Search
Free School Management System
Free School Management System for Kenya

Free School Management System

Learn More

KCSE CLUSTER TESTS 23

Computer Studies Paper 1

SECTION A (40 Marks)

1.

State two ways in which your school librarian can use a computer.

2 marks

2.

One of the scripting languages used to create web pages is Hypertext Markup

Language (HTML). State two limitations of HTML

2 marks

3.

One of the functions of an operating system is to prevent deadlock situations.

Explain one situation that can cause a deadlock to occur. (4 marks) ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… …………………………………………………………………………………………………………

4 marks

4.

Using well labeled diagrams, explain the two types of data signals.

3 marks

5.

a) One of the challenges that computer organizations face is unauthorized access.

Distinguish between logical access and physical access. (2 marks)

………………………………………………………………………………………………………

b) State one way in which each of the above types of unauthorized

access to computer system can be controlled. (3 marks)

………………………………………………………………………………………………………

5 marks

6.

Study the sample Microsoft document below and answer questions that follow.


By citing examples, identify five formatting features used in the above passage. (5 marks) ………………………………………………………………………………………………………

5 marks

7.

Dr. Livondo would like to demonstrate a concept using a computer program on his laptop to

members of his village health committee. Give two reasons why he would prefer a laptop to his desktop Computer.

2 marks

8.

With aid of an example, describe an embedded computer?

1 marks

9.

State two features of a fifth generation computer that distinguishes it

from a fourth generation computer.

2 marks

10.

a) Name any two types of non-printable guides in DTP. (1 mark)

……………………………………………………………………………………………………… ………………………………………………………………………………………………………

b) Explain the functions of each of non-printable guides named in 10(a) above. (2 marks) ……………………………………………………………………………………………………… ………………………………………………………………………………………………………

3 marks

11.

State the function of the following commands on web browsers software.

i. Refresh button

ii. Home button

iii. History button

3 marks

12.

a) Differentiate between absolute and relative cell referencing. (2 marks) ………………………………………………………………………………………………………

b) The formula $A$4 +C$ 5 is typed in cell D4 and copied to cell H6.

Write down the formula as it would appear in cell H6. (2 marks)

………………………………………………………………………………………………………

4 marks

13.

Distinguish between data verification and data validation.

2 marks

14.

a) Identify the four types of storage media shown below. (2 marks)



b) Compare the storage device (i) and (iii) above. (1 mark)

3 marks

15.

Mr. Majimbo, a computer technician in one of the schools,

used speech method to store student’s oral answers to an exam into a computer.

a) What is speech input? (½ mark)

……………………………………………………………………………………………………… ………………………………………………………………………………………………………

b) State one advantage and one disadvantage of using this kind of input. (½ mark) ……………………………………………………………………………………………………… ………………………………………………………………………………………………………

1 marks

SECTION B (60 Marks)

16.

a) State the three basic types of program control structures. (3 marks)

b) Draw a flowchart which will simulate the processing of student’s report.

The simulation should be such that the user repeatedly inputs marks per subject for

six subjects using a looping control structure.

The computer processes the total marks and mean score of the student.

Note: 1. It is assumed that the student does six subjects.

2. The output required is; average score and total marks. (7 marks)

c) Differentiate between Analogue and Digital data. (2 marks)

………………………………………………………………………………………………………

d) Outline three advantages of using computer for data processing over other types

of office and business equipment. (3 marks)

15 marks

17.

a) Explain the role of problem identification in system development. (2 marks)

b) Distinguish between a primary key and a foreign key as used in DBMS. (2 marks)

c)i) State two characteristics of a good database/file design. (2 marks)

ii) Differentiate between phased and parallel implementation methods. (2 marks)

d) i) Using appropriate examples, differentiate between distributed and centralized processing modes. (3 marks)

ii) State two advantages and disadvantages of each of the processing models in 17(d) (i) above. (4 marks)

15 marks

18.

The diagram below represents the role of operating system in a computer system.

Use it to answer the questions that follow.

a) Name the part labelled

i. M…………………………………………………………………….. (1 mark)

ii. N…………………………………………………………………….. (1 mark)
b) Explain two advantages of using program N in commercial organization. (4 marks)
c) Classify three types of program M. (3 marks)
e) Explain the purpose of the following files.
i. Backups (1 mark)

ii. Reference (1 mark)
f) State two types of database relationships. (1 mark)

15 marks

19.

A computer diskette in drive A has folders for MEMOS for an administrator.

Each of these folders is labelled according to the relevant months.

The secretary created the folders for each month’s memo for ease of access.

Study the table below.

a) Assuming that the secretary was working from the diskette, draw the corresponding tree structure. (6 marks)
b) i) The secretary wanted to create a folder to store a memo in Fraud folder. State the path for the folder. (2 marks) ……………………………………………………………………………………………………… ………………………………………………………………………………………………………

ii) Suggest how the secretary can ensure that the work in the diskette is not spoilt. (1 mark) ……………………………………………………………………………………………………… ………………………………………………………………………………………………………

iii) Suggest how the file is made not viewed by any other person apart from her. (1 mark) ……………………………………………………………………………………………………… ………………………………………………………………………………………………………

ci) List any two devices under the control of the operating system. (2 marks) ……………………………………………………………………………………………………… ………………………………………………………………………………………………………

ii) From question 19(c)(i), explain how each of these devices are controlled by the OS.(2marks) ……………………………………………………………………………………………………… ………………………………………………………………………………………………………

15 marks

Back Top