Professional Documents
Culture Documents
Kcse 2023 Computer Replica
Kcse 2023 Computer Replica
COMPUTER STUDIES
CONFIDENTIAL!
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
1. This paper consists of TWO sections; A and B
2. Answer all questions in sections A.
3. Answer question 16 and any other THREE questions from section B.
5. State the function of each of the following features when creating a word processing document
(a) Word wrap (1mk)
(b) Watermark (1mk)
(c) Clipboard (1mk)
7. State any two factors to consider when selecting a computer for an organization (2mks)
i. A ………………………………………………………………………………………………
ii. B…………………………………………………………………………………
iii. C …………………………………………………………………………………………….
(a) The formula D10*E12 was initially stored in in cell F10 of a spreadsheet. Write the formula as it
would appear when copied to cell M20 of the same spreadsheet (1mk)
(b) Write a formula in cell E2 that can be copied to the other cells to display the positive adjusted
marks for mathematics using the value in cell B6 (2 mks)
9. The operating system is known to be very critical in the operation of a computer.
a. State how the operating system handles errors in a computer (2 Mks)
b. State the importance of the feedback mechanism in a system (1 mk)
c. State one disadvantage of the feedback mechanism (1 mk)
10. Differentiate between universal resource locator and hyperlink as used when connecting to the
internet. (2 mks)
11. A database is the best application to manage and manipulate organization data;
a. Distinguish between a candidate key and a primary key in a database (2 mks)
b. State any two functions of a query (2 mks)
12. Give the function of cache memory (1mk)
13. With aid of a flowchart, show a selection control structure. (2 mks)
SECTION B (60mks)
Answer question 16 and any other three questions
16. (a)Study the flowchart below and use it to answer questions that follow.
(i) Write a pseudocode for the flowchart below. (7 marks)
(c)In a certain coding scheme ,each character occupies 7 bits .Letters of the alphabet are assigned
consecutive codes. If letter N is represented by 1010010.Whatis the representation of letter A in
this coding scheme? (2mks)
(d)Using 8 bit notation and the 2’s complement perform the following operation leaving your
answer in decimal number (4mks)
410+(-710)
(e) Differentiate between pure binary and BCD code as used in data representation (2mks)
f)Brian a supermarket owner complains that management of daily sales is becoming overwhelming
(i) Advice Brian on a retail system that he needs to acquire (1mk)
(ii) State two input devices that are used in the above stated retail system (2mks)
18. (a) State and explain any two data transmission impairments (4mks)
(b)State the roles of the following devices/equipment used in networking (3mks)
(i) Brouter
(ii) Data terminal equipment
(iii) Repeater
II. Explain two benefits that the school may get as a result of this approach. (4 mrks)
20. A school evaluation system relies heavily data processing to rank students
(a) Identify and describe the file organization applied by the evaluation system (2 Mks)
(b) State the data processing method applied by the evaluation system (1 Mk)
(c) State any two reasons for your data processing method choice in (20. b) above (2 mks)
(d) During data collection stage of data processing, data is verified and coded. Define the terms
i. Verification (1 mk)
ii. Coding (1 mk)
(e) Jane is a copy typist at Majengo Holdings, she frequently confuses characters in hand written
documents thus replacing them with different characters.
i. State the type of data processing error Jane makes (1mk)
ii. State how she can overcome the error (1mk)
(f) Peter the technician connected and installed a scanner to the office computer but when testing he
realized it was not responding to the scanning commands, state any two possible causes of the
failure (2mk)
(g) Distinguish between disk compression and file compression (2 mks)
(h) The operating organizes data in a hierarchy. Give any two reasons for the hierarchical
organization of data in a computer (2mks)
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
a) Indicate your name and index number at the right hand corner of each printout
b) Write your name and index number on the CD/removable storage medium provided
c) Write the name and version of the software used for each question attempted in the answer sheet
provided
d) Answer all the questions, All questions carry equal marks
e) Passwords should not be used while saving in the CD/removable storage Medium
f) Marked printout of the answers on the sheet
g) Hand in all the printouts and the CD/removable storage medium used
1. (a)(i) The extract below shows a spreadsheet used to compute the toll charges for a highway
based on the type of vehicle, tonnage and charge per kilometer for usage.
HIGHWAY TOLL CHARGES
Vehicle Penalty
Registration Type Weight Distance NormalCharge Charge Total
KCY 789 M PickUp 6 12
KCR 769 L Car 4 40
KCF 724 C PickUp 6 32
KCM 737 N Truck 12 25
KCA 745 W Lorry 20 28
KCP 756 H Truck 10 12
KCU 778 J Car 4 8
KCZ 701 A PickUp 8 25
KCB 781 E Car 6 4
KCV 743 H PickUp 4 20
KCQ 735 X Truck 8 32
KCT 721 K Lorry 10 25
KCD 792 V Truck 12 28
KCZ 784 P Car 6 12
KCB 756 C Truck 10 8
KCE 734 D Car 4 25
KCF779 E PickUp 6 32
KCG 700 F Lorry 12 25
KCH 723 K Truck 20 28
KCJ 711 W PickUp 10 12
KCR 712 D Car 4 8
KCD 774 B PickUp 8 25
KCS 756 M Truck 6 4
KCA 745 W Car 4 20
Total
(ii) The Penalty Charge column is calculated based on the table below. The penalty is based on any
weight above Maximum allowed weight for a vehicle type for every kilometer of the the usage.
( 8 Marks)
(iii) The Total Charge is based on summation of Normal Charge and Penalty Charge . Create a
column Total Charge and use a function to Calculate the Total Charge (2 Marks)
(iv) Create the Running Totals for Normal Charge, Penalty Charge And Total charge (4 Marks)
(b)(i)Copy The data in the Original Toll to another worksheet rename the worksheet as Sorted( 1
Mark)
(ii)Sort the Data is ascending order of Vehicle type Sorted worksheet. ( 4 Marks)
(iii)Create subtotals based on the vehicle Type ( 4 Marks)
(iv) Draw a column chart based on The Vehicle Type subtotals and Total Charge ( 8 Marks)
2. a) Create a database called Aberdare bottles ltd and create the following tables (15 marks)
Table 1: Employee
Employee_ID EmployeeName Department YearOfEmployment
101 Kibet Arap Kamau Human resource 1985
102 Janet Atieno Procurement 1990
450 Kimani Koigu Accounts 2000
891 Moraa Kerubo Human resource 2010
Table 2: Sales
ProductName Employee_ID ProductID SalesAmount Salary
Tea leaves 101 Xc101 5000
cocoa 102 Xp105 15500
coffee 450 Xvb11 9500
Chocolate 891 X56po 30000
Table 3: Department
Employee_ID Department_Name HeadOfDepartment NoOfEmployees
101 Human resource B.N. Komu 52
102 Procurement J.K. Wanjiru 12
450 Accounts P.G. Otindo 20
891 Human resource M.M. Jerotich 10
vi) Copy Yote query (in v above) and save the new query as MPYA:- (1 marks)
Use MPYA query to
Calculate the salary given that: salary is 10% of the SalesAmount (2 marks)
Display salary in ascending order (2 marks)
Display employees from human resource department whose SalesAmount is greater than
12000. (2 marks)
vii) Create a form called AberdareForm using Yote query (in v above) and use it to answer
the questions below:-
Count no of employees (2 marks).
