94
2010 BOMET / CHEPALUNGU DISTRICTS JOINT EXAMINATION 1.a) Define the term ‘operating system’ (1mk) b) State three classifications of operating system in terms of their interfacing. (3mks) 2. a) Define the term computer laboratory (2mks) b) Explain two factors to be considered when preparing a computer laboratory. (4mks) 3. Briefly explain the following terms as used in disk management (i) Fragmentation (1mk) (ii) Compression (1mk) (iii) Disk partitioning (1mk) 4. What are turn around documents? (2mks) b) Name any two data capture techniques that make use of turnaround document. (2mks) 5.a) Define the term ‘algorithm.’ (1mk) b) Write an algorithm to compute the area of a triangle (2mks) 6.a) Describe three functions performed by the CPU (3mks) 1

mwangazasecondary.sc.kemwangazasecondary.sc.ke/uploads/2010 Computer Studies Paper 1.docx  · Web view2010. BOMET / CHEPALUNGU DISTRICTS JOINT EXAMINATION. 1.a) Define the term ‘operating

  • Upload
    vuthien

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

2010BOMET / CHEPALUNGU DISTRICTS JOINT

EXAMINATION1.a) Define the term ‘operating system’ (1mk)

b) State three classifications of operating system in terms of their interfacing. (3mks)

2. a) Define the term computer laboratory (2mks)

b) Explain two factors to be considered when preparing a computer laboratory. (4mks)

3. Briefly explain the following terms as used in disk management

(i) Fragmentation (1mk)

(ii) Compression (1mk)

(iii) Disk partitioning (1mk)

4. What are turn around documents? (2mks)

b) Name any two data capture techniques that make use of turnaround document. (2mks)

5.a) Define the term ‘algorithm.’ (1mk)

b) Write an algorithm to compute the area of a triangle (2mks)

6.a) Describe three functions performed by the CPU (3mks)

7. Differentiate between Batch processing and real time processing modes. (2mks)

8.a) What is document formatting? (2mks)

b) Give any five document formatting features of a word processor (5mks)

9. What is electronic spread sheet software. (2mks)

b) A worksheet contains the data shown below

1

Cell A1 A2 A3 C1 C2 C3 G1

Entry 5 7 10 10 15 15 =sum if(A1:C3,”<=10”)

State the value displayed in G1 (2mks)

10.a) Define the term normalization as used in data base design (2mks)

b) State three objectives of normalization. (3mks)

11. What is text wrap. (2mks)

b) Explain three ways you can wrap-text an object. (6mks)

12. Name the two most common protocols for the internet (2mks)

13. Explain the following:

(i) Data security (2mks)

(ii) Data integrity (2mks)

14. Distinguish between logical and physical computer file (4mks)

15. Name two methods of paper orientation as used in DTP (2mks)

SECTION B :(40MKS)

Answer question 16 and any other THREE questions from this section on the spaces provided

16. MOLYN sawing society (MSS) pays 10% interest on shares exceeding ksh100, 000 and6% on shares that do not meet this target.However no interest is paid on deposits in the members MSS bank account.

a) Design a pseudocode program that would:

(i) Prompt the user for shares and deposits of a particular member

(ii) Calculate the interest on total savings

(iii) Display the interest and total savings on the screen for a particular member of the society (7mks)

b) Draw a flow chart for the above pseudocode (8mks)

17. A manager wishes to replace the current manual system with a computerized one

a) Describe three main areas that must be evaluated to justify the replacement. (6mks)

2

b) List the three areas that would be considered in the requirement specifications(3mks)

c) Explain three ways that can be followed to replace the system. (6mks)

18.a) Subtract 01112 from 10012 (1mk)

b) Using two’s complement subtracts 7 from 2 and give the answer in decimal notation.(4mks)

c) Convert: (i) 91B16 to octal (3mks)

(ii) 3768 to hexadecimal (3mks)

(iii) 9.62510 to binary (4mks)

19.a) Outline the features applications, advantages and disadvantages of the on-line data processing mode. (8mks)

b) Explain the use of the following file in an organization

(i) Master file (2mks)

(ii) Transaction file . (2mks)

(iii) Back-up file (2mks)

(iv) Report file (1mk)

20.a) With the aid of a diagram briefly describe any three types of network topologies.(9mks)

b) Describe the following terms as used in programming

(i) Interpreter (2mks)

(ii) Compiler (2mks)

(iii) Source code (2mks)

3

BORABU – MASABA NORTH DISTRICTS JOINT EVALUATION TEST – 2010

SECTION A (40 MARKS)

1. Distinguish between logical and physical files. (2mks)

2. State three ways in which computers can be used in

(a) Financial institution (1½ mk)

(b) Transport system (1½ mk)

3. List four techniques of using a mouse. (2mks)

4. (a) What is virtual reality? (1mk)

(b) State four components of sensory devices used in virtual reality. (2mks)

5 (a) Explain two advantages of using universal serial bus. (2mks)

(b) Explain one reason why parallel cables are faster than serial cables in data transmission.

(2mks)

6. (a) Describe two differences between metropolitan area network and wide area network (2mks)

(b) List any three components of local area network. (1½ mks)

7. State two peripheral devices connected to a computer via PS/2 port (lmk)

8. List any two careers available in the market in the field of computer hardware. (2mks)

9. A computer teacher wants to minimize illegal entry of people to a computer laboratory. Explain

three measures in which have to put in place in order to curb this illegal entry. (3mks)

10. (a) State four keyboard keys that work in a state of On/Off switches in operation. (2mks)

(b) Describe two precautions one need to undertake when connecting a hard disk to a computer. (2mks)

11. (a) Give two reasons why it’s difficult to detect and prevent a computer crime (2mks)

(b) State the difference between autocorrect and auto complete as used in word processing.(2mks)

12. (a) Define the term

i) Search engine (lmk)

4

ii) System entropy (lmk)

(b) Give an example of search engine (½ mk)

13. (a) What is real time? (lmk)

(b) Explain how real time differs from distributed processing mode. (2mks)

14. (a) Describe three disadvantages of using monolithic program (3mks)

(b) Explain the uses of the following in desktop publishing.

i) Master page (lmk)

ii) Tracking (lmk)

SECTION B (60MKS)

Answer question 15 and any other three questions from this section in the spaces provided.

15. Study the flowchart below and answer the questions that follow

5

(a) List the various outputs from the flowchart above. Show your working (5mks)

(b) Write a pseudo code for the flowchart. (6mks)

(c) State two advantages and disadvantages of high level languages. (4mks)

16. You are provided with two types of desktop publishing tools

a) Identify tool

i) R- (lmk)

6

ii) Q- (lmk)

(b) State three methods of transforming an object. (1½mks)

(c) Perform the following binary operation in decimal notation.

i) 10111.111 + 111.011 (3mks)

ii) 1111.01 - 111.11 (3mks)

(d) Explain any two ways in which you can tell that a computer has been invaded by virus. (2mks)

(e) Describe the steps to follow in order to

i) Attach a file to an E-mail (2mks)

(ii) Check an E-mail from internet. (1 ½ mks)

17. (a) (i) What is expert system? (lmk)

(ii) Explain three components of expert system (3mks)

(b) Describe the impact of information communication technology in

(i) Environment (2mks)

(ii) Employment (3mks)

(c) (i) Define disk partitions (lmk)

(ii) Explain two reasons that may lead to a partition of a hard disk (2mks)

(d) A worksheet contains the data shown below

Cell B1 B2 C2 D2 E2

Entry 65 70 80 35 =sum if(b1:b2”>35”)

i) Give the formula that can be used to obtain product of B2 and D2. (1mk)

ii) State cell data type that represent cell B 1. (lmk)

iii) State the value that will be displayed in E2. (1mk)

7

18. (a) (i) Explain three components of satellite (6mks)

(ii) State two advantages of 18 a(i) above media (2mks)

(iii) List three examples of radio waves signals (3mks)

(c) Explain two reasons why optical cables have become best choice for local area network.

