Computer Studies
Computer Studies
E 2012 to 2015
COMPUTER STUDIES
1|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
INTRODUCTION TO COMPUTERS
- A computer is an electronic device that operates (works) under the control of programs
- An electronic device that accepts data, as input and transforms it under the influence of
a set of special instructions called programs, to produce the desired output (referred to
as information)
(i) Data
A collection of raw facts, figures or instructions that do not have much meaning
to the user
(ii) Program
be processed
2|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
It is the process of collecting all terms of data together & converting them into
information
(iv) Information
Data which has been refined summarized & manipulated in the way you want it, or
- Accepting data
- Producing information
4. Explain the following input/ output terms as used in computer systems. Give an example
for each
(a) Read - To transfer data from an input device to the computer, e.g. the computer
Storage
3|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Device e.g. the computer writes output on a printer or onto a disk.
4|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
-
5. State four different parts that make up a computer (2 mks)
- System unit
- Monitor
- Keyboard
- Mouse
- Printer
- Modem
- Scanner
- Speakers
- Graph plotters
This is the casing that houses the internal components of the computer such as the CPU
(b) List four devices located under the cover of the system unit
- Motherboard
5|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Main memory
- Hard disk
Disk drives
Battery
Buses
- Video card
- Expansion slots
(c) Give two differences between tower – style and desktop system units
- Tower style system unit is designed to stand alone or to be placed on the floor,
desktop units lie on the desk with the monitor placed on top
- Tower style units have more space for expansion than the typical desktop units
(2 mks)
6|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
-
- Produced a lot of heat
- The computers constantly broke down due to the excessive heat generated;
Very costly
(generations)
- The computers constantly broke down due to the excessive heat generated; hence were
7|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Very costly
- They consumed less power & produced less heat than the first generation computers
8|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
-
RAM memory capacity was 32 KB
- Could support remote communication facilities/ more than one user at the same
time
- Used large scale integrated (LSI) circuits & very large scale integrated (VLSl)
- Magnetic disks, bubble memories & optical disks were used for storage - The
9|Page “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
superconducting materials
- Use advanced hard disks and optical disks for storage, e.g. DVDs
- Power
10. State the differences between desktop computers and laptop computers
10 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
-
- A laptop is small & portable; desktop computers are not portable
size
PCs are becoming small and portable, e.g. personal Digital Assistant (PDA).
(b) Give two reasons why smaller computers like Laptops tend to be more
- They have advanced power management capabilities (they consume less power
12. Which category of computers would you place an N- series Nokia phone
- Microcomputer/ palmtop
- It has a keypad
11 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
-
- It is programmable
- Bathroom scale
- Thermometer
12 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
-
Speedometer
- Robots
- An automatic pilot
- A word processor
15. State a specific example where each of the following types of computers can be used
(a) Supercomputer
- Weather forecasting
- Petroleum research
13 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Airports (i.e., in Airline reservation systems for booking & storing flight information)
- Space industry
14 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Type of processor
- Processing speed
- Number of users who can access the computers at the same time
17. Explain four reasons which make microcomputers suitable for personal computing work
- Reduced cost, i.e. are cheaper than the minicomputers & mainframe computers
- Are more reliable in doing various functions than the early mainframe computers
15 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
18. (a) Identify and explain five areas where computers are used to process data ( 10 mks)
Supermarkets
- For stock control i.e. records of what is in store, what has been sold, and what is out of
stock
16 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Banks
- Manage financial transactions through the use of special cash dispensing machines
- Processing of cheques
Homes
Industries
- For management control, i.e. to keep track of elders, bills and transactions
Police stations
17 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- For taking photographs & other identification details
- For face recognition, scene monitoring & analysis which help the police carry out
Transport industry
- Airports; to control the movement of aircrafts, their take off & landing using radar
equipment
communication
Offices
- Production of documents
- Keeping of records
18 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Requires less space for storage
installation of computers, and provide a safe conducive environment for teaching &
(b) Give two factors to be considered when preparing a computer laboratory (2 mks)
- Security of computers
21. List down three safety precautions one should observe when entering a computer
laboratory (3 mks)
19 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Avoid unnecessary movements as you may accidentally knock the peripheral devices
- collect any waste papers which might be lying in the computer room & put them into
the dustbin
22. Describe the ideal environment for a computer to work properly (3 mks)
23. Explain why smoke and Dust particles are harmful to a computer
- Dust and smoke particles settle on storage devices and may scratch them during read/
write operation
24. Identify three facilities that will ensure proper ventilation in a room
- Installing fans
20 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
25. Why must foods and beverages be kept out of the computer room?
- Food particles may fall into the moving parts of the computer and damage them.
Liquids may spill into the computer parts causing rusting or electrical faults
26. Why would it not be good to install Powder or Water – based fire extinguishers in the
computer room?
- Powder particles settle on storage devices and may scratch them during read/ write
operation
27. (a) State one reason why a computer needs to be connected to a stable power supply
(1 mk)
- Prevent loss of data/ information that had not been saved before the failure
(b) List down four functions of the uninterruptible Power Supply (UPS) (4 mks)
21 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- It supplies power to the Computer during blackouts and brownouts
- Allows the user to save his/ her work, and switch off the system using the correct
procedure
28. Mention two things that are likely to cause strain- in the computer room
- Bright monitors
- Flickering monitors
29. Identify three proper sitting postures while using the computer
- Adopt relaxed and straight back position to avoid bending forward or learning far
backwards
- The seat must be high enough allowing the eyes to be the same level with the top of the
Screen
- The seat must have a straight backrest that allows someone to sit upright. This prevents
- The height of the chair or working surface must be high enough such that your
forearms
are parallel with the floor and your wrists are straight.
- The seat must be high enough relative to the table to enable the user use the hands on
22 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
30. State two methods of minimizing dust in a computer laboratory
- Fit the computer room with special curtains to reduce entry of dust particles
- Cover the computer devices with dust covers when cleaning the room
31. Name two main causes of fire in the computer laboratory and give the precautions that
- Ensure that the computer room has a gaseous fire extinguisher containing carbon
- Smocking
- To prevent mixing diskettes that are used everyday with those used for long- term
23 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
33. List three things that can spoil a printer if they are not of the correct specification, and
(i) Printer Paper: Different printers have different sensitivity to printing papers. Using the
wrong quality paper in a particular printer can make the paper get stuck
(ii) Cartridges & Ribbons: Printers are very specific to manufacture’s cartridges & ribbons
Use of clones or imitations ( i.e., the wrong make & model) can damage the printer mechanism (iii)
Refilling of cartridges or re- inking of ribbons: It can spoil the printer due to leakage or use of
34. Explain three ways that computer technology could make office more efficient (3 mks)
- There is easier & faster retrieval of data, i.e. they reduce the time and effort needed to
35. (a) Explain the steps you would follow to set up a new computer
- Gently and carefully connect the interface cable of each device to the correct port and
to the device.
24 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Observe boot up information on the screen to see whether Power-On Self Test (POST)
displays any error message. A successful boot means that the computer was properly
setup.
(b) Outline three reasons why it is important to first shut down the computer before
turning it off
36. A computer must go through the process of booting/ initialization before use
Booting refers to the starting up of a computer. It is the entire process that makes the
(b) Explain what happens in the computer during the booting process
When the power is switched on, internally, it first checks whether all the components
are in good working condition, i.e. the RAM, CMOS (BIOS), hard disk & floppy disk
drive controllers, and the keyboard. If no problem is found, it then loads the operating
systems
25 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(i) Cold booting:
It happens when a computer which was originally off is switched on by pressing the
The Computer starts by checking all its components to determine whether they are
functioning properly
This happens when a computer that was originally on is forced to restart by pressing the
restart button on the system unit by pressing a combination of keys on the keyboard
(d) What type of memory is used to store the boot up program (the first program to be
An input device that lets the user enter commands into the computer for execution by
typing
(b) List four types of keys found on a computer keyboard, giving an example of each
( 4 mks)
26 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Alphanumeric Keys (A-Z, 0-9)
- Special PC keys (Ctrl, Shift, Alt, Ins, Enter, Spacebar, Caps lock, Num
lock, etc)
(c) Name the keyboard keys that will help you: (2 mks)
27 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
COMPUTER SYSTEMS
(i) System
goal
A collection of entities that work together to process and manage information using
computers
A collection of hardware software and live- ware all working together in data
inputting, processing and production of required output from a computer
3. (a) List and explain three functional elements of a computer system ( 6 mks)
Hardware
They are the physical & tangible devices that make up a computer systems, e.g system
28 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Software
These are programs & data used in a computer system that enable it perform a number
These are the people who coordinate the various activities which are necessary to make
a computer system perform useful tasks e.g. data entry clerks, computer operators,
(b) Draw a well – labeled diagram showing the functional units of computer hardware
29 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Accepts data & instructions from the user and sends them into the CPU. V
- Converts data into a form that the computer can understand (i.e., machine-
Sensible/readable form)
30 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(ii). Keying device. -
Keyboard, -
Keypad.
- Mouse.
- Trackball.
- Light pen
- Joystick.
- Microphone.
- Plotter.
- It is a faster input device because it involves just pointing on the screen and selecting
options.
31 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Can be used to draw images on the screen.
These are devices that enter (capture) data into the computer directly.
superstores.
Barcode reader
8. Mr. Otieno a French teacher used speech method to store students oral answers to an
(b) State two advantages and two disadvantages of using this method of data input
(4 mks)
Advantages
32 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Its suitable for people with special needs especially those with impaired hands - Can
Disadvantages
- Voice input does not take care speech related problems such as accents, tone etc
- Most speech input devices can recognize a limited, standard vocabulary of spoken
- For people with special needs or disabilities (e.g. the handicapped especially those with
impaired hands.
- Emergency situations
33 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- For house/ office or car security where voice activated locks are used for access control
9. Name two examples of scanning (data capture) devices used at point of scale terminals in
supermarkets
- Barcode reader
- Light pen
- Cash registers
These are documents produced as output and which can be re-used as input by the computer
(b) Name any two data capture techniques that make use of turnaround documents
( 2 mks)
11. List five factors one would consider when selecting a data input device (4 mks)
34 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Volume of data to be entered
- Input speed
- Cost, i.e. the initial cost of the input device & cost of using the device on a day – to – day
basis.
- Accuracy required
- Availability of space
(ii) System control- it controls the sequence of operations within the computer
(iv) It controls the use of the Main Memory in storing of data & instructions
(v) Storage of data- It provides temporary storage (RAM) & permanent storage (ROM)
13. Explain the functions performed by each of the following central processing unit elements
(i) Control Unit ( 2 mks)
- Interpreting instructions
35 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(iii) Registers
- Holds data and instructions temporarily just before and after processing
14. In reference to ALU, explain the meaning of logic operations and give an example of this
processing operation
Logic operation is the ability to compare two quantities or numbers to determine which
is greater than, less than, equal to, or not equal to the other.
36 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
It also involves the testing for existing of a condition encountered during the processing
- Accumulator
- Instruction
- Address register
- Storage register
16. (a) Name the basic unit used to measure the processing speed of a computer ( 1 mk)
Hertz (Hz)
(b) A computer processor speed is measured in Hertz. What fraction of a second is the
following?
