Comp Pp1 Kcse 2024 Prediction Trials
Comp Pp1 Kcse 2024 Prediction Trials
COMPUTER PAPER 1
KCSE 2024 TOP PREDICTION TRIALS 1-10
CLASS OF KCSE 2024 NOVEMBER
The set Comprises of 10 Prediction Trials prepared
by a panel of Top KNEC Writers Nairobi HQ
Kenya Educators Consultancy is proud to announce that in KCSE 2023 National
Examinations, more than 57% of our predictions from the same panelists appeared in
the national exam (KCSE 2023)
All KCSE 2024 November Candidates are advised to take the questions in this
package of predictions serious as they prepare for the national exams!
Confidential!!!
All the best to all KCSE 2024 Candidates as they prepare for the national Exams
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
A 1 - 15 40
16 15
B 17 15
18 15
19 15
20 15
TOTAL 100
3. Two features of Von Neumann architecture are the use of registers and the use of buses.
Give the names of any two registers and two buses. (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
4. The following terms are frequently used in data transmission. Distinguish each pair.
(i) Simplex and duplex (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
(ii) Switch and hub (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
5. Nicolae needs to send 30 photos to a friend and he chooses to send all 30 together as a
single email attachment. Each photo is 1.8 MB in size, but the maximum possible attachment
size is only 20 MB. State how Nicolae can solve this problem. (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
6. What is portability and Authenticity in relation to software specification? (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
7. State three ways that computers help the police detect crime. (3 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
8. (a) Distinguish between firmware and device drivers as used in computers. (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
(b) Distinguish between customized and custom made software. (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
10. What is the difference between system files and application files? Give examples.
(3 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
11. Differentiate between the terms upgradability and compatibility in relation to hardware
specification. (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
12. How does the operating system accomplish multiprocessing and multitasking activities
in a computer? (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
(b) The shopping mall has over 100 cameras. At the end of each day all these cameras send
their images, captured over the last 24 hours, to a central computer.
Explain why the mall uses dedicated fiber optic cable rather than transmitting the data over
the local broadband network. (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
14. Publishing firms prefer using DTP instead of Word processors. Give any TWO reasons
for this. (2 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
15. Banks have replaced each credit card with a smart card, which contains a microchip, in
order to give greater protection against fraud. State three items of data that are stored on the
microchip in a smart card. (3 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
16. 5000 numbers are being input which should have either1 digit (e.g. 5), 2 digits (e.g. 36),
3digits (e.g. 149) or 4 digits (e.g. 8567).
(a) Write program logic, using pseudo code, which
• inputs 5000 numbers
• outputs how many numbers had 1 digit, 2 digits, 3 digits and 4 digits
• Outputs the % of numbers input which were outside the range. (7 marks)
(c) (i) Subtract the binary number 0011001 from 10110010. (2 marks)
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
(ii) Find the sum of the following: 11101112 + 1100112 + 110112 (2 marks)
......................................................................................................................................................
......................................................................................................................................................
.....................................................................................................................................................
......................................................................................................................................................
(d) (i) The following eight-bit pattern represents the two’s complement of an
integer:110001001. What is the decimal equivalent? (2 marks)
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
(ii) Give any TWO ways of representing a negative number in computer system.(2 marks)
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
(b) The owner needs to be able to enter their own sequence of movements for the model
car. Name a suitable input device. Give a reason for your choice of device. (2 marks)
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
(c) Explain why the model car uses a solid state drive rather than another type of
secondary storage. (2 marks)
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
(d) A database has been set up to bring together information about the world’s tallest
buildings. A section of the database is shown below.
(i) How many records are in the section of the database shown? (1 mark)
..........................................................................................................................................
(ii) Using Ref No. only, which records would be output if the following search
condition was entered:(Year < 1990) AND (Height (m) > 375)? (1 mark)
......................................................................................................................................................
(iii) Write down a search condition to find out how many buildings are in China or
how many buildings have more than 80 floors. (2 marks)
(iv) For each of the following fields give a different validation check. (2 marks)
a. Year ...............................................................................................................
b. Ref No. ..........................................................................................................
