0% found this document useful (0 votes)
51 views7 pages

Cat 1 Scheme

The document is a detailed marking scheme for a Computer Studies exam, outlining various topics such as applications of special purpose computers, qualities of computer room furniture, limitations of mice, and differences between printer types. It includes structured sections with specific questions covering system software, networking software, programming languages, and database queries. Additionally, it discusses advantages of e-assessment, time-sharing, and the roles of database administrators, among other key concepts in computer studies.

Uploaded by

benmbithi25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views7 pages

Cat 1 Scheme

The document is a detailed marking scheme for a Computer Studies exam, outlining various topics such as applications of special purpose computers, qualities of computer room furniture, limitations of mice, and differences between printer types. It includes structured sections with specific questions covering system software, networking software, programming languages, and database queries. Additionally, it discusses advantages of e-assessment, time-sharing, and the roles of database administrators, among other key concepts in computer studies.

Uploaded by

benmbithi25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

CAT 1 – Computer Studies (451/1) – Detailed Marking Scheme

Section A – 40 Marks
Answer ALL questions.

1. Applications of special purpose computers


 ATM (Automated Teller Machine): Used for banking transactions like withdrawing
or depositing money.
 Traffic Light Control System: Used to manage and regulate traffic automatically.

2. Qualities of standard furniture for a computer room


 Ergonomic Design: Chairs and desks should support good posture to reduce fatigue
and injury.
 Sturdy and Durable: Should be made from strong materials to support the weight of
hardware.
 Cable Management: Furniture should allow neat arrangement of cables to reduce
accidents and improve aesthetics.

3. Limitations of a mouse
 Not suitable for text entry: A keyboard is needed for typing.
 Requires a flat surface: Cannot be used efficiently without a flat base.
 Not suitable for graphic design precision tasks: A stylus or graphic tablet may be
more accurate.

4. System software used during POST


 BIOS (Basic Input/Output System): It initializes and tests hardware components
before the OS loads.

5. Difference between inkjet and laser printers


 Inkjet Printer: Sprays ink directly onto paper. Slower, cheaper, ideal for home use.
 Laser Printer: Uses laser beam to form images with toner. Faster, suitable for high-
volume printing.

6. Why KNEC uses flash disks


 Portable: Easy to carry and distribute to exam centers.
 Reusable: Can be erased and rewritten for future use.
 Secure: Data can be encrypted, limiting access to exam content.

7. Functions of networking software


 Enables communication between devices.
 Controls network traffic and ensures efficient data flow.
 Ensures network security and manages user permissions.
8. Advantages of portable software
 No installation required: Can run from USB drives.
 No system changes: Does not alter system files or registry.
 Convenient for technicians: Easily carried and used across computers.

9. Functions of the taskbar


 Displays running applications: You can switch between open programs.
 Quick access toolbar: Pin favorite apps for fast access.
 System tray: Shows system notifications, battery status, internet connection, etc.

10. Advantages of menu-driven interfaces


 User-friendly: Easy to use, even for beginners.
 No command memorization: Users choose from options rather than typing.
 Reduces input errors: Users make fewer mistakes.

11. Advantages of defragmenting a hard disk


 Improves performance by storing files contiguously.
 Frees up storage space by reorganizing fragmented data.
 Reduces wear on disk heads and enhances hardware lifespan.

12. Functions of columns in word-processing


 Organize text layout: Makes reading easier, especially for newsletters.
 Improves presentation and professional appearance.
 Manages content structure for multi-section documents.

13. Advantages of e-assessment


 Faster marking and result generation.
 Environmentally friendly by reducing paper usage.
 Flexible access from remote locations.

14. Advantages of hyperlinks


 Quick navigation between documents or web pages.
 Easy reference to external sources.
 Enhances user experience through interactivity.

15. Acronyms
 DNS: Domain Name System
 SMTP: Simple Mail Transfer Protocol

Section B – 60 Marks
Answer Question 16 and any other three questions.
Section B – Detailed Answers (Continued)

Question 16: Programming and Flowcharts


a) Three causes of syntax errors:

 Misspelled Keywords: Writing 'prnt' instead of 'print'.


 Missing Punctuation or Brackets: Forgetting a semicolon or closing parenthesis.
 Incorrect Use of Case or Format: Case-sensitive issues like using 'Print' instead of
'print'.

b) Two classifications of computer programming languages:

 Low-level Languages: Closer to machine code (e.g., Machine and Assembly


languages).
 High-level Languages: Easier to read and write (e.g., Python, Java, C++).

c) Pseudocode using WHILE loop to calculate sum and average of 100 numbers:

Initialize sum to 0
Initialize count to 0

WHILE count < 100 DO


Input number
sum ← sum + number
count ← count + 1
END WHILE

average ← sum / 100


Output sum
Output average

d) Flowchart:
Question 17: Number Systems and Database Queries
1. a) Perform 648 – 258 using two’s complement in 8-bit notation

 Convert 648 and 258 to binary.


 Find the 2's complement of 258 and add it to 648.
 Result is 390 in binary: 110000110₂.

2. b) Three ways to prevent phishing

 Avoid clicking suspicious links.


 Enable multi-factor authentication.
 Keep browser and antivirus software updated.

3. c) Two advantages of using named cell referencing

 Improves readability of formulas.


 Simplifies maintenance when data location changes.

4. d) Functions of four types of action queries

 Make-table: Creates a new table from existing data.


 Append: Adds new records to an existing table.
 Update: Modifies existing records.
 Delete: Removes unwanted records.

Question 18: System Development & ICT in Business


5. a) Advantages of conducting feasibility studies

 Assesses project viability.


 Identifies resource requirements.
 Minimizes risk.
 Improves decision-making.

6. b) Wrap text options in Publisher

 Square: Text wraps around the bounding box.


 Tight: Text wraps closely around object shape.
 Through: Text flows through transparent parts.
 Top and Bottom: Text appears above and below the object only.

7. c) Advantages of using EPOS

 Fast and accurate processing.


 Real-time stock control.
 Reduces human error.
 Generates sales reports.

8. d) Advantages of using a switch

 Reduces collisions.
 Improves performance.
 Supports full-duplex communication.

Question 19: Time Sharing & Data Conversion


9. a) i. Time-sharing processing with diagram

 CPU time is divided among users in time slices.


 Each user gets rapid service, appearing simultaneous.

10. a) ii. Benefits of time-sharing

 Efficient CPU utilization.


 Supports multiple users.
 Faster response time.

11. b) Convert 40.125 to binary

 40 in binary: 101000
 0.125 in binary: 0.001
 Answer: 101000.001₂

12. c) Three ways a firewall filters data

 IP address filtering.
 Port filtering.
 Protocol filtering.

13. d) Two advantages of cell merging

 Creates centered headings.


 Improves presentation.

Question 20: Database Administration & Networking


14. a) Roles of a database administrator

 Ensures data security and access control.


 Performs backup and recovery.
 Monitors and tunes performance.

15. b) Limitations of star topology


 Central hub failure disrupts entire network.
 Higher cabling costs.
 Requires more physical space.

16. c) Causes of system review

 System failure.
 User complaints.
 Changes in technology or business needs.

17. d) Advantages of distributed processing

 Reduces load on central server.


 Increases system reliability.
 Improves performance.

18. e) Disadvantages of robots

 Job displacement.
 High maintenance cost.
 Lack of human judgment.

You might also like