(i) 1. Nanosecond
1 1__________
(ii) 1. Microsecond
1 = 1________
37 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
1 x 106 1,000,000 seconds
17. (a) What is a computer bus? ( 1 mk)
A communication path/ medium within the computer that connects the basic computer
components. It allows different elements or sections of the computer to communicate with
each other.
A parallel collection of conditions that carry data & control signals from one element to
another
(b) State the functions of each of the following computer bus ( 3 mks)
Data bus- carries data from the processor to memory during the write operations and from
memory to the processor during the read operations
Address bus- it conveys addresses, i.e it carries the address of the memory location or
device to be acted on by the processor
Control bus- it carries the timing & control signals necessary to coordinate the activities of
the entire system
This is the electronic board where all electronic components such as processor, memory chips,
38 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Processor (CPU)
- SIMM/DDR sockets
- Memory chips
- BIOS
- Interface chips
- Buses
A drive is a computer device for reading data from or writing data into a storage media,
(b) State any two types of computer drives, giving an example of a storage device used by
each ( 3 mks)
20. (a) Give two reasons why there are many forms of computer storage devices ( 2 mks)
- Permanency of storage
39 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Cost of implication
- Magnetic tape
- Floppy disk
- Cassette tapes
- Hard disk
- Zip disks
- Jazz disks
- Flash disks
- Punched cards
- Optical discs (e.g., Compact Disks LS- 120 super disks, optical card, optical tape)
Primary storage devices are accessed directly by the CPU, while secondary storage is
not
Fixed disks are mounted inside the computer system unit, e.g. Hard disk.
Removable disks are not hosed inside the system unit & are portable, e.g. floppy disk,
40 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Jazz disk, Zip disk, flash disk, CD- R, CD – RW, DVD
the computer
High capacity disk that resembles a floppy disk, but is slightly larger and thicker in size
23. (a) Compare a floppy disk and zip disk in relation to size ( 2 mks)
A floppy disk is physically small in size and capacity, while a zip disk is slightly large
- Not reliable
41 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
24. (a) State three advantages of using hard disks as medium of storage
- Are very fast compared to other secondary storage devices in terms of data transfer
(b) Describe three precautions you would take to avoid damaging the hard disk ( 3mks)
(c) Describe the structure of a hard disk in reference to cylinders, tracks and sectors The surface
of hard disk is divided into circles called Tracks. Parallel tracks on several platters are
called cylinders
The tracks are further subdivided into sectors. Several sectors can be grouped to form
clusters.
25. State two reasons why Magnetic tapes are not commonly used as computer data storage
medium today
- Are slow when retrieving data. This is because of the linear storage of data o the
tape.
- Do not fully use their recording surface due to inter- record Gaps
42 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
RAM is a temporary and rewritable memory, while ROM is a permanent and read only
memory.
Hard disk is a hard metallic platter used to store data and is encased in a metallic
housing (casing)
43 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
In magnetic storage media, data is recorded using magnesium, while in optical storage
Hardcopy is printed copy, e.g. printout on paper such as letters while softcopy is
MICR uses magnetic technology to read magnetic characters, while OCR uses laser/
- Keep magnetic away from excessive heat. This is because heat energy weakens the
- Store the media in their cases when not in use in order to protect/ safeguard their
recording surfaces against environmental influences such as dust, touch, direct sunlight,
radiations, etc
- Never bring them near moving or strong magnetic bodies. Such bodies might
- When mounting the media into its reading/ writing unit, avoid brushing the recording
44 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Put on the power before mounting the media and off after removing the media from the
drive.
28. (a) Calculate the capacity in MB of a two sided floppy disk with 6 sectors per surface,
= 12 sectors
1,000,000 bytes 1 MB
6,144
1,000,000 = 0.006144 MB
(b) A double – sided disk contains 40 tracks on each side. The tracks are divided into 9
sectors of 512 bytes each. What is the total capacity of the disk in megabytes? ( 2mks)
45 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
368, 640
1,048, 576
= 0.352 MB
29. By giving examples, differentiate between primary and Secondary Computer storage
( 3 mks)
46 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
1. Used for holding data & instructions 1. Used for storing backup information
CPU.
2. It is accessed directly by the CPU
storage
47 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
It stores Firmware (bootstrap instructions) - the essential files the computer uses while
booting/ starting up.
48 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
It stores the system data & instructions that are necessary for the normal functioning of
the computer hardware e.g. the Kernel / supervisor of the OS
It stores translation programs (code converters) used for converting a user’s program
into machine language
It stores instructions used in special – purpose computers & computerized fuel pumps
It can only be read, but cannot be written to (i.e., the user can only read the information
in the ROM, but cannot write on it unless it is a special type of ROM).
Provides permanent or semi permanent storage of instructions & data from the
manufacturer.
Forms a small proportion of the main storage ( i.e. it contributes 30% of the internal
Memory).
49 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(c) Name two different types of ROM
- Masked ROM
- Stores data & programs temporarily during the times when they are needed in the Main
- Provides “read & write facilities” i.e. it allows instructions to be written, read out & to
be changed at will.
- The contents in RAM are user – defined, i.e. the user dictates what is to be contained in
the RAM
- It is a volatile memory
(b) Name the two types of RAM clearly starting their differences (3 mks)
50 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A static RAM can retain its data/ content as long as power is provided to the memory
- Dynamic RAM can only hold its content for a short while even when power is on.
Therefore, in order to maintain its content/ data, a DRAM must undergo the refreshing
SRAM chips are physically large & much more expensive than DRAM chips
- Dynamic RAM has a much higher packing density than SRAM, i.e., a DRAM chip is
able to store more information than a SRAM chip of the same size.
Flash Disk
-
51 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(ii) List down two advantages of this device over a floppy disk in storage ( 2 mks)
- Optical card
- Optical tape
(b) Give two advantages of a digital Versatile Disk over a normal Compact disk
- Softcopy
52 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Hardcopy
- Monitors
- Printers
- Plotters
- Sound cards
- Digital projectors
Storage devices
53 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Convert the coded results produced by the computer to human- readable form
- Used to display the results of all the data that has been processed from the computer - It
converts machine- coded outputs results from the processor into a form that can be understood
by people
(b) Show two differences between a CRT monitor and a flat- panel display
- CRT monitor uses a cathode ray tube to display information, while a flat panel does
not.
- Flat panel displays are light & easily portable, while CRT’s are heavy
- CRT can display a wide range of colours, while a flat panel displays a limited number
of colours
- The screen of a flat panel is much thinner & smaller than that of a CRT
54 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- The screen resolution of a CRT is adjustable, while that of a flat panel is often set
(c) Give there examples of flat- panel monitors available in the market today
- Gas plasma
Pixels (picture elements) are dots on the screen that form characters and images
(c) Give two advantages of the higher number of pixels per square centimeter (2 mks)
Are usually low- speed printers that print one character at a time?
55 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(b) Give two examples of character printers
Dot matrix
Thermal
- Daisy wheel
- Inkjet
- Golf ball
38. Distinguish between impact and non impact printers and give two examples of each
Impact printers print by striking mechanism & are noisy, e.g Dot matrix, Daisy wheel, and
Non- impact printers print either by laser, ink or thermal transfer mechanism & are
A page printer prints documents page by page, while a line printer prints documents
line by line
56 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Produces high quality of printouts
- Economical in maintenance
- It is very silent
40. Highlight four factors one should consider when purchasing a printer (4 mks)
- Cost involved i.e. the printer’s buying price, cost of maintenance & cost of consumable
- Capability of the selected printer, i.e. multiple copy production, paper size, etc
57 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Environment in which the printer will operate
- Ease of maintenance
Documentation
- Availability
- Produces large graphical designs of high quality, which are east to read & use
- Can print on large sized papers, e.g. papers e.g. Al, Which a normal printer cannot
- One can receive the output even when a few meters away from the computer
58 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Errors are easily corrected, e.g. if used in a camera, one know when the film or
43. George connected new multimedia speakers to his computer and tried to play his favorite
music CD, but no sound came out. Suggest two problems that might have occurred ( 2
mks)
59 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Speakers not powered
- Lack of analogue cable connecting the optical drive to the motherboard or sound
(a) Port
A special kind of socket found at the back of a computer used to connect an external
peripheral device such as a printer, monitor, mouse, scanner, modem, flash disk, etc to
These are special cables that connect all the peripheral devices to the motherboard and
the CPU. They transmit data signals and information to and from the devices
60 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
46. State the function of the power supply unit found in the system unit (1 mk)
- It supplies stable power to the motherboard and other internal devices of a computer
- Converts the potentially dangerous alternating current (AC) into a steady low- voltage
47. (a) Name any two peripheral devices which get their power supply through ports
- Keyboard
- Mouse
(b) State the type of port that would commonly be used to connect the following devices
48. (a) Explain two differences between serial and parallel communication ports of a
computer
- Serial ports have 9 pins, while parallel ports have holes for 9 or 25 pins
- Parallel cables transmit several bits of data simultaneously, while serial cables transmit
61 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
One bit at a time
- Serial cables are slower than parallel cable
- Serial cables allow for 2 ways communication (i.e. communication to and from the
computer and the device connected to it) while parallel cables usually offer 1- way
communication.
(b) Give two major advantages of a USB interface cable over other cables in the computer
- The USB port can be used to connect a wide range of peripheral devices due to its
49. Outline three precautions one should take when assembling a computer
- Disconnect all diverts from the power source before starting to work on them
- Never work alone because you may need help in ease of energy
- Discharge ant static electricity that might have built up on the hands by touching an
50. State six factors which you would consider when selecting computer hardware for an
organization
62 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Storage capacity of hard disk & RAM memory size
- User needs
- Multimedia capability
51. List down any four hardware components you can add or upgrade in a computer system
(4 mks)
- Processor (CPU)
- Hard disk
- RAM memory
- Expansion slots
A warranty is an agreement between the buyer and the seller that spells out terms and
63 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A warranty is usually the duration in which your computer is supposed to work without any
problem.
signing it?
In order to negotiate on sensitive items like duration, after sales services etc.
- How comprehensive is the warranty- good warranty should cover all the parts of the
Computer.
- Liability agreement e.g. how long should the supplier take to repair a fault or replace
the product, and if he/ she delays, who bears the cost.
53. What are clones with reference to computers and what is their disadvantage? -
Disadvantages
- They are not as reliable as their brand names like IBM, Compaq, Hewlett Packard (HP),
64 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Dell, Gateway etc.
These are programs developed, packaged and then made available for purchase either
(b) Small and large scale organizers are turning to the use of in- house developed
software for the processing activities rather than use of standard software
These are programs that are uniquely designed & written by the user or a software
house under contract, to meet the specific needs of a particular user or organization.
They are usually customized (tailored) to perform a specific job or solve only specific
(ii) Give two reasons that may be influencing these organizations for such a decision
( 2 mks)
- The user gets well tested program, which he/ she is able to use with confidence
65 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- The program provides all the facilities required to solve a particular problem
- The purchaser has direct control over the package, as he/ she is involved in its
Production
- The user is able to quickly implement the results obtained from the use of the
package
- They can easily be modified to meet specific user’s needs without involving expert
programmers.
- Single – purpose software is developed for only one purpose, while integrated software is a
suite of more than one program and can be used to carry out a variety of tasks
(i) Authenticity
It is the genuineness, validity or legitimacy of software. The copy of the software you
developer.