(v) In a relational database, relationships must be enforced. Explain why? (2 marks)
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
19. A passenger logs onto an airline website and types in the reference number for their
flight. Once the passenger accesses their account they can choose their seat and also print out a
boarding pass which contains a unique barcode. This barcode is scanned at the airport check-in
desk.
(a) Name one input and one output device found at the check-in desk and give a reason for
your choice. (2 marks)
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
(b) The training department of an international airline has introduced computer based
training (CBT) to teach foreign languages to its cabin crew. Give TWO advantages of
using CBT. (2 marks)
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
(c) The airline also trains its pilots.
(i) What type of training is most appropriate to train pilots to manage dangerous
situations? (1 mark)
................................................................................................................................................
(d) A student set up a spreadsheet to compare share prices in six companies over five
years.
(i) What formula is in cell G5 to find the mean share price for KLN?
.......................................................................................................................................... (1 mark)
(ii) What formula is in cell H5 to find the highest share price for KLN?
.......................................................................................................................................... (1 mark)
(iii) If the data in cell E4 was changed to 425, which cells would be automatically updated?
.......................................................................................................................................... (2 marks)
(iv) State the cells that are needed to create a line graph to show the share prices for years 2006
to 2008.
..........................................................................................................................................(2 marks)
(v) The student wants to extend the spreadsheet to include share prices for 2010. Describe how
the student would do this.
.......................................................................................................................................... (2 marks)
20. (a) Explain each of the following functions of operating system. (6 marks)
(i) Job scheduling
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
(b) Inkjet printers and laser printers are two common types of printer. Describe ONE
feature and principle of operation of each type of printer. (4 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
(c) IEBC receives poll results from the polling centers direct to their headquarters
digitally using Wireless networks. Give any THREE reasons for preference of wireless
communication. (3 marks)
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
14. Give the names of the following system flowchart symbols (2mks)
A B C D
A ……………………………………………………………
B …………………………………………………………..
C ……………………………………………………………
D …………………………………………………………..
15. State any two features of a user friendly program (2mks)
…………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………..
SECTION B (60 MARKS)
Answer question 16 and any other three questions from this section
16. a) State three qualities of a good psecudocode? (3mks)
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
c) Draw a flowchart that was used to come up with the following pseud code (7mks)
Start
N=0
X=0
While n < 3
Repeat
X=X+1
While x < 2
N = N +1
End while
Stop
18. a) Human activity systems are said to be soft systems. Give therereasons why they are said
to be so (3mks)
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
b) What are hard information systems (2mks)
Using the above worksheet write the following formula to calculate the values in cells labeled
(4mks)
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section
B..
• All answers MUST be written in the spaces provided on this question paper.
1(a). As you type an entry it is displayed in the formulae bar. Entries into a
worksheet can be classified into four data types. List any four of these data
types. 2 Marks
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
4. Computer technology has evolved over time. Outline two future trends in
computer and information technology 2 Marks
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
7. Arithmetic and logic unit and the main memory use electrical pathways called
buses. Describe any two of these buses. 2 Marks
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
10.(a) Software can be acquired using different methods, State four advantages
of using standard software 2 Marks
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(b) Define the terms listed below as used in desktop publishing 3 Marks
(i) Master Page
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(ii) Gradient
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(iii) Cropping
11. Data can ether be discrete or continuous. Distinguish the two terms.
2 Marks
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
12.As opposed to buffers registers hold one piece of data at a time. Differentiate
between storage and address registers 2 Marks
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..
13. List two examples of fourth generation languages and two features of fifth
generation languages 2 Marks
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
14(a). An operating system basically consist of two main parts namely; Shell and
(b) Define a foreign key and list any two kinds of relationships in tables
3 Marks
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
15.Describe radio communication and list the different kinds of radio waves
3 Marks
……………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………
………………………………………………………………………………….…
YES
YES
NO
STOP
State the output of the above program flowchart for the inputs given below (4 Marks)
Amount = 15,000, 14,000 and 23,000 respectively
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
19.Data processing helps organizations make informed decisions and rely on accurate
information.
a. Differentiate between the mechanical and manual data processing methods
(2 Marks)
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………
b. State the difference between a sort file and a reference file as used in data
processing
(2 Marks)
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………
Disadvantage
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………
e. Information is the most valuable asset of an organization that needs to be safe
guarded. State any three measures to be considered in maintaining data integrity.
