COMPUTER STUDIES
PAPER ONE
(ii) Second generation
(i) Standard furniture in the laboratory
(ii) Antiglare screen/monitor
(iii) UPS
(i) BIOS
(ii) POST
(b) Differentiate between:-
(i) Backspace and delete keys on the keyboard
(ii) Insert and type over mode
(i) ALU
(ii) Control unit
(iii) Primary memory
(b) Distinguish between compilers and interpreters
(b) Distinguish between impact and non-impact printers citing one example in each
(i) Speech recognition
(ii) Touch screen
(b) Explain the following functions of the operating system :-
(i) Job scheduling
(ii) Interrupt handling
COMPUTER STUDIES FORM 1 NOTES FREE
Computer Studies Schemes of work term 1-3, Form 1-4
Computer Studies Notes Form 1, 2, 4 and 4- Free Download
COMPUTER STUDIES NOTES FORM 1-4
(i) Disk formatting
(ii) Disk defragmentation
(i) Multi-user
(ii) Multi-tasking
(i) Text wrap
(ii) Word wrap
(b) Differentiate between the following combinations of terms:-
(i) Filtering and sorting
(ii) Relative and absolute cell referencing
(i) Filtering and sorting
(ii) Relative and absolute cell referencing
simple program that would help do the following:-
(a) Enter the names of students and marks obtained in 8 subjects; maths, English, Kiswahili,
Biology, Chemistry, Business Studies, History and Computer Studies.
(b) After entering each subject mark the program should calculate for each student
(c) Depending on the average mark obtained, the program should assign the grades as follows:-
Between 80 and 100 = A
Between 70 and 79 = B
Between 60 and 69 = C
Between 50 and 59 = D
Below 50 = E
(d) The program should display each students name, total marks and the average grade. Using a
flow chart, show the design of the program
(i) Protocol
(ii) Website
(iii) Search engine
(iv) Spam mail
(b)List three examples of search engines
(c) Identify the functions of the following devices in data communication:-
(i) Modem
(ii) Network interface card
(iii) Brouter
(d) Describe bounded and unbounded forms of communication giving two examples
in each case
(e) Outline four advantages of using fibre optic cables
(i) Amplitude
(ii) Frequency
(iii) Nibble
(iv) Byte
(b) Perform the following 11111.11112 + 100001.10102 – 1111.001112
(c) Using two’s complement subtract 73 from 115 and convert the answer to decimal notation
(d) Identify the duties of the following ICT specialists
(i)Software engineer
(ii) System analyst
(e) List two types of opportunities available in the field of computer hardware
(i) Logical and physical files
(ii) Master and backup files
(b) Explain the following computational errors
(i) Truncation
(ii) Overflow
(iii) Rounding errors
(c) Define data integrity and state three ways of minimizing threats to data integrity
(d) Define virtual reality and state three ways of minimizing threats to data integrity
(e) Discus how computers are used in reservation systems
(i) Problem recognition
(ii) Coding
(iii) Implementation
(b) Explain the following changeover methods:-
(i) Direct
(ii) Parallel
(iii) Phased
(c) Explain two advantages of modular programming
(d) Explain how the use ICT may affect the society
(e) Explain the four main areas of artificial intelligence
*MAT*
namely; thieves, burglars, terrorists, hackers and cracker. Briefly explain difference between
hackers and crackers
(c) End followed by down arrow key
(d) Shift + Enter
(a) .co.ke
(b) .ac.uk
(c) .or.ug
working.
| Nambwaya | 59 | 60 |
| Murono | 60 | 62 |
| Kisiang’ani | 79 | 46 |
| Makhanu | 41 | 84 |
(b) Explain the relevance of foreign key in a database entity
computer resources
(a) Capturing still images
(b) Printing detailed architectural designs
(c) Playing flight and driving games
(d) Capture data at ATM
(a) Surf
(b) Compose
(c) Cookie
calendar other than MS Word
cell F10
base is not less than 10cm
(a) Your working what will be output if the following was entered?
Lutomia 65 50 46 77 76
Naibei 60 80 55 81 10
Nambwaya 80 15 40 82 60
Makhanu 50 35 70 40 43
Kisiang’ani 30 70 55 60 44
Murono 60 45 43 77 30
(b) Write a pseudo code equivalent for the above flowchart modifying it to compute result
of 100 students.
(c) Name any two control structures used in the flowchart above
(b) Perform the following arithmetic operations
(c) Name at least two areas where the following processing modes are used
(d)Write the alternative name of the following types of software
(a) Bespoke
(b) Vendor-off-the-shelf software
(b) Hassan was designing in out screens for the new school database management system.
Outline three factors she MUST consider during the designing
(c)State four difference between Low-level and High-level languages to a programmer
(d) Name any four public universities that offer computer courses at degree level
of where used, explain each of these communication modes
(b) Distinguish between “wrap text” and “shrink to fit” as used in Microsoft Excel data
formatting
(c) Safaricom has implemented broadband as their modem communication technique. Explain
the meaning of broadband communication
(d) Continuous use of computers has adverse health effects. State five ways of averting these
effects
as applied in expert systems. Explain three components of expert systems
(b) Distinguish between job replacement and job displacement
(c) State four ways in which threats to data integrity may be minimized
(d) Name two programming languages in each of the following:
*KKE*
(b) Convert 11.0112 to a decimal Number. (2 mks)
(i) Cracking. (1 mk)
(ii) Hacking (1 mk)
(b) State any two laws governing the information. (2 mks)
(b) What is cell replacing? (1 mk)
(a) Optical disk. (1 mk)
(b) Magnetic disk (1 mk)
Answer question 16 (Compulsory) and any other three questions in the spaces provided.
(i)
(ii)
State the looping structure demonstrated in
(b) State four examples of third generation languages.
(c) Define the following terms as used in programming.
(i) Assembler
(iii) Translator
(ii) Compiler
(iv) Interpreter
(d) Jokins retailers has two categories of customers processing category. “A” obtain 10%discount
on all orders upto Kshs. 10,000. Otherwise the discount is 20% on entire order. Category “B”
obtains 30% on all orders if the debt payment records is good otherwise the discount is 15%.
Write a pseudo code for the order processing. (9 mks)
Employee Employee Details
Field Data type Field Date type
Employee Name Text Employee No. Number
Employee Number Auto Number Date employed Date / Time
DOB Date/ Time Department Text
Address Text Salary Currency
(i) Which of the tables is likely to be the parent table? (1 mk)
(ii) It is advisable to ‘enforce referential integrity’ when creating a relationship. When creating a
relationship, what do you understand by the term referential integrity? (2 mks)
(iii) The field ‘employee no’ in the employee details table is likely to be the primary key.
What is a primary key? (2 mks)
(iv) Which fields in both tables is not appropriate for creating a relationship? (1 mk)
(v) What would make the relationship between the tables fail to work? (2 mks)
(b) In database, the field properties specify finer details related to the fields and the table entries
expected. State four field properties. (4 mks)
(c) State three functions of a database. (3 mks)
A
|
|
B
C
(i) Identify the network topologies. (3 mks)
A …………………………………………………………
B ………………………………………………………….
C …………………………………………………………..
(ii) In topology A, identify the network device that should be at the end points 1 and 2.
(iii) Which of the above topologies is likely to be used in a wide area network? (1 mk)
(iv) Highlight three disadvantages of topology B. (3 mks)
(v) Identify the device labeled x in topology A. (1 mk)
(b) State two main classes of network surface. (2 mks)
(c) Briefly describe the following as used in networking.
(i) Repeaters. (4 mks)
(ii) Network hub
(iii) Fibre optic cables
(iv) Network Interface Card (NIC)
(b) State four devices under direct control of the operating system. (2 mks)
(c) Briefly describe the following terms of computational error. (5 mks)
(i) Truncated
(ii) Transposition
(iii) Transcription
(d) Explain three most commonly used coding schemes. (3 mks)
(e) Distinguish between online and real time processing. (2 mks)
(f) State one advantage and two disadvantages of command line interface. (3 mks)
(ii) Describe the following terms. (2 mks)
Links
URL
(b) The following is a spreadsheet relating to a farmer.
A B C
1 Crop Amount
2 Maize 150
3 Bean 300
4 Cashew nuts 850
5 Cabbages 1036
(i) A function = IF (B2<200, “Not viable”, IF (B2 > 300 “Moderate”, IF (B2> 1000, “viable”))))
Give the appropriate result returned in cell C2, C3, C4 and 5. (2 mks)
(c) Text can easily be selected using a mouse in word processing. How do you select;
(i) Multiple paragraphs? (2 mks)
(d) (i) Distinguish between a widow and an orphan in word processing. (2 mks)
(ii) Cut and copy commands.
(e) Give one purpose of drop caps on a text paragraph. (2 mks)
(f) Give two application of expert systems. (2 mks)
*RCH*
(b) Give two features of data integrity. (1 mk)
(a) Thermal ………………………………………………………………………………………….
(b) Electrostatic printer ……………………………………………………………………………….
(c) Laser printer ……………………………………………………………………………………..
show an example of a spreadsheet which was used to calculate the minimum, maximum and Total
of the total price.
| A | B | C | D | |
| 1. | BOOK | UNIT PRICE | COPIES | TOTAL PRICE |
| 2. | Computer Studies BK 1 | 250 | 70 | |
| 3. | Computers Studies BK 2 | 275 | 50 | |
| 4. | Computer Studies BK 3 | 280 | 60 | |
| 5. | Computer Studies BK 4 | 320 | 70 | |
| 6. | ||||
| 7. | Minimum | |||
| 8. | Maximum | |||
| 9. | Total |
(i) Cell D7
(ii) Cell D8
(iii) Cell D9
(b) Format all the numeric figures to US Dollar symbol and 2 decimal places. (1 mk)
(b) List any four characteristics of a system. (2 mks)
(a) Multitasking. (1 mk)
(b) Single user. (1 mk)
(a) Backspace Key. (½ mk)
(b) Space Bar Key. (½ mk)
(c) F1 Key. (½ mk)
(d) Insert Key. (½ mk)
(b) Define the term ‘Algorithm errors’ as used in object oriented programming. (1 mk)
(ii) Explain the term “hypertext.” (1 mk)
(b) Give two examples of search engines you know. (1 mk)
(b) Distinguish between an accumulator and an address register. (2 mks)
(b) List any two documents that are involved in mail merging. (2 mks)
her deports. The rates are as follows:- Grade A = Kshs. 20.00 per Kilograms and Grade B = Kshs.
10.00 per kilogram.
(a) Write an algorithm and pseudo code for the above program. (5 mks)
(b) Draw a flow chart for the above program. (5 mks)
(c) A school has two sets A and B. Write a structure algorithm to read a set and the points
awarded for winning each race in an athlete final terminated by “C”. Calculate and print the
total points gained by each set appropriately labeled. (5 mks)
(b) (i) What do you understand by the term normalization as used in Ms Access database? (1 mk)
(ii) What is an input mask in a database? (1 mk)
(c) (i) What is a query? (2 mks)
(ii) Differentiate between an action query and select query? (2 mks)
(d) (i) Differentiate between a Primary key and an Index key. (2 mks)
(ii) What is the difference between a field name and a Caption? (2 mks)
(iii) Differentiate between Columnar and Tabular form. (2 mks)
(ii) Define the VSAT technology. (1 mk)
(iii) List any four examples of network operating systems. (4 mks)
(iv) State any three advantages of coaxial cables in a computer network. (3 mks)
(v) State any three devices used in data communications. (3 mks)
(vi) Differentiate between a router and a brouter. (2 mks)
(b) Define the term “ Protocol” as used in networking. (1 mk)
(i) CD. (1 mk)
(ii) DIR/P/W (1 mk)
(iii) Input devices are classified according to how they are used to enter data. Can you list five
classifications based on this. (5 mks)
(b) Name and explain four types of human computer interfaces. (4 mks)
information. (2 mks)
(ii) Give two examples of anti-virus software you know. (2 mks)
(i) Convert 91B16 to Octal. (3 mks)
(ii) 37610 to hexadecimal. (3 mks)
(i) 1110.0111 + 1101001.011 (3 mks)
(ii) 1001011.011 – 111.111 (3 mks)
(c) Convert 298.12510 to hexadecimal equivalent.