(ii) Portability
It refers to whether a program can be copied or installed in more than one computer
In hardware, the computer device should be sufficiently small & light to carry
In software, portability refers to whether a program can be copied from one computer
66 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
58. (a) Explain why documentation is necessary for any software package
It contains details on how to install use and maintain the software. It also shows the
purchaser how the program can be used to solve particular problem as well as provide
(b) A firm intends to purchase new software. List three items of documentation that
- A license
- Installation guide
- Reference manual
- Warranty
- Upgrades
- Service pack
67 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
OPERATING SYSTEMS
1. The central processor and peripheral devices of a computer system are coordinated
A set of computer programs that normally reside in the main memory and used to
control the basic computer hardware resources & the operation of the entire system
The main program that controls the execution of user applications, and enables the user
to access the hardware & software resources of the computer
- Processor
- Memory (RAM)
- Communication devices
- Files
(c) There are several types of operating systems in use today. State two examples of
- Windows
68 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- MacOS
- Unix
- Linux
2. Name the two latest operating systems from Microsoft corporation ( 2 mks)
- Windows XP
- Windows Vista
- Loads application programs from an external storage into the available locations in the
- It keeps track (monitors) of the parts of the memory that are in use, and those which are
free
The processor can only execute one program at any one time. Therefore, in a multi-
tasking system access to the CPU must be carefully control & monitored. The OS must
decide, which program will be allowed into the system, and for how long
(iii) Job scheduling- it schedules & loads programs in order to provide a continuous
sequence of processing. This is necessary when more than one application program is
69 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(iv) Error reporting and interrupt handling- The OS reports any errors that occur during
program execution.
processing is done according to the job priorities allocated and in a continuous process
until all the jobs in the queue within the memory are executed. This ensures that the
The OS controls the allocation of I/O devices and tries to resolve any conflicts that
arise. It also monitors the state of each I/O device and signals any faults detected
OS is concerned with the logical organization of the files in the computer & provides
It also provides a means of protecting the data files & programs against unauthorized
(viii) It controls the selection & operation of the hardware devices used for input, output &
storage
(ix) It interfaces the user to the system’s hardware, i.e. it provides a quick means of
70 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
The OS keeps records (internal logs) on how the computer resources (e.g. CPU time,
It also keeps a complete record of all what happens during processing (usually in the
4. What is an interrupt?
An interrupt is break from the normal sequential flow of instructions processing in a
program
6. Giving an example in each case, explain the following types of operating systems
A system that allows only one user to run one user program at a time in an interactive,
71 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A multi- user computer system can allow interactive facilities to several at a time. A
Multi- tasking Computer system can allow more than one program which are in the
7. A computer user may interact with a computer either through Graphical User
(a) Give one advantage of using GUI based operating system over a command line interface
( 1 mk)
User friendliness
Easy to learn & use even by those who do not have much knowledge about them
It is faster to work with than a command line interface as it only relies on clicking the
icons by use of a pointing device
(b) Some computer systems still use command line interfaces. State two advantages of
- There is security of data as only those who know how to use the commands will access
it.
72 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
8. What is a deadlock in reference to operating systems?
- It is a situation in an OS when a particular task holds a needed resource and refuses to release
(a) Desktop
Desktop is mostly an empty screen that appears when windows starts and has some
standard icons that show that the computer is ready for use.
(b) Window
A rectangular area on a computer screen in which text, graphical images or the contents
(c) Icon
A little picture on the computer screen representing a program, disk file folder or any
other item
(e) Taskbar
73 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A long bar/ strip that runs across the desktop and displays the start button and any other
active tasks.
(f) Task
Any activity taking place in windows and is displayed on the taskbar, e.g. running
program (3 mks)
11. State two differences between Disk Operating System (DOS) and Windows operating
system ( 2 mks)
DOS Windows
12. Identify three factors you would consider when choosing an operating system for use
74 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
in a computer ( 3 mks)
(i) Hardware configuration of the computer, e.g. RAM memory size, Hard disk capacity,
(iv) User (type of work to be done), i.e. the applications intended for the computer
(v) User friendliness or human computer interface, i.e. it is command line based, Menu
(vi) Availability in the Markey, e.g. Microsoft Windows based operating systems are very
common
(vii) Portability
(x) The method of communicating with the computer, e.g. the number of peripherals (xi)
13. Explain how windows organizes information in reference to files and folders
It stores related data & information records into files, and related files into folders &
subfolders
75 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
14. (a) Distinguish between systems files and application files ( 2 mks)
System files hold critical system information while application files hold programs data
(b) State the extensions used signifying the following file types (2 mks)
15. (a) List and explain down the three parts of the windows Taskbar ( 3 mks)
System tray - displays icons of applications that automatically start and run in the
background
(b) Outline the procedure of renaming a file or folder using windows operating system
(3 mks)
Method 1:
76 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Method 2:
In an explorer window, right- click the file/ folder you want to rename
List box – a box that contains a list of options, one of which is selected
Checkbox- a small, square box that can be selected or cleared. It appears with an option
that you can turn on or off. When the checkbox is selected, a selected, a checkbox (
Radio button – a round button that can either be blank or can contain a dot. If the
button contains a dot, it is selected.
Pull down menu – A box with a downward – pointing triangular button at its right end
Command button- A button that can click to carry out or cancel the selected action. E.g.
77 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
17. (a) Define ‘ folder/ directive tree’
Directory tree is the hierarchical arrangement of folders and storage locations from the root
downwards.
- A:\
- C:\
- D:\
- E:\
- Used to store files that are not required currently until they are needed again
- Used to store the files of one program separately from the files of another program - It
allows each user to keep his/ her files separately, even if all the users are using the same
systems.
18. The Hierarchical system represented below shows how a school organizes its files.
78 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
The F2 directory has the files: classlist.doc, Districts.xls, and the tribe.mdb. Write down the
A:\SCHOOL\EXAMS\F2\Districts.xls (2 mks)
It means making of duplicate copies of data or programs from the hard disk into storage
media so that in case the system fails, or originals are corrupted or lost, the data can be
(ii) Explain two methods you can use in windows to back up data into a storage device
(2 mks)
- Using the backup facility to compress the data into another disk
(b) Identify two reasons why a user needs to know the space available for data storage in the
hard disk
- To know the amount of data that can be stored in the hard disk
79 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- To know how much space is left in the hard disk in case a new programs needs to be
installed
20. Name the command one would use to repair cross- linked files in graphical user
Scandisk
21. (a) Explain the team Disk Defragmenter, and give two advantages of this feature ( 3 mks)
Disk defragmenter is a tool that is used to re- arrange scattered files & folders on a
storage media
Advantages
- Reduces the time by the read / write head to locate files or folders on the storage media
This speed up access to files & folders, hence, makes files to open more quickly
- Consolidates related data close to each other, hence, frees space on the storage media
Compressing is creating more space on a disk by squeezing disk contents (files) into a
Defragmenting is rearranging scattered related files/ folders closer to each other on the
22. Give two reasons why a new disk must be formatted before using it (2 mks)
80 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- To prepare a new disk so that files can be stored on it
- To create/ prepare a new root directory and file allocation tables on the disk
- To remove/ delete any existing files or information stored on the disk, if it is no longer
needed
- To determine the effective storage capacity of the disk, i.e. formatting enables the user
It is the process of dividing a large physical disk into 2 or more partitions/ volume
(b) Give two reasons why the hard disk may be partitioned
still be working.
The printer is not responding to the print command. Explain three possible causes for the
anomaly. (3 marks)
- The printer may not have been set as the default printer.
81 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- The data interface cable to the printer could be loose. Make sure it is firm at the ports. -
The printer could still be off. Switch it on, and it will start printing.
- The wrong printer could have been selected. Select the right printer in the print dialog
- Can be used to restore files & folders accidentally deleted from the computer.
WORD PROCESSING
A computer program that enables a person to create, retrieve, edit, format, and print text
based documents
b) List two common examples of word processing software widely used in the market
today. (2 mks)
-Microsoft word
-WordPerfect
-Lotus WordPerfect
-WordStar
-WordPad
82 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2. Give three comparisons of the traditional method of typing a document on a
• Correcting typing mistakes using a word processor is easy; it is hard to correct mistakes
on a typewriter.
• Producing multiple copies of the same page is possible using a word processor, but it is
• Text formatting features are available on a word processor, e.g. front size, font type,
• The documents created can be stored in the computer for future reference
• Typing using a word processor is easier & more efficient because most of the actions
are automatic. For example; the word wrap feature automatically takes the text cursor
to the beginning of the next line once it reaches the end of the current line.
• A new page is automatically inserted after reaching the end of the current page
• Grammar& spelling mistakes can be checked & a text-editing tool that provides
• A word processor allows mail merging, which makes it possible to produce similar
83 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
It is a document that acts as a blue print or outline for other documents of the same
type. It contains the standard text, graphics and formatting for use in all documents of
this type.
(2mks)
4. Explain the difference between overtypes and insert mode in word processing
(2mks)
Type over deletes the current text at cursor position and inserts new text.
Inserting pushes the old text away as new text is inserted at cursor position.
5. Veronica tried to retrieve a document file following all the steps correctly. The filename
did not appear in file list box. State three causes for this.
(3mks)
- The file may be located in a different folder from the one she was trying to
6. Mwikali selected a paragraph in word processing. Explain what happened after pressing
84 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
the following keys on the keyboard: (3mks)
selected text.
7. Precisely explain the role of the following editing features of a word processor;
(3mks)
i) Find and replace -To find words that you want replaced by others ii)
Undo and redo- Undo reverses the previous/latest action, while redo
8. Give the steps you would use to find and replace the occurrence of a particular word in
- Type the word you want to replace with in the replace with box
- Click replaces or Replace all if you want to replace all the occurrences of that word in
85 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
9. Name and explain the use of any three buttons found in a spell-check dialog box
(6mks)
Ignore Once: Leaves the highlighted error unchanged (if the highlighted
word is a valid word) & finds the next spelling or grammar error
Ignore all: retains all the occurrences of the same word or phrase in the document
Add: Adds the highlighted word in the Suggestions box to the Custom
dictionary.
10. Clearly explain the meaning of the following terms as used in word processing:
(7mks)
iii) Printing – having your work copied on a piece of paper as output iv) Saving- Storing a
v) Italicizing text- making the text saint forward vi) Header- It is a standard text or
information such as page numbers, chapter titles, etc that appears above the top margin of
86 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
vii) Footer-It is a standard text or information that appears below the bottom
(5mks)
- Bolding
- Font colouring
- Text alignment
- Font type
- Setting tabs
- Underlining
- Italicizing
- Font size.
87 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Non-printing but visible text-limiting borders that mark the distance that text starts on a
A hard page break is inserted on a page even before the end of the page, e.g. by
For a Soft page break, the text cursor moves or creates a new page automatically when
AutoCorrect automatically replaces mistyped words with the correct ones as set by the
user.
14. Explain how a paragraph can be moved from one page to another using a word
processor. (4mks)
88 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Click Cut on the Edit menu/ standard toolbar, (or Press CTL + ‘X’)
- Click to place the insertion point here you want to put the text
(3mks)
v) At least – the minimum line spacing that is needed to fit the largest
- Left alignment
- centre alignment
- Right alignment
- Justified
17. List any thee sources of graphics that can be used in Microsoft word. (3mks)
89 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- From Microsoft clip gallery
- From Scanner
18. a) Explain the concept of graphics that can be used in Microsoft word.
