Comp P1 MS
Comp P1 MS
(a) Write your Name and Index Number in the spaces provided at the top of this paper.
(b) Sign and write the date of examination in the spaces provided above.
(c) This paper consists of TWO sections; A and B.
(d) Answer ALL the questions in Section A.
(e) Answer question 16 and any other THREE questions from Section B.
(f) All answers should be written in the spaces provided on the question paper.
(g) This paper consists of 16 printed pages. Candidates should check the question paper to ascertain that all the pages
are printed as indicated and that no questions are missing.
1. State three reasons why it is difficult to control, detect and prevent computer crimes (3marks)
1. Fetch – gets the next program command from the computer’s memory
2. Decode – deciphers what the program is telling the computer to do
3. Execute – carries out the requested action
8. The word COM appears several times in an essay. Jane would like to change the word to
COMPUTER. Advise her on
9. how she can accomplish this task using a word processor.
(2 Marks)
- The word can be edited with Find and Replace
10. Anita was working on her computer studies project. She was worried of the media to use for
storing her data. She settled on a media that used serial file organization. How are files
organized on a storage medium using this method? (1 mark)
- Serial file are stored and accessed one after another on a storage medium
(b) List two advantages offered by this type of file organization. (2marks)
Advantages – simple, cheap
11. (a) Rose wants to send an email to Jack. Explain two items that must be present for the mail to
be sent. (2
Marks)
-senders address
-Receivers address
-Content
(b) (i) Define the term network protocol (1
Mark)
- Set of rules and procedures that govern how computers and related devices
communicate and transfer data signals
(ii) Name any two examples of network protocols (1
Mark)
o TCP/IP
o FTP
12. (a) What is the importance of layering in DTP? (1 Mark)
- creating a sense of page harmony
- increases productivity
-For the purpose of editing, working with layers allows for applying changes to just one
specific layer.
(b) Distinguish between column guides and margin guides as used in DTP. (2 Marks)
Margins a non-printing line that marks the boundary of the top, bottom, right and left
margins while column guide is non-printing line that marks the boundary of a column
on a page
12. Study the work sheet below and answer the questions that follow:
A B C D E F
1
2 MOKASA MIXED HIGH SCHOOL
9 Highest
Score
10 Lowest
Score
11 Average
Score
(a) Write a formula that would be entered in cell E4 to compute the average score for Akinyi.
(1
Mark)
=(c4+d4)/2 or =average(c4:d4)
(b) Write down a formula that used to return the rank of Leila based on average score.
(1
Mark)
=RANK(F6,$F$4:$F$8,0)
(c) Write down a formula that would return the number of students whose score in English is
below 70. (1
Mark)
=COUNTIF(E4:E8,"<70")
13. The manager of a company wants to improve the security of the computer network. She has
decided to use authentication techniques so that employees can identify themselves to the
system. Name two authentication techniques and describe how each technique would help
keep the data more secure.
(3 Marks)
- Use of biometric methods ie finger prints
- smart cards or hand-held tokens
- password or a simple personal identification number (PIN)
14. Mary who works as a systems analyst for JeroKin investments has produced documentation
for a newly developed system. State three reasons why both user and technical documentation
are needed. (3 Marks)
15. Environmentalists plan to test a fast flowing river for pollution. State two advantages of using
a computer to do this rather than doing it manually.
(2 Marks)
Internal calls to other networks are charged at a fixed rate of 7 Kshs between 8am to 8 pm
and to while international calls are charged at a rate of 25 Kshs between 8 am to 8 pm and
Kshs 35 for the rest of the day. All calls are charged per minute usage.
Mr. Wasswa Bbaale a business man who makes both internal and external calls would like
to make maximum use of this tariff.
(a) Write a pseudo code that would show him know the charges of calls with an
appropriate label when he inputs type of call and the time where appropriate. Use a
24 hour clock.
START
READ calltype
CASE calltype OF
“Safaricom”:
READ time
CASE time OF
8 to12: charge=6
12 to14: charge=0.8
14 to 18: charge=2
18 to 1: charge=4
1 to 8: charge=1
ENDCASE
“Other Networks”:
Charge=7
“International”:
READ time
CASE time OF
8 to 20: charge=25
ELSE
Charge=35
ENDCASE
ENDCASE
PRINT “call on mega ongea now at,”charge,”shillings per minute on safaricom to”,
calltype,”calls”
STOP
-International calls-1
-Calls to other networks – ½
-Safaricom calls- 2½
Use of 24 hour clock- ½ Mark
(b) Design a flowchart for the pseudocope in 16 (a) above (7 marks)
Note: award marks as follows
Correct symbols – ½
Start /stop symbols - ½
Input – ½
Output – ½
Correct logic – ½
Correct use of symbols – ½
Decisions
-Based on calltype – ½
-Based on safaricom to safaricom calls-2
-Based on international calls- 1
-Based on calls to other networks- ½
17. (a) Explain how an operating system controls I/O devices. (2 marks)
The operating system manages the use of input and output devices. This is done
by the use buffers .The operating instructs input and output buffers to take
inputs from an input device or to take outputs from the processor while the
process using the input or output is suspended .when the process which needs
the input is made active once again, the operating system will command the
buffer to send data.