(4mks)

19. The diagram below represents the role of operating system in a computer system. Use it to answer the

questions that follow. (2mks)

(a) Name the part labeled

i) M- (lmk)

ii) N (lmk)

(b) Explain two advantages of using program N in commercial organization. (4mks)

(c) Classify three types of program M (3mks)

(d) State three situations that may lead to use of questionnaire than interviews. (3mks)

(e) Explain the purpose of the following files

(i) Backups (lmk)

(ii) Reference (lmk)

8

(f) State two types of database relationships (lmk)

9

JOINT INTER-SCHOOLS EVALUATION TEST (JISET)SECTION A (40 MARKS)Answer all the questions in this section

1. State four different parts that make up a computer (2 mks)2. Briefly explain the emerging trends in micro computer technology in relation to size

(1 mk)3. (a) What is meant by the term greyware? (1 mk)

(b) State two ways of acquiring software (1 mk)

4. (a) Distinguish between impact and non impact printers (2 mks)(b) MICR and OMR (2 mks)

5. Describe the following terms(a) Website (1 mk)

(b) Blog (1 mk)

(c) Hyperlinks (1 mk)

(d) Web portal (1 mk)

6. List four stages of data collection (2 mks)7. Explain the role of the following ICT specialist

(a) Computer Technician (2 mks)

(b) Information systems manager (2 mks)

8. Distinguish between defragmentation of a disk and partitioning of a disk with reference to operating systems (2 mks)Defragmentation

Partitioning

9. (a) Give four advantages of DTP over a word processor (2 mks)(b) Differentiate between the following

(i) Kerning and tracking (2 mks)(ii) Margins and column guides (2 mks)

10

10.Headache, back and neck pain may result from use of computers. State how each of them can be minimized (2 mks)Headache

Back and neck pain

11.Explain the meaning of the following terms as used in computer programming(2 mks)

(i) Syntax (ii) Semantics

12.(a) State two methods/tools that a system analyst uses to design a system(2 mks)(b) Give two reasons why maintenance phase in system development cycle is necessary

(2 mks)

13.Explain the functions of the following network devices (2 mks)Bridge

Gateway

14.Differentiate between baseband and broadband signal as used in networking(2 mks)

Baseband signal

Broadband

15.Identify two areas where computers are used today (1 mks)

SECTION B (60 MARKS)

Answer question 16 and any other three questions from this section

16.Khetia supermarket pays 10% commission on sales that are above 20,000 kshs, and 4% on any sales that are less than this target. However, no commission is paid on the capital of the salesman. (a) Design a pseudo code for a program that would: (7 mks)

(i) Prompt a user for sales and capital of a particular salesman(ii) Calculate the commission and total amount

11

(iii) Display the commission and total amount on the screen for a particular salesman

(b) Draw a flow chart for the above pseudo code (8 mks)

17.What is the hexadecimal equivalent of 7678 (3 mks)(b) Use one’s compliment to solve the following sum: -510 (2 mks)

(c) State two reasons for using binary in digital technology (2 mks)

(d) Explain the role of a modem in data communication (2 mks)

(e) Describe each of the following computer terminologies as used in data representation (4 mks)

(i) Word (ii) Bit (iii) Byte(iv) Nibble

(f) Convert 7.12510 to binary (2 mks)

18.(i) Name four data types used in spreadsheets (2 mks)(ii) Outline five advantages of an electronic spreadsheet over the traditional ledger

(5 mks)

(iii) What is a chart wizard in spreadsheets? (1 mk)

(iv) Name and explain the use of the following buttons found in spell-check dialog box in reference to word processing (6 mks)

(a) Change(b) Ignore once(c) Add

(v) What is a template in word processing? (1mk)

19.(i) Describe three ways in which computers have positively impacted on education(3 mks)

(ii) (a) Simulation is one of the application areas of computers. What is meant by the term simulation? (1 mk)

(b) State three advantages of computer based simulation (6 mks)

12

(iii) Differentiate between a software engineer and a computer engineer. (2 mks)

(iv) Name three responsibilities that are carried out by a web administrator. (3 mks)

20.(i) List and briefly describe three components of a database system (3 mks)(ii) Define the following terms as used in a database (3 mks)

a. Attributeb. Database modelc. Macro

(iii) Explain three types of database models (6 mks)

(iv) State three objectives of normalization (3 mks)

BURETI DISTRICT JOINT EVALUATION TEST – 2010

SECTION I

Answer all the questions in this section in the spaces provided.

1. (a) Write the acronym BIOS in full (1mk)

(b) What is the purpose of BIOS in a computer system? (1mk)

2. State the actions that should be taken in case of fire outbreak in the computer laboratory. (2mks)

3. Name and explain the three parts of a task bar. (3mks)

4. The electronic commerce (e – commerce) has enabled people to do business through the internet. This

is enough to serve time, spend less and reduce movements. What could be the major obstacles to this trade?

(2mks)

5. State any two functions of a UPS. (2mks)

6. (a) State one advantage of using TWOS complement over ONES complement. (1mk)

(b) Distinguish between bound and unbound controls as used in database. (2mks)

13

7. Distinguish between insert and typeover modes of typing in word processing. (2mks)

8. Define the following terms as used in data communication.

(a) Noise (1mk)

(b) Multiplexing (1mk)

(c) Atternation (1mk)

9. A student in a school wanted to print a document but the printer could not print yet the online light was on

and the printer paper was correctly placed. Name any other two possible reasons why the printing failed.

(2mks)

10. (a) State any two functions of a network administrator. (2mks)

(b) Explain the term flaming as used in internet communication (2mks)

11. In most cases, files in a computer system have their extensions in order to identify their purpose.

State the purpose of the following file type extensions.

(a) .EXE (1mk)

(b) .BAT (1mk)

(c) .SYS (1mk)

12. (a) Define the term firmware (1mk)

(b) Explain the purpose of geographical positioning system (GPS) as used in air traffic control system.

(1mk)

(c) Explain how data is represented on optical media. (2mks)

13. Distinguish between hard system and soft system (2mks)

14. State two types of computer dictionaries. (2mks)

15. Explain the following terms used in operating systems.

(a) Disk partitioning (1mk)

(b) Disk formatting (1mk)

14

(c) Disk defragmentation. (1mk)

15

Start

A = 6B = 2C = A * B

A < OYES Print

A, B, C

C = C +AB = B + 2A = A - 1

NO

END

SECTION B (60 MARKS)

Answer question 16 and any other three questions from this section

16. (a) Define the term “Dry running” as used in program development. (2mks)

(b) Write the printed values of A, B and C in the flowchart below. (3mks)

16

(c) Develop a pseudocode for the flowchart in (b) above. (5mks)

(d) Give two examples of language translators used in programming. (2mks)

(e) Name the stage of program development cycle where:

(i) A user guide would be written. (1mk)

(ii) System charts would be drawn. (1mk)

(iii) Staff training is done. (1mk)

17. Your school has decided to replace its library control system. The current system was implemented ten

years ago but has restricted reporting facilities and has a text-based interface. The school intends to replace the old

system with a new computerized system and is considering both “parallel running” and “direct changeover”

(a) (i) Briefly explain the terms parallel running and direct changeover as used in implementation.

(2mks)

(ii) Give two disadvantages of direct changeover over parallel running. (2mks)

(iii) Mention any two advantages of running both the manual and the computerized system

simultaneously. (2mks)

(b) Explain the “Line of sight” principle in data communication. (2mks)

(c) (i) What is a website? (2mks)

(ii) Name three facilities that are needed to connect to the internet. (3mks)

18. (a) State:

(i) Two advantages of networking (2mks)

(ii) Two disadvantages of networking. (2mks)

(b) State any three functions of network operating system. (3mks)

(c) Distinguish between logical topology and physical topology. (4mks)

(d) State:

(i) Two advantages of star topology. (2mks)

17

(ii) Two disadvantages of bus topology (2mks)

19. (a) What is the function of each of the following desktop publishing tools?

(i) Hand (1mk)

(ii) Constrained line (1mk)

(iii) Cropping (1mk)

(b) Name three types of non-printing guides in pagemaker (3mks)

(c) Explain the purpose of the following types of special memories.

(i) Buffers (2mks)

(ii) Cache memory (2mks)

(d) Give two advantages of using questionnaire during information gathering process. (2mks)

(e) Using one’s complement, calculate 510 – 910. use six bit in your calculation. (3mks)

20. (a) An Automatic teller machine (ATM) is simply a data terminal with two input and four output devices.

Identify them. (6mks)

(b) Explain the meaning of each of the following with reference to computer crime.

(i) Piracy. (1mk)

(ii) Industrial espionage (1mk)

(c) Distinguish between private data and confidential data. (2mks)

(d) Explain the following terms:

(i) Data encryption (1mk)

(ii) Program patch (1mk)

(e) Convert the Hexadecimal number ABCD to octal (3mks)

18

BUTERE DISTRICT JOINT EVALUATION TEST – 2010

SECTION A (40 MARKS)

Answer ALL the questions in this section in the space provided.