Add a title of the form as “Aberdare bottles ltd-2018” (2 marks)
Insert date and time on the form header use ( =NOW( ) ) (2 marks)
viii) Print Age, Sales table, and AberdareForm (3 marks)
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTION TO CANDIDATES
Write your name and index number in the spaces provided above
This paper consists of Two sections A and B
Answer ALL questions in section A
Answer question16 and any other THREE questions from section B
All answers should be written in the spaces provided on the question paper
3. Last year 2020 when corona virus was declared a pandemic internationally most companies
allowed employees to telework or work at home and communicate with the office using the
Internet. List the hardware, software and services required to access and use the Internet.(3 Mks
4. Using a well-labelled diagram, describe the fetch and execute cycle. (3 Marks)
5. Ventilation is an important practice in the computer lab because it enhances proper
circulation of air. Outline three ways in which air is regulated in the computer room.
(3 marks )
6. Differentiate between COM ports and LPT ports. (2 marks )
7. State any two advantages of the artificial intelligence. (2 Marks)
8. (a) The word COM appears several times in an essay. Jane would like to change the word to
COMPUTER. Advise her on how she can accomplish this task using a word processor. (2 Mks)
9. Anita was working on her computer studies project. She was worried of the media to use for
storing her data. She settled on a media that used serial file organization. How are files
organized on a storage medium using this method? (1 mark)
(b) List two advantages offered by this type of file organization. (2marks)
10. (a) Rose wants to send an email to Jack. Explain two items that must be present for the mail to
be sent. (2 Marks)
(b) (i) Define the term network protocol (1 Mark)
(ii) Name any two examples of network protocols (1 Mark)
11. (a) What is the importance of layering in DTP? (1 Mark)
(b) Distinguish between column guides and margin guides as used in DTP. (2 Marks)
12. Study the work sheet below and answer the questions that follow:
A B C D E F
1
2 ISABOKE MIXED HIGH SCHOOL
9 Highest Score
10 Lowest Score
11 Average Score
(a) Write a formula that would be entered in cell E4 to compute the average score for Akinyi.
(1 Mark)
(b) Write down a formula that used to return the rank of Leila based on average score.(1 Mark)
(c) Write down a formula that would return the number of students whose score in English is below
70. (1 Mark)
13. The manager of a company wants to improve the security of the computer network. She has
decided to use authentication techniques so that employees can identify themselves to the
system. Name two authentication techniques and describe how each technique would help keep
the data more secure. (3 Marks)
14. Mary who works as a systems analyst for JeroKin investments has produced documentation for
a newly developed system. State three reasons why both user and technical documentation are
needed. (3 Marks)
15. Environmentalists plan to test a fast flowing river for pollution. State two advantages of using a
computer to do this rather than doing it manually. (2 Marks)
a) Write a pseudo code that would show him know the charges of calls with an appropriate label
when he the inputs type of call and the time where appropriate. Use a 24 hour clock. (8mks)
b) Design a flowchart for the pseudo code in 16(a) above (7mks)
18.a)Using eight bits and twos complement, subtract 7810 from 1710. Give your answer in decimal
notation (3marks)
b) Convert 11011011111.11112 to:
i) Octal (2marks)
ii) Hexadecimal (2marks)
iii) Decimal (2marks)
c) State any Two methods used to gain illegal access to a computer system (2marks)
d) i)Distinguish between peer-to-peer and client –server LANs. (2marks)
ii) Atieno was very happy when she bought a Safaricom 2G modem for she was able to easily
connect her computer to the Internet. After six months she noticed it was taking her too long to
connect to the Internet. State two possible causes of the problem. (2marks)
i) Split the above structure into THREE tables and for each table identify an appropriate primary
key. (5marks)
ii) Design well labeled tables structures and identify foreign keys (3marks
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
1. Write your name and index number at the top right hand corner of each print out.
2. Write your name and index number on the Compact Disk.
3. Write the name and the version of the software used for each question attempted in the answer
sheet.
4. Answer ALL the questions.
5. All questions carry equal marks.
6. Passwords should NOT be used while saving in the Compact Disk.
7. All answers MUST BE saved in your CD.
8. Make a print out of the answers on the answer sheets provided.
9. Arrange your printouts and tie/staple them together and use the best fit i.e. landscape or portrait
for your printouts.
tblpatient
Field Name Data Type and Field
properties
S_No Autonumber
Patient_No Text
Patient Name Text
County Text
Age Number
Gender Yes/No (yes for Female)
S_No Autonumber
tblailment
Field Name Data Type and Field properties
Doctors_ID Text
Patient_NO Text
Ailment Text
Date of Visit Date & time
Charges Currency
ii) Set primary key(s) and create relationships between the tables (5mks)
(iii) Enforce referential integrity between the tables (3mks)
(iv) Create three input screens with navigation buttons for each table, give your forms appropriate
titles (6mks)
v) Enter the following data into their respective table in the database (10mks)
tbldoctor
Doctor_ID First Name Last Name Specialization
D_001 Jim Green Nephrologist
D_002 Lucy King Pulmonologist
D_003 Bob Smith Dermatologist
D_004 Alexia King Endocrinologist
D_005 Nelly Walk Neurologist
D_006 Freda Ford Pulmonologist
tblpatient
Patient_No Patient Name County Age Gender
P_101 Abigael Marie Nairobi 41 F
P_102 Alexa Kate Nakuru 32 M
P_103 Alexander Kericho 33 M
William
P_104 Brianna Lynn Kericho 40 M
P_105 Aiden Lake Kajiado 24 F
P_106 Anelia Faith Bungoma 20 F
P_107 Alexis Jade Busia 39 M
P_108 Benjan Clay Nairobi 30 M
2. (a) Using a Word Processing package, type the congratulatory note below as it appears and save
it as CONGRATURATIONS. (15mks)
Dear<<First Name>>
RE: CONGRATULATIONS
Due to your hard work and selfless commitment, you shown this year, the company wishes to
congratulate you for emerging the best in our internal interview that you applied for. Your new
position will be <<Position>> and your new salary scale will be<<Amount>>.
