RSS

Category Archives: Computer Science

2010-KCSE-TRIAL-COMPUTER-STUDIES-P2-001

CST-OP2-001

Name …………………………………… Adm. No/Index No…………………………………..

Candidate’s Signature …………………

Date ………………………………………

451/2

COMPUTER STUDIES

Paper 2

(Practical)

July/August 2010

2 ½ Hours

KENYA CERTIFICATE OF SECONDARY EDUCATION

Computer Studies

(Practical)

Paper 2

1)

The table below shows a section of St. Peters Kalu girls’ fee payment by students.

ADM NO. DATE STUDENT’S NAME FEE PAID FEE BALANCE
26902836

2583

2910

2913

2921

2934

2963

2975

2836

3000

2934

3010

3001

2836

2934

2931

3001

2836

3/5/20093/5/2009

3/5/2009

3/5/2009

4/5/2009

4/5/2009

4/5/2009

5/5/2009

5/5/2009

5/5/2009

6/5/2009

6/5/2009

6/5/2009

7/5/2009

7/5/2009

7/5/2009

8/5/2009

9/5/2009

9/5/2009

Nelson MokayaErnest Mwangi

Joseph Motari

Peter Oluoch

Josephat Kimutu

Trisa Okinyi

Mary Njoroge

John Karioki

Florence Kiyaka

Chrispus Kiamba

Joseph Motari

Shem Omwenga

John Karioki

Alfred Matoke

Benjamin Okioga

Joseph Motari

John Karioki

Mary Njoroge

Benjamin Okioga

20002000

4000

2500

3000

2000

6000

1000

2900

6500

5000

2000

1200

2000

2200

2000

4000

2600

2000

a) Using a spreadsheet package, enter the information given in the table into a worksheet and rename the worksheet as FEEENTRY. Save the workbook as A:\QSS (15mks)

b) Copy the worksheet and paste it in sheet 2. Rename the worksheet as TOTAL (4mks)

c) Format the column headers so that they are aligned at 450 and bold them. Let the figures in thousands be separated by a coma and format the figures so that the read Ksh. (6mks)

d) Sort the file in alphabetical order and using a function determine the total amount paid by each student for this month (14mks)

e) Find the list of students who have paid a fee more than 5000. Paste then in a new sheet and rename the sheet as TOP (3mks)

f) Using a formula find the fee balance for each student as per the end of this month given the total fee as 17,000 (4mks)

g) Print the workbook (4mks)

2) HIGHTEC Computer College is a company dealing with computer services. It opted to computerize their work using a database program to monitor day to day computer sales. Imagine that you are their computer programmer, assist them in their goal as tabled below.

Worker Name Age Monthly Salary Allowances Gross Pay Payment method Employment terms
Peter Nyang’au 54 $20000 $5000 Cash Casual
Lucy Bosibori 50 $40000 $3000 Bank Permanent
Tom Onyancha 45 $10000 $6050 Money Order Casual
Selly Moraa 42 $15000 $1040 Cash Permanent
Tom Nyakundi 32 $30000 $9300 Bank Permanent
Raphael Nyamu 40 $21000 $4500 Bank Casual
Evans Ndemo 39 $37000 $4440 Bank Casual
Stellah Otieno 30 $25000 $7000 Bank Permanent
Mary Kemuma 35 $27000 $3500 Money Order Casual

a) Create a database called HIGHTEC and enter the above data in workers table (18mks)

b) Create a primary key to Age field (2mks)

c) In all cases change the currency to Kenyan Shillings (2mks)

d) Create a query having fields worker name, age and monthly salary whose age is less or equal to 40 and sort it in ascending order. Save it as workers query. (10mks)

e) Create a query having fields; worker name, salary, allowances. Calculate the gross pay of each worker. Name it as Gross query. (10mks)

f) Create a report from workers table having all fields and change the orientation to landscape. Save it as workers report. (4mks)

g) Print workers table, workers query, gross query and workers report. (4mks)

Advertisements
 
Leave a comment

Posted by on September 9, 2010 in Computer Science, Paper 2

 

Tags:

2010-KCSE-TRIAL-COMPUTER-STUDIES-P1-001

CST-OP1-001

Name …………………………………… Adm. No/Index No…………………………………..