1. (a) State the purpose of registers in a computer system. (1mk)

(b) Name two types of registers found in the central processing unit. (1mk)

2. With reference to quality of print, noise, level and cost, compare a dot matrix with a laser printer.

(3mks)

3. Convert 3BD16 to Octal. (3mks)

4. (a) State two importance of internet to society. (2mks)

(b) Describe two challenges that internet has brought to society. (2mks)

5. Differentiate between the following types of integrity constraints

(i) Validity integrity (1mk)

(ii) Entity integrity (1mk)

(iii) Referential integrity (1mk)

6. Describe two computer crimes taking place in society citing control measures that can be put in place to curb

them. (2mks)

7. Computers process digital data through a process called coding. State and explain three coding systems.

(3mks)

8. (a) Give four application areas of spreadsheets. (2mks)

(b) Write the following formulae as absolute with reference to cell G20, = F10 + G20. (1mk)

9. Define modular programming and state two advantages of modular programming. (2mks)

19

10. While using a word processor, you realize that the contents of the document don’t fit on one page. They

exceed to the other page by three lines. Suggest three possible ways you can make the document fit one

page. (3mks)

11. State the function of each of the following:-

(a) Network protocol (1mk)

(b) Hub (1mk)

12. Differentiate between the following pairs as used in database design.

(a) Input mask and design. (2mks)

(b) Table and query (2mks)

13. List four factors to be considered when purchasing an operating system. (2mks)

14. Write algorithm to compute the area of a triangle. (2mks)

15. Define the term artificial intelligence. (2mks)

20

SECTION B (60 MARKS)

Answer question 16 and any other three questions from this section in the spaces provided.

16. Study the flow chart below and answer the questions that follow.

21

M = 1F = 1

F = F x M

M = M + 1

READ N

START

M = N? N

Y

PRINT, F

END

(a) What would the flow chart generate as output if the value of N at input was

(i) 6? (2mks)

(ii) 1? (2mks)

(b) Write a Pseudocode that does the same thing as the chart above. (7mks)

(c) Modify the flow chart so as to reject an input below O and to avoid looping when the input is O.

(4mks)

17. (a) Describe the ways in which a computer can represent a position and negative number. (2mks)

(b) A particular computer stores numbers in a single 8 – bit word. How would it represent 0.312510?

(3mks)

(c) What is the decimal equivalent of the number 1.01112? (2mks)

(d) Perform the decimal subtraction 1410 – 610 using

(i) Regular binary. (3mks)

(ii) One’s complement. (3mks)

18. (a) The formula = K20 + P $ 18 was typed in cell L21 and then copied to cell M24 of a spreadsheet. Write the

formula as it appears in cell M24.

(b) (i) Define the term spreadsheet. (1mk)

(ii) Give two examples of spreadsheet packages available in the market today. (2mks)

(iii) Explain the following terms as used in a spreadsheet.

What IF analysis (2mks)

Cell (1mk)

Formula (1mk)

Pie-chart (1mk)

(c) Distinguish between the following sets of terms used in spreadsheet.

(i) Worksheet and workbook (2mks)22

(ii) Filttering and sorting (2mks)

(d) State one way in which a user may reverse the last action taken in a spreadsheet package.

(1mk)

19. (a) Define an information system. (1mk)

(b) State two circumstances under which interviews may be used as a method of gathering information

(2mks)

(c) (i) What is a computer laboratory (1mk)

(ii) Give two measures that should be observed when using the computer laboratory to protect computers

against loss of data (2mks)

(d) State three factors you would consider before enrolling for an ICT course in an institution of higher

learning. (3mks)

(e) Give two duties of each of the following computer professionals.

(i) Computer programmer (2mks)

(ii) System analyst (2mks)

(iii) Computer technician (2mks)

20. (a) Distinguish between unshielded twisted pair (UTP) and shield twisted pair (STP) cables.

(2mks)

(b) (i) With an Aid of a diagram describe the mesh topology. (3mks)

(ii) Highlight one advantage and two disadvantages of the above network topology. (3mks)

(c) Highlight four limitations of computer networking. (4mks)

(d) Define the following terms.

(i) Data Terminal Equipment. (1mk)

(ii) Remote Terminal (1mk)

(iii) Internet (1mk)

23

KASSU JET -12010

SECTION A(40 MARKS)

1. List and describe four elements of a computer system. (2mks)

2. a) Describe the following technologies as used in the computer generations

and name the generation. (1mk)

b) Suggest two possible causes of data and program loss in a computer

(2mks)

3. a) Describe two functions of the CPU in a standard computer (2mks)

b) List two classifications of printers, and give an example of each. (3mks)

4. Define the term double-clicking as used in mousing skills (1mk)

5. The Overtype key and Delete key are both referred as editing keys. Explain how

they are used.

6. a) Identify the main stages of program development (3 ½ mks)

b) Define the term program documentation (1mk)

c) List three program control structures giving examples. (3mks)

8 Distinguish between high level and low-level languages giving one advantage and

one disadvantage of each of them. (2mks)

9. distinguish between TCP/IP and HTTP protocols. (2mks)

10. Differentiate between Real time processing and Batch processing giving examples

were each could be used. (2mks)

11. Differentiate between Real time processing and Batch processing giving examples

were each could be used. (2mk)

24

12. Study the following worksheet and then answer the questions that follow:

a) Write down the formula in cell J4 that can be used to evaluate the total

marks for the student whose admission no is 8521. (5mks)

b) The pass mark is 40%. Write down an IF function that will return two

values, PASS or Fail depending on the Total mark. (2mks)

13. what is a computer network? (3mks)

14. Describe three different types of computer network (3mks)

15. Describe five electrical safety precaution rules that should be observed in a

computer room. (5mks)

SECTION B (60 MKS)

Answer question 16 (Compulsory)and any other THREE questions from this

Section.

16. To maintain a strategic fit Safaricom is introducing a tariff called the mega tariff that will lower costs to Safricom to Safaricom calls and calls to other networks. Calls to Safaricom networks will be charged according to the time of the day as listed below:

-Between 8am to 12 noon – 6 Ksh

-Between 12 noon to 2pm-0.8 Kshs

-Between 6 to 1 am -4Kshs

25

-between 1 am t 8am- 1Kshs

Internal calls to other networks are charged at a fixed rate of 7 Kshs between 8am to 8pm and to while international calls are charged at a rate of 25 Kshs between 8am to 8pm and Kshs 35 for the rest of the day. All calls are charged per minute usage.

Mr. WasswaBbaale a business man who makes both internal and internal calls would like to make maximum use of this of this tariff.

a) Write a pseudo code that would show him know the charges of calls with an appropriate label when he the inputs type of call and the time where appropriate. Use a 24 hour clock. (8mks)

b) Design a flowchart for the pseudo code in 16(a) above (7mks)

17. a) Explain how an operating system controls I/O devices. (2mks)

b) Maintaining security is one of the functions the operating system. Explain how the operating system maintains security (2mks)

c) Distinguish between the following pairs of terms

i) Indexed sequential and direct file organizations (2mks)

ii) State any two factors to consider when selecting a data processing

d) i) Using appropriate examples, differentiate between distributed and

centralized processing modes (3mks)

ii) state one advantage and one disadvantage of the processing modes in 17(d) (i) (opposite page)

(2mks)

e) i) With reference to an operating system, differentiate between

formatting and partitioning. (2mks)

ii) List any TWO types of user interface. (1mk)

iii) Explain how each type of the user interface in e (ii) above operates

(2mks)

18. a) Using eight bits and twos complement, subtract 7810 from 1710. Give your

answer in decimal notation (3mks)

b) Convert 11011011111.11112 to:

i) Octal (2mks)

26

ii) Hexadecimal (2mks)

iii) Decimal (2mks)

c) State any Two methods used to gain illegal access to a computer system (2mks)

d) i) Distinguish between peer-to-peer and client –server LANs. (2mks)

ii) Atieno was very happy when she bought a Safaricom 2G modem for she was able to easily connect her computer to the Internet. After six months she noticed it was taking her too long to connect to the Internet. State two possible causes of the problem.

19. a) i) Explain any two causes of system change. (2mks)

ii) Explain any THREE causes of system maintenance. (2mks)

b) i) Use of questionnaire is one of the most popular fact finding method. State any TWO advantages and TWOdisadvantages of using this method to gather data.

ii) Explain the importance of requirement specification phase of Systems development.(2mks)

c) Explain TWO reasons why a new system is tested before implementation.(2mks)

d) i) State two duties performed by a system administrator. (1mk)

ii) The principal of a school is attempting to convince his staff

to us CAL and CAI software. State one benefit and one limitation of using such software. (2mks)

e) State one advantage and one disadvantage of using expert systems in

medicine (2mks)

20. a) Explain three types of communication links that may be used to get an

Internet connection (3mks)

b) Differentiate between the Internet and World Wide Web. (2mks)

ii) Technology has been blamed for polluting the environment.

Explain how computer technology has contributed to this. (2mks)

c) A Company that makes and sells vehicles receives orders from various clients. The company wants to enter their orders into a database. Study the table structure below and answer the questions that follow.