Yours faithfully,
(c) Insert data fields in main document and generate the letters for the employees. (10mks)
(d) Generate individualized envelops for each employee (8mks)
(e) Print the first two letters. (2mks)
KCSE Replica Marking Schemes - 0746 222 000 / 0742 999 000
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
1) Write your Name and Index Number in the spaces provided.
2) This paper consists of TWO sections: A and B
3) Answer ALL questions in section A
4) Answer question 16 and any other THREE questions from section B
5) All answers should be written in the spaces provided in the question paper
12. State what is meant by each of the following and give an example of where each is used.
(a) Magnetic Ink Character Recognition (MICR) (1 mark)
(b) Optical mark reader (OMR) (1 mark)
13. (a) Describe the term data integrity. (2 marks)
(b) State four situations in which data may lose integrity. (2 marks)
14. State three advantages of using robots in manufacturing of goods. (3marks)
15. State three ways in which ICT can be used in shipping control. (3 marks)
PRODUCT=1
A=1
TERM=2
PRODUCT=PRODUCT*TERM
TERM=TERM^2
N A=A+1
IS A>2?
PRINT PRODUCT
STOP
(i) State the main type of control structure used in the flowchart. (1 mark
(ii). Dry run the flowchart and give the expected output. (5 marks)
(iii) What will be the value of product when printed in the following flow chart? Show how you
arrive at your answer. (5 marks)
(b). Explain what happens when the expression A = A+1 is changed to A = A-1 (2 marks)
c) Give two benefits of structured programming (2 marks)
18.(a) State three standard data coding schemes used in computing and electronic systems.
(3marks)
(b). Convert each of the following numbers:
i. 110.1012 to decimal (3marks)
ii. 12.687510 to binary (3marks)
(c). Subtract 110.012 from 11001.01012 (2marks)
(d). Using seven-bit twos compliment, perform the following binary arithmetic leaving the
answer in binary notation.
11012 - 1001012 (4marks)
19. (a) Give three benefits of using a DTP software in publishing over a Word processor
(3 marks)
(b). Robots are introduced in a factory which makes car engines. Mention three ways this could
affect the workers. (3 marks)
(c). Name any two computer related courses that are offered at public universities in Kenya.
(1 mark)
(d). List two duties performed by each of the following personnel.
(i). Database administrator (2 marks)
(ii). Computer trainer. (2 marks)
e) Briefly describe the two types of spreadsheets (4 marks)
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
1. Write your name and index number at the top right hand corner of each print out.
2. Write your name and index number on the Compact Disk.
3. Write the name and the version of the software used for each question attempted in the answer
sheet.
4. Answer ALL the questions.
5. All questions carry equal marks.
6. Passwords should NOT be used while saving in the Compact Disk.
7. All answers MUST BE saved in your CD.
8. Make a print out of the answers on the answer sheets provided.
9. Arrange your printouts and tie/staple them together and use the best fit i.e. landscape or portrait
for your printouts.
QUESTION 1
2 a) Type the following passage exactly as it appears using a word processor and save it as
EXERCISE (20marks)
PROCESS OF INFORMATION SYSTEM DEVELOPMENT
INTRODUCTION TO INFORMATION SYSTEM DEVELOPMFNT
The methodology area can justly be described as a jungle. Firstly there appears to exist many hundreds
of the system development methodologies. Longworth (1985) in a recent study identified over
300. If all these are different, then it is no wonder that there is so much confusion. However, it
may be that the differences are trivial and are made solely to differentiate methodologies in the
market place
WHAT I S A METHODOLOGY?
The term methodology is not well defined either in Literature or by practitioners.
There is very little agreement as to what it means other than at a general level. The term is usually
used very loosely and yet it is used very extensively.
This loose use does not mean that there are no definitions, simply that there are no universally agreed
definitions. At the general level, it is regarded as a recommended series of steps and procedures
to be followed in the course and developing an information system. In a brief adhoc survey, this
proves to be about the maximum that people will agree to and of course such a definition raise
many more questions than it answers.
For example:
• What is the difference between a methodology and a method?
• Does a methodology include a specification of the techniques and tools which are to be used?
• Does a collection of techniques and tools constitute a methodology?
• Should the use of a methodology produce the same results each time?
The questions that arise are fundamental as well as numerous. Unfortunately the most that can be
achieved is to air the issues. The information system community is in the process of debating the
meaning of the term methodology in an information system context, and it may one day have a
universal definition. However, it may be more realistic to assume that this will never be
Which specify:
• How a project is to be broken down into stages
• What tasks are to be carried out at each stage
• What outputs are to be produced
• When they are to be carried out
• What constraints are applied
• What support tools may be utilized
In addition, the methodology is supposed to specify how the project is to be managed and controlled
and support the training needs of the users of the methodology. This is all encompassed in a view
or philosophy concerning the important and critical aspects of information systems development.
Required:
b) Remove the underline from all the underlined and change the text to bold and italics. Apply
hanging ident to the first two paragraphs. Save the document as EXERCISE 2. (6marks)
c) Select the text starting from the words "For example:…….information systems development" (at
the end of the passage) and move it to a new page and save as EXERCISE 3. (5 marks)
d) (i) Retrieve EXERCISE document and convert it to two columns of the same width and height
and justify them. (6marks)
(ii)Double space the first paragraph of the passage and fit the entire passage into onepage(4mks)
(iii) Insert your name into the passage as a footer so as to appear as © your name. Save the
document as EXERCISE 4. (5marks)
d) Print EXERCISE, EXERCISE 2, EXERCISE 3, EXERCISE 4 (4marks)
2. Table 1, table 2 and table 3 are extracts of records, kept in a carpentry shop. Use the information
to answer the questions that follow;
Carpenter Table Customer Table
CAPENTER
CAPENTER _ID NAME CUSTOMER _ID CUSTOMER NAME
CAP_001 JAMES CUST_01 MARY K.
CAP_002 JOHN CUST_02 DIANA K.
CAP_003 ALEX CUST_03 ALEX N.
CAP_004 ISAAC CUST_04 MARTHA K.
CAP_005 MAURICE CUST_05 SARAH W.
CUST_06 JOHNSON G.
Order Table
CARPENTER CUSTOMER ORDER _NO ITEM ORDERED MONTH AMOUNT
_ID _ID
CAP_001 CUST _01 1721 Bench January 18,000
CAP_002 CUST _02 1722 Coffee table January 25,000
CAP_003 CUST _03 1723 Office table January 10,000
CAP_004 CUST _04 1724 Single bed January 18,000
CAP_005 CUST _05 1725 Arm chair January 60,000
CAP_001 CUST _01 1726 Double bed February 75,000
CAP_002 CUST _04 1727 Dining table February 85,000
CAP_004 CUST _03 1728 Arm chair February 60,000
CAP_001 CUST _02 1729 Double decker bed February 72,000
CAP_002 CUST _06 1730 Kitchen table February 82,000
CAP_004 CUST _02 1731 Bench March 18,000
CAP_003 CUST _06 1732 bench march 18,000
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
1) This paper consists of TWO sections A and B
2) Answer all questions in section A.
