f3f4 June 24

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

Name…………………………………………… …Index Number/Adm No……..…………….

451/1

COMPUTER STUDIES

Paper 1

(THEORY)

JUNE. 2024

2 ½ hours

THE KENYA NATIONAL EXAMINATIONS COUNCIL

FORM 3&4 JUNE HALF TERM ASSIGNEMNT


TERM 2, 2024
ST.JOSEPH’S BOYS’ HIGH SCHOOL-KITALE
Instructions to candidates

(a)Write your name and index number in the spaces provided at the top of this page
(b)Sign and write the date of examination in the spaces provided above
(c)This paper consists of TWO sections; A and B.
(d)Answer question 16 and any other THREE questions from section B
(e)All answers should be written in the spaces provided on the question paper
(f)This paper consists of 18 printed pages
(g)Candidates should check the question paper to ascertain that all the pages are printed as
indicated and that no questions are missing.
For Examiner’s Use Only

Section Question Score

A 1 – 15

B 16

17

18

19

20

Total

1|Page
DEPT OF COMPUTER SCIENCE 2024
1(a) A computer is idle but the hard disk light is blinking, indicating some activity. State two
possible causes of this. (2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(b) Describe the term “computer booting process”. (2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………………………………………………………………………………………………..
.…………………………………………………………………………………………………
(c) State two factors to be considered when purchasing a microcomputer (2mks)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………………………………………………………………………………………………..

2. (a) Define the term ‘computer laboratory’ (1mk)


……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………………………………………………………………………………………………..
(b) Dust particles are harmful to a computer, state two ways that if followed will completely
reduce their levels in the computer laboratory (2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………………………………………………………………………………………………..
3. Differentiate between hacking and cracking with reference to computer crimes (1mk)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………….
……………………………………………………………………………………………………
4. What is the hexadecimal equivalent of 7678 (2mks)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………

2|Page
DEPT OF COMPUTER SCIENCE 2024
5. Explain the following terms as applied in word processor (2mks)

(i) Text wrap

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(ii) Word wrap

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
6.(a)Rufus is a computer teacher.one evening he left students in the computer lab and when
he come back he got a report that there was a power outage and the students were unable to
turn their computers on, state two causes and control of these power inadequacy (3mks)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(b)What is the difference between a field name and a caption? (1mk)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(c)Illustrate the Differentiate between tabular and columnar form layout (2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
7.(a)Explain what happens when you try to enter invalid data into a related table for which
referential integrity has been reinforced (1mk)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(b)Write the following computing abbreviations (2mks)
Wi-Fi
…………………………………………………………………………………………………..
HTM
…………………………………………………………………………………………………..
ISP
…………………………………………………………………………………………………..
TCP/IP
………………………………………………………………………………………………….

3|Page
DEPT OF COMPUTER SCIENCE 2024
8. Define the following terms (3mks)

i. Bound control
…………………………………………………………………………………………………
ii. A dynaset
………………………………………………………………………………………………..
iii. Half duplex
……………………………………………………………………………………………….
9(a) what is proofreading? Give four ways of proofreading a document in Microsoft Word
(1mk)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
(b)Distinguish between: Undo and Redo command (1mk)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
10. Your school decides to replace its control system. The current system was implemented
ten years ago but has restricted reporting facilities and has a text-based interface. The school
intends to replace the old system with a new computerized system, and is now considering
both ‘parallel running’ and ‘direct changeover’.
(i) Briefly explain the term parallel running and direct changeover as used in system
implementation (1mk)

…………………………………………………………………………………………………
…………………………………………………………………………………………………..

(ii) Give two disadvantages of direct changeover over parallel running. (1mk)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
11(a). Explain the meaning of the term ‘data back up’ (1mk)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(b)Name two types of optical disks. (1mk)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(b)Distinguish between count and countif functions as used in spreadsheets. (1mk)
……………………………………………………………………………………………………
……………………………………………………………………………………………………

4|Page
DEPT OF COMPUTER SCIENCE 2024
12.(a)Describe two factors that cause system entropy (2mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………….
(b)What is meant by the term Dry running as used in program development? (1mk)
…………………………………………………………………………………………………
………………………………………………………………………………………………
13. Martina Lotino went to the supermarket and bought the items shown in the picture of the
spreadsheet given below:

(a) (i)Write the function that must be typed in cell D9: (1mk)

(1mk)

…………………………………………………………………………………………………

(iii) The bill total in cell D9 amounts to Ksh.860 Martina has a Ksh.1000 note. Write the
formula that calculates the change in D12 (1mk)

………………………………………………………………………………………………….