27

Field Name Data Type Field Size

Order Number Number Long Intenger

Order Date Date/Time

Supply Date Date/Time

Product code Tex 5

Customer ID Number Long Integer

Delivery address Text 30

Product Type Tex 15

Product Name Tex 10

Quantity Ordered Number Long integer

Product Prize Number Long Integer

i) split the above structure into THREE tables and for each table identify an appropriate primary key. (5mks)

ii) Design well labeled tables structures and identify foreign keys (3mks)

BELGUT /AINAMOI DISTRICTS JOINT EXAMINATION

SECTION A : (40 marks)

Answer all the questions in this section in the spaces provided

l. (a) What is an embedded computer? (1mark)

(b) State the main component that formed the basis for second generationcomputers.(1 mark)

2.(a) Give one function of a main frame operating system which you would not expect to find in   the operating system of a micro-computer. (1 marks)

(b) Name four examples of application software. (2mks)

28

3. List four of the fields which would be expected in a database file ofinformation about school      students. (2 marks)

4.(a) Name four examples of document readers. (2mks)

(b) Give one application for each of the input methods in (4.(a). (2 marks)

5. Subtract 010112 from 110012

( 2mks )

6. Explain the following computer crimes, ( 2mks )

(i). Fraud

(ii). Alteration

7. (a) Define

(i). Firewalls (1mk)

(ii). Data encryption. (1mk)

8. Identify three advantages of using modular programming in system development. (3 marks)

9. Explain the following terms as used in computing cycle. (3 marks)

(i) Fetch phase

(ii) Decode phase

(iii) Execution phase

10.(a) Differentiate between Cache and Buffer memories. (2 marks)29

(b) List and give the functions of computer buses. (3 marks)

11.(a) Explain any two factors that should be considered during output design (2marks)

(b) Why is observation sometimes disadvantageous when used in fact finding? (1 mark)

12. Outline two major functions of UPS in computer laboratory. (2 marks)

13.(a) State the use of:

(i) Light pen (1mk)

(ii) Graphics tablet. (1mk)

(b) Name any advantage of solid-state memories over other storage media.(1 mark)

14. Outline four data types that can be entered into a spreadsheet. (2 marks)

15.(a) Define virtual reality. (1 mark)

(b) List any two applications of virtual reality. (1 mark)

SECTION B: (60 marks)

Answer question 16 and any other THREE questions from this section in the spaces provided.

16.(a) List two examples of:

30

(i) Third generation languages. (2mks)

(ii) Object oriented languages. (2mks)

(b) Define (2mks)

(i) Object code

(ii)Source code

(c) Differentiate between a compiler and an interpreter. (2 marks)

(d) A car rental firm leases its cars for Ksh.2500.00 per day. The manager giver a discount based on the number of days that the car is rented. If the rental period is greater than or equals to 7 days then a 25% discount is given. Write a peudocode to accept a car number and the rental period, and calculate the total amount earned by the company when a car is leased. (7marks)

17.(a) State any three duties of the following ICT personnel.

(i) Systems analyst. (3 marks)

(ii) Database administrator. (3 marks)

(iii) Web master (3 marks)

(b) Name any three ICT courses offered in the Kenyan universities. (3 marks)

(c) Outline three advantages of telecommuting. (3 marks)

18.(a) Define artificial Intelligence. (1 mark)

(b) Explain the application of artificial intelligence in the following areas.(6 marks)

31

(i) Natural language processing

(ii) Robotics

(iii) Expert systems

(b) Give any three symptoms of the following computer work-related disorders and two of      their methods of prevention.

(i) Computer vision syndrome. (4 marks)

(ii) Repetitive strain injury. (4 marks)

19.(a) Define the term ergonomics (1 mark)

(b)(i) Give any three advantages of using a fibre optic cable in data transmission.(3 marks)

(ii) Name two types of fibre optic. (1 mark)

(c) State three advantages of wireless communication. (3 marks)

(d) Explain the following terms. (3 marks)(i) Multiplexing

(ii) Bandwidth(iii) Baseband signal

(e) Explain the use of these communication devices. (4 marks)(i) Routers

(ii) Hub

20.(a) Define Internet. (1 mark)

32

(b) Describe the transmission of data over a telephone line (4 marks)

( c) Outline the ‘line of sight’ principle in wireless transmission. (2marks)

(d) The first column in the table below contains the formulae stored in cell F10 of a spreadsheet. Enter the formula as they would appear when copied to cell M20 of the same spreadsheet. (3marks)

(e) (i) Differentiate between multiprogramming and multiprocessing. (2marks)

(ii) Give application areas of the following data processing modes. (3 marks)

(a) Batch(b) Real time

(c) On line

KISUMU NORTH AND EAST DISTRICTS JOINT TEST

SECTION A (40 MARKS)

1. State two practices to be observed in order to ensure the safety of the computer user (2mks)

2. State the function of the following keys on the computer key board (2mks)(a) Insert(b) Delete

3. Name three responsibilities that are carried out by a network administration (3mks) 33

4. List and describe three guidelines that should be followed when conducting an interview during information gathering (3mks)

5. (a) Define portability as used in software selection (1mk)(b) List four ways of acquiring software in an organization (2mks)

6. (a) Subtract 1102 from 110102 (1mk)(b) Find the sum of binary number 101.1012 and 110.1002 (1mk)

(c) Convert binary number 11010110.10012 into octal number. (1mk)

7. List three uses of DVDs (3mks)

8. State the function of each of the following(a) Network Interface Card (1mk)

(b) Modem (1mk)

(c) Repeaters (1mk)

9. How does an operating system manage computer memory (2mks)

10.List four factors to be considered when purchasing an operating system (2mks)

11.Write an algorithm to compute the area of a circle (2mks)12.(a) List three ways by which you can provide a common link or relationship between

the tables in a database software (3mks)(b) What is referential integrity (1mk)

13.List four types of publications that ca be designed using DTP software (2mks)

14.(a) List four stages in data collection (2mks)

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(b) What is meant by the following (2mks)

(i) Reference file(ii) Report

15.Explain the following terms (2mks)(a) Computer fraud(b) Alteration

34

SECTION B (Answer question 16 and any other three questions from this section)

16.(a) When invoicing customers, the invoice clerk has to work out the discounts allowable on each order. Any order over 20,000/= attracts a “bulk” discount of 7%. A customer within the trade is allowed 10%. There is also a special discount of 2% allowed for any customer who has been ordering regularly for over 2 years. Using a flowchart show clerical procedure for working out discount entitlement.(b) Name the control structures you have used in the flow chart (2mks)

(c) Describe three methods you would use in error detection during programtesting (6mks)

(a) List three advantages and three disadvantages of fibre optic cable (6mks)

Advantages

Disadvantages

(b) Describe the following signals and state where each is applied in network communication. (4mks)

Analog

Digital

(c) Name two types of coaxial cables (2mks)(d) (i) Distinguish between microwave and satellite transmissions (2mks)

(ii) Give an example of internet protocol (1mk)

17.The information below is maintained by the sales lady at the school canteen. Study it and answer the questions that follow.

A B C

1 Item units (kg) value (ksh)

2 oranges 12 2000

3 mangoes 13 1000

4 tomatoes 12 1400

5 cabbages 15 2500

(a) Describe the basic data types used in this spreadsheet (4mks)

(b) Provide a single formula that would be used to

(i) Count the number of items whole units are equal; to 15 (2mks)(ii) Sum the values of items whole units are equal to 12 (2mks)

35

(c) (i) :List and describe four areas of application of spreadsheets (4mks)

(ii) Explain data range legend and axis as used in spreadsheet charts (3mks)

19. A computer diskette in drive A has folders for MEMOS for an administrator. Each of these folders is labelled according to the relevant months. The secretary created the folders for each months memo for each of access. Study the table below

MEMO 1 MEMO 2 MEMO 3

Warning

Lateness

Assembly

Inaccuracies

Auditing

Fraud

Careless talk

Inefficient

Meeting

(a) Assuming that the secondary was working from the diskette, draw the corresponding tree structure (6mks)

(b) (i) The secretary wanted to create a folder to store a memo in Fraud folder. State the path for that folder (2mks)(ii) Suggest how the secretary can ensure that the work in that diskette is not

spoilt (1mk)

(iii) The content of the file is not viewed by any other person apart from her.(1mk)

(c) (i) List any two devices under the control of the operating system (2mks)

(ii) Explain how each one of these devices are controlled by the OS

20.(a) List and describe four strategies for converting from an old system to a new system (4mks)

(b) (i) Distinguish between private data and confidential data (2mks)

(ii) What can be done to stop illegal access to a computer laboratory by unauthorizedpeople (3mks)

(c) (i) List four areas that would be considered in the requirement specification (4mks)

(ii) Name any two areas covered in a feasibility report during system analysis and design (2mks)

LAICOMET 2010SECTION A (40MARKS)

36

Answer All questions from this section

1. What is peripheral device? (1mk)

2. Highlight the use of find and replace features in word processors. (2mks)

3. List three factors to be considered when purchasing a microcomputer. (3mks)

4. Identify two proper sitting postures while using computer. (2mks)

5. Distinguish between coldbooting and warmbooting.(2mks)

6. Computer system are built from three type of physical components: processor , memories and input/output

devices

(i) State two tasks of processor. (2mks)

(ii) List any four examples of computer output devices. (2mks)

7. Give two advantages of a Digital Versatile Disk over a normal compact disk. (2mks)

8. State two health issues that may result from prolonged use of computers. (2mks)

9. Describe the role of an operating system in. (4mks)

(i) Memory management.