*KKE*
entrepreneurs
system
(b) Give two reasons for partitioning a disk
Enter the formulae as they would appear when copies to cell F15 of the same spreadsheet
| FORMULA IN C10 | FORMULA IN F15 |
| =A5*B5 | |
| =4*B$6 |
(b) List the three components that make up an expert system
storage media
Tracking
Kerning
http:/www.kakamega.com
studies student then get the subject mean
iii) Translators
(b) Briefly describe the following elements of a computer file;
(i) Character
(ii) Field
(iii) Records
(c) Explain the functions of;
(d) Differentiate between
(i) Real-time processing mode and batch processing
(ii) Distributed data processing mode and multiprocessing mode
iii) Computer operator
(b) Define the following terms
(c) Give two advantages of networking (d) Explain the line of sight principle in wireless communication
(e) What’s the work of the following in networking?
(i) Crimping tool
(ii) Network interface card
iii) Network neighbouring icon
(b) Describe three types of computer virus
(c) Explain the following terms as used in data security
i ) Eavesdropping
iii) Industrial espionage
*UGU*
(ii) Calculate the sum of the second and the fourth digits (i) above (1mk)
1010.101 + 11.011
(i) Primary key and foreign key (1mk)
(ii) What is cell referencing (2mks)
(ii) Differentiate between peer to peer and client server (2mks)
(a) What would the following generate as output if the value of N at input was:
(i) 6?
(ii) 1?
(b) Write a pseudo code that does the same thing as the flow chart above (15mks)
(c) Text can be select using a mouse processing. How do you select
(i) Multiple paragraph
(ii) Vertical text
(d) Distinguish between:
(i) A widow and an orphan in word processing
(ii) Cut and copy commands
(e) Give one purpose of drop caps on a text paragraph
(f) (i) What is an expert system?
(ii) Give two applications of expert systems
as shown below:-
| A | B | C | D | E | F | G | H | |
| Name | Class | Maths | Science | IT | English | Av. Mark | Pass/Fail | |
| 1 | Allen | 11A | 33 | 24 | 19 | 44 | 30 | |
| 2 | Dyos | 11B | 41 | 54 | 70 | 31 | 49 | |
| 3 | Keg | 11A | 82 | 69 | 57 | 52 | 65 | |
| 4 | Khan | 11C | 44 | 21 | 50 | 85 | 50 | |
| 5 | Kolacz | 11A | 73 | 51 | 73 | 51 | 62 | |
| 6 | Lenski | 11B | 17 | 41 | 40 | 34 | 33 | |
| 7 | Peruza | 11C | 87 | 72 | 64 | 61 | 71 |
could be done
(iii) The IT results need to be sorted so that the highest mark is at the top. Describe how this sort
(iv) The formula IF (G5>45, “PASS”, “FAIL”) is entered in cell H5. What output appears?
(v) State the validation check that should be carried out on data entered in cells C2 to F8 to ensure
values over 100 are not input (15mks)
(ii) Describe the following internet terms:-
Links …………………………………………………………………………………………………..
URL……………………………………………………………………………………………………
(b) The following is a spreadsheet relating to a farmer
| A | B | C | |
| 1 | Crop | Amount | |
| 2 | Maize | 150 | |
| 3 | Bean | 300 | |
| 4 | Cashew nuts | 850 | |
| 5 | Cabbages | 1036 |
(i) A function = IF(B2<200,”Not
Viable”), IF(B2>300, “Moderate”), IF(B2>1000,” Variable”))).
Give the appropriate result returned in cells C2, C3, C4, and C5
(i) Multiple paragraph
(ii) Vertical block of text
(d) (i) Distinguish between widow and an orphan processing
(ii) Cut and copy commands
(e) Give one purpose of drop caps on a text paragraph
(f) (i) What is an expert system?
(ii) Give two applications of expert systems
(b) Using two’s complement, subtract 4 from 7 and give your answer in decimal notation
(c) An organization is planning to develop a new information system to manage its operations.
(i) Explain the following characteristics of a system
Holistic thinking
System entropy
(ii) List four tools that could be used in designing the information system during the design stage
(d) Explain any three threats to data and information
(e) Explain the purpose of the following types of program documentation
(i) User manual
(ii) Reference guide
(b) State four devices under direct control of the operating system
(c) Briefly describe the following types of computerized errors:
(i) Truncated
(ii) Transposition
(iii) Transcription
(d) Explain three most commonly used coding schemes
(e) Distinguish between online and real time processing
(f) State one advantage and two disadvantages of command line interface
*MUM*
(b) List four examples of registers.
(i) It is taking a longer time to start up.
(ii) It is often hanging
(iii) Applications are taking long to load.
State three possible causes of these problems and how they can be solved.
good, fair and fail depending on the average mark. Write a formula that can be used to count all
students that have the remark “very good”.
days. The income from Monday to Friday was Ksh.4,000, 9,000,15,000 and 20,000 respectively
while expenditure for some period was Ksh.2000,3000, 7000, 5000 and 6000 respectively.
(a) Draw a spreadsheet that would contain the information. Indicate the rows as 1 , 2, 3 and 4 and
the column as A,B,C
(b) State the expression that would be used to obtain:
(i) Monday profit.
(ii) Total income
(iii) Highest expenditure.
(a) Software suite
(b) Shareware
(c) Groupware
(d) Integrated software
(b) Using two’s compliment subtract 7 from 40 and give the answer in decimal notation.
(b) State the looping structure demonstrated in
(c) List any four methods of detecting and correcting programming bugs.
(d) Draw a flowchart for a program that can be used to add any positive integers that can be keyed
into the computer through the keyboard. The program should count the positive numbers entered
and should be terminated when a zero is keyed in.
TABLE 1 TABLE 2
Field Data type Field Data type
Employee number Text Employee number Number
Employee Name Auto number Data employed Date/time
D.O.B Date/time Department Test
Address Test Salary Currency
(i) Which of the two tables is likely to be the parent table? *MUM*
(ii) It is advisable to enforce referential integrity when creating a relationship. When creating a
relationship, what do you understand by the term referential integrity? *MUM*
(iii) The field “employee No” in Table 2 is likely to be the primary key.
What is a primary key?
(v) What will make the relationship between the tables fail to work? *MUM*
(b) In databases, the field properties specify finer details related to the fields and the entries
expected. State four field properties. *MUM*
(c) State three functions of a database. *MUM*
(b) Describe the following internet terms. *MUM*
(i) Browsing
(ii) Web portal
(iii) Home page
(iv) Hyperlink
(v) Uniform resource locator
(c) The following spreadsheet is relating to a farmer.
| A | B | C | |
| 1 | Crop | Amount | |
| 2 | Maize | 150 | |
| 3 | Beans | 300 | |
| 4 | Cashew nuts | 850 | |
| 5 | cabbages | 1036 |
(i) A function = IF (B2< 200, “Not viable”, IF(B2>300,”moderate”, IF(B2> 1000, “VIABLE”))).
Give the appropriate result returned in cells C2, C3, C4 and C5.
(d) List any three functions of the control unit.
(b) State four characteristics of Random access memory.
(c) Describe the following data security measures
(i) Log files
(ii) Fire walls
(iii) Antispyware
(iv) Audit trial
(b) List two types of transmission media
(c) Distinguish between a Hub and a switch.
(d) With help of a well labeled diagram, describe the fibre optic cable
(e) What are the functions of the following devices on a network?
(i) Repeaters
(ii) Network interface card
(iii) Router
(f) Distinguish between physical topology and logical topology as used in Networking
*KSM*
(b) Games programs can be purchased from computer stores on CD-ROM. State two
advantages of CD-ROMS over floppy disks (2mks)
(b) Define the terms program documentation (1mk)
(c) List program control structures giving examples (3mks)
(i) Dir/p
(ii) Dir/w
(b) Write one command that can be used to format a diskette and copy system files to it (1mk)
each could be used. (2mks)
(b) A company has 5000 CDs, video and books in stock each items has a unique 5 digit
code with the first identifying the type of item i.e.
1=CD
2=DVD
3= video
4=Book
For example, for the code 15642 the 1 identifies that it is a CD, and for the code 30055 the 3 identifies these it is a video
Write an algorithm, using pseudocode or otherwise, that
-inputs the code for all 5000 items
-validates the input code (12mks)
offered by the universities (3mks)
(b) Describe three duties of each of the following computer specialists :- (6mks)
(i) Database administrator
(ii) System analyst
(c) Information technology has bought about a lot of concern in people’s lives-social effects,
list three arguments for and against information technology (3mks)
(d.) Repetitive strain injury happens when one overuses the computer keyboard or mouse.
Causing inflammation or injury on muscles or tendons .Describe three measures users
can apply to prevent or reduce RSI (3mks)
receive new computer whose specifications are given below:-
Pentium IV 2.8GHz processor
40GB HDD
31/2 FDD
256 MB RAM
568CD ROM
17” SVGA TFT monitor
The computers are gong to be networked and will be able to browse the internet.
(a) Explain what is meant by the terms:- (2mks)
(i) FDD
(ii) HDD
(iii) SVGA
(iv)TFT
(b) The computer is to be networked, name one extra device that should be fitted on every
computer to enable this to happen (1mk)
(c) The computer is to receive internet facilities through the server on a dial; up system. Name
and describe the function of a special device that needs to be connected to the server to
complete the connection (1mk)
(d) (i) The school has to apply he star topology to link up the computer. List two advantages
of this type of topology (1mk)
(ii) Name the central device used to connect the computers in this topology. (1mk)
(e) List two other types of topologies that the school could have opted for (1mk)
(f) List four advantages of using a network (2mks)
(g) (i) Data transmission via the internet is done using a mode known as packet switching.
Describe this data transmission mode (1mk)
(ii) Name two other modes of data transmission (1mk)
(h) (i) The school’s LAN is done using UTR cable. List two disadvantages of using this
type of cable. (1mk)
(ii) List two advantages of using fibre cable in networking (1mk)
(j) Data flows in the school’s LAN in a duplex manner. Discuss two other type of data
transmission in network giving examples (2mks)
(b) List four advantages of using database systems (2mks)
(c) In a data base system, data integrity ensures the correctness and completeness of the data
in the database. Differentiate the following types of integrity constraints:-
(i) Validity integrity (1mk)
(ii) Entity integrity (1mk)
(iii) Referential integrity (1mk)
(d) Briefly describe the three database models :- (3mks)
(i) Hierarchical model
(ii) Network model
(iii) Relation model
(e) Using diagrams describe the following three types of relationships (3mks)
(i) One –on- one
(ii) One –to- many
(iii) many-to-many
(f) File organisation refers to the arrangement of records on secondary storage. Briefly
describe the following file organization methods:- (3mks)
(i) Sequential
(ii) Random /direct
(iii) Serial
(b) What is virtual reality? (1mk)
(c) List three component of a virtual reality gear (3mks)
(d) By giving an example define:-
(i) A smart terminal (2mks)
(ii) An embedded computer (2mks)
(e) State three factors to consider when selecting a UPS (3mks)
(f) Give two uses of computer in stock exchanges (2mks)
*TZM*
(ii) Function keys (1mk)
(i) Explain the importance of microphones combined with speech recognition device such
as voice output. (2mks)
(ii) State the main disadvantage of the above method of data input. (2mks)
hard disk or Winchester disk. Give reason as to why they are popular (2mks)
before implementation. (1mk)
iii) Cache memory……………………………………………………………………………………………………………….