(3 Marks)
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………
f. As Jayden was entering data into the computer, He typed byocott instead of
boycott.
i. Identify the type of error made by Jayden (1 Mark)
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
b) Differentiate between the terms: volatile memory and non-volatile memory. (2marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
10. (a) Name FOUR approaches that may be used to replace a Computerized Information system. (2
marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(b) Which of the approaches named in (a) above is appropriate for critical systems? Explain. (2
marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
11. Terry intends to download a movie from the Internet. State the two factors that may determine the
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(b) What query expressions would the lecturer use to list the students whose age is above 15 years and
below 25 years? (2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
13. a) Explain each of the following roles performed by an operating system
i. Memory management ( 2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
ii. Interrupt handling ( 2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
14. A computer teacher has put a rule that flash disk should not be used in the computer laboratory
(a) Give a reason for the rule (1 mark)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
c) Perform the following binary arithmetic 11001.101+1110.011 (2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
d) Define the following terms. (3 marks)
i) Record
……………………………………………………………………………………………………………
ii) File
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
iii) Database
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
e) List any FOUR ways of dealing with a virus on a computer. (4 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
18. a) Explain the functions performed by (2 marks)
i) The control unit-
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
ii) Arithmetic and logic unit (ALU)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
b) Define the following terms in relation to computer software . (3 marks)
ii) Proprietary
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
iii) Open source
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
c) i) Define the term E-commerce (2marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
ii) List down TWO advantages of e- commerce as used in modern business environment (2marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
d) Describe THREE ways how computing has been applied to each of the following areas:
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
20.(a) List THREE advantages of wireless communication over wired communication. (3 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(b) Using a Diagram, describe the following signals and state where each is applied in network
communication:
(i) Analog; (2 marks)
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
4. State two reasons why twos complement is the preferred method of representing negative numbers as
opposed to other methods. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
5(a) The development of computers can be traced to the time when historical non- electronic computing
devices were invented like abacus. Name four other computing devices. (2mks)
(b) Explain how the devices listed in above contributed to the development of modern electronic
computer. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
9. A flash disk has become a popular storage media. However, it has certain limitations. Highlight three
such limitations. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
10. Give the importance of including foot notes in a word document. (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
11. State two advantages of flat panel monitors over cathode ray tube monitors. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
13. Agwambo while designing a school magazine was advised to use a desktop publisher (DTL)
program instead of a word processor. Give three reasons for this choice. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
14. State one importance of each of the following Microsoft excel features.
(i) Cell pointer (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
SECTION B (60MKS)
16(a) State two advantages of an interpreter over a compiler. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) Study the following flowchart and use it to answer the questions that follow.
(i) State the type of control structure represented by the flowchart. (1mk)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(iii) Write a pseudocode that would achieve the same purpose as the flowchart. (5mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) Write the path for tracing the contents of sub directory DB. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(d) Give two reasons for storing files in directories and subdirectories. (2mks)
………………………………………………………………………………………………………………
18. Using twos compliment perform the following binary operation in 8-bit
(a) notation
710 -2310 (6mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
C(i) Name three public universities in Kenya where one can further computer studies course. (3mks)
(ii) Name two computer hardware related courses offered in Kenyan universities. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
19(a) Computer networks are faced with numerous security threats. Explain two methods of enforcing
security in a computer network. (4mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) State three differences between bus topology and star topology. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(c) Staff training is one of the areas that need to be addressed during system implementation. Highlight
three reasons why this is necessary. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(d) Give two circumstances where straight change over strategy can be used during system
implementation. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(e) Differentiate between distributed processing and interactive processing modes giving an application
area of each. (3mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
20. A data entry clerk experienced the following errors during typing;
(i) After every calculation the result was less than the expected number of digits. E.g
(i) 345.7896543 was given as 345.789.