(ii) Job scheduling.

(iii) Error handling.

(iv) Resource control.

10. Explain why Two’s compliment is preferred to one’s complement in computing. (1mk)

11. List three factors to be considered when choosing an electronic data processing method.

(3mk)

12. a) List two disadvantages of using computers. (2mks)

b) Give two factors that should be considered before enrolling for an ICTcourse in a

college. (2mks)

13. What is meant by the term Dry running as used in program development? (2mks)

14. Computers have evolved through a number of generations. List any three characteristics of the First

generation of computers.

15. A worksheet contains the data as shown below

A B C D E F G

1 5 10

2 7 15

3 10 17

4

37

5

6

7

8

9

10

a) The formula = COUNTIF (C1:C3, “>10”) was entered at G1.Writedow the value that was displayed.

(1mk)

b) Write down the formula that would be entered at cell B7 to sum the values in column A whose values are

greater or equal to 5. (2mks)

c) The formula = $C2 + C$3 is entered in cell C5 and then copied to D10. Write down the formula as it appears

in the destination cell. (2mks)

SECTION B (60MARKS)

Answer question 16 and any other 2 questions from this section

16. a) State the three basic types of program control structures. (3mks)

b) Draw a flowchart which will simulate the processing of student’s report. The simulation should be such that

the user repeatedly inputs marks per subject for six subjects using a looping control structure. The computer

processes the total marks and mean score of the student.

Note. 1. It is assumed that the student does six subjects

2. The output required is; average score and total marks. (7mks)

c) Differentiate between Analogue and Digital data. (2mks)

d) Outline three advantages of using computer for data processing over other types of

office and business equipment. (3mks)

17. a) (i) State the purpose of registers in computer system. (1mk) (ii) Give two types of register in a computer system. (2mks)

b) Describe the structure of hard disk in reference to cylinders, tracks and sectors. 3mks)

c) Highlight four factors one should consider when purchasing a printer. (4mks)

d) Give two advantages of using electronic point-of-sale terminal as opposed to

manual entry at a supermarket checkout counter. (2mks)

e) A school board of governors intends to put up a computer laboratory. Suggest three

38

factors to be considered in accomplishing the above task. (3mks)

18. a) Your school decides to replace its control system. The current system was implemented ten years ago but has restricted reporting facilities and has a text-based interface.The school intends to replace the old system with a new computerized system, and is now considering both ‘parallel running’ and ‘direct changeover’.i) Briefly explain the term parallel running and direct changeover as used in system

implementation. (2mks)

ii) Give two disadvantages of direct changeover over parallel running. (1mk)

iii) Identify two main risks of direct changeover during system implementation. (2mks)

iv) Mention any two advantages of running both his manual system and the

computerized system simultaneously. (2mks)

b) Name the three components of a spreadsheet. (3mks)

c) (i) What is a Website? (2mrks)

(ii) Name three facilities that are needed to connect to the internet. (3mks)

19. A computer user may interact with a computer either through Graphical User Interface. (GUI) or through typed commands.a) (i) State two feature of a graphical user interface. (2mks)

(ii) Give two advantages of using GUI based operating systems over a command line

Interface. (2mks)

(iii) Some computer systems still use Command line interfaces. State one advantage

of command line interface. (1mk)

b) Explain the use of any two buttons found in a spell-check dialog box. (2mks)

c) Explain the meaning of each of the following with reference to computer crime.(4mks)

i) Tapping

ii) Piracy

iii) Trespass

iv) Fraud

d) Explain four methods of classifying computers. (4mks)

20. Differentiate between the following terms as used in computer networking. (4mks)i) Modulation and demodulation.

ii) Multiplexing and demultiplexing.

b) State four ways in which the feasibility of a system is assessed. (4mks)

c) Explain how the following data security threats can be controlled. (4mks)

39

i) Viruses.

ii) Theft.

iii) Computer errors and accidental eraser.

iv) Unauthorized access.

d) Highlight three advantages of database systems. (3mks)

FORM 4 MID YEAR CONTINUOUS ASSESSMENT TEST

SECTION A ( 40 MARKS)

Answer all the questions in this section in the spaces provided

1.a). A computer laboratory should be constantly kept dust and smoke free. Specify two effects that dust would have on the operation of computers. (2 marks)b).Why should you first switch on the UPS before switching on the system unit and the monitor?

(1 mark)

2.State two magnetic storage devices. (2 marks)3.State the following types of transcription errors: ( 2 marks)a). 3455 instead of 3456

b). Simth instead of Smith

4.a) Perform the following binary addition 1010 + 0111 (1 mark)b). Convert 101101000101012 to hexadecimal. (2 marks)

5.State three ways used to represent a negative number. (3 marks)6.Distinguish between data privacy and data integrity as used in computing. (2 marks)7.Difference between a primary key and a foreign key while designing a database. (2 mark)8.Distinguish between count and countif functions as used in spreadsheets. (2 marks)9.A part from system unit, monitor, keyboard and mouse, state other four hardware requirements for video conferencing. ( 2 marks)10. Match the following statements with repeater, router or a bridge. ( 2 marks)

Statement Device

(a) Operates at data link layer

(b) Determines the best path for data to follow

(c) Regenerates signals

(d) Forwards everything which it doesn’t recognize

11. a). State under which category of keyboard the following keys would fall: (2 marks)i).

ii).

H

F10

40

b). State two functions of Insert key. ( 2 marks)

12. a). Explain why you have to read the user manual before installing the software. (2 marks)b). Explain the following terms:

i). user documentation (1 mark)

ii). Technical documentation (1 mark)

13. In Kenya Tea Packers Company several people are employed as record clerks, typists and messenger. The company intends to introduce a computerized system in all the departments. Suggest three reasons that would make workers unhappy with the new system.

(3 marks)14. Explain the following internet related terms: (4 marks)(a) Sign in(b) Search engine(c) Surf(d) Sign up15. State two functions of a compiler. (2 marks)SECTION B (60 marks)

Answer question 16 and any other three questions from this section in the spaces provided.

16. a). Explain three errors which may occur in computer programs. (3 marks)b). Draw a flowchart which can be used to design a program to work out the cost of converting the floor of a house with carpet tiles given:

i). Number of rooms in the house

ii). For each room

- the size of a tile (SOT) and cost of a tile (COT) to be used in that room - the length (L) and breadth (B) of the room- for each room calculate the number of tiles (NOT) required as well as the cost of the tiles.iii). Print the total cost (TL cost) of tiles required. (10 marks)

c). Differentiate between a system flowchart and a program flowchart. (2 marks)

17. a). Explain the function logical topologies: (4 marks)i). Token ring

ii). Ethernet

b). State the function of the network layer of the OSI Model. (1 mark)

c). List four internet protocols. (4 marks)

d). Describe the following topologies: (8 marks)

i). Star

ii). Ring

18. a). What is a virtual reality? (1 mark)b). Explain the following interactive sensory equipment used I virtual reality:

i). Head gear

41

ii). Body suit

c (i). What is artificial intelligence? (1 mark)

ii). State and explain three components of an expert system. (6 marks)

d). Most computerized security systems make use of biometric analysis. Name three physical features of human beings that can be considered for this analysis. (3 marks)

19. a). Explain three coding schemes (6 marks)b). Using one’s and two’s complement, work out 9 – 14. (2 marks)

i). One’s complement

ii).Two’s complement

c). Workout the hexadecimal equivalent of 1011 1110 00112 . (4 marks)

20. a). State and explain four functions of an operating system. (4 marks)b). Explain the following terms as used in disk management using an operating system.

i). Disk de-fragmentation (2 marks)

i). Disk cleanup (2 marks)

c). What will happen if you attempt to delete a folder while a file contained in it is open.

(1 mark)

d). State two properties than an operating system displays about a file. ( 2 marks)

e). Give four advantages of storing files in folders. (4 marks

MANGA DISTRICT JOINT EVALUATION TEST – 2010

1. Differentiate between the following:

(a) Light pen and stylus. (2mks)

(b) Digital camera and ordinary camera. (2mks)

2. State two uses of OMR (2mks)

3. (a) Differentiate between SRAM and SDRAM (2mks)

(b) Explain why the processor of a micro computer is referred to as a micro processor (1mk)

4. State three factors that determine the processing speed of a computer. (3mks)

5. State two advantages of LCD over CRT monitors. (2mks)

6. Some devices have a combination of I/O functionality. State four of such devices (2mks)

7. State two advantages and two disadvantages of impact over non-impact printers. (4mks)

42

8. List down four types of magnetic media that resemble a floppy disk. (2mks)

9. State two advantages of USB port over the parallel port (2mks)

10. Differentiate between operating system and utility software (2mks)

11. State two common types of O.S used on micro computers (2mks)

12. Mobile phones have become common ICT devices. Explain some of the powerful capabilities that

come with some of the latest embedded operating systems (3mks)

13. List down three examples of High level language (HLL) and state its most appropriate application.

(3mks)

14. Describe two types of data processing methods. (2mks)

15. (a) Differentiate between a logical file and a physical file. (2mks)

(b) Name four types of computer files. (2mks)

SECTION B

Answer question 16 and any other three questions.