(ii) List any two sources of graphic that can be used in Microsoft word. (1mk)
Constants (1mk)
Variable (1mk)
(b) Distinguish between dummy data and real data as used in system testing (2mks)
(c) Mr Lugeno borrowed a loan of 200,000 from Ndege chai cooperative society at a rate
of 10%payable in 2 years flat rate. Draw a flow chart that can be used to develop a
computer program that will keep track of monthly repayments (5mks)
(b) Explain two ways of protecting data and information against unauthorized access (4mks)
(c) Explain two functions of network operating system. (4mks)
(d) Differentiate between a repeater and a router as used in computer networking. (2mks)
(e) List down three duties of a computer trainer (3mks)
(b) State four basic requirements of a standard computer laboratory (4mks)
(d) (i) Differentiate between video conferencing and telecommuting as used in communicating
system (2mks)
(ii) Highlight two advantages of telecommuting (2mks)
(i) Sequential and serial file organization methods. (2mks)
(ii) Random and indexed sequential file organization methods (2mks)
(b) Explain the following types of data processing modes
(c)Define the following terms
(d) State three breakthrough of Information Communication Technology (ICT) in
health care (3mks)
(e)List any two under graduate programs offered in public universities in Kenya (2mks)
(c) List the seven stages of System Development Cycle (SDLC) (7mks)
PAPER TWO
*NYR*
QUESTION 1
M/s Ann Momanyi, an ICT consultant with Makueni Distributors is in the process of developing a Management Information System (MIS) for the Company. Currently, she is designing sales database using three tables namely: – customers, products and transactions. The details for each table are given below:-
Customers Products Transactions
Customer ID ProductID TransID
CustomerName ProductDescription ClientName
PostalAddress Packaging TransacDate
Town UnitPrice Product
Phone Stock Quantity
Questions
(a) Create a database named MIS and in it create three relations
(b) Identify the most appropriate field as the primary key in each table
(c) Establish relationships among the three tables and enforce the referential integrity
(d) Create a form for each table. Save the forms as Customer Form, Product Form and
Transaction Form
(e) Use the respective forms to enter the following records in each table
CUSTOMERS TABLE
| CustomerID | Customer Name | Postal Address | Town | Phone |
| H001 | Andrew Mwove | 209 | Mutituni | 200870 |
| H002 | Erick Onsongo | 68 | Nyamira | 248567 |
| H003 | Brenda Nyabuti | 100 | Bomet | 789678 |
| H004 | Lydiah Winzaa | 250 | Mwingi | 778009 |
| H005 | Jeff Ogero | 330 | Keroka | 666790 |
| H006 | Maureen Makuthu | 550 | Kakeani | 780906 |
PRODUCTS TABLE
| ProductID | Product Description | Packaging | Unit Price | Stock |
| AA001 | Cooking Oil | 20 kg Gal | 16000 | 80 |
| AA003 | Rice | 50Kg Bags | 4500 | 60 |
| AB004 | Detergents | 5 Litres | 11000 | 40 |
| AC006 | Fertilizer | 50Kg bags | 4700 | 30 |
| AA007 | Mineral Water | 1.5 Litres | 8200 | 400 |
TRANSACTION TABLE
| CustomerID | ClientName | TansacDate | Products | Quantity |
| 1001 | Andrew Mwove | 06/04/2007 | Cooking oil | 6 |
| 1002 | 26/04/2007 | Mineral water | 8 | |
| 1003 | Erick Onsongo | 23/04/2007 | Detergents | 10 |
| 1004 | Maureen Makuthu | 14/04/2007 | Cooking oil | 12 |
| 1005 | 02/05/2007 | Rice | 4 | |
| 1006 | 08/05/2007 | Fertilizer | 3 | |
| 1007 | Erick Onsongo | 16/05/2007 | Detergents | 25 |
(f) Create a query that displays the customer Name, Product Description, Quantity, Unit price and a
calculated field total payable by each customer. Save the query as MISQuery
(g) Generate a report from MISQuery. Save the report as MISReport
(h) Print the Customers, Products, Transaction table’s design, MISQuery and MISReport
QUESTION 2
Using DTP software design the publication based on the following instructions to appear as it is
1) Set the page to have portrait orientation and margins to be as follows;
(a) Format the heading: BISELEX BUSINESS” to bear the following features:-
(b) Font type: Copperplate Gothic
(c) Font size: 26
(d) Background color: grey
(f) Alignment: centered
2) Format the heading “New Arrivals for new generations’ to bear the following features:-
(a) Font type : Monotype corsiva
(b) Font size: 22
(c) Alignment: Centered
(d) Border style: 6pt
(e) Rotate it appropriately
3) Format the heading “All Under One Roof” to bear the following features:-
(a) Underline style: words only
(b) Font type: Arial Narrow
(c) Font size: 20
(d) Alignment: centered
(e) Rotate it appropriately
4) Format the text below the heading “Motto : Customer Satisfaction” to be in three columns
and format it as follows:-
1st column
2nd column
iii) Bullet the listed items appropriately
3rd column
5) Insert the rounded rectangle and format its heading to :
(i) Underline : Double
(ii) Font type: Arial Black
6) Format the text under the heading “LOCATION” as follows:-
(i) Font type: Castellar
(ii) Font size: 9pts
7) Insert the suitable picture as it appears in the publication
8) Insert the header to bear Your Name and the Footer to bear Your Index Number
*MAT*
Question 1
(a) Wafula is a secretary for all clubs in the school. He has been told to create Club_DBMS id database
management system (DBMS) to help the club maintain record on the clubs’ members.
| Relation name | Fields | Primary key |
|
Student | Admission Number |
Admission number |
| First Name | ||
| Last Name | ||
| Form | ||
| Stream | ||
| Club_Details | Club Number | Club Number |
| Club Name | ||
| Date established | ||
| Membership | Registration Number | Registration Number |
| Club Number | ||
| Admission Number | ||
| Date of registration | ||
| Membership fee |
(a) Perform the following operations just like Wafula would:
(i) Create a database Club_DBMS with the tables shown above. (12mks)
(ii) Index on last name on the able student (2mks)
(iii) Crate a lookup list for the following fields in class student (3mks)
| |
| Field | Lookup list |
| Field | Lookup list | ||
| Form | One | Class | East | |||
| Two | North | |||||
| Three | West | |||||
| Four | South |
(iv) Create One-Many relationship between the relations and enforce referential integrity (3mks)
(b) Create use friendly screen inputs with the Add New Record, Find Record, Delete Record and
Close Screen Input commands for each of the table, save them using respective table’s name (12mks)
(c) Using the input screens, enter the records below: (6mks)
| Admn. No. | First Name | Last Name | Form | Stream |
| 3200 | Busaule | Mwitani | Two | East |
| 3811 | Mawi | Martha | One | South |
| 2844 | Nambwaya | Nancy | Four | East |
| 2910 | Wafula | Victor | Four | Central |
| 3295 | Hassan | Eunice | Three | East |
| 2956 | Busolo | Josephat | Three | North |
| 2977 | Makhanu | Josephat | Four | South |
| 3216 | Mateshe | Jackline | Three | West |
| Club Number | Club Name | Date established |
| 97/Mat | Mathematics | 05/02/1997 |
| 02/Sci | Science | 08/04/2002 |
| 01/Env | Environment | 01/09/2001 |
| 97/Lan | Debate | 08/04/1997 |
| Reg. Number | Admn. No. | Club No. | Reg. Date | Membership Fee |
| MT/0013 | 2844 | 97/Mat | 12/03/2007 | 100 |
| SC/0189 | 2977 | 02/Sci | 11/03/2007 | 120 |
| MT/0975 | 2910 | 97/Mat | 05/05/2007 | 100 |
| DB/0111 | 2977 | 97/Lan | 11/03/2007 | 90 |
| EN/1001 | 3811 | 01/Env | 01/03/2010 | 80 |
| SC/0998 | 3216 | 02/Sci | 09/10/2008 | 120 |
| SC/1006 | 2844 | 02/Sci | 12/03/2007 | 120 |
| DB/0565 | 3295 | 97/Lan | 10/05/2008 | 90 |
(c) Create a query for each record containing the product of membership fees $ multiplied by 79.8.
Label this column “Amount in shillings”. The query should display: Last Name (in ascending order),
First Name, Registration Number, Date of Registration, Amount in shillings. For all members whosel
last name start with M or J and first name start with M save the query as Query M (8mks)
(d) Create a query that Display Admission Number, Last name, first Name, Club Names and
Registration date for form four students. Save query as Members (3mks)
(e) Create a tabular report from Query-M that displays Last Name, First Name, Membership Number,
Date of Registration, Membership Fees paid in shillings and display the total to the membership fees
at the end of the report. Save the repo\rt as “Membership Report” (5mks)
| Admn. No. | First Name | Last Name | Form | Stream |
| 3200 | Busaule | Mwitani | Two | East |
| 3811 | Mawi | Martha | One | South |
| 2844 | Nambwaya | Nancy | Four | East |
| 2910 | Wafula | Victor | Four | Central |
| 3295 | Hassan | Eunice | Three | East |
| 2956 | Busolo | Josephat | Three | North |
| 2977 | Makhanu | Josephat | Four | South |
| 3216 | Mateshe | Jackline | Three | West |
(f) Create a tabular report from Members query, sort the records by first name and save it as
Club Members. (4mks)
(g) On each report, add your name, index number and page number in the format “Page X of Y
pages” as footer (4mks)
(h) Add “Mary Seat of Wisdom Bulimbo Girls’ Sec. School” and Report Name as Header on
each report (2mks)
(i) Print membership Report, Club Members, Query-M and Student table (4mks)
Question two
(a) Enter the following as it is onto worksheet and save it as the budget (7mks)
| A | B | C | D | E | F | G |
| No. | Item description | Quantity bought | Unit price | Amount | Comments | Cost Rank |
| 1 | 2Kg Mumias Sugar | 4 | 210 | |||
| 2 | Sony 2HD floppy | 3 | 37 | |||
| 3 | Rapid spring file | 10 | 56 | |||
| 4 | 200pg A4 books | 9 | 89 | |||
| 5 | 1 litre Quencher | 2 | 256 | |||
| 6 | AIHAO Gelink pen | 15 | 55 | |||
| 7 | Omega dustless chalk | 18 | 105 | |||
| 8 | LG 2GB Flash Disk | 4 | 1055 | |||
| Total |
(b) Rename worksheet 1 as Budget and Worksheet 2 as My Graph (3mks)
(c) Insert two rows above labels in the budget 1 worksheet. Enter in the first row, a Word Art “
A sample Budget: Back to Business.” (4mks)
(d) Enter cell B2 and C2, VAT and 18% respectively (1mk)
(e) Calculate ;
(i) Using name referencing calculate the amount for each item (amount = quantity *price) (4mks)
(ii) Total quantity, price and amount using formulae (3mks)
(iii) Display “Thank for shopping” for amount above 500, “Almost in a draw” for amount
between 250 and 499, otherwise “Buy More” (4mks)
(f) Using column E, rank the items with the most costly ranked as the last (4mks)
(g) Format all values on the worksheet to two decimal places aligned right of cell and in
pounds (£) (3mks)
(h) Copy the information on Budget1 worksheet to workshet3. Rename corksheet3 as copied(2mk
(i) Save the workbook as Budget2 (1mk)
(j) Change respective quantities of items on budget 1 worksheet (1mk)
Sony 2HD floppy 18
200pg A4 books 12
(k) Using item name and taxes on Budget1 worksheet, create a line chart of item description and
amount on worksheet My Graph (8mks)
(l) Save the workbook as Final Budget and print the chart (2mks)
*MUM*
WORD PROCESSOR
format it accordingly. Use typeface Times New Romans, font size 12.
