Computrix pp1 Mscheme
Computrix pp1 Mscheme
COMPUTER STUDIES
THEORY PAPER 1
MARKING SCHEME
SECTION 40 MARKS
1.
Input
Processing
Memory
Output ( ½ mark each)
2.
Control unit direct the transfer of data and all the coordination and supervision of the CPU
(1mk)
Arithmetic logic unit perform mathematical and logical operations (1mk)
3.
Read only memory (ROM) (1/2mk)
Random access memory RAM (1/2mk)
ROM is a primary memory unit that can only be reach from but not written into (1mk)
RAMis a temporary storage unit that allows the user to read from and write into (1mk)
4.
i) Pause – A toggle key that temporarily stop the current operation (1mk)
ii) Function keys – provides software dependent commands. (1mk)
5.
By controlling a microphone with a speech recognition device , it is possible to speak to a computer and have it
respond as if you were using a keyboard e.g. you can enter text, issue, commands, modify and edit document e.t.c
(2mks)
It is difficult to develop because of the tremendous difference in voice pattern e.g accent, tones e.t.c.The device
must learn the unique speech pattern of an individual. (2mks)
6.
A magnetic disk is a direct access storage media (DASD) that permits the computer to find data directly on the
disk. (2mks)
7.
Hard disk provides greater storage capacity than the floppy disk (1mks)
Hard disk operates or much higher retrieval speed. (½ mk)
8.
Testing is done to find out whether the system meets all requirements defined. (1mk)
If is also important to test whether the system has some failure so as to be corrected before implementation.
(½ mk)
9.
a)
(1mk)
b) It is easy to develop devices that can understand binary language than to develop devices that
understand the natural language. (1mk)
10.
i) Buffers are temporary holding place that may be part of CPU or built in an input or output
device. (1mk)
ii) An accumulator – holds the results of the last processing step of the ALU.
iii) Cacle memory – allow the processor to access data and instruction even move faster than it
would have taken to fetch it from relatively slow DRAM. (1mk)
11.
The target audience-the audience e.g. users, management have varied output requirements.
(1mks)
i) The frequency of report generation- some reports are required daily, others monthly or periodically.
(1mks)
12.
ii) Graphic refers to non-text images generated by a computer e.g. drawings, photographs e.t.s
(2mk)
iii) Microsoft chip Gallery ½ mk
A scanner ½ mk
Drawing using drawing tool.
13.
i) If returns a specified value if a condition is evaluated as four to be true and another value if false.
(1mk)
ii) Count if – count the number of cells within a specified range that meet the given condition or criteria.
(1mk)
iii) Sum if – it add value in the cells specified by a given condition or criteria. (1mk)
14.
i) A form enables the user to view and make entries into an underlying table more easily.
(2mks)
Columnar ½ mk
Tabular ½ mk
Data sheet ½ mk
Justified ½ mk
15.
Tracking refers to changing the visual denseness or openness of characters in a line which kerning is fixing
particular pairs of letters that are too close or too far apart from each other such as to i.e W O etc
(2mks)
Stroke is used to apply line style which fill is used to fill the object with a base group colour
SECTION B
16
(a)
i)
(i)Structured programming is a procedure programming language other make it possible to break a
program into components called nodules or sub routes
ii) (ii)A constant is a value that remains the same (does not change) during the exertion of a program
iii) A variable is a value that keep changing during the exertion of a program (1mk)
(b) Dummy data are the data that are randomly picked to be used for testing whereas real data are the actual data
that can be used in the day to day running of the system
(c)P10
START
16.C Start
Print “Enter the loan amount 200,000’’
Input 200,000
Monthly repayment = 200,000/24
Loan balance = Loan Amount-Monthly repayment
If loan balance =O THEN
Print “Loan cleared”
ELSE
Loan balance =Loan balance-Monthly repayment
END IF
17. STOP
i) Making illegal copies of copy righted software information or data (1mk)
ii) Industrial espionage – spying in your computer to get information that you can use to counter
finish a competitor (1mk)
(b)
i. (i)Password protection – A password to open or exit the database file is set for any user who
wishes to do this action (2mks)
ii. (ii)Data encryption –If the database is to be sent electronically encryption secures the data from
un authorized access
others can be (2mks)
User and group permission to users on data base object such as queries form and reports
User level security –This feature is used to assign permission to users in order to limit user access to certain
database object
(c) Network operating system enables the exchange of data in a network as well as providing data
security (2mks)
(d) Repeaters receive signal from one segment of a network cleans it to remove distribution boosts it and then
sends it to another segment whereas routers interconnects different networks and directs the transfer of data
packets from source to distribution
ii) In random file organization records in a file are stored randomly but accessed directly
whereas Index sequential is similar to sequential file organization only that index is used to
enable the computer to locate individual record on the storage media
(2mks)
(b)
i) In batch processing ,data is accumulated as a group (batch) over a specified period of time, eg.
