0% found this document useful (0 votes)
11 views

com ms paper 1

The document is a marking scheme for the Computer Studies Paper 1 for the Form 3 Examination 2023 in Kenya. It includes various sections covering topics such as data processing, database management, security measures, and programming concepts, with specific questions and awarded marks. The document outlines key definitions, processes, and examples relevant to computer studies, providing a comprehensive guide for marking student responses.

Uploaded by

sagonelly
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

com ms paper 1

The document is a marking scheme for the Computer Studies Paper 1 for the Form 3 Examination 2023 in Kenya. It includes various sections covering topics such as data processing, database management, security measures, and programming concepts, with specific questions and awarded marks. The document outlines key definitions, processes, and examples relevant to computer studies, providing a comprehensive guide for marking student responses.

Uploaded by

sagonelly
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Computer studies paper 1 ms

FORM 3 EXAMINATION 2023


Kenya certificate of Secondary Education
451/1
COMPUTER STUDIES
PAPER 1
MARKING SCHEMES
SECTION A
1. a) Optical scanner capture using light technology while magnetic capture data written using magnetic
ink or coded into magnetic strip ( award 2 marks)
b) Hardware portability refers to the ability of the computer to be carried from one place to another with
ease. Software portability refers to the ability to install a program in two or more computers
(award 2 marks)
2. a) Cache
Buffer
Registers (award 2 marks)
b) Accumulator holds the results of the last processing step of the Alu temporarily while address
temporarily holds next piece of date waiting to be processed (award 2 marks)
3. Formatting refers to applying various styles to enhance the documents appearance
Editing refers to making necessary changes to a document (award 2 marks)
4. a) Pasteboard is a large area where you place text and graphical objects before arranging them on a
printable area. Printable area is the area surrounded by the margins.
b) Margin guide determines printable area while column guide divide a page into columns
5. a) Normalization is the process of trying to eliminate duplication values in a database.
b) -To relate different tables in database
-To ease the retrieval of data from a relation database
-Breaking up multi theme tables to smaller workable tables.
6. - Password protection
- Data encryption
- User - level security
- User and group permissions
7. a) Crop- trim graphics
b) Embedded objects – separate file not created in the program in use but in another and placed in the
program in use.
c) Master page - A page used to design general layout that needs to be applied in other pages.
d) Tool box – a set of buttons that contain tools used to create and manipulate publication
8. Website – A group of related web pages
Web portals - It offers specialized service such as searching, email, sports.

9. a) Protocol is a communication rules that govern sending and receiving of messages by computer
network.
b) TCPL/IP – Transmission Control Protocol/Internet Protocol
HTML – Hypertext Markup Language
HTTP – Hypertext Transmission Protocol
FTP – File Transfer Protocal
10. Fraud – Stealing by false pretence
Eaves dropping – Tapping into Communication Channel
Information Security – Ensuring of safety of data and information against threats
11. Control structure determine how statements are to be executed
12. Data collection
Data input
Processing

Page | 1
Computer studies paper 1 ms
Output
13. Cables and sockets well insulated
Provide stable power supply
Cables laid out away from pathways
14. a) Is a type of input where data is entered in form of spoken words
b) - Homophones
- Limited to few vocabularies
- Response is slow
- Problem of accents and tones
15. - Flash disk
- Memory stick

SECTION B
16. a) Dry running
Use of translators
Debugging utilities (award 3 marks well explained)

17. start 1mk

Name, years
Basic salary,sales 1mk

1mk
Experience Yes
>10 years
Benefit = Basic * 0.1 1mk

No

Sales > Yes


Bonus = sales * 0.15 1mk
200,000
1mk
No

Sales between 100,000 & 200,000 1mk


Bonus = sales * 0.1
1mk
No 1mk

Bonus = Sales x 0.05 1mk Print Name,


Basic salary, Bonus Gross salary
1mk
Gross = Basic + Bonus

STOP
1mk

Page | 2
Computer studies paper 1 ms
i. EBCDIC
Extended Binary Coded Decimal Interchange Code
ii. COBOL
Common Business Oriented Language
iii. ASCII
American Standard Coded for Information Interchange
b) Why computers use binary numbers
- Electrical pulses are either high or low
- Storage system is either magnetic or not
- Computer understands only ones 1s and 0’s
- The logic that computer uses is based on the states ON and OFF
(Answer 1 mark each total 2 x 1= 2 marks)
c) i) 20.216 to decimal
161 160 • 16-1
2 0 • 2 1mk

