0% found this document useful (0 votes)
391 views

Computer Studies - Computer Studies Form 3 Paper 1 - Zeraki Achievers 1.0 - Marking Scheme

stedents

Uploaded by

wycliffe otieno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
391 views

Computer Studies - Computer Studies Form 3 Paper 1 - Zeraki Achievers 1.0 - Marking Scheme

stedents

Uploaded by

wycliffe otieno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Zeraki Achievers Exam (2021)

451/1 - COMPUTER - Paper 1


STUDIES
January/February 2021
𝟐½𝒉𝒐𝒖𝒓𝒔

MARKING SCHEME

Section Questions Maximum Candidate’s


Score Score
A 1 – 15 40
16 15
B 15
15
15
Total Score 100

© Zeraki- 2021 Page 1 of 7


Q Description Marks Awarded
1. A sales man in Moyale uses Electronic mail to communicate with Head office in Nairobi. Mention Award 1mark each max 3
three item that the Sales man must have to use this facility
 Computer
 Internet connectivity
 Browser
 Email address for sender and Receiver
2. One of the functions of computers is to process and provide storage for information. Award 1mark each max 3
Describe how doctors and nurse would benefit from the use of computers in hospitals
 Use of computer software to store diagnosis data and patient records
 Use of laser technology to perform surgery
 Telemedicine services for patients acts as a reminder
 Communication using sms, emails, tweeter , whattapps
 Ultrasound and MRI services are supported by computer platform
Note that full marks will be awarded when the candidate includes the technology without technology award zero
3. Repeaters are networking devices utilized in data transmission. State two functions of the device Award 1mark each max 2
 Expand network
 Amplifies signals
4. Describe three programs used by the programmers to convert source programs to object code Award 1mark each max 3
 Compiler translates the entire source program to object code
 Assembler translates assembly language programs into machine language
 Interpreter translates the source programs line by line
5. At times computer give unexpected results when performing operations in arithmetic. Explain what Award 2marks max 3
might have happened if the error message “Arithmetic Overflow” appear on the screen
 It is a type of computational error that occur when the results from a calculation is
too large to be stored in the allocated memory space

6. Antistatic Bag, Antistatic wrist member , screw driver and pliers are tools required during basic Award 1mark each max 2
computer setup and cabling .Briefly describe the functions of Antistatic wrest member and pliers
 Antistatic wrest member is used to discharge static electricity
 Pliers is used for holding objects firmly
7. James wanted to purchase genuine software to be installed in his personal computer. Award 1mark each max 3
Name three items that must accompany the software to proof that the software is genuine,
original and from a trustworthy source
 Certificate of authenticity
 Software License
 Genuine Installation key
8. State the difference between Make table Query and Append query in Databases Award 2marks max2
 Make table query creates a new table from a dynaset while Append query
adds data in a table from one or more table
9. Kenya government through National Bureau of statistics has been going through its census Award 1mark each max 3
exercise manually until the year 2019 when the government in collaboration with the ministry of ICT
Note that technology must
decided to computerized the whole process. Describe three ways in which computers were used to be included to award
improve the efficiency in the 2019 census process 1mark without technology
 Identification –using Biometric scanners award zero
 Tallying of census- Using special management information system
 Results- Using electronic media like computers, TV and electronic display boards
 Communication – using integrated system, whattapps, emails, messenger etc
 Advertisement –using computers, internet and TV
 Job application – using online portal for job application and upload of certificates
10. Tom a student from Klemo Secondary school sat for his KCSE in the year 2018 and Award 1mark each max 3
passed well but did not join the university due to financial problems. In the year 2020 he

