Page | 1
NAME…………………………………………………………..INDEX NO……………CLASS………….
SCHOOL………………………………………………………..CANDIDATES SIGNATURE………….
DATE…………………….………………
451/1
COMPUTER STUDIES
PAPER 1
(THEORY)
FEB/MARCH 2014
TIME: 2½ HOURS
LAINAKU JOINT EXAMINATION – 2014
Kenya Certificate of Secondary Education
COMPUTER STUDIES
PAPER 1
(THEORY)
TIME: 2½ HOURS
INSTRUCTIONS TO CANDIDATES
- This paper consists of TWO Sections A and B
- Answer all questions in Section A
- Answer question 16 (compulsory) and any other THREE question in section B
- All answers should be written in the space provided in the question paper
FOR OFFICIAL USE ONLY:
Section / Question / CandidatesScore
A / 1-15
B / 16
17
18
19
20
Total Score
This paper consists of 15 printed pages.
Candidates should check the question paper to ascertain that
all pages are printed and no questions are missing
SECTION A (40 MARKS) Answer all the questions in this section
- Define the following terms( 2 marks)
a)Drop Cap ……………………………………………………………………………………………………………………………………………………………………………………………………………….
b)Protocol
……………………………………………………………………………………………………………………………………………………………………………………………………………….
- A student was reading through a daily newspaper on different types of data communication media. As a computer student, how will you assist him define the term data communication media? (1Mark)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
- State four functions of Read-Only Memory(4 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Give three reasons why a mobile phone is regarded as a computer(3 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Most computerized security systems make use of Biometric analysis, name three physical features of human beings that can be considered in this analysis. (3 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
- State any three functions of Central Processing Unit(3 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Briefly explain any two types of errors that can be encountered during program testing (2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Differentiate between a Transaction file and a Master file.(2mks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- List four ways of acquiring software in an organization.(2mks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Distinguish between:(4mks)
- Mouse pointer and insertion point ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- A table in word processing application and a table in database application.
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- The protection of the environment must concern us all if we are to bequeath a better world for the future generation. Explain any two ways in which the internet can be used to facilitate campaigns for environment protection. (2mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- One of the functions of operating system is file management within the secondary storage medium.State two types of files. (2mks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- List four operations an operating system can perform on a file. (2mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Suggest any three reasons why reservation systems are no yet fully implemented by bus operating companies in Kenya. (4mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- State any four ways of ensuring that the passwords remain effective as a security control measure. (4mks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
SECTION B (60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS
FROM THIS SECTION
16. a) Name the two major developments during the second generation programming languages (2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
b )Draw a program flow chart and write a pseudo code to give out the sum and average of the first 100 numbers in the series: 5, 10, 15, 20, 25… (10 marks)
c) Give at least three differences between a compiler and an interpreter(3 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
17.a) Convert
(i).0.111011.0102 to Octal(2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(ii).3218 to itsBinary equivalent( 2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
(iii).5E616 into Binary( 2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(iv).1101000101112 to hexadecimal(2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
b) Give the reason why octal and hexadecimal numbers are preferred to binary(1 mark) …………………………………………………………………………………………………………………………………………………………………………………………………………………………
c) Briefly Explain the three data coding schemes(6 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
18.a) Draw give any two advantages of the network topologies below(6 marks)
(i).Hierarchical
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(ii).Ring
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
c)Give two application areas of Bluetooth technology(2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
c) Briefly describe the three components of satellite transmission(3 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
d)List Four Network devices(2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
e) State two advantages of wireless technology(2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
19.
a)Write a formula that has been entered in cell J2(2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
b)Differentiate between the following excel data types(4 marks)
(i).Labels and values
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(ii).Function and formula
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
c) Differentiate the following terms as used in word processing(5 marks)
(i).Insert and Type over
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(ii).Copying and Moving
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(iii).Backspace and Delete
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(iv).Undo and Redo
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(v).Auto complete and Autocorrect
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
d). Explain the following database features( 3 marks)
(i).Table/File.
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(ii).Report
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(iii).Queries
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
(iv) .Form
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
20.a) List and explain the three processing methods(6 marks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
b) Outline the services offered by the internet( 2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
c)Give three advantages of automated production( 3 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
d)List two attributes of a system analyst(2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
e)Identify any four ICT institutions that one can enroll for ICT course(2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………………………………………………………………