= [ax 161] + [0 x 160] + [2 x (1/16) ]


= 32. [0.125] (1mk)
= 32.12510

ii) 7.12510 to binary


2 7 Rem
2 3 1
2 1 1 1mk
1 1
= 1112
0.125 x 2 = 0.25 0
0.25 x 2 = 0.5 0 1 mark
0.5 x 2=1.0 1
= 0.0012
Combine the two
.: = 111.0012
d) i) 111001112 + 001011102
11100111
00101110
(1)00010101 = 1000101012 (1 mark)

ii) 101012 -110


.
10101
110
11112 (1mark)

e) Use Two’s complement to subtract 101 from 1000:


Step 1: Change the values to 8 binary digits
000010002-000001012 (1 mark)
Page | 3
Computer studies paper 1 ms
Step 2: Add the binary equivalent of the first value to the Two’s complement of the second value
That is: 00001000
11111011 +
(1)00000011
= 1000000112 (1mk)
f) Convert 57.410 to its octal equivalent
Insegral part
8 57 Rem
718
8 7 1
0 7

Fractional part 0.410


0.4 x 8= 3.2 3
.2x 8 = 1.6 1 to 2 decimal
.6 x 8 = 4.8 4
.8 x 8 = 6.4
. 3146
Therefore combine intergal and fractional part
71.318
18.
(i) Online processing – data is processed immediately as internet banking, online payment system using
credit card (2mks)
(ii) Batch processing – data is accumulated as a group as grading system in a school (2mks)
(iii) Real time – computer processes the incoming data as soon as it occurs, update the transaction file
and give an immediate response as making reservation for airlines seats.
(2mks)
b) i) Logical file and physical file
- Viewed in terms of what item it contains & details of what processing operations may be performed
on the data items.
Physical files are one that is viewed in terms of how data is stored on a storage media (2mks)
ii) Master file and back - up file
Master file is the main file that contains relatively permanent records. Back up files used to hold
copies of data or information from fixed storage (hard disk) (2mks)
iii) Random and indexed sequential file organization methods
Random – Also direct file organization records are stored randomly but accessed directly on a
storage medium. Indexed sequential records are stored and accessed individual records on storage
media. (well explained) (2mks)
c) - Back up data
- Control access of data by enforcing security measures
- Design user interface that minimize unauthorized access.
- Use error detection and correction softwares
- Use device that directly capture data from source document i.e. digital camera, optical CR
(Any three each 1mk).
19.
a) - The scheduler decides which of the jobs is to be allocated to the CPU for processing
- Allocating CPU time to jobs
- Sequencing of jobs in a queues (well explained) (2mks)
b) - Tapping
- Hacking
- Sabotage
- Alteration of data
- Damage of software (and any other each 1mk)
Page | 4
Computer studies paper 1 ms

ii) - Careful recruitment of staff


- Set up a clear and firm management policy on crimes and fraud
- Access restriction to computer rooms or terminal
- Use transaction files and file logs to monitor access of the system
- Use backups (any 2 each 1mk)
c) - Its user friendly
- Faster to work with as its work relies on the user clicking icons by the use of pointing device
- Easy to use ( each 1mk)
d) Trun cated – Results from having real number that have along fractional part being cut e.g. 73.73487 can
be 73.734
Transposition – Result from incorrect reading of source document e.g. 69371 can be 63971
Transcription – Occurs during data entry e.g. misreading and transportation. (each 2 mks)
e) Its small/ tiny clip put into a silicon clip (1mk)
20. (a) List and explain two functions of computer bus
 Data bus – Carries data to and from the CPU i.e. pathway of actual data
 Address bus – Used to locate the storage position in memory where the next instruction or data to be
processed is held
 Control bus – it is the pathway for all timing and controlling functions sent by the control unit to
other parts of the system
b) =&B7 + D&4
c) The technology of producing smaller devices is expensive
Convenient because they are portable
Have advanced power management capabilities (consume less power)
d) Document used to explain and describe how a particular program function in a system
e) • Parallel running is where both the old and the new systems are run in parallel to each other at the
same time
• Direct changeover is a complete replacement of the old system with the new system in one bold
move. (Old system is stopped and abandoned and the new system starts operating immediately).
f) Primary key – Unique field that identifies a record in a database
Foreign key – a primary key in another table once the tables are linked.

Page | 5

You might also like