14. List two items that may be referred to as data terminal equipment in a network (1mk)

…………………………………………………………………………………………………..

15. Briefly explain the following terms as used in networking (2mks)

(i)Remote communication

…………………………………………………………………………………………………

5|Page
DEPT OF COMPUTER SCIENCE 2024
(ii)Distributed processing

…………………………………………………………………………………………………..

SECTION B

16(a) using a program flowchart explains the “FOR LOOP” interaction construction.
(2mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………….

(b)Define the following terms as used in elementary programming (2mks)

i. Algorithms

…………………………………………………………………………………………………
………………………………………………………………………………………………..

ii. Program control structures

…………………………………………………………………………………………………
…………………………………………………………………………………………………

(c)State two characteristics of a good pseudocode (2mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………..

(d) . Write a pseudo code for the flowchart below (9mks)

6|Page
DEPT OF COMPUTER SCIENCE 2024
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

7|Page
DEPT OF COMPUTER SCIENCE 2024
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………..

17.(i) State 3 ways in which ICT can improve the access of news in Kenya. (3mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

(ii). Give three dangerous areas where the use of computer simulations would be better than
carrying out the real experiment
(3mks).

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………..

(iii). A XYZ airway offers electronic tickets (e –tickets) to passengers when booking flights
online. A reference number is e-mailed to the passenger rather than mailing printed ticket.
Give two advantages of e-tickets compared to paper tickets. (2mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

8|Page
DEPT OF COMPUTER SCIENCE 2024
(iv). Describe three negative impacts related to teenage use of the internet for entertainment.
(3mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

(v). Describe two situations in the bus transportation industry where computerized systems
could replace human employees. (4mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………….

18. The figure below shows a network based on the bus topology.

(a)Identify the component labeled P. (1mk)


…………………………………………………………………………………………………
…………………………………………………………………………………………………
(b) State the function of the component labeled P (2mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………….

(c) Students of Enema secondary school formed an environmental club with a goal of taking
part in environmental conservation activities. Outline three ways I which they can use the
internet to achieve this goal (3mks)

9|Page
DEPT OF COMPUTER SCIENCE 2024
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

(d)Distinguish between DTE and DCE components of a computer network (2mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

(e)Define the following terms as used in computer networking (3mks)

(i) Bandwidth

…………………………………………………………………………………………………
…………………………………………………………………………………………………

(ii). Attenuation

…………………………………………………………………………………………………
………………………………………………………………………………………………….

(iii). Half duplex

…………………………………………………………………………………………………
…………………………………………………………………………………………………

(f)(i)State the type of data communication media that could be used on electrically nosy
environment (1mk)

………………………………………………………………………………………………….
…………………………………………………………………………………………………..

(ii)Explain your answer in f(i) above (1mk)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………..……

(g) Explain the three main components of a satellite (2mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………

19.(a)Differentiate between Bcc and cc in an email. (2mks)


…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

10 | P a g e
DEPT OF COMPUTER SCIENCE 2024
…………………………………………………………………………………………………
…………………………………………………………………………………………………
(b)A retailer uses a spreadsheet program to calculate profits. Figure 1 shows the spreadsheet

(i) Which row contains labels only? (1mk)


…………………………………………………………………………………………………
…………………………………………………………………………………………………
(ii) Write the formula that has been entered in cell F2. (2mks).
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………….
(c).the following is an extract from a document created using a word processor

(i)Identify six formats that have been applied on the extract (3mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

(ii)State three tools in a word processor that would help a user to minimize spelling mistakes
when creating a document (3mks)

11 | P a g e
DEPT OF COMPUTER SCIENCE 2024
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………..
(iii)With the aid of a diagram, describe the Hierarchical Database Model. (4mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

20. (a) Explain the importance of disk partitioning. (2mks)


……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(b) Differentiate between pull-down menu and pop-up menu as used in Graphical User
Interface (GUI) operating systems. (2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(b)Distinguish between the terms single-tasking and multi-user as used in operating systems
(2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(c)Define authenticity as used in software selection (2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(d)List two ways of acquiring software in an organization (2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………….

12 | P a g e
DEPT OF COMPUTER SCIENCE 2024
(e)State four factors to be considered when purchasing an operating system (2mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………………………………………………………………………………………………..

THIS IS THE LAST PRINTED PAGE

13 | P a g e
DEPT OF COMPUTER SCIENCE 2024

You might also like