(ii) 1287357 was typed as 12873S7
(a) Identify the error in each case. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) State two ways the clerk would have prevented such errors. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Write a function to be entered in cell C2 to display the entries from the largest to the smallest. (2mks)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
A 1 - 15 40
16 15
B 17 15
18 15
19 15
20 15
TOTAL 100
ii. Thesaurus
iii. Macros:
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
10. Explain the following spreadsheet concepts:
i. Automatic Recalculation. (1 mark)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
ii. What if analysis (1 mark)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________
11. Suggest two advantages of using presentation graphics software over the traditional
chalk-and-talk approach in a school environment (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
12. (a) Explain the term workstation as used in a networked environment (1 mark)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________
(b)What is a server? (1 mark)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________
13. (a)Explain briefly identification and authentication in computer access control. (2 marks)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________
(b)What is a personal identification number (PIN)? (1 mark)
SECTION B
Answer question 16 (compulsory) and any other three questions from this section
16. (a)(i) State and describe three types of error can occur in programming: (3 Marks)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii) When is a programming language considered structured? (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(c)(i) Give one advantage of compliers over interpreters (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii)Give one advantage of interpreters over compliers (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(iii) Explain briefly why the source codes must be translated again if the programmer wants
to use the program on a computer with a different platform. (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
17. (a) (i) With the aid of examples, explain number complements in the Binary number systems
(2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii) Outline the benefits of using binary number complementation in computers. (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(b) (i) Why is binary number system best suited for use in computers? (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii) Convert the following base two number into base ten. (2 marks)
11.01
DEF=
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(c) (i)Distinguish between data validation and data verification. (1 mark)
______________________________________________________________________________
________________________________________________________________________
__________________________________________________________________
________________________________________________________________________
(ii)Give two examples of data verification techniques. (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
iii. Range Check (1 mark)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
iv. Control Total Check (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
19. (a) (i) Explain the term search engine (1 mark)
_____________________________________________________________________________________
______________________________________________________________________________
_______________________________________________________________________
______________________________________________________________________________
(ii) Peter and Mary use the same keyword to search for information. Suggest two reasons
why their search results may vary. (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(iii)State one disadvantage of using an e-mail account provided by the Internet service
provider (ISP). (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(b) (i) Explain the term URL (1 mark)
______________________________________________________________________________
__________________________________________________________________
(ii) For the URL http://www.csklsc.net/pe/calendar.htm,
http stands for (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii)Explain the following types of communication protocol
Ethernet (1 mark)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(iii)Give Two examples of wireless-based communications channels. (2 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(b). Describe Two techniques used by the systems analyst in requirements elicitation. (2 Marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(c)What is a requirements specification and what does it contain? (5 Marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
12. i) Indicate the type of cell reference depicted by the following. (3Marks)
a) $H$5
........................................................................................................................................................
b) H$5
........................................................................................................................................................
c) H5
........................................................................................................................................................
ii) Give three uses of spreadsheets in a government office concerned with carrying out national
census (3Marks)
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
13. The Chairman IEBC has called upon a System Analyst to implement an electronic voting system. He
intends to use voter’s fingerprints, Identity cards and voter’s cards as security measures to ensure free
and fair elections. Recommend with reasons four input devices that they should use/buy. (4Marks)
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
14. State any four security control measures that can be taken to detect and protect computer systems
against computer crimes. (2Marks)
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
c) Give the name and use of the flowchart symbol below. (1Mark)
A
A
i) Name
ii) Use
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
e) Draw a flowchart that can be used to create a program which accept a numerical pin, if the pin
is equal to 0721, the program outputs , correct pin and asks for personal pin, if the pin is 1737,
the output is “Admitted to UON,” 1738, the output is “Admitted to MARKU”, 1739 the
output is “Admitted to KEMU” after outputting the secret message the program stops.
(7 Marks)
REVIEW 7
IMPLEMENTATION 6
CONSTRUCTION 5
DESIGN 4
REQUIREMENT
SPECIFICATION 3
INFORMATION
GATHERING 2
PROBLEM
RECOGNITION 1
i) List any four methods that can be used to achieve the second stage in above. (2Marks)
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
ii) List any four areas that have to be designed at the fourth stage. (4Marks)
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
........................................................................................................................................................
iii) Give one likely consequence of a project that does not stick to its schedule (2Marks)
........................................................................................................................................................
