100% found this document useful (1 vote)
4K views12 pages

Kala Pre Mock 2025 f4-2-MS

This document is an examination paper for Form Four Computer Studies, consisting of two sections with a total of 100 marks. Section A contains 15 questions covering various computer concepts, while Section B requires answering question 16 and any three additional questions. The exam tests knowledge on topics such as data processing, programming, computer hardware, and software applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views12 pages

Kala Pre Mock 2025 f4-2-MS

This document is an examination paper for Form Four Computer Studies, consisting of two sections with a total of 100 marks. Section A contains 15 questions covering various computer concepts, while Section B requires answering question 16 and any three additional questions. The exam tests knowledge on topics such as data processing, programming, computer hardware, and software applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

451/1

COMPUTER STUDIES
FORM FOUR 2025
END OF TERM ONE EXAM
PAPER 1 (THEORY)
TIME: 21/2 HOURS

NAME………………………………….. ADMNO…………… CLASS………

INSTRUCTIONS

1. This paper consists of two sections.


2. Answer ALL questions in section A
3. Answer question 16 and any other THREE questions in section B.
4. This paper consists of 13 printed pages. Candidates should check to ensure
that all pages are printed.

FOR EXAMINER’S USE ONLY

SECTIONS QUESTIONS SCORE


A 1-15

16
B

Total

Page 1 of 12
SECTION A 40 MARKS

1. The data processing cycle involves a four step process list them. (2mks)
Data Collection & Preparation
Data Input
Processing
Output
2. State two uses of a master page in DTP. (2mks)
to repeat design and layout elements on multiple pages in a publication
3. State the functions of the following keys in a computer keyboard;

(i) Pause (1mk)


temporarily stops a computer's current activity.
(ii) Esc (1mk)
To cancel a command,

4. The most popular type of electronic data storage is solid state devices. Give three advantages
of solid state devices (3mks)
Can hold more data than magnetic storage
Are not affected by magnetic fields
Are more portable than magnetic

5. One stage of system development is system testing. State three activities carried out during
testing. (3mks)
To test the usability of the system (if it is working)
To test ability to accept extreme data input
To test ability to deal with errors

6. (a) Convert 111001.10112 to decimal notation. (2mks)


25 + 24 + 23 + 0 + 20 = 32 + 16 + 1 = 49
2-1 + 2-3 + 2-4 = 0.5 + 0.125 + 0.0625 = 0.6875
= 49.687510

Page 2 of 12
(b) State two advantages of using binary number system in computers. (2mks)
Can represent more/all types of data
Matches the working mechanism of a computer in processing data using ON and OFF
Binary is easy of use in coding,
Binary has fewer computations
Binary arithmetic has less computational errors.
7. State the function of each of the following types of special memories. (2mks)
i) Buffer
acts as a temporary storage area where data is held while being transferred between
different parts of a computer system, e.g. between input and memory
ii) Cache memory
to speed up access to frequently used data, which improves system performance. Cache
memory is a small, fast memory that stores copies of data from the main memory.
8. State two advantages of always having a hardcopy output other than a softcopy. (2mks)
Acts as a backup in case the softcopy is lost/destroyed or unavailable
May be required if signing/rubber stamp is required
9. (i) Define the term graphic. (2mks)
A visual ART such as drawing or shape etc
(ii) List two examples of graphics in word processor. (2mks)
Shapes, Pictures, Drawing, letter engraving etc
10. Differentiate between a trackball and a mouse. (2mks)
Mouse is mobile while a trackball is stationery with a base with a ball

11. State the functions of the following logical functions as used in spreadsheet; (2mks)
(i) CountIf
Returns the number of cells in arrange that meet a specific criteria
(ii) SumIf
adds up cells that meet certain criteria
12. Differentiate between side-kick menu and pop-up menu. (2mks)
A "sidekick menu" is typically a small, accessible menu that appears alongside the main
interface, often with quick access features, while a "pop-up menu" is a temporary menu
that appears on-screen at a specific location when triggered by a user action like clicking
on an element, usually overlaying the current content.

