Kala Computer PP1 MS
Kala Computer PP1 MS
1
SECTION A (40 Marks)
Answer ALL questions in this section in the spaces provided after each question.
1. Complete the paragraph by naming the correct term that well describes the missing part.
A computer has two different types of storage.
Secondary
_________________ storage is not directly accessed by the CPU, but it allows a user to store
data that can easily be accessed by applications. Two examples of this type of storage are
Magnetic Hard disk
__________________ Floppy Diskette
and ________________ The second type of storage is
_________________
Primary storage. This storage is directly accessed by the CPU. It allows the
processor to access data and instructions that are stored in this storage. Two types of this storage
RAM
are ___________________ ROM
and ______________________ (6 marks)
2. Differentiate between validation and verification checks during data entry. (2 marks)
Validation – rules and constraints that restrict data entry in a field. The rule(s) only allow specified
data that meets the criteria set, e.g. >10
Verification – a process that ensures that the data captured is the same as in the original source
document.
3. An expert system is an example of Artificial Intelligence. Name three components of an Expert system
(3 marks)
Knowledge Base
Explanation facility
Inference Machine
Interface
5. Identify a security solution that could be used to protect the computer from a computer virus, hacking
and spyware.
Each security solution must be different. (3 marks)
Use of firewall
2
6. The website has a uniform resource locator (URL). An example of a URL is given.
https://www.cambridgeassessment.org.uk/index.html Complete the table to identify the name of each
section of the URL (3 marks)
Protocol
Domain Name
Path/File Name
(iv) Process of converting digital data signals to analog data signals. (1mk)
Modulation
8. George has been employed as a Web Master in an organization. State two duties that he is likely to be
assigned. (2mks)
- Designs a website
- Updates the web contents
10. Define the following terms as used in word processing (3marks)
(a) Drop Cap
Accept illustrations.
(b) Superscript
3
A superscript is a number, figure, symbol, or indicator that is smaller than the normal line of type
and is set slightly above it , e.g. 13th (the th is the superscript)
(c) Indent
An indent sets the distance between the left and the right margins. It's also used in bullets and
numbering to ensure that the text lines up properly
10. Computers can use different methods of transmission to send data from one computer to another.
Parallel data transmission is one method that can be used.
Describe what is meant by parallel data transmission. (2 marks)
Method of transporting data, several bit simultaneously/ at the same time
11. State one advantage and one disadvantage of parallel data transmission, compared to serial data
transmission. (2 marks)
Adv Disadv
Faster data transmission Can only be used over short distances
12. Name four computer generations and state the technology associated with each (4
marks)
1st – Vacuum tubes 4th – Large Scale Integrated Circuits
2nd – Transistors 5th – Artificial Intelligence
3rd – Integrated Circuits
13. Name two toggle keys as on a standard computer keyboard. (2marks)
CAPS LOCK, NUM LOCK,INSERT
14. State two ways in which computer can be used in hotels (2 marks)
Marking Guide – Technology + Use
e.g. Use of Real time processing for Room reservation
15. Arrange the following data units in ascending order of size.
BYTE, FILE, BIT, NIBBLE (1 marks)
BIT NIBBLE BYTE FILE
4
SECTION B: (60 Marks)
Answer question 16 (compulsory) and any other three questions in this section
16 a) Name two change over strategies during the Implementation phase of software development.
(2 marks)
Parallel Pilot
Phased Direct
b) State three methods that a programmer can use to detect errors. (3marks)
Debugging tools Test Data
Translators e.g. Compilers Algorithms e.g. Flow charts
c) State two advantages of low level languages over high level languages. (2 marks)
- They are better at performance compared to high-level languages as they provide
direct control over the computer’s hardware.
- They result in faster execution times
d) Study the flowchart below and use it to answer the questions that follow:
5
ii) Write a pseudo code for the flowchart above. (6mks)
Start
Sum=0, N=0
Read X
Repeat
N=N+1
Sum = Sum + N
Until N = X
Print Sum
Stop
6
Q17. (a) Mazungumzo company introduced computers in their production unit, describe one effect of
introduction of computers on:
(i) Employment (2mks)
Employee can be replaced i.e. rendered jobless
Employee can displaced, i.e. employee taken to another job area
Can lead to job creation.
