0% found this document useful (0 votes)
922 views6 pages

MOCK EXAMINATION-marking Scheme

This document contains a marking scheme for a mock computing exam with 6 questions. It provides the key points or responses that would be awarded marks. The document was prepared by Kurenzvi T of Sandringham High School and includes their contact information. Teachers can contact them for queries, comments or clarification on the marking scheme. The marking guide is flexible and aims to assess student understanding while allowing for new valid responses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
922 views6 pages

MOCK EXAMINATION-marking Scheme

This document contains a marking scheme for a mock computing exam with 6 questions. It provides the key points or responses that would be awarded marks. The document was prepared by Kurenzvi T of Sandringham High School and includes their contact information. Teachers can contact them for queries, comments or clarification on the marking scheme. The marking guide is flexible and aims to assess student understanding while allowing for new valid responses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

MOCK EXAMINATION

COMPUTING PAPER 1
SEPTEMBER 2016 SESSION
MARKING SCHEME

NB : the marking guide is flexible and not exhaustive, there is room for new marking points.

For queries, comments and clarification feel free to contact me at [email protected] or


0773 040 903

Wish you the best as you prepare your students for the final Exams

Prepared by Kurenzvi T Sandringham High School


Contact: [email protected] or 0773 040 903
1 a) -a method of program development in which the main problem is divided into sub
problems/smaller tasks [1]
-each sub problem/task is individually solved [1]
b) -easier to understand and debug [1]
-easier to mantain [1]
-shorten development time [1]
- allows specialisation/team work [1]
-it is easier for someone to take over a set of self-contained modules [1]
-large project becomes easier to monitor and control [1]
-modules can be used again and again in different or parts of the same program [1]
[Max 2]
c) passing by value- the actual value/data is passed to the calling procedure [1]
- the value is not altered/changed [1]
Passing by address/reference- the address of the value is passed to a calling procedure [1]
-the value is changed/altered [1]
[Max 4]

d(i) -errors reported during translation eg syntax error [1]


(ii) -errors reported during program execution e.g division by zero [1]
(