(3mks)
Getting ready-made objects and text from other applications into the word
processor.
In embedding, the object imported becomes part of the current application and
19. Give a reason why it may be necessary to merge cells in a table. (1mk)
To create larger cells in a table without increasing the height or width of the existing
cells.
b) Give two advantages of mail merge over copy and pasting several times to
90 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
mass mail a document. (2mks)
(2mks)
• To save on printing papers & printer toner because; errors on the printouts that may
(2mks)
In Portrait, text & graphics are printed with the longest side of the page
vertically upright, while in Landscape, text & graphics are printed with the longest side
b) State two reasons why it is necessary to specify the correct paper size
91 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
23. Outline any three main features that make word processors popular programs.
(3mks)
• Mailing features such as mail merging of standard document with another saved file.
SPREADSHEETS
A computer program that looks like the manual ledger sheet with rows & columns for
• Microsoft Excel
• Lotus 123
• -super calculators
• -Multiplan
• -VP-Planner
• -VisiCalc
spreadsheet. (5mks)
92 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
An electronic spreadsheet;
- Has a large worksheet for data entry & manipulation as compared to manual worksheet
- Has inbuilt formulae (called functions) that are non-existent in manual worksheets
- Has better document formatting & editing qualities than a manual worksheet
- Utilizes the large storage space available on computer storage devices to save &
retrieve documents.
- Can easily be modified, while manual spreadsheets involve a lot of manual calculations
- The user can very quickly & efficiently perform complicated computations using the
manual worksheet, changing one value means rubbing the result & writing the correct
one again.
(5mks)
their daily transactions & also keep financial records, e.g. they can record sales &
budgets, etc.
93 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
ii) Data management: - a spreadsheet enables data & information to be
arranged neatly in tables, produced easily and also kept up-to-date, e.g. one can edit,
save , sort, filter, use forms to enter and view records, and worksheet data.
iv) Statistical analysis: - spreadsheets provide a set of statistical Functions/tools that can be used
to develop complex statistical or engineering analyses, e.g., teachers can compile their
produce results.
used to find out the effect of changing certain values in a worksheet on the other cells.
5. State five features of spreadsheets that are useful in financial modeling. (5mks)
• Have inbuilt functions & formulae which can be used to perform most mathematical
• #have ability to perform ‘what if’ analysis, which can be used to find out the effect of
• Have a data validation facility, which ensures that the correct data is entered into the
spreadsheet.
94 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Have a chart facility that can be used to draw Line graphs, Bar charts, Pie charts,
Histograms, etc.
• Some spreadsheets have a SOLVER facility that is used to uncover the best uses of
scarce resources so that desired goals such as profit can be maximized, or undesired
• Have the ability to summarize data using Consolidation and Pivot tables.
i) Columns
These are the fields that make up the worksheet of a spreadsheet, and are
identified by letters.
ii) Rows
These are the records that form a worksheet, and are identifies by numbers.
iii) Cell
A box formed when a row & a column intersect in a worksheet where the data is
entered
95 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
7. Explain the following concepts as used in spreadsheets: (4mks)
i) Automatic recalculation
automatically when the values are changed, so that they correspond with the different
input.
‘What if’ analysis is a feature in spreadsheets that is used to find out the
order to see the difference the change would make on the result of the calculation.
iii) Sheet tabs
These are names of the worksheets that appear at the bottom of the worksheet window.
iv) Worksheet
• Labels
• Values
• Functions
• Formulae
9. An Agrovet Company wants to analyze its employee’s personal details using Microsoft
96 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Excel. The company has five employees: Mary Anne, Francis Kihara, Lena Achieng,
Hellen Wanjiku, and mwangi Peter. Their ages are 20, 45, 90, 45 and 34 years
Mary Anne and Hellen Wanjiku are single whereas Francis Kihara, Lena Achieng and
headlings
(6mks)
A B C D
1 AGROVET COMPANY
Kihara
Wanjiku
97 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
8
A cell reference is the identity of a cell in a worksheet. A cell is identified by use of the
b) For each of the following, state the type of cell reference. (4 mks)
i) A5 Relative reference
ii) $F$5 Absolute row reference (only the row reference is absolute) iii) H$21 Absolute
absolute)
iv) $D7 Absolute column reference (only the column reference is
absolute)
11. a) A formula to add the contents of B5 and C4 was entered in Cell F5.
= D8 +E7
When we move to cell H8 from F5, the column changes by 2 while the
row changes by 3. The formula = B5 +C4 is also updated likewise. This is because of
relative referencing.
98 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
=R20C7
12. Differentiate between relative and absolute cell reference as used in Ms-excel.
(2mks)
Relative cell referencing means the referencing means that the references of cell used in
a formula are relative to the location of the cell where the formula is placed, e.g. E3=
C3* D3. this tells Excel to multiply the contents of C3 by D3 which have been defined
in relation to E3.
Absolute cell addressing means reference is made to one or more cells in a way which
13. The fist column in the table below contains formulas as entered into cell D46. In the
second column, enter the formulas as they would appear when copied to cell B56.
(4mks)
=D1 =B11
99 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Cell Al A2 A3 C1 C2 C3
Entry 5 7 10 10 15 15 =SUMIF
(C1:C3
“<>
10”,Al:A3)
Solution:
= SUMIF (Cells to be tested/evaluated, expression that defines which cells will be added,
= 7+10 = 17
15. Study the worksheet below and answer the questions that follow:
A B C D E F
2 SKYWAYS AGENCIES
Sale
100 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
5 Lifebuoy 2500 2600 2100 2500
9 Total
10 Maximum
11 Average
i) Write functions that can be entered to get total, maximum, and average of
ii) Write down the function that returns the number of sales in the four regions
iii) The function = sum (B4:E4) is entered at F5 and then copied to F8. Write down the
= sum (B7:E7)
101 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Proportional size of items that make up a data series to the sum of the
items.
A collection of related data elements stored together under one logical structure so as to
A common data pool, maintained to support the various activities taking place within
the organization.
• Microsoft Access
• Oracle
• FoxPro
• Dbase
102 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2. State the components of a Database hierarchy in ascending order. (2mks)
i. Flat file database: It holds only one set of data ii. Relational database:
Related data items are stored or organized together in structures called relations or tables.
iii. Hierarchical database: The data items are organized in hierarchical (tree-like)
structure. The records are stored in multiple levels, where units further down the system are
subordinate to the ones above iv. Network database: It allows a data element (or record)
to be related to more than one other data element/record. Links are used to express the
103 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
b) Define the term sorting (2mks)
Sorting involves arranging of records in a logical order in the database. It can either be
A collection of programs used to store & retrieve data, and manage files or records
Corporate database software:-Are designed for big corporations that handle large
in tables
104 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
values in a database.
7. Give three advantages of separating data from the applications that use the data in
8. Differentiate between:
Primary key is a field or a set of fields that can be used to uniquely identify each
individual record in a table. It is used to relate a table to the foreign keys in other
tables.
Tabular – the records are displayed from left to right across the page, and
the labels appear at the top of each column, with each row representing a new record.
Columnar – the fields for each record are displayed down a column, i.e. each value is
9. State three types of relationships that can be used to link tables in databases.
105 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(3 mks)
• One-to-One
• One-to-many
• Many –to-Many
10. Explain how ‘parents’ and ‘child’ tables are related in relational database. (4mks) A
parent table is the one that has the primary key of the relationship, while a child table is the one
Parent and child tables are related through a common field that links the two tables.
• Boredom & time wastage especially when searching for a particular item
• In order to carry out any file processing task(s), all the related files have to be
processed
files is difficult
106 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
b) List any two methods used to secure data in a database (2mks)
• Password protection
• User-level security
• Data encryption
12. The following car details are to be entered in a database: Make, Date-of-manufacture,
a) Prepare a suitable database structure showing field names and their field data types
(5 mks)
Colour Text
Cost Currency
b) Explain how you index the data such that cars of the same make and colour are together.
(2mks)
c) Write a statement that can be used to select cars of colour green. (2mks)
Create a query. In the colour field, and in the Criteria row, write “green”
107 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Create a query. In the cost field, and in the criteria row, write “.>500000
and <1000000”
Create a query. Choose average of costs “Avg” option in the total section.
etc by marking areas for text and graphical objects using specialized programs installed
on a desktop computer.
b) Give any three examples of desktop publishing software available in the market
today. (3mks)
- Adobe PageMaker
- Adobe Photoshop
- Adobe illustrator
- Ventura
- Microsoft Publisher
- CorelDraw
- Harvard graphics
2. Identify four different types of publications that can be produced using desktop
108 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
publishing software. (4mks)
- Cards, e.g. for special occasions such as weddings, graduations, congratulations, etc
- Newsletters
- Newspapers
- Calendars
- Advertisements/Posters
- Magazines
- Certificates
- Notices
- Catalogues
- Pamphlets
- Books
- Brochures
Pasteboard is where text & objects are placed for editing before transferring them to the
printable area; Printable page refers to the area enclosed in margin guides.
(2mks)
Margins mark text areas on the page along the edges, while column guides
divide the page into several fields. They are used to define the printable area.
109 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
c) Change case and drop cap. (2mks)
Change case is changing text from upper to lower case, sentence, title, or toggle case,
while drop cap refer to making the first character in a line bigger and drops down to
110 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
d) Kerning and tracking. (2mks)
while Kerning is fixing particular pairs of letters that are too close or too far apart from
each other.
A stroke refers to a line style, while a fill refers to applying background pattern such as
5. What commands are used in place of portrait and landscape page orientation in
PageMaker? (1mk) i.
Text wrap is controlling the flow of text over or around a graphical object.
111 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Allow to text to jump over the object and continue on the same page
• Create a rectangular text wrap around all the sides of the object.
112 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
1. The first computer Network was set up by ARPA in the United States of America. What
3. The Internet connects millions of computers and telecommunication devices that have
A protocol is a set of rules that govern how tow computers can send and receive
data on a network
computers on a network
113 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
b) Name the two most common protocols for the Internet, and state their functions.
(3mks)
Transmission control Protocol (TCP); - It governs how data is transferred from one
place to another
Internet Protocol (IP); - It is used to provide routing from one network to another (i.e.
i) Website ( ½ mk)
individual
computer.
b) A school intends to set-up an e-learning system. List three problems that are
- Lack of capital
- Lack of skilled manpower (required technology to run & support the e-learning system)
- Availability of pornographic material & literature to the students from the internet.
114 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(4mks)
A B C D
B Name of the host computer in the network on which the e-mail account is
hosted
- Microsoft Outlook
- Outlook express
- Microsoft exchange
- Eudora
115 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
7. Discuss four advantages and two disadvantages that electronic mails have over regular
mails. (6mks)
Advantages
i) Cheap & economical: -It costs almost nothing to transmit and e-mail
message over the network. There is no need for stamps, envelopes, etc
iv) Efficient:- A message prepared only once can be sent to several people
convenient for him/her & the recipients can respond at their convenient times.
vi) Cheaper in preparing the message: - Most e-mail users accept less well-formatted
messages and slight typing errors are overlooked, unlike in business letters which
Disadvantages
- Messages may be lost before they can be read due to virus infection
- Messages may not be kept for future reference due to the high cost of storage
(2mks)
116 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Google .com
• Yahoo. Com
• Hotmail.com
• Excite.com
9. Briefly describe four factors contributing to Internet access and growth in Kenya.
(6mks)
needed. The cost of installing internet services, telephone bills is also high hence
ii) Illiteracy: - Many people are computer illiterate and therefore have no idea
services in rural areas also hinders growth of internet access. Lack of electricity
117 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Data security – the protection of data & information from accidental or intentional
The use of computer hardware or software for illegal activities, e.g., stealing, forgery
defrauding, etc.
b) Explain the meaning of each of the following with reference to computer crimes.
