100% found this document useful (1 vote)
191 views10 pages

Kala Computer PP1 MS

revision form 1 opener
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
191 views10 pages

Kala Computer PP1 MS

revision form 1 opener
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

FORM 4

Kenya Certificate of Secondary Education


COMPUTER STUDIES
Paper 1
(THEORY)

MARKING SCHEME GUIDE.

1
SECTION A (40 Marks)
Answer ALL questions in this section in the spaces provided after each question.
1. Complete the paragraph by naming the correct term that well describes the missing part.
A computer has two different types of storage.
Secondary
_________________ storage is not directly accessed by the CPU, but it allows a user to store
data that can easily be accessed by applications. Two examples of this type of storage are
Magnetic Hard disk
__________________ Floppy Diskette
and ________________ The second type of storage is
_________________
Primary storage. This storage is directly accessed by the CPU. It allows the
processor to access data and instructions that are stored in this storage. Two types of this storage
RAM
are ___________________ ROM
and ______________________ (6 marks)

2. Differentiate between validation and verification checks during data entry. (2 marks)
Validation – rules and constraints that restrict data entry in a field. The rule(s) only allow specified
data that meets the criteria set, e.g. >10
Verification – a process that ensures that the data captured is the same as in the original source
document.

NB. Award 2 marks if the difference is met , no mark

3. An expert system is an example of Artificial Intelligence. Name three components of an Expert system
(3 marks)
Knowledge Base
Explanation facility
Inference Machine
Interface

4. One function of an operating system is to manage interrupts.


Give two examples of when an interrupt would be generated. (2 marks)
Power loss
Absence of a resource such as a printer running out of paper
User initiated such as forceful stop/cancellation to a program/process

5. Identify a security solution that could be used to protect the computer from a computer virus, hacking
and spyware.
Each security solution must be different. (3 marks)

Use of antivirus software


Encryption

Use of firewall
2
6. The website has a uniform resource locator (URL). An example of a URL is given.
https://www.cambridgeassessment.org.uk/index.html Complete the table to identify the name of each
section of the URL (3 marks)

Protocol

Domain Name

Path/File Name

7. Write the correct name for the following explanation in networking.


(i) The process of sending multiple data signals over the same medium simultaneously.
Multiplexing (1mk)
____________________________________________________________________
(ii) Maximum amount of data that a transmission medium can carry at one time. (1mk)
Bandwidth

(iii) Decrease in magnitude and energy as a signal progressively moves on a transmission


medium. (1mk)
Attenuation

(iv) Process of converting digital data signals to analog data signals. (1mk)
Modulation

8. George has been employed as a Web Master in an organization. State two duties that he is likely to be
assigned. (2mks)
- Designs a website
- Updates the web contents
10. Define the following terms as used in word processing (3marks)
(a) Drop Cap
Accept illustrations.

(b) Superscript

3
A superscript is a number, figure, symbol, or indicator that is smaller than the normal line of type
and is set slightly above it , e.g. 13th (the th is the superscript)
(c) Indent
An indent sets the distance between the left and the right margins. It's also used in bullets and
numbering to ensure that the text lines up properly
10. Computers can use different methods of transmission to send data from one computer to another.
Parallel data transmission is one method that can be used.
Describe what is meant by parallel data transmission. (2 marks)
Method of transporting data, several bit simultaneously/ at the same time
11. State one advantage and one disadvantage of parallel data transmission, compared to serial data
transmission. (2 marks)
Adv Disadv
Faster data transmission Can only be used over short distances
12. Name four computer generations and state the technology associated with each (4
marks)
1st – Vacuum tubes 4th – Large Scale Integrated Circuits
2nd – Transistors 5th – Artificial Intelligence
3rd – Integrated Circuits
13. Name two toggle keys as on a standard computer keyboard. (2marks)
CAPS LOCK, NUM LOCK,INSERT
14. State two ways in which computer can be used in hotels (2 marks)
Marking Guide – Technology + Use
e.g. Use of Real time processing for Room reservation
15. Arrange the following data units in ascending order of size.
BYTE, FILE, BIT, NIBBLE (1 marks)
BIT NIBBLE BYTE FILE

4
SECTION B: (60 Marks)
Answer question 16 (compulsory) and any other three questions in this section
16 a) Name two change over strategies during the Implementation phase of software development.
(2 marks)

Parallel Pilot
Phased Direct
b) State three methods that a programmer can use to detect errors. (3marks)
Debugging tools Test Data
Translators e.g. Compilers Algorithms e.g. Flow charts
c) State two advantages of low level languages over high level languages. (2 marks)
- They are better at performance compared to high-level languages as they provide
direct control over the computer’s hardware.
- They result in faster execution times

d) Study the flowchart below and use it to answer the questions that follow:

i) Determine the output from the flowchart if X=4 (2mks)


X SUM N
4 0 0
1 1
3 2
6 3
10 4
Sum = 10

5
ii) Write a pseudo code for the flowchart above. (6mks)

Start
Sum=0, N=0
Read X
Repeat
N=N+1
Sum = Sum + N
Until N = X
Print Sum
Stop

6
Q17. (a) Mazungumzo company introduced computers in their production unit, describe one effect of
introduction of computers on:
(i) Employment (2mks)
Employee can be replaced i.e. rendered jobless
Employee can displaced, i.e. employee taken to another job area
Can lead to job creation.
(ii) Worker’s Health (2mks)
Worker’s health can affected by
i) Radiation from ICT equipment (Monitors etc)
ii) Repetitive Strain Injury (RSI)- injuries caused by overuse and sitting for long hours