Daily, weekly, monthly etc. (2mks)
ii) In a reel time data processing computer processes the incoming data as soon as it occurs up –
dates the transaction file and give an immediate response that world affect the event as they
happen. (2mks)
(c) Undo – This is a command used to cancel the operation that has just been processed (2mks)
Redo – This is used to reinstate the command that was cancelled (1mk)
(d)
Expert system
Diagnosis
Keep patients record
Used in hospital for stock control
Use to manage finances
(3mks for any three correct answers)
(e)
Diploma in ICT
Certificate in ICT
Diploma in computer science
Certificate in computer science
( 2mks for any two correct answers)
(i)
(ii)
(c)
Problem recognition and definition
Information gathering
Requirements specification
System design
System construction (coding)
System implementation
System review
(Award 1 mark for each correct answers maximum of 7marks)
Computrix 002
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME
SECTION A 40 MARKS!
1. State one main reason why typing tutor is recommended to be used by computer students
(1
mark)
Improve Speed
Improve Accuracy
2. Give three main ways of classifying computers. (1 ½ marks)
Physical size
Functionality-not function
Purpose
3. Peter was sent to buy computers for the students' laboratory. He was supposed to take into
account the following factors.
• Processor speed
• Memory capacity
• Compatibility
Give three main reasons for taking into account the above factors( 3 marks)
• Processor speed determines the kind of programs to install, if it is fast multitasking
can be possible, bigger programs can be executes with ease
• Memory is important when looking at king of programs to installed, the speed of the
computer; it can be slow because of swapping if the memory is low.
• Compatibility is important since it would influence the future upgrading of the same
computer or using the existing software and hardware. ,
4. Basic computer setup and cabling is a very important concept to be taught in a computer class.
Give two reason to support the above concept. (2 mark)
• Improper set up can lead to spoiling the computer and at times crushing the whole
system.
• Improper starting up and shutting down can lead to crushing of the hard disk.
5. State any two factors to be considered when selecting hard copy output devices.(2 marks)
• The quality of output
• The speed
• Compatibility
d) margins
• Page margins are the blank space around the edges of the page
8. You have been asked to change your password .state a precaution you need to take in order
to avoid each of the following.( 2 marks)
a) Piracy
•Hiding-use of file attribute
b) Forgetting the password
•use simple password
9.
a. State two advantages of using a questionnaire for gathering information. (2 marks)
• Since they are filled and returned in privacy, more sincere responses are possible
• The respondents can fill the questionnaire at their own pace.
b. Give three factors to consider when designing the output in program development. (1 marks)
• The target audience
• The frequency of report generation
• Quality and format
10. a) Differentiate between pure binary and BCD code as used in data representational mark)
• in pure binary the whole number is converted into binary while in BCD code each
individual digit is converted into binary represented using 4 bits
b) Convert 2D1616 directly to binary.(2 marks)
2 D 1 6
2D1616 =00101011000101102
11. State the stages of system development in their logical sequence (3 ½ marks)
a. Problem recognition and definition
b. Information gathering
c. Requirement specification
d. System design
e. System construction
f. System implementation
g. System review and maintenance.
12. Explain any two cultural effects as a result of use of ICT. (4 marks)
a. computer crimes
b. Moral effects.
Stating and explaining
13. Name three responsibilities that are carried out by network support professionals.^ marks)
a. Managing network
b. Provide help to users
c. Support the development
d. Planning, scheduling and implementing network hardware and
software.
15. A school intends to set-up e-mail. List 4 activities likely to be provided by mails e-mail facility.
(2mks)
• checking mail,
• composing mail,
• forwarding mail,
• sending mail,
• saving mail
• printing mail
SECTION B (60 MARKS)
16. The gross salary of employees of Becam Technology Centre is based on basic salary;
the basic salary is based on grade and additional benefits as follows, a. Employees who have worked
for more than 5 years receive an additional pay of 5 %
to their basic salary, b. Monthly commissions are based on monthly sale of computers and
accessories profitas follows
Monthly sales Profit Commission Rate (%)
Above 100,000 20
(a). Draw a flow chart that would be used to calculate the gross salary. (14 marks)
• Peripheral control
• Error reporting
• File management
• Logging and accounting
(c). Explain how one can manage his/her disks using windows. (6 marks)
• Formatting disks
• Scanning a storage devices for problems
• Using disk defragmenter to rearrange storage media contents
• Compressing the storage media
• Backing up data
• Partitioning a disk
(d). Explain with the use of Dos how one can create a text file in C: called John, with text Welcome
Home. (4 marks)
• Change directory to c:- cd\
• Copy con John
Welcome Home
Press control z
• Then a file will be created
Computrix 004
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME
ii) Information technology – The tools (machines) and the technical know how that is used to
process data and generate information
iii) Information systems- The procedures/ programs that data is transformed through to generate
information
2 Assemblers – Are translators that are used to convert (translate) Assembly language to
machine language
Compliers – Translator that convert the whole source code into machine code
ii) Source code- set of instructions or program code written in a particular programming language
Object code- Is the set of instructions that have been translated into machine code
3. LPT USB
Slow in data transmission fast in transmission
Support only one type of device can support a number of devices
4 a) Magnets – demagnetize the magnetic disk and may lead to lose of data
ii) Water - may spill on the metallic parts/ electronic parts and hence cause rusting or short
circuit the system.