3) Answer question 16 (Compulsory) and any other THREE questions in section B.
4) All answers should be written in the spaces provided in the question paper
9. Highlight the use of find and replace features in word processors. (2 Marks)
10. Explain why two’s complement is preferred to one’s complement in computing. (1 mark)
11. Computers have evolved through a number of generations. List any three characteristics of the
first generation of computers. (3 marks)
12. List four formatting techniques used in Ms excel (2 Marks)
13. List four examples of flat panel displays. (2 Marks)
14. Explain the following terms as used in the word processing. (4 Marks)
a. Indenting
b. Alignment
c. Footnote
d. Endnote
15. Describe the role of an operating system in
i. Memory management
ii. Job scheduling
iii. Error handling
iv. Resource control
20. a. Your School has decided to replace its library control system. The current system was
implemented ten years ago but has restricted reporting facilities and has a text – based interface.
The school intends to replace the old system with a new computerized system, and is now
considering both ‘parallel running ‘ and ‘direct changeover’
i. Briefly explain the terms parallel running and direct change over as used in system
implementation. (2 Marks)
ii. Give two disadvantages of direct changeover overparallel running (1 Marks)
iii. Identify two main risks of direct changeover during system implementation (2 Marks)
iv. Mention any two advantages of running both the manual system and the computerized system
simultaneously (2 Marks)
b. i. What is a website? (2 marks)
ii. Name three facilities that are needed to connect to the internet. (3 Marks)
c. State three ways students can benefit by having internet in a school (3 Marks)
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
QUESTION ONE
1. (a) Assume you are the Director AMACO INSURANCE COMPANY LTD you want to update
your customers on the current dues as per the insurance cover each client have. Use mail merge
to write an official letter to FIVE CUSTOMERS informing them of this. Your letter must meet
the following conditions.
i. Must have the header at the top with the company's name as the letter head (2mks)
ii. Must have footer at the bottom indicating the current date and time, left aligned. (2mks)
iii. The insurance will cover the vehicles and each client due, car number will not be the same.
(2mks)
iv The address lines will include Title
First name
Last name
Address
Country
Car no plate
Amount due
(14mks)
(b) (i) Prepare the table below in Ms word and then apply formatting as follows and save as
MSS (8 mks)
MEYSA SYSTEMS AND SERVICES
Technical information Action taken
(ii) Format the table with border line colour red and choose double line (5mks)
2. Create data base called personnel and create a table named department (5 mks)
(b) Create queries to determine (save each query using the alphabet numbers below)
i. Number of people with basic salary greater than 32,000= (5 mks)
ii. Number of people with basic salary less than 45,000= AND come from
computerdepartment (5mks)
iii. Names of people who are either married or single. (4 mks)
iv. Those whose salary fall between 25,000/= and 50,000= (3mks)
v. Those whose name begin with letter M or end in letter S (3 mks)
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
a) Write your Name and Index Number in the spaces provided.
b) This paper consists of TWO sections: A and B
c) Answer ALL questions in section A
d) Answer question 16 and any other THREE questions from section B
e) All answers should be written in the spaces provided in the question paper
12. State what is meant by each of the following and give an example of where each is used.
(a) Magnetic Ink Character Recognition (MICR) (1 mark)
(b) Optical mark reader (OMR) (1 mark)
13. (a) Describe the term data integrity. (2 marks)
(b) State four situations in which data may lose integrity. (2 marks)
14. State three advantages of using robots in manufacturing of goods. (3marks)
15. State three ways in which ICT can be used in shipping control. (3 marks)
START
PRODUCT=1
A=1
TERM=2
PRODUCT=PRODUCT*TERM
TERM=TERM^2
IS A>2? N A=A+1
PRINT PRODUCT
STOP
(i) State the main type of control structure used in the flowchart. (1 mark)
(ii). Dry run the flowchart and give the expected output. (5 marks)
(iii) What will be the value of product when printed in the following flow chart? Show how you
arrive at your answer. (5 marks)
(b). Explain what happens when the expression A = A+1 is changed to A = A-1 (2 marks)
c) Give two benefits of structured programming (2 marks)
17. (a) State three reasons why it is difficult to detect and prevent computer crimes. (3marks)
(b) State three characteristics of a suitable password. (3marks)
(c) What is a spyware? (2marks)
18.(a) State three standard data coding schemes used in computing and electronic systems.
(3marks)
(b). Convert each of the following numbers:
i. 110.1012 to decimal (3marks)
ii. 12.687510 to binary (3marks)
(c). Subtract 110.012 from 11001.01012 (2marks)
(d). Using seven-bit twos compliment, perform the following binary arithmetic leaving the answer
in binary notation.
11012 - 1001012 (4marks)
19. (a) Give three benefits of using a DTP software in publishing over a Word processor (3
marks)
(b). Robots are introduced in a factory which makes car engines. Mention three ways this could
affect the workers. (3 marks)
(c). Name any two computer related courses that are offered at public universities in Kenya.(1 mk)
(d). List two duties performed by each of the following personnel.
(i). Database administrator (2 marks)
(ii). Computer trainer. (2 marks)
e) Briefly describe the two types of spreadsheets (4 marks)
(c) Distinguish parallel changes over from straight change over as used in system implementation.
(2marks)
(d) Explain two fact finding methods used during system analysis and design. (2 marks)
(e) Name any two types of cables used in data communication (2 marks)
(f) State four differences between LAN and WAN (4 marks)
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
Type your name and index number at the top right hand corner of each printout.
Write the name and version of the software used for each question attempted in the answer sheet.
Passwords should NOT be used while saving in the CD.
Answer all questions
All questions carry equal marks
QUESTION 1
2 a) Type the following passage exactly as it appears using a word processor and save it as
EXERCISE (20marks)
PROCESS OF INFORMATION SYSTEM DEVELOPMENT
INTRODUCTION TO INFORMATION SYSTEM DEVELOPMFNT
The methodology area can justly be described as a jungle. Firstly there appears to exist many hundreds
of the system development methodologies. Longworth (1985) in a recent study identified over
300. If all these are different, then it is no wonder that there is so much confusion. However, it
may be that the differences are trivial and are made solely to differentiate methodologies in the
market place
WHAT I S A METHODOLOGY?
The term methodology is not well defined either in Literature or by practitioners.
There is very little agreement as to what it means other than at a general level. The term is usually
used very loosely and yet it is used very extensively.
This loose use does not mean that there are no definitions, simply that there are no universally agreed
definitions. At the general level, it is regarded as a recommended series of steps and procedures
to be followed in the course and developing an information system. In a brief adhoc survey, this
proves to be about the maximum that people will agree to and of course such a definition raise
many more questions than it answers.