........................................................................................................................................................
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
(c) Inbox
………………………………………………………………………………….…………
………………………….…………………………………………………………………
………………………….…………………………………………………………………
10. State two ways in which users in an organization can be a security threat to data in an
information system. (2 Marks)
………………………………………………………………………………….…………
………………………….…………………………………………………………………
………………………….…………………………………………………………………
11. State three negative impact of information communication technology on the Environment.
(3 Marks)
………………………………………………………………………………….……………
……………………….………………………………………………………………………
…………………………………………………………………………….…………………
12. In a computer based information system, state the purpose of the following files and give
one example where such a file may be required in a school. (4 marks)
a. Report file.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
b. Sort file.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
13. State three responsibility of a Database administrator in an organization. (3 Marks)
14. With an example for each, describe how computers are used in the following areas of
education; (3 Marks)
a. Simulation
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
b. Tutorial
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
15. a. Dan a computer student noticed that every time a person enters the computer lab the
computer screen flickers. Identify three reasons why the monitor might be flickering
(3 Marks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
b. State two ways in which the problem can be solved (2 Marks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
16. To maintain a strategic fit Safaricom is introducing a tariff called the mega tariff that will
lower costs to Safricom to Safaricom calls and calls to other networks. Calls to
Safaricom networks will be charged according to the time of the day as listed below:
• -Between 8am to 12 noon – 6 Ksh
• -Between 12 noon to 2pm -0.8 Kshs
• -Between 6 to 1 am -4Kshs
• -between 1 am t 8am - 1Kshs
Internal calls to other networks are charged at a fixed rate of 7 Kshs between 8am to 8pm
and to while international calls are charged at a rate of 25 Kshs between 8am to 8pm and
Kshs 35 for the rest of the day. All calls are charged per minute usage.
Mr. Wasswa Bbaale a business man who makes both internal and internal calls would
like to make maximum use of this of this tariff.
a) Write a pseudo code that would show him know the charges of calls with an
appropriate label when he the inputs type of call and the time where appropriate.
Use a 24 hour clock. (8marks)
c) State any Two methods used to gain illegal access to a computer system (2marks)
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
d) i) Distinguish between peer-to-peer and client –server LANs. (2marks)
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
ii) Atieno was very happy when she bought a Safaricom 2G modem for she was able to
easily connect her computer to the Internet. After six months she noticed it was taking her too
long to connect to the Internet. State two possible causes of the problem. (2marks)
....................................................................................................................................
....................................................................................................................................
e) State one advantage and one disadvantage of using expert systems in medicine(2marks)
................................................................................................................................................
20. a) Explain three types of communication links that may be used to get an
Internet connection (3marks)
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
………………………………………………………………………………………………
b) Differentiate between the Internet and World Wide Web. (2marks)
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
ii) Technology has been blamed for polluting the environment.
Explain how computer technology has contributed to this. (2marks)
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
c) A Company that makes and sells vehicles receives orders from various clients. The
company wants to enter their orders into a database. Study the table structure below and answer
the questions that follow.
i) Split the above structure into THREE tables and for each table identify an appropriate
primary key. (5marks)
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
ii) Design well labeled tables structures and identify foreign keys (3marks)
................................................................................................................................................
................................................................................................................................................
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii) Mention two Analogue devices (2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
2. i) Identify and briefly describe three advantages of using computers in banking (1½ marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
3. State two reasons why Magnetic tapes are not commonly used as computer data storage medium
today (1 mark)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………………..
4. i) Give two advantages of the higher number of pixels per square centimeter. (1 mark)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii) Differentiate between Data interface cable and power cable. (1 mark)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
iii) Explain two differences between serial and parallel communication ports of a computer .
(2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
iv). With reference to the concept of graphics as used in Microsoft word. Explain the difference
between object linking and embedding? (1 mark)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
6. Who am I? (3 marks)
…………………………………………………………………………………………………………
ii) Am is skilled in designing computer hardware and also improves on existing ones.