© Zeraki- 2021 Page 2 of 7


was advised by a friend to a pursue course under the TVET program. List any three ICT
related courses that Tom may apply for
 Diploma in Computer studies
 Diploma in ICT
 Certificate in ICT
11. Due to the rapid changes in technology many companies are giving up on tradition Award 1mark each max 3
methods of production and shifting to automated production. Give three reasons that justify
the move
 Increased efficiency
 Improved customer service
 Efficient use of resources
12. Explain the following terms as used in Desktop publishing Award 1mark each max 2
 Overflow is a situation where the line of text place in a textbox cannot be
accommodated in the textbox
 Master page contain text and graphic elements that will appear on all pages of a
publication
13. Mention three sources of graphic objects with reference to Word processors Award 1mark each max 3
 Microsoft clip gallery
 Scanner/camera
 Import from another file.
 Drawing using drawing tools available in M/s word.
14. Give three reasons to justify why some computer experts still insist on using command Award 1mark each max 3
based operating systems even though they are not user friendly
 Execute fast
 Require less memory
 Low resolution or cheap monitors can be used with this type of interface
15. State three limitation of Traditional approach to system Development Award 1mark each max 3
 There is no formal documented methodology
 System development takes a long period
 Decision making is difficult especially when more people are engaged in the
development process
 Upgrade or maintenance of systems generated through this approach is very
difficult
16. Mention three limitations of machine language Award 1mark each max 3
 Machine dependant
(i)  Difficult and cumbersome to use and learn/Not user-friendly
 Require highly trained expert to develop and maintain the programs
 Difficult to debug programs

(ii) Study the flowchart below then answer the questions that follow

Star
t
Year =1
P =2
A=10

A=A*Profit
Year=Year +2
© Zeraki- 2021 Page 3 of 7

Display A
(a) Determine the Determine the value of the output P (3marks)
Year A
3 20 ½ mark
5 40 ½ mark
7 80 ½ mark
9 160 ½ mark

Award 1 mark for the


answer
P= 160*9 = 1440

(b) State what is likely to happen to the flowchart if the condition Year >7 is changed to Year Award 2marks max2
>0
 Execution will take place without stopping

(c) Develop a pseudo code to represent the flowchart in 16 (ii) (7marks)


Start
Set year = 1 ………………………………….P1 Start/stop =1mark
Profit = 2…………………………………..P2 P1,p2 =1mark
L1=1mark
A=10………………………………….P3 P4,P3=1mark
REPEAT………………………………………L1 O1 ,O2=1mark
A = A*Profit…………………………………..P4 C1,P6=1mark
Year =Year +2…………………………………P5 Logic =1mark
Write A…………………………………………O1
UNTIL year>7…………………………………C1
P=A*Year…………………………………….P6
Print P…………………………………………O2
Stop

© Zeraki- 2021 Page 4 of 7


17. Give two reasons to just the use of binary number system in computing Award 1mark each max 2
(i)  Complexity of the natural language
 Binary system can represent all forms of data
 Devices that use binary system are reliable
 Binary system based devices are energy efficient and small in size

Convert
(ii) (a) 110.1012 to decimal

(22x1)+(21x1)+(20x0)
M1 1mark
4+2+0 =6 A 1mark
0.101 = (0.5+0+0.125) +6 = 6.87510
(b) 1AH to Octal
1 = 0001 A= 1010 M1 1mark
A 1mark
00 011 010
0 3 2
328

(iii) Using twos compliment show how the arithmetic below could be carried out on a eight bit notation
(iv) computer
(+4610 )+(-2910)
46 = 101110 M1 1mark
29 = 11101 M2 1mark
A 1mark
00011101
11100010+1
11100011+00101110 = 100010001
(v) Get the value of X2 in this expression below
X2+78 =9H M1 1mark
X2 = 1001-0111 M2 1mark
A 1mark
X2 = 00102
(vi) 11012 is a binary representation of a negative number. Workout the likely positive equivalents in Award 1mark each max 3
base ten
First Assumption is prefixing a sign bit to the number therefore the last digit is a sign bit
The number is 101= 4+1
5
The second assumption is the number 1101 is a one complement of a positive number
therefore recomplement
1101 = 0010
2
The third assumption is the number 1101 is a two complement of a positive number
therefore subtract one then recomplement
1101-1 =1100
11 = 3

18.
Student database comprises of students details table and fee received
(i) Students’ Details Table Fee Received table
First Name Date
Middle Name Amount
Admission Number ReceiptNo
Course Code Mode of Payment

© Zeraki- 2021 Page 5 of 7


(a) State the primary key for each table Award 1mark each max 2
 Admission Number
 Receipt Number
(b) Give the most appropriate data type for Receipt No and Mode of payment Award 1mark each max 2
 ReceiptNo – Text
 Mode of payment – Lookup wizard/Text
(c) Suggest how the date column can be validated to accept today’s and earlier dates only Award 1mark max 1
 <=Date ()
(d) Describe how a relationship between the two tables can be established
 The relationship can be established by link Admission number and receipt No Award 1mark each max 3
 The relationship created will be One to One relationship
 Therefore one student is entitled to one receipt number

(ii) A student was typing a document using word processor.


