COMPPP1MS
COMPPP1MS
COMPUTER STUDIES
PAPER 1
MARKING SCHEME
JULY 2024
1. What precautions would you take in the computer laboratory incase users are
complaining of overheating and suffocation. (2marks)
Fit standard windows and doors.
Have vents.
Install air conditioning systems.
Avoid overcrowding in the laboratory. (Award 1mark each max 2)
2. State three circumstances which may force an individual to acquire an impact printer
instead of non-impact printer. (3marks)
When an individual has less money therefore cannot afford non-impact printers
When the output required is of low quality
When there is need for multiple copies in one instance of print (Award 1 mark each max 2)
3. Benjos was instructed by his teacher while typing a Microsoft word document to
replace all the occurrences of the word MS with Microsoft. Highlight the steps to do this
Press ctrl + H, to open find and replace From the ribbon click replace command (3marks)
dialog box to open find and replace dialog box
In the find what textbox type MS In the find what textbox type MS
In the replace with textbox, type In the replace with textbox, type
Microsoft Microsoft
Click on replace all button Click on replace all button
Award 3marks for whole procedure, 1 mark for any two subsequent steps
4. Computer network technicians prefer to use command-line based operating system
when configuring networks. State two reasons for this preference. (2marks)
Do not take up a lot of memory
Have direct access to most hardware devices/provide complete control during configuration
Cheaper to acquire as some are freeware/shareware
Faster to execute commands
Difficult to hack/more secure
More stable First 2 @1
5. Give three limitations of voice input devices (3marks)
Speaker variability
Homophones
Limited vocabularies
Interference from the background First 3 @1
6. State three functions of Un-interruptible Power Supply (UPS) (3marks)
1
provide temporary power in case of sudden power outage
regulate current flowing into the system
protect devices against high or low voltage
surge protection
alert users of any power fluctuations First 3 @1
7. Apart from cost, list three other factors to consider when selecting an operating system
to install in a computer (3marks)
The hardware configuration of a computer
Type of computer in terms of size and make
User friendliness of the operating system
Number of users it can support
Number of processors and hardware it can support
Reliability and security provided by the OS First 3 @1
8. Sam prepared a five-page brochure of Maseno School using Ms-publisher. He wanted
to insert a school badge in each page of the publication. State two methods he need to
apply to execute this task. (2marks)
Insert the badge at the footer or header.
Use the master page. (Award 1mark each max 2)
9. An organization is facing threats to data integrity. Explain three of how the threats can
be minimized. (3marks)
Use devices that capture data directly from source.
Using error detection and correction software when transmitting data
Design user interfaces that restrict invalid data entry
Backup data regularly
Control access to data by enforcing security measures. (first 3@1)
10. List three duties of a database administrator.
(3marks)
11. Discuss one area computers can be used in science and research. (2marks)
Medical research – For diagnosis, keeping patients’ records, inventory control.
Millitary and space exploration science – Computers are used to make research, design,
development and control of unmanned spaceships, aeroplanes and missiles.
Any 1@2marks- ( Evidence of technology being used)
12. Control unit is an essential component of the CPU. Outline three functions of the
control unit. (3marks)
2
The control transfer of data to, from and within the main memory
To coordinate various parts of the computer system
Monitor the system for problems such as equipment malfunction
Determine instructions to be executed next (first 3@1)
13. State the function of each of the following features of an email software.
(i) Spam (1mark) A
folder that contains junk email or unsolicited bulk emails sent through the email system. Unsolicited
emails mean the recipient did not grant permission for receiving those emails.
(ii) Trash (1mark)
The Trash folder is where any emails you have deleted, or which have been automatically deleted, are
sent. (Award 1mark each max 2)
14. Excluding passwords, state three other security control measures used to guard against
unauthorized access to computers in a network. (3 marks)
Audit trails
Firewalls
Proxy servers
Log files/security monitors
Encryption
User access levels/Multilevel access
Biometric security (first 3 @1)
15. A warranty is an agreement between the buyer and the seller. It spells out terms and
conditions after selling a product in case of failure or malfunction. Describe any three
basic requirements a good warranty should cover. (3 marks)
Scope of cover for example 4 months, 2years
Callout response and liability agreement. For how long should the supplier take to repair a fault or
replace the product and if he/she delays who beams the cost.