(7mks)
i) Cracking – use of guesswork over and over again trying to look for
weak access points in software in order to get access to data & information
118 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
information (i.e. copying of software illegally).
v) Data alteration – Illegal changing of stored data & information
3. Outline four ways of preventing piracy with regard to data and information.
(4mks)
- Enact & enforce copyright laws and other regulatory frameworks that protect the
(2 mks)
119 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Controlling the movement of storage media (e.g. floppy disks, flash disk, etc) in and
Antivirus software helps to detect and remove the viruses from the computer
controlling the movement of floppy disks ensures that infected disks are not inserted
into computers.
5. Computer systems need maximum security to prevent an unauthorized access. State six
precautions that you would expect an organization to take to prevent illegal access to its
• Lock the doors, (i.e. keep the computers in a strong room, which should remain firmly
• Install security alarms at strategic access points so as to alert the security personnel in
• Use of special voice recorders that would be able to analyse the voice of a trespasser &
check against the database containing the voice patterns of valid users
120 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Enforce data & information access control policies on all employees to control access
to data
• Use file passwords to prevent any person from getting access to the electronic files
6. Give four rules that must be observed in order to keep within the law when
- Should be collected, used & kept for specified lawful purposes (e.g., data should not be
- The owner of the data has a right to know what data is held by the person or
- Data should not be transferred to other countries without the owner’s permission -
Do not collects irrelevant and overly too much information for a purpose.
(3 mks)
- Name
121 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Date of birth
- ID. Number
- Residence
- Address
- Phone number
1. With the aid of a diagram, explain the difference between a digital signal and an analogue
signal. (2mks)
122 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A modem converts (modules) data from digital to analogue form to be transmitted over
the telephone ling. At the receiving end, the modem attached to the receiving computer
(4mks)
value.
iv) word - The total number of bits that a single register of a particular
- Devices designed using binary logic are simple, more reliable & consume less
energy.
5. Distinguish between Binary and Octal number systems, and give an example of each.
(2mks)
123 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Binary (base 2) system has just two states usually called “ON” and “OFF” or “0” and
“1”, Octal (base 8) system has eight different characters, I.e, 01234567.
6. Perform the following computer arithmetic. In each case, show how you arrive at your
answer.
i) 4510
2 45 Rem (2mks)
2 22 1
2 11 0
2 5 1
2 2 1
2 1 0
1 1
4510 = 1011012
124 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2 4 Rem
2 2 0
2 1 0
1 1
=0.112
0.75 x 2 = 1.50 1
0.50 x 2 = 1.00 1
= 1002 = 100.112
(7x81) + (7x80)
56 + 7 = 6310
2 63 Rem
2 31 1
125 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2 31 1
2 15 1
2 7 1
2 3 1
1 1
` =1111112
c) Use binary addition to solve the following: 410 +310 (2mks) Step 1:
Convert the decimal numbers to binary.
2 4 Rem
2 2 0
2 1 0
1 1
410 = 1002
1002
112 +
1112 1112
3 Rem
126 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2 1 1
1 1
310 = 112
= 1407F16
82 81 80
7 6 7
7x82 + 6
x 81 + 7 x
80
127 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
448 +
48 + 7 =
50310
Step 2: Convert 50310 to hexadecimal
503 Rem
16 31 7
16 1 15
1 1
7678 = 1 F716
8. Use One’s compliment to solve the following the following sum: - 510 (2mks)
2 5 Rem
2 2 1
2 1 0
1 1
128 | P a g e “Ignitingpositivechangeamongouryouth”
2FOCUS
34COMPUTER
Rem STUDIES K.C.S.E 2012 to 2015
2 17 0
2 8 1
2 4 0
2 2 0
2 1 0
1 1
34 10 =1000102 (2mks)
2 7 Rem
2 3 1
2 1 1
1 1
=1112
0.12 x2 0.250 0
129 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
0.20 x2= 0.500 0
0.500x2=1.000 1
= 0.0012
= 111.0012 (1mk)
25 24 23 22 21 20
1 0 1 1 0 1
=32 + 8 + 4+ 1
=4510
=2+0½+¼
130 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
161 161 160
7 0 2
=32. [0.125]
= 32.12310
7 A B
22 21 20 21 20 21
000 111 0 11 . 0 1 0
=73.28
131 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
8 57 Rem
8 7 1
8 7 1
2 7 7
0.4 x 8 = 3.2 3
=718 71.318
11100111
00101110 +
101012
132 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
1102
11112
000010002 - 000001012
Step 2: Add the binary equivalent of the first value to the Two’s complement of
00001000
11111011 +
Step 1
7 A E
133 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Step 2
2 4033 Rem
2 2016 1
2 1008 0
2 504 0
2 252 0
2 126 0
2 63 0
2 31 1
2 15 1
2 7 1
2 3 1
2 1 1
1 1
403310 = 1111110000012
14. Write the following abbreviations in full: (4mks)
Decimal
iii) ASCII -American Standard Code for information Interchange iv) EBCDIC -
134 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
135 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
DATA PROCESSING
1. With an aid of a diagram, explain the stages of the data processing cycle.
(6mks)
Data Collection
Data Input
Data processing
Output of ‘information’
136 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Data collection involves getting the data/facts needed for processing from the point of
• Data Input- the collected data is converted into machine-readable form by an input
• Output is the production of the required information, which may be input in future.
2. Clearly differentiate between data collection and data capture. (2mks) Data
capture is the process of obtaining data in a computer-sensible form for at the point of origin
• Data collection involves getting the original data to the ‘processing centre’, transcribing
it, converting it from one medium to another, and finally getting it into the computer.
• Data creation
• Data transmission
• Data preparation
• Input validation
• Sorting
137 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
4. a) Explain the relevance of the term garbage in garbage out (GIGO) in
b) Give and explain two transcription and two computational errors committed
• Misreading errors: -they occur when the user reads source document incorrectly,
thus entering wrong values, e.g. a user may confuse 5 in the number 586 with S, and
• Transposition errors: - they result from incorrect arrangement of characters (i.e., putting
characters in the wrong order especially when keying data onto a diskette), e.g. the user
• Overflow errors: -An overflow occurs if the result from a calculation is too large
to fit in the allocated memory space, e.g., if the allocated memory space is able to store
an 8-bit character, then an overflow will occur if the result of the calculation gives a 9-
bit number.
Data integrity refers to the dependability, timeliness, availability, relevance, accuracy &
completeness of data/information
138 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
b) State three ways of minimizing threats to data integrity. (3mks)
• Hotel reservations
• Banking systems
Advantages
• Fast &reliable
139 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Reduces circulation of hardcopies.
Disadvantages
expensive.
(2mks)
CPU bound jobs require more of the CPU time to process these jobs. Most of the work the I/O
devices perform is on the Input; and Output; hence, they require very little CPU time.
8. Most companies are now shifting from the use of geographically distributed personal
computers. This method of data processing is known as Distributed Data Processing (DDP)
Required:
i) Name any threes computing resources that can be distributed. (3mks) -CPU (Processors)
time
-Files
-Application software
-Data/information/messages
140 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
-Computer processing power
ii) Name four examples of industries and business organizations that extensively use
• Banks
iii) List down two benefits and three risks that might be associated with the distributed data
Benefits
The use of low cost minicomputers minimizes the cost in data processing
141 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
The design & implementation of the system is less complex due to decentralization The
Risks
• Security threats, i.e. the data & information sent one the network from one place to
• another can be tapped, or listened to by unauthorized parties
(2mks)
A Multi-programming system allows the user to run 2 or more programs, all of which
(2mks)
10. State at least four advantages of storing data in computer files over the manual filing
142 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
system (4mks)
Cheaper
(2mks)
• A logical file is viewed in terms of what data items it contains and what
• A physical file is viewed in terms of how the data items found in a file are
12. Arrange the following components of the information system data hierarchy in ascending
order of complexity:
143 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
13. In a computer based information system, state the purpose of the following files, and give
(8mks)
i) Report file- It contains a set of relatively permanent records extracted from the data in a
master file.
They are used to prepare reports, which can ve printed at a later date, e.g. report on
student’s class performance in the term, extract of students who have not cleared their
ii) Backup file- Used to backup data or to hold duplicate copies of data/information from
the computer’s fixed storage or main file for security purposes e.g. a copy of all the
students admitted in a school fees, report on absentees iii) Reference file - Used for
e.g. Deductions in caution money, wage rates, tax deductions, employees address, price
lists etc.
iv) Sort file – used to sort/rank data according to a given order, e.g. ranking position in a
class of students.
It is the way records are arranged (laid out) within a particular file or any secondary
144 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
In sequential file organization, records are stored in a sorted order using a
key field, while in serial; the records are stored in the order they come into the file, and
In random file organization, records are stored in the file randomly and accessed
directly, while in indexed –sequential, the records are stored sequentially but accessed
PROGRAMMING
Section A
i) Computer Program
ii) Programming
145 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
writing of computer programs. The language must be understood by the computer for
it to execute.
particular language
language.
These are the basic programming languages, which can easily be understood by the
understandable form.
Features:
• They are not portable, i.e. , a program written for one computer cannot be installed and
languages (3mks)
146 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Easily portable, i.e. they can be transferred between computers of different families and
• More flexible, hence they enhance the creativity of the programmer and increase
• Easy to modify
• They are user-friendly & problem –oriented, hence can be used to solve problems
• Visual Basic
• Delphi Pascal
• Cobol
• Access Basic
147 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
programmer is familiar with the language iii) Ease of learning and use iv)
scientific, etc.
v) Execution time: High –level languages are easy to read, understand & develop; hence,
they require less development time. Machine code & Assembly languages are
relatively difficult to read, understand and develop; hence, they are time-consuming.
vii) Popularity: - the language selected should be suitable and /or successful in the market
ix) Availability of skilled programmers: - The language selected should have a pool of
development time.
148 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Object code is a program that is in machine readable form obtained from a source
while pseudo code is a set of structured English like statements that describe the
it. (2mks)
149 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Interpreters translate the program each time it runs, hence slower than compiling.
Complied programs can be saved on a storage media. It does not require any further
translation any time the program is run, hence executes faster than interpreted
programs.
- Interpreter translation takes less memory, while compiled programs require more
• Problem recognition
• Problem definition
• Program design
• Program coding
• Program documentation
10. (a) Give two reasons why it is necessary to have a program design. (2mks)
• It identifies the exact order in which the processing tasks will be carried out so as to
150 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Debugging the program
11. a) State any four rules/guidelines that should be followed when drawing
• A flowchart should have only one entry (starting point) and one exit point
• Avoid overlapping the lines used’ to show the flow of logic as this can
• They are convenient especially for long algorithms which span over several
pages.
