Comp
Comp
Comp
(i) Identify the type of operating system represented in Figure 1,2 and 3
Figure 1 – Menu Driven
Figure 2 – Graphical User Interface
Figure 3 – Command line
Award 1 mark each max 3
(ii) State four advantages of the operating system represented in Figure 3
Execute very fast
Require small space for storage
Can with computers that have very low screen resolutions
Uses very few system resources
Award 1 nark each max 4
3. Describe the following terms as used with Monitors
(i) Pixel
Pixel is a picture element and are tiny dots which are used to form the images displayed on the
screen
(ii) Resolution
It refer to number of pixel per inch on the screen
Award 2marks each max 4
1
4. State four Keyboard keys that works in a state of ON/OFF switches in operation
Caps lock
Num lock
Scroll lock
Insert Key
Award 1mark each max 4
5. State five ways of ensuring that a computer lab is well burglar proofed
Have grill doors and windows
Install CCTV camera at strategic places within the lab
Install security alarm system
Use biometric system at the entrance
Use smart cards to open the doors at the entrance
Employ security personnel to keep watch
The room should always be under lock and key while not in use
Award 1 mark each max 5
6. Matilda a student from Kanga High School was typing his assignment on a computer using Microsoft
windows Operating system. After 10 minutes the computer’s graphical user interface refused to respond
to his typing on the keyboard at the same time he was unable to move the mouse pointer on the screen.
State five possible causes of this anomaly
Malware attacks
Corrupt drivers
Outdated drivers
Faulty ports on the motherboard
Not enough memory
Physical damage
Award 1 mark each max 5
7. Jeff bought a laptop from PC World Limited in Nairobi. The Sales person received the cash and then
gave Jeff the warranty document to read and sign before he would issue him with a receipt. Describe
three basic requirements that must be contained in this warranty document
Scope of coverage- This is the period for which the warranty is valid
Callout response and liability agreement- how long should the supplier take to repair a fault or
replace the product, and if he/she delays who bears the cost.
Preventative maintenance - Preventive maintenance is the act of performing regularly scheduled
maintenance activities to help prevent unexpected failures in the future.
Award 1 mark each max 3
8. State four features of Dynamic Random Access memory
DRAM require refreshing because it loses its content even with constant power supply
Slower type of memory
Consume more power
It is larger than the SRAM
DRAM cells are made of Transistors and capacitors
Award 1 mark each max 4
2
9. Describe the functions of the following Disk management operations
(i) Disk Defragmentation
Reduce the access time
Create more free space on the disk by consolidating scattered files
(ii) Disk Partitioning
For backup purposes
To allow installation of more than one operating system
Award 1mark each max 4
10. Describe two reasons why smaller computers like Laptop tend to be more expensive than Desktops
They are small in size therefore users can move with them from one place to another with ease.
They are conveniently portable. This makes more expensive
Energy efficient. Laptops have inbuilt rechargeable battery that therefore they can be used in
places without electricity once charged
Integrated peripheral device. The technology used to develop small computer is more advance.
The peripheral devices are integrated together
Award I mark each max 4
11. Briefly describe how computers are used in Sport Management
VAR system used to assist the center referee in making decisions
Computer based programs are used to create match fixtures
Computer applications accurately compute match results and present the in table
Match officials communicate with each other using audio and text based gadgets during the
match
Online booking for fans who want to watch the matches
Award 1 mark each max 5
Note that the technology must be included
12. Name three Input and three Output devices used by the cashier at the Electronic Point of Sale (6marks)
Input
Keyboard
Input
Touch Screen
Finger print scanner
QR code Scanner
Award 1 mark each max 3
Output
Monitor
Printer
Speaker
Award 1 mark each max 3
3
14. Name three devices that can be connected to the computer using the following interface cable
(i) VGA
Projector
TV
Monitor
Award 1 mark each max 3
(ii) Serial cable
Printer
Mouse
Keyboard
Modem
Award 1 mark each max 3
15. The diagram below represent a computer component. Use it to answer the questions that follow
Figure 4
(i) Identify the component represented in Figure 4
Power Supply unit
(ii) State two functions of the component in (i) above
Convert Alternating currents to Direct current
Supply power to all the components within the system unit
4
(iii) Explain what is meant by volatile memory in computer
Refer to memory that loses its content when power is switched off
Award 2 marks each max 2
17.
(i) Give four differences between Impact and Non-Impact printers
Impact Printer Non-Impact
Slow Fast
Cheap Expensive
Low quality output High quality output
Production of multiple copies possible Production of multiple copies impossible
Award 1 mark each max 4
(ii) Range of capabilities is one of the factors one must consider when choosing a printer. State five
features that a printer must possess to meet the requirements of this factor
Support wireless connectivity
Printing using different paper sizes
Duplex printing
Printing from mobile devices like tablets, phones etc.
Varied printing color
Support network connection
Award 1 mark each max 5
18. List five precautions you would take to avoid damaging magnetic media
Do not expose magnetic media to a stronger magnetic field
Do not expose magnetic media to excess heat
Do not drop magnetic media on the ground
Do not fold , bend or put heavy weight on a magnetic media
Do not touch the magnetic media surfaces
Do not remove the magnetic media from the drive when it is still being accessed
Award 1 mark each max 5
5
20. One of the functions of the operating system is to protect information and programs in a computer.
Briefly describe five ways employed by the operating system to achieve this function
Create user name and password- The operating system give user a platform create user name and
password. Only users with correct credentials will be allowed to login the system
Enforce the use of Biometric systems to authenticate the users. This involves the use of human
features like finger print, voice code and facial recognition to identify users. The operating system
provide an environment in which these systems operate
Having firewalls to filter data and information. Windows operating systems have inbuilt firewalls
that monitors and controls the incoming and outgoing network traffic based on predefined rules
Log file to track events in the computer. They serve as a detailed record of what has happened
within a system, which can be used for troubleshooting problems or investigating security
incidents.
Backup facility. Operating system have mechanisms of creating duplicate copies of a file and then
save them in a separate location. These backup files can be used to reconstruct the system in case
the main file is corrupt or damaged
Award 1 mark each max 5