iii) Mouse
b) Joystick
8a ROM RAM
-Contents are manufacturer defined -User defined
-Permanent -temporary
b) Disadvantage Advantage
10 The future is through use of computer monic human intelligence in order to manage industries
with little human intervention
12. Editing tools- Tools used to create and edit objects / graphics
Formatting tools- Tools used to enhance the appearance of the graphics
13
– Supervise the working of the IT staff dept & implement preparing budget for the dept.
Keeping department inventory records up- to- date
Ensure that tasks in the IT department are done
Use of passwords
Audit trail
Fire wall
Section B
16 i) Third generation
FORTRAN
PASCAL
COBOL
BASIC
C
Ada
ii)
OOPs
HTML
JAVASCRIPT
VB script
PHP (hyper text preprocessor)
b)
Start ½
2010 Pyramid Projections © 2010 451/1
17
FIND TOTAL , MM ½
Nos= 0
Nom= 0
B 1
Nom= NOM+ 1
½
B Nos =40 ½
NO
YES
Nom = 3
Stop
c) Start
Initialize the number of subjects to 0
Initialize the number of students to 0
Ensure main for the first subject for me first student
Repeat till the 3rd subject
Calculate total
Calculate Average
Print Results
Repeat till the No. of students equal to 40
Stop
17 Guided unguided
a) Transmission that is directional Transmission that is not directional
b) Connects computer
Connects network
18 BCD Edcdic
4- Bit code -8- bit code
Allows representation of -Allow representation
16 character of 256 characters
Used in simple electronic divices -Primarily used in IBM computers
Advantage Disadvantage
Fast in processing as more than one Expensive and maintain
Processor is used - Requires high memory
iv)
o Simulation in scientific experiments in the science subjects
o Managing the academic program though processing of results
o Office management (account, record keeping)
o Research through the internet instead of relying primarily on the library
19 Is a careful study of an information system by expert in order to establish weak points in the
system so that could lead to security threats and weak access points for crinesteus
ii)
Data encypting
Log files
fire walls
b) Worn – Is a virus that infects the computer system. Can be controlled using anti- virus software
.
C) Real- time
Distributed data processing
Time sharing
Batch processing
Multi processing
Multi programming
Interactive processing
Computrix 007
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME
5. (i) Protocol – set of rules that govern how two or more computers can send and receive data in
a network (1mk)
(ii) Gateway –Any device that can be configured to provide access to wide area networks or
Internet.
(ii) Bandwidth – Maximum amount of data that a transmission medium can carry at any one
time (1mk)
- Interpreter translates the source program line –by-line allowing CPU to execute one line
before translating the next (2mks)
10. – Easy to develop devices that can understand it than natural language
- Simplifies technology needed to develop both hardware and software
- Digital devices are reliable
- Digital devices are small in size
- They are less energy (any two of above 2 marks)
Explanation
- String represent place values of numbers (1mk)
- Upper beads are two each representing five (1mk)
- Lower beads have five each representing unitary (1mk)
- Each string represented place value of number (1mk)
- Sliding of beads on a frame (1mk)
Computrix 001
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME
1.
– Baking halls, hotel airports – touch screens
– Engineering architectural designs – digitizers
– Banks – MICR
– Speech recognition devices – handicapped especially those with impaired hands , toys,
inventory taking in warehouses, blind paralyzed people can give command to a PC
2. Thesaurus – used to find synonyms, autonyms or related word
Spelling –checking for such common typing mistake as repeated words, irregular
capitalization, sentence structure such as very long sentence.
3. Organizes the memory into blocks of sizes called partitions. Assigns mails memory partition to
data & instruction
4. Curser movement keys
- Arrow keys, page up & page down home &end
Editing
- insert, delete (Del) key
5.