Candidate’s Signature …………………

Date ………………………………………

451/1

COMPUTER STUDIES

Paper 1

(Theory)

July/August 2010

2 ½ Hours

KENYA CERTIFICATE OF SECONDARY EDUCATION

Computer Studies

(Theory)

Paper 1

Instruction to Candidates

1) Write your name and admission number in the spaces provided above

2) Sign and write the date of examination in the spaces provided above

3) This paper consists of TWO sections; A and B

4) Answer ALL the questions in section A

5) Answer question 16 and any other THREE questions from section B

6) All answers should be written in the spaces provided on the question paper

For Official Use Only

Section Question Score
A 1 – 15
B 16
17
18
19
20
TOTAL

SECTION A: (40 MARKS)

1) List down six factors to consider when choosing an operating system (3mks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

2) Describe the ideal environment for a computer to work properly. (4mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

3) Distinguish between Tailor-made programs and Off-the-shelf packages (2mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

4) List four features of a user friendly program (2mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

iv) ……………………………………………………………………………………………

5) List down five factors to consider when buying an output device (5mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

iv) ……………………………………………………………………………………………

v) ……………………………………………………………………………………………

6) Give three types of special purpose memories (1½mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

7) Explain the following field properties as used in Ms Access (2mks)

a) Caption ……………………………………………………………………………… ………………………………………..………………………………………………………

b) Input mask …………………………………………………………………………………… ……………………………………………………………………………………………….

8) Define the following terms as used on the Net

a) Firewall (1mk) ………………………………………………………………………………………………………………………………………………………………………………………………..

b) URL (1mk) ……………………………………………………………………………………………………………………………………………………………………………………………….

c) Search engine (1mk) …………………………………………………………………………………………………………………………………………………………………………………………….

d) Intranet (1mk) ……………………………………………………………………………………………………………………………………………………………………………………………

9) Distinguish between data privacy and data integrity (2mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

10)

a) Define the following as used in Ms Excel (1½mks)

i) Labels ……………………………………………………………………………………. …………………………………………………………………………………………

ii) Values …………………………………………………………………………………… …………………………………………………………………………………………

iii) Functions ……………………………………………………………………………… …………………………………………………………………………………………

b) Explain the following terms as used in reference to computer memory and size (2mks)

i) Bit ………………………………………………………………………………………… …………………………………………………………………………………………….

ii) A nibble ………………………………………………………………………………… ………………………………………………………………………………………….

iii) Byte ……………………………………………………………………………………… ……………………………………………………………………………………………

iv) A word …………………………………………………………………………………… ……………………………………………………………………………………………

11) Define a computer system (1mk) ………………………………………………………………………………………………………………………………………………………………………………………………….

12) State and explain three components of the computer system (3mks)

i) …………………………………………………………………………………………………………………………………………………………………………………………

ii) ………………………………………………………………………………………………………………………………………………………………………………………….

iii) ………………………………………………………………………………………………………………………………………………………………………………………….

13) State four functions of an operating system (2mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

iv) …………………………………………………………………………………………….

14) List three factors to consider when choosing an operating system (3mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) ……………………………………………………………………………………………

15) Covert 37.37510 to binary (2mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

SECTION B (60 MARKS)

Answer question 16 and any other three from this section

16)

a) Draw a flowchart for a program used to enter two numbers. The program should find the sum and average then display the output on the screen (6mks)

b) Write a pseudo code to represent the flowchart drawn above (6mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

c) State the three groups targeted when documenting a program (3mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

iii) …………………………………………………………………………………………….

17)

a) Use the spreadsheet below to answer the questions that follow:

A B C D E
1 NAME POSITION GRADE SALARY
2 Opondi Manager 1 70,000
3 Njeri Cook 7 12,000
4 Ruto Clerk 3 25,000
5 Rono Watchman 8 10,000
6
7

Write a formula in the appropriate cells using cell referencing to obtain

i) Total number of employees (1mk) ………………………………………………………………………………………………………………………………………………………………………………………..

ii) Amount spent on salaries (1mk) ……………………………………………………………………………………………………………………………………………………………………………………….

iii) Minimum salary paid (1mk) ………………………………………………………………………………………………………………………………………………………………………………………..

b) State two ways of erasing the contents of a cell in a worksheet (2mks)

i) ……………………………………………………………………………………………

ii) ……………………………………………………………………………………………

c)

i) What is a system (2mks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

ii) State and explain four characteristics of systems (8mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

18)

a) Define the term feasibility study and explain four types of feasibility study (10mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

b) Discuss fully the interview method of gathering information (5mks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

19)

a) Explain three methods of data processing (6mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

b) Explain three changeover strategies used in implementing a new system (6mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

c) Using two’s complement, calculate 35 – 15 in binary form (3mks) …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

20)

a) What are likely causes of data and program loss in a computer (6mks) ……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

b) How can one safeguard his computer against data and program loss? (6mks) ………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

c) What are the circumstances which may lead to developing of a new information system? (3mks)

i) ………………………………………………………………………………………………………………………………………………………………………………………..

ii) …………………………………………………………………………………………………………………………………………………………………………………………

iii) ……………………………………………………………………………………………………………………………………………………………………………………….

 
Leave a comment

Posted by on September 9, 2010 in Computer Science, Paper 1

 

Tags:

 
%d bloggers like this: