You are on page 1of 10

NAME ………………………………………………. INDEXNO…………………..

SCHOOL ……………………………………… CLASS………………………

451/1
COMPUTER STUDIES
TIME 2 ½ HOURS
OCT/NOV 2020

ST MARTINS GIRLS SECONDARY SCHOOL.


FORM FOUR ENTRY.
INSTRUCTIONS TO CANDIDATES:

 Write your name and adm number in the spaces provided above.
 This paper consists of TWO sections A and B.
 Answer ALL the questions in section A.
 Answer question 16 and any other THREE questions from section
B.
 All answer should be written in the spaces provided
 This paper consists of 8 printed pages.
 Students should check the question paper to ascertain that all the
pages are printed as indicated and no question is missing.
 Candidates should answer the questions in English.

FOR EXAMINERS USE ONLY

SECTION QUESTIONS CANDIDATE’S SCORE


A 1-15
16
17
B 18
19
20
TOTAL SCORE


SECTION A. (40 MARKS).
1. State the hardware technological differences between the second generation and the third
generation computers. (2mks)
….………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

2. State two ways of ensuring proper ventilation in computer room. (2mks)


….………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

3. Convert the decimal number 20.373 to its binary number system equivalent. (3mks)
….………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

4. Peter has installed internet in his home computer in computer in order to use it for
browsing. State three ways in which he would prevent virus from infecting the computer.
(3mks)
….………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

5. Differentiate between line printer and page printer. (2mks)


….………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

6. State the function of each of the following features as used in email software.
i. Inbox (2mks)
….…………………………………………………………………………………………
……………………………………………………………………………………………

ii. Draft (1mks)


….…………………………………………………………………………………………
……………………………………………………………………………………………..

7. a) Explain the term toggle key as used in computer keyboard. (1mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

b) list examples of toggle keys on a computer keyboard. (2mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

8. State the type of error the would occur in data processing for each of the following cases.
a) Entering the number 315 instead of 351 (1mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

b) Entering the text “kwys” instead of “keys” (1mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

9. State four factors to consider when selecting an input device for use in a computer room.
(4mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

10. State three functions of UN-interruptible power supply (UPS) (3mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

11. State three factors to consider when selecting an operating system to install in a computer.
(3mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….


….………………………………………………………………………………………………
………………………………………………………………………………………………….

12. Differentiate between analogue data and digital data as used in computer. (2mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

13. State three measures that should be put in place in a computer laboratory to safeguard
users’ health. (3mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

14. State three possible reasons for the extinction of daisy wheel printers in the market
(3mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

15. Two advantages of flat panel monitor over cathode ray tube monitors as used in
computers. (2mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

SECTION B. (60 MARKS).


16.
a) Explain the term dry running as used in dry running in program developing. (2mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

b) Explain three properties of an algorithm. (6mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….


….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

c) To qualify to get a driving licence, an applicant must be above 18 yrs or over. Ten
candidates applied for the driving license test. Draw a flow chart that would read the
name and age of the applicant and display the name of those who qualify. (7mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

17.
a) State three hardware devices that may be required to connect a computer to an
existing local area network. (3mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….


b) A publisher intend to use desktop publishing programme to create a publication
which is to have graphics. State three ways in which the graphics may be acquired for
this purpose. (3mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

c) Interpret each of the following spreadsheet formula:


i. = countif (D2:D9,”>”&B4) (2mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

ii. =SUMIF(B3:B11;"4M";D3:D11) (2mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

d) The following are the fields of products table in a database created to store records of
products manufactured in a factory.
 Product number.
 Product name.
 Price.
 Product description.
i. State the appropriate data type for each field. (4mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

ii. State one property to be put in place during table design to ensure integrity of
entered data. (1mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

18.
a) Explain three features of a graphical user interface as used in computer. (3mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….


b) State the function of each of the following computer keyboard keys:
i. Caps lock. (2mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

ii. Shift (2mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

iii. Home. (2mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

c) Using two’s complement notation, determine the value of the operation 2510 - 2910.
(6mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

19. .
a) With aid of a flowchart, describe a loop control structure as used in programming.
(4mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

b) Study the following pseudocode and answer the questions below:-


1. Start.
2. Get value 1, value 2
3. If value 1 > value 2 Then,
4. Maximum= value 1
5. Else If value 1 < value 2 Then,
6. Maximum= value 2
7. Display Maximum
8. Stop.
i. State the purpose of the pseudocode. (1mk)

….………………………………………………………………………………………………
………………………………………………………………………………………………….

ii. Draw flowchart equivalent to the pseudocode. (6mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….


….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

iii. Distinguish between a source program and a compiler as used in computer


programming.
(4mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

….………………………………………………………………………………………………
………………………………………………………………………………………………….

20. .
(a) Describe each of the following validation checks as used in data processing:


(i) Preserve check; (2mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

(ii) Data type check; (2mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

(iii) Check digit. (2mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

b) Write each of the following abbreviations in full:


(i) BCD; (1mks)
….………………………………………………………………………………………………
………………………………………………………………………………………………….

(ii) EBCD; (1mks)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

(iii) ASCII. (1mk)


….………………………………………………………………………………………………
………………………………………………………………………………………………….

(c) Using 10 — bits binary number system, perform the following decimal operation using
two’s complement (6mks)
l2910 - 12810

You might also like