0% found this document useful (0 votes)
22 views

Computrix pp1 Mscheme

Uploaded by

joeamanon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Computrix pp1 Mscheme

Uploaded by

joeamanon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 53

Computrix 001

COMPUTER STUDIES
THEORY PAPER 1
MARKING SCHEME

SECTION 40 MARKS
1.
 Input
 Processing
 Memory
 Output ( ½ mark each)
2.
 Control unit direct the transfer of data and all the coordination and supervision of the CPU
(1mk)
 Arithmetic logic unit perform mathematical and logical operations  (1mk)
3.
 Read only memory (ROM)  (1/2mk)
 Random access memory RAM  (1/2mk)

 ROM is a primary memory unit that can only be reach from but not written into  (1mk)
 RAMis a temporary storage unit that allows the user to read from and write into  (1mk)
4.
i) Pause – A toggle key that temporarily stop the current operation  (1mk)
ii) Function keys – provides software dependent commands.  (1mk)

5.
 By controlling a microphone with a speech recognition device , it is possible to speak to a computer and have it
respond as if you were using a keyboard e.g. you can enter text, issue, commands, modify and edit document e.t.c
 (2mks)
 It is difficult to develop because of the tremendous difference in voice pattern e.g accent, tones e.t.c.The device
must learn the unique speech pattern of an individual.  (2mks)

6.
 A magnetic disk is a direct access storage media (DASD) that permits the computer to find data directly on the
disk.  (2mks)
7.
 Hard disk provides greater storage capacity than the floppy disk  (1mks)
 Hard disk operates or much higher retrieval speed.  (½ mk)

8.
 Testing is done to find out whether the system meets all requirements defined. (1mk)
 If is also important to test whether the system has some failure so as to be corrected before implementation.
(½ mk)
9.
a)

Weight 22 21 20 2-1 2-2 2-3


Binary Digit 1 1 1 0 1 1
Value in base 10 4 2 1 0 25 125
(1mk)

2010 Pyramid Projections © 2010 451/1


2

(1mk)
b) It is easy to develop devices that can understand binary language than to develop devices that
understand the natural language. (1mk)
10.
i) Buffers are temporary holding place that may be part of CPU or built in an input or output
device. (1mk)
ii) An accumulator – holds the results of the last processing step of the ALU.
iii) Cacle memory – allow the processor to access data and instruction even move faster than it
would have taken to fetch it from relatively slow DRAM. (1mk)
11.
 The target audience-the audience e.g. users, management have varied output requirements.
(1mks)
i) The frequency of report generation- some reports are required daily, others monthly or periodically.
(1mks)
12.
ii) Graphic refers to non-text images generated by a computer e.g. drawings, photographs e.t.s
(2mk)
iii) Microsoft chip Gallery  ½ mk
 A scanner  ½ mk
 Drawing using drawing tool.
13.
i) If returns a specified value if a condition is evaluated as four to be true and another value if false.
(1mk)
ii) Count if – count the number of cells within a specified range that meet the given condition or criteria.
(1mk)
iii) Sum if – it add value in the cells specified by a given condition or criteria. (1mk)
14.
i) A form enables the user to view and make entries into an underlying table more easily.
(2mks)
 Columnar  ½ mk
 Tabular ½ mk
 Data sheet ½ mk
 Justified ½ mk
15.
 Tracking refers to changing the visual denseness or openness of characters in a line which kerning is fixing
particular pairs of letters that are too close or too far apart from each other such as to i.e W O etc
(2mks)
 Stroke is used to apply line style which fill is used to fill the object with a base group colour

SECTION B

16
(a)
i)
(i)Structured programming is a procedure programming language other make it possible to break a
program into components called nodules or sub routes
ii) (ii)A constant is a value that remains the same (does not change) during the exertion of a program
iii) A variable is a value that keep changing during the exertion of a program (1mk)
(b) Dummy data are the data that are randomly picked to be used for testing whereas real data are the actual data
that can be used in the day to day running of the system
(c)P10

2010 Pyramid Projections © 2010 451/1


3

START
16.C Start
Print “Enter the loan amount 200,000’’
Input 200,000
Monthly repayment = 200,000/24
Loan balance = Loan Amount-Monthly repayment
If loan balance =O THEN
Print “Loan cleared”
ELSE
Loan balance =Loan balance-Monthly repayment
END IF
17. STOP
i) Making illegal copies of copy righted software information or data (1mk)
ii) Industrial espionage – spying in your computer to get information that you can use to counter
finish a competitor (1mk)
(b)
i. (i)Password protection – A password to open or exit the database file is set for any user who
wishes to do this action (2mks)
ii. (ii)Data encryption –If the database is to be sent electronically encryption secures the data from
un authorized access
others can be (2mks)
 User and group permission to users on data base object such as queries form and reports
 User level security –This feature is used to assign permission to users in order to limit user access to certain
database object
(c) Network operating system enables the exchange of data in a network as well as providing data
security (2mks)
(d) Repeaters receive signal from one segment of a network cleans it to remove distribution boosts it and then
sends it to another segment whereas routers interconnects different networks and directs the transfer of data
packets from source to distribution

2010 Pyramid Projections © 2010 451/1


4

(e) Teach the students or learners (2mks)


- Set examinations
- Impact practical skills to learners (3mks)
18.
(a) Command line interface –The user interacts with the computers by typing a command at the prompt found
on a command line (2mks)
 Memo driven interface – Provides the user with a list of options to choose from (2mks)
 GUI – This types represent command as small pictures on the screen called icons (2mks)
(b) Lab should be
 well ventilated
 Burgler proof
 Spaces enough
 Free from dust and smoke etc (4mks for any four correct answers)
(c)
 System administration
 System analyst
 Programmer
 Technician (3mks for any three correct answers)
 Computer operator etc
(d)
i) Video conferencing refers to the use of computers digital video camera audio computing equipment and
communication networks to enable people in different locations to see and talk to one another
(1mk)
telecommunicating on the other part is a term used to refer to a situation where an employee works at
home using a computer connected to the work place. (1mk)
ii) (i) 1t help to reduce unnecessary travel to the place of work (1mk)
(ii) Reduces travel expenses and less stress due to commuting inconveniency (1mk)
19
(a)
i) In sequential files organization files are accessed in order sorted using a key field whereas in
serial file organization files are accessed one after another but they are stored at random(not
sorted) (2mks)

ii) In random file organization records in a file are stored randomly but accessed directly
whereas Index sequential is similar to sequential file organization only that index is used to
enable the computer to locate individual record on the storage media
(2mks)

(b)
i) In batch processing ,data is accumulated as a group (batch) over a specified period of time, eg.
Daily, weekly, monthly etc. (2mks)
ii) In a reel time data processing computer processes the incoming data as soon as it occurs up –
dates the transaction file and give an immediate response that world affect the event as they
happen. (2mks)

(c) Undo – This is a command used to cancel the operation that has just been processed (2mks)
Redo – This is used to reinstate the command that was cancelled (1mk)
(d)
 Expert system
 Diagnosis
 Keep patients record
 Used in hospital for stock control
 Use to manage finances
(3mks for any three correct answers)
(e)
 Diploma in ICT

2010 Pyramid Projections © 2010 451/1


5

 Certificate in ICT
 Diploma in computer science
 Certificate in computer science
( 2mks for any two correct answers)

(i)
(ii)

b. Information is a software that


i) Information system is an arrangement of people data processes and information that work together to
support and improve the day to day ( 1mk) operation in a business and the decision making whereas a
system is a set or organized components which interact in a given environment and within a specified
boundary to achieve collective goals and objectives
(1mk)
ii) Hard systems are systems whose goals and objectives are clearly defined and the out comes from the
system processes are predictable and can be modeled accurately (1mk)
Soft systems are the human activity systems as their boundaries keep changing and the goals and
objectives are conflicting (1mk)

(c)
 Problem recognition and definition
 Information gathering
 Requirements specification
 System design
 System construction (coding)
 System implementation
 System review
(Award 1 mark for each correct answers maximum of 7marks)
Computrix 002

2010 Pyramid Projections © 2010 451/1


6

COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME

SECTION A 40 MARKS!

