Answer ALL the questions in this section in the spaces provided

  1. Give a reason for each of the following
    1. Changing a password regularly ( 1 mk)
    2. Typing and re- typing a new password when changing it ( 1 mk)
  2. With reference to quality of print, noise level and cost, compare a dot matrix with a laser printer ( 3 mks)
  3. A computer accessories vendor needs to order supplies. A spreadsheet is used to calculate the order part of which is shown below.
1. Item Price per unit Number ordered Cost (Kshs)
2. 56 K modem 8,565.00 60
3. 128 MB Ram 4, 950.00 40
4. Pentium IV Processor 13,525.00 55
5. Total

(a) Write the formula that can be used in:

  1. D2 ( 1 mk)
  2. D5 ( 1 mk)

(b) If a value added tax (VAT) of 16% was charged on each item and the number ordered was decreased by 10%, write a new formula that can be used in D2 ( 2 mks)

4. List two uses of computers in meteorology ( 2 mks)

5. Explain the following terms as used in desktop publishing ( 2 mks)

  1. Embedded object
  2. Auto flow

6. (a) Name four approaches that may be used to replace a computerized

Information system ( 2 mks)


(b) Which of the approaches named in (a) above is appropriate for critical systems? Explain ( 2 mks)

  1. Explain the following operating systems functions

(a) Job scheduling ( 1 mk)

(b) Interrupt handling ( 1 mk)

  1. Name four toggle keys on a standard computer keyboard ( 2 mks)
  2. A computer user typed the name Kajiado as Kajiado and 8726 as 8126
    1. State the type of each error ( 1 mk)
    2. Explain how such errors can be controlled ( 2 mks)
  3. Describe third generation languages and name two examples ( 2 mks)
  4. (a) (i) What is an internet Protocol (IP) address? ( 1 mk)

(ii) Why is an IP address necessary? ( 1 mk)

(b) What is the purpose of the following internet domains? ( 1 mk)

  1. .org
  2. .gov


  1. (a) name two types of buses found on the computer motherboard ( 2 mks)

(b) State the purpose of each of the types of buses named in (a) above ( 2 mks)

  1. (a) Name the two files commonly used in mail merge ( 1 mk)

(b) Name and explain the two types of drop caps ( 2 mks)

  1. Give three ways in which horticultural farmers can benefit from the use of information and communication Technology (ICT) ( 3 mks)
  2. Arrange the following job titles in the order of their seniority

Database administrator, ICT manager, systems analyst ( 1 mk)



Answer question 16 and other three questions from this section in the spaces provided

  1. Study the flowchart below and answer the questions that follow

(a) What would the flowchart generate as output if the value of N at input was:

(i) 6? ( 2 mks)

(ii) 1? ( 2 mks)

(b) Write a pseudocode that does the same thing as the flowchart above

( 7 mks)

(c) Modify the flowchart so as to reject an input below and to avoid the looping when the input is 0 ( 4 mks)

  1. A lecturer keeps the following student details in a database: name, age, course

(a) write an expression you would use to compute the year of birth of a student using this year as the current year ( 2 mks)

(b) what query expressions would the lecturer use to list the students whose age is above 15 years and below 25 years? ( 3 mks)

(c) Which expression would the lecturer use to generate?

(i) The number of students in the database? ( 2 mks)

(ii) The mean age of the students in the database? ( 2 mks)

(d) Name and describe any two types of database models ( 6 mks)

  1. (a) The diagram below shows a layout of a computer network used by a law farm. A workstation and a printer are located in every consulting room

(i) Name the network topology depicted in the diagram ( 1 mk)

(ii) Name the device labeled D ( 1 mk)

(iii) State four functions of the device labeled ‘server’ ( 4 mks)

(iv) Give two advantages and one disadvantage of the above network design

( 3 mks)

(v) If the firm intends to open extra offices in two different towns, name any

three hardware devices that would be required ( 3 mks)

(vi) State any two security problems that might arise by linking the offices in

different towns ( 2 mks)

(b) What is spyware? ( 1 mk)

  1. (a) Study the following diagram and answer the questions that follow

From the diagram:

(i) Name two devices that are used for long term storage ( 2 mks)

(ii) Name three peripherals shown on the diagram that are used for input (3 mks)

(iii) Name two other devices that a computer Aided Design (CAD) user might wish to add to the set- up above ( 2 mks)

(b) A customer wishes to purchase a computer system. The customer can buy a word processor, spreadsheet, database and a drawing package separately or as an integrated package. State three advantages why many computer users prefer integrated packages to separate packages.