For example:
• What is the difference between a methodology and a method?
• Does a methodology include a specification of the techniques and tools which are to be used?
• Does a collection of techniques and tools constitute a methodology?
• Should the use of a methodology produce the same results each time?
The questions that arise are fundamental as well as numerous. Unfortunately the most that can be
achieved is to air the issues. The information system community is in the process of debating the
meaning of the term methodology in an information system context, and it may one day have a
universal definition. However, it may be more realistic to assume that this will never be
achieved.
©2023 The Kenya National Examinations Council.
An information system's methodology has been defined as a recommended collection o f philosophies,
phase, procedures, rules, techniques, tools, documentation, management and training for developers o f
information systems.(Madison 1983). According to this definition, a methodology has a number of
components.
Which specify:
• How a project is to be broken down into stages
• What tasks are to be carried out at each stage
• What outputs are to be produced
• When they are to be carried out
• What constraints are applied
• What support tools may be utilized
In addition, the methodology is supposed to specify how the project is to be managed and controlled
and support the training needs of the users of the methodology. This is all encompassed in a view
or philosophy concerning the important and critical aspects of information systems development.
Required:
c) Remove the underline from all the underlined and change the text to bold and italics. Apply
hanging ident to the first two paragraphs. Save the document as EXERCISE 2. (6marks)
d) Select the text starting from the words "For example:…….information systems development" (at
the end of the passage) and move it to a new page and save as EXERCISE 3. (5 marks)
e) (i) Retrieve EXERCISE document and convert it to two columns of the same width and height
and justify them. (6marks)
(ii)Double space the first paragraph of the passage and fit the entire passage into onepage(4mks)
(iii) Insert your name into the passage as a footer so as to appear as © your name. Save the
document as EXERCISE 4. (5marks)
d) Print EXERCISE, EXERCISE 2, EXERCISE 3, EXERCISE 4 (4marks)
3. Table 1, table 2 and table 3 are extracts of records, kept in a carpentry shop. Use the information
to answer the questions that follow;
Carpenter Table Customer Table
CAPENTER
CAPENTER _ID NAME CUSTOMER _ID CUSTOMER NAME
CAP_001 JAMES CUST_01 MARY K.
CAP_002 JOHN CUST_02 DIANA K.
CAP_003 ALEX CUST_03 ALEX N.
CAP_004 ISAAC CUST_04 MARTHA K.
CAP_005 MAURICE CUST_05 SARAH W.
CUST_06 JOHNSON G.
Order Table
CARPENTER CUSTOMER ORDER _NO ITEM ORDERED MONTH AMOUNT
_ID _ID
CAP_001 CUST _01 1721 Bench January 18,000
CAP_002 CUST _02 1722 Coffee table January 25,000
CAP_003 CUST _03 1723 Office table January 10,000
CAP_004 CUST _04 1724 Single bed January 18,000
CAP_005 CUST _05 1725 Arm chair January 60,000
CAP_001 CUST _01 1726 Double bed February 75,000
CAP_002 CUST _04 1727 Dining table February 85,000
CAP_004 CUST _03 1728 Arm chair February 60,000
CAP_001 CUST _02 1729 Double decker bed February 72,000
CAP_002 CUST _06 1730 Kitchen table February 82,000
CAP_004 CUST _02 1731 Bench March 18,000
CAP_003 CUST _06 1732 bench march 18,000
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTION TO CANDIDATES
a) Write your name and index number in the space provided above.
b) Sign and write the date of examination in the spaces provided above.
c) This paper consists of two sections A and B.
d) Answer all the questions in section A.
e) Answer question 16 (Compulsory) and any other three questions from section B.
7. A computer user typed the name Kajiado as Kajaido and 8726 as 8126.
(a) State the type of each error (1 mark)
(b) Explain how each error can be controlled (2 mark)
8. Explain the functions performed by the following; (3 marks)
i) The control unit
ii) Arithmetic and logic unit
iii) Main memory
9. Some of the basic factors one should consider when purchasing a computer include; cost,
warranty among others. Explain three factors that determine the cost of a computer. (3marks)
10. List four stages in data collection. (2 marks)
11. (a) Name the two files commonly used in mail merge (1 mark)
b) Name and explain two types of drop caps. (2 marks)
12. Differentiate between relative cell referencing and absolute cell referencing. (2 marks)
13. Describe the following types of relationships as used in database design. (4 marks)
a) One – to – one;
b) One – to – many.
14. (a)Describe the term data integrity. (2 marks)
b) State four situations in which data may lose integrity (2 marks)
15. State two ways in which one can create a password which cannot be easily accessed by hackers.
(2 marks)
17. a) The following are some of the phases in the system development life cycle (SDLC): system
analysis, system design, system implementation, system review and maintenance. State four
activities that are carried out during system implementation phase. (4 marks)
(b) Give three reasons why system maintenance phase is necessary in SDLC. (3 marks)
(c) State two instances where observation is not a viable method of gathering information during
system analysis stage. (2 marks)
(d) Various considerations should be made during input design and output design. State two
considerations for each case; (4 marks)
Input design
Output design
©2023 The Kenya National Examinations Council.
(e) State two reasons why an organization may use other strategies of software acquisition other
than developing their own. (2 marks)
18. (a) State three standard coding schemes used in computing and electronic systems. (3 marks)
(b) Convert the following numbers:
i) 110.1012 to decimal; (3 marks)
ii) 12.687510 to binary; (4 marks)
(c) Subtract 110.012 from 11001.01012 (2 marks)
(d) Using twos complement, perform the following binary arithmetic leaving the answer in binary
notation.
11012 - 1001012 (3 marks)
19. (a)Using two examples, explain the term field properties as used in database design.(2 marks)
b) Below is an extract from a hospital database.
Patient No. Name Date registered Amount paid Remarks
LDK/001 Mathew Olang 04/05/08 2500.00 To go for x – ray
LDK/004 Joy Chelimo 07/06/08 1200.0 Medicine to be Ordered
LDK/008 John Kamau 09/08/08 3500.00 To be admitted for
further check up
LDK/002 GaraldWasike 02/04/05 800.00 To come back for
review.
i) State with reasons the most suitable data types for the following fields: (8 marks)
I. Patient No;
II. Date registered
III. Amount paid
IV. Remarks
ii) Which would be the most appropriate primary key field for the above table? (1 mark)
iii) What is the purpose of a primary key field in database design? (1 mark)
iv) Describe how information about patients who registered after 09/08/06 can be extracted from
the database. (3 marks)
File B:
Reg. No Fee Payments Date of Payment
3002 1000 04/09/2011
3008 1500 03/09/2011
3001 900 02/09/2011
3015 400 21/09/2011
i) Which of the two files above represents a Transaction file? (1 mark)
ii) Give a reason for your answer in c(i) above (1 mark)
iii) Name the other type of file represented above (1 mark)
d) An airline uses an information system whereby if a passenger at station A books a plane seat,
this transaction is immediately shown at stations A and B such that no other passenger can book
the same seat.
i) Identify this data processing mode (1 mark)
ii) State two advantages and two disadvantages of this processing mode. (4 marks)
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES;
Write your name and Admission number at the top of the page
Write your name and Admission number on the CD provided
This paper consists of 5 printed pages. Candidates should check to ascertain that all pages are printed and
that no questions are missing.