(a) She typed the word school as SHOOL. Describe how she would correct the error
 Using spelling and grammar checkers Award 1mark each max 2
 By creating the insertion point between S and H then type letter C
(a) When she tries to type letter C between letter S and H, letter H was deleted which to her was
wrong .Explain the cause of this problem
 The type mode is set to type over mode therefore it will automatically replace the Award 2marks max 2
existing text by deleting them
(iii) Mention any three formulas that be added to Ms-Word table to perform simple calculations Award 1mark each max 3

 Average
 Sum
 Count
 Product
19. State three factors to consider when performing file conversion during system implementation Award 1mark each max 3
(i)  Check whether the new system requires a new hardware
 Check whether the new system requires a new operating system
 Check whether the new system requires a new application software has been installed
 Check whether creation of a new database file for new system is necessary

(ii) Describe three techniques that can be used to construct a designed system Award 1mark each max 3
 Using the high level structured language
 Using fourth generation language
 Customizing standard application
(iii) Briefly describe any three items that must included in a user manual Award 1mark each max 2
 System requirement –specify what the system require in terms of hardware or
software
 Navigation tips- demonstrate how the system is used
 Installation procedure- outline how to install the system
 Troubleshooting tip-Give a brief explanation on error handling
(iv) Use the spreadsheet extract below to answer the questions that follow
A B C D E F
1 Name CAT1(x/20) CAT2(x/20) Exam (x/60) Total Position
2 Paul 14 6 30 50 3
Kitambi
3 Nancy 15 10 40 65 1
Mthune
4 Irene 9 7 45 61 2
Bokere
5 Kalunda 03 2 20 25 4
Marj

© Zeraki- 2021 Page 6 of 7


(a) Write a formula used to get the total and position of Irene Bokere
Total
 =b4+c4+d4 =sum(b4:d4) Award 2marks max 2
Position
Award 2marks max 2
 =Rank(E4,$E$2:$E$5,0)
(b) Identify the spreadsheet feature used in column A to make the texts within the cells to
appear the way they are (1mark) Award 1mark max1
 Wrap text
(c) Use R1C1 style to represent Cell E5 (1marks) Award 1mark max 1
 R5C5
20. Peter is a computer student at Manyatta Secondary school, during a computer lesson he launched Award 1mark each max 3
(a) the browser to gain access to the internet. The browser responded by displaying an error message
THE PAGE CANNOT BE DISPLAYED. Give three possible causes of this error
 Wrong URL
 Lack of internet connectivity
 Connection problems
 Improper setting of the browser
(b) Mention three challenges that are associated with the use of internet services Award 1mark each max 3
 Intrusion to private information
 Access to inappropriate content
 Erosion of cultural
 promote drug trafficking and terrorism
(c) Apart from password describe three security control measures used to prevent unauthorized access Award 1mark each max 3
to information systems
 Encryption- Changing data on transit in a form that cannot easily be interpret
 Log file-going through the system logs to check the activity of the system
 Audit trails-Careful of the information system to check the weak access points
 Biometric Security-Use human body attributes to authenticate users
 Firewalls- Monitors incoming and outgoing network traffic and permits or blocks
data packets based on a set of security rules.
 Use strong password to authenticate uses
(d) Explain the following terms as used in data processing
(i) Multiprocessing
 Refer to handling more than one tasks apparently at the same time Award 1mark max 1
Note that one mark is awarded when the word apparently is present without apparently award zero
(ii) Interactive processing
 Type of processing where there is continuous dialogue between the user and the Award 1mark max 1
computer
(e) Describe two main types of fields found in a master field Award 1mark each max 2
 Static field contain data that do not change for example name, date of birth , place of
birth, gender and Pin number
 Dynamic field contain data that change after some time for example class, fee
balance, mode of payment and hostel

(f) Mention two application areas of Batch processing Award 1mark each max 2
 Processing payroll
 Processing bills like the one for Kenya Power, Nairobi Water Comapany

© Zeraki- 2021 Page 7 of 7

You might also like