1. State one main reason why typing tutor is recommended to be used by computer students
(1
mark)
Improve Speed
Improve Accuracy
2. Give three main ways of classifying computers. (1 ½ marks)
Physical size
Functionality-not function
Purpose

3. Peter was sent to buy computers for the students' laboratory. He was supposed to take into
account the following factors.
• Processor speed
• Memory capacity
• Compatibility
Give three main reasons for taking into account the above factors( 3 marks)
• Processor speed determines the kind of programs to install, if it is fast multitasking
can be possible, bigger programs can be executes with ease
• Memory is important when looking at king of programs to installed, the speed of the
computer; it can be slow because of swapping if the memory is low.
• Compatibility is important since it would influence the future upgrading of the same
computer or using the existing software and hardware. ,

4. Basic computer setup and cabling is a very important concept to be taught in a computer class.
Give two reason to support the above concept. (2 mark)
• Improper set up can lead to spoiling the computer and at times crushing the whole
system.
• Improper starting up and shutting down can lead to crushing of the hard disk.

5. State any two factors to be considered when selecting hard copy output devices.(2 marks)
• The quality of output
• The speed
• Compatibility

6. State four benefits of using a computer in a school store. (2 marks)


• For accurate inventory control
• Easier determination of reorder level

2010 Pyramid Projections © 2010 451/1


7

• Easier and faster retrieval of records

7. Define the following terms as used in word processing (4 marks)


a) Pagination
• Page numbering style e.g x of y
b) Moving-
• Changing the position of text
c) Indenting
• Moving the text from the margin

d) margins
• Page margins are the blank space around the edges of the page

8. You have been asked to change your password .state a precaution you need to take in order
to avoid each of the following.( 2 marks)
a) Piracy
•Hiding-use of file attribute
b) Forgetting the password
•use simple password
9.
a. State two advantages of using a questionnaire for gathering information. (2 marks)
• Since they are filled and returned in privacy, more sincere responses are possible
• The respondents can fill the questionnaire at their own pace.
b. Give three factors to consider when designing the output in program development. (1 marks)
• The target audience
• The frequency of report generation
• Quality and format

10. a) Differentiate between pure binary and BCD code as used in data representational mark)
• in pure binary the whole number is converted into binary while in BCD code each
individual digit is converted into binary represented using 4 bits
b) Convert 2D1616 directly to binary.(2 marks)
2 D 1 6

0010 1011 0001 0110

2D1616 =00101011000101102
11. State the stages of system development in their logical sequence (3 ½ marks)
a. Problem recognition and definition
b. Information gathering
c. Requirement specification
d. System design
e. System construction
f. System implementation
g. System review and maintenance.

2010 Pyramid Projections © 2010 451/1


8

• Each half a mark in their logical sequence

12. Explain any two cultural effects as a result of use of ICT. (4 marks)
a. computer crimes
b. Moral effects.
Stating and explaining
13. Name three responsibilities that are carried out by network support professionals.^ marks)
a. Managing network
b. Provide help to users
c. Support the development
d. Planning, scheduling and implementing network hardware and
software.

14. Give three software requirements mandatory in a computer lab. (3 mark)


• the operating system should be graphic user interface(GUI)
• software for application packages may also be graphic user interface based which
support the use of pointing devices
• an up to date anti-virus recommended.

15. A school intends to set-up e-mail. List 4 activities likely to be provided by mails e-mail facility.
(2mks)
• checking mail,
• composing mail,
• forwarding mail,
• sending mail,
• saving mail
• printing mail
SECTION B (60 MARKS)

16. The gross salary of employees of Becam Technology Centre is based on basic salary;
the basic salary is based on grade and additional benefits as follows, a. Employees who have worked
for more than 5 years receive an additional pay of 5 %
to their basic salary, b. Monthly commissions are based on monthly sale of computers and
accessories profitas follows
Monthly sales Profit Commission Rate (%)

Above 100,000 20

Between 50,000 and 100,000 15

Between 0 and 50,000 5

Below 0 Deduction 5% from their basic.

(a). Draw a flow chart that would be used to calculate the gross salary. (14 marks)

2010 Pyramid Projections © 2010 451/1


9

2010 Pyramid Projections © 2010 451/1


10

17. a) define the following terms as used in spreadsheet (4 marks)


i. absolute referencing-this are cell referencing that always refers to specific
location of a work sheet if copied from one cell to another
ii. Value this are numbers that can be manipulated mathematically
iii. Worksheet-consists of cells ,rows columns
iv. Workbook—consists of worksheets.

(b) State 6 advantages of using spreadsheet over manual spreadsheets (6 mark)


• it utilizes powerful aspect of computer kike speed, accuracy and efficiency
• Has larger virtual sheet for data entry and manipulation.
• Large storage space
• Neat work
• Inbuilt formulae
• Better formatting capabilities.

c. Name four types of database models (2 marks)


• Flat file
• Network
• Hierarchical
• relational

ii) c. give three parts of a report layout in design view.(3 marks)


• Report header
• Page header
• Details
• Page footer
• Report Footer
18. State three major types of Networks.. (3 marks)
• LAN
• WAN
• MAN
(b) Give the fiill forms of the following acronyms (2 marks)
(i) UTP - unshielded twisted pair
(ii) BNC - Bayone-Neill-Concelman
(iii)RJ-45 - Registered jack with 45 pins
(iv)EMI - Electromagnetic Interference

(c). (i) list 5 advantages of fiber optic cables. (5 marks)


• There is no electro magnetic interference immune to effects of moisture and
lighting.
• Can transmit over along distance than coaxial and twisted paire.
• Flexibility in size and weight
• Security-more secure
• Data transmitted digitally
• Low transmission loss
(ii) list two disadvantages of fiber optics( 2 marks)

2010 Pyramid Projections © 2010 451/1


11

• they are expensive and difficult to work with


• they are more fragile and difficult to split
• they have a limited physical arc of cable
• they are difficult to fix

(a) state 3 types of hubs( 3marks)


(i) Passive hubs
(ii) intelligent hubs
(iii) active hubs
19.(a) Describe three different ways a computer may store negative numbers. ( 6 marks )
• Sign and Magnitude - leading zero indicates positive number and a leading one
indicates the number is negative
• Ones complement - the binary number is inverted i.e. the ones become zeros
and the zeros become ones.
• Twos Complement - the binary number is converted first to ones complement
and then a one is added to the final answer.

b) Give the acronym name for the following ( 3 marks)


i) BCD - Binary Coded Decimal
ii) ASCII - American Standard Code for Information Interchange
iii) EBCDIC - Extended Binary Coded Decimal Interchange Code

c) State and describe any two areas of Artificial Intelligence (2 marks)


i. Robotics - Automatic device that performs functions ordinarily ascribed to
human beings or that operates wit what appears to be almost human intelligence,
ii. Natural Language processing - the goal is to make a computer to communicate
with a user in the user's native language e.g. English.
iii. Expert Systems - A software consisting of knowledge & rules gathered from
human experts in a particular field

d) What is Virtual reality? (1 mark)


The ability of a computer to create a real life scenario from software as it interacts with
the user such that to the user the environment created seams real

e) List three components of a Virtual reality gear. (3 marks)


- Head mounted Display (Visor)
- Gloves
- Body Suite
20. a) Define the term operating system (1mark)
• a suite of programs that manage the computer resources such as I/O transfers,
memory management and CPU time.

b) Describe any four functions of the operating system (4marks)


• Memory management
• Job scheduling
• Processor management

2010 Pyramid Projections © 2010 451/1


12

• Peripheral control
• Error reporting
• File management
• Logging and accounting

(c). Explain how one can manage his/her disks using windows. (6 marks)
• Formatting disks
• Scanning a storage devices for problems
• Using disk defragmenter to rearrange storage media contents
• Compressing the storage media
• Backing up data
• Partitioning a disk

(d). Explain with the use of Dos how one can create a text file in C: called John, with text Welcome
Home. (4 marks)
• Change directory to c:- cd\
• Copy con John
Welcome Home
Press control z
• Then a file will be created

2010 Pyramid Projections © 2010 451/1


13

Computrix 004
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME

1 i) Information - Data that has been processed

ii) Information technology – The tools (machines) and the technical know how that is used to
process data and generate information

iii) Information systems- The procedures/ programs that data is transformed through to generate
information

2 Assemblers – Are translators that are used to convert (translate) Assembly language to
machine language

Compliers – Translator that convert the whole source code into machine code

ii) Source code- set of instructions or program code written in a particular programming language
Object code- Is the set of instructions that have been translated into machine code

3. LPT USB
Slow in data transmission fast in transmission
Support only one type of device can support a number of devices

2010 Pyramid Projections © 2010 451/1


14

4 a) Magnets – demagnetize the magnetic disk and may lead to lose of data

ii) Water - may spill on the metallic parts/ electronic parts and hence cause rusting or short
circuit the system.