16. (a) State the three basic types of program control structures. (3mks)

(b) Draw a flow chart which will simulates the processing of students reports. The simulation

should be such that the user repsectedly inputs marks per subject for six subjects using a looping

control structure. The computer processes the total marks and mean score of the student. If the average is

greater the 50% “Pass” else “Fail” (7mks)

(c) Differentiate between analog and digital data. (2mks)

(d) Outline three advantages of using computers for data processing over other types of office and

business equipment. (3mks)

17. (a) Define feasibility study as used in a system (2mks)

(b) State four devices under direct control of the operating system. (2mks)

(c) Briefly describe the following types of computational errors (3mks)

(i) Truncated

(ii) Transposition

(iii) Transcription

43

(d) Explain three most commonly used coding squares (3mks)

(e) Distinguish between online and real time processing (2mks)

(f) State one advantage and two disadvantages of command line interface. (3mks)

Advantage

Disadvantages

18. (a) Explain three communication services offered through internet. (3mks)

(ii) Describe the following internet terms. (2mks)

Link

URL

(b) The following is a spreadsheet relating to a farmer.

A B C

1 Crop Amount

2 Maize 150

3 Beans 300

4 Cashewnuts 850

5 Cabbages 1036

(i) A function = IF (B2< 200, “Not viable”), IF (B2> 300, “Moderate”), IF (B2> 1000, “Viable))). Write

down the appropriate result return in cells C2, C3, C4 and C5. (2mks)

(c) Text can easily be selected using a mouse in word processing. How do you select using a mouse.

(2mks)

(i) Multiple paragraph

(ii) Vertical block of text

(d) Distinguish between the following:

(i) Window and an orphan in word processing (2mks)

(ii) Cut and copy commands (2mks)

(e) State one purpose of drop caps on a text paragraph. (1mk)

(f) What is an expert system (1mk)

44

19. Below are two tables structure of files in a database.

Employee Employee details ____________

Field D ata type F ield D ata type

Employee name Text Employee Number Number

Employee number Auto number Date employed Date / time

Date of birth Date/time Department Text

Address Text Salary Currency

(i) Which of the two table is likely to be the parent table and why? (1mk)

(ii) It is advisable to “enforce referential integrity” when creating a relationship. What do you understand

by the term referential integrity? (2mks)

(iii) The field “Employee Number” the employee details table is likely to be the primary key. What is a

primary key. (2mks)

(iv) Which fields in both tables is most appropriate for creating a relationship. (1mk)

(v) What would make the relationship between the tables fail to work. (2mks)

(b) In databases, the field properties specify finer details related to the fields and the table entries

expected. State four field properties. (4mks)

(c) State three functions of a database (3mks)

20. (a) Define the following terms (3mks)

(i) Data control.

(ii) Computer errors

(iii) Sabotage

(b) Other than computer viruses, errors are accidental, discuss any three threats to computerized

system and explain the preventive measures that can be taken to avoid such threats. (6mks)

(c) Explain what is meant by data back up and name three dangers of inadequate data backup procedures.

(4mks)

(d) Explain the implications of the legislation “prohibited publications” (2mks)

MBOONI WEST DISTRICT JOINT EVALUATION TEST45

SECTION A. (40 MARKS)

Answer all questions in this section.

1. One function of an operating system is to control computer resources. State four resources under operating system control 2 Marks

2. a. Define the term plotter 2 Marks

b. List two types of plotters 1 Mark

3. Explain the following terms as used in the word processing 4 Marksa. Indenting

b. Alignment

c. Foot note

d. Endnote

4. List three application areas of artificial intelligence. 3 Marks

5. Differentiate between COM ports and LPT ports. 2 Marks

6. List three factors to consider when deciding on the choice of an electronic data processing method 3 Marks

7. Ventilation is an important practice in the computer lab because it enhances proper circulation of air. Outline three ways in which air is regulated in the computer room. 3 Marks

8. List four advantages of optical disks over floppy diskettes 4 Marks

9. What does the following control measures against computer crime involve? 4 Marksa. Audit trail

b. Data encryption

c. Log files

d. Passwords

10. List four examples of flat panel displays 2 Marks

11. Define the term mail merging 2 Marks

12. Name two files that are created in mail merging process 2 Marks

13. While purchasing computers for his school the principal Musambweni high school decided to consult an expert. As a computer student advise him on four hard ware considerations 2 Marks

14. Name four methods used in data management on a worksheet 2 Marks

15. List four formatting techniques used in ms excel 2 Marks

SECTION B. (60 MARKS)

Answer question 16 and any other three questions

16. a. Study the pseudocode below and design a flowchart for the pseudocode. 8 Marks

Set total to zero

Set grade counter to one

46

While grade counter is less or equal to ten

Input the next grade

Add the next grade into total

Add one to the grade counter

Set the class average to the total divided by ten

Print the class average.

b. Describe three methods of testing the program for errors 3 Marks

c. List down four selection controls use in writing a program 2 Marks

d. Outline four benefits of modularization in programming 2 Marks

17. a. Convert the following numbers of their decimal equivalent 6 Marksa. 11.0112

b. 11.10112

c. 111.101012

…………………………………………………………………………………………………………………..

b. Outline four ways in which data integrity may be maintained 4 Marks

c. Discuss four advantages of using questionnaires as a fact finding tool 4 Marks

d. What is the role of a recycle bin in Ms. Word? 1 Mark

18. a. List three advantages of fibre optic cables 3 Marks

b. Differentiate between static RAM and dynamic RAM. 4 Marks

c. Describe the following types of queries found in Ms. Access 3 Marks

i. Update

ii. Append query

ii. Make table query

d. Distinguish between source program and object code 4 Marks

e. Distinguish between a mouse pointer and an insertion point 1 Mark

19. a. Outline four major ways the company network administrator can enforce good network

practice on user of the company LAN 4 Marks

47

b. Identify four major categories of data handling process which make up a computer system

2 marks

c. Outline four contents of user manual that would help the user to rum the system with minimal

guidance

d. Distinguish between dynamic and static systems 2 Marks

e. List three programming languages that can be used by web developers 3 Mark

20. a. Masai Teacher’s college has decided automate its library for effective services to the studentsIdentify four methods they are likely to use to gather information during system development

4 Marks

b. Define the following terms in relation to internet 4 Marks

i. Downloading

ii. Hyperlink

iii. Web browsers

iv. Internet service providers

c. Differentiate between sorting and filtering as used in electronic spreadsheet program 2 Marks

d. Define the following terms 3 Marks

i. Spam mail

ii. Disk

iii. On board modem

e. Define the term WIMP as used in computing 2 Marks

MUTITO FORM FOUR JOINT EVALUATION TEST

SECTION A: (40 MARKS)

Answer all the questions in this section

1. A computer should be connected to a stable power supply. Highlight two reasons. (2 marks)

a) Give four characteristics of cathode ray tube monitors. (2 mark)

b) Name two examples of flat panel display (FPD). (2 marks)

48

Start

A= 11ADD = 0

PRINT A

ADD = ADD + AA = (A + ADD)2

2. Optical storage media are preferred as compared to magnetic media give four reasons. (2 mark)

3. Many organizations nowadays use in-house developed programs. Highlight four disadvantages of

standard software over in house developed software. (2 marks)

4. Briefly explain classification of operating system by human computer interface. (3 marks)

5. Differentiate the following:

i) Insert mode and typeover mode. (2 marks)

ii) Text alignment and identation. (2 marks)

6. a) Explain the functions of the following spreadsheet inbuilt functions.

i) SUM IF (1 mark)

ii) COUNT (1 mark)

b) Explain the term “What if analysis” as used in spreadsheet. (2 marks)

7. Controls in database can either be bound or unbound. Explain. (2 marks)

8. State three ways of moving round the page in a desktop publishing window. (3 marks)

9. Why is it difficult to detect and prevent computer crimes? Give four reasons. (2 marks)

10. Mrs. Jane decided to use electronic data processing method to analyze her data. Highlight four factors to

consider while choosing the method to use. (2 mark)

11. a) State two disadvantages of mesh topology. (1 mark)

b) Name two functions of network operating system. (1 mark)

12. a) Define the term artificial intelligence. (1 mark)

b) List four areas where artificial intelligence is applicable (2 marks)

13. a) Give four features of micro computers and ICT in future. (2 marks)

b) Name two advantages of automated manufacturing. (1 mark)

14. Highlight three types of job opportunities that are available in the field of computer software. (3 marks).

SECTION B: (60 MARKS)

Answer question 16 is compulsory and any other three questions from this section.

