Form 2 Comp M.S
Form 2 Comp M.S
Form 2 Comp M.S
FORM TWO
TIME: 2 Hours
MARKING SCHEME
Desktop is mostly an empty screen that appears when windows starts and has some
standard icons that show that the computer is ready for use.
(b) Window
A rectangular area on a computer screen in which text, graphical images or the contents
of a folder or disk may be displaced
(c) Icon
A little picture on the computer screen representing a program, disk file folder or any
other item
(e) Taskbar
A long bar/ strip that runs across the desktop and displays the start button and any
other active tasks.
(f) Task
Any activity taking place in windows and is displayed on the taskbar, e.g. running
program
2. A computer user may interact with a computer either through Graphical User Interface (GUI)
or though typed commands
1
(a) Give three advantages of using GUI based operating system over a command line interface
( 3mks)
User friendliness
Easy to learn & use even by those who do not have much knowledge about them
One does not need to master any commands
It is faster to work with than a command line interface as it only relies on clicking the
icons by use of a pointing device
(b) Some computer systems still use command line interfaces. State two advantages of
command line interface (2mks)
- There is security of data as only those who know how to use the commands will access
it.
3. The Hierarchical system represented below shows how a school organizes its files. Study it and
answer the questions below.
The F2 directory has the files: classlist.doc, Districts.xls, and the tribe.mdb. Write down the
path of accessing the Districts. xls file. (2mks)
C:\SCHOOL\EXAMS\F2\Districts.xls
2
The printer is not responding to the print command. Explain three possible causes for the anomaly.
(3 marks)
- The printer may not have been set as the default printer.
- The data interface cable to the printer could be loose. Make sure it is firm at the ports.
- The printer could still be off. Switch it on, and it will start printing.
- The wrong printer could have been selected. Select the right printer in the print dialog
box and send the print job again.
b) State three differences between a laser and dot matrix printers. (3 mks)
-laser uses light technology while dot matrix uses striking mechanism
- Can be used to restore files & folders accidentally deleted from the computer
6. a) Veronica tried to retrieve a document file following all the steps correctly. The filename did not
appear in file list box. State three causes for this. (3mks)
- The file may be located in a different folder from the one she was trying to
3
b) Mwikali selected a paragraph in word processing. Explain what happened after pressing the
following keys on the keyboard: (3mks)
iii) CTRL+ U -the selected text is underlined/removes underline from the selected text.
7. Therefore it demands a great deal of perseverance of the students and there are a number of
difficulties that have to be combated which other students face less. One of them is that they
have to cope with their study material in a different way. Other students can refer to their
ime management and planning is a major issue for ODL students who are probably less encouraged
than other students. Other students also have a number of fellow students and build a network.
TContacts with fellow students are important for moral support and study support.
This course is structured in form of lectures. In the library™, the Internet or any other relevant
each lecture you will find some activities or source. You should also consult with the
exercises that you should go university lecturers or any other qualified staff.
before starting the subsequent unit. It is As you might be aware, you should read other
advisable that you answer all the questions and sources to supplement the materials in this
check the answers from the various sources i.e., course.
a) List three formatting features applied on paragraph one 3mks
Italics
Line spacing
Hanging Indentation
Left alignment
b) List three formatting features applied on paragraph two 3mks
Drop cap
Bold
Strikethrough
Left alignment
4
c) List three formatting features applied on paragraph three 3mks
symbol
columns
wordart
left alignment
superscript
8. The following information shows the income and expenditure for “mrembo” matatu for five days.
The income from Monday to Friday was Ksh. 4,000, 9,000, 10,000, 15,000, and 12,000 respectively
while the expenditure for the same period was Kshs. 2,000, 3, 000, 7,000, 5,000, and 6,000
respectively.
i) Draw a spreadsheet that would contain the information. Indicate the rows as 1, 2, 3…..And
the columns as A, B, C…. (6mks)
A B C
1 MREMBO MATATU
3 columns with titles @ 2 mark each = 6 marks OR 3 rows with titles @ 2 mark each =(6 mks)
5
ii) State the expression that would be used to obtain: (6mks)
i) Monday’s profit
= B3-C3 or =B3-B4
OR
9. “Piracy is the worst computer crime that is scaring software developers out of their wits”.
a) What do you understand by the term piracy? (2 mks)
intellectual theft by making illegal copies of copyrighted software, information or data
b) Suggest three ways that can be instituted to reduce piracy (3 mks)
Enact laws that protect developers of software against piracy
Make software cheap enough to increase affordability
Use licenses and certificates to identify originals
Set installation passwords that deter illegal installation of software
create install once software.
10. Ken is a cybercafé attendant at Mogotio, of late some of his computers have been having the
following problems:
- The hard disk has been detected full yet only half of its capacity is used
-Frequent hanging
-some drives were not accessible
-Problem in booting
6
-Disappearance of files
a) What could be the cause of the mentioned problems ? (1 mk)
Virus attack
b) List four possible sources of the above mentioned problems (4 mks)
Contact with virus infected storage media
Downloading program and files from internet
Using foreign storage media without scanning
Sharing of virus infected machines
c) Advice Ken on how to solve the above mentioned problems (3 mks)
Running antivirus software programs regularly
Controlling the movement of storage media (e.g. floppy disks, flash disk, etc) in and out
of the computer room
Disabling the storage drives like floppy disks and flash drives etc
The use of computer hardware or software for illegal activities, e.g., stealing, forgery
defrauding, etc.
A deliberate theft or criminal destruction of computerized data
Committing of illegal acts using a computer or against a computer system.
b) Explain the meaning of each of the following with reference to computer crimes.
(5mks)
i) Cracking – use of guesswork over and over again trying to look for
weak access points in software in order to get access to data & information
7
iii) Eavesdropping- Tapping into communication channel to get information
13. The Independent Electoral and Boundary commission (IEBC), is planning to use computerized
voting system in the forth coming general elections. Give four advantages of this approach. (4mks)
ii) Accuracy
iii) It will allow online inspection and voting i.e Diaspora voting
iv Cost saving
14. Identify four different types of publications that can be produced using desktop publishing
software. (4mks)
- Cards, e.g. for special occasions such as weddings, graduations, congratulations, etc
- Newsletters
- Newspapers
- Calendars
- Advertisements/Posters
- Magazines
- Certificates
- Notices
- Catalogues
- Pamphlets
- Books
- Brochures
15. Define the following database components. (5mks)
A drive is a computer device for reading data from or writing data into a storage media,
e.g. a tape or disk
(b) State any two types of computer drives, giving an example of a storage device used by each
( 4 mks)