5 a) Use of anti- radiation shield on the screen


b) Use of LCD screens instead of CRT
c) Proper lighting
d) Proper screen resolution

6 a) Source of information (government, agriculture, education health)


b) Sending and Receiving mail
c) Centre for commence (buying and selling of goods)

7 a) Speed of the output device


b) Nature of the output

8 a) Optical mark reader


b) OCR
c) OBR
d) MICR

ii) Digital camera

iii) Mouse
b) Joystick

8a ROM RAM
-Contents are manufacturer defined -User defined
-Permanent -temporary

b) Disadvantage Advantage

2010 Pyramid Projections © 2010 451/1


15

i)Expensive i) contents are undefined


ii) Volatile ii) fast

9 a) Data privacy Data security


Prevention of data against unauthorized access Prevention of data against destruction

10 The future is through use of computer monic human intelligence in order to manage industries
with little human intervention

11. Easy to code


Fast in application

b) p. seudo. Code Data flow diagram


The English statement that request the code The diagrammatic
Representation on one movement
of
of data/ processing of data in a system

12. Editing tools- Tools used to create and edit objects / graphics
Formatting tools- Tools used to enhance the appearance of the graphics

13
 – Supervise the working of the IT staff dept & implement preparing budget for the dept.
 Keeping department inventory records up- to- date
 Ensure that tasks in the IT department are done

14 Hastens the flow of information across the globe ( globalization)

15. Installation of anti – virus

2010 Pyramid Projections © 2010 451/1


16

Use of passwords
Audit trail
Fire wall

Section B

16 i) Third generation
 FORTRAN
 PASCAL
 COBOL
 BASIC
 C
 Ada

 ii)
 OOPs
 HTML
 JAVASCRIPT
 VB script
PHP (hyper text preprocessor)

b)
Start ½
2010 Pyramid Projections © 2010 451/1
17

FIND TOTAL , MM ½

Nos= 0
Nom= 0

B 1

ENTER MARK FOR PRINT RESULT


NEW SUBJECT 1
1

Nom= NOM+ 1
½

B Nos =40 ½
NO

YES
Nom = 3

Stop

c) Start
Initialize the number of subjects to 0
Initialize the number of students to 0
Ensure main for the first subject for me first student
Repeat till the 3rd subject
Calculate total
Calculate Average
Print Results
Repeat till the No. of students equal to 40
Stop

2010 Pyramid Projections © 2010 451/1


18

17 Guided unguided
a) Transmission that is directional Transmission that is not directional

b) Connects computer
Connects network

c) Linking mobile phone in communication


Transfer of data from one point to another

d) Most of work done manually


Hate message sent through mobile phone
Poor storage of election results

18 BCD Edcdic
4- Bit code -8- bit code
Allows representation of -Allow representation
16 character of 256 characters
Used in simple electronic divices -Primarily used in IBM computers
Advantage Disadvantage
Fast in processing as more than one Expensive and maintain
Processor is used - Requires high memory

iii) Use of a server in LAN/ WAN to run connected clients

iv)
o Simulation in scientific experiments in the science subjects
o Managing the academic program though processing of results
o Office management (account, record keeping)
o Research through the internet instead of relying primarily on the library

2010 Pyramid Projections © 2010 451/1


19

19 Is a careful study of an information system by expert in order to establish weak points in the
system so that could lead to security threats and weak access points for crinesteus
ii)
 Data encypting
 Log files
 fire walls

b) Worn – Is a virus that infects the computer system. Can be controlled using anti- virus software
.

C) Real- time
Distributed data processing
Time sharing
Batch processing
Multi processing
Multi programming
Interactive processing

20 Worksheet – The component in which data values are entered


Workbook- A group of worksheets
Filtering – Finding and working with a subject of data in a list
Sorting - Arranging data in an ordered way (ascending or descending)
b) Clicking the undo command
c) = C2 x 10/100)
= C4 + D 4)
d) i)
 Using the hand
 Zoom
 pointor
ii)
 Sharing information through the internets

 Use of ICT as income generating project.

2010 Pyramid Projections © 2010 451/1


20

Computrix 007
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME

1. (a)It’s data that is in continuous version (1mk)


(b) Signal that is in discreet version (1mk)
2. - Distributed processing facilities
- Cost effectiveness and reliability
- Resource sharing
- Remote communication
(1x3)=3mks)
3. Real data type has a fraction integer data type is a whole number (1mk)
4. - Provide power incase of power failure
- Regulates power from an unstable power source
- Prevents electrical surges
- A alert the user when power goes off (each ½ mk)

5. (i) Protocol – set of rules that govern how two or more computers can send and receive data in
a network (1mk)
(ii) Gateway –Any device that can be configured to provide access to wide area networks or
Internet.
(ii) Bandwidth – Maximum amount of data that a transmission medium can carry at any one
time (1mk)

6. – offers help to the user


- doesn’t keep the user for long without explanation
- Meet all user’s requirements
- Free from bugs (each ½ mks)

7. –Storing data base in criminal investigation center


- In government ministries
- Keeping town plans
- Banks
8. Input device
- Key board
- Card
- Document reader (each ½ mks)
Output devices
- Screen / monitor
- Printer
- Light emitting diode (LED)
- Voice output e.g. speaker (each ½ mks)
9. – Compiler translates the entire source program into object

2010 Pyramid Projections © 2010 451/1


21

- Interpreter translates the source program line –by-line allowing CPU to execute one line
before translating the next (2mks)
10. – Easy to develop devices that can understand it than natural language
- Simplifies technology needed to develop both hardware and software
- Digital devices are reliable
- Digital devices are small in size
- They are less energy (any two of above 2 marks)

11. – Bachelor of science in computer Engineering


- Bachelor of science in Computer science
- Bachelor of ICT /system
- Degree in software engineer
- Degree in programming
12. - Training people how to use computers and various programs
- Advising learners the best career opportunities
- Preparing learners for ICT examination
- Developing training reference materials
- Guide learners how to acquire knowledge through research. (4x1=4mks)
13. - Sorting – Arrangement of data in descending or ascending order.
- Filtering is Hiding of column and in worksheet (2mks)
14.
(2x2=4mks)
15.
a) i) RISC – Reduces instruction set computer Type of microprocessor that recognizes
limited number of instruction (1mk)
ii) POST – Power – on self test
- The system used to check all components connected to computer weather they are function
(1mk)
b) – Cold booting occurs when computer originally is off and switched on by pressing the
power button. (1mk)
- Warm booting happens when originally computer was on i.e. forced to restart by pressing the
restart button, use of restart command or by pressing combination of keys on a keyboard.
(1mk)
SECTION B 60 MARKS
16. Advantages
- Easy to be understood by the computer
- Require little effort translate into computer under stable from. (2x1= 2mks)
Disadvantages
- They are hand wave oriented
- They are not portable (1x1=1mk)
b) Flow chart

2010 Pyramid Projections © 2010 451/1


22

Each symbol (5x1=5mks)


Programs Errors = (1mk)
Program conversion dollars into Ksh;
Constant & = 20 Ksh
VAR
Dollars: Real
Shillings: Real
Write in (conversion of dollars into Kshs)
Read in (Dollars)
Shillings = Dollars Const &
Write in (Kenyan shillings is; shillings);
END (Each step ½ mks)
17. – offers faster access and retrieval of data.
- Information takes up less space than manual filing
- Enhances data integrity and reduces duplication
- Easier to update and modify information (4x1=4mks)
b) (i)Characters
- The smallest element in computer file can be a letter number or symbol
- Made up of a set of seven or eight bits depending on character coding system used.
(1x2 =2mks)
(ii) Fields
- Single character or collection of character
- Represent single piece of data e.g. in students records, students admission no is a field.
(1x2=2mks)
(iii) Records
- Collection of related fields
- Represents single entity (1x2mks)
c) i) Master file
- Main file contains permanent records of particular Items or entries (1x1=1mk)
ii) Reference file
- Store relatively permanent records read from the master file or generate after processing.
(1x1=1mk)

2010 Pyramid Projections © 2010 451/1


23

iii) Backup file


- Used for holding copies of data or information. (1x1=1mk)
d) Sequential file
- Records are stored and accessed in particular order sorted using a key field.
- Retrieval requires searching through the entire file by record received from the start to the
end. (1x1=1mk)
Serial file
- Records are stored and accessed one after another.
- Records are not sorted in any way on storage devices.
- Mostly used in magnetic tapes(1x1 =1mark)
18. a) Condition in which a person becomes psychologically immersed in an artificial
environment generated by a computer system (2 mks)
b) Entertainment
- Simulation and assembly of sequences
- Three dimensional objects or ideals
- Training
-Assistance to the handicapped. (1x5=5mks)
c) – Difficult areas to be handle by human
- Avoid boredom to human in repetitive jobs
- increase production
- Dangerous areas to human
- Satisfy their customer
d) Head gear /Head mounted display
- Gloves
- Body suite
- Virtual reality software. (½ x4 =2mks)
e) Use of device that imitates human being in carrying out tasks that would be dangerous and
difficult to human (1mk)
19.