Format your document to fit exactly on one page. Save it as A: NET 1 (26marks)
NETWORKS MODELS
Networks can be organized into three basic models client/server, peer to peer and centralize computing. Client/Server and peer-to-peer are used with PC networks. While centralized computing models are used with mid-range and mainframe computers usually running a UNIX-based operating system. The peer-to-peer model is the simplest to implement and assemble. Client/server is the most popular configuration, because of its versatility and power drawing mainly from the vast variety and higher performance of specialized server hardware.
Central computing networks
The host is the core of the centralized computing model. Host computers typically run the UNIX operating system and can process multiple jobs simultaneously and in a very efficient manner. Jobs are initiated by the Terminal, which has no processing capability on its own and simply provides input/output for the host. The user logs into the host computer to process the user’s job; when the job is finished, the host computer sends the results of the job back to the terminal.
The main advantage of centralized computing is that they are the highest performance networks today. Its major disadvantages are:
Client/Server Networks
The client/server network is the workhorse of the network world and consists of at least one server with shared recourses and one or more clients which users do their work on. The server, often called the back end, stores and secures users’ files. It provides the single point of administration for network users, files, and applications. In a client/server network, the function of the server is to provide services, where as the function of the client is to provide the actual processing. Most client/server networks are built round a domain structure, where all servers within a given domain share a common administration scheme.
Peer-to-peer Networks
A peer-to-peer network is simply a group of computers that function as both servers and clients (share and access resources). In this type of network, a user works on a workstation and actually shares that workstation’s resources with other workstations.
Disadvantages
(b) (i) Bold face and italicize all the occurrences of the words client/server
(ii) Justify and set the left and right indents of the second paragraph at 1 inch.
(ii) Save the document as A: NET 2 (6mks)
(c) (i) Copy NET 1 passage to a new document
(ii) Present the document into two columns with a line between the columns. Introduce a
column break on the sub heading “Client/Server Networks” so that your second column
begins exactly with that header.
(iii) Save the new document as A:NET 3 (6mks)
(d) (i) Introduce double space in the last paragraph of NET 2
(ii) Search and replace the word “host” with “main” in the whole passage.
(iii) Save the document as A:NET 4 (6mks)
(e) (i) Animate the title of the passage of document NI-T4 to have a blinking background.
(ii) Convert the paper orientation to landscape and format your document to fit on one page.
(iii) Save the passage as A: NET5 (5mks)
(f) Print2. A stationery store keeps a record of all items sold in the store. The details are given
in table 3 table 3 below.
| Item code | Description | Quantity | Supplier |
| 005 001 009 007 010 006 002 003 008 004 | HBI pencils (doz) Stapler Photocopy paper (reams) Staples (packets) 120 pages (ex. Books) Spring files Diskettes HB2 pencils (doz) Foolscaps (reams) Chalk | 200 100 200 300 200 200 300 500 300 350 | Shah Shah Chania Vipingo Vipingo Shah Chania Shah Vipingo chania |
(a) Create a database structure containing the fields:
Item code
Description
Quantity
Supplier
(b) Enter the records as shown in table 3 into your database and save it as Stat 1. (l2mks)
(c) Modify Stat 1 to include the field for date received and save as Stat 2. (3mks)
(d) Items with cods 001, 007, 009 and 010 were received on 10/05/200 1. Items with codes
002, 005, and 008 were received on 12/05/2001 and the rest were received on 15/05/2001.
Enter this information on the date received field. (5mks)
(e) Sort Stat 2 on item code field in descending order and save it as Stat3. (6mks)
(f) Create a query to extract all items delivered by Shah on 15/05/200 1 and save as query 1.
(g) Using Stat 1, generate a tabular report titled “Stationery store items” and containing the
following fields in the order shown.
Supplier Description Quantity
Save the report as report 1
Print Stat1, Stat3, query 1 and report1 (8mks)
*TNW*
Q1. (a) Type the passage below as it appears using a word processing package and save it as A:\Bono1.
(Settings: Font Arial, font size 12 for all text, margins; top 0.5”, bottom 0.6”, left 1”, right 0.5”,
1st Heading Size 20, 2nd & 3rd Size 14 ). 36mks
WE MUST STRIVE FOR GREAT THINGS IN LIFE
one should leave legacy that speaks for years. Paul Hewson was in Nairobi recently. That won’t mean much to you, until I explain that I was referring to Bono, the world – famous lead singer of rock band U2 and campaigner against global poverty. Bono didn’t really make much noise while in Kenya. He attended the ëNation Mediaû group’s Pan Africa Media Conference, took H2o, talked to a couple of journalists and left.
He didn’t do the other things that visiting celebrities of his stature do when in Africa: adopt a cheetah or a baby hippo, start a school for orphans, shoot the breeze pointlessly with Emilio and Tinga, utter banalties about the girl child. Bono reserves his energy for other things.
Popular Media
Bono is not famous just for being a singer. For the past couple of decades he has been one of the most visible humanitarian activists, using his fame to enlist powerful allies from:
He has personally spearheaded the campaign for debt relief for the world’s poorest countries, and has been a vocal champion for Africa. Not everyone agrees with these efforts. Author Paul Theroux savaged Bono, Bob Geldof and other celebrity humanitarians, saying that creating “the impression that Africa is fatally troubled and can be saved only by outside help – not to mention celebrities and charity concerts – is a destructive and misleading conceit.”
I happen to agree with that view and have propagated it in writing for many years. I don’t think Africa’s
salvation will come from outsiders,
and it certainly won’t come from endless handouts and a crippling dependency culture.
On Trivia
What about you? How big is your life? Are you allowing your time on earth to be frittered away on trivia, or are you going to make a net positive impact on the planet? Are you doing something, anything bigger than yourself? Are you raising
a child to be a better person than you are? Are running a business or conducting a profession that sets a standard in good practice? Or are you content to be a small person imprisoned in a small life?
iii. Change the line spacing of the entire paragraph to double and convert it to landscape.(4mks)
c). Insert your name and index number as the header left aligned. (1mk)
d). Carry out word count on the document and write on the paper provided the number of:
e). Paginate the document using page x of y at the top center. (2mks)
f). Save the entire document as A:\Bono2 (1mk)
g). Print document A:\Bono2. (1mk)
Q2. The information in the following two tables relates to a vehicle buying and selling business.
Table 1: Seller details
| Seller No | Seller Name | Address | Town |
| 8215 | Samcon | 23454 | Nakuru |
| 8242 | CMC | 654 | Eldoret |
| 8430 | DCM motors | 3554 | Nairobi |
| 8620 | Farmers Garage | 7645 | Kitale |
| 8845 | KCI | 8643 | Kisumu |
Table 2: Vehicle details
| Reg No | Make | Type | Price | Seller No |
| KAJ 543Q | Nissan | Matatu | 1,200,000 | 8242 |
| KAQ 952R | Mercedes | Saloon | 4,000,000 | 8242 |
| KAX 534S | Peugeot | Pickup | 960,400 | 8620 |
| KAZ 454C | Mazda | Saloon | 550,000 | 8215 |
| KBA 386A | Toyota | Pickup | 750,000 | 8620 |
| KBB 917A | Toyota | Saloon | 800,000 | 8430 |
| KBE 875T | Isuzu | Lorry | 1,800,650 | 8430 |
| KBG 805G | Scania | Bus | 10,500,000 | 8845 |
| KBJ 324D | Isuzu | Bus | 9,200,000 | 8845 |
| KZL 931 | Toyota | Matatu | 1,400,000 | 8620 |
a). Create a database file named A:\Business. (2mks)
b). Create the two tables above and save them using their respective names. Determine the
appropriate primary keys. (10mks)
c). Create a form based on each table. Insert form titles as seller details form and vehicle
details form respectively. (5mks)
d). Use the forms to enter the records in the two tables as shown above. 15mks)
e). Create a query containing the following fields(Reg no, Make, price and Seller name). It.
Should display only those vehicles whose prices are above 1000,000. Save as Sales1. (6mks)
f). Remove the criteria set in sales1 query. Include a calculated field in the sales query to
derive new prices if the current prices went up by 5%. Save as sales2. (5mks)
g). Create a tabular report based on sales2 query. The report should show the total amount
collected from selling the vehicles if they were sold at their new prices. Save as report. (4mks)
*KKC*
QUESTION 1
(a) Type the following letter as it appears in a word processor. Use the mail merge feature to produce copies of the same letter to the persons whose details are given below:- (12 mks)
MWANGAZA HIGH SCHOOL
P.O. BOX 4800
ELDORET
8TH JULY, 2010
<NAME≥ <ADMNO≥
<ADDRESS>
<TOWN>
Dear <Name>
RE: 2009 KCSE RESULTS
I AM Happy to inform you that NOKDEC Examinations are out. Kindly arrange to visit our school on <<Date to visit > at 9.00 a.m. In order to know the details. Remember to carry your original K.C.P.E certificate and Examination register card bearing the index number.
Yours truly,
Headteacher
Data source (List of candidates)
| Name | Adm. No. | Address | Town | Date of visit |
| Mark Otieno | 8071 | P.O Box 24 | Sondu | 10/08/2010 |
| Kevin Kirui | 8089 | P.O. Box 172 | Kericho | 11/08/2010 |
| Benard Soi | 8065 | P.O. Box 84 | Bomet | 24/08/2010 |
Required:-
iii) Change addresses and reference font size to 14 points. (1 ½ mk)
and save it as Results 2009 (6 mks)
INTRODUCTION TO COMPUTERS & OPERATING SYSTEMS.
A computer is a machine or an electronic device that can solve problems by accepting
data, performing certain operations on that data (processing) and presenting the results
of those operations (information)
Basic characteristics that distinguish a computer from other information processing
devices:-
(i) A computer is electronic – That is, all its processing operations are carried out
with electrical signal.
(ii) A computer can store information for future reference. This is done on temporary
basis with memory circuits and permanently with storage devices such as magnetic
disks and tape.
(iii) Computer is programmable – unlike other devices built to perform a single function,
a computer can be instructed or programmed to perform a variety of tasks.
HOW A COMPUTER WORKS.
Connecting the data (raw facts) into information (organized, usable form) is called data processing. Data get into system by means of an input device e.g. keyboard then the computer performs the necessary calculations or manipulations on the data and finally the organized information is displayed by an output device e.g. a monitor.