Write the name and version of the software used for each question attempted in the answer sheet
Answer all the questions
All questions carry equal marks
Passwords should not be used while saving your work
1. Design a newspaper publication to appear as indicated in the next page using the following instructions.
(a) Launch the DTP package and set the preference measurements to centimeters and the document margins to
2 cm on all sides. (2 marks)
(b) The heading computer software to have the following styles; (4 marks)
- Background colour gray
- Font face Arial
- Font size 18
- centered across the page
(c) The other three headings in the publication to have the styles:
- Font face Arial Narrow
- Font size 15
- Text weight bold
- Character spacing 120%
- Alignment centered (6 marks)
(d) The text under heading Computer software to be in two columns and having the following styles:
- First character of the paragraph to have a 3 line drop cap
- Font face Arial Narrow
- Font size 12
- Text weight bold
- Hyphenation disabled
- Fully justify (2 marks)
(e) The tree Diagram should be drawn as shown (10 marks)
Definition: Software is defined as a set of instructions to the computer to perform some task. For
one to use the computer it’s essential to know its' utilization.. Software is further classified into
system software and application software.
SYSTEM SOFTWARE
P erforms a variety of fundamental operations that APPLICATION SOFTWARE
avails computer resources to the user. These They are developed to help user accomplish specific
functions include: tasks.
They are classified according to
1. Booting the computer and making sure that all the 1. Acquisition
hardware elements are working properly. 2. In-house developed programs
2. Performing operations such as retrieving, loading, 3. Standard software
executing and storing application programs . In-house programs are uniquely designed to meet a
3. Storing and retrieving files particular user's needs.
4. Performing a variety of system utility functions. Standard software are developed by software engineers
System software include: and made available for purchase by a vendor.
• Operating system Acquisition refers to how the software are obtained i.e.
• Utility programs in-house or off the shelf.
• Translators
STRUCTURED DIAGRAM
SOFT WARE
APPLICATION SYSTEM
(a) Using the information above, design a spreadsheet and enter the given data as it appears. Give it
the title “COMPANY PAYMENTS”. Save the workbook file as COMPANY1
(14marks)
(b) (i) Copy the data into Sheet 2 and rename it as COMPANY2 and use it to answer the questions
that follows (2 marks)
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES:
Write your name and Admission number in the spaces provided above.
This paper consists of TWO sections A and B.
Answer ALL the questions in section A.
Answer question 16 and any other THREE questions from section B.
All answer should be written in the spaces provided
(b) Mention any TWO features that are considered before buying a main memory module. (2mks)
3. Briefly describe how the following data security measures function (3mks)
a. Audit trail :……………………………………………………………………………….……
b. Log files:
c. Fire walls :
4. (a) Explain the following (2 mks)
i. Search engine –
ii. Web browser –
(b) The diagram below shows an e-mail extract.
Start
Sum = 0
R=0
R=R+1
Term = R*(2)^2
R=3?
Yes
Print sum
Stop
i) Dry run the above flowchart clearly showing how the output will be arrived at (4mks)
ii) Convert the above flowchart into a pseudocode (6mks)
b) Explain three types of documentations that a programmer needs to prepare (3mks)
c) State two differences between a compiler and an interpreter (2mks)
File B
Registration Number Fees Paid Date of Payment
3001 12,090 04/01/2020
3002 11,000 06/02/2020
3003 12,000 07/01/2020
3004 15,000 08/01/2020
c. i) Fill in the blank spaces with the most appropriate answers of the open systems interconnection
(OSI) reference model layers. (3mks)
7 Application layer User applications run here and generate request for data
transmission or open received information
1 The data packets are finally transmitted via the network card
through the transmission media in form of bits
4 Transport layer
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
Type/Write your name and admission number at the top right hand corner of each
printout.
Write your name and index number on the CD-R. .
Answer all questions. They carry equal marks.
All answers must be saved in your CD-R.
Hand in all the printout and the CD-R
1. a) Type the following passage as it appears and save it as CFSK (36 marks)
Computer for Schools Kenya
Computers for Schools Kenya (CFSK), is a non-profit organization established in October 2002
with the vision of establishing an information-rich Kenyan society actively contributing to
sustainable national development. CFSK seeks to empower youths and communities for life in a
knowledge-based society by facilitating the development of ICT infrastructure and capacity.
CFSK believes in the power of The CFSK program thus creates a forum for community
education and that it is development that is led by community members and
possible to teach, train, feed sustained by a multiplier effect
and ensure sustainable In the nine years of existence, CFSK has sourced over
development for the nation 45,000 personal computers that have been deployed in
through application of nearly 2,000 learning institutions. CFSK organizational and
technology and the operational model has also been recognized as an exemplar,
innovations it ensures. with ongoing efforts to replicate the same in other African
countries. CFSK won the 2007 and 2008
African ICT Achievers Award in the category of top civil
society organization to bridge the digital divide in Africa.
T he annual awards for leadership in ICT in Africa were handed out in November 2007 and 2008 at
a televised gala in Johannesburg, South Africa
During this period of time, we have also carried out training for over 12,000 heads of schools
and Education Officers, teachers/tutors, and members of Schools’ Boards of Governors and
Parents/Teachers Associations. We have successfully developed digital multimedia teaching/
learning resources specifically intended for our national secondary school curriculum –
providing both teachers and students with an invaluable modern tool that makes learning
interesting and stimulating. We have also developed software tools for school administration
and management.
2. The following table shows Kipevu Cargo Handlers Company annual collection of containers
from different storage yards, on behalf of Kenya Ports Authority, in Mombasa. Assuming you
are working for the company as a data analyst, study it and answer the questions that follow.
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTION TO CANDIDATES
Write your name and index number in the spaces provided above
This paper consists of Two sections A and B
Answer ALL questions in section A
Answer question16 and any other THREE questions from section B
All answers should be written in the spaces provided on the question paper
18. Use the figure below to answer the questions that follow:
19. a) Explain three features of a graphical user interface as used in computers. [6 marks]
b) State the function of each of the following computer keyboard keys:
i) Caps Lock [1 mark]
ii) Shift [1 mark]
iii) Home [1 mark]
c) Using two’s complement notation, determine the value of the operation 25 10 – 2910. [6 marks]
iii) Give three factors to consider when selecting an OS to install in your computer. [3 marks]
iv). Describe two symptoms of a computer infected by virus. [2 marks]
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES:
1. Type your name and index number at the top right hand corner of each printout.
2. Write your name and index number on the CD.
3. Write the name and version of the software used for each question in the answer sheet.
4. Passwords should not be used while saving in the
5. Answer all questions. All questions carry equal marks.
6. Hand in all the printouts and the CD.
i) Use a formula to get the average point mark in the table above given that, [3 Marks]
GRADE POINTS
A 12
A 11
B+ 10
B 9
B- 8
C+ 7
C 6
C- 5
D+ 4
D
ii) Determine 3
each student's rank using the Ave. Point Mark. [3 Marks]
iii) Use aD-formula to evaluate
2 the Overall grade using the Ave. Point Mark, given that:
[3 Marks]
E 1
A 90-100
A- 81-89
B+ 71-80
B 61-70
B- 51-60
C+ 41-50
C 36-40
C- 31-35
D+ 25-30
D 20-24
D- 16-19
E Below 15
ENG
KIS
MAT
BIO
PHY
CHEM
HIST
ART
BST
COMP
Overall
Grad
e
vi) Average Grade of the Average Mark using the conversion table in Qn. 2 b(ii) above.
[2 marks]
vii) Rank of each subject as per its average mark use the conversion table Qn, 2a)(i) &(iii)
[4 Marks]
viii) A subject's '% Above pass mark' = Percentage of students who had B- or above in that subject.
[4 Marks]
d) Plot a bar graph of the Subjects against their Average Mark [4 Marks]
e) Put a footnote with your name and index number in the same sheet and print your work.
[2 Marks]
f) Print the work book [2 Marks]
QUESTION 2: DATABASES
2. Ogeke is the manager of a college’s ICT department. He has been told to use Database
Management System (DBMS) to update records for a fundraising data. Perform the following
operations just like Ogeke would:
a) i) Create a relational database with four table; Class List, Family Details, Pledge Contributions
and Walk Form Contributions. [4 Marks]
ii) Class List contains the following fields; Class no, first Name, surname. Family Details contains
Family Id, Parents Name, Address, City and Class no. Pledge Contributions contains Pledge Id,
family Id, Amount Pledged and Amount received. Walk Form contribution contains Walk Id,
Class no, Walker Name, Amount Promised and Amount Paid.
iii) Save your database as Mchango_01 [2 Marks]
19 BENSUNDA OWINO
17 MR & MRS GICHANGA 65 SIAYA 19
20 FRANCO WAFULA
18 MR & MRS SONKO 650 BARINGO 20
21 KILLY WAGAIYU
19 MR & MRS OWINO 987 NAIROBI 22
22 TONY WAIGANJO
20 MR JONES WAFULA 1 KISII 18
4 23690 0 3 4 JAMES 20 15 6
Save
21 them
6540as PC, 6540
WFC, Class_list
11 and Family_Details
21 OGEGArespectively
780 print these
700 reports
13 [4 Mks]
v) Create
22 1350four forms
1200 of each13table above and
22 save CHEBII
them as respective
5640 table 5600
names. [4 marks]
11
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
a) Write your Name, Admission number and UPI number in spaces provided above.
b) This paper consists of TWO sections.
c) Answer ALL questions in section A.
d) Answer Question 16 and any other THREE Questions from Section B
e) All answers MUST be written in the spaces provided on this question paper.
S
SECTION A: 40 MARKS
Answer all the questions in this Section.
1. State two reasons for the increased use of Laptop computers in modern workplaces (2marks)
2. What precautions would you take in the computer laboratory in case users are complaining of
overheating and suffocation. (2marks)
3. Convert the decimal number 15.37310 to its binary number system equivalent. (3marks)
4. With an aid of a diagram describe the difference between Repeat Until and While… Do
(3marks)
5. State three circumstances which may force an individual to acquire an impact printer instead of
non-impact printer. (3marks)
6. Sam prepared a five-page brochure of Maseno School using Ms-publisher. He wanted to insert a
school badge in each page of the publication. State two methods he need to apply to execute this
task. (2marks)
7. State the difference between ones complement and twos complement (2marks)
8. State the function of each of the following features of an email software.
(i) Spam (1mark)
(ii) Trash (1mark)
9. State four benefits of cloud storage in computing. (4marks)
10. Describe the functions of the following disk management operations.
(a) Defragmentation (1mark)
(b) Partitioning (1mark)
11. Describe four ways through which an organization can minimize threats to it data integrity.
(4marks)
12. Study the following three sections of code and name accordingly (3marks)
10101010110 MOV AL, 10 <OL> <li> Chemistry
01010101010 MOV DL, 25 <li>Biology
01000010101 MUL DL <li>Physics</li></OL>
10100010110
(a) (b) (c)
SECTION B: 60 MARKS
ANSWER QUESTION NUMBER 16 ANY OTHER THREE QUESTIONS
16.
i) Define the following terms as used in programming. (3marks)
(a) Machine dependent
(b) Bug
(c) Syntax
ii) Give two reasons to justify why most programmers prefer using compilers instead of
interpreters. (2marks)
iii) Describe two limitations of machine language. (2marks)
iv) Study the pseudo code below and design its equivalent flowchart (8marks)
Start
Count=1
For count =1 to 5 Do
Get Value 1 and Value 2
If Value 1 > Value2 Then
Maximum =Value1
Else
Maximum =Value2
Endif
Display Maximum
Count=Count+1
Stop
KCSE Replica Marking Schemes - 0746 222 000 / 0742 999 000
17.
(i) The five-bit number 00101 is used to represent decimal number 5, show three methods of coding
for negative 5. (3marks)
(ii) Convert the binary number 1010111101011011100012 into its
(a) Octal equivalent (2marks)
(b) Hexadecimal (2marks)
(iii) Convert 10101.0101012 to decimal (3marks)
(iv) Use 8-bit twos to subtract 3510 from 1710 (3marks)
(v) Perform the following calculation (2marks)
1100012+11112-111112
18.
a) Define the term desktop publishing. (2marks)
b) List three nonprinting guides used in Desktop publishing (3marks)
c) Explain the following features as used in DTP when manipulating graphical objects.
(a) Fill (1mark)
(b) Stroke (1mark)
(vi) Describe any three types of action queries. (3marks)
d) Describe the function of the following features of a query grid.
(a) Criteria (1mark)
(b) Show (1mark)
e) Mention three functions of database management software. (3marks)
19.
