You are on page 1of 8

NAME: ………………………………………………………………. CLASS: …………………..

FORM 3 END TERM 1 2023

COMPUTER STUDIES

ANSWER ALL QUESTIONS 2 HOURS


1 Give 2 reasons for use of binary data in computer systems (2mks)

2 List 3 parameters used to represent the magnitude of a number (3mks)

3 Briefly explain the following terms (2mks)


(i) Bit

(ii) Byte

(iii) Nibble

(iv) Word
1
4 Define the following terms relating to the computer lab power supply (4mks)
(i) Brownout

(ii) Blackout

(iii) Transients

(iv) Power sag

5 Discuss the 3 parts of the task bar (3mks)

6 List 2 characteristic of 5th generation computers (2mks)

2
7 Discuss the following types of computer software: (2mks)

(i) System software

(ii) Application software

8 Discuss the following: (3mks)


(i) Disk formatting

(ii) Disk defragmentation

(iii) Disk partitioning

9 Give 2 functions of UPS (2mks)

10 Give any four document formatting features of a word processor. (2mks)

3
11 List 2 functions of the operating system (2mks)

12 Explain the following considerations when purchasing software (2mks)

(i) Authenticity

(ii) Portability

13 List 3 functions of the control unit: (3mks)

14 List 3 examples of special purpose computers (3mks)

15 List 2 types of flat panel display technologies. (2mks)

4
16 List 2 factors to consider when choosing a word processor (1mk)

17 Discuss the following types of typing modes in Ms word (2mks)


(i) Insert Mode

(ii) Type over mode

18 Discuss 3 types of computer buses (3mks)

19 Discuss 3 types of operating system according to user interfaces (3mks)

5
20 Differentiate between superscript and subscript (2mks)

21 What is a drop cap (1mk)

22 Differentiate between headers and footers (2mks)

23 What is mail merge (1mks)

24 List 3 components of a spreadsheet (3mks)

25 Differentiate between a formula and a function (2mks)

6
26 Differentiate between absolute and relative cell referencing (2mks)

27 Explain the following types of database models:


(i) Hierarchical model (2mks)

(ii) Network model (2mks)

(iii) Relational (2mks)

28 What is a primary key (1mk)

29 Discuss 3 non-printing guides in DTP (3mks)

7
30 List 4 requirements for internet connectivity (2mks)

31 Differentiate between sign-in and sign-up (2mks)

32 Differentiate between Uploading and Downloading a file (2mks )

33 List 2 types of computer virus (2mks)

34 Discuss the following types of computer crimes: (3mks)


(i) Hacking

(ii) Industrial espionage

(iii) Eavesdropping

You might also like