Get premium membership and access revision papers, questions with answers as well as video lessons.

Kcse Mock Computer Studies Paper 1 Form Four March/April 2018 Question Paper

Kcse Mock Computer Studies Paper 1 Form Four March/April 2018 

Course:Computer Studies

Institution: Form 4 Mock question papers

Exam Year:2018



Name:…………………………………………………………………….. Index. No.: ………
School:…………………………………………………………………… Sign.: ………………
Date:…………………

Kenya Certificate of Secondary Education ( K.C.S.E )

COMPUTER STUDIES
PAPER 1
FORM FOUR
MARCH/APRIL 2018
TIME: 2 1/2 HOURS

KCSE MOCK EXAM 2018
SECTION A (40 Marks)
1.
State the technology used in the following computer generations (2 mks)
i)4th generation:
______________________________________________________________________________ ______________________________________________________________________________
ii)1stgeneration:
______________________________________________________________________________ ______________________________________________________________________________
iii)2nd generation:
______________________________________________________________________________ ______________________________________________________________________________
iv)3rd generation:
______________________________________________________________________________ ______________________________________________________________________________
2.Differentiate between Error Handling and interrupt handling(2 mks)

3.Name four malicious programs that can affect your computer system(2 mks)


4.
Define the following terms as used in mail merging (4 mks)
i) Main document:
______________________________________________________________________________ ______________________________________________________________________________
ii) Data source
______________________________________________________________________________ ______________________________________________________________________________
What is meant by expert systems? Name the three components(4mks)
5.Name two ways of editing cell entries in spreadsheets.

6.Describe TWO roles of each of the following;

(a) Database Administrator (2 marks)
(b) System analyst (2 marks)

7.(a) Describe two facilities offered by email software such as Ms Outlook. (2 marks)
(b) Name other two email softwares available in the market? (1 mark)

8.
State the functions of the following protocols; (2 marks)
(a) FTP
(b) TCP/IP

9.
What is meant by World Wide Web?

10.Explain the difference between Gas Plasma Display and Liquid Crystal display Monitors(2mks)

11.
State the purpose of the following field properties in a Database management software(2mks)
(a) Input Mask
(b) Validate Rule

12.Differentiate between logical and syntax errors encountered in programming(2 mks)

13.What is a computational error? Give an example to illustrate(2 mks)

14.Anita was working on her computer studies project. She was worried of the media to use for storing her data.
She settled on a media that used serial file organization. How are files organized on a storage medium using this method?
List two advantages offered by this type of file organization(3mks)
15.Define the following terms in relation to computer security: (6 mks)
a) Data Encryption
_______________________________________________________________________________________ _______________________________________________________________________________________ _______________________________________________________________________________________
b) Sabotage
_______________________________________________________________________________________ _______________________________________________________________________________________
c) Firewall
_______________________________________________________________________________________ _______________________________________________________________________________________ _______________________________________________________________________________________

SECTION B (60 Marks)
16.
a) Generate output for the following pseudo code (4mks)
START X= 1
WHILE X<4
DO PRINT (X) X=X+1 Y= X +2
ENDWHILE PRINT (“DONE’,X)
END
b) Draw a flowchart for the above pseudo code (4 mks) _______________________________________________________________________________________
b) List any four components of Requirement specification made during system development (2 mks) _______________________________________________________________________________________ _______________________________________________________________________________________


c) Describe three kinds of program documentation used in program development (6 mks) _______________________________________________________________________________________

17.
Mumias sugar company pays casual employees based on the number of hours worked as follows

a) Write a pseudo code to input the name, rate hours worked. The pseudo code should output the name, hours worked and the wage paid. (6 mks)
b) Draw a flowchart for the above pseudo code (5 mks)
c) Write brief notes on structured programming (4mks)
15 marks

18.
a) What is automated production. List two advantages and two disadvantages of automated production (5mrks) _______________________________________________________________________________________
b i) Name three ways of representing signed binary numbers (3 mks) _______________________________________________________________________________________
ii) Convert 5D616 to Binary (2 mks) _______________________________________________________________________________________
iii) Describe any four activities that take place during implementation stage of a system (4 mks) _______________________________________________________________________________________
d) Define the following terms as used in DTP software (1 mks)

i) Cropping _______________________________________________________________________________________

19.
a) State and explain any four operating system disk management utilities (8 mks) _______________________________________________________________________________________
b i) What is system maintenance? (2 mks) _______________________________________________________________________________________
ii) Define the following terms in relation to computer software (3 mks)
a) Freeware
_______________________________________________________________________________________
b) Propriety
_______________________________________________________________________________________
c) Open source
_______________________________________________________________________________________
iii) List any four likely causes of data and program loss in a computer system? (2 mks) _______________________________________________________________________________________

20.
a) With the aid of a diagram explain the following network typologies (6 mks)
i) Ring topology.
_______________________________________________________________________________
ii) Bus topology
______________________________________________________________________________
iii) Star topology
______________________________________________________________________________
b) Define the following terminologies in relation to networking (4 mks)
i) Crosstalk
______________________________________________________________________________
ii) Noise
______________________________________________________________________________
iii) Attenuation
______________________________________________________________________________
iv) Frequency
______________________________________________________________________________
c) State two advantages of wireless communications (4 mks) ______________________________________________________________________________
d) List down one major advantage of networking. (1mk) _______________________________________________________________________________________







More Question Papers


Popular Exams



Return to Question Papers