(ii) Worker’s Health (2mks)
Worker’s health can affected by
i) Radiation from ICT equipment (Monitors etc)
ii) Repetitive Strain Injury (RSI)- injuries caused by overuse and sitting for long hours
Programmer
Computer trainer.
7
18. a) Two 8-bit binary values are added. The result of this calculation needs to be stored in an 8-bit
register. The denary result of this calculation is 301. This generates an error. State the name of this type
of error and explain why this error occurs. (3 marks)
30110 = 1001111012
- Overflow error
- This occurs when an extra carry forward bit is generated from an arithmetic
operation.
b) Convert the denary value 50 to its Binary equivalent. Leave your answer in 8-bits. (3 marks)
5010 = 1100102
NB. Working must be shown
c) Using binary two’s complement, subtract 710 from 410 (4marks)
710 = 1112
410 = 1002
Two’s complement of 111 is 000
+1
001
Hence, 100
+ 001
101
1012
(d) Give the mode of processing that can be used in the listed situations.
(i) Generating students report forms at the end of the term. (1mk)
Batch
(ii) Railway ticket reservation (1mk)
Real time
(iii) Point of sale terminal in a supermarket. (1mk)
Online/Real time
(d) (i) File conversion in system development refers to modifying or changing the format of files
when a new system is introduced e.g. from manual to computerized. State two factors considered
before the file conversion process. (2mks)
-Type of data
- Data type
- Size of data
e) State three ways of minimizing threats to data integrity. (3mks)
Validation
Firewalls
Encryption
8
19. ``A school computer laboratory is scheduled to undergo major renovations. The lab is schedule
to receive new computer whose specifications are given below: -
3.0 GHz Core i5
250GB SSD
3.0 USB drive
4GB RAM
56 x DVD writer
17” SVGA TFT monitor
Windows 11
Windows Defender
The computers are going to be networked and will be able to browse the internet.
a) State what is meant by the terms: - (3marks)
i) SSD
Solid State Disk – the type of hard disk installed
ii) TFT
Thin Film Transistor – the type of monitor
iii) Core i5
The type processor
b) Classify the categories of the following: (2marks)
i. Windows 11 – the operating system installed
ii. Windows Defender – the antivirus system accompanying windows
c) The school has to apply star topology to link up the computer. State two advantages of this type of
topology. (2 marks)
• Easy to monitor via the Hub/Switch
• Adding/removing a node does not affect the network
• Failure of a node does not affect the network
• It is possible to use different types of cables in a star if the Hub/Switch has different ports
d) Name two other types of topologies that the school could have opted for (2marks)
BUS topology
RING topology
d) (i). Describe packet switching as used in networking. (2marks)
The message to be sent is broken into smaller units called packets. Each packet has necessary
addressing information to enable it to be routed independently across a packet switched
network
9
20. Study the spreadsheet below and answer the questions that follow
A B C D
1 WESTERN COMP BOOK CENTRE SALES
2 BOOK TITLE PRICE PER BOOK BOOKS SOLD
3 LEARNING ACCESS 400.00 145
4 LOTUS FOR DUMMIES 460.00 15
5 OFFICE WORD IN 3 DAYS 300.00 65
6 LEARN C++ IN 3 DAYS 700.00 100
7 TEACH YOURSELF PYTHON 700.00 200
8 COMPUTER STUDIES 500.00 300
9 HTML IN 1 DAY 300.00 10
10
i) Write down the formula that can be used to find the price of the highly priced book (1mark).
=Max(B3:B9)
ii) Write down the formula that can be used to determine the total sales for the book titled COMPUTER
STUDIES =B8*C8 (1mark)
iii) Write down the formula that can be used to determine the average price of all the books.
=Average(B3:B9) (1mark)
iv) Write down the formula in cell D6 that can be used to find the new price per book if they went up
by a percentage written in cell B 10 and the formula has to be entered only in cell D3 then be
copied to others. (2marks)
=$B$10*B6+B6
(d) State four advantages of using databases (4 marks)
• Improved data integrity
• Reduced data redundancy
• Improved data consistency
• More information can be derived from queries
• Improved security through passwords and integrity constrain rules
• Improved sharing of data
ii) Relational
All data is stored/structured within table. A table has a unique name and is made up of fields.
10