15. Study the flowchart below and answer the questions that follow:

49

i) Develop a pseudocode for the above flowchart. (7 marks)

ii) List all the outputs from the flowchart. (6 marks)

iii) Name the control structure used. (2 marks)

16. a) Define the term simulation. (1 mark)

b) Highlight four areas where simulation is applicable. (2 marks)

c) Give four disadvantages of a good system analyst. (2 marks)

d) Name four qualities of a good system analyst. (2 marks)

e) What do you understand by the term Artificial Neural Network? (2 marks)

f) Give two features of neural networks. (2 marks)

g) Explain the following conditions

i) Computer Vision Syndrome (CVS) (2 marks)

ii) Repetitive Stress Injury (RSI) (2 marks)

17. a) Briefly explain the following terms as used in networking. (2 mark)

i) Distributed processing. (2 marks)

ii) Remote communication. (2 marks)

b) Many people today prefer use of cell phones instead of fixed lines. List four advantages of cell

phones. (2 mark)50

c) Distinguish between logical and physical network topology. (2 marks)

d) A school decided to replace its administration system. The current system had restricted reporting

facilities. The school is considering using parallel running and direct changeover.

i) Explain the terms parallel running and direct changeover. (2 marks)

ii) Give four disadvantages of direct changeover. (2 marks)

e) Name three tasks carried out during system implementation. (3 marks)

18. a) Give and explain two computational errors committed during data processing. (2 mark)

b) Highlight four ways of minimizing threats to data integrity. (2 marks)

c) Name three risks associated with distributed data processing system. (3 marks)

d) Differentiate between logical and physical computer files. (2 marks)

e) Give two advantages of compiling a program rather than interpreting it. (2 marks)

f) Highlight four errors detecting methods used in program development. (2 marks)

g) Give four benefits of structural programming. (2 marks)

19. a) Internet connects millions of computers and telecommunication devices that have different software

and hardware configurations.

i) Explain how these devices work together. (2 marks)

ii) Name four telecommunication devices used. (2 marks)

b) Outline four ways of preventing piracy with regard to data and information. (2 marks)

c) Perform the following operations.

i) 7ABEX to denary. (2 marks)

i) 3710 – 1310 using two’s compliment giving your answer to 8 binary digit. (3 marks)

d) List and explain the three parts of the window taskbar. (3 marks)

e) Give two reasons why the hard disk may be partitioned. (1 mark)

NANDI CENTRAL DISTRICT JOINT EVALUATION TEST - 2010SECTION A (40 Marks)

Answer ALL the questions in this section.

1. (a) Distinguish between Optical scanners and Magnetic ink scanners. (2marks)

(b) The automated input technique where keying of input data is originated is sometimes referred to as:

(½ mark)

2. (a) Explain the difference between digital signal and analog signal in data communication. (2marks)

51

(b) Give two ways in which computers are used in communication industry. (2marks)

3. (a) Name two special purpose memories found either inside or outside the microprocessor.

(2marks)

(b) Distinguish between an accumulator and an address register. (2marks)

4. (a) Define the following terms as used in disk management.

(i) Formatting: (1mark)

(ii) Partitioning (1mark)

(iii) Compressing (1mark)

(iv) Defragmenting. (1 mark)

(b) Distinguish between multi-tasking and multi-user operating system. (2marks)

5. (a) Give two importance of internet. (2marks)

(b) Explain the following terms as they are used in internet.

(i) Sign in (1mark)

(ii) Surf (1mark)

(iii) Downloading (l mark)

6. (a) Define desktop publishing. (1mark)

(b) Explain one purpose of desktop publishing. (1mark)

7. (a) Differentiate between Source program and Object code in programming. (2marks)

(b) State the stages of program development in their logical sequence. (3marks)

8. Covert 1268 to Hexadecimal equivalent. (l mark)

9. Explain one paragraph formatting features. (1mark)

10. (a) What is an Information system? (1mark)

(b) Give two roles of information manager. (2marks)

11. Explain the following database models. (2marks)

52

(i) Hierarchical model

(ii) Relational model.

12. Give one advantage of an electronic spreadsheet over traditional analysis ledger sheet. (1 mark)

13. Define the term data security. (1mark)

14. Explain one type of transcription error in data processing. (1mark)

15. Outline three stages of data collection. (½marks)

SECTION B (60 Marks)

Answer question 16 and any other three questions in this section.

16. Chemweno deposits 8500 shillings in a microfinance company at an interest rate of 15% per annum. At the

end of each year, the interest earned is added to the deposit and the new amount becomes the deposit of

that year.

(a) Write an algorithm for a program that would track the growth of the deposits over a period of five

years. (6marks)

(b) Draw a flowchart for the above algorithms. (7marks)

(c) List four Selection Controls used in writing a program. (2marks)

17. (a) Define the term ‘Data integrity’ (2marks)

(b) Give three ways in which one would curb threat to data integrity. (3marks)

(c) Explain the following electronic data processing modes giving relevant examples Where they are

used.

(i) Real time processing. (2mark)

(ii) Distributed data processing. (2mark)

(d) Give three components of a computer based information system. (3marks)

(e) Computer hardware is categorized according to the types of operations it performs. List three

operations. (3marks)

18. Study the diagram below and answer the questions that follow.

53

(a) (i) Name the above cable as used in data communication media. (1mark)

(ii) Name the parts labeled A, B, C and D (4marks)

A: ………………………………………………………………………………………...…...

B: ……………………………………………………………...……………………………...

C: ………………………………………………………………………...……………………

D: ……………………………………………………………………...………………………

(iii) Highlight any three advantages of the above cable. (3marks)

(b) (i) What is an Uninterruptible Power Supply (UPS). (2mark)

(ii) Explain two functions of UPS. (2marks)

(c) (i) Give two advantages of sound output devices. (2marks)

(ii) Why are CD-ROM and CD-R referred to as WORM? (1mark)

19. Information and Communication Technology is relatively a new area of study which is advancing. Due to this

reason, everyone is expected to keep abreast with the changing trend of Information and Communication

Technology (ICT).

(a) (i) Explain how ICT has affected employment. (3marks)

(ii) Explain two health problems that have resulted from prolonged use of computers.

(4marks)

(b) (i) What is artificial neural network? (2marks)

(ii) Give two features (attributes) of neural networks. (2marks)

(c) Explain characteristics of a system.

(i) Holistic thinking. (2marks)

54

(ii) System entropy. (2marks)

20. (a) (i) Distinguish between a system analyst and a programmer. (2marks)

(ii) List two types of job opportunities that are available in the field of computer

hardware. (2marks)

(b) Highlight any two factors you would consider before enrolling for an ICT course in a college.

(2marks)

(c) Give two disadvantages of observation when used in fact finding. (2marks)

(d) Explain the following changeover strategies.

(i) Parallel changeover. (2marks)

(ii) Phased changeover. (2marks)

(e) Explain briefly each of the following in data security.

(i) Firewalls. (1mark)

(ii) Data encryption. (l mark)

(iii) Sabotage. (1mark)

NYAMIRA NORTH DISTRICT JOINT EVALUATION TESTSECTION A (40MARKS)

Answer all questions

1. What is disk formatting? (1mk)

2. Describe the computer booting process. (2mks)

3. Explain why the following, controls should be implemented for computer based systems

(i) Back ups (1mk)

(ii) Passwords (1mk)

4. What is meant by the term dry running as used in program development? (2mks)

5. How is point of sale terminal used in a business organization. (2mks)

6. (a) Define authenticity as used in software selection. (1mk)

(b) Explain two ways of acquiring software in an organization. (2mks)55

7. (a) Differentiate between truncation and transposition error. (2mks)

(b) State four ways in which data may lose integrity. (2mks)

8. Explain data series and legend as used in spreadsheet charts. (2mks)

(i) Data series

(ii) Legend

9. (a) State the function of each of the following

(i) Network Interface Card (1mk)

(ii) Network protocol (1mk)

(b) Differentiate between a hub and a switch. (2mks)

10. Distinguish between job replacement and displacement. (2mks)

11. Using two’s complements, subtract 4 from 7 in 8-bit and express your answer in decimal form.

(3mks)

12. State three ways in which complements are used in hospitals (3mks)

13. Name two responsibilities that are carried out by a web designer. (2mks)

14. (a) Suggest on how computers may be made more user friendly for persons that are (2mks)

(i) Blind

(ii) Without hands

(b) Explain three types of computer motherboard buses (3mks)

15. Name two circumstances in which it is better to use a questionnaire than an interview for gathering

information. (3mks)

SECTION B (60 MARKS)

Answer question 16 and any other three questions from this section.

16. Kenya women finance trust KWFT pays 10% interest in shares exceeding 150,000 shillings and 4% on

shares that do not meet this target. However no interest is paid on deposits in the members (KWFT) bank

account.