Explanation
- String represent place values of numbers (1mk)
- Upper beads are two each representing five (1mk)
- Lower beads have five each representing unitary (1mk)
- Each string represented place value of number (1mk)
- Sliding of beads on a frame (1mk)

2010 Pyramid Projections © 2010 451/1


24

NB (Consider student’s explanation)


b) Characteristics of 3rd generation
- Generated less heat compared to 2nd generation
- Consumed a lot of power compared to 2nd generation
- Used integrated circuit technology (1x5=5mks)
20.
- Data and information should be kept secure against loss or exposure.
- Data should not be transferred to other countries without the owner’s permission.
- Data and information should not be kept longer than necessary.
- Data and information should be accurate and up to date.
- Data and information be collected used and kept for specified lawful purposes
b) i) Viruses
- Destructive programs that attaches itself to other files and installs itself without permission on
the computer when files are opened (1x2=2mks)
ii) Unauthorized access
- Gaining access to data /information without permission (1x2=2mks)
iii) Computer error and accidental access
- Caused by people making mistakes like printing sensitive report an unsuspectingly giving
then to unauthorized person’s (1x2=2mks)
(iv) Theft
- Stealing of data and information to gain a fortune from it (1x2=2mks)
c) – checking mails
- compose message
- send mail
- Saving messages
- Printing mails
- Forwarded messages (1x2=2mks)

Computrix 001
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME

1.
– Baking halls, hotel airports – touch screens
– Engineering architectural designs – digitizers
– Banks – MICR
– Speech recognition devices – handicapped especially those with impaired hands , toys,
inventory taking in warehouses, blind paralyzed people can give command to a PC
2. Thesaurus – used to find synonyms, autonyms or related word

Spelling –checking for such common typing mistake as repeated words, irregular
capitalization, sentence structure such as very long sentence.

2010 Pyramid Projections © 2010 451/1


25

3. Organizes the memory into blocks of sizes called partitions. Assigns mails memory partition to
data & instruction
4. Curser movement keys
- Arrow keys, page up & page down home &end
Editing
- insert, delete (Del) key
5.
– Monitor traffic in a busy town
– Aircraft navigation
– Make reservation in airline
6.
a) Piracy – making illegal copies or copyright of software , information or data
b) Eavesdropping – tapping into communication channel to get information
7. Responsibilities of computer engineer
– Design and develop component such as storage devices motherboards
– Determine electrical power requirements of each computer components
– Re-engineer computer components to enhance functionality and efficiency
– Design &manufacture computer controlled device such as robots
8. Looping
- designed to execute the same block of code again and again until a certain condition is
fulfilled
Selection
- Execution of staments depends on a condition that returns true or false
9. AI- branch of computer science that is concerned with the development of machines that
emulate human like qualities such as learning reasoning, communicating seeing and hearing
10 meant to help designers to come up with quality layered protocol
11. Connect digital signal to analog and vice versa for the purpose of transmission over analog
media
12. Distributed systems
A computer network that is physically dispersed (geographically dispersed)
Computer network
An interconnected set of two or more computers
13. Difference between main frame, mini and microcomputer
Microcomputer – smallest cheapest &relatively least powerful, designed to be used
Mainframe-big in size, solve problems while scientific of commercial
Mini – slightly smaller than mainframe
-Not as power as mainframe
-Cheaper than main frame
-For small organizations
14. Logical errors – Errors in the program logic
- Not detectable by the translator
Syntax errors – emanate from improper use of language rules e.g. punctuation, grammar
15. Role of communication hardware, facilitates data transmission from source to destination.
Provide interface or junctions between the terminal devices.
16. (i) looping while DO 2 marks
(ii) Value of P<N

2010 Pyramid Projections © 2010 451/1


26

P 2, 4,6,10 ½ mark for each


L 4, 6, 10, 16 6 marks
N 6,10,16,26
Printout 6, 10, 16
(iii) Start ½ marks each line
P =2
L= 4
N= P+L
While N< 20 DO
BEGIN
Print N
P=L
L=N
N= P+L
END WHILE
17. (a) ASCII
- American standard code for information Interchange
- 7 Bit code
- Only 128 characters can be represented 27
- However there 8- bit ASCII
EBCDIC
- Extended Binary coded Decimal Interchange code
- 8 –bit character coded scheme used primary on 1BM computers
- A total 256 characters (28) can be coded using this scheme
(b) 110012 -11012 =00102
(c) (i) Data creation
The process of putting together facts in an organized format example manually
prepared document or captured from the source using bar code reader
(ii) Data transmission
Moving data from source to destination either via transmission media or physically to a
central office
(iii) Data preparation
Transcription (conversion) of data source document to machine readable form data
collected through device does not used preparation
(d) Wireless communication
Type of media used to transmit data from one point to another without using physical
connections transmitting antenna

Advantage
 Flexible in operation as compared toward devices can be moved around
without loosing access to the network
 Can span large geographical area easily
 can occur even in remote areas
Disadvantage
 Difficult to establish & configure
 Initial cost is very high

2010 Pyramid Projections © 2010 451/1


27

18. Three health concerns


– Repetitive strain injuries (RSI)
– Eye strain and headaches
– Electromagnetic emissions

RSI- result from wrist , hand, arm, and muscle strain, tendonitis and neck strains , tendonitis and
neck strains due to force repetitive movement e.g. when entering data using the keyboard
- Give is by resting taking frequent breaks change typing technique
Eye strain
- improper use of monitors cause eye stain headaches double vision use monitors win good
resolution fitted in antiglare screen that fitters excess light the screens brightness should be
adjusted to the intensily that is comfortable with the eyes
Electromagnetic emission
- field emissions are waves of electrical and magnetic energy that are emitted by current
carrying conductors
- use low emission devices in order to avoid exposing themselves to excess emissions
19. (a) Computational errors
- Overflow errors
Calculation is too large to be stored in the allocated memory space
- Truncation errors
Occurs when we have real noss that have along fractional part which cannot fit in the
allocated memory space
- Rounding errors
Results from lowering a digit in a real number to the required rounded number
(b) Data processing cycle
(c) Logical files – viewed in terms of what data items it contains and details it what
processing operations may be performed on line data items
Physical files – views in terms of how data is stored on storage media and processing
operation are made possible
Multiprogramming
Where more than one program is executed apparently at the same time by a single
processing unit
 In multiprocessing a computer has more than one processor and processing more than
one task at the same time on different processors of the same computer
(d) 12A .216
(e) Functions of Nos
– Provides access to networking resources
– Implementing network security
– Supporting network services like network card drive and protocols
– Respond to requests from application programs running on the network
– Supports process communication i.e. enable the various processes on the network
to communicate with one another
20. (a) start
Input a, b, q
x=a+3
y=b-2
z=q (x/y)

2010 Pyramid Projections © 2010 451/1


28

Stop (4 marks)
(b) The process of diagnosing and trying to fix (resolve) hardware or software related
(2 marks)
(c) (i) =IF (<2>2000 ,15% * C2,7.5% *C2 ) (2 marks)
(ii) = if (A2= “AFRICA” , “AFR” , IF (A2= “USA” , “US” IF (A2 = “EUROPE” ,
“EUR”))) (2 marks)
(d) New opportunities – chance to improve quality of internal processes and service
delivery in the organization
Problems – undesirable circumstances that prevent the organization from meeting
its goals
Directives – new requiment impoundly government might or external influence
(d)
– Games - e- learning
– Training of pilots - training drivers
– Therapy for paraplegic

