0% found this document useful (0 votes)
38 views8 pages

COMPPP1MS

KSCE COMPUTER STUDIES PAPER 1 MS WORD

Uploaded by

dankoyiet254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views8 pages

COMPPP1MS

KSCE COMPUTER STUDIES PAPER 1 MS WORD

Uploaded by

dankoyiet254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

BONDO SUBCOUNTY JOINT EVALUATION

Kenya Certificate of Secondary Education

COMPUTER STUDIES
PAPER 1
MARKING SCHEME
JULY 2024
1. What precautions would you take in the computer laboratory incase users are
complaining of overheating and suffocation. (2marks)
 Fit standard windows and doors.
 Have vents.
 Install air conditioning systems.
 Avoid overcrowding in the laboratory. (Award 1mark each max 2)
2. State three circumstances which may force an individual to acquire an impact printer
instead of non-impact printer. (3marks)
 When an individual has less money therefore cannot afford non-impact printers
 When the output required is of low quality
 When there is need for multiple copies in one instance of print (Award 1 mark each max 2)
3. Benjos was instructed by his teacher while typing a Microsoft word document to
replace all the occurrences of the word MS with Microsoft. Highlight the steps to do this
 Press ctrl + H, to open find and replace  From the ribbon click replace command (3marks)
dialog box to open find and replace dialog box
 In the find what textbox type MS  In the find what textbox type MS
 In the replace with textbox, type  In the replace with textbox, type
Microsoft Microsoft
 Click on replace all button  Click on replace all button
Award 3marks for whole procedure, 1 mark for any two subsequent steps
4. Computer network technicians prefer to use command-line based operating system
when configuring networks. State two reasons for this preference. (2marks)
 Do not take up a lot of memory
 Have direct access to most hardware devices/provide complete control during configuration
 Cheaper to acquire as some are freeware/shareware
 Faster to execute commands
 Difficult to hack/more secure
 More stable First 2 @1
5. Give three limitations of voice input devices (3marks)
 Speaker variability
 Homophones
 Limited vocabularies
 Interference from the background First 3 @1
6. State three functions of Un-interruptible Power Supply (UPS) (3marks)

1
 provide temporary power in case of sudden power outage
 regulate current flowing into the system
 protect devices against high or low voltage
 surge protection
 alert users of any power fluctuations First 3 @1
7. Apart from cost, list three other factors to consider when selecting an operating system
to install in a computer (3marks)
 The hardware configuration of a computer
 Type of computer in terms of size and make
 User friendliness of the operating system
 Number of users it can support
 Number of processors and hardware it can support
 Reliability and security provided by the OS First 3 @1
8. Sam prepared a five-page brochure of Maseno School using Ms-publisher. He wanted
to insert a school badge in each page of the publication. State two methods he need to
apply to execute this task. (2marks)
 Insert the badge at the footer or header.
 Use the master page. (Award 1mark each max 2)
9. An organization is facing threats to data integrity. Explain three of how the threats can
be minimized. (3marks)
 Use devices that capture data directly from source.
 Using error detection and correction software when transmitting data
 Design user interfaces that restrict invalid data entry
 Backup data regularly
 Control access to data by enforcing security measures. (first 3@1)
10. List three duties of a database administrator.
(3marks)

 Responsible for the design and control of organisation database.


 Controls and monitors database usage through assignment of user passwords.
 Keeping the database up-to-date by adding new records, modifying or deleting unnecessary records.
 He establishes the appropriate content and format of data records.
(first 3@1)

11. Discuss one area computers can be used in science and research. (2marks)
 Medical research – For diagnosis, keeping patients’ records, inventory control.
 Millitary and space exploration science – Computers are used to make research, design,
development and control of unmanned spaceships, aeroplanes and missiles.
Any 1@2marks- ( Evidence of technology being used)

12. Control unit is an essential component of the CPU. Outline three functions of the
control unit. (3marks)
2
 The control transfer of data to, from and within the main memory
 To coordinate various parts of the computer system
 Monitor the system for problems such as equipment malfunction
 Determine instructions to be executed next (first 3@1)
13. State the function of each of the following features of an email software.
(i) Spam (1mark) A
folder that contains junk email or unsolicited bulk emails sent through the email system. Unsolicited
emails mean the recipient did not grant permission for receiving those emails.
(ii) Trash (1mark)
The Trash folder is where any emails you have deleted, or which have been automatically deleted, are
sent. (Award 1mark each max 2)