(iii) Culture (2mks)


Culture can be eroded
ICT can also promote good culture among nations/citizens

iv. Differentiate between master file and transaction file (2mks)


Master file consists of permanent data while transaction files consists of temporary data
used to update master file
(ii) List three advantages of E-Business. (3mks)
Look for enhancement e.g faster transaction
(c) Identify the personnel responsible for each of the following duties:- (4mks)
(i) Ensuring up-to-date maintenance of ICT records.
ICT Records Manager

(ii) Testing and debugging programs.

Programmer

(iii) Identifying and fixing security loopholes.

Programmer, Network Administrator, DB administrator

(iv) Managing the learning and examination processes.

Computer trainer.

7
18. a) Two 8-bit binary values are added. The result of this calculation needs to be stored in an 8-bit
register. The denary result of this calculation is 301. This generates an error. State the name of this type
of error and explain why this error occurs. (3 marks)
30110 = 1001111012
- Overflow error
- This occurs when an extra carry forward bit is generated from an arithmetic
operation.
b) Convert the denary value 50 to its Binary equivalent. Leave your answer in 8-bits. (3 marks)
5010 = 1100102
NB. Working must be shown
c) Using binary two’s complement, subtract 710 from 410 (4marks)
710 = 1112
410 = 1002
Two’s complement of 111 is 000
+1
001
Hence, 100
+ 001
101
1012
(d) Give the mode of processing that can be used in the listed situations.
(i) Generating students report forms at the end of the term. (1mk)
Batch
(ii) Railway ticket reservation (1mk)
Real time
(iii) Point of sale terminal in a supermarket. (1mk)
Online/Real time
(d) (i) File conversion in system development refers to modifying or changing the format of files
when a new system is introduced e.g. from manual to computerized. State two factors considered
before the file conversion process. (2mks)
-Type of data
- Data type
- Size of data
e) State three ways of minimizing threats to data integrity. (3mks)
Validation
Firewalls
Encryption

8
19. ``A school computer laboratory is scheduled to undergo major renovations. The lab is schedule
to receive new computer whose specifications are given below: -
3.0 GHz Core i5
250GB SSD
3.0 USB drive
4GB RAM
56 x DVD writer
17” SVGA TFT monitor
Windows 11
Windows Defender
The computers are going to be networked and will be able to browse the internet.
a) State what is meant by the terms: - (3marks)
i) SSD
Solid State Disk – the type of hard disk installed
ii) TFT
Thin Film Transistor – the type of monitor
iii) Core i5
The type processor
b) Classify the categories of the following: (2marks)
i. Windows 11 – the operating system installed
ii. Windows Defender – the antivirus system accompanying windows
c) The school has to apply star topology to link up the computer. State two advantages of this type of
topology. (2 marks)
• Easy to monitor via the Hub/Switch
• Adding/removing a node does not affect the network
• Failure of a node does not affect the network
• It is possible to use different types of cables in a star if the Hub/Switch has different ports
d) Name two other types of topologies that the school could have opted for (2marks)
BUS topology
RING topology
d) (i). Describe packet switching as used in networking. (2marks)
The message to be sent is broken into smaller units called packets. Each packet has necessary
addressing information to enable it to be routed independently across a packet switched
network

(ii) Name three modes of data transmission in networking (2marks)


Simplex, Duplex, Half - duplex

9
20. Study the spreadsheet below and answer the questions that follow
A B C D
1 WESTERN COMP BOOK CENTRE SALES
2 BOOK TITLE PRICE PER BOOK BOOKS SOLD
3 LEARNING ACCESS 400.00 145
4 LOTUS FOR DUMMIES 460.00 15
5 OFFICE WORD IN 3 DAYS 300.00 65
6 LEARN C++ IN 3 DAYS 700.00 100
7 TEACH YOURSELF PYTHON 700.00 200
8 COMPUTER STUDIES 500.00 300
9 HTML IN 1 DAY 300.00 10
10
i) Write down the formula that can be used to find the price of the highly priced book (1mark).
=Max(B3:B9)
ii) Write down the formula that can be used to determine the total sales for the book titled COMPUTER
STUDIES =B8*C8 (1mark)
iii) Write down the formula that can be used to determine the average price of all the books.
=Average(B3:B9) (1mark)
iv) Write down the formula in cell D6 that can be used to find the new price per book if they went up
by a percentage written in cell B 10 and the formula has to be entered only in cell D3 then be
copied to others. (2marks)
=$B$10*B6+B6
(d) State four advantages of using databases (4 marks)
• Improved data integrity
• Reduced data redundancy
• Improved data consistency
• More information can be derived from queries
• Improved security through passwords and integrity constrain rules
• Improved sharing of data

e) What is meant by the term Referential Integrity? (2 marks)


The values of a foreign key must all come from the relevant Primary key field
e) Describe the following database models. (4 marks)
i) Network
Accept diagram

ii) Relational
All data is stored/structured within table. A table has a unique name and is made up of fields.

10

You might also like