(a) Design a pseudo code for a program that would

56

(i) Prompt the user for shares and deposits of a particular member.

(ii) Calculate the interest and total savings

(iii) Display the interest and total savings

(iv) Display the interest and total savings in the screen for a particular member of the trust

fund. (7mks)

(b) Draw a flowchart for the above pseudo code. (8mks)

7. (a) Distinguish between logical and physical computer files. (2mks)

(b) Define the term computer crime. (1mk)

(c) Explain three examples of computer crimes. (3mks)

(d) (i) An individual has a right to demand a guarantee to privacy of personal information

stored in a computer. Give two such types of information. (1mk)

(ii) Explain two precautions that have to be taken to prevent illegal access to a computer

based system. (2mks)

(e) Explain what is a search engine and give an example. (2mks)

(f) The Internet can be used as a source of information about emerging issues that may not be available in

printed media form. Give two advantages and two disadvantages of information obtained from the internet.

(4mks)

18. (a) Despite the introduction of the ATM cards, human resource is still necessary in banks. Give two reasons

why human beings are still needed. (2mks)

(b) State three advantages of the using the ATM card. (3mks)

(c) What is virtual reality. (2mks)

(d) List three areas where virtual reality is used. (3mks)

(e) What is GPS in air traffic control? (2mks)

(f) Outline three ways computers can be used to enhance marketing. (3mks)

19. (a) Explain the meaning of the following terms. (3mks)

(i) File

57

(ii) Folder

(iii) Storage media

(b) Outline any three factors you would consider when buying an operating system. (3mks)

(c) Explain the meaning of the following terms as used in disk management. (2mks)

(i) Defragmentation

(ii) Partittioning

(d) State two methods used to detect input errors (2mks)

(e) Explain the following concepts as used in telecommunication systems. (3mks)

(i) Attennatian

(ii) Bandwidth capacity

(iii) Repeater

(f) Give two advantages of using GUI over command line interface. (2mks)

20. (a) Explain any two areas where DTP software can be used. (4mks)

(i) Name four data types used in MS – access (2mks)

(b) A school wants to analyse its support staff personal details using Microsoft excel. The school has seven

employees. Tom, Wycliff, Oscar, Mary, Lilian, Robina and Anne. Their ages are 29, 32, 28, 33, 30, 27 and 30

years respectively.

Tom is a cook, Wycliff is the school bursar and Oscar is the school watchman. While Mary, Lilian,

Rubina and Anne are Librarian, secretary, typist and matron respectively. Tom, Mary and Robina are married

while the rest are single. Using appropriate headings construct a worksheet showing the above information.

(6mks)

(i) Write the formula you would use to find the worker who is the oldest of all. (2mks)

(c) What is a chart wizard as used in spread sheets. (1mk)

SIAYA DISTRICT JOINT EVALUATION TEST – 2010

SECTION A (40 marks)

1. Give an example of a

58

a) Pointing device

b) Voice input device

c) Device that reads data

(3 mks)

2. Distinguish between senal and sequential file organization method (2 mks)

3. Express 64 base 10 in BCD form (3 mks)

4. Differentiate between Job displacement from job Replacement (2 mks)

5 a) A better media can be used in electronically noisy environment. Which one (1 mk)

b) Explain the given answer in (a) 1 mk)

6. Why do we have a program design. Explain giving any two reasons (2 mks)

7. a) What is web design (1 mk)

b) Name any responsibility carried out by a web design (1 mk)

8. Why is it useful to use questionnaire than an interview (2 mks)

9. a) Describe E-Mail (2 mks)

b) List at least 3 advantages of E-mail (3 mks)

10. Differentiate between a database (DB) and a database management system (DBMS) (2 mks)

11. A worksheet contains the data below

Cell A1 A2 A3 C1 C2 C3 G1

Entry 5 7 10 10 15 15 SUM 1F (C1:C3, “<>10” a1:a3)

State the value displayed in G1 (3 mks)

12. What is pseudo code as in programming (2 mks)

13. List four Hardware required for video conferencing (4 mks)

14. State three factors that determine the amount of data to be stored on a disk (3 mks)

15. There are processing methods followed. List any three of them (3 mks)

SECTION B59

a) Write down the output that would be generated by the following program segment

NUM: = 1

Repeat

NUM: = NUM + 1

Write (NUM);

Until (NUM = 9);

(3 mks)

b) Write the output, if the statement NUM = ‘NUM + 1;)’ was changed to ‘NUM = NUM – 1;’

c) The following pseudo code processes data in an array A

Start

n = 3

For I = 2 to n do

x = A (i)

A [o] = x

j = I – 1

while A (j) >x dio

A [j+l] = /j/

J = j – 1

End while

A (j+1) = x

Print A (i), A (2) A (3)

Stop

i) What is the purpose of the above pseudo code (1 mk)

ii) Draw a flowchart of the above pseudo code (8 mks)

17. Despite ATM, Human resources is still necessary in banks.

60

a) Give any two reasons why human beings are still needed (2 mks)

b) State three advantages of the user of the card (3 mks)

c) What is virtual reality (2 mks)

d) List three areas where virtual reality is used (3 mks)

e) What is GPS in air traffic control (2 mks)

f) Outline three ways computers can be used to enhance marketing (3 mks)

18. Discuss the application of computers in the following areas

i) Research and scientific use (5 mks)

ii) Education system (5 mks)

iii) Entertainment system (5 mks)

19. Discuss the impact of computers on society today (15 mks)

20. a) Explain the relation between a record, file and field (3 mks)

b) Describe data processing cycle by use of a diagram. (8 mks)

c) State two similarities and differences between electronic and mechanical system of data processing

(4 mks)

TESO NORTH DISTRICT JOINT EVALUATION TEST – 2010SECTION B (60 MKS)

Answer ALL questions in this section.

1. List two types of computers that we can have if we classify them by function (l mk)

2. State four disadvantages of first generation computers (2mks)

3. Name any two types of input devices (1mk)

4. Give the name of CPU registers used to perform the following: 2mks)

a) Store the address of the next instruction to be executed.

b) Stores instructions currently being executed.

5. Differentiate between standard package software and user-developed software (2mks)

61

6. Programs and data can be lost through various means. Give two measures that can be taken to

avoid loss of data through unauthorized access. (2mks)

7. i) Define information processing (l mk)

ii) What is a parity bit as used in data representation (1mk)

8. Describe the following processing methods (2mks)

a) Online

b) Multiprocessing.

9. i) What is word processing? (lmk)

ii) Give 4 advantages of using an electronic word processor rather than using the traditional

typewriter. (4mks)

10. i) Define the term programming (2 mks)

ii) Describe the following categories of high level languages (4 mks)

a) Structured

b) Object oriented.

11. Explain any four factors that one would need to consider when selecting a printer (2 mks)

12. Name six hardware factors considered when selecting a computer system (3mks)

13. a) Convert the following octal number to its binary equivalent (2mks)

2478.

b) Subtract 110012 from 1111112.

14. Write Ms-DOS commands used to do the following functions. (4mks)

a) Rename a file

b) Delete a directory.

c) Label floppy disk.

d) Copy contents of one disk to another.

62

15. Write the acronym DBMS in full

SECTION B (60 MKS)

Answer Question 16 (Compulsory), and any other 3 questions in this section.

16. a) Draw a flowchart that will help to code in a high level language a program that would

receive any four numbers, find their sum and average and display them. (8mks)

b) List any three disadvantages of high level languages (3mks)

c) Give any four objectives that fourth generation languages were designed to meet. (4 mks)

17. a) Write brief notes on random filling method. (4mks)

b) State the elements of a computer file (3mks)

c) Explain four types of computer processing files (4mks)

d) Name the other three file organization methods other than random fie organization (3mks)

18. a) Define the following as used in programming (3mks)

i) Local Variable.

ii) Global Variable.

iii) Expression

b) i) Define Normalization (2mks)

ii) Mention 2 aims or uses of normalization (2mks)

c) State any four types of input devices (2mks)

d) What is a computer? (1mk)

e) What is a computer bus (l mk)

f) Differentiate between impact and non-impact printers (4 mks)

19. a) Define a computer network (l mk)

b) Apart from Metropolitan Area Network Explain 2 other types of Networks (2mks)

c) Explain 2 limitations of networking (2mks)

d) Briefly describe the stages of the system Development Life cycle (6 mks)

63

e) Distinguish between soft and hard systems (2mks)

f) Explain four characteristics of systems (2 mks)

20. a) One of the elements of networking includes Communication devices. Explain the

function of the following communication devices. (4mks)

i) Network Interface Card.

ii) Hub.

b) Explain how computes are applied in: (4mks)

i) Financial systems.

ii) Reservation systems.

c) Explain each one of the following bringing out the differences between them as applied to Impact of

ICT on Society. (6mks)

i) Job Creation.

ii) Job Replacement.

iii) Job displacement.

d) What is an expert system as concerns future trends in ICT. (1 mk)

64