NAME:…………………………………………………INDEX ………………..….……..…

DATE:………………………………………………SIGNATURE………………………………

451/1

COMPUTER STUDIES

PAPER 1

MAY 2016

2½ HOURS

KAIRI HIGH SCHOOL

TERM 2 2016 OPENER EXAMINATION

451/1

COMPUTER STUDIES

PAPER 1

MAY 2016

INSTRUCTIONS TO CANDIDATES

This paper consists of 2 sections A and B.

Answer all the questions in sections A

Answer question 16 and any other three questions from section B

For Examiners Use Only

Section / Question / Score
A / 1 - 15
B / 16
17
18
19
20
Total marks

SECTION A (40 MARKS)

1.(a) What do you mean by a system?1mks

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(b)Differentiate between soft systems and hard systems. 2mks ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

2.Identify two disadvantages of Observation method used in fact-finding.(1mks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

3.Briefly explain the following terms as used in disk management (3mks)

(i)Disk fragmentation :………………………………………………………………………….

…………………………………………………………………………………………………….

………………………………………………………………………………………………………

(ii) Disk compression :……………………………………………………………………………… …………………………………………………………………………………………………………………………….……………………………………………………………………………………………

(iii) Disk partitioning :……………………………………………………………………………. …………………………………………………………………………………………………………………………………………………………………………………………………………………………

4.List and describe three guidelines that should be followed when conducting an interview during information gathering (3mks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

5.(a) Define portability as used in software selection (1mk)

……………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………......

(b) List two ways of acquiring software in an organization (2mks)

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

6.Convert 3BD16 to Octal. 3mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..……..

7.List three uses of DVDs (3mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

8.State the function of each of the following

(a) Network Interface Card( NIC) (1mk)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(b) Modem (1mk)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(c) Repeaters (1mk)

……………………………………………………………………………………………………………………………………………………………………………………………………………………

9.Describe two challenges that internet has brought to society (2mks)

………………………………………………………………………………………………………………………………………………………………………………………………………………….

10.List four factors to be considered when purchasing an operating system (2mks)

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

11.Write an algorithm to compute the area of a circle (2mks)

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

12.(a) Suggest two possible causes of data and program loss in a computer system (2mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

(b) Describe two functions of the CPU in a standard computer. (2mk)

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

13.List four types of publications that can be designed using DTP software. (2mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………..

14.(a) List four stages in data collection (2mks)

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(b) What is meant by the following (2mks)

(i)Reference file

…………………………………………………………………………………………………………………………………………………………………………………………………………

(ii)Report file.

…………………………………………………………………………………………………………………………………………………………………………………………………………

15.Explain the following terms (2mks)

  1. Computer fraud

…………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Alteration

…………………………………………………………………………………………………………………………………………………………………………………………………………

SECTION B (Answer question 16 and any other three questions from this section)

16a) State the three basic types of program control structures. (3mks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..………………………

…………………………………………………………………………………………………………………………………………………………………………………………………………………….

b) Draw a flowchart which will simulate the processing of student’s report. The simulation should be such that the user repeatedly inputs marks per subject for six subjects using a looping control structure. The computer processes the total marks and mean score of the student.

Note. 1. It is assumed that the student does six subjects

2. The output required is; average score and total marks. (7mks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Differentiate between Analogue and Digital signals. (2mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………

d) Outline three advantages of using computer for data processing over other types of

office and business equipment. (3mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………………………………………………………………….………………………………………………………………………………………………………………..

17(a) (i) List two advantages and two disadvantages of fibre optic cable (2mks)

Advantages

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

Disadvantages

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(ii) List and describe four strategies for converting from an old system to a newsystem.

4mks

………………..……………………………………………………………………………………….

………………………………………………………………………………………………………...

………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

(b) (i) Distinguish between private data and confidential data. (2mks)

………………………………………………………………………………………………...

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………….…………………………………………………………………………………..

……………………………………………………………………………………………….

……………………………………………………………………………………………….

(ii)What can be done to prevent illegal access to a computer laboratory by unauthorized people. (2mks)

…………………………………………………………………………………..

………………………………………………………………………….……….

…………………………………………………………………………………..

…………………………………………………………………………………..

…………………………………………………………………………………..

…………………………………………………………………………………….

  1. Name two types of coaxial cables (2mks)

…………………………………………………………………………………………………………………………………………………………………………………………………………………..

  1. (i) Distinguish between microwave and satellite transmissions (2mks)

…………………………………………………………………………………………………………………………………………………………………………………………………………

(ii) Give an example of internet protocol (1mk)

………………………………………………………………………………………………

………………………………………………………………………………………………

18. (a) Define the term ‘Data integrity’ (2marks)

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

(b)Give three ways in which one would curb threat to data integrity. (3marks)

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

(c) Explain the following electronic data processing modes giving relevant examples Where they are used.

(i) Real time processing. (2mark)

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

(ii) Distributed data processing. (2mark)

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

(d)Give three components of a computer based information system. (3marks)

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

  1. Computer hardware is categorized according to the types of operations it performs.

List three operations. (3marks)

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

……………………………………………………………………………………………………….

19. (a) Despite the introduction of the ATM cards, human resource is still necessary in banks. Give two reasons why human beings are still needed. (2mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………………

(b) State three advantages of the using the ATM card.(3mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

(c) What is virtual reality.(2mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

(d) List three areas where virtual reality is used.(3mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

(e) What is GPS in air traffic control?(2mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

(f) Outline three ways computers can be used to enhance marketing.(3mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

………..………………………………………………………………………………………….

20 (a) Define the following terms(3mks)

(i) Data control.

……………………………………………………………………………………………………………………………………………………………………………………………………………….

(ii) Computer errors

……………………………………………………………………………………………………………………………………………………………………………………………………………….

(iii) Sabotage

……………………………………………………………………………………………………………………………………………………………………………………………………………….

(b) Other than computer viruses, errors are accidental, discuss any three threats to computerized system and explain the preventive measures that can be taken to avoid such threats. (6mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

(c) Explain what is meant by data back up and name three dangers of inadequate data backup procedures. (4mks)

……………………………………………………………………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………

(d) Explain the implications of the legislation “prohibited publications”(2mks)

………………………………………………………………………………………………………………………………………………………………………………………………………………. …..

FORM 4 OPENER EXAMINATION – TERM 2 2016

Page 1