14. Excluding passwords, state three other security control measures used to guard against
unauthorized access to computers in a network. (3 marks)
 Audit trails
 Firewalls
 Proxy servers
 Log files/security monitors
 Encryption
 User access levels/Multilevel access
 Biometric security (first 3 @1)
15. A warranty is an agreement between the buyer and the seller. It spells out terms and
conditions after selling a product in case of failure or malfunction. Describe any three
basic requirements a good warranty should cover. (3 marks)
 Scope of cover for example 4 months, 2years
 Callout response and liability agreement. For how long should the supplier take to repair a fault or
replace the product and if he/she delays who beams the cost.
 Preventive maintenance for example regulating of service at intervals. (award each 1 max 3)

SECTION B

16. (a) Define the following terms as used in programming environment (2marks)
3
i) Test data
It is a set of inputs that are used to verify the correctness, performance, and reliability of a program
ii) Bug
Bug is an error, flaw or fault in a computer program or system that causes it to produce an incorrect or
unexpected result.
(Award each 1 mark)
(b) State three ways employed by computer programmers to make the program code
easier to understand and follow (3marks)
 Use of comments within the codes
 Code indentation
 Use clear variable names
 Break the codes into smaller function first 3 @1

(c) Describe a situation where a loop would be useful when writing a program code
(2marks)
 It is preferred when a give block of code is to be executed again and again until a condition is met

Award 2 mark max 2


(d) Study the pseudo code below and use it to draw a flow chart that will represent it in
all aspects
(8marks)
1. Start
2. Count =1
3. Average =0
4. For Count =1 to 5 Do
5. Enter Mark1, Mark 2, Mark 3, Mark 4
6. Get the sum
7. Compute Average
8. Is average greater than or equal 50
9. Print Pass
10. Else
11. Output Fail
12. Average =average +Average
13. Count=count +1
14. Endfor
15. Mean score=Average/count
16. Stop

Start/stop =1mark
Initialization= ½mark
First Condition = ½mark
Input M1,M2,M3 and M4 = ½mark
Process sum and Average =1mark
Second condition = ½mark
Output fail and pass= 1mark
17. a) i)count
Increment Theand
school’s
average LAN
=1markis
Process
done usingMean UTP
score 1mark
cable. List two
Logic = 1mark

4
advantages of using this type of cable.
(2 mark)
 Can support high data rates (bandwidth)
 It is easier to setup network media because; connection is readily available.
 Installation equipment is cheap
 Readily available.
 It is cheap because; of mass production for telephone use. First 2 @1
ii) Data flows in the school’s LAN in a duplex manner. Describe two other types of data
transmission in network (2 marks)
Simplex transmission:-This is where communication is only in one direction (as in radio or television
broadcast).

Half duplex transmission:-This refers to communication in both directions, but one direction at a
time. Each 1mark

b) (i) Give two advantages of telecommuting (2marks)

- Reduces travel expenses


- Reduces traveling stress
- Reduces interruptions at places of work
- Reduces need for offices First 2@1
(ii) Describe THREE ways in which computers are used as industrial systems. (3marks)

 CAD / CAM – For designing & manufacturing products


 Process control – To monitor and control working of processes in manufacturing plants.
 Simulation – To enable experimentation to take place with the use models
(Award ½ for each listed)(Award 1 for each correct explanation)

c) Outline three factors to consider when selecting data transmission media (3marks)

 Distance between the computer & the terminal.


 Type of data to be transmitted.
 Volume of data to be processed.
 Speed of transmission required.
 Accuracy and reliability required. First 3@1
d) Mention three functions of network operating systems (3marks)
 Provides access to network resources, e.g., printers and folders.
 Enables nodes on the network to communicate efficiently with each other.
 Enables the various processes on the network to communicate with one another.
 Supports network services such as network card drivers & protocols.
 Maintains security, ensuring that only users authorized to use the computer system are allowed
access to it.
 Produces logs, i.e., a record of all the programs as they are run.
 Organises the use of storage, since this has to be shared among different users. First 3@1
18. a). Convert the binary number 1010111101011011100012 into its
5
i) Octal equivalent (2marks)
101 011 110 101 101 110 001
5 3 6 5 5 6 1
53655618
Grouping the bits in three bits and getting equivalent per group =1mark
Final answer =1 mark

ii) Hexadecimal (2marks)