– Monitor traffic in a busy town
– Aircraft navigation
– Make reservation in airline
6.
a) Piracy – making illegal copies or copyright of software , information or data
b) Eavesdropping – tapping into communication channel to get information
7. Responsibilities of computer engineer
– Design and develop component such as storage devices motherboards
– Determine electrical power requirements of each computer components
– Re-engineer computer components to enhance functionality and efficiency
– Design &manufacture computer controlled device such as robots
8. Looping
- designed to execute the same block of code again and again until a certain condition is
fulfilled
Selection
- Execution of staments depends on a condition that returns true or false
9. AI- branch of computer science that is concerned with the development of machines that
emulate human like qualities such as learning reasoning, communicating seeing and hearing
10 meant to help designers to come up with quality layered protocol
11. Connect digital signal to analog and vice versa for the purpose of transmission over analog
media
12. Distributed systems
A computer network that is physically dispersed (geographically dispersed)
Computer network
An interconnected set of two or more computers
13. Difference between main frame, mini and microcomputer
Microcomputer – smallest cheapest &relatively least powerful, designed to be used
Mainframe-big in size, solve problems while scientific of commercial
Mini – slightly smaller than mainframe
-Not as power as mainframe
-Cheaper than main frame
-For small organizations
14. Logical errors – Errors in the program logic
- Not detectable by the translator
Syntax errors – emanate from improper use of language rules e.g. punctuation, grammar
15. Role of communication hardware, facilitates data transmission from source to destination.
Provide interface or junctions between the terminal devices.
16. (i) looping while DO 2 marks
(ii) Value of P<N
Advantage
Flexible in operation as compared toward devices can be moved around
without loosing access to the network
Can span large geographical area easily
can occur even in remote areas
Disadvantage
Difficult to establish & configure
Initial cost is very high
RSI- result from wrist , hand, arm, and muscle strain, tendonitis and neck strains , tendonitis and
neck strains due to force repetitive movement e.g. when entering data using the keyboard
- Give is by resting taking frequent breaks change typing technique
Eye strain
- improper use of monitors cause eye stain headaches double vision use monitors win good
resolution fitted in antiglare screen that fitters excess light the screens brightness should be
adjusted to the intensily that is comfortable with the eyes
Electromagnetic emission
- field emissions are waves of electrical and magnetic energy that are emitted by current
carrying conductors
- use low emission devices in order to avoid exposing themselves to excess emissions
19. (a) Computational errors
- Overflow errors
Calculation is too large to be stored in the allocated memory space
- Truncation errors
Occurs when we have real noss that have along fractional part which cannot fit in the
allocated memory space
- Rounding errors
Results from lowering a digit in a real number to the required rounded number
(b) Data processing cycle
(c) Logical files – viewed in terms of what data items it contains and details it what
processing operations may be performed on line data items
Physical files – views in terms of how data is stored on storage media and processing
operation are made possible
Multiprogramming
Where more than one program is executed apparently at the same time by a single
processing unit
In multiprocessing a computer has more than one processor and processing more than
one task at the same time on different processors of the same computer
(d) 12A .216
(e) Functions of Nos
– Provides access to networking resources
– Implementing network security
– Supporting network services like network card drive and protocols
– Respond to requests from application programs running on the network
– Supports process communication i.e. enable the various processes on the network
to communicate with one another
20. (a) start
Input a, b, q
x=a+3
y=b-2
z=q (x/y)
Stop (4 marks)
(b) The process of diagnosing and trying to fix (resolve) hardware or software related
(2 marks)
(c) (i) =IF (<2>2000 ,15% * C2,7.5% *C2 ) (2 marks)
(ii) = if (A2= “AFRICA” , “AFR” , IF (A2= “USA” , “US” IF (A2 = “EUROPE” ,
“EUR”))) (2 marks)
(d) New opportunities – chance to improve quality of internal processes and service
delivery in the organization
Problems – undesirable circumstances that prevent the organization from meeting
its goals
Directives – new requiment impoundly government might or external influence
(d)
– Games - e- learning
– Training of pilots - training drivers
– Therapy for paraplegic
Computrix 010
COMPUTER Paper 1
MARKING SCHEME
Section A
Answer all questions in this section (40 Marks)
1) Files in a computer can be organised in several ways. State three considerations when selecting the type of file
organisation? 3mks
2) Computers are finding applications in very many fields state any two advantages of use computers in the retail
businesses?