Computrix 010
COMPUTER Paper 1
MARKING SCHEME
Section A
Answer all questions in this section (40 Marks)
1) Files in a computer can be organised in several ways. State three considerations when selecting the type of file
organisation? 3mks
2) Computers are finding applications in very many fields state any two advantages of use computers in the retail
businesses?
3) What will be the output of the following flowchart
4) Perform the following multiplication in binary form 13io X 7io, 2mks
5) Differentiate between
a) Data validation and verification Imk
b) Disk formatting and partitioning (Imks)« 2008
c) Search engine and hyperlink Imk
6) Explain two measures that a company that is connected to the internet can take to safe guard its data 2mks
7) The Nation newspaper company wishes to employee the following people. State two responsibilities of each?
a) Computer programmer 2mks
b) Web administrator 2 inks
8) Explain the following
a) Virtual Reality Imk
b) Expert system Imk
9) State one merit and one demerit of each of the following
a) Machine language programs Imk
b) Microwave communication mk
c) Networking computers mk
10) Softwares can be grouped as system and application what is the difference 2MKS
11) An operating is a very important system software in a computer state three factors that one should consider while
shopping for one
3mkse 200S
12) Write the following acronyms in full BIOS ____________________ MICR____________________ DVD
MS DOS
13) a) What is a DBMS? 1 MKS
b) A school want to use a DBMS to manage its records. State any two advantages of using it?2mks
14) Apart from the main memory computer also use other memories, explain the use of the following memories
a) Buffers _______________________________________

2010 Pyramid Projections © 2010 451/1


29

b) Cache memory _________________________________


15) A parent wishing to buy a computer for her daughter saw the following advertisement on local newspaper 80GB
HDD, 1.7 GHZ, 256 RAM, WiFi Explain each of the underlined words
Source code is the program written in a programming language object code is the program in machine readable form ( a
translated source program). (2mks)
(b) 1. Start
2. Input student mark
3. Is mark > 100 < 0
4. If yes display error message and Go to 2.
5. If mark is = 70 print A Go to 11
6. If mark is = 60 print D Go to 11
7. If mark is = 50 print C Go to 11
8. If mark is = 40 print D Go to 11 else print E
9. Do you want to continue?
10. If yes see principal Go to 11 otherwise Go Home.
11. STOP. (6mks)
16. (a)
( i) Job replacement - brings about elimination of jobs.
(ii) Job displacement - process of replacing manpower with computerization
(iii) Computer illiteracy - Lack of computer knowledge.
(iv) Resistance to change – People want to continue working manually resist new and advanced methods.
( 3mks)
(b) - Password control
- Use of antivirus
- Use access levels –filters information that one can view. (2mks)
(c )
(i) Expert systems
(ii) Improved surgery using laser brain surgery and heart surgery (2mks)
(d)
(i) Hardware configuration or provision of the computer e.g memory size
(ii) Basic design of the computer e.g IBM or Apple
(iii) Applications intended for the computer
(iv) Use friendlyliness or human computer Interface Explanation required. -
8mks
17. (a)
(i) Cell – An intersection between a row and a column
(ii) Range – A rectangular arrangement of cells specified by the address of its top left and bottom right cells,
separated by colon (:)
(iii) Value – Numbers that can be manipulated mathematically.
(iv) Function : Inbuilt predefined formulae that the user can quickly use instead of having to create a new
one each time a calculation has to be carried out. (4mks)
(b)
(i) Line spacing and character spacing – Indenting – Text alignment (3mks)
(c)
(i) Printing more than one page
- Printing several copies of the same page
(d) Work sheet is the working area in Microsoft Excel program. Work book is the file where several
workbooks reside.
(e)
(i) (a) = (D1 + E1/100) * 40) (2mks)
(ii) (b) = sum (F1: G1) (1mk)
(iii) (c ) = MAX(H1 : H6) (1mk)
(iv) (d) = MIN (HI : H6) (1mk)
(v) (e) = AVG (H1:H6) (1mk)
19. (a) Set of actions that you can create to help you to automate common tasks. A report is a
data base object produces a summary of information held in a database. (2mks)

2010 Pyramid Projections © 2010 451/1


30

(b) (i) Updating records


(ii) Editing records
(iii) Deleting records
(iv) Adding records 1 x 4 = 4mks
( c) (i) Text
(ii) Number
(iii) Currency
(iv) Yes / No, Text 1 x 4 = 4mks
(d) Admission number: It identifies the students uniquely because admission number cannot be the same
even if the names are the same.
(e) (i) Microsoft Access
(ii) Dbase
(iii) Quatro pro
(iv) SQl
(vi) Sys base (or any other) ½ x 6 = 3mks
20. (a)
(i) Internet – Worldwide system of computer networks. (1mk)
(ii) Domain name – e.g. edu., org., com
It identifies the type of institution offering a particular service (s). (1mk)
(iii) ISP – internet service provider (1mk)
Company that provides access to internet (1mk)
(iv) WWW - World Wide Web (1mk)
A vast virtual space on the internet where information called website are install.
(b) - E-mail – Electronic letters can be sent and received in the institution
- Read news on the net i.e all the newspapers.
- Read health information i.e latest medical news and research
- Chatting on the net – people can sign into a chat room and exchange ideas.
- Music and entertainment on the net. (5mks)
(c ) (i) Virus
(ii) Theft
(iii) Computer errors and accidents e.g deletion of data
(d)
(i) Antivirus software
(ii) Password control
(iii) Data backups
(iv) User access level (3mks)

2010 Pyramid Projections © 2010 451/1


31

Computrix 013
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME

SECTION A (40 marks)


1. What are peripheral devices? (1 mark)
- Those are the elements (components) connected to the computer apart from the System unit.
- Peripheral devices are connected to the CPU by use of special cables called data interface cables that
carry data, information and programs to & from the devices.
2. It is used to look for specified words in a document and replacing them with alternatives

3.Lisi three factors to be considered when purchasing a microcomputer. (3 marks)


- Type of processor
- Processing speed
- Amount of main memory (RAM)
- Storage capacity of the hard disk.
- Cost of the computer
- Speed of output devices
- Number of users who can access the computer at the same time.
4.Identify two proper sitting postures while using the computer. (2 marks)
- Adopt a relaxed and straight back position to avoid bending forward or leaning far backwards.
- The feet should be firmly placed flat on the floor.
- The seat must be high enough allowing the eyes to be the same level with the top of the screen.
- The seat must have a straight backrest that allows someone to sit upright. This prevents muscle &
backaches caused by poor sitting posture
- The height of the chair or working surface must be high enough such that your forearms are parallel with
the floor and your wrists are straight.
- The seat must be high enough relative to the table to enable the user use the hands on the peripheral
devices comfortably.
5. Distinguish between cold booting and warm booting. (2 marks)
cold booting happens when a computer that was originally off is switched on by pressing the power button on
the system unit.
warm booting happens when a computer that was originally on is forced to restart by pressing the Restart button
on the System unit or by pressing a combination of keys on the keyboard (Ctrl + Alt + Del)
6. Computer systems are built from three types of physical components: Processor, memories and
Input/Output devices.
(i) State two tasks of a processor (2 marks)
- It carries out processing of data.
- System control, i.e., it controls the sequence of operations within the computer.
- It gives commands to all parts of the computer.
- It controls the use of the Main memory in storing of data & instructions.
- Provide temporary storage (RAM) and permanent storage (ROM).
(ii) List any four examples of computer output devices. (2 marks)
- Monitors.

2010 Pyramid Projections © 2010 451/1


32

- Printers.
- Sound output, e.g., Speakers
- Plotters.
- Sound cards.
- Digital projectors.
7. Give two advantages of a Digital Versatile Disk over a normal Compact disk. (2 marks)
- DVD has a larger storage capacity than a CD.
- A DVD offers better data storage quality.
8. State two health issues that may result from prolonged use of computers. (2 marks) •-
- Damage to eyesight/eye problems.
- Eyestrain.
- Headaches.
- Repetitive Strain Injury (RSI), i.e., arm strain.

9. In two complement there is only one way of representing a zero unlike in ores complement,
(1mk)
10. Describe the role of an operating system in: (4 marks) (i) Memory
management.
Loads application programs from an external storage into the available locations in the Main memory
(RAM). It keeps track (monitors) of the parts of the memory that are in use, and those which are free.
(ii) Job scheduling
It prepares, schedules & monitors jobs for continuous processing by the computer system. It determines
which task will be processed first and ensures that the one that is currently being processed is closely
monitored to avoid wasting time in the processor.
(iii) Error handling.
The OS reports any errors that occur during program execution, and also keeps the computer running
when errors occur.
(iv) Resource control.
The OS controls the use of computer resources by other system software & application programs executed.
These resources include; input/output devices, CPU & processing time.