FUNCTIONS PERFORMED BY A COMPUTER.
Although computers have many applications, they can perform only three basic tasks
(i) Arithmetic functions on numeric data (Adding, subtracting, multiplying and dividing).
(ii) Test relationship between data items (by comparing values).
(iii) Store and retrieve data.
These skills are really no more than people can do, but the computer can accomplish the task more;
– Faster
– Accurately
– Reliably
Required:-
(a) Align the title to the centre and underline it. (1 mk)
(d) (i) Insert the footer “Computer Assessment Test 2010.” (1 mk)
(ii) Insert the header “Your Name and the Index No.” (1 mk)
(e) Set the spacing to exactly 1.5 (4 mks)
(g) Search for words “computer” and replace all with “PC.” (2 mks)
(h) Move paragraph with heading “How a computer operates” to the end of the document.
(i) Set the front style of the document to Aerial black. (3 mks)
(j) Save your work as “computer literacy.” (1 mk)
(k) Print your document. (2 mks)
| NAME | CLASS | Adm No. | CAT1 | CAT2 | CAT3 | TOTAL | AVERAGE | CLASS POSITION | REMARKS |
| Maina Joan | E | 7984 | 80 | 70 | 59 | ||||
| Ken Korir | W | 7896 | 75 | 55 | 72 | ||||
| Benard K. | E | 8092 | 86 | 59 | 75 | ||||
| John Soi | E | 7460 | 80 | 79 | 70 | ||||
| Kipsang Bett | W | 7892 | 76 | 75 | 80 | ||||
| Mitei E. | E | 7800 | 38 | 48 | 25 | ||||
| Mark J. | W | 8490 | 37 | 51 | 29 | ||||
| Koech Ben | W | 8184 | 30 | 86 | 75 | ||||
| James W. | E | 8082 | 25 | 27 | 20 | ||||
| Abuya Ken | E | 8083 | 30 | 25 | 25 | ||||
| Leonard B. | W | 8047 | 39 | 24 | 25 |
(b) Enter the following data in sheet 1. (20 mks)
(c) Rename the sheet as Term One Results. (1 mk)
(d) Find:
(i) Totals (2 mks)
(ii) Average (2 mks)
(e) Use IF function to award remarks as follow:
– A student whose average is above or equals to 65 gets “Excellent.”
– An average of 55 or above but less than 65 gets “Average.”
– An average of less than 55 award “Below Average.”
(f) (i) Award positions to students basing on the average score. (3 mks)
(ii) On the last rows enter formulas to count students from both classes. (2 mks)
(g) Sort the student list by class position in ascending order. (2 mks)
(h) (i) Insert a bar graph to display the information below:-
– The three CATS
– Names
– Title as “TERM ONE COMPUTER RESULTS”
iii) Save the chart on a new sheet and name it graphical analysis. (1 mk)
(i) Print:
iii) Term one results sheet. (1 mk)
*UGU*
A:/STRESSDOC1 (27mks)
A parent who appreciates by saying, “Well done’ or I’m proud of you’ can leave an indelible mark.
There is much more to facing stress in life than the right diet and physical exercises. Indeed, it could be that the attitude on which your life is founded is the most vital part of the picture.
Take charge of your life
Keeping stress at bay involves treating yourself as someone with a right to life. That will involve a degree of assertiveness and confrontation. Those very words can conjure up images of a shoot-out at the OK Corral. It does not have to be that way. There is a world of difference between being assertive and being aggressive. Sadly, many who need to break out from being always submissive to the expectation and demands of others can only imagine that the alternative is to be aggressive.
You are submissive when:
You are aggressive when:
– you tend to stomp over other people
– you inflict and impose your views and values on others, expressing your feelings at their
expense.
You are assertive when:
Assertiveness involves much more than defending your rights. It equally concerns your being prepared to expect that your own needs be recognized and met. In particular, two key statements typify the maturity of character that lies behind assertive. These are the conviction that:
Few people find that assertiveness comes easily. But the hard work involved in monitoring your personal style together with some training through a local evening class or appropriate reading pays dividends. This is because mastering assertiveness leads to:
(b) (i) Spell check the passage (2mks)
(ii) Indent the first line of the paragraph starting with “Keeping stress at bay…..” (2mks)
By 1.2cm (or 0.47”)
(iii) Select the paragraph starting with “Assertiveness involves much more…..” and set the
left and the right margins to 2cm (or 0.79”) and fully justify. Save the changes as A:/STRESSDOC2. (6mks)
(iv) Insert page numbering at the bottom center of each page (2mks)
(c) (i) Retrieve A:/STRESSDOC1 and covert all the text from the paragraph starting with
“There is much more…”” into two columns of the same width and height. (5mks)
(ii) Change the line spacing for the entire paragraph starting with “There is more to facing
stress….” to 1.5. (2mks)
(iii) Save the changes as A:/STRESSDOC3 (1mk)
(d) Print the documents; A:\STRESSDOC2 A:\STRESSDOC3 (3mks)
| Name | Date of birth | Sex | ID No. | Dept | Salary paid (Kshs.) |
| Peter | 20-07-71 | Male | 1377841 | Accounts | 3000 |
| James | 30-5-78 | Male | 1235542 | Sales | 4000 |
| Gregory | 30-06-79 | Male | 1244745 | Account s | 5600 |
| Job | 14-04-77 | Male | 2213540 | Marketing | 4500 |
| Sarah | 14-07-79 | Female | 1124681 | Sales | 3000 |
| Paul | 12-04-80 | Male | 1455367 | Accounts | 3500 |
| Onyango | 25-04-08 | Male | 0147535 | Sales | 7000 |
| Jessica | 01-01-79 | Male | 5664124 | Sales | 3500 |
(a) Create a form named EmpF and add two more records using the form (5mks)
(b) Create three reports to print the information below:
(i) Employees listed by Department types (EmpR1) (6mks)
(ii) Alphabetical listings of all employees (EmpR2)
(iii) All employees in the sales department get a 2% commission on sales. Create a report to
show the commission paid to all the sales people, if the basic salary for the sales people is
Kshs.3000 (EmpR3) (8mks)
(c) Create a query (EmpQ) to show who will be retiring at the end of the year, if the retirement
age is 55.
*KSM*
the pay details for a new employee and present a report.
| NAME | YEARS WORKED | BASIC PAY | DEPARTMENT | SALES (KSH) | HOUR OF OVERTIME | MILEAGE (KM) |
| Eric | 9 | 14000 | sales | 16000 | 10 | 120000 |
| Stephen | 23 | 18000 | admin | 25000 | 11 | 130000 |
| Fred | 5 | 7000 | sales | 22000 | 12 | 112000 |
| John | 17 | 18000 | marketing | 12000 | 15 | 134200 |
| Julius | 18 | 16000 | sales | 11000 | 22 | 123000 |
| Daniel | 3 | 25000 | admin | 30000 | 12 | 10200 |
| Martin | 11 | 19000 | sales | 35000 | 33 | 132000 |
| Stanley | 15 | 15000 | marketing | 14000 | 14 | 112000 |
| Evans | 11 | 23000 | admin | 25000 | 0 | 12000 |
| Gideon | 8 | 17000 | accounts | 14000 | 7 | 154000 |
(a) Using the information above, design an appropriate spreadsheet and enter the given data, give
it a suitable title and save it as A: Tel 1 (14mks)
(b) (i)calculate the total sales and total mileage and labels them accordingly (4mks)
(ii) Write on the paper provided the formula used for total mileage (1mk)
(iii) Save the spreadsheet now as A: Tel 2 (1mk)
(c) (i) The employees sales commission is calculated as 11% of the employees sales. Input this
commission rat in cell C20 and label it appropriately. (3mks)
(ii) Insert a new column labeled ‘sales commission’ between ‘sales’ and ‘hours of overtime’
(iii) Create a formula to give the amount f sales commission by making reference to sales
commission cell. (4mks)
(iv) On the paper provided write the formula created. (1mk)
(v) Copy the formula to get the sales commission for all the other employees and save the
worksheet as A: Tel 3 (3mks)
(d) (i)staff who work in admin and work overtime are given a bonus of shs.3600 but no overtime
pay, while staff who work in other departments are paid overtime pay at a rate of shs.200
per hour. Create a new labeled ‘overtime and use a function to fill the value into the column
appropriately. (6mks)
(ii) On the paper provided write the function you have used (2mks)
(iii) Save the spreadsheet now as A: Tel 4(1mk)
(e) (i) Create a column for the sales/mileage ratio and label it ‘sales/mileage’. Use a function
to calculate the ratio and copy it down the column to fill the value for all employees.
