CAT 1 – Computer Studies (451/1) – Detailed Marking Scheme
Section A – 40 Marks
Answer ALL questions.
1. Applications of special purpose computers
ATM (Automated Teller Machine): Used for banking transactions like withdrawing
or depositing money.
Traffic Light Control System: Used to manage and regulate traffic automatically.
2. Qualities of standard furniture for a computer room
Ergonomic Design: Chairs and desks should support good posture to reduce fatigue
and injury.
Sturdy and Durable: Should be made from strong materials to support the weight of
hardware.
Cable Management: Furniture should allow neat arrangement of cables to reduce
accidents and improve aesthetics.
3. Limitations of a mouse
Not suitable for text entry: A keyboard is needed for typing.
Requires a flat surface: Cannot be used efficiently without a flat base.
Not suitable for graphic design precision tasks: A stylus or graphic tablet may be
more accurate.
4. System software used during POST
BIOS (Basic Input/Output System): It initializes and tests hardware components
before the OS loads.
5. Difference between inkjet and laser printers
Inkjet Printer: Sprays ink directly onto paper. Slower, cheaper, ideal for home use.
Laser Printer: Uses laser beam to form images with toner. Faster, suitable for high-
volume printing.
6. Why KNEC uses flash disks
Portable: Easy to carry and distribute to exam centers.
Reusable: Can be erased and rewritten for future use.
Secure: Data can be encrypted, limiting access to exam content.
7. Functions of networking software
Enables communication between devices.
Controls network traffic and ensures efficient data flow.
Ensures network security and manages user permissions.
8. Advantages of portable software
No installation required: Can run from USB drives.
No system changes: Does not alter system files or registry.
Convenient for technicians: Easily carried and used across computers.
9. Functions of the taskbar
Displays running applications: You can switch between open programs.
Quick access toolbar: Pin favorite apps for fast access.
System tray: Shows system notifications, battery status, internet connection, etc.
10. Advantages of menu-driven interfaces
User-friendly: Easy to use, even for beginners.
No command memorization: Users choose from options rather than typing.
Reduces input errors: Users make fewer mistakes.
11. Advantages of defragmenting a hard disk
Improves performance by storing files contiguously.
Frees up storage space by reorganizing fragmented data.
Reduces wear on disk heads and enhances hardware lifespan.
12. Functions of columns in word-processing
Organize text layout: Makes reading easier, especially for newsletters.
Improves presentation and professional appearance.
Manages content structure for multi-section documents.
13. Advantages of e-assessment
Faster marking and result generation.
Environmentally friendly by reducing paper usage.
Flexible access from remote locations.
14. Advantages of hyperlinks
Quick navigation between documents or web pages.
Easy reference to external sources.
Enhances user experience through interactivity.
15. Acronyms
DNS: Domain Name System
SMTP: Simple Mail Transfer Protocol
Section B – 60 Marks
Answer Question 16 and any other three questions.
Section B – Detailed Answers (Continued)
Question 16: Programming and Flowcharts
a) Three causes of syntax errors:
Misspelled Keywords: Writing 'prnt' instead of 'print'.
Missing Punctuation or Brackets: Forgetting a semicolon or closing parenthesis.
Incorrect Use of Case or Format: Case-sensitive issues like using 'Print' instead of
'print'.
b) Two classifications of computer programming languages:
Low-level Languages: Closer to machine code (e.g., Machine and Assembly
languages).
High-level Languages: Easier to read and write (e.g., Python, Java, C++).
c) Pseudocode using WHILE loop to calculate sum and average of 100 numbers:
Initialize sum to 0
Initialize count to 0
WHILE count < 100 DO
Input number
sum ← sum + number
count ← count + 1
END WHILE
average ← sum / 100
Output sum
Output average
d) Flowchart:
Question 17: Number Systems and Database Queries
1. a) Perform 648 – 258 using two’s complement in 8-bit notation
Convert 648 and 258 to binary.
Find the 2's complement of 258 and add it to 648.
Result is 390 in binary: 110000110₂.
2. b) Three ways to prevent phishing
Avoid clicking suspicious links.
Enable multi-factor authentication.
Keep browser and antivirus software updated.
3. c) Two advantages of using named cell referencing
Improves readability of formulas.
Simplifies maintenance when data location changes.
4. d) Functions of four types of action queries
Make-table: Creates a new table from existing data.
Append: Adds new records to an existing table.
Update: Modifies existing records.
Delete: Removes unwanted records.
Question 18: System Development & ICT in Business
5. a) Advantages of conducting feasibility studies
Assesses project viability.
Identifies resource requirements.
Minimizes risk.
Improves decision-making.
6. b) Wrap text options in Publisher
Square: Text wraps around the bounding box.
Tight: Text wraps closely around object shape.
Through: Text flows through transparent parts.
Top and Bottom: Text appears above and below the object only.
7. c) Advantages of using EPOS
Fast and accurate processing.
Real-time stock control.
Reduces human error.
Generates sales reports.
8. d) Advantages of using a switch
Reduces collisions.
Improves performance.
Supports full-duplex communication.
Question 19: Time Sharing & Data Conversion
9. a) i. Time-sharing processing with diagram
CPU time is divided among users in time slices.
Each user gets rapid service, appearing simultaneous.
10. a) ii. Benefits of time-sharing
Efficient CPU utilization.
Supports multiple users.
Faster response time.
11. b) Convert 40.125 to binary
40 in binary: 101000
0.125 in binary: 0.001
Answer: 101000.001₂
12. c) Three ways a firewall filters data
IP address filtering.
Port filtering.
Protocol filtering.
13. d) Two advantages of cell merging
Creates centered headings.
Improves presentation.
Question 20: Database Administration & Networking
14. a) Roles of a database administrator
Ensures data security and access control.
Performs backup and recovery.
Monitors and tunes performance.
15. b) Limitations of star topology
Central hub failure disrupts entire network.
Higher cabling costs.
Requires more physical space.
16. c) Causes of system review
System failure.
User complaints.
Changes in technology or business needs.
17. d) Advantages of distributed processing
Reduces load on central server.
Increases system reliability.
Improves performance.
18. e) Disadvantages of robots
Job displacement.
High maintenance cost.
Lack of human judgment.