Get premium membership and access revision papers, questions with answers as well as video lessons.

Form 4 451/1 Computer Studies Paper 1 (Theory) Question Paper

Form 4 451/1 Computer Studies Paper 1 (Theory) 

Course:Computer Studies

Institution: Form 4 question papers

Exam Year:2017



Name………………………………………………………………………. Adm. No……………
Date ……………………………..… Student’s Signature……………………….…………….…

451/1
COMPUTER STUDIES
PAPER 1
(THEORY)
TIME: 2 ½ HRS

SET 3
FORM 4
KenyaCertificate of Secondary Education
(K.C.S.E)
Instructions to candidates
1. This paper consists of TWO sections; A and B
2. Answer all questions in sections A.
3. Answer question 16 and any other THREE questions from section B.

FOR EXAMINERS USE ONLY

SECTION QUESTION
A 1 – 15


B 16
17
18
19
20
TOTAL MARKS














This paper consists of 11 printed pages.
Candidates should check to ensure that all pages are printed as indicated and no question is missing.

SECTION A (40 MARKS)
ANSWER ALL QUESTIONS IN THIS SECTION
1. Differentiate between cold booting and warm booting in computing (2mks)


2. Define parallel processing (1mk)

3. (a) Mention any TWO reasons why command-based operating systems are not common in today’s business computer systems. (2mks)


(b) Explain any THREE functions of an operating system with respect to memory management
(3mks)


4. Differentiate between partitioning and formatting as used in disk management (2mks)


5. Name the type of scanner used to capture data from the following document format below (1mk)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
6. Computer output can now be in form of spoken words in digitized speech. An example of such application is spell learning devices for children. State ONE advantage of speech output. (1mk)


7. Mention any TWO features that are considered before buying a main memory module. (2mks)


8. A technician recommended a computer in the principal’s office needs upgrading of the CPU. State any TWO reasons that may have necessitated the upgrading of the CPU. (2mks)

9. StateTWO reasons why secondary storage is preferred to main memory in data storage. (2mks)


10. (a) State ONE advantage of relational database model over flat files (1mk)


(b) State TWO uses of primary keys in a database (2mks)


(c) A database requires data to be defined by assigning data types to fields for purposes of consistent storage. Describe any FOUR data types that can be allowed in Ms Access. (4mks)



(d) Definethe term macro as used in databases (1mk)


11. State any ONE reason why USB interface cables are widely used in computing devices (1mk)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
12. A company is considering replacing some of its software, including its word processing package, and to acquire an integrated software package. State TWO advantages for the company in using integrated software rather than separate packages. (2mks)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
13. (a) State TWO types of DTP software (2mks)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(b) List FOUR page formatting features in DTP (2mks)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
14. (a) Explain the meaning of “what if analysis” in spreadsheets (2mks)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(b) The table below shows items consumed by some students for breakfast in a given day.
A B C D E F
1 ITEM COST
2 NAME SAUSAGE TEA BANANA TOTAL COST
3 15.00 10.00 5.00
4 Charles 1 1 2 35
5 Amoit 2 4 2 80
6 David 3 1 2
7 Okello 2 1 2 50
(i) Using anexpression,find the total expenditure incurred by David (2mks)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(ii) State what you would obtain from the expression = CountIF (F4:F7, “>45”) (1mk)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
15. Define the following terms as used in relation to operating systems (2mks)
(i) Folder
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(ii) Drive
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
SECTION B (60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS FROM THIS SECTION

16. (a) State any THREE advantages of using Object Oriented programming for writing programs (3mks)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(b) In a computer contest with 40 entries, three papers are tested and the final marks awarded according to the average of the papers. The final marks are then ranked to get position 1, 2 and 3 who are awarded trophy, cash and scholarship, trophy and cash, and cash respectively
Write a program pseudocode and flowchart that will prompt for the name, school and marks for each paper then compute the final marks and rank and display the students name, school, final marks position and award.

i. Pseudocode (5mks)














ii. Flowchart (7mks)



































17. (a) With the aid of a well labeled diagram, describe control and feedback model in a system (4mks)
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(b) Distinguish between the following terms as used in system development (4mks)
i. Hard system and soft system
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
ii. Operational feasibility and technical feasibility
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(c) State THREE ways in which organizations manage system entropy (3mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(d) Explain any TWO reasons for system maintenance (1mk)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(e) Briefly explain THREE ways in which computers can be used in motor vehicle manufacturing companies (3mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
18. (a) Distinguish between the following terms as used in data communication (4mks)
i. Guided transmission and unguided transmission
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
ii. Multiplexing and demultiplexing
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(b) Below is a diagram of a network topology.
i. Name the above topology (1mk)
…………………………………………………………………………………………………………………………
ii. State ONE advantages and ONEdisadvantage of using the topology named above (2mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(c) (i) State TWO ways in which users in an organization can be a security threat to data in an information system. (2mks)
………………………………………………………………………………….………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(ii)Define cyber terrorism (1mk)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(d) A school intends to set-up an e-mail. List FOURactivities likely to be provided by the e-mail facility. (2mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………

(e)Define the following terms as used in the internet. (2mks)
(i)Internet blog
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(ii) Webportals
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(f) Kenya publishing and printing company wishes to employ an ICT professional to assist in making publications .State the suitable ICT professional the firm could employ (1mk)
…………………………………………………………………………………………………………………………
19. (a) (i)List and explain the THREE types of errors that can occur during data collection stage of data processing cycle (3mks)
…………………………………….……………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(ii)Distinguish between master file and transaction file (2mks)
…………………………………….……………………………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(iii) Define real time processing (1mk)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(iv) Explain a situation where the batch processing would be appropriate (1mk)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(b) Using twos complement, perform the following operation and give your answer in decimal notation
• 7778 - 2510(4mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………

(c) Solve AC16+1012=X2 (2mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(d) Convert binary number 11010110.10012 into octal number. (2mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
20. (a) State any TWO negative effects of introducing robots in a manufacturing plant (2mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(b) State THREE advantages of using computers (3mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(c) Name THREE types of special purpose memories used in a computer (3mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(d)Explain the purpose of the system clock (2mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(e) (i) In word processing, differentiate between text wrap and word wrap (2mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
(ii) List any THREE types of section breaks used in word. (3mks)
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………






More Question Papers


Popular Exams



Return to Question Papers