(ii) Use the IF function to put the remarks ‘GOOD’ in a new labeled REMARK for only these
employees whose sales/mileage ratio is greater than 2 (4mks)
(iii) Save the spreadsheet now as A: Tel 5 (1mk)
(iv) Print files Tel 1, .Tel 2, Tel 3, and Tel4and Tel 5 (2mks)
performance of the branches and that of the cities in which the branches are located, a database
to organize the information is required:-
(a) Create a database file and name it company (2mks)
(b) (i) create a table containing the following fields (4mks)
| Field name | Field type |
| STORE-NO | Number/numeric |
| BRANCH | Text/character |
| CITY | Text/character |
| STAFF-SIZE | Number/numeric |
(ii) Make the field STORE-NO the primary key and save the tables as STORES. (2mks)
(c) (i) Create a form from the STORE able and save it as STORE-FORM (5mks)
(ii) Use the form to enter the records below (5mks)
STORE-NO BRANCH CITY STAFF SIZE
I Tudor Mombasa 15
2 Bongo Dar-es-salam 14
3 Sunset Nairobi 21
4 lake view Kampala 15
5 king’orani Mombasa 9
6 Beach town kisumu 16
7 ABC Nairobi 89
8 crane Ltd kampala 7
9 wheat land nakuru 12
10 ocean view Dar-es-salam 6
(d) (i) Modify the Store table to include and additional field with the heading SALES(SHS) (3mks)
(ii) Enter the information below for each of the stores (2mks)
STORES-NO SALES
(iii) In the STORES table, swap the fields CITY with BRANCH (2mks)
(e) (i) Create a query from the STORE tales to display the field BRANCH,CITY,STAFF-SIZE
and SALES(SHS) for stores whose sales are less than 400,00 (3mks)
(ii) Sort the records in the query above in alphabetical order of BRANCH field and save it as
POOR PERFORMERS (2mks)
(f) (i) create a tabular report with landscape orientation from STORE tables to display the field
in the following order
STORE-NO BRANCH SALES (SHS) 4mks)
(ii) Sort records in the report in alphabetic order of the BRANCH field (1mk)
(iii) Compute the total sales and place it below the SALES (shs) column and change its font
size to 13 (5mks)
(iv)Place two straight lines cutting across the page, one above and one below the sales total
(g) (i) Insert a header COMPULYNX PERFOEMANCE in the report having font size 19 and
centre it across the page (3mks)
(ii) Remove the report pagination and insert your name and index number in its place and
save the report as PERFORMANCE (2mks)
(h) Print STORES table, POOR PERFORMER query and performance report
*KKE*
1 a) Create anew workbook and name it as form 2 computer exams (1mk)
| Name | class | Adm.No: | CAT1 | CAT2 | CAT3 | total | average | Class position | Remark |
| Maina john | E | 7984 | 80 | 70 | 59 | ||||
| Ken Korir | W | 7896 | 75 | 55 | 72 | ||||
| Bernard K | E | 8092 | 86 | 59 | 75 | ||||
| John Soi | E | 7460 | 80 | 79 | 70 | ||||
| Kipsang Bett | W | 7892 | 76 | 75 | 80 | ||||
| Mitei E | E | 7800 | 38 | 48 | 25 | ||||
| Mark J | W | 8490 | 37 | 51 | 29 | ||||
| Koech Ben | W | 8184 | 30 | 86 | 75 | ||||
| James W | E | 8082 | 25 | 27 | 20 | ||||
| Abuya ken | E | 8083 | 30 | 25 | 25 | ||||
| Leonard | W | 8047 | 39 | 24 | 25 |
i)totals
ii)filter “lower group” sheet to display students from “E” class and whose average score is
below 50
-the three cats
-names
-Title as “TERM ONE COMPUTER RESULTS”
iii) Term one results sheet (1mk)
2 a) Create a database called ELIMU (2mks)
| EXAMINATIONS | ||||
| Admission number | mathematics | English | Kiswahili | Biology |
| 1 | 45 | 67 | 90 | 23 |
| 10 | 45 | 89 | 90 | 20 |
| 2 | 45 | 70 | 80 | 45 |
| 3 | 89 | 90 | 90 | 20 |
| 4 | 78 | 9 | 90 | 50 |
| 5 | 67 | 89 | 60 | 90 |
| 6 | 67 | 90 | 7 | 80 |
| 7 | 34 | 78 | 70 | 90 |
| 8 | 23 | 50 | 38 | 90 |
| 9 | 23 | 15 | 67 | 20 |
| DOS | ||||
| Admission number | S name | Other names | KCPE Mark | Year of KCPE |
| 1 | Peter | Barasa | 327 | 2007 |
| 10 | Johnson | Suk | 250 | 2001 |
| 2 | Alex | Ojwang’ | 340 | 1998 |
| 3 | Chepkuto | Esther | 250 | 2008 |
| 4 | Wekesa | Raymond | 450 | 2007 |
| 5 | Alex | Wamwana | 410 | 2003 |
| 6 | Jane | Kilonzo | 400 | 2000 |
| 7 | Mathew | Kariuki | 450 | 1999 |
| 8 | Nasimiyu | Catheen | 290 | 2003 |
| 9 | Kimathi | John | 300 | 2001 |
| BOARDING | ||||
| Admission number | uniform | tool | Tool name | |
| 1 | No | 12 | JEMBE | |
| 10 | Yes | 20 | JEMBE | |
| 2 | No | 11 | PANGA | |
| 3 | Yes | 1 | SLASHER | |
| 4 | Yes | 111 | JEMBER | |
| 5 | No | 15 | RAKE | |
| 6 | Yes | 22 | BASIN | |
| 7 | Yes | 11 | BROOMS | |
| 8 | Yes | 90 | RAKE | |
| 9 | yes | 23 | BUCKET |
| Admin | |||||||
| Admission number | uniform | S Name | KCPE Mark | maths | English | Kiswahili | TOTAL SCORE |
| 1 | Yes | chepkuto | 250 | 89 | 90 | 90 | 269 |
| 10 | Yes | wekesa | 450 | 78 | 9 | 90 | 177 |
| 2 | Yes | Jane | 400 | 67 | 90 | 7 | 164 |
*RCH*
Question 1.
Ms – Access Database
(a) Create a database file called VIDEOS and use it to enter the details that follow. (3 mks)
(b) Create a table called Customer using the following structure. (4 mks)
Field Name Data type Size Description Caption
Customer ID Number 3 3 – digit unique number Customer ID
Last Name Text 25 Enter the Last Name Last Name
First Name Text 15 Enter First Name First Name Address Text 50 Address Address
Birth Date data/time Enter yyyy/mm/dd Date of birth
Home Tel Text 14 Home Tel. Home Tel.
Work Tel Text 14 Work Tel. Work Tel.
Email Text 40 Email Address Email Address
Gender Place Text 1 M or F Gender
Work Place Text 40 Place of employment Place of employment
(i) Make the Customer ID Field the primary key. (1 mk)
(ii) Format the Last Name and First Name fields to convert characters to upper case by using >.
(iii) Enter Yes in the required property of the Last Name, First Name and Gender fields. (1 mk)
(iv) Format the Birth Date field yyyy.mm.dd to input the birth dates ,year, month abd day.(1 mk)
(v) Use the input mask for the Home Telephone and work Telephone fields. The input mask should be (999) 999 – 999.
(vi) Format the Gender field to convert the character to upper case using >. (1 mk)
(vii) Enter the M or F for the Validation rule field of the gender Field. (1 mk)
(viii) Enter the Only valid entries are M or F in the validation Text of the Gender Field.(1 mk)
(ix) Enter Yes in the required property of the gender field. (1 mk)
(x) Save the tables as Customer. (1 mk)
| Customer ID | Last Name | First Name | Address | Birth Date | Home Tel. | Work Tel. | Gender | Work place | |
| 201 | JOHNSON | MICHELE | RUBY PARK, ST PHILIP | 1969/02/15 | (245) 431- 2916 | (246)_ 2196 | F | Bankers Night Club | |
| 202 | CHANDLER | TRYONE | BANK HALL, ST. MICHAEL | 1969/03/05 | (246) 431- 8971 | (246) 422- 1119 | M | GE Electronics | |
| 203 | BANFIELD | SHIRLEY | 71 LONG BAY DEVELOPMENT | 1970/10/26 | (246) 5441 | F | |||
| 204 | ISIDORE | EYSTHER | 4MT STANDFAST, ST. JAMES | 1968/11/10 | (246) 433 – 9172 | (246) 422 – 1999 | F | Queen Elizabeth Hospital | |
| 205 | CONNEL | WINSTON | CANE GARDEN, ST. THOMAS | 1971/12/10 | (246) 433 – 9172 | (246) 417- 4177 | M | Transport Board | |
| 206 | KELLMAN | ARLENE | ST. PATRIICKS, CHRIST CHURCH | 1974/06/10 | (246) 421 – 2031 | (246) 426 – 2979 |
| F | KMGP |
| 207 | PAYNE | REBA | FOSTER, HALL, ST. GEORGE | 1967/01/03 | (246) 423- 6823 | (246) 423 – 9741 | F | Core Crystal Hotel | |
| 208 | GRANT | FREDERIC H | GRAPEHALL, ST. LUCY | 1962/09/09 | (246) 417 – 2280 |
| M | ||
| 209 | SMITH | IRENE | ASHTON HALL, ST. PETER | 1945/07/07 | (246) 433- 3302 | F | |||
| 210 | THOMAS | WICKMAN N | BOSCOBELLE, ST. ANDREW | 1943/04/06 | (246) 429 – 2916 | (246) 422 – 1231 | M | JG Retirement home
| |
| 211 | CATWELL | PAULINE | BRAGGS HILL, ST. JOSEPH | 1970/02/02 | (246) 433 – 87 91 | F | Caribbean Union | ||
| 212 | GREAVES | LINDA | TOHMPSON ROAD, ST. THOMAS | 1970/09/10 | (246) 417 – 4177 | (246) 417- 4177 |
| F | Shoppers Retail Store |
(d) Save the table as Customer.
(e) Some new data become available and a few changes have to be made to existing table.
These tasks are listed below.
(i) Enter the new address for Shirley Banfields as 7 Bayfield Development. (1 mk)
(ii) Delete record 12.
(f) Index in ascending order the customer table on the last name and first name fields in the design
view. The index is called Name. (5 mks)
(g) Perform a select query and print the last name, first name, address, home and work telephone
numbers for each customer. He would like the information printed with the last names in
alphabetical order. Save the query as Customer List. (5 mks)
(h) (i) Create a query to display all customers who live in St. Michael or St. Thomas. Save
the query as Saint. (2 mks)
(ii) Display all customers whose last names begin with “B’ save it as B. (2 mks)
(i) Create a Customer data entry form from the customer table. The title of the form should be
“Customer Data Entry Form” (4 mks)
(j) Print customer table, Customer List, Saint and B. (2 mks)
Question 2.
Spreadsheet Microsoft Excel
You are employed as a sales clerk at JOY TO THE WORLD Mobile Shopping Center. Make a Spreadsheet, which keeps track of 2001 Xmas Orders. Enter the data below, using a format of $ and 2 decimal places for the Cost.
| A | B | C | D | E | |
| 1 | CLIENT # | ORDER 1 | ORDER 2 | ORDER 3 | COST |
| 2 | A-039 | 393 | 567 | 452 | 59.00 |
| 3 | M-539 | 239 | 189 | 102 | 41.00 |
| 4 | A-725 | 257 | 200 | 35.00 | |
| 5 | R-341 | 775 | 348 | 183 | 53.00 |
| 6 | M-910 | 158 | 358 | 455 | 89.90 |
| 7 | P-394 | 981 | 208 | 47.25 | |
| 8 | M-032 | 319 | 186 | 128 | 38.75 |
| 9 | M-333 | 456 | 235 | 185 | 62.00 |
(a) Type the following data in a spreadsheet program and save it as SHOPPING. (5 mks)
(b) Calculate the NET ORDER (i.e. the total number of orders for each client). (3 mks)
(c) Calculate the SUBTOTAL for each client. (3 mks)
(d) Sale tax is 6%. Handling cost is $8.00. Write them in appropriate cells in the spreadsheet.(2 Calculate the TAX AND HANDLING charge foe each client. (5 mks)
(Subtotal* sales tax) + handling cost.
(f) Calculate the TOTAL CHARGE for each. (5 mks)
(g) Format ALL results from the above calculations as $ and zero decimal places. (3 mks)
(h) Show the lowest, highest and average figures for each order. (5 mks)
(i) Center, underline the name of the company at the top of the spreadsheet. (2 mks)
(j) Save the spreadsheet as ORDERS 1. (1 mk)
(k) Change the sales tax to 7% handling charges to $9.50 and the cost for client # M-910 to $45.78.
(l) Delete the record of client # P-394. (2 mks)
(m) Sort the records so that the client numbers appear in descending order. (3 mks)
(n) Save as ORDERS 2. (1 mk)
(o) To the right of $9.95, enter the alternative handling charge as $11.95. (1 mk)
(p) Using ORDERS 2 to analyze the sales of order 1 only, delete the columns for ORDERS2, ORDERS S3 and the NET ORDER. Recalculate the SUB-TOTAL for each client. (5 mks)
(q) Using ORDERS 2. If a customer buys 319 items or less, the handling charge will be $ 9.95. If the order is 320 or more then the handling will be $ 11.95.
Recalculate the TAX and the HANDLING charge for each customer where TAX AND HANDLING = (Subtotal* sales tax) + handling cost.
Enter the new formula in the TAX AND HANDLING column. (3 mks)
(r) Make a bar graph in a new sheet called COMPARISON which shows the total charge for each client. The graph should also reflect how much of this is tax and handling and show how much is subtotal.
(2 mks)
(s) Save it and print all the files. (2 mks)
*TZM*
QUESTION ONE (50 MARKS)
A), using an appropriate word processing, type the following passage and save it in
diskette as DATA SECURITY (l0marks)
Data security and control
External threats
threats hut are not the most common external problems,
Break into a building are very common,
iii. Espionage (intelligence)-information in the wrong hands can do a lot of
damage. Example access to a payroll or accounting information is restricted so
Such information should be shielded away from external and internal spies.