12.a)
– Computer become outdated very fast due to rapid change in computer technology hence leading to less capital
- Computers are costly
- Incase of system failure, it might be difficult to invert to the old manual system
- Leads to job replacement in other organization
b)
– Cost
- Job opportunities
- Validity of exams offered/examining body
12. List three factors to be considered when choosing an electronic data processing method.
(3 marks)
- Type and size of business
- Timing aspects of the information produced.
- Link between applications.
- Volume of data records held in the organization.
- Cost of acquiring the relevant hardware, software, storage media, etc & the cost of maintenance.
13. What is meant by the term Dry running as used in program development? (2 marks)
- Simulating the execution of a program using a pen and a paper.
- A method of checking a program for logical errors by making the corrections on a paper from the printouts.
- Dry running is where a program is tested on paper before it is keyed in.

2010 Pyramid Projections © 2010 451/1


33

14. Computers have evolved through a number of generations. List any three characteristics of the First
generation of computers. (3 marks)
- Large in physical size.
- Relied onThermion valves (Vacuum tubes) to process & store data.
- Consumed a lot of power.
- Produced a lot of heat.
- The computers constantly broke down due to the excessive heat generated, hence, were short-lived, and were
not very reliable.
- Their internal memory capacity/size was low.
- Processing speed was very slow.
- Very costly.
- Used magnetic drum memory.
15.A worksheet contains the data as shown below.
A B C D E F G
1 5 10
2 7 15
3 10 17
4
5
6
7
8
9
10

a) The formula =COUNTIF (C1:C3, "> 10") was entered at Gl. Write down the value that was displayed.
(1 mark)
b) Write down the formula that would be entered at cell B7 to sum the values in column A whose values
are greater or equal to 5. (2 marks)
= SUMIF(A1:A3,">=5")
c) The formula = $C2 + C$3 is entered in cell C5 and then copied to DI0. Write down the formula as it
appears in the destination cell. (2marks)
= $C7 +D$3
SECTION B (60 marks)
16. a) State the three basic types of program control structures. (3 marks)
- Sequence.
- Selection.
- Iteration (looping)
b) Draw a flowchart which will simulate the processing of Student's report. The simulation should be such
that the user repeatedly inputs marks per subject for six subjects using a looping control structure. The computer
processes the total marks and mean score of the student.

Note. 1. It is assumed that the student does six subjects.


2. The outputs required are; Average score and Total marks. (7 marks)

2010 Pyramid Projections © 2010 451/1


34

(c) Differentiate between Analogue and Digital data. (2 marks)


Analog data is continuous in nature, while digital data is in discrete form.
(d) Outline three advantages of using computers for data processing over other types of office and
business equipment. (3 marks)
- Computers process data faster than devices such as typewriters and calculators.
- Computers are more accurate: - given the correct instructions & data, computers produce more
accurate results. They are also able to handle numbers with many decimal places without rounding
off.
- Computers are more efficient: - computers require less effort to process data compared to human
beings & other machines.
17.a) (i) State the purpose of registers in a computer system. (1 mark)
Holds data and instructions temporarily just before and after processing.
(ii) Give two types of registers found in the CPU. (2 marks)
- Accumulator
- Instruction register
- Address register
- Storage register
b) Describe the structure of a hard disk in reference to cylinders, tracks and sectors.
(3 marks)
The surface of hard disk is divided into concentric circles called Tracks. Parallel tracks on
several platters are called Cylinders.
The tracks are further subdivided into Sectors. Several sectors can be grouped to form
clusters
(c) Highlight four factors one should consider when purchasing a printer. (4 marks)

2010 Pyramid Projections © 2010 451/1


35

- Cost involved, i.e., the printer's buying price, cost of maintenance, & cost of consumable items like
printing papers, ribbons/cartridges.
- Volume of printing expected (speed of the printer)
- Quality of printing, e.g., ability to print graphics & colour.
- Capability of the selected printer, i.e., multiple copy production, paper size, print styles, etc.
- Compatibility with other computers.
- Environment in which the printer will operate.
- Ease of maintenance.
- Reliability of the printer.
- Application it is required for (i.e., purpose/use of the printer).
- Type of paper used by the printer.
- Documentation.
- Availability.
(d) (iivc two advantages of using electronic point-of-sale terminals as opposed to manual entry at a
supermarket checkout counter. (2 marks)
- Less errors (Correct prices) are used at the point of entry.
- It ensures faster entry of data, since the attendant does not have to enter details manually.
- Ensures good stock management procedures.
18. Your school has decided to replace its library control system. The current system was implemented ten
cars ago but has restricted reporting facilities and has a text-based interface. The school intents to replace
the old system with a new computerized system, and is now considering both 'Parallel running" and"direct
changeover".
a) i) Briefly explain the terms parallel running and direct changeover as used in system
implementation. (2 marks)
Parallel running is where both the old and the new systems are run in parallel to each other (at the same
time) for sometime until users have gained confidence in the new system. Data is processed on both
systems in order to compare their performance, and also cross-check the results.
Direct changeover is a complete replacement of the old system with the new system in one bold move.
The old system is stopped & abandoned and the new system starts operating immediately.
(ii) Give two disadvantages of Direct changeover over Parallel running. (1 mark)
- It may be very inconveniencing in case the new system fails or faces problems.
- The users may not have not gained enough confidence to run the new system.
(iii) Identify two main risks of direct changeover during system implementation.
(2 marks)
- There is risk in terms of disk failure.
- The system testing must be done to greater accuracy.
- The system requires training of personnel due to introduction of new programs.
- The system may be expensive to run due to hardware and software costs.
(iv) Mention any two advantages of running both the manual system and the computerized
system simultaneously. (2 marks)
- If the outputs from the two systems are similar, confidence in the ICT system is promoted.
- Users have time to familiarize themselves with the ICT systems.
- It is reliable because it enables thorough testing.
b) Name the three components of a spreadsheet. (3 marks)
- Workbook/Worksheet.
- Database.
- Graph/chart.
c) (i) What is a Website? (2 marks)
A collection/group of related Web pages belonging to an organization or individual.
(ii) Name three facilities that are needed to connect to the Internet. (3 marks)

2010 Pyramid Projections © 2010 451/1


36

- A Computer Internet software.


- Telecommunication facilities, e.g., Telephone lines, telephone exchange stations & satellite transmission.
- Modems
- Internet service provider (ISP)
- TCP/IP protocols

19. A computer user may interact with a computer either through Graphical User Interface GUI) or through
typed commands.
a) (i) State two features of a graphical user interface. (2 marks)
- Programs are represented graphically by use of Icons.
- Commands are selected and issued using pointing devices, e.g., Mouse.
- There is use of pull-down menus.
- Programs open by displaying windows.
(ii) Give two advantages of using GUI based operating systems over a Command line
interface. (2 marks)
- User friendliness.
- Easy to learn.
(iii) Some computer systems still use Command line interfaces. State one advantage of
command line interface. (1 mark)
- They are more flexible than menu-driven interfaces.
b) Explain the use of any three buttons found in a Spell-check dialog box. (2 marks)
- Change: - accepts the current selection in the Suggestions box.
- Ignore Once: - leaves the highlighted error unchanged (if the highlighted word is a valid word) &
finds the next spelling or grammar error.
- Ignore All - retains all the occurrences of the same word or phrase in the document from another
language, e.g., a Kiswahili.
- Add: - Adds the highlighted word in the Suggestions box to the Custom dictionary.
c) Explain the meaning of each of the following with reference to computer crime: (4 marks) i) Tapping.
Tapping involves listening to a transmission line to gain a copy of the message being transmitted.
ii) Piracy.
Piracy means making illegal copies of copyrighted software, data, or information.
iii) Trespass
- Trespass refers to the illegal physical entry to restricted places where computer hardware, software &
backed up data is kept.
- The act of accessing information illegally on a local or remote computer over a network.
iv) Fraud.
Fraud is the use of computers to conceal information or cheat other people with the intention of
gaining money or information.

d) Explain four methods of classifying computers. (4 marks)


- Physical size - Supercomputers, mainframe, minicomputers & microcomputers.
- Functionality (mode of data processing) - Analog, digital & Hybrid.
- Purpose - General & Special-purpose.
- Generations - 1st to 5th generation computers.

