451/1 - COMPUTER STUDIES – Paper 1
NYAHOKAKIRA CLUSTER ONE 2025 – 2½hrs
Name……………………………..…………….… School……………………………………….
Admission Number……….…………..Class……………………….... Date................................
Instruction to candidates
a) Write your name and index number in the space provided above.
b) Sign and write the date of examination in the spaces provided above.
c) This paper consists of two sections A and B.
d) Answer all the questions in section A.
e) Answer question 16 and any other three questions from section B.
f) All answers should be written in the space provided in the question paper.
g) This paper consists of 10 printed pages.
h) Do not remove and pages from this booklet.
i) Candidates should check the question paper to ascertain that all the pages are printed as
indicated and that no questions are missing.
j) Candidates should answer the questions in English.
For Examiner’s Use Only
Section Question Number Candidate’s Score
A 1-15
16
17
B
18
19
20
Total Score
Page 1 of 10
SECTION A (40 MARKS)
ANSWER ALL QUESTIONS IN THIS SECTION
1. Jacky, a secretary at Sacho high school carries out her daily duties using computer and
suffers wrist strain. State two ways she would use to reduce wrist strain. (2marks)
………………………………………………………………………………………………………
……………………………………………………………………………………………..………..
2. Mention two devices that can connected to the computer via HDMI cable (2marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
3. Mention two consequences of not restricting the use of a flash disk in a school computer
lab. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
4. For each of the following state, the type of cell referencing that has been used in:
(2marks)
i. A10
………………………………………………………………………………………………………
ii. $G$20
………………………………………………………………………………………………………
5. Describe the use of the following keys found on a standard keyboard (3marks)
i. Esc
………………………………………………………………………………………………………
………………………………………………………………………………………………………
ii. Prt sc
………………………………………………………………………………………………………
………………………………………………………………………………………………………
iii. Tab key
………………………………………………………………………………………………………
………………………………………………………………………………………………………
6. . Explain the following as used in e-mail:
(a) Inbox (1 mark)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(b) Drafts (1 mark)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
Page 2 of 10
7. a) List any two methods used in information gathering. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
b) State two technological requirements assessed during system design. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
8. Susan came across the following examples of software while revising for her computer
studies exams: Linux, QuickBooks, Lotus WordPro, and Windows 7, classify each as
either system software or application software. (3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
9. Mr. Nzioki, a games teacher at Moi Girls High School wants to invite several schools for
basketball tournament. He was advised to use mail merging technique to create invitation
letters for the respective schools to be invited. State three advantages of using this
technique to create the letters. (3 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
10. Explain how a pixel affects the resolution of a monitor. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
11. Differentiate between Network database and Relational database. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
12. a) State a circumstance under which the following features could be applied to a
publication. (2marks)
(i) Text wrapping
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(ii) Object grouping
………………………………………………………………………………………………………
………………………………………………………………………………………………………
Page 3 of 10
b). Describe two layout guides available in DTP that assist a user to place an object in a
preferred position (2marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
13. Mark, an employee of an institution used his computer to access his boss’s computer to
get some confidential information and gave it to one of its clients at a fee.
i. State the type of crime committed by mark ( 1 mark)
………………………………………………………………………………………………………
ii. State one way of protecting data against the crime committed by Mark (1mark)
………………………………………………………………………………………………………
14. State three benefits that a gen Z will get by using ICT in tracking down police officers
during anti-government demonstrations. (3 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
15. a). Define the following terms as used in networking. (2 marks)
i. Network
………………………………………………………………………………………………………
………………………………………………………………………………………………………
ii. Intranet
………………………………………………………………………………………………………
………………………………………………………………………………………………………
b) Excluding passwords, state two other security control measures used to guard against
unauthorized access to computers in a network. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
Page 4 of 10
SECTION B (60 MARKS)
ANSWER QUESTION 16 AND ANY OTHER THREE QUESTIONS IN THIS
SECTION
16. a) State three features of a compiler (3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
b) When writing a computer program programmers are always advised to use approaches
and techniques that makes the program easy to follow and maintain. List four ways in
which a programmer can make program code easy to follow (4marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
c) Study the flowchart below and use it to answer the questions that follow
Start
Input a, b
T=a2+b2 Add 1 to a
Add 1 to b
No
T > 90
Yes
Print a, b
Stop
Page 5 of 10
i) Given that the user keyed in 3 as the value of a and 1 as the value of b get the final output
of the flowchart (3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
ii) Use a pseudo code to represent the flowchart in (c) (5marks)
Page 6 of 10
17. a) State three reasons why binary is used in developing digital electronic systems
(3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
b) Convert the following numbers to binary number
i. B2.AAH (3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
ii. base 10 (3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
c) Compute the binary arithmetic given below: (2 marks)
10111 + 10001 – 101
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
d) Using 8-bit notation, perform the twos complement of 2510 -1510 , leaving your answer
in binary. (4 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
Page 7 of 10
18. (a) Write the following acronyms in full as used in operating systems.
i. GUI ……………………………….. ……………………… (½ mark)
ii. WIMP ……………………………. ………………………… (½ mark)
(b) State three factors considered when choosing an operating system for use in a
computer. (3 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(c) An operating system manages and organizes a computer system using the following
structures: File, Folder and Drive. State the meaning of the underlined items
respectively. (3 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(d) (i) Differentiate between error handling and interrupt handling as used in operating
systems. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(ii) State three reasons why most network technicians prefer using command line
operating systems to configure networking equipment. (3 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(e) Disk management is one important aspect in secondary storage in computer systems.
Explain the following tools used by an operating system to manage disks in the computer.
i. Formatting (1mk)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
ii. Partitioning (1mk)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
iii. Defragmentation (1mk)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
Page 8 of 10
19. (a) In order to generate information from data items, a set of processing activities have to
be performed on the data items in a specific sequence depending on the desired result.
Draw a well labeled diagram to illustrate data processing cycle. (2 marks)
(b) A data entry clerk experiences some common errors when typing. Most of the time,
she finds that:
i. After every calculation, the result is less than the expected number of digits
required e.g. 345.7896543 the result is given as 345.789.
ii. Different characters are typed wrongly, for example instead of typing 12873457
she types 128734S7.
Identify the two types of errors commonly experienced by the clerk during data
processing in (i) and (ii) above respectively. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(c) State two ways a user can ensure data accuracy is maintained during data processing.
(2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(d) (i) State three advantages of a computerized filing system as used in data processing.
(3 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(ii) State two disadvantages of a serial file organization method in computing. (2 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(iii) Differentiate between distributed processing and interactive processing modes; stating one
application area of each. (4 marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
Page 9 of 10
20. a) Identify modes of data communication represented in (i), (ii), (iii) and (iv) below
(i) Principal Addressing students in assembly using public address system (1mk)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(i) WhatsApp chat (1mk)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(ii) Phone conversation (1mk)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(iii) Walkie talkie conversation (1mk)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
b) List three challenges experienced by computer networks that are set up using twisted
pair cables (3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
c) Study the diagram below and use it to answer the questions that follow
i.
(i) Identify the parts labelled A, B and C in the diagram above (3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(ii) State function of the part labelled A (2marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
d) Name any three components of virtual reality (3marks)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
Page 10 of 10