3) What will be the output of the following flowchart
4) Perform the following multiplication in binary form 13io X 7io, 2mks
5) Differentiate between
a) Data validation and verification Imk
b) Disk formatting and partitioning (Imks)« 2008
c) Search engine and hyperlink Imk
6) Explain two measures that a company that is connected to the internet can take to safe guard its data 2mks
7) The Nation newspaper company wishes to employee the following people. State two responsibilities of each?
a) Computer programmer 2mks
b) Web administrator 2 inks
8) Explain the following
a) Virtual Reality Imk
b) Expert system Imk
9) State one merit and one demerit of each of the following
a) Machine language programs Imk
b) Microwave communication mk
c) Networking computers mk
10) Softwares can be grouped as system and application what is the difference 2MKS
11) An operating is a very important system software in a computer state three factors that one should consider while
shopping for one
3mkse 200S
12) Write the following acronyms in full BIOS ____________________ MICR____________________ DVD
MS DOS
13) a) What is a DBMS? 1 MKS
b) A school want to use a DBMS to manage its records. State any two advantages of using it?2mks
14) Apart from the main memory computer also use other memories, explain the use of the following memories
a) Buffers _______________________________________
Computrix 013
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME
- Printers.
- Sound output, e.g., Speakers
- Plotters.
- Sound cards.
- Digital projectors.
7. Give two advantages of a Digital Versatile Disk over a normal Compact disk. (2 marks)
- DVD has a larger storage capacity than a CD.
- A DVD offers better data storage quality.
8. State two health issues that may result from prolonged use of computers. (2 marks) •-
- Damage to eyesight/eye problems.
- Eyestrain.
- Headaches.
- Repetitive Strain Injury (RSI), i.e., arm strain.
9. In two complement there is only one way of representing a zero unlike in ores complement,
(1mk)
10. Describe the role of an operating system in: (4 marks) (i) Memory
management.
Loads application programs from an external storage into the available locations in the Main memory
(RAM). It keeps track (monitors) of the parts of the memory that are in use, and those which are free.
(ii) Job scheduling
It prepares, schedules & monitors jobs for continuous processing by the computer system. It determines
which task will be processed first and ensures that the one that is currently being processed is closely
monitored to avoid wasting time in the processor.
(iii) Error handling.
The OS reports any errors that occur during program execution, and also keeps the computer running
when errors occur.
(iv) Resource control.
The OS controls the use of computer resources by other system software & application programs executed.
These resources include; input/output devices, CPU & processing time.
12.a)
– Computer become outdated very fast due to rapid change in computer technology hence leading to less capital
- Computers are costly
- Incase of system failure, it might be difficult to invert to the old manual system
- Leads to job replacement in other organization
b)
– Cost
- Job opportunities
- Validity of exams offered/examining body
12. List three factors to be considered when choosing an electronic data processing method.
(3 marks)
- Type and size of business
- Timing aspects of the information produced.
- Link between applications.
- Volume of data records held in the organization.
- Cost of acquiring the relevant hardware, software, storage media, etc & the cost of maintenance.
13. What is meant by the term Dry running as used in program development? (2 marks)
- Simulating the execution of a program using a pen and a paper.
- A method of checking a program for logical errors by making the corrections on a paper from the printouts.
- Dry running is where a program is tested on paper before it is keyed in.
14. Computers have evolved through a number of generations. List any three characteristics of the First
generation of computers. (3 marks)
- Large in physical size.
- Relied onThermion valves (Vacuum tubes) to process & store data.
- Consumed a lot of power.
- Produced a lot of heat.
- The computers constantly broke down due to the excessive heat generated, hence, were short-lived, and were
not very reliable.
- Their internal memory capacity/size was low.
- Processing speed was very slow.
- Very costly.
- Used magnetic drum memory.
15.A worksheet contains the data as shown below.
A B C D E F G
1 5 10
2 7 15
3 10 17
4
5
6
7
8
9
10
a) The formula =COUNTIF (C1:C3, "> 10") was entered at Gl. Write down the value that was displayed.
(1 mark)
b) Write down the formula that would be entered at cell B7 to sum the values in column A whose values
are greater or equal to 5. (2 marks)
= SUMIF(A1:A3,">=5")
c) The formula = $C2 + C$3 is entered in cell C5 and then copied to DI0. Write down the formula as it
appears in the destination cell. (2marks)
= $C7 +D$3
SECTION B (60 marks)
16. a) State the three basic types of program control structures. (3 marks)
- Sequence.
- Selection.
- Iteration (looping)
b) Draw a flowchart which will simulate the processing of Student's report. The simulation should be such
that the user repeatedly inputs marks per subject for six subjects using a looping control structure. The computer
processes the total marks and mean score of the student.
- Cost involved, i.e., the printer's buying price, cost of maintenance, & cost of consumable items like
printing papers, ribbons/cartridges.
- Volume of printing expected (speed of the printer)
- Quality of printing, e.g., ability to print graphics & colour.
- Capability of the selected printer, i.e., multiple copy production, paper size, print styles, etc.
- Compatibility with other computers.
- Environment in which the printer will operate.
