Get premium membership and access revision papers, questions with answers as well as video lessons.

Computer Studies Paper 1 (Theory) Question Paper

Computer Studies Paper 1 (Theory) 

Course:Secondary Level

Institution: Kcse question papers

Exam Year:2006



COMPUTER STUDIES
PAPER 1
(THEORY)
OCT./Nov. 2006
2 ½ hours
SECTION A (40 MARKS)
1. What is meant by
a) Analogue data
b) Digital data (4 mks)
2. Distinguish between transcription and transposition types of errors and give an
example of each (4mks)
3. a) what are peripheral devices? (1mk)
b) Give two examples of peripheral devices (1mk)
4 a) What meant by the term user-friendly as used in software development?
(1mk)
b) Distinguish between the terms single-tasking and multi-user as used in
operating systems (2mks)
5. What actions should be taken in case of a fire outbreak in the computer
laboratory? (4mks)
6 a) What is an Internet Service Provider? (1mk)
b) An employee in a business company is charged with the responsibility of
putting the company advertisements on the Internet.
i) State the professional title of the employee. (1mk)
ii) Give an example of software used by this employee to carry out
the above task. (1mk)
7. Differentiate between COM ports and LPT ports (2mks)
8. Explain two ways in which ICT can enhance commerce. (2mks)
9. Explain the following software terms:
a) Portability (1 mk)
b) Modularity (1 mk)
10. a) State two application areas of a desktop publishing software. (2mks)
b) Explain the following graphic terms:
i) Rotate (1 mk)
ii) Crop (1mk)
12. a) List two arithmetic operations that can be performed on a row of numeric
data in a word processing table. (1 mk)
b) In each case of (a) above, write the expression used. (2mks)
13. List two methods of gathering information during system development process.
(2mks)
14. Name three types of optical disks. (3mks)
15. The diagram below shows a formatted plate surface of a storage disk.
Shade and label:
a) one sector ( 1mk)
b) One block (1mk)
SECTION B (60 MKS)
Answer question 16 and any other three questions from this section in the space
provided
16 a) List two examples of:
i) Third generation languages (2mks)
ii) Object oriented languages (2 mks)
b) Draw a flowchart to compare three non-equal numeric values A, B, C and
prints the largest of the three. (11 mks)
17 a) One of the functions of an operating system is job scheduling. Explain
what is mean by job scheduling. (1mk)
b) List and explain three types of user interfaces. (6 mks)
c) Describe the following categories of software:
i) Firmware (1mk)
ii) Proprietary software (1mk)
d) a new company XYZ intends to go into the business of desktop
publishing. Advise the company on three computer hardware system
specification features to consider as a measure of enhancing performance.
(6 mks)
18. a) distinguish between the following sets of terms as used in spreadsheets.
(2mks)
i) Worksheet and workbook
ii) Filtering and sorting
b) State one way in which a user may reverse the last action taken in a
spreadsheet package. (1 mk)
c) The following is a sample of a payroll. The worksheet row and column
headings are marked 1, 2, 3, . and A, B, C. respectively
A B C D E F G H
1 NAME HOURS
WORKE
D
PAY
PER
HOUR
BASIC
PAY
ALLOWANCES GROSS
PAY
TAX
DEDUCTIONS
NET
PAY
2 KORIR 12 1500
3 ATIENO 28 650
4 MUTISO 26 450
5 ASHA 30 900
6 MAINA 18 350
7 WANJIKU 22.5 250
8 WANYAMA 24.5 250
9 OLESANE 17 180
10 MOSET 33 700
TOTALS
Use the following expressions to answer the questions that follow:
Basic pay = hours worked x pay per hour
Allowances are allocated at 10% of basic pay
Gross pay = basic pay + allowances
Tax deductions are calculated at 20% of gross pay
Net pay = Gross pay – tax deductions.
Write formulae using cell references for the following cells;
i) D2 (1mk)
ii) E4 (1mk)
iii) F10 (1mk)
iv) G7 (1mk)
v) H5 (1mk)
d) i) State three ways of moving round the page in a Desktop Publishing
window. (3mks)
ii) State two ways on how information & Communication Technology (ICT)
can be used to reduce the spread of HIV/AIDS (2mks)
19. a) Describe the following terms with reference to security of data: (1 mk)
i) Log files
ii) Firewalls (1 mk)
b) A student? database comprises of students? details table and fees received
table as shown below:
Students? details table
Surname
Middle Name
First Name
Admission Number
Course
Fees Received table
Date
Amount
Receipt No.
i) State the primary key field for each table. (2mks)
ii) State the field, which should serve as the linking field for the two tables.
(2mks)
c) Describe the following terms with respect to computer security:
i) Logic bombs (2mks)
ii) Physical security (2mks)
iii) Tapping (2mks)
d) List three functions of antivirus software. (3mks)
20. a) The diagram below shows four common network topologies A, B, C and
D.
i) Name the network topologies labeled a, B, C and D. (4mks)
A
B
C
D
ii) Explain what happens if server X in topology A fails. (1 mk)
iii) List two problems associated with network topology B. (2 mks)
iv) List two disadvantages associated with network topology D.
(2 mks)
b) Differentiate between Interment and World Wide Web: (2mks)
c) Describe the following network services and identify their applications.
i) Voice mail (2mks)
ii) Video conferencing (2 mks)






More Question Papers


Popular Exams



Return to Question Papers