1 0101 1110 1011 0111 0001
1 5 E B 7 1
15EB7116
Grouping the bits in four bits and getting equivalent per group
=1mark
Final answer =1 mark

b) Use 8-bit two’s complement to subtract 3510 from 1710 (4marks)

35 = 100011 Getting the binary equivalent of


17=10001 35 and 17 @1mark
00100011 Ones complement ½ mark.
11011100……………1c Twos complement ½ mark.
11011101 …………2c Answer 1mark
+10001
11101110

c) Perform the following calculation (2 marks)

1100012+11112-111112

110001
1111 Addition answer = 1mark
Subtraction answers 1 mark
1000000
- 11111
100001

d) Describe the function of the following features of a query grid.


i) Criteria (1mark)

This is where you enter a condition or expression that will be used by the query to
filter records.
ii) Show (1mark)
Is used to specify whether to display a field in the dynaset.
(Award 1mark each max 2)
e) State three outcomes that may result from using incorrect requirement
specifications during system development. (3marks)

i The system may be costing more than what was projected.

6
ii The system will be delivered later than schedule.
iii The system will not meet the user’s expectation.
iv The cost of maintaining and enhancing the system may be excessively high.
v The system may be unreliable and prone to errors and downtime.
vi The system will not meet legal requirements. (first 3 @1)
19. a) Five students Jane, Beryl, Baroness, Linda, and Jael scored the following marks in
mathematics: 45, 76, 34, 65 and 45. The marks were recorded in cell C3 to C7. Write
down the most appropriate function that can be used to give those positions so that they
can be awarded in descending order. (3marks)
=RANK (C3, $C$3:$C$7, 0)
Correct Function 1mark
Correct range with absolute reference 1mark
Correct bracket to bracket 1mark
b) Highlight three best practices on behavior while in the computer laboratory (3marks)

 Never enter into the room with dusty shoes


 Never take drinks and food in the computer lab
 Never touch cables that are not insulated or connect them to the computers
 Use standard furniture when operating
 Never perform procedures you don’t know
 Never overcrowd in the computer room (first 3 @1)
c) State four benefits of cloud storage in computing. (4marks)
 Flexible
 Mass storage
 Cost efficient.
 Ensure data security.
 Scalable (Award 1mark each max 4)
d) Highlight three factors that dictate on how an operating system organizes information
(3marks)
Ease of access
Ease of update
Ease of maintenance reliability
Efficient storage (first 3 @1)

d) Outline two disadvantages of GUI operating systems (2marks)


 Require a lot of computer memory
 Slower and require more power compared to CLI
 Lack of flexibility – the user has within its restrictions and can’t change its functionality
 More expensive First 2@1
20. Describe four main ways of maintaining a computer-based system. (4marks)
 Perfective maintenance is software maintenance performed to improve the performance,
maintainability, or other attributes of a computer program.

7
 Adaptive maintenance is modification of a software product performed after delivery to keep a
software product usable in a changed or changing environment.
 Corrective maintenance is a concerned with put in place mechanisms that fix errors as they occur so
as to keep the system running.
 Preventive maintenance involves carrying out activities that prevent occurrence of bugs.
(Award 1mark each max 3)
(b) Explain the following terms as used in Data security
(i) Exploits (2marks)
An exploit is a program, or piece of code, designed to find and take advantage of a security flaw or
vulnerability in an application or computer system, typically for malicious purposes such as installing
malware.
(ii) Intellectual property right (2marks)
Intellectual property rights are the rights given to persons over the creations of their minds. They usually
give the creator an exclusive right over the use of his/her creation for a certain period of time.
Award 2 marks each max 4
(c) Explain the following types of errors.

(i) Overflow error (1mark)


This type of error occurs if the result from a calculation is too large to be stored in the allocated memory
space.
(ii) Truncation error (1mark)
Result from having real numbers that have a long fractional fraction part which cannot fit in the
allocated memory space therefore excess bits will be cut off. (Award 1mark each max 2)
(d) Mention two application areas of real processing (2marks)
 Airline reservation
 Defense application system like Radar
 Bus booking and reservation system (First 2@1)
(e) Briefly describe how internet platform have revolutionized business operations in the
21st century. (3marks)
 Promoted E-commerce where business activities can be carried out all over the world provided
there is internet connectivity.
 Internet has changed the mode of payment to electronic payment where money is transferred
electronically.
 Monitoring and surveillance using CCTV camera. Managers can monitor business operation
without necessarily going to the business premises.
 Internet open different avenues for communication between parties involved in business
operations. (Award 1mark each max 3)

You might also like