20.a) i)Modulation is cnverting digital signals to analog signals for transmission over an analog media
Demodulation is the process of converting analog signal back into digital form
ii) Multiplexing is the process of sending multiple data signals at the receiving end.

b)

2010 Pyramid Projections © 2010 451/1


37

– Operational feasibility
- Technical feacibility
- Economical feasibility
- Schedule feasibility

c)
(i) Installing anti-virus software
(ii) Backing up data
(iii) User access levels
(iv) Use of passwords

d)
– Control of data redundancy
– Data consistency
– Allows sharing of data
– Improved data integrity
– Improved security

Computrix 014

2010 Pyramid Projections © 2010 451/1


38

COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME 1

MARKING SCHEME
1.
i. Vacuum tubes /Thermionic valves
ii. Transistors
iii. Integrated circuits
iv. Large scale integrated and very large scale integrated circuit
½ x 4 mks
2.
a) Instructions are executed in sequence from the beginning to the end
b) A group of instructions are choosen for execution after a specified condition that returns true or
false is satisfied.
c) Allows a group of instructions to be executed repetively until a certain condition is satisfied

3mks
3. Cold booting refers to starting a computer from the main switch when it is initially off, while
warm booting is restarting a computer when it is initially on without completely shutting it
down

2mks

4.
a) The act of using a word processor to creste, edit, format and print documents
1mk

b)(i) A feature that enables text to automatically flow to the next line when the cursor reaches the
end of the current line 1mk
(ii) An already set format for quickly creating most frequently used documents
1mk

5. a) Changing data being transmitted to a code only the sender and the recover can understand to
prevent it from being tapped, listened to or copied by un authorized persons
1mk
b) Tapping into communication channels to get information
1mk

6. 16 842 10 A award marks as follows


16 52 4 - Division 1mk
16 3 3 - Correct answer 1mk

2010 Pyramid Projections © 2010 451/1


39

 34 A16

7. (i) Alphabet keys - 1mk


(ii) Function keys - 1mk

8. (a) a language in which instructions are represented using binary codes easily recognized and
interpreted by a computer 1mk
(b) A problem oriented language in which instructions are presented using human understandable
languages such as English 1mk

9. (i) This is loss of signal strength that takes place during data transmission
(ii) The process of combining several data signals and sending them over the same transmission
medium 1mk

10. – If the warranty on offer was return to base


- The price of a computer with a 1 year warranty could be higher than that of a six months
warranty
- If computer parts were not comprehensively covered
(any two - 2mks)
11.(a) = SUM IF (A1: A5,”>60”)
- Correct fuction 1mk
- Correct values in brackets 1mk
(b) (i) Aprocess of rearranging scattered files and folders on a disk to speed up their access 1 ½ mks
(ii) Refer to dividing a large physical disk into two or more logical drive 1 ½ mks
12. (a) Universal serial port (USB port) 1mk
(b) – Provides high speed and quality data transmission
- Supports a wide range of devices 2mks
13 (a) a process of sending and receiving data between two or more networked computers or
communication devices 1mk
(b) – Not affected by electromagnetic interference
- Supports high band width
- Has light weight and occupies less space
- Transmits data at high speed 3mks

14. 4810 1100002 ½ mk


12 11002 ½ mk
001100 - Increase no of bits
110011 - Turn to 1’scomplement ½ mk
15
+1 - Tirn to 2 complement
110100

 110000
110100 +
11001002 ½ mk

Overflow

2010 Pyramid Projections © 2010 451/1


40

15. (a) Information gathering 1mk


(b) (i) – Sincere responses are possible due to the confidentiality of the process
- Respondents can fill questionnaires at their awn pace
- Enables extensive equiry to be carried out 1mk
(ii) – some respondents may not fill or return the questionaires
- Good questioners are difficult to prepare
- Erroneous responses are likely if the question is not understoud 1mk

16(a) (i) A data structure with contiguous memory locations holding data of the same type referenced
by a single name
(ii) This is the representation of program statements using syntax similar to a programming
language called structured English
(iii) A sequence of steps which outline a procedure of solving a given problem
1mk

Start Award marks as follows:


Start / stop 1mk

Initialization 1mk
Rooms=5 Processor 4mks
Count= 1
Decision 1mk

Input 1mk
Input SOT,
COT
Total 8mks

Input L,B

Room Area=LxB

NOT = ROOM AREA


SOT

2010 Pyramid Projections © 2010 451/1


41

COST = NOT x COT

TL Cost:=TL cost + COST


COUNT = COUNT+1

NO
Is count
=5?

yes
Write TL cost

STOP

(c) 5, 3, 1 4/5 , 1 4mks

17(a) This is a standard address used to find web pages bearing information on the internet

(b) (i) star

2010 Pyramid Projections © 2010 451/1


42

Server
server

Work station

Description: This is where all computers and devices are connected via point – to – point links
to a
centralized computer called a server
(ii) Bus topology

Server
bus

Work station

Description: All computers and devices are connected together by point – to – point links in a
closed loop
(iii)

2010 Pyramid Projections © 2010 451/1


43

Work station

cable

Description: A series of computers and devices are connected together by point – to – point
links
in a closed loop
Award marks as follows
- Correct diagram 1mk
- Labeling 1mk
- Description
1mk
(c) (i) A logical file is viewed interms of its contents and processing activities that can be carried out
on it while a physical file refers on how a file is arranged on a storage media 2mks
(ii) (a) This is the main file within an organization that stores permanent data against which
transaction are processed 1mk
(b) A file that stores temporary incoming and outgoing data used to update the master file
1mk
(c) A duplicate master file stored away from the computer system to reinstate the original
file
incase of damage 1mk
18.(a) (i) A field that uniquely identifies each record in database 1mk
(ii) A thing of interest about which data is to be stored 1mk
(iii) A collection of related field values representing a single entity 1mk
(b) ASC11 uses 7 bits to represent a character. 3bits for the zone and 4 bits for data
BCD uses 4 bits to represent a character
EBCD uses 6 bits to represent a character. 2 bits for the zone and 4 bits for data
EBCDIC uses 8 bits to represent a character. 4 bits for data and 4 bits for the zone.
Award marks for any three 1mk for stating and 1mk for explanation
(c) – Hacking where a person breaks codes and passwords to gain access to data and information
without permission control: use of biotric features, audit trail
- Tapping: using an intelligent program to avail information from the host computer or a network
during transmission control: encrypting data
- Piracy making illegal copies of copyrighted software information or data
Control: Enactment of laws, lowering software prices
-1mk for description
-1mk for control measure

2010 Pyramid Projections © 2010 451/1


44

-Award marks for crimes such as fraud, sabotage, tresspass

19. (a) This where a person gets psychologically immersed in an artificial environment generated by a
computer system 1mk
(b) (i) Channels images and sound from the source to the eyes and ears of the wearer hence
producing
a 3D effect in the virtual world 2mks
(ii) Made of conductor wires that sense body movement and relay data into the vitual reality
System
2mks
(c) (i) making computers perform tasks that would otherwise require intelligence if performance
by
human beings 1mk
(ii) Knowledge base – stores knowledge inform of rules and facts concerning a certain subject
of
Interest
Inference engine – Software which controls how knowledge is searched and accessed from the
knowledge base
User interface – A feature that enables the user to interact with the system
3mks

(d) – Eye pattern


- Finger prints 3mks
- Voice

20 (a) A network of computer based processing procedures integrated with manual processes to
produce
information that can support decision making 1mk
(b) - When the interviewers are geographically dispersed in different places
- When too much information is required about a small area of interest
(c) (i) A room in which computers and computer equipment are kept and used for learning and
other
Purposes 1mk
(ii) – Use of buglar proof doors
- A well set up and serviced electrical system
- Avoiding liquids in the lab
- Carefully handling of computing equipment
2mks

(d) (i) – Cost


- Job opportunities
- Duration of study
- Desired level of qualification 3mks

II (a) – write in house application programs

2010 Pyramid Projections © 2010 451/1


45

- Customize commercial package to meet the needs of the organization


- Test, debug, install and maintain programs 2mks

(b) – Reviewing current systems with view of identifying faults that can necessitate development.of
new systems
- Work with programmers to ensure a smooth coding process 1x2mks
- Facilitate training for users of the new system
(c) - Develops and tests websites
- Maintains updates and modifies information on the web sites 1x2mks

2010 Pyramid Projections © 2010 451/1


46

Computrix 016
COMPUTER STUDIES
THEORY PAPER
MARKING SCHEME

SECTION A (40 MARKS)

1. Anthony a student at mireri technical college defines a computer as “an electronic device
which accepts, processes data and produce information depending on its decisions.” Was this student
right? Explain you answer.

