virus may cause to computer (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

SECTION B (60 MARKS)


Answer question number 16 and any other three questions
15.
(a) Describe three language processors used in programming (3marks)
.....................................................................................................................................................................

(b) Identify the programming languages represented by the source code show below (3marks)

<! DOCTYPE html program MOV AL, 1h


<Html> writeDemo(output); MOV CL, 2h
<Head> var MOV DL, 3h
<Title> RIZZY X: integer;
</Title></Head> begin
</Html> x := 10;
WriteLn(output,
x:20);
Figure 1 Figure 2 Figure 3

.....................................................................................................................................................................

....................................................................................................................................................................

(c) Draw a flowchart which can be used to design a program to work out the cost of covering
the windows of a house with curtains given that; (9marks)
 Number of windows are six
3
 The area of the window is in square meters (SOW)
 The cost of material per square meter is (COM) is 400
 The length of a window is (L) and the breadth (B) in meters.
The Program should;
 Calculate the Area in square meters (SOW) required for each window and the cost
per window.
 Calculate the total cost for the six windows.
 Print the total cost of the material required
16.
12
(a) Convert base 10 ¿ binary number system (3marks)
32
.....................................................................................................................................................................

....................................................................................................................................................................

(b) Convert 1001011.010102 to decimal number (3marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

...................................................................................................................................................................

(c) Subtract 1101.011112 from 110111.110012 (3marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

.................................................................................................................................................................

(d) Using twos compliment subtract 2910 from 2310 leave your answer in decimal notation
(3marks)
.....................................................................................................................................................................

....................................................................................................................................................................

(d) Arrange the following numbers in order from smallest to largest (3marks)
1100112, 1FH, 678 and 4510
.....................................................................................................................................................................

.....................................................................................................................................................................

(a) Study Table A and B then use it to answer questions that follow
Table: A Table: B
Field Name Field Name
ID Number(PK) ID Number
Last Name Product ID (PK)
First Name Product Name
Address Unit cost
Town Quantity4
Date of Birth
Total
(i) Identify the most appropriate data type for ID Number, Product Name and Quantity
(3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

(ii) Given that the data type for Total is calculated write an expression to be entered in the
expression builder (2marks)
.....................................................................................................................................................................

(iii)Suggest how date birth can be validated to accept dates in 2024 only (2marks)

.....................................................................................................................................................................

(iv) Explain how a relation can be created between Table A and B


(2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

17.
(a) Describe three component of a formula as used in spreadsheet (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

(b) Explain why spreadsheet is suitable for the following applications


(i) Statistical (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

(ii) Accounting (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

(c) A form two student was feeding data in a Ms-excel table. He keyed in half in cell and then
the cell displayed 02-Jan after pressing the enter key. State the cause of this anomaly and
how it can corrected (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

(d) The formula =$C1+$D$2 was typed in Cell G3. State how the formula will appear if it
copied to cell H4 (2marks)
5
.....................................................................................................................................................................

(e) The table below is an extract from a spreadsheet application used to capture remedial
lessons a teacher cover per day in a school, use it to answer the questions that follow
A B C D E F G
1 Mon-Fri Rate 300
2 Saturday Rate 500
3 Teacher Mon Tues Wed Thur Fri Sat
4 Mr.Kimani 1 0 3 2 1 2
5 Ms. Wamalwa 1 2 1 3 3 2
6 Mr. Kizito 2 1 1 1 1 1
7 Mr.Mugambi 1 1 1 1 1 3
8 Mr.Kirui 1 1 1 1 1 3

(i) The school have a policy of paying for this service in two installments. Lessons taught
from Monday to Friday are paid on Friday while Saturdays are settled on Sundays. Write
a formula that will computer
Amount paid to Teacher on Friday (2marks)
.....................................................................................................................................................................

Total Amount paid for week (2marks)


.....................................................................................................................................................................

(a) What is Internet Service Provider (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

(b) Below is an email address name the parts labelled A,B, C and D (2marks)
[email protected]

A B C D
.....................................................................................................................................................................
...................................................................................................................................................................
(c) Give three ways which parents can protect their children from accessing inappropriate
content from the internet (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

(d) Describe three ways in which the use of Internet make reporting of corruption easier
(3marks)
.....................................................................................................................................................................

...................................................................................................................................................................

6
(e) Explain three problem associated with using email technology for communication
(3marks)
.....................................................................................................................................................................

You might also like