Professional Documents
Culture Documents
451/1
COMPUTER STUDIES
PAPER 1 (THEORY)
JULY / AUGUST 2011
TIME: 2 ½ HOURS
INSTRUCTIONS TO CANDIDATES:
(a) Write your Name and Index number in the spaces provided.
(c) Answer ALL questions in Section A and in section B answer question 16 (compulsory) and any other
two questions.
1
© 2011 Nandi East, Nandi South and Tinderet Districts Joint Evaluation Test
Computer Studies Paper 1
SECTION A: Answer all questions
1. Define the following terms as used in Computer Studies:
(i) Information (1mk)
…………………………………………………………………………………………
(ii) Information Technology (1mk)
…………………………………………………………………………………………
(iii) Information System (1mk)
………………………………………………………………………………………….
2. (a) What is Virtual Reality? (1mk)
……………………………………………………………………………………………..
(b) State any two sensory devices used in Virtual Reality. (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
3. Identify two purposes of a primary key in Databases. (2mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
4. Explain why the following are harmful to a computer:
(i) Magnets (1mk)
………………………………………………………………………………………………
(ii) Water (1mk)
……………………………………………………………………………………………….
5. State two ways of minimizing the effects of radiation from the Monitor (screen). (2mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………..
6. List three factors to consider when deciding on the choice of an Electronic Data processing
method. (3mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………….
7. (a) State any two factors one would consider when selecting any data output device. (1mk)
………………………………………………………………………………………………
………………………………………………………………………………………………
(b) Input devices can be categorized according to how they are used to enter data namely;
Keying devices, Pointing devices, Scanning devices, Speech recognition devices and Digital
devices. Give two examples of each of the following devices:-
(i) Scanning devices (1mk)
……………………………………………………………………………………………….
2
© 2011 Nandi East, Nandi South and Tinderet Districts Joint Evaluation Test
Computer Studies Paper 1
(ii) Digital devices (1mk)
………………………………………………………………………………………………
(iii) Pointing devices. (1mk)
……………………………………………………………………………………………….
(iv) Keying devices. (1mk)
……………………………………………………………………………………………….
8. (a) A computer should be connected to a stable power supply. Highlight two reasons. (2mks)
………………………………………………………………………………………………
……………………………………………………………………………………………….
(b) State any two health issues that may result from prolonged use of computers. (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
9. Many organizations nowadays use in-house developed programs. Highlight two
disadvantages of standard software over in-house developed software. (2mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
10. Differentiate between Insert mode and Type over mode as used in Word Processors. (2mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
11. (a) Explain any two uses of Forms in Database design. (2mks)
………………………………………………………………………………………………
……………………………………………………………………………………………….
(b) (i) Define the term control as used in Report or Form Design. (1mk)
……………………………………………………………………………………………….
(ii) Define Bound control. (2mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
12. Distinguish between Transcription and Transposition errors as used in Data Processing. (2mks)
…………………………………………………………………………………………………
………………………………………………………………………………………………….
13. List any two responsibilities of Information Systems Manager. (2mks)
…………………………………………………………………………………………………
………………………………………………………………………………………………….
14. (a) State and explain any one type of computer processing file. (1mk)
……………………………………………………………………………………………..
3
© 2011 Nandi East, Nandi South and Tinderet Districts Joint Evaluation Test
Computer Studies Paper 1
(b) List any two file organization methods. (2mks)
……………………………………………………………………………………………….
.................................................................................................................................................
15. State any two security control measures that can be taken to detect and protect computer
systems against computer crimes. (2mks)
…………………………………………………………………………………………………
…………………………………………………………………………………………………..
(c) Write a pseudo code for the flow chart (b) above. (5mks)
4
© 2011 Nandi East, Nandi South and Tinderet Districts Joint Evaluation Test
Computer Studies Paper 1
C
5
© 2011 Nandi East, Nandi South and Tinderet Districts Joint Evaluation Test
Computer Studies Paper 1
20. (a) Distinguish between the following sets of terms as used in spreadsheets:
(i) Worksheet and workbook (2mks)
(ii) Filtering and sorting. (2mks)
(b) State one way in which a user may reverse the last action taken in a spreadsheet package.
(1mk)
(c) The following is a sample of payroll. The worksheet row and column headings are
marked 1, 2, 3 …. and A, B, C …. respectively.
A B C D E F G H
1 NAME HOURS PAY/ BASIC ALLOW- GROSS TAX NET
WORKED HOUR PAY ANCES PAY DEDUCTION
2 KORIR 12 1500
3 ATIENO 28 650
4 MUTISO 26 450
5 ASHA 30 900
6 MAINA 18 350
7 WANJIKU 22.5 500
8 WANYAMA 24.5 250
9 OLESANE 17 180
10 MOSETI 33 700
TOTALS
Use the following expressions to answer the questions that follow:-
(i) Basic pay = Hours worked x pay per hour.
(ii) Allowances are allocated at 10% of basic pay.
(iii) Gross pay = Basic pay + allowances.
(iv) Tax deductions are calculated at 20% of gross pay.
(v) Net pay = Gross pay – tax deductions.
(d) (i) State three ways of moving round a page in Desktop Publishing window. (3mks)
(ii) State two ways on how Information and Communication Technology (ICT) can be
used to reduce the spread of HIV/AIDS. (2mks)
5
© 2011 Nandi East, Nandi South and Tinderet Districts Joint Evaluation Test
Computer Studies Paper 1