- No½ computer cannot½ make their own decisions

(1mk)

2. Output from the computer can normally be in several forms. Give the difference between the
following methods.
(a) Microfiche and microfilm
- Microfilm is a strip of photography film on which highly miniaturized reproductions has
been recorded.
- Microfiche- a sheet of reduced photographs. A sheet of microfilm containing information
laid out in grid pattern

(2mks)
(b) Soft copy and hard copy
- Soft copy –output that is intangible e.g. sound light and on screen.
- Hardcopy –output on hard /tangible materials e.g. papers and microform

(2mks)
3. Define the program documentation and give two examples of such.
- Tutorials, instruction and reference information provided to explain how to install and use a
software.

(3mks)
4. Define the data processing cycle.

2010 Pyramid Projections © 2010 451/1


47

- The chain of processing events in most data processing application (recording,


transmission, reporting, storage and retrieval of data.)

(2mks)
5. What is data security?
- Protection of programs and data in computers and communications systems against
unauthorized modification, destruction, disclosure or transfer whether accidental or
intentional.

(1mk)
6. Explain any two computer laboratory layouts commonly employed in learning institutions.
- Conference pattern- where computers are arranged in such a way that they form a U shape.
- Classroom Pattern – computers are arranged in such away that students sit facing the
writing board
- Accept diagrams in place of explanation. (2mks)

Writing Board

Raised platform

Students
computers

7. Explain the meaning of the following terms as used in computer data transmission.
(a) Simplex transmission.
- Date is transmitted in one direction only.

(b) Half duplex transmission


- Data is transmitted in two directions but only in one direction at a time.

(c) Full duplex transmission


- Data is exchange between two devices in both directions simultaneously.

(3mks)
8. What are the four major parts of a database system?
- Data
- Hardware
- Software

2010 Pyramid Projections © 2010 451/1


48

- Users /liveware
(4mks)
9. Give the difference between machine language and assembly language
- Machine language is the computers own binary base language. Assembly language is a low
level language consisting of mnemonic codes and symbolic addresses corresponding to
machine language instructions. (2mks)
10. List any two functions of a computer scientist.
- Developing and advancing uses of virtual reality programming,
- Theoretical expertise
- Creation and application of new technology
- Designing programming tools.
(1mks
)

11. Differentiate between a device and a device driver.


- A device driver is a software component that permits a computer system to communicate
with a device. A hardware component of the computer.

(2mks)
12. (a) Differentiate between an electronic spreadsheet and the traditional analysis sheet
- Manual spreadsheet are paper and pen spreadsheets in which error correction is normally
hard while electronic spreadsheets are computer base spreadsheets which are easier to work
with.
(3mks)
(b) Explain how you would change the name of a worksheet in Microsoft excel ®
Method 1 –right click on the name tab of the worksheet to be renamed, select rename then type
the new name

(2mks)
13. Below is a graphical representation of a section of a Microsoft word ® application window.
Use it to answer the question that follow.

Give the uses of the icons labeled A and B


A –Right align text
B- Create columns in a document.

2010 Pyramid Projections © 2010 451/1


49

(2mks)

14. (a) List two examples of desktop publishing softwares.


- Quarkxpres
- PageMaker
- Adobe indesign
- Corel Ventura
- Serit page plus
- Adobe PageMaker
- Microsoft publisher
- Corel draw
(1mk)
(b) Differentiation between save and save as as used in most windows applications.
- Save command is used to save changes in an already saved document.
- Save as command is used to save a new unnamed document or to save an existing
document using a new name.
(2mks)
15. Define the following internet related terms.
a) Internet protocol
Set of rules that govern the use of the internet.
b) Search engine
Computer software that compiles list of documents on the World Wide Web and their
contents.
c) Browser
Program that allows a computer to locate, down load and display. Document containing text
graphics sounds videos, animation located on a computer network.
d) E- learning
Learning over the internet.
e) Uniform resource location.
A method of naming files or place on the internet.

(5mks)

SECTION B (60 marks)


Answer question 16 any other THREE questions from this section in the spaces provided.

16. A16 cellsone dimensional array, marks holds the marks of a computer examination for 35
students. You are given that the marks which are out of 100 will be entered at the keyboard and
that mark must be between the range of 0-99 inclusive, and that after the element have been
placed in the array, the average are computed and stored in the last of the array.

a) Draw a flowchart to represent this logic. (8mk)

2010 Pyramid Projections © 2010 451/1


50

b) List any three program control structures used in programming


- Sequence
- Repetition
- Selection
(3mks)
c) Give two differences between high level and low level languages
High level
- Machine independent
- programming is not time consuming
- translation not required
Low level
- Machine oriented

2010 Pyramid Projections © 2010 451/1


51

- program writing time consuming


- translation necessary for execution

d) Differentiate between source code and object code


Source code; human readable program statements written in a high level or assembly
language.
Object code –code generated by a computer or an assembler (machine code)
(2mks)
17. (a) Explain the meaning of the following term in relation to spreadsheet
i) Column
Vertical worksheet division identified by letters/ vertical arrangement of cells.
(ii) Function
An inbuilt formula
(iii) Legend
A reference list that serves as an explanation of the symbols on an excel graph.
(iv) Range
A block of cells selected for farmiliar treatment.
(v) Cell
An intersection of a column and a row.
(5mks)
(b) What do the following Microsoft excel ® error value mean?
(i) # NULL!
The formula refers to an invalid range.
(ii) # DIV/0 !
The formula is trying /attempting to divide by zero
(iii) #VALUE!
The formula contains the wrong type of argument or operator. (3mks)
(c) Briefly explain what you understand by the term ‘auto calculate’
A feature used to try out excel functions (2mks)
18. (a) Differentiate the term data and information
Data; Raw fact fed into the computer for processing/unprocessed facts
Information; result of data processing (1mk)
(b) Explain any 2 causes of errors in data processing
User errors e.g incorrect data entry /pressing wrong keys .
Users accessing files / part of applications they are not suppose to.
Program bugs – errors in program logics (4mks)
(c) List any four computer processing files
- Master file
- Transaction file
- Back up file
- Reference file.
(2mks)
(d) List two type of data representation used in computing
Number systems and their representation
Symbolic representation using coding schemes. (2mks)
(e) Define the following terms
(i) Nibble

2010 Pyramid Projections © 2010 451/1


52

Half a byte, a group of 4 bits. (6mks)


(d) Study the Microsoft excel ® worksheet extract below.

i. Give that the AVERAGE column N is gotten by getting the mean for term 1 to 3
averages write down a formula that can be used to obtain the AVERAGE mark for
DENNIS ORENGO OCHIENG’

=(G127+J127+M127)/3 (2mks)
ii. Write down the function that you would use to compute the grade for the student in (i)
above given that grading is done under the following condition;
Average marks; Below 29-E, 30-45-D, 46-59-C, 60-75-B and above 75A

(3 mks)
=IF (N127>75, “A” ,IF(N127>59, “B”, IF (N127> 45,”C” IF(N127>28,”D”
“E”))))

(2mks)
iii. Bit
A binary digit – smallest unit of data reprentation.
iv. Word length
A measure of the number of bits in each word.
19. Define the following terms
i) Data control
Measure taken to enforce the security of the programs & data
ii) Computer errors
Occurrence of an incorrect result produced by the computer.
iii) Sabotage
Occurs when a malicious user renders a system unusable by other. (3mks)
(b) Other than computer viruses errors and accidents discuss any three threats to a computerized
system and explain the prevent measures that can be taken to avoid such threat.
(i) Hacking – unauthorized acced into a computer system logging of correctly choosing
password and change the frequently encryption, biometrics
(ii) Theft ! use of burglar proof doors and windows.
(iii) System crashes; back up data.
(iv) Floods, laboratory floor should be raised above ground level.

2010 Pyramid Projections © 2010 451/1


53

(c) Explain what is meant by data backup and name three dangers of inadequate backup
procedures?
Mirroring systems for restoration (01)
Dangers - Loss of data.
- Loss of hardware.
- Reprocessing efforts due to lost data (4mks)
(d) Explain the implications of the legislation prohibited publication’
Prevents undesirable publication from being published and distributed electronically e.g. hate
mail and pornography.
(2mks)

20. (a) What is data privacy?


Controlling personal and confidential information and controlling what, how and when this
information is communicated to others. (1mk)
(b) Explain any two negative effects resulting from the use of ICT on employment
Job displacement;
Job replacement (4mk)
(c) Discuss any five ethical issues relate to the use of computers
- Information right and obligations
- Property rights
- Accountability and control
- System quality
- Quality of life
(10mks)

2010 Pyramid Projections © 2010 451/1

You might also like