- Ease of maintenance.
- Reliability of the printer.
- Application it is required for (i.e., purpose/use of the printer).
- Type of paper used by the printer.
- Documentation.
- Availability.
(d) (iivc two advantages of using electronic point-of-sale terminals as opposed to manual entry at a
supermarket checkout counter. (2 marks)
- Less errors (Correct prices) are used at the point of entry.
- It ensures faster entry of data, since the attendant does not have to enter details manually.
- Ensures good stock management procedures.
18. Your school has decided to replace its library control system. The current system was implemented ten
cars ago but has restricted reporting facilities and has a text-based interface. The school intents to replace
the old system with a new computerized system, and is now considering both 'Parallel running" and"direct
changeover".
a) i) Briefly explain the terms parallel running and direct changeover as used in system
implementation. (2 marks)
Parallel running is where both the old and the new systems are run in parallel to each other (at the same
time) for sometime until users have gained confidence in the new system. Data is processed on both
systems in order to compare their performance, and also cross-check the results.
Direct changeover is a complete replacement of the old system with the new system in one bold move.
The old system is stopped & abandoned and the new system starts operating immediately.
(ii) Give two disadvantages of Direct changeover over Parallel running. (1 mark)
- It may be very inconveniencing in case the new system fails or faces problems.
- The users may not have not gained enough confidence to run the new system.
(iii) Identify two main risks of direct changeover during system implementation.
(2 marks)
- There is risk in terms of disk failure.
- The system testing must be done to greater accuracy.
- The system requires training of personnel due to introduction of new programs.
- The system may be expensive to run due to hardware and software costs.
(iv) Mention any two advantages of running both the manual system and the computerized
system simultaneously. (2 marks)
- If the outputs from the two systems are similar, confidence in the ICT system is promoted.
- Users have time to familiarize themselves with the ICT systems.
- It is reliable because it enables thorough testing.
b) Name the three components of a spreadsheet. (3 marks)
- Workbook/Worksheet.
- Database.
- Graph/chart.
c) (i) What is a Website? (2 marks)
A collection/group of related Web pages belonging to an organization or individual.
(ii) Name three facilities that are needed to connect to the Internet. (3 marks)
19. A computer user may interact with a computer either through Graphical User Interface GUI) or through
typed commands.
a) (i) State two features of a graphical user interface. (2 marks)
- Programs are represented graphically by use of Icons.
- Commands are selected and issued using pointing devices, e.g., Mouse.
- There is use of pull-down menus.
- Programs open by displaying windows.
(ii) Give two advantages of using GUI based operating systems over a Command line
interface. (2 marks)
- User friendliness.
- Easy to learn.
(iii) Some computer systems still use Command line interfaces. State one advantage of
command line interface. (1 mark)
- They are more flexible than menu-driven interfaces.
b) Explain the use of any three buttons found in a Spell-check dialog box. (2 marks)
- Change: - accepts the current selection in the Suggestions box.
- Ignore Once: - leaves the highlighted error unchanged (if the highlighted word is a valid word) &
finds the next spelling or grammar error.
- Ignore All - retains all the occurrences of the same word or phrase in the document from another
language, e.g., a Kiswahili.
- Add: - Adds the highlighted word in the Suggestions box to the Custom dictionary.
c) Explain the meaning of each of the following with reference to computer crime: (4 marks) i) Tapping.
Tapping involves listening to a transmission line to gain a copy of the message being transmitted.
ii) Piracy.
Piracy means making illegal copies of copyrighted software, data, or information.
iii) Trespass
- Trespass refers to the illegal physical entry to restricted places where computer hardware, software &
backed up data is kept.
- The act of accessing information illegally on a local or remote computer over a network.
iv) Fraud.
Fraud is the use of computers to conceal information or cheat other people with the intention of
gaining money or information.
20.a) i)Modulation is cnverting digital signals to analog signals for transmission over an analog media
Demodulation is the process of converting analog signal back into digital form
ii) Multiplexing is the process of sending multiple data signals at the receiving end.
b)
– Operational feasibility
- Technical feacibility
- Economical feasibility
- Schedule feasibility
c)
(i) Installing anti-virus software
(ii) Backing up data
(iii) User access levels
(iv) Use of passwords
d)
– Control of data redundancy
– Data consistency
– Allows sharing of data
– Improved data integrity
– Improved security
Computrix 014
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME 1
MARKING SCHEME
1.
i. Vacuum tubes /Thermionic valves
ii. Transistors
iii. Integrated circuits
iv. Large scale integrated and very large scale integrated circuit
½ x 4 mks
2.
a) Instructions are executed in sequence from the beginning to the end
b) A group of instructions are choosen for execution after a specified condition that returns true or
false is satisfied.
