Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Computer Studies (Theory) Paper 1 Question Paper

Computer Studies (Theory) Paper 1 

Course:Secondary Level

Institution: Kcse question papers

Exam Year:2000



COMPUTER STUDIES
(THEORY)
PAPER 1
OCT./NOV. 2000
SECTION A (40 MARKS)
ANSWER ALL THE QUESTION IN THIS SECTION
1. Write the following abbreviations in full. (3mks)
i) BCD
ii) ASCII
iii) EBDIC
2. Define the term array as used in computer programming (2mks)
3. Suggest how computers may in future be made more users friendly for persons
that are
a) BCD
b) Without hands
4. State three advantages of computer networking (3mks)
5. Name six steps in program development cycle in their logical sequence. (3mks)
6. State two methods of minimizing dust in a computer laboratory. (2mks)
7. Differentiate between primary memory and secondary memory (2mks)
8. List the steps that you would use to correct wrongly spelt words in a document
using the spell-checking feature. (3mks)
9. Differentiate between single-user and multi-user operating systems giving an
example of each. (3mks)
10. State what is meant by each of the following and give an example of where each
is used
a) Magnetic Ink character Recognition (MICR) (2 mks)
b) Optical Mark Read (OMR) (2mks)
11. In the following flowchart, what will be the value of the sum when printed?
Show how you arrive at your answer.
Begin
Sum = 0
R: = 0
R: = r + 1
Term: = r (2) +r
Sun: sum + term
R = 3 F
T
Print sum
Stop
12. Distinguish between system software and application software. (2mks)
13. Explain any three of the terms: creating, editing, printing and saving as used in
word-processing (3mks)
14. List three file organization methods in a computer (3mks)
15. What is the use of the search and replace feature in a word-processor? (2mks)
SECTION B (60 MARKS)
ANSWER QUESTION 16 AND ANY THREE OTHER QUESTIONS.
16. A program is required for reading in a student?s name and scores obtained in two
subjects. The output of the program will consist of the student?s name, the two
scores, the average of the two scores and a comment. The comment is based on
the average as follows:
Average Comment
70
< 70
Good
Poor
Write a program to solve the problem using a high level language. (15 mks)
17. a) what is meant by data communication in a computer network? (2mks)
b) State what is meant by each of the following transmission media and give
one advantage and one disadvantage for each .
i) Twisted pair cables (3mks)
ii) Coaxial cables (3mks)
iii) Optic fibre cables (3mks)
c) List four network elements in a location area network. (4mks)
18. Andrew, Jane, David and zablon had tea, sausages and bananas for breakfast.
They took one sausage, two sausages, three sausages and one sausage
respectively. In addition, they took a cup of tea and two bananas. Tea, sausages
and bananas cost Ksh. 10, 15, and 5 respectively.
By naming columns A, B, C, … and rows 1, 2, 3 …
a) Construct a worksheet showing the above information. (7mks)
b) State the expression you would use to obtain:
i) Total expenditure by David (4mks)
ii) Total number of sausages taken (2mks)
iii) The cost of the cheapest item (2mks)
19. a) What are computer viruses? (2mks)
b) i) State two ways through which computer viruses may be controlled
(2mks)
ii) Explain how each of the two ways stated in b (i) above assist in
controlling computer viruses. (2mks)
c) Define each of the following computer terminologies (3mks)
i) byte
ii) bit
iii) word
d) Convert the hexadecimal number FC1 to its binary equivalent. (6mks)
20. a) A firm intends to purchase new software. List three items that should
accompany the software. (3mks)
b) State and explain three ways that computer technology could make office
work more efficient. (6mks)
c) Explain the meaning of each of the following computer crimes; (6mks)
i) Hacking
ii) Fraud
iiii) Piracy






More Question Papers


Popular Exams



Return to Question Papers