151 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
E.g., Punctuation mistakes, (i.e. omitting a comma or a semicolon), improper
b) Logical Errors
get the desired results e.g. they may occur as a result of misuse of logical
operators.
statements, which are not projecting towards the desired goal. Such statements
iii) Use of debugging utilities: - It involves supplying data values to the program
for which the answer is known. If the program does not give the correct
152 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(6mks)
to learn how to install and use the program ii) Operator –oriented
documentation: - It is a manual that enables the user to learn how to install and use the
program.
-Sequence
-Selection/decision
-Iteration/looping
(3mks)
153 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Boolean
Expression Stop
Counter Increment
This is the technique of program design that allows large programs can be broken down
Modules or sub-routines
154 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Breaks (splits) a large program into smaller sub-programs (modules) each able to solve
a particular/specific problem
• Programs are easy to modify because; a programmer can change the details of a section
• Modules are easy to test & debug (i.e correct mistakes/errors). This is because; each
• Use of modules can be named in such a way that, they are consistent & easy to find in
documentation
• It is flexible.
IF…THEN
IF…THEN…ELSE
Nested IF
CASE …OFF
155 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
18. a) Name the control structure depicted by the following diagram (2mks)
A-Decision box
B- Process symbol
An array is a data structure that stores several data items of the same type.
a) IF….THEN…. selection
156 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Continuation of program
157 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
21. a) With aid of a pseudo code and a flowchart, design an algorithm that
would:
START
IF Y=0 THEN
ELSE
Quotient = X/Y
PRINT X, Y, Quotient
158 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
ENDIF
STOP
Flowchart
b) Write
down
the
If …then...Else
22. Draw a flowchart for a program that is to prompt for N numbers, accumulate the sum
and them find the average. The output is the accumulated totals and the average.
159 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
23. Write a pseudo code that reads temperature for each day in a week, in degree Celsius,
converts the celcius into Fahrenheit and then calculate the average weekly temperatures.
START
INPUT temperature in 0C
160 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
F = 32 + (9c/5)
INPUT temperature in 0C
Cumulative = Cumulative + 0F
END WHILE
Average = Cummulative/7
PRINT average
Stop
24. Michael deposits 1,000 in a bank at an interest rat of 10% per year. At the end of each
year, the interest earned is added to the amount on deposit and this becomes the new
Develop a pseudo code to determine the year in which the amount accumulated first
exceeds 2,000. Also for each year, print the year (starting from 1), the deposit, the
Interest earned, and the total accumulated at the end of the year.
START
Set Year to 0
161 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
REAPEAT
Year= Year + 1
Deposit = total
STOP
25. Study the flowchart diagram below and answer the questions that follow:
162 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
a) What will be the value of the sum when printed? Show how you arrive at your answer.
(5mks)
R Term Sum
0 0x20 0 + 0=0
1 1x21 = 2 0+2=2
2 2x22 = 8 2 +8 =10
3 3x23 = 24 10 + 24 = 34
26. Mwalimu savings society (MSS) Pays 5% interest on shares exceeding 100,000 shillings
and 3% on shares that do not meet this target. However, no interest is paid on deposits in
i) Prompt the user for shares and deposit of particular members ii) Calculate the
interest and total savings iii) Display the interest and total savings on the screen for
society. (7mks)
163 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
START
ELSE
ENDIF
STOP
164 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
27. a) Study the flowchart below and answer the questions that follow:
165 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
24, 50, 102 (any correct 3)
b) What will be the output if the statement in the decision box is changed to?
(3mks)
i) M100
Only one value, 11 will be printed 1
iii) M = 100
28. The gross salary of employees of Mutson Chemist is based on the Basic and additional
benefits. Employees with more than 10 year’s experience get an additional pay of 10% of their
basic salary. Bonuses are given as per employees’ sales of the month as:
166 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
>200,000 15%
Below 100,000 5%
Draw a flowchart for the program that will calculate Gross salary and output each employee’s
SYSTEMS DEVELOPMENT
167 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A system is a set of items, equipments, procedures, programs or techniques & people
• In Soft systems, goals and objectives are not clearly defined. In hard systems, goals &
objectives are clearly defined and the outcomes from the processes of the systems are
predictable
• Soft systems are usually the human activity systems; their boundaries keep on
changing.
(5mks)
operate within a specific framework, limits or space. The system receives inputs
Subsystems: - A system does not exist alone, but it is made up of different components
Inputs and outputs: - a system communicates with its environment by receiving inputs
and giving outputs. E.g. a manufacturing firm gets inputs in form of raw materials
168 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
from the environment and transforms them into finished products which are released
Process:- a system usually transforms or processes data from one state to another.
System entropy (decay);a system must have controls which help it not to operate
beyond its boundaries. The controls enable the system to adapt to changes in the
environment in order to give the expected output or to perform to the expected level.
that work together to support and improve the day-today operations of a business.
• Invention of new systems which are more successful than the existing ones
Problems: - the user may encounter some difficulties in the operations of the
existing system
external influences.
169 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Reviews the existing system & makes recommendations on how to improve or
Some of his duties include: assuring quality, keeping within schedule & budgeting.
i) System control
level.
operational data, analyze it, and generate reports that can be used to support the
7. State one disadvantage of the Traditional approach in system development (1mk) The
structure of the old system is not changed in anyway; hence; hence, the weaknesses of the old
system are not corrected and are carried forward to the new system.
170 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
quickly capture user requirements by designing system interfaces in the presence of the
user.
-Information gathering
-Requirements specification
-System design
-System implementation
10. Define the term Feasibility study as used in system development. (2mks)
This is a special study carried out to establish the costs and benefits of a proposed new
system.
11. You are required to develop a registration system for a particular school. State two ways
in which you would gather the information required for the system
development. (2mks)
171 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
-Observation
-Interviews
-Use of questionnaires
-The person being observed may perform differently or change his/her behaviour
-The work being observed may not involve the level of difficulty or volume normally
-The need to be on the site where the activities are taking place consumes a lot of time.
-Some activities may take place at odd times causing a scheduling inconvenience for
the analyst.
172 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Use of questionnaires gives the respondents privacy; hence, there is likelihood that
• Questions can be answered quickly since respondents can complete and return the
14. a) Explain the importance of using automated methods in fact finding. (1mk)
Automated method of data collection can be used in areas which are not easily
accessible.
15. Mention the four factors that may be considered in order to design a good file.(4mks)
specifications
173 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
16. State four factors that may be considered in order to design a good file. (4mks)
An attribute is a unique characteristic of a record for which a data value can be stored
in the system database. E.g., a student record has attributes such as Name, admission
18. State two methods/tools that a system analyst may use to design a system. (2mks)
- Structured charts
19. Explain three tasks that are carried out during system implementation. (3mks)
- File conversions
- Staff training
- Project management
- Changeover strategies.
174 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
20. Your school has decided to replace its library control system. The current system was
implemented ten years ago but has restricted reporting facilities and has a text-based
interface. The school intents to replace the old system with a new computerized system,
a). (i) Briefly explain the terms parallel running and direct changeover as used in system
implementation. (2mks)
• Parallel running is where both the old and the new systems are run in parallel to each
other (a the same time) for sometime until users have gained confidence in the new
system. Data is processed on both systems in order to compare their performance, and
• Direct changeover is a complete replacement of the old system with the new system in
one bold move. The old system is stopped & abandoned and the new system starts
operating immediately.
(ii) Give two disadvantages of direct changeover over parallel running. (1mk)
o It may be very inconveniencing (or, the organization will incur huge losses) in
o The users may not have gained enough confidence to run the new system.
o The weaknesses of the old system may not be corrected & may still be
175 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
o If the new system fails, data recovery may be impossible.
(iii) Mention any two advantages of running both the manual system ad the
o If the outputs from the two systems are similar, confidence in the ICT systems.
telephone cables, or Satellites) for the purpose of communication and sharing of resources.
telecommunication channels
176 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• A Multiplexer enables sending of multiple data signals over the same medium, either
• A Modern converts a digital signal to analogue form, so that it can be transmitted over
Advantages
- It is not time-consuming.
Disadvantages of networking
- Security threats e.g., hacking, which posses a great danger to loss of information
177 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
This is a system in which data is manipulated in different processors/computers, which are
• Failure of the central computer does not affect the operations of the other terminals
• There is faster processing of data since each machine can process & store its data
• It can accommodate users with variety of needs Creation of employment at the remote
centers.
5. Distinguish between bounded and unbounded transmission media, giving two examples
in each.
• In bounded media, data signals are transmitted from the source to the destination through a
restricted pathway, e.g., two open wire cables, twisted pair cables, Coaxial cables, fiber
optic cables.
• Unbounded media transmits data without physical connections, e.g. microwave, satellite,
178 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
6. State what is meant by each of the following data transmission media, and give two
A twisted pair cable is made up of 2 insulated copper wires twisted around each other
in a spiral pattern. This prevents electromagnetic fields from developing around the
Advantages
Disadvantage
Coaxial cables consist of two conductors which are insulated and shielded to provide
Advantages o They have a large bandwidth (up to 1 Gbps) compared to twisted pair
cables o They can carry voice, data and video signals simultaneously o They are
more resistant to radio and electromagnetic interference than twisted pair cables
179 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Disadvantages o They are hard to work
install
iii) Fibre optic cables is made of transparent glass and uses light to transmit data
eavesdropping.
one point to another. Instead a transmitting antenna & a receiver aerial are used
Advantages
180 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Disadvantages
NIC creates a physical link between the computer and the transmission media.
ii) Gateway
Gateways provide access to the Wide area networks & the Internet.
iii) Bridge
iv) Repeater
A repeater receives a weak signal on the network, cleans and amplifies it for
transmission over the next portion of the network. Signals become weak due to
attenuation
181 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Can be used even where there are no telephone lines Portable, i.e. can be
carried around
9. a) Study the diagram below and answer the questions that follow:
i) Name the communication media depicted in the above diagram. (1mk) Satellite
communication
B -Satellite in space
182 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
C -Down link
D -Up link
- It is fast
- It is convenient because; it provides a large constant line of sight to each station Hence,
there is no need to keep on moving the parabolic dish so as to track the line of sight
- Can be in very remote areas that do not have high cost physical infrastructure like
Network topology refers to the arrangement of the computers, printers and other
• Logical (signal) topology deals with the way data passes from one device to the next on
the network
• Physical topology refers to the physical arrangement (layer out) of devices on the
network.
• ICT- refers to the integration of computers and telecommunication facilities for the
purpose of communication.
183 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2. State four areas where computers are used today. (4mks)
i) Financial systems, e.g. accounting, stock exchange, payroll, banking, etc, ii)
Transport systems, e.g. air traffic control, shipping control, automobile traffic
control
iii) Entertainment systems, e.g. used in showing movies, playing music, &
computer games.
iv) Scientific research, i.e. weather forecasting, medical research, military & space
exploration.
3. State two ways in which a computer may be used in efficient running of a hospital.
4. a) Name the type of processing that would be required by a payroll system. (1mk)
Batch processing
- Error checking procedures can e established to ensure accuracy & security of data
184 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Used to store volumes of financial records
5. a) Write down all the input and output devices of an ATM machine of Pesa-point in
Kenya.