(i) State three causes of system entropy. (3marks)
(ii) Describe three main ways of maintaining a computer-based system. (3marks)
(iii) State three advantages of using pilot changeover strategy in system development (3marks)
(iv) State a stage in system development life cycle where each of the following activities are carried out.
(a) Identifying shortcomings of the system (1mark)
(b) Prepare training manuals (1mark)
20.
(a) Define the following terms.
(i) Downloading (1mark)
(ii) Uploading (1mark)
(iii) Blog (1mark)
(b) Briefly describe how internet platform have revolutionized business operations in the 21 st
century. (3marks)
(c) Mention three emerging issues that make many people have a negative perception about
internet. (3marks)
(d) Explain the following terms as used in data processing.
(i) Multiprocessing (1mark)
(ii) Batch processing (1mark)
(e) Explain the following types of errors.
(i) Overflow error (1mark)
(ii) Truncation error (1mark)
(f) Mention two application areas of real processing (2mark)
KCSE Replica Marking Schemes - 0746 222 000 / 0742 999 000
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
(Practical)
INSTRUCTIONS TO CANDIDATES
1. Write your name and index number in the spaces provided above.
2. Write the name and version of the software used for each question attempted in the answer
sheet.
3. Answer all questions.
4. All questions carry equal marks.
5. Hand in all the printouts and the soft copy of your work on CD.
QUESTION TWO
Bama School ordered Computer accessories and the following suppliers provided the following as
illustrated below.
(a) Enter the data shown above into a spreadsheet and save it as Bama. (16 marks)
(b) The word commputer system has been entered incorrectly. Update the information in the
spreadsheet. (3 marks)
(c) Format all numeric values to 2 decimal places and use comma separators. (4 marks)
(d) Copy the content of Bama to a new sheet and rename the sheet as BamaSales. Enter a label in
Cell F1 as New Amount. In cell F2 enter a formula to calculate the new amount if the amount
went up by a value in cell B18. Copy the formula to the rest of the sheet.(10 marks)
(e) Using BamaSales find subtotals for each supplier. (6 marks)
(f) Using BamaSales’ subtotals for each supplier create a labeled bar graph on a separate
worksheet. Save the chart as Supplier. (8 marks)
(g) Print Bama, BamaSales, Supplier. (3 marks)
COMPUTER STUDIES
PAPER 1
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
INSTRUCTIONS TO CANDIDATES
This paper consists of 2 sections A and B.
Answer all the questions in sections A
Answer question 16 and any other three questions from section B
SECTION B (Answer question 16 and any other three questions from this section)
16. Study the flowchart below and answer the questions that follow.
Start
Enter :M,N
X=M;y=N
P=y-x; Q=x-y
P>Q?
P=Y P=X
Q=X Q=Y
PRINT:P,Q,x,y
Stop
(b) Name the control structure shown in the flow chart (2mks)
(c) Assuming the user keys in 8 and 14 when prompted to enter values for M and N respectively,
determine the printed values of P,Q,x and y (4mks)
(d) Write a pseudo code that would be used in place of the flowchart. (9mks)
KCSE Replica Marking Schemes - 0746 222 000 / 0742 999 000
17. (a) List three advantages and three disadvantages of fibre optic cable (6mks)
Advantages
Disadvantages
(b) Describe the following signals and state where each is applied in network communication.
(4mks)
Analog
Digital
(e) Name two types of coaxial cables (2mks)
(f) (i) Distinguish between microwave and satellite transmissions (2mks)
(ii) Give an example of internet protocol (1mk)
18. The information below is maintained by the sales lady at the school canteen. Study it and answer
the questions that follow.
A B C
1 Item units (kg) value (ksh)
2 oranges 12 2000
3 mangoes 13 1000
4 tomatoes 12 1400
5 cabbages 15 2500
(a) Describe the basic data types used in this spreadsheet (4mks)
(b) Provide a single formula that would be used to
(i) Count the number of items whole units are equal; to 15 (2mks)
(ii) Sum the values of items whole units are equal to 12 (2mks)
(c) (i) :List and describe four areas of application of spreadsheets (4mks)
(ii) Explain data range legend and axis as used in spreadsheet charts (3mks)
20. (a) List and describe four strategies for converting from an old system to a new system
(4mks)
(b) (i) Distinguish between private data and confidential data (2mks)
(ii) What can be done to stop illegal access to a computer laboratory by unauthorized people
(3mks)
(c) (i) List four areas that would be considered in the requirement specification (4mks)
(ii) Name any two areas covered in a feasibility report during system analysis
and design. (2mks)
KCSE Replica Marking Schemes - 0746 222 000 / 0742 999 000
COMPUTER STUDIES
PAPER 2
TIME: 2½ HOURS
NAME…………………………………………………………………………………….
SCHOOL……………………………………………… SIGN……………………….
Instructions to candidates:
This paper has TWO questions.
Answer all the questions.
Type your name and index number at the right-hand corner of each printout.
Write your name and index number on the CD – ROM provided.
Write the Name and version of software used in each question attempted in the answer sheet.
Passwords should not be used while saving your work.
Make a printout of the answers on the answer sheets provided.
Arrange your print outs and stable them together.
Hand in all the printouts and the CD – ROM provided.
c) The following table shows the percentage growth of the three mobile phone providers in two
periods of six months in the year 2011,2012 and 2013. Include it exactly as it is formatted in the
passage just below the formula. Create a formula to calculate the total percentage growth over
the three years for each period.
(5marks)
2. a) i) Create a Worksheet with the following entries and save the workbook as NOMA.
(12marks)
OMBAHEKIMA ACADEMY
FORM THREE END EXAM MARKS
STUDENT NAME ENGLISH KISWAHILI MATHEMATICS HISTORY
Ayuku Aseka 70 60 40 50
Irungu Wambua 50 70 60 40
Khalifa Mudigo 80 40 50 60
Nosieta Soita 30 75 60 50
Onyango Otieno 40 55 70 60
KCSE Replica Marking Schemes - 0746 222 000 / 0742 999 000
ii) Adjust column width where necessary to display all entries in details. Validate the cells to accept
ONLY numerals between 0-100 and return a comment “please enter a number between 0 and
100”
Whenever an out of range error occurs. (3marks
iii) Rename sheet 1 as MARKS1. (2marks
b) Obtain the following:
i) Total score for each student (2marks)
ii) Mean score for each student (2marks)
iii) Highest score per subject (2marks)
iv) Standard deviation per subject (2marks)
v) Rank for each student (3marks)
vi) Grade the students using the grade for each student based on the following information.
(4marks)
MEAN
GRADE
75-100 A
60-74 B
50-65 C
35-49 D
0-34 E
CALL/TEXT/WHATSAPP
0746-222-000
0742-999-000
mwalimuconsultancy@gmail.com
kcsepredictions@gmail.com
Powered By Mr Isaboke