(c) (i) An anti- virus software installed in a computer is loaded into the main memory each time the computer is switched on

Explain three ways in which computer virus are spread from one computer to another

( 3 mks)

(ii) Give two reasons why an anti virus package should be updated regularly

( 2 mks)

  1. (a) Perform the following binary arithmetic and give your answers in decimal notation:
  2. 1010.101 + 11.011 ( 3 mks)
  3. 1010.011 – 11.011 ( 3 mks)

(b) Covert the following numbers into their binary equivalents

  1. 0.562510 ( 3 mks)
  2. 0.312510 ( 3 mks)

(c) Using four – bit twos compliment, perform the following arithmetic

  1. Design a newspaper publication to appear as indicated in the next page using the following instruction.

(a) Launch the DTP package and set the preference measurements to centimeters and the document margins to 2 cm on all sides ( 2 mks)

(b) The headings “digital Bulletin’ to have the following styles ( 4 mks)

    • Centered across the page
    • Font face: Arial
    • Font size: 45
    • Background colour: grey

(c) The other two headings in the publication to have the styles

  • Font face: Ariel narrow
  • Font size: 20
  • Text weight: Bold
  • Character spacing: 150%
  • Alignment: centered across the page ( 5 mks)

(d) The text under the heading “Basic Networking and Connectivity’ to be in three columns and having the following styles ( 22 mks)

  • Font size: 14
  • First character of the paragraph to have a 3 lines drop cap
  • Hyphenation: disabled
  • Fully justified

(e) The text under the heading ‘Antivirus Information Corner’ to be in a single column ( 3 mks)

(f) Design the Mercury Digishop advertisement in the position shown

( 10 mks)

(g) Insert the two lines of 4 and 0.75 points respectively in their positions

( 3 mks)

(h) Print the publication ( 1 mk)


Basic Networking and Connectivity


he ability to expand beyond the limit of a single office has extended the reach of the PC to global proportions. Two technologies have driven this expansion; a computer network and the global network known as the internet.

A network is defined as two or more computers linked together for the purpose of communicating and sharing information and other resources. Most networks are constructed around cable connection that link computers. This connection permits the computers to talk ( and listen) though a wire. More recently, a number of wireless solutions have become available. Infrared Ports,

Bluetooth, radio links and other protocols allow variety of new devices to link with PCs. In order for the network to function, three basic requirement must be met:

  • The network must provide connections, communication and services
  • Connection include the hardware (physical components) required to hook up a computer to the network.
  • Communication establishes the rules concerning how computers talk and understand each other. Computers often run different software and therefore they must speak a shared language

A service defines those things a computer shares with the rest of the network. For example, a computer can share a printer or specific directories or files. Unless computers on the network are capable



Pentium IV

Duo 1.8 Ghz Intel,

120Gb HDD, 512 Mb

Memory, keyboard, full multimedia


Antivirus Information Corner

Viruses are small programs that hide themselves on your disk (diskettes and hard disks). Unless you use virus detection software the first time that you know that you have a virus is when it is active. Different viruses are activated in different ways, for instance, the famous Friday the 13th virus will activate only when it is both a Friday and the 13th of the month. Be aware, virus can destroy all you data.

2. The central bank of Kenya (CBK) exchange rates on a certain day for foreign currencies against the Kenya shillings (Kshs) were as follows


Currency CBK Mean Rate (Kshs)
1 US Dollar 67.0222
1 sterling pound 137.7984
1 Euro 96.6552
1 S.A Rand 10.3100
1 Sweddish Kroner 10.4509

Kariuki, Hamisi, Mumbua, Otieno and Nekesa trade in buying and selling of foreign currencies. On that day they bought the following foreign currencies from CBK.

Name U.S Dollars Sterling Pounds Euros S.A Rands Swedish Kroner
Kariuki 400 200 340 1200 290
Hamisi 500 400 400 2000 3000
Mumbua 200 600 300 4000 5000
Otieno 600 200 200 1000 3000
Nekesa 400 200 600 2000 1000

They then sold their foreigners currencies at the following rates

Name U.S Dollars Sterling Pounds Euros S.A Rands Swedish Kroner
Kariuki 70.5 139.0 96.7910 10.4213 10.6725
Hamisi 69.0 138.5 96.79 10.5712 10.2676
Mumbua 70.0 141.5 96.76 10.3974 10.7432
Otieno 69.55 139.0 96.80 10.6371 10.5942
Nekesa 69.5 138.5 96.40 10.7218 10.6155

(a) Using a spreadsheet package, represent the above information in one worksheet and save it as FOREX (13 mks)

(b) Using formulae with absolute and relative cell references, determine the total profit made by each trader. ( 14 mks)

(c) Format the profit for each trader to zero decimal places ( 2 mks)

(d) Create a well labeled bar graph on a different worksheet showing the cost incurred on buying US dollars by each trader (13 mks)

(e) Use a function to determine the trader who got the highest profit ( 3 mks)

(f) Format the first table as follows:

  • Set the direction of the labels to 450 ( 2 mks)
  • Centre vertically all the records ( 1 mk)

(g) Print the worksheet and the graph ( 2 mks)