0% found this document useful (0 votes)
56 views12 pages

Form 4 Comp Assignment

The document is an assignment for Form Four students in Computer Studies, consisting of various questions divided into two sections. Section A includes 15 questions covering topics such as database normalization, system analysis, data security, and networking, while Section B has 5 main questions that require more detailed responses related to programming, electronic information processing, and data management. The assignment aims to assess students' understanding of computer studies concepts and their ability to apply this knowledge in practical scenarios.

Uploaded by

kagwe16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views12 pages

Form 4 Comp Assignment

The document is an assignment for Form Four students in Computer Studies, consisting of various questions divided into two sections. Section A includes 15 questions covering topics such as database normalization, system analysis, data security, and networking, while Section B has 5 main questions that require more detailed responses related to programming, electronic information processing, and data management. The assignment aims to assess students' understanding of computer studies concepts and their ability to apply this knowledge in practical scenarios.

Uploaded by

kagwe16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

FORM FOUR AUGUST HOLIDAY ASSIGNMENT -2025

COMPUTER STUDIES Paper 1

Name: …………………………………………….……Adm No: ……….……

Class: ………………

SECTION A: 40 MARKS
Answer all the questions in this Section
1. State two objectives of normalization in Databases (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

....................................................................................................................................................................

2. Give three qualities of a good system analyst (3mark)


(3mark)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

3. Explain how data in a computer system can be secured using (2marks)


(i) Security monitors
.....................................................................................................................................................................

.....................................................................................................................................................................

...................................................................................................................................................................

(ii) Biometric systems


.....................................................................................................................................................................

.....................................................................................................................................................................

....................................................................................................................................................................

4.
(i) Name two inputs devices that may be used as output devices (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

(ii) Give two limitations of voice input devices (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

5. Why is fibre optic more secure than Twisted pair and coaxial cables (1mark)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

6. State the function of the following features of a DTP publication window


(i) Pasteboard (2marks)
.....................................................................................................................................................................

....................................................................................................................................................................

(ii) Master page (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

7. Mention two effects of shutting down a computer using the wrong procedure (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

8. Levine is a System Analyst working with Victoria International Agencies. Levine was requested to
develop a new information system to replace the current system in a stakeholder’s meeting chaired
by the General Manager. Give three reasons to justify why the organization is in need of a new
system yet there is one in place (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................
9. Mention three disadvantages of GUI based operating systems (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

10. Nairobi University ICT hub developed an Expert system to help in disease diagnosis. Describe
three main components that developers must incorporate in this system to make it mimic human
experts (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

11. Computer network technicians prefer to use command line based Operating systems when configuring
networks. State three reasons for the preference (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

...................................................................................................................................................................

12. Explain the following limitations of Networking


(a) Over reliance (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

(b) Data security (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

13. Give two reasons for extensive use of Electronic Fund Transfer in modern society (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

14. State two ways of solving printing problem like lack of two way communication (2marks)

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

....................................................................................................................................................................

15. Describe two challenges associated with the use of internet services like blogs, social media
networks and instant messaging (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................
SECTION B: 60 MARKS
Answer question number 16 any other three questions in this section
16.
(i) What is test data as used in programming environment (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

...................................................................................................................................................................

(ii) State three ways employed by computer programmers to make the program code easier to
understand and follow (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

(iii) Describe a situation where a loop would be useful when writing a program code (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

....................................................................................................................................................................

(iv) Study the pseudo code below and use it draw a flow chart that will represent in all aspects
(8marks)
1. Start
2. Count =1
3. Average =0
4. For Count =1 to 5 Do
5. Enter Mark1, Mark 2, Mark 3, Mark 4
6. Get the sum
7. Compute Average
8. Is average greater than or equal 50
9. Print Pass
10. Else
11. Output Fail
12. Average =average +Average
13. Count=count +1
14. Endfor
15. Mean score=Average/count
16. Stop
17.
(i) Perform the following number system conversion
(a) 19.187510 to Binary (2marks)

(b) AB16 to Octal (2marks)

(ii) Perform the twos complement on 1310 -2310, leaving your answer in decimal number system
(4marks)

(iii) Describe three challenges affecting electronic information processing (3marks)


..................................................................................................................................................................

..................................................................................................................................................................

..................................................................................................................................................................

..................................................................................................................................................................

(iv) Most organizations today are migrating from manual file system to computerized filling system
so as to have a competitive advantages in discharging their functions. State four advantages of
adopting this innovation (4marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

..................................................................................................................................................................

18.
(i) Give four command buttons from Picture tools used to make an image more visually appealing
(4marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

(ii) List four types of mail merge documents (4marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

(iii) Briefly describe the following features of Microsoft Excel screen layout
(a) Formula bar (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

....................................................................................................................................................................

(b) Name Box (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

(iv) Describe three data management features supported by Microsoft Excel (3marks)

.....................................................................................................................................................................

.....................................................................................................................................................................
.....................................................................................................................................................................

.....................................................................................................................................................................

....................................................................................................................................................................

19.
(i) Mention three functions of a form in a database (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

...................................................................................................................................................................

(ii) Use an example to explain the following data types as used in DBMS
(a) Calculated (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

(b) Yes/No (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

(iii) Describe the types of relationships depicted by the diagram below


(a) (2marks)

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................
(b) (2marks)

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

(iv) The table below is an extract from a database table use it to answer the questions that follows
Product Code Product Name Date of Birth Unit cost Quantity Total
01001101 Maize 02/03/2002 2000 10 20000
01223030 Millet 12/12/2002 1000 20 20000
10239345 Wallet 03/09/2005 100 10 1000
19019001 Sweet 09/09/2006 1000 5 5000

(a) Write an input mask that will display the product names as represented in the table (2marks)

.....................................................................................................................................................................

(b) Set a validation rule in the date of Birth column to (2marks)


 Restrict entries of future dates
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

 Accept year of Birth between 2002 and 2006


.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................
20.
(a) Explain the following terms as used in Data security
(i) Exploits (2marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

(ii) Intellectual property right (2marks)


.....................................................................................................................................................................

.....................................................................................................................................................................

....................................................................................................................................................................

(b) State five measure against theft that school managers need to impose to safeguard their
computer laboratories (5marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

..................................................................................................................................................................

(c) Give three reasons for the adoption of e-commerce platform by most businesses (3marks)
.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

.....................................................................................................................................................................

....................................................................................................................................................................

(d) Mention three factors to consider when choosing an ISP (3marks)


.....................................................................................................................................................................

.....................................................................................................................................................................
.....................................................................................................................................................................

.....................................................................................................................................................................

You might also like