Get premium membership and access revision papers with marking schemes, video lessons and live classes.

Form 2 Computer Studies Paper 2 End of Term 3 Examination 2022

Class: Form 2

Subject: Computer Studies

Level: High School

Exam Category: Form 2 End Term 3 Exams

Document Type: Pdf

    

Views: 1655     Downloads: 27

Exam Summary


TERM 3 END YEAR EXAM- 2022
COMPUTER STUDIES PAPER 2451/2
Kenya Certificate of Secondary Education (K.C.S.E) (PRACTICAL)
FORM TWO TIME 2½ Hrs. NAME……………………………………………………ADM NO……………………………
SCHOOL:…………………………..SIGN: ………………………. DATE:………… Instruction to Candidates
 The Paper has two questions.
 Answer all the questions.
 Type your name and index number at the Right- hand corner of each printout.
 Write your name and index number on the CD.
 Write the name and version of software used in each question on the answer sheet.
 Password should not be used on CD.
 All answer must be saved on the CD.
 Hand in all the printouts and the CD.

QUESTION ONE (50 MARKS)
a) Using an appropriate word processing, type the following passage and save it in as: Data (10mks)
Data security and control External threats
i) Fire. Floods, earthquakes, and other natural disasters, these are the potential threats hut are not the most common external problems,
ii) Theft of equipment- theft of pc’s laser printers and even memory chips after a Break into a building are quite common.
iii) Espionage (intelligence) - information in the wrong hands can do a lot of damage. Example access to a payroll or accounting information is restricted so such information should be shielded from external and internal spies.
Internal threats Internal threat would include.
i) hacking
ii) Fraud iii) Hardware failure
iv) Corruption of databases
Viruses load and run without the user requesting them to run and cause considerable damage e.g.
i) Modifying another program
ii) Hiding inside other programs with an aim of spreading to another machine
iii) Destroying data and programs. It is a computer code which usually designed to carry out two tasks:
i) To replicate itself’ from one computer s stem to another.
ii) To locate itself’ within a computer system in such a way as to make it possible for it to amend or destroy programs and data files, by interfering with the normal processes of the operating system.
17.png
(d) Save the document as security (2mks)
(e) (i) Copy the original document (data security) to the next page(2mks)
(ii) Drop cap the first letter of the document (D) to cover two lines (1mk)
(iii) Spell check the whole document. (2mks
(iv) Double space and italics the first paragraph (3mks)
(v) Insert a header ‘computer threat’ to appear in every page (2mks)
(iv) Number the pages using the format I,ii,iii..... at the center of the page. (3mks)
(f) Save the document as COMPUTER THREAT (2mks)
(g) Print the document
(i) Data security (1mk) (ii) Security (1mk) (iii) Computer threat (1mk)
18.png
19.png

 

More Examination Papers