0% found this document useful (0 votes)
54 views5 pages

1.1 Computer Applications

This document contains a marking scheme for a computer applications exam with multiple choice questions, short answer questions, and long answer questions. It provides the answers to the exam questions on topics like computer components, operating systems, storage units, computer viruses, and data backup. The long answer questions require comparisons of system software and application software, as well as descriptions of how anti-virus software works through signature-based detection and other methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views5 pages

1.1 Computer Applications

This document contains a marking scheme for a computer applications exam with multiple choice questions, short answer questions, and long answer questions. It provides the answers to the exam questions on topics like computer components, operating systems, storage units, computer viruses, and data backup. The long answer questions require comparisons of system software and application software, as well as descriptions of how anti-virus software works through signature-based detection and other methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

KMTC/QP-08/EMS

COMPUTER APPLICATIONS Marking SCHEME


SECTION 1: MCQs (20 MARKS)
1 A 11. B
2 C 12. B
3 D 13. A
4 C 14. C
5 D 15. C
6 A 16. D
7 B 17. B
8 A 18. C
9 A 19. D
10 D 20. A

SECTION 2: SAQs
21. Definition
a. Computer - a programmable device that stores, retrieves, and processes data.
b. Information - is data computed into a more useful form than raw form.
c. Program - is a series of instructions written in the language of the computer for
them to obey and perform specific tasks as outlined by the instructions.
d. Processing - the computer will manipulate the data held within it to a more useful
form — results (information
e. Processing cycle - if the same resources are used in the same way, the same
outcome will result.

22. Components of computer that help in making the processing of data easier and
convenient.
a. Input device/unit – keyboard, mouse, barcode reader, scanner, joystick
b. Output device/unit – printer, VDU
c. Combination of input/output device – NIC
d. Storage device/unit – RAM, floppy disc, hard disc, CD ROM, DVD
e. Combination of input output unit – video camera
f. Processing device/unit – CPU

Page 1 of 5
KMTC/QP-08/EMS

23. Describe a motherboard and its functions


a. Def – it’s the main circuit board which contains most of the electronic
components.
b. Functions – A junction where all the components of the computer are directly or
indirectly connected.
1. Helps the CPU function normally
2. All computer components function via the mother board
3. Electronic communication of the computer occurs here
4. It includes RAM slots, controllers, system chipset,

24. Outline five (5) services that the operating/programming software can do.
a. saving data memory in files on the disc
b. loading files from disk onto memory
c. sending document on to the printer
d. copy/move data from one document to another or one programmes to another
e. prepare the disc to store data

25. Computer storage units and their value


Unit Value
1 Bit 0 or 1
2 Kilobyte 1024 bytes
3 Megabyte 1024 kilobytes
4 Gigabyte 1024 megabytes
5 Terabyte 1024 gigabytes

26. Sources of computer viruses


a. Contact with contaminated system
b. Pirated software
c. Infected proprietary software
d. Fake games
e. Freeware and shareware
f. Updates of software distributed via networks
27. Types of computer viruses
a. Boot sector viruses
b. File viruses
c. Macro viruses
d. Multipartite viruses
e. Polymorphic viruses

Page 2 of 5
KMTC/QP-08/EMS

f. Stealth viruses

28.  Give five reasons for backing up your data


a. The disk drive you use for back-ups fails for mechanical reasons
b. Your computer may be stolen --- Laptops are particularly vulnerable
c. Fire, floods or other disasters your computer
d. A power surge fries your machine (make sure you have a surge protector on your
computer equipment)
e. An employee accidentally or intentionally erases key data
f. A virus infects your system
g. Your hard drive crashes. Sooner or later it will fail; the only question is when
SECTION 3: LAQS (40 MARKS)
29. State five ways in which you should care your computer.
a. Maintain ambient temperature and acclimation by use of fans and heat sinks
b. Have moderate humidity
c. Maintain cleanness and dust free in their storage and operation
d. Repair any breakups immediately
e. Protect from smoke

30. Computer application software


1. is developed to aid in any task that benefits from computation.
2. Its developed for some certain purpose which either can be a
certain program or a collection of programs such as graphic
browser or data base management system.
3. allows users to accomplish one or more specific tasks like create
text documents, play games, listen to music, or surf the web
4. Includes end-user applications of computers such as word
processing software, spread sheet, Databases management system
software, Business software, Computer-aided design, Decision
making software, Educational software, Image editing, Industrial
automation, Mathematical software, Medical software, Molecular
modeling software, Simulation software, Spreadsheets,
Telecommunications (i.e., the Internet and everything that flows on
it), Video editing software, Video games, Word processing

Long answer questions


1. Tabulate five comparisons between system software and application software
System Software Application Software
5. is developed 6. is
for managing developed
a variety of to aid in any

Page 3 of 5
KMTC/QP-08/EMS

independent task that


hardware benefits
components, from
so that they computatio
can work n.
together 7.
harmoniousl
y.
8. provides the 9. allows users
basic to
functions for accomplish
computer one or more
usage and specific
helps run the tasks like
computer create text
hardware and documents,
system. play games,
listen to
music, or
surf the web
Example 1) Microsoft Windows 2) Linux 3) Unix 4) 1) Opera (Web Browser) 2) Microsoft
Mac OSX 5) DOS Word (Word Processing) 3) Microsoft
Excel (Spreadsheet software) 4) MySQL
(Database Software) 5) Microsoft
PowerPoint (Presentation Software) 6)
Adobe Photoshop (Graphics Software)
Interaction Generally, users do not interact with Users always interact with application
system software as it works in the software while doing different activities.
background.
Dependency System software can run independently of Application software cannot run without
: the application software. the presence of the system software.
Divided into 2- operating/programming Divided into 2- standard/general packages
and support system software and user developed/specialist packages

2. Describe four ways on which anti-virus works

1. Signature based detection is the most common method of virus detection by anti-virus is
tracing the virus signature definitions (fingerprints) or its variants since they have the same
signatures. To identify viruses and other malware, antivirus software compares the contents of a
file to a dictionary of virus signatures.

Page 4 of 5
KMTC/QP-08/EMS

2. Heuristic-based detection, like malicious activity detection, can be used to identify unknown
viruses. Some more sophisticated antivirus software uses heuristic analysis to identify new
malware or variants of known malware.
3. File emulation is another heuristic approach. File emulation involves executing a program in
a virtual environment and logging what actions the program performs. Depending on the actions
logged, the antivirus software can determine if the program is malicious or not and then carry out
the appropriate disinfection actions.
4. Rootkit detection. Anti-virus software can also scan for rootkits; a rootkit is a type of
malware that is designed to gain administrative-level control over a computer system without
being detected. Rootkits can change how the operating system functions and in some cases can
tamper with the anti-virus program and render it ineffective. Rootkits are also difficult to
remove, in some cases requiring a complete re-installation of the operating system. Because
viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but
also in pieces.

Page 5 of 5

You might also like