- Keyboard
- Printer
• Monitor
185 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Printer
• Fewer errors made by employees, i.e. correct prices are used at the point of entry
• It ensures faster entry of data, since the attendant does not have to enter details
manually.
a) Biometric analysis
This is the study, measurement & analysis of human biological characteristics. It uses a
computer and a biometric device to recognize & analyze features of human body parts
b) Telecommuting
- A computer
186 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Network software for video conferencing
- A microphone
- Speakers
E-commerce is a way of doing business where the transactions are carried out
environment (2mks)
- A company can access customers all over the world, and is not limited by space &
wagons
- Reduces operating costs of small business as they can establish websites where they
can auction their good & services. This also increases their sales.
10. Describe how computing has been applied to each of the following areas:
- Used by railway corporations to coordinate the movement of their goods & wagons -
Used in airline industry for air traffic control, surveillance of airspace using radar
equipment
lights.
187 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
information
• Scene monitoring & analysis to help the police in arresting traffic offenders and
criminals.
11. Suggest how computers may in future be made more user-friendly for persons that are:
a) Blind (1mk)
of the user
188 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
b) Without hands
recognition devices.
12. Give at least four reasons why a firm may decide to computerize its operations
- Increased efficiency
- Reduced cost.
(4mks)
o Job displacement and replacement o Computer crimes, e.g. piracy, fraud, hacking
o Health effects, e.g. repetitive strain injury, eye problems o Cultural effects and
Computerization (2mks)
189 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
In job replacement, the unskilled workers may be replaced with the skilled ones. In
job displacement, some employees may be displaced/ moved to new working areas
as the computer may serve to perform tasks that may be performed by several
people.
- Manufacturing industries such as vehicle assembly plants, oil refineries, and food
processing companies.
190 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
i) Expert systems
• This is the use of electronic devices & software to emulate the learning process of
areas
i) Competition (2 mks)
191 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Reduced costs
- Greater output
6. State three reasons why users may resist the introduction of information and
i) Fear of change- people are creatures of habit, hence are afraid of change
ii) Fear of losing their jobs: By installing the computer into an organization, employees
iii) Fear of failure – Since the computer is very new in a given working environment, the
people will be afraid that they might never get used to it.
iv) Loss of control: The management fear that once a computer system is implemented,
1. Give a brief description of the following careers available in the computing field.
(i) A Software engineers is one who is skilled in software development and technical
He develops and updates both system and application software together with the
associated documentations.
192 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A data processing manager is the person who usually is in charge of the overall running
He plans, monitors and controls the personnel, ensures that resources and labour are
3. (a) Sate three public universities where one can further her computer studies ( 3 mks)
- Nairobi university
- Moi University
- Kenyatta University
- Egerton University
- Maseno university
(b) Identify at least three related courses offered at
193 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Maintains, updates & modifies information on the websites to meet new demands by
the users.
- Monitors the access & use of internet connection by enforcing security measures
- Training people on how to use a computer & the various application programs
5. Explain two factors one would consider before enrolling for an ICT course in a college
194 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Marketability of the course, i.e. whether it offers courses recognized both locally and
internationally.
- Job opportunities
195 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Paper 1 (theory)
2 ½ hours
INSTRUCTIONS TO CANDIDATES
A 1- 15
16
17
18
19
20
TOTAL SCORE
196 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
1. Computer systems are built from three types of physical components: processors,
- Decodes instructions
2. Threats to the safety of computer system take many forms such as: white- collar crime,
Give one way as to how each of these forms of threat can be controlled ( 2 mks)
- Use of policies
- Use of passwords
197 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- putting in place punitive measures
- Data encryption
- Use of firewalls
- Use of UPS
- Use of backups
- Contingency plans
(iii) Vandalism
- Tighten security measures, e.g. use of alarm systems, fitting, burglar- proof doors
- Punitive measures.
(iv) Carelessness
- Regular backups
198 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
3. (a) Explain the term nibbles as used in data representation in computers ( 1 mk)
A nibble is a group of 4 binary usually representing a numeric number.
(b) Perform the following binary arithmetic, giving the answers in decimal notation
(3 mks)
1110.0111
1101001.011 +
1110111.1101
1001011.011
111.111 –
1000011.100
Machine language uses machine codes (binary digits) that consist of 0’s & 1’s, whereas
machine code.
(b) State the type of translator necessary for a program written in: ( 2 mks)
199 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Interpreter or compiler
(ii) Assembly language
Assembler
5. Briefly explain the purpose of the following types of program documentation: ( 3 mks)
This is a manual provided for an end user to enable him/ her use the program. It is
I is used by someone who already knows how to use the program but needs to be
feature.
This is a single sheet or card small enough to fit into a pocket, which the user may
keep handy for help with common tasks carried out with as program.
- Validation of input
- Comment statements
200 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Indentations
- Online help
7. (a) Distinguish between labels and formulae with respect to spreadsheets ( 2 mks)
values, cell references, functions and arithmetic operators whose calculations results to a
numeric value.
8. List three differences between Wide Area Networks (WAN) and local Area Networks
(LAN) ( 3 mks)
201 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
9. Study the flowchart segment below and state the last value printed from the
flowchart
An expert system is computer software that mimics human expertise in a particular area
of specialization
- Knowledge base
- Explanation facility
- User interface
11. Give reasons why optical disks are better storage media compared to floppy
202 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
diskettes
- Have a high storage capacity
- More secure against alteration, i.e. they require writers to alter their contents
- More robust, i.e. can resist temperature, electromagnetic fields and not affected by
- Cheaper per unit of storage. Optical disks can be used for storage of large volumes of
Copying is making a duplicating copy of text, moving is relocating/ transferring text from
one place in a document to another
In copying the original text is left intact, while in moving all the selected text is transferred
from its original location to a new location.
203 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Portrait
- Landscape
- Delete
- Backspace
- Search facility that enables the user to scan through the records in the database so as to
- Forms (input screens) for viewing and entering data into a table
- Sorting facility, which enables the user to organize & arrange the records within the
database.
- Query facility
- Data validating facility, which ensures that, the correct data is entered into the database
204 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Macros which are used to automate frequently performed procedures or tasks
Answer question 16 and any other three questions from this section
16. Study the flowchart below and answer the questions that follow:
(a) Write a high level language program for the above flowchart ( 7 mks)
Program ABC;
Uses WinCRT;
VAR
A, B C COUNT: INTEGER;
BEGIN
A: 0
205 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
B=1
REPEAT
Writeln (B)
COUNT: = COUNT + 1;
C: = A+B;
A: = B
B: = C;
UNTIL COUNT = 10
END
OR
VAR
A, B, C, COUNT: INTEGER;
BEGIN
A: =0;
B: = 1
FOR COUNT: 0 TO 10 DO
Begin
206 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Writeln (B);
C: A + B
A: = B;
B: = C’
End;
END
(c) Modify the flowcharts so that it adds up all its outputs and displays the sum obtained
(3 mks)
207 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Pentium II
20 GB hard disk
Full multimedia
208 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(ii) 20 GB hard disk?
Refers to the type (colour) and size (17 – inch) of the screen
(b) Which operating system might be pre- installed in this computer and why? (2 mks)
Reason- the office suite can only work under windows environment (3 mks)
- Speakers (headphones)
- Microphone
- Digital camera
- A RAM of 32 MB or higher
209 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(ii) Give two examples of computer aided design software ( 2 mks)
- AutoCAD
- ArchCAD
- Draffics
- 3 Dmacs
- UNIX
- Linux
- Novell NetWare
- Microsoft Windows NT
(b) List any three items that may be referred to as data terminal equipment in a network
( 3 mks)
- Servers
- Dummy terminals
- File servers
- Printers
- Modems
- Terminators
210 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(i) Remote communication
(d) State three advantages and two disadvantages of mesh network topology ( 5 mks)
- It is fast
- Easy to troubleshoot cable problems. If two machines are not communicating, the
Disadvantages
211 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
19. (a) A company has decided to computerize their operations. They have decided to
purchase packages instead of developing their own programs. Give three advantages
Advantages of packages
- There is saving of the programming effort because; the company buys the
Disadvantages of packages
- The purchaser is not in direct control of the software because he/ she is not
- Packages are produced to meet general needs, hence may not deal with the
user or company
212 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Packages may allow only a clumsy solution to the task at hand
- Some packages have capabilities which will require the user to develop them
further.
- It is easy to forget the commands to use the package, especially if it is not used
frequently.
(b) (i) Explain why a value such as 6112334445555 may be displayed as ####### when
(c) With reasons, briefly describe the most appropriate type of printer or output device
LaserJet Printer (or any impact printer) it is fast & produces quality printouts
OR
Plotters
213 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Have appropriate facilities for drawing & graphical output
Verification is checking data manually to ensure/ ascertain that it has been transcribed
Validation involves subjecting data to checks built in a program to check for its
(b) Draw a labeled diagram to illustrate the internal structure of a diskette. (4 mks)
214 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(c) Give two differences between post Office Mail electronic mail ( E- mail) ( 2 mks)
(d) Speed and accuracy are some of the advantages of using computers in banking. State
215 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Paper 1 (theory)
2 ½ hours
INSTRUCTIONS TO CANDIDATES
216 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A 1- 15
16
17
18
19
20
TOTAL SCORE
SECTION A ( 40 marks)
217 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2. Distinguish between compiler and interpreter (2 mks)
- A compiler translates the entire program at once as a unit before execution can begin. An
Interpreter translates one instruction of the source program at a time. The translated instruction
- An interpreter translates the program each time it is needed for execution; compiled programs
- For an Interpreter, syntax errors are reported & corrected before the execution can continue.
For a compiler, syntax errors are reported & corrected after the source code has been
Data is stored in computers in binary form. The computer’s CPU carries arithmetic &
This is because; binary numbers has only two digits, 0 & 1, which make it suitable for
4. What is meant by the term dry running as used in program development? (2 mks) A
method of checking a program for logical errors by making the corrections on a paper or from
the printouts
218 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
5. A computer teacher has put a rule that diskettes should not be used in the computer
laboratory
(b) State two alternatives that can be used to achieve the same objective (2 mks)
6. List three differences between a laser printer and a dot matrix printer (3 mks)
- Laser printers use thermal technology while dot matrix is an impact printer
- Laser jets use Toner cartridges while dot matrix use ribbons
219 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Data input
- Processing
- Output of information
This is a program used frequently by the computer to carry out routine jobs
Utility software is used to manage computer files, diagnose and repair computer problems and
- Text editors
- Sort utility
- Language translators
- Merge utility
- Loader
- Copy utility
- Linker
- Dump utility
- Diagnostic tools
220 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- An intelligent terminal is one which is capable of performing some limited amount of
processing on data before transmitting what is beyond their processing abilities to the central
computer.
- A dump terminal is one which does not have any of its own processing capabilities/
power. It relies on the processing capabilities of the central computer that serves it.
- Updates the database by adding new record, modifying the existing records & deleting the
unnecessary records.
- Responsibilities for the security of data in the database (i.e. designs & sets up security
- Ensures facilities for retrieving data and structuring reports are appropriate to the needs of the
organization
221 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- In charge of the overall running of the data processing departments, e.g. he is in charge of
• Source program is the program as written by the programmer using an editor program
• Object program is the program in machine code (or binary form) produced by a
compiler or assembler after translating the source program, and can be readily and can
12. (a) In DOS, what are the following commands used for?
(b) What happens when the following commands are typed in the DOS environment?