Page 3 of 12
13. State two differences between a primary key and a foreign key. (4mks)

14. State three advantages of using a bespoke software. (3mks)

……………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………

15. E-mail services is one of the most utilitsed by online users. Explain three features available in
an E-mail. (3mks)

……………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………………

Page 4 of 12
SECTION B (60 MARKS)
Answer question 16 and any other three questions in this section in the spaces
16. (a) (i) Define the term Structured programming. (2mks)
Structured programming is a programming technique involves breaking programs into
smaller, more manageable pieces known as sub programs (functions or modules)

(ii) State three advantages of structured programming. (3mks)


- Improves clarity
- Reduces the development time of a program
- Improves quality of program

(c)Study the flowchart below and answer the questions that follow.
Start
Total = 0
Grade counter = 1
While grade counter <=5 Do
Input the next grade
Add the next grade to total
Add one to grade counter
End While
Class average = Total/5
Print class average
Stop

(i) Interpret the flowchart. (5mks)


(ii) Dry run the flowchart to get the output if the following values are to be
entered. 70,23,67,45, 50,60 (5mks)

Page 5 of 12
Page 6 of 12
17. (a) Describe any two types of human computer Interface. (4mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………..
……………………………………………………………………………………………………
………………………………………………………………………………..
(b)State four basic requirements of a standard computer laboratory. (4mks)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………..
……………………………………………………………………………………………………
……………………………………………………………………………….
c) Describe any three ways an operating system manages the secondary storage of a computer. (3
marks)

(d) State the following file attributes in relation to operating system. (4mks)
(i) Archive
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………..……………………………………………………………………………….

(iii) Read Only

……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………..……………………………………………………………………………….

(iii) Encrypted
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………..……………………………………………………………………………….

Page 7 of 12
iv) Hidden

Page 8 of 12
18. (a) Differentiate between the following terms:
(i) Sequential and serial file organization methods. (2mks)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………..……………………………………………………………………………….

(ii) Random and indexed sequential file organization methods. (2mks)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………..……………………………………………………………………………….

(b) Explain the following types of data processing modes


(i) Batch processing (2mks)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………..……………………………………………………………………………….

(ii) Real time processing (2mks)

…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………..……………………………………………………………………….

(c) Define the following types of validation checks done during data processing. (4mks)
(i) Check digit
………………………………………………………………………………………………
………………………………………………………………………………………………

Page 9 of 12
(ii) Parity bit
………………………………………………………………………………………………
………………………………………………………………………………………………

(d) State three advantages of having a computer network. (3mks)


………………………………………………………………………………………………
………………………………………………………………………………………………
……………………..
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………..

Page 10 of 12
19. (a) State three breakthrough of Information Communication Technology (ICT) in health care

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………………………………………………………………………………….........................
.............................................................................................................................................(3mks)
(b) A school has two computer laboratories. The school decided to use a bridge to connect the
network in the two laboratories. State four functions of a bridge in the network. (4mks)

………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..

(c) Differentiate between a LAN and WAN. (2mks)


………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

(d) 10102 is a signed binary number. Work out three possible equivalents of the number in
denary. (6mks)

Page 11 of 12
20. (a) Differentiate between the following terms
i) Boundary and environment in a system (2mks)
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………

ii) Closed and opened system. (1mk)


………………………………………………………………………………………………
………………………………………………………………………………………………
…………………………………………………………………………………………........

(b) Bidii secondary school bought a club membership management system from a software
engineer and implemented it. The system was scheduled for maintenance on an annual basis.
Describe three types of system maintenance that could be done to their system. (6mks)
………………………………………………………………………………………………
………………………………………………………………………………………………
…………………………………………………………………………………………........
………………………………………………………………………………………………
………………………………………………………………………………………………
c) Describe three components of an expert system. (6mks)

……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………….

Page 12 of 12

You might also like