Internal threats
Internal threat would include
Viruses load and run without the user requesting them to run; and cause considerable damage e.g.
iii. Destroying data and programs.
It is a computer code which usually designed to carry out two tasks:
for it to amend or destroy programs and data files, by interfering with the normal processes of the operating, system.
Questions
|
| Font size
| Font type
| underline
| bold
|
| Data security and control
| 14
| Times new Roman
| Yes
| Yes
|
| External threats
| 14
| Monotype corsiva
| None
| Yes
|
| Internal threats | 14 | Default | Yes | No |
iii) Change the numbering to bullets; as follows: (2 marks)
| Headings
| bullet
|
| i. External threats ii. internal | >
|
| ·
|
C). i) Insert the ANY clipart at the bottom center of the document. (3marks)
ii).Create word art as indicated by the symbol. (2marks)
iii) Using auto shape, design a logo as indicated by the symbol. (2marks)
SECURITY
E)i. Copy the original document (data security) to the next page (2marks)
iii. Spell check the whole document. (2marks)
iii. Computer threat (1mark)
QUESTION TWO (50 marks)
The following is a worksheet extracted from business Join venders.. They have come together to do a business of selling computer accessories.
| Names | Cost | Sales | Gross profit | Expenditure | Reserves | Net profit | Remarks |
| Benson | 700 | 350 | 450 | ||||
| Betwel | 400 | 700 | 50 | ||||
| Kimwat | 200 | 900 | 200 | ||||
| Amos | 300 | 1000 | 300 | ||||
| Tembur | 100 | 500 | 100 | ||||
| Korir | 400 | 600 | 40 | ||||
| Towett | 600 | 850 | 55 | ||||
| Maritim | 500 | 350 | 70 | ||||
| Kerich | 200 | 350 | 45 | ||||
| Bency | 500 | 1000 | 40 | ||||
| Danson | 600 | 900 | 170 | ||||
| Kones | 900 | 1000 | 20 | ||||
| Koech | 100 | 800 | 130 |
Additional Information.
vendor”. “Quite vendor”.
REQUIREMENT
(i) Create the workbook and enter the details, save as vendor.ex (15marks)
(ii) a) Keep the title of the workbook to be JOIN VENDORS and format it to be bold, font size
14 and a align at 20° (4marks)
– Name Bii, cost 100, sales 500 and expenditure 10.
– Name Mutai, cost 800, sales 2000 and expenditure 80.
(iii) Use sum function to calculate gross profit for each member (3marks)
(iv) Use product function to calculate reserves for each member (3marks)
(v) Use “IF function” and net profit to analyses the vendors, taking the following remarks: (6marks)
(vi) a) Use names of the vendor and cost to insert a line graph, keep the title of the graph to be PRODUCTIVE ANALYSIS, format it and place it in a separate sheet. (5marks)
QUESTION 3 (50 MARKS)
Answers
paper one
*NYR*
(i) First generations – machine language
(ii) Second generation – assembly language
(i) Standard furniture in the laboratory
(ii) Antiglare screen/monitor
(iii) UPS
(i) BIOS:- it’s the basic input output system. it’s special firmware program that Post to
take place
(ii) POST:- Power on self test. It checks on existing drives, basic input/output devices and
communicates in case of a problem.
(b) Differentiate between:-
(i) Backspace and delete keys on the keyboard
(ii) Insert and type over mode
(i) ALU
(ii) Control unit
(iii) Primary memory
(b) Distinguish between compilers and interpreters
(b) Distinguish between impact and non-impact printers citing one example in each *NYR*
in order to form an imprint on it. e.g dot matrix, daisy wheel, drum, chain and golf ball
(i) Speech recognition
(ii) Touch screen
Freeware- software whose source code hidden from the users. Modifications only made by the manufacturer
Operating Systems
(b) Explain the following functions of the operating system:- *NYR*
(i) Job scheduling:- the OS prepares, schedules, controls and monitors task submitted for
execution, to unsure the most efficient processing.
(ii) Interrupt handling:- the processor stops executing the current process to attend to a break from the normal sequential processing of instruction in program.
(i) Disk formatting
(ii) Disk defragmentation
folders.
(i) Multi-user – OS allow more than one user to interactively use a computer.
(ii) Multi-tasking- when the OS allows the CPU to executes more than one
application program at the same time
(i) Text wrap:- this feature allows a text to surround an object inserted
(ii) Word wrap:- the cursor move automatically to the next line after reaching the end
of the line.
(b) differentiate between auto complete and auto correct features.
(i) Filtering and sorting:-
(ii) Relative and absolute cell referencing
Equal sign (=) function name and arguments
(a) Enter the names of students and marks obtained in 8 subjects; maths, English, Kiswahili, Biology, Chemistry, Business Studies, History and Computer Studies.
(b) After entering each subject mark the program should calculate for each student
(c) Depending on the average mark obtained, the program should assign the grades as
Between 80 and 100 = A
Between 70 and 79 = B
Between 60 and 69 = C
Between 50 and 59 = D
Below 50 = E
(d) The program should display each students name, total marks and the average grade. Using low chart, show the design of the program
(i) Protocol:- set of rules that govern transmission of data or information over a net work
(ii) Website:- it’s collection of related web pages where individual or organization
documents are placed for easy access by external world by using their address.
(iii) Search engine:- it’s a program that searches documents for specific keywords and returns a list of the documents where the keywords were found.
(iv) Spam mail:- its; a feature in e-mail which inhibits receiving mails from unknown
sources.
(b)List three examples of search engines
(c) Identify the functions of the following devices in data communication:- *NYR*
(i) Modem:- it’s a special digital to analog interface card that changes data from digital to analog so as to be transmitted on telephone lines and on the receiving end the data is changed from analog to digital for computer to understand.
(ii) Network interface card:- it’s a circuit board that fits inside an expansion slot of a
workstation and acts as a physical between the computer and the transmission media.
(iii) Brouter: collection of routers in network.
(d) Describe bounded and unbounded forms of communication giving two examples
in each case *NYR*
Bounded media – it is physical connection of communication devices mainly by use of cables e.g coaxial cables twisted pair , two wire cables and fibre optic cbale.
(e) Outline four advantages of using fibre optic cables
(i) Amplitude:- the maximum value a wave can attain
(ii) Frequency:- the number of cycles made by a wave in one second
(iii) Nibble:- half abyte (4 bits)
(iv) Byte:- a group of 8 bits
(b) Perform the following 11111.11112 + 100001.10102 – 1111.001112 *NYR*
11111.1111
+ 10001.1010
Answer 110001.1001
-1111.0011
Answer = 100010.010112
(c)Using two’s complement subtract 73from 115 and convert the answer to decimal notation*NYR*
115 – 73 = 115 + (-73)
Convert 115 to binary = 11100112
Convert 73 to binary = 10010012
Convert 73 to8-bits = 10010012
Convert the 8-bit above to ones complement = 10110110
Convert to two complement by adding 1 to ones complement above = 11001111012
Answer = 1100111012
(d) Identify the duties of the following ICT specialists *NYR*
(i)Software engineer
(ii) System analyst
(e) List two types of opportunities available in the field of computer hardware *NYR*
(i) Logical and physical files
Logical files:- It’s viewed in terms of what data items it contains and detail of what
processing operation may be performed.
Physical files:- its viewed on how data is stored on a storage media.
(ii) Master and backup files
Master file – contains relatively permanent record about particular items or entities and
backup files
Backup files- it holds copies of others existing files.
(b) Explain the following computational errors (i) truncation:- it occurs as a result of having a real numbers that have long fractional
part can not fit in the allocated memory space
(ii) Overflow:- occurs as a result of having too long answer after calculation that can not
fit in the allocated memory space
(iii) Rounding errors:- Results from raising or lowering a digit in a real number to the
required rounded number
(c) Define data integrity and state three ways of minimizing threats to data integrity
received from an information system
Ways of minimizing data threats are
(d) Define virtual reality and state three ways of minimizing threats to data integrity
Virtual reality – a condition in which a person becomes psychologically immersed in artificial environment generated by a computer system.
Areas of application
(e) Discus how computers are used in reservation systems
development stages
(i) Problem recognition :– identifying whether a problem exists.
(ii) Coding: – writing a program using a programming language.
(iii) Implementation: – file conversion, staff training and changeover strategies
(b) Explain the following changeover methods:- *
(i) Direct:- the old system is discarded and the new system starts immediately.
(ii) Parallel:- both old and new systems are run parallel to each other for some time
till the users have confident with the new system then the old system is phased out.
(iii) Phased:-the new system is implemented in phases or stages.
(c) Explain two advantages of modular programming
(d) Explain how the use ICT may affect the society
(e) Explain the four main areas of artificial intelligence
*KKC*
| Place Value | 83(512) | 82(64) | 81(8) | 80(1) |
| Octal digit | 1 | 1 | 1 | 1 |
2.a) Working out
N10 =(1X83) + (1X82) +(1X81)+ (1X80)
=512 + 64+8+1
N10 = 585
\ 11118 =58510
| 2 | 2 | . | 2-1 | 2-2 | 2-3 |
| 1 | 1 | . | 0 | 1 | 1 |
| 2 | 1 | . | 0 | 0.25 | 0.25 |
Weight
Binary
digit value
in bare 10
Integral part Fraction part
(21X1) + (1X10) = 0.50 X0 = 0.000
2.000+ 1.000 0.25 X 1= 0.250
=3.00010 0.125X1= + 0.125
0.37510
3.00010+ 0.37510 =3.375
Thus 11.0112 = 3.37510
– Job sequence – the operating sys tem keeps a list of jobs or tasks currently being run and clocks them in and out of processor.
5.– Avoid smoking or exposing computer to dust.
– Computer technician is a person who troubleshoot computer hardware and software, assemble and upgrades computer components such as storage device and motherboards.
– Coreldraw
– Havard graphic
– Layout based.
12 . – Financial system –payroll, accounting and banking
13 a) CD’S, CD- ROM, CD RW,CD –R
DVD
LS – 120 SUPER DISK
OPTICAL CARD
OPTICAL TAPE
Index –sequential organization.
SECTION b (60MARKS)
ii)Complier – translate entire source program into object code
iii)Interpreter – translates source program line –by tine allowing the CPU to execute one line before translating the next.
The psendocode can use two looping structure
a .If – then – else
ii)To ensure all records entered in the related table exists in the primary table.
iii)Is a unique identity of a record
iv)Employee number
v)The data is not similar
3.Required
B -Ring topology
C -Mesh topology
Terminator
iii) Mesh topology
– Troubleshooting is difficult
– One device breakdown affects the whole system.
iii) Fiber optic cables – transmission medium that transmits data by using light.
medium.
iii) Transcription – errors that occur during data entry.
Real time – the incoming data is processed as soon as it occurs.
It is fast in processing commands as compared to GUI and means driven interface.
Disadvantage.
– E-mails
– Video conferencing
URL – A special internet address made up of organization name and an extension explaining to type of organization and country.
b)
| A | B | C | |
| 1 | Crop | Amount | Not Viable |
| 2 | Maize | 150 | Not Viable |
| 3 | Bean | 300 | Not Viable |
| 4 | Cashew Nuts | 850 | Moderate |
| 5 | Cabbages | 1036 | Viable |
ii)Hold down ctrl as you drag the mouse pointer.
Cut – more or transfer text of file from the original location to another without leaving a copy .
Copy – duplication of text or files i.e a file retails its original location and appears in another location.
– Education
– Other scientific department.