Preventive maintenance for example regulating of service at intervals. (award each 1 max 3)
SECTION B
16. (a) Define the following terms as used in programming environment (2marks)
3
i) Test data
It is a set of inputs that are used to verify the correctness, performance, and reliability of a program
ii) Bug
Bug is an error, flaw or fault in a computer program or system that causes it to produce an incorrect or
unexpected result.
(Award each 1 mark)
(b) State three ways employed by computer programmers to make the program code
easier to understand and follow (3marks)
Use of comments within the codes
Code indentation
Use clear variable names
Break the codes into smaller function first 3 @1
(c) Describe a situation where a loop would be useful when writing a program code
(2marks)
It is preferred when a give block of code is to be executed again and again until a condition is met
Start/stop =1mark
Initialization= ½mark
First Condition = ½mark
Input M1,M2,M3 and M4 = ½mark
Process sum and Average =1mark
Second condition = ½mark
Output fail and pass= 1mark
17. a) i)count
Increment Theand
school’s
average LAN
=1markis
Process
done usingMean UTP
score 1mark
cable. List two
Logic = 1mark
4
advantages of using this type of cable.
(2 mark)
Can support high data rates (bandwidth)
It is easier to setup network media because; connection is readily available.
Installation equipment is cheap
Readily available.
It is cheap because; of mass production for telephone use. First 2 @1
ii) Data flows in the school’s LAN in a duplex manner. Describe two other types of data
transmission in network (2 marks)
Simplex transmission:-This is where communication is only in one direction (as in radio or television
broadcast).
Half duplex transmission:-This refers to communication in both directions, but one direction at a
time. Each 1mark
c) Outline three factors to consider when selecting data transmission media (3marks)
1100012+11112-111112
110001
1111 Addition answer = 1mark
Subtraction answers 1 mark
1000000
- 11111
100001
This is where you enter a condition or expression that will be used by the query to
filter records.
ii) Show (1mark)
Is used to specify whether to display a field in the dynaset.
(Award 1mark each max 2)
e) State three outcomes that may result from using incorrect requirement
specifications during system development. (3marks)
6
ii The system will be delivered later than schedule.
iii The system will not meet the user’s expectation.
iv The cost of maintaining and enhancing the system may be excessively high.
v The system may be unreliable and prone to errors and downtime.
vi The system will not meet legal requirements. (first 3 @1)
19. a) Five students Jane, Beryl, Baroness, Linda, and Jael scored the following marks in
mathematics: 45, 76, 34, 65 and 45. The marks were recorded in cell C3 to C7. Write
down the most appropriate function that can be used to give those positions so that they
can be awarded in descending order. (3marks)
=RANK (C3, $C$3:$C$7, 0)
Correct Function 1mark
Correct range with absolute reference 1mark
Correct bracket to bracket 1mark
b) Highlight three best practices on behavior while in the computer laboratory (3marks)
7
Adaptive maintenance is modification of a software product performed after delivery to keep a
software product usable in a changed or changing environment.
Corrective maintenance is a concerned with put in place mechanisms that fix errors as they occur so
as to keep the system running.
Preventive maintenance involves carrying out activities that prevent occurrence of bugs.
(Award 1mark each max 3)
(b) Explain the following terms as used in Data security
(i) Exploits (2marks)
An exploit is a program, or piece of code, designed to find and take advantage of a security flaw or
vulnerability in an application or computer system, typically for malicious purposes such as installing
malware.
(ii) Intellectual property right (2marks)
Intellectual property rights are the rights given to persons over the creations of their minds. They usually
give the creator an exclusive right over the use of his/her creation for a certain period of time.
Award 2 marks each max 4
(c) Explain the following types of errors.