…………………………………………………………………………………………………………
iii) I maintain, update & modify information on the websites to meet new demands by the users. I
also monitor the access & use of internet connection by enforcing security measures
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
10. Other than flow chart, state two tools that can be used to present an algorithm . (2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
11. Differentiate between a deadlock and interrupt as used in operating system. (2 marks)
…………………………………………………………………………………………………………
12. (a) Securem is a company that deals with providing security services to its clients. Name any two
ways the company can protect its computer network from hackers. (2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
13. During system development the system analyst should consider the correct requirement
specifications for the new system. State any four outcomes that may result from using incorrect
requirement specifications. (3 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
15. Explain two arithmetic errors that may occur during computerised data processing. (2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
Answer question 16 and ANY OTHER THREE questions from this section in the spaces provided.
16. (a) Give two examples of syntax errors in programming. (2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
(b)ScrabbleTM is a word game where the players are awarded points by creating words from a
combination of letters each of which carry a different point value. A player is awarded the points for
LETTER VALUE
A,E,I,L,N,O,R,S,T,U 1
D,G 2
B,C,M,P 3
F,H,V,W,Y 4
K 5
J,X 8
Z,Q 10
HTML
JAVA
JAVASCRIPT
PASCAL
VISUAL BASIC
LISP
(d) With aid of a diagram, explain the “Repeat Until” construct as used in structured programming
(2 marks)
17. (a) State the stage in system development life cycle where each of the following activities are
carried out:
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
iii. Identifying the technologies that may be used in the proposed system. (1 mark)
(b) State three roles of a programmer in system development life cycle. (3 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
(c) E-mail technology has become a very important part of today’s communication. Explain any
three problems associated with using e-mail technology for communication. (6 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
(d) Sarafina wants to download her favourite movie from YouTube. State any three factors that
may determine how long it will take her to complete the download. (3 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
18. The following Digital Club Member details were to be entered in a database: Name, Date of
registration, Registration fee and Class.
Name Text
Class Text
(b) Name one other field that the Club Patron may need to add to uniquely identify the records
(1 mark)
…………………………………………………………………………………………………
(c) Write the statement that can be used to select members of the class form 3. (2 marks)
Criteria/
Expression
(d) The following is an extract from a spreadsheet created to manage sales. Use it to answer the
questions that follow.
A B C D
(i) Write a formula that will compute the number of items whose unit price whose price more than
10,000 (3 marks)
…………………………………………………………………………………………………………
(ii) If the formula =$B2*C$2 was placed in D2, state the output if copied to D3. (2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
(iv) Write the data type that is stored in cell C5 and A6 respectively (2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
19. a) Define the term attenuation as used in networking and data communication. (1 mark)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
Figure 1 Figure 3
Figure 1 Figure 2
Figure 3 Figure 4
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
(ii) In a network setup, list any two items that may be referred to as data terminal equipment.
(2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
20. (a) Determine the binary equivalent of the octal number 253243. (2 marks)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
(b) Carry out the following binary arithmetic using ones complement. In each case leave your answer in
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
SCHOOL…………………………………………………….. SIGNATURE……………..
451/1
COMPUTER STUDIES
Paper 1
Time: 21/2 Hours
Instructions to Candidates
• Write your name, class and admission number in the spaces provided.
• This paper consists of two sections.
• Answer ALL questions in section A and Question 16 plus THREE other questions in section B..
• All answers MUST be written in the spaces provided on this question paper.
A 1 - 15 40
16 15
B 17 15
18 15
19 15
20 15
TOTAL 100
(a) Competition.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
13. Identify how the operating system will label the following drives in case a computer has
one floppy drive, one hard disk partition into two and a DVD. (3marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
14. Five students Jane, Beryl, Baroness, Linda, and Jael scored the following marks in
mathematics: 45, 76, 34, 65 and 45. The marks were recorded in cell C3 to C7. Write down
the most appropriate function that can be used to give those positions so that they can be
awarded in descending order. (3marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
15. Match the following statements with repeater, router or a bridge. (2 marks)
STATEMENT DEVICE
(d) Syntax
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii)
Give two reasons to justify why most programmers prefer using compilers instead of
interpreters. (2marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(iii) Describe two limitations of machine language. (2marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
19.
(i) State three causes of system entropy. (3marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________