(b) Maintaining security is one of the functions of the operating system. Explain how
the operating system maintains security.
Maintaining security-in networks and larger computers each user is given a
username or ID and passwords to gain access to the computer system. the
operating system keeps a register of all the names so that the only persons with
valid usernames or IDs passwords can access the system. The operating system
keeps a log which records users logged in, the length of time each user stayed in
the system and what they did.
(ii) State one advantage and one disadvantage of the processing modes in 17 (d) (i)
above (2 marks)
Centralized processing
Advantages
-The processor idle time is eliminated
-User interaction is possible through the terminals
-Queries are possible since files are held online
Disadvantages
-Not reliable with regard to data security
-Response time is slow where there are many tasks
-Users have no control over the central processor
-When the processor is down all the operations are paralyzed
(e) (i) With reference to an operating system ,differentiate between formatting and
partitioning (2 marks)
Formatting is preparing a disk so that the operating system can write
information on it by defining the tracks and sectors. Partitioning a disk refers to
the process of dividing a large physical disk into two or more logical drives
(partitions).
18. (a) Using eight bits and two complement, subtract 7810 from 1710 . Give
your answer in decimal notations. (3 marks)
Convert the numbers to binary and make the bits equal-1 mark
7810 - 10011102
1710 - 00100012
= 3337.748 - ½ mark
= 6 DF 16 - ½ mark
110110111111.1111
= 1759.9375 10 - 1 mark
(d) State any two methods used to gain access to a computer system. (2 marks)
- by using weak access points
- through hacking
(e) (i) Distinguish between peer to peer client server LANS (2 marks)
Client server LAN is a LAN that consists of requesting computers called clients
and a computer that provides services to the clients called the server.
Peer to peer LAN is a LAN where all the computers on the network communicate
with one another directly without relying on the server.
(ii) Atieno was very happy when she bought a safaricom 2G modem for she was able
to easily connect her computer to the internet. After six months she noticed it
was taking her too long to connect to the internet .State two possible causes of the
problem. (2 marks)
- Many people may be using the same band
- The bandwidth she is using is narrow.
19. (a) (i) Explain any TWO causes of system change. (2 marks)
-Errors in the system
-Change in user requirements
-Expansion /growth of the organization
-Technological changes
-Frequent failure of the system
(b) (i) Use of questionnaire is one of the most popular fact finding methods .State
any TWO advantages and TWO disadvantages of using this method to gather
data. (2 marks)
Advantages
-Most questionnaires can be answered quickly
-Responses can be tabulated and analyzed quickly
-It is an inexpensive method of fact finding
Disadvantages
-The number of respondents is usually low
-There is no guarantee that an individual will answer all the questions
-Questionnaires are inflexible.
(c) Explain TWO reasons why a new system is tested before implementation.
-To detect and remove bugs (errors)
-To ensure the program works properly
-To ensure the program solves the intended problem
(e) State ONE advantage and ONE disadvantage of using expert systems in medicine
(2 marks)
Advantages
- Experts can use the system to arrive at a faster, more accurate conclusion
- It can support a doctor who is doubtful of his decision because of lack of
experience.
Disadvantage
- The system cannot learn from its mistakes
- Lack instinct and common sense which are essential for decision making
20. (a) Explain THREE types of communication links that may be used to get
an internet connection.
- Dedicated links-this provides permanent connection to the Internet
- Remote network access-this provides access to the internet via satellite
dish
- SLIP/PPP (serial line internet protocol /point-to-point protocol)-to get
access to the internet, one must dial up an internet service provider which
gives you access to the internet.
(b) (i) Differentiate between the internet and World Wide Web (2 marks)
The internet is a network of networks that connect computers across the world
while the World Wide Web is a part of the internet that which stores information
in multimedia form.
(ii) Technology has been blamed for polluting the environment .Explain how the
computer technology has contributed to this. (2 marks)
- The use of solvents in the manufacturing of computers can harm the
environment.
- Disposal of old and used computer parts are harmful to the environment
because they do not decompose.
(c) A company that makes and sells vehicles receives orders from various clients .the
Company wants to enter their orders in to a database. Study the table structure
below and answer the questions that follow.
Field name data type field size
Order number number long integer
Order date date/time
Supply date date/time
Product code text 5
Consumer ID number long integer
Customer FName text 15
Customer Lname text 20
Customer phone number long integer
Delivery address text 30
Product type text 15
Product name text 10
Quantity ordered number long integer
Product prize number long integer
(i) Split the above table structure in to THREE tables and for each table identify an
appropriate primary key. (5 marks)
Order table
Order number number long integer
Order date date/time
Ordered quantity number long integer
Supply date date/time
Customer table
Customer ID number long integer
Customer FName text 5
Customer LName text 20
Customer phone number long integer
Delivery address text 30
Product table
Product code text 5
Product type text 15
Product name text 10
Product prize number long integer