*MUM*
– Activating from upper case to lower case and vice versa
– Enable one to type extra characters on the key board like ?, !, & e.t.c.
They store more than one piece of data and they have a bigger memory capacity
(b) List four examples of registers. *
(i) It is taking a longer time to start up.
(ii) It is often hanging
(iii) Applications are taking long to load.
(iv)State three possible causes of these problems and how they can be solved.
five days.
The income from Monday to Friday was Ksh.4,000, 9,000,15,000 and 20,000 respectively while expenditure for some period was Ksh.2000,3000, 7000, 5000 and 6000 respectively.
(b)
4 and the column as A,B,C
| A | B | C | D | E | F | |
| MON | TUE | WED | THUR | FRI | ||
| 1 | Income | 4000 | 9000 | 15000 | 20000 | |
| 2 | Expenditure | 2000 | 3000 | 7000 | 5000 | 6000 |
| 3 |
(i) Monday profit. = B1 – B2 (ii) Total income = Sum (B1 : F1)
(iii) Highest expenditure. = Max (B2 : F2)
(a) Software suite :- A group of programmes that are sold together e.g.
MS office which contains MS word, MS excel, MS access e.t.c.
(b) Shareware:- Is copyrighted software that is distributed free of charge but requires users
to make a monetary contribution in order to continue using it
(c) Groupware:- Online software that allows several people to collaborate on the same
project
(d) Integrated software:- A software that combines features of different programs as a whole
10012
01112
0102
(b) Using two’s compliment subtract 7 from 40 and give the answer in decimal notation.
(b) State the looping structure demonstrated in *
(c) List any four methods of detecting and correcting programming bugs.
(d) Draw a flowchart for a program that can be used to add any positive integers that can be keyed into the computer through the keyboard. The program should count the positive numbers entered and should be terminated when a zero is keyed in.
TABLE 1 TABLE 2
Field Data type Field Data type
Employee number Text Employee number Number
Employee Name Auto number Data employed Date/time
D.O.B Date/time Department Test
Address Test Salary Currency
(i) Which of the two tables is likely to be the parent table?
(ii) It is advisable to enforce referential integrity when creating a relationship. When
creating a relationship, what do you understand by the term referential integrity?
(iii) The field “employee No” in Table 2 is likely to be the primary key.
What is a primary key?
(v) What will make the relationship between the tables fail to work?
(b) In databases, the field properties specify finer details related to the fields and the entries expected. State four field properties. Caption
(c) State three functions of a database.
(b) Describe the following internet terms.
(i) Browsing:- Moving around and between web pages
(ii) Web portal:- Website that contains several features like searching, e mail,
advertisements, e.t.c.
(iii) Home page:-First page displayed when a browser is started
(iv) Hyperlink :-Text or graph when clicked links one to another web page or links
(v) Uniform resource locator:- An address of a web page
(c) The following spreadsheet is relating to a farmer.
| A | B | C | |
| CROP | Amount | ||
| 1 | Maize | 150 | Not viable |
| 2 | Beans | 300 | |
| 3 | Cashew nuts | 850 | Moderate |
| 4 | Cabbages | 1036 | Moderate |
(i) A function = IF (B2< 200, “Not viable”, IF(B2>300,”moderate”, IF(B2> 1000, “VIABLE”))).
Give the appropriate result returned in cells C2, C3, C4 and C5.
(d) List any three functions of the control unit.
| Interpreter | Compiler |
|
|
(b) State four characteristics of Random access memory.
(c) Describe the following data security measures
(i) Log files:- Special computer files that keep a record of computer users and actions they
have done within that particular computer
(ii) Fire walls:- Is software or hardware that filters information coming from the internet to your computer system
(iii) Antispyware :- A soft ware that blocks spy ware programs from accessing your
computer system to collect information
(iv) Audit trial:- Careful study of an information system to determine weakness in order
to collect them
(b) List two types of transmission media
(c) Distinguish between a Hub and a switch. *
receives the packet while the others discard it while a switch directs a data packet to its
intended destination computer
(d) With help of a well labeled diagram, describe the fibre optic cable *
(e) What are the functions of the following devices on a network? *
(i) Repeaters :- They amplify or regenerate signals that have been affected by attenuation
(ii) Network interface card :- Is an interface that links a computer to a communication
channel
(iii) Router :- Is a network device that connects different networks to enable communication
(f) Distinguish between physical topology and logical topology as used in Networking
*KSM*
**PAPER TWO
*NYR*
The question tested the candidates’ ability to do the following in a database
*MUM*
b)
iii) saving the document as A: NET 4 (2 mks)
*TNW*
| Index No:____________________ | Index No:____________________ | |||||
| Item | Max score | score | Max score | score | ||
| Page Setup | A. – database file created | 1 | ||||
| Font-Arial | 1 | – File saved as Business | 1 | |||
| Font size 12 for text | 1 | B. – Two tables created | 1 | |||
| Left margin 1″ | 1/2 | – 4 Correct fields for table 1 | 4 | |||
| Right margin 0.5″ | ½
| – 5 Correct fields for table 1 | 5 | |||
| Top 0.5″ | ½
| C. Seller details form | ||||
| Bottom 0.6″ | ½
| – 4 fields @ 1/2 mk | 2 | |||
| Headings | Vehicle details form | |||||
| H1 | – At least 4 fields @ 1/2mk | 2 | ||||
| Bold | 1 | Forms titles | ||||
| Centered | 1 | – Seller details form | 1/2 | |||
| Font size – 20 | 1 | – Vehicle details form | 1/2 | |||
| 1st Paragraph | D. Table 1 | |||||
| Two columns | 1 | – 5 correct records @ 1mk | 5 | |||
| Word art | 1 | Table 2 | ||||
| Words complete | 1 | – 10 correct records @ 1mk | 10 | |||
| Word art diagonal | 1 | E. Query | ||||
| Two symbols @ 1/2mk | 1 | 4 correct fields @ 1/2mk | 2 | |||
| Subscript | 1 | – Correct criteria | 1 | |||
| 2nd Paragraph | – 6 records @ 1/2mk | 3 | ||||
| Complete text | 1 | |||||
| Drop cap | 1 | F. – 10 correct values for new prices @ 1/2mk | 5 | |||
| In margin | 1 | Report | ||||
| 3 lines drop | 1 | G. – 5 fields @ 1/2 mk | 2 1/2mks | |||
| 3rd paragraph | – Correct total amount | 1 | ||||
| H2 | – saved as report | 1/2 | ||||
| Bold and size 14 | 2 | H. Printing | ||||
| Italic | 1 | – Seller details table | 1 | |||
| 4 bullets @ 1/2 | 2 | – Vehicle details table | 1 | |||
| Italicized text | 1 | – Report | 1 | |||
| 4th Paragraph | TOTAL | |||||
| 3 columns | 1 | |||||
| Clip art | 2 | |||||
| Word art | 2 | |||||
| Clip art/Word art psn | 1 | |||||
| 5th paragraph | ||||||
| H3 | ||||||
| Bold and size 14 | 2 | |||||
| Italics | 1 | |||||
| Drop cap | 1 | |||||
| 3 lines drop | 1 | |||||
| Bold text | 1 | |||||
| Italicized text | 1 | |||||
| B. i) Paragraph copied | 1 | |||||
| ii).Hanging indent | 1 | |||||
| iii).- Double space | 2 | |||||
| – Landscape | 2 | |||||
| C. – Name | 1/2 | |||||
| – Index | 1/2 | |||||
| D. Word count | ||||||
| – Words(376+/- 2) | 1 | |||||
| – Characters(With spaces)21,660 +/- 2 | 1 | |||||
| – Characters(no spaces)1,800 +/- 2 | 1 | |||||
| E. – Paginated doc x of y | 1 | |||||
| – Top | 1/2 | |||||
| – Center | 1/2 | |||||
| F. Doc saved as Bono2 | 1 | |||||
| G. Printing Bono2 | 1 | |||||
| TOTAL | ||||||
WE MUST STRIVE FOR GREAT THINGS IN LIFE
one should leave legacy that speaks for years. Paul Hewson was in Nairobi recently. That won’t mean much to you, until I explain that I was referring to Bono, the world – famous lead singer of rock band U2 and campaigner against global poverty. Bono didn’t really make much noise while in Kenya. He attended the ëNation Mediaû group’s Pan Africa Media Conference, took H2o, talked to a couple of journalists and left.
| H |
e didn’t do the other things that visiting celebrities of his stature do when in Africa: adopt a cheetah or a baby hippo, start a school for orphans, shoot the breeze pointlessly with Emilio and Tinga, utter banalties about the girl child. Bono reserves his energy for other things.
Popular Media
Bono is not famous just for being a singer. For the past couple of decades he has been one of the most visible humanitarian activists, using his fame to enlist powerful allies from:
He has personally spearheaded the campaign for debt relief for the world’s poorest countries, and has been a vocal champion for Africa. Not everyone agrees with these efforts. Author Paul Theroux savaged Bono, Bob Geldof and other celebrity humanitarians, saying that creating “the impression that Africa is fatally troubled and can be saved only by outside help – not to mention celebrities and charity concerts – is a destructive and misleading conceit.”
I happen to agree with that view and have propagated it in writing for many years. I don’t
think Africa’s salvation will come from outsiders,
and it certainly won’t come from endless handouts and a crippling dependency culture.
On Trivia
| W |
hat about you? How big is your life? Are you allowing your time on earth to be frittered away on trivia, or are you going to make a net positive impact on the planet? Are you doing something, anything bigger than yourself? Are you raising
a child to be a better person than you are? Are running a business or conducting a profession that sets a standard in good practice? Or are you content to be a small person imprisoned in a small life?
He has personally spearheaded the campaign for debt relief for the world’s poorest countries, and has been a vocal champion for Africa. Not everyone agrees with these efforts. Author Paul Theroux savaged Bono, Bob Geldof and other celebrity humanitarians, saying that creating “the impression that Africa is fatally troubled and can be saved only by outside help – not to mention celebrities and charity concerts – is a destructive and misleading conceit.”
*KKC*
Question One.
Single error ½ mk
More than 6 errors 5mks
Using correct name 1mk
Using any other name ½ mk
Using correct name 1mk
Using any other name ½ mk
Changing each address ½ mk
Changing reference ½ mk
Each (1X3) 3mks
B
underlining title
– Not replacing one -½ mk
– Not replacing more than 3 (0mks)
Any other header 1mk
-Line spacing other than Single
– Replacing but not all words “computer” ½ mk
Printing off page ½ mk
Question 2
– Sorting list by classes position in descending order 1mk
-No sorting, no mark
ii)Filtering the “lower group”
iii) Saving chart on a new sheet and renaming the sheet graphical analysis. (½ X2) 1mk
i)The lower group from “E” class 1mk
ii)The chart 1mk
iii)Term one results sheet 1mk
Get the latest Mwalimu National Sacco BOSA Loans Application Form {Free Download}, here. PDF Latest…
Here is the revised and latest Mwalimu National Sacco FOSA Salary Advance Application Form {Free…
Here is the latest Mwalimu National Sacco FOSA Instant Loan Application Form {Free Download}. Download…
The landscape of digital gambling has shifted toward high-octane mechanics that prioritize volatility and massive…
The Teachers Service Commission (TSC) has advertised 170 job vacancies across, covering senior, mid‑level, and…
Health Cabinet Secretary Aden Duale has ordered immediate changes to the Social Health Authority (SHA)…