A B C
1 Item Amount
222 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2 Fare 200
3 Stationery 50
4 Bread 300
5 Miscellaneous 150
6 Total
The student intends to have spent half the amount by mid- term
(a) Given that the value 0.5 is typed in cell B9, write the shortest formula that would be typed
in cell C2 and then copied down the column to obtain half the values in column B.(1 mks)
= B2*$B9
(b) Write two different formulae that can be typed to obtain the total in cell B6 and then
OR
= B2 + B3 + B4 + B5
14. State three operations that can be performed on a relational database files (3 mks)
- Indexing
- Sorting
- Filtering
223 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Querying
- Updating of records
- Report generation
15. List three parts that constitute an array definition statement ( 3 mks)
- Array name
- Range, which contains the initial value & the final value
- Data type
Answer question 16 and any other three questions from this section
224 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
16. Bidii wholesalers has two categories of customers for order processing, category ‘A’
obtains 10% discount on all orders up to Kshs 10,000 otherwise the discount is 20% on
the entire order. Category “B’ obtains 30% discount on all orders if the debt repayment
is ‘good’ otherwise the discount is 15%. Draw a flowchart for the order processing. (15
mks)
- Expert systems, e.g. medical diagnosis, engine repair, legal defense etc
225 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Artificial neutral networks e.g. investment analysis, signature Analysis, etc
to work from home. Such working using a PC as a remote terminal is often described as
teleworking. State three advantages and three disadvantages of working from home.
( 12 mks)
Advantages
- Reduces traveling expense (i.e. saves traveling time, risk and cost)
- Suitable for people with disabilities, because they are able to overcome the barrier of
- People can live where they choose without the worry of having to move towns and
Disadvantages
226 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Lack/ unavailability of appropriate facilities to allow the work to be done
- Privacy threats
- Lack of control and supervision. The workers have to be able to motive themselves to
- Isolated employees may be exploited in an environment where they can’ t easily get
18. (a) Explain three ways by which computer users can protect their eyes from harmful
- Using antiglare (radiation filter) screens that are specially tinted to reduce the radiation
- Wearing special spectacles when using computers in order to control the light intensity.
- Avoid using flickering monitors as they can cause extreme eye strain that can damage
eyesight.
- Very bright wall paints reflect too much light into the user’s eyes. - Taking
frequent rests
227 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(b) List three factors to be considered when deciding on the choice of an electronic data
processing method
- Cost pf acquiring the relevant hardware, software, storage media, etc the cost of
maintenance
- Operation speed
(c) Explain time sharing data processing mode, giving two advantages and two
disadvantages (6 mks)
Time sharing is a processing mode where a central processor services 2 or more users
- Reduces processor idle time. This is because the processor doesn’t have to wait for the
- Helpful to small companies which cannot afford purchasing a computer & the related
facilities. The company can be served at a fee through time- sharing processing mode.
228 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Provides better services to the user since the output is fast
- The user of the system can benefit from the computer facilities through remote
terminals
19. A school bought a computer system. The hardware items supplied include: a 800 MHz
disk, a floppy disk drive, a CD – Read/ write drive, a mouse, a modem, an inkjet printer and a
joystick.
The software supplied include: an operating system, a BASIC interpreter and the following
- Keyboard
229 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Mouse
- Joystick
- It means that, the system cock has a speed of 800 million oscillations per second
( 2 mks)
(ii) 64 MB of RAM
This is a measure of the storage capacity of the primary memory/ Random access
- 120 Gigabytes
(c) Some of the students in the school use the computer to do homework. Name the
Spreadsheets
230 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(ii) Write an essay
Word processor
Art
(i) Which two hardware items are needed to produce sound? (2 mks)
- Sound card
- Speakers
Joystick (1 mk)
20. A school organizes its work in directories. The director WP contains the files CATS, EXAMS
and ASSIGNMENTS. The directory of SP contain the spreadsheet files. The directory DB
contains the database files. The directory PROG is contained in the OTHERS directory. The
directory WP also contains the PERSONAL directory. Given that the directory STUDENT
(a) Draw the directory tree structure with C as the root (7 mks)
231 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(b) Write the path at which the contents of subdirectory DB can be erased or
displayed
(2 mks)
C: STUDENT\DB>
C:\STUDENT\OTHERS\PROG>
(d) Give two reasons for storing files in directories and subdirectories (2 mks)
- To avoid accidental deletion/ erasure of files when the files in C are being deleted.
(e) Give two disadvantages of using command driven interfaces as compared to menu
232 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- The user must know the command to type
- The user is required to master the format/ syntax of all commands and their usage
perfectly.
Paper 1 (theory)
2 ½ hours
INSTRUCTIONS TO CANDIDATES
A 1- 15
16
17
233 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
18
19
20
TOTAL SCORE
Process of preparing a new disk for use by imprinting empty tracks & sectors on the
surface of the disk that can be recognized and access by a particular operating system
(b) Indicate whether the following devices are used for input or output
( 2 mks)
2. (a) Explain why the following controls should be implemented for computer based
systems ( 2 mks)
(i) Back- ups - Backups can be used to recover/ restore/ prevent lost data
234 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(b) For each of the following give one reason why they are not allowed in a computer
laboratory ( 2 mks)
(i) Smoking
Smoke particles settle on storage devices and may scratch them during read/ write
operation
Food particles may fall into the moving parts of the computer and damage them
3. Distinguish between real, integer and character data types as used in programming:
Real:
Integer
235 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Characters
- Used for alphanumeric/ control/ signal/ graphical character - Character uses fewer bits
very good, good, fair and fail depending on the average mark. Write a formula that can
be used to count ALL students who have the remark “very good”. (3 mks)
They act as high speed storage locations. They are used to hold data and instructions
- Linux
- Microsoft windows 98
- UNIX
- OS/2
- Microsoft Windows Me
- Novell Netware
236 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
- Microsoft Windows XP
- Macintosh OS
6. (a) A serial file comprises of records placed in positions 1 to 10. State the position of the
The end- of – file marker is the position immediately after the last record, i.e. position 11
7. (a) Name the control structure depicted by the flowchart below ( 1 mk)
237 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(b) Explain the following terms as used in program implementation ( 2 mks) (i)
parallel running
This is where both the existing and the new systems are run
concurrently/simultaneously (at the same time) for a period of time until users have
gained confidence in the new system. Data is processed on both systems in order to
This is a complete replacement of the existing system with the new system in one bold
move. The existing system is stopped & abandoned and the new system starts
operating immediately.
i) AA (5: 50)
CCC (18)
238 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
and self-correction
10. Name two types of relationships that can be applied in database design. (2mks)
- One to one
- Many to Many
a) Indenting
b) Alignment
239 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
c) Word wrap
A facility that word processor use to automatically move the text cursor to the
beginning of the next line when it reaches the right margin automatic rolling of text to
the next line when you reach the end of the line.
12. Outline two ways in which computers can be used in hotels. (2mks)
• Reservation/booking of rooms
• Record keeping on sales and purchases (stock control)
• Communication
• Security
This is a data encoding system that uses 4 binary digits to represent an individual decimal digit.
Number 4 5 1
45110 = 010001010001BCD
240 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Bit Nibble Byte File
15. State two health issues that may result from prolonged use of computers. (2mks)
• eyestrain/eye fatigue
• Headaches
• finger deformation
• Back strain.
241 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
SECTION B (60 MKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS FROM THIS SECTION
Program design
ii) The programmer would check whether the program does as required program
Testing
Program testing
Program documentation
Problem definition/analysis
242 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
A=30
B=28
B=A
A= B
Write A, B
A= 30, B= 30 (2mks)
243 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
ii) WRITE A PROGRAM USING Pascal or c languages for the flowchart in c(i) above.
(5mks)
VAR
244 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
R, R1, R2: Real; 1
Begin
Writeln ( R); ½
END
- Tabs - columns
Highlighting:
- Selecting or marking a given of text e.g., a word, sentence or paragraph, in order to work with
it
- Highlighting is temporary.
245 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Bolding:
- making the selected text appear darker then the rest of the text - To add emphasis to the text
- Bolding is permanents.
c) The following information shows the income and expenditure for “behayote” matatu for
five days. The income from Monday to Friday was Ksh. 4,000, 9,000, 10,000, 15,000, and
12,000 respectively while the expenditure for the same period was Kshs. 2,000, e, 000,
i) Draw a spreadsheet that would contain the information. Indicate the rows as 1, 2,
A B C
246 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
2 Day Income Expenditure
(Ksh) (Ksh)
= B3-C3
II Total income
= MAX(C3:C7)
1001
0111 –
247 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(b) Using two's complement, subtract 7 from 4 and give the answer in decimal
notation. (4 marks)
2 4 Rem
2 2 0
1 0
1 1
=000001002 2 7 Rem
2 3 1
1 1
1 1
=0000011
=111110002
248 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Step 4: Add 1 to the One's complement to get Two's complement.
=11111000
1+
11111001
Step 5: Add the binary equivalent of the first value to the Two's complement of
11111001 +
11111101 = 111111012
9 1 B
8 2331 Rem
8 291 3
8 36 3
249 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
8 4 4
4 4
82 81 80
3 7 6
192+56+6= 25410
16 254 Rem
16 15 14
15 15
250 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
3768=FE16
2 9 Rem
2 4 1
2 2 0
1 0
1 1
0.625x2-1.25 1
0.250x2 = 0.50
0
0.50x2 =1.00 1
0.62510-1012
9.62510= 1001.1012
19. (a) Explain what the following DOS commands will do when executed.
251 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
(iii) B:\>DIR P*.BAT (2 marks)
Display all the files beginning with P and have extension of .BAT in drive B:
(b) (i) With the aid of a diagram, explain hierarchical (tree) network topology.
(3
marks)
• It is connected in such a way that nodes are in different levels of control such that
• A child node has only one parent but a parent node can have more than one child.
252 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• The child nodes can only be accessed through the parents.
topology. (4 marks)
Advantages
Disadvantages
50. (a) Name and explain the function of the keyboard keys represented by the following
symbols.
• Used in Word processors to move certain text or the cursor at set intervals on the
• Used to move from one cell to another. Used to move the cursor between options. ,
253 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• Used to indent text.
• It is used as a RETURN key. When pressed at the end of a text line or paragraph in a
word processor, it forces the text cursor to move to the next line or paragraph.
computer to carry out (execute) a command that has been typed or selected on the
screen.
• It can be used for changing cases, e.g., to get single capital letters.
• It is used to get the punctuation marks on top of the Number keys or the symbols
on top of certain keys .especially on the alphanumeric section.
• Used for shortcuts in combination with other keys, e.g., SHIFT + DEL
254 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
Simulation is the designing of models of either an actual or theoretical physical item,
and analyzing/testing the execution output using a computer. (ii) Name two
- In engineering, e.g.
- Design of bridges.
- Aviation training.
- Laboratory experiments
- Missile launch.
- Space exploration.
- Vehicle accidents.
them.
• It enables the manufacturers identify weaknesses of the real situation or object, hence;
255 | P a g e “Ignitingpositivechangeamongouryouth”
FOCUS COMPUTER STUDIES K.C.S.E 2012 to 2015
• put the correct reinforcements to their designs
• Reduces risks - it allows some activities that would otherwise be expensive &
• Faster.
• Convenient. .
- Standardizing learning.
(3 marks)
256 | P a g e “Ignitingpositivechangeamongouryouth”