c) Allows a group of instructions to be executed repetively until a certain condition is satisfied
3mks
3. Cold booting refers to starting a computer from the main switch when it is initially off, while
warm booting is restarting a computer when it is initially on without completely shutting it
down
2mks
4.
a) The act of using a word processor to creste, edit, format and print documents
1mk
b)(i) A feature that enables text to automatically flow to the next line when the cursor reaches the
end of the current line 1mk
(ii) An already set format for quickly creating most frequently used documents
1mk
5. a) Changing data being transmitted to a code only the sender and the recover can understand to
prevent it from being tapped, listened to or copied by un authorized persons
1mk
b) Tapping into communication channels to get information
1mk
34 A16
8. (a) a language in which instructions are represented using binary codes easily recognized and
interpreted by a computer 1mk
(b) A problem oriented language in which instructions are presented using human understandable
languages such as English 1mk
9. (i) This is loss of signal strength that takes place during data transmission
(ii) The process of combining several data signals and sending them over the same transmission
medium 1mk
110000
110100 +
11001002 ½ mk
Overflow
16(a) (i) A data structure with contiguous memory locations holding data of the same type referenced
by a single name
(ii) This is the representation of program statements using syntax similar to a programming
language called structured English
(iii) A sequence of steps which outline a procedure of solving a given problem
1mk
Initialization 1mk
Rooms=5 Processor 4mks
Count= 1
Decision 1mk
Input 1mk
Input SOT,
COT
Total 8mks
Input L,B
Room Area=LxB
NO
Is count
=5?
yes
Write TL cost
STOP
17(a) This is a standard address used to find web pages bearing information on the internet
Server
server
Work station
Description: This is where all computers and devices are connected via point – to – point links
to a
centralized computer called a server
(ii) Bus topology
Server
bus
Work station
Description: All computers and devices are connected together by point – to – point links in a
closed loop
(iii)
Work station
cable
Description: A series of computers and devices are connected together by point – to – point
links
in a closed loop
Award marks as follows
- Correct diagram 1mk
- Labeling 1mk
- Description
1mk
(c) (i) A logical file is viewed interms of its contents and processing activities that can be carried out
on it while a physical file refers on how a file is arranged on a storage media 2mks
(ii) (a) This is the main file within an organization that stores permanent data against which
transaction are processed 1mk
(b) A file that stores temporary incoming and outgoing data used to update the master file
1mk
(c) A duplicate master file stored away from the computer system to reinstate the original
file
incase of damage 1mk
18.(a) (i) A field that uniquely identifies each record in database 1mk
(ii) A thing of interest about which data is to be stored 1mk
(iii) A collection of related field values representing a single entity 1mk
(b) ASC11 uses 7 bits to represent a character. 3bits for the zone and 4 bits for data
BCD uses 4 bits to represent a character
EBCD uses 6 bits to represent a character. 2 bits for the zone and 4 bits for data
EBCDIC uses 8 bits to represent a character. 4 bits for data and 4 bits for the zone.
Award marks for any three 1mk for stating and 1mk for explanation
(c) – Hacking where a person breaks codes and passwords to gain access to data and information
without permission control: use of biotric features, audit trail
- Tapping: using an intelligent program to avail information from the host computer or a network
during transmission control: encrypting data
- Piracy making illegal copies of copyrighted software information or data
Control: Enactment of laws, lowering software prices
-1mk for description
-1mk for control measure
19. (a) This where a person gets psychologically immersed in an artificial environment generated by a
computer system 1mk
(b) (i) Channels images and sound from the source to the eyes and ears of the wearer hence
producing
a 3D effect in the virtual world 2mks
(ii) Made of conductor wires that sense body movement and relay data into the vitual reality
System
2mks
(c) (i) making computers perform tasks that would otherwise require intelligence if performance
by
human beings 1mk
(ii) Knowledge base – stores knowledge inform of rules and facts concerning a certain subject
of
Interest
Inference engine – Software which controls how knowledge is searched and accessed from the
knowledge base
User interface – A feature that enables the user to interact with the system
3mks
20 (a) A network of computer based processing procedures integrated with manual processes to
produce
information that can support decision making 1mk
(b) - When the interviewers are geographically dispersed in different places
- When too much information is required about a small area of interest
(c) (i) A room in which computers and computer equipment are kept and used for learning and
other
Purposes 1mk
(ii) – Use of buglar proof doors
- A well set up and serviced electrical system
- Avoiding liquids in the lab
- Carefully handling of computing equipment
2mks
(b) – Reviewing current systems with view of identifying faults that can necessitate development.of
new systems
- Work with programmers to ensure a smooth coding process 1x2mks
- Facilitate training for users of the new system
(c) - Develops and tests websites
- Maintains updates and modifies information on the web sites 1x2mks
Computrix 016
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME
1. Anthony a student at mireri technical college defines a computer as “an electronic device
which accepts, processes data and produce information depending on its decisions.” Was this student
right? Explain you answer.
(1mk)
2. Output from the computer can normally be in several forms. Give the difference between the
following methods.
(a) Microfiche and microfilm
- Microfilm is a strip of photography film on which highly miniaturized reproductions has
been recorded.
- Microfiche- a sheet of reduced photographs. A sheet of microfilm containing information
laid out in grid pattern
(2mks)
(b) Soft copy and hard copy
- Soft copy –output that is intangible e.g. sound light and on screen.
- Hardcopy –output on hard /tangible materials e.g. papers and microform
(2mks)
3. Define the program documentation and give two examples of such.
- Tutorials, instruction and reference information provided to explain how to install and use a
software.
(3mks)
4. Define the data processing cycle.
(2mks)
5. What is data security?
- Protection of programs and data in computers and communications systems against
unauthorized modification, destruction, disclosure or transfer whether accidental or
intentional.
(1mk)
6. Explain any two computer laboratory layouts commonly employed in learning institutions.
- Conference pattern- where computers are arranged in such a way that they form a U shape.
- Classroom Pattern – computers are arranged in such away that students sit facing the
writing board
- Accept diagrams in place of explanation. (2mks)
Writing Board
Raised platform
Students
computers
7. Explain the meaning of the following terms as used in computer data transmission.
(a) Simplex transmission.
- Date is transmitted in one direction only.
(3mks)
8. What are the four major parts of a database system?
- Data
- Hardware
- Software
- Users /liveware
(4mks)
9. Give the difference between machine language and assembly language
- Machine language is the computers own binary base language. Assembly language is a low
level language consisting of mnemonic codes and symbolic addresses corresponding to
machine language instructions. (2mks)
10. List any two functions of a computer scientist.
- Developing and advancing uses of virtual reality programming,
- Theoretical expertise
- Creation and application of new technology
- Designing programming tools.
(1mks
)
(2mks)
12. (a) Differentiate between an electronic spreadsheet and the traditional analysis sheet
- Manual spreadsheet are paper and pen spreadsheets in which error correction is normally
hard while electronic spreadsheets are computer base spreadsheets which are easier to work
with.
(3mks)
(b) Explain how you would change the name of a worksheet in Microsoft excel ®
Method 1 –right click on the name tab of the worksheet to be renamed, select rename then type
the new name
(2mks)
13. Below is a graphical representation of a section of a Microsoft word ® application window.
Use it to answer the question that follow.
(2mks)
(5mks)
16. A16 cellsone dimensional array, marks holds the marks of a computer examination for 35
students. You are given that the marks which are out of 100 will be entered at the keyboard and
that mark must be between the range of 0-99 inclusive, and that after the element have been
placed in the array, the average are computed and stored in the last of the array.
i. Give that the AVERAGE column N is gotten by getting the mean for term 1 to 3
averages write down a formula that can be used to obtain the AVERAGE mark for
DENNIS ORENGO OCHIENG’
=(G127+J127+M127)/3 (2mks)
ii. Write down the function that you would use to compute the grade for the student in (i)
above given that grading is done under the following condition;
Average marks; Below 29-E, 30-45-D, 46-59-C, 60-75-B and above 75A
(3 mks)
=IF (N127>75, “A” ,IF(N127>59, “B”, IF (N127> 45,”C” IF(N127>28,”D”
“E”))))
(2mks)
iii. Bit
A binary digit – smallest unit of data reprentation.
iv. Word length
A measure of the number of bits in each word.
19. Define the following terms
i) Data control
Measure taken to enforce the security of the programs & data
ii) Computer errors
Occurrence of an incorrect result produced by the computer.
iii) Sabotage
Occurs when a malicious user renders a system unusable by other. (3mks)
(b) Other than computer viruses errors and accidents discuss any three threats to a computerized
system and explain the prevent measures that can be taken to avoid such threat.
(i) Hacking – unauthorized acced into a computer system logging of correctly choosing
password and change the frequently encryption, biometrics
(ii) Theft ! use of burglar proof doors and windows.
(iii) System crashes; back up data.
(iv) Floods, laboratory floor should be raised above ground level.
(c) Explain what is meant by data backup and name three dangers of inadequate backup
procedures?
Mirroring systems for restoration (01)
Dangers - Loss of data.
- Loss of hardware.
- Reprocessing efforts due to lost data (4mks)
(d) Explain the implications of the legislation prohibited publication’
Prevents undesirable publication from being published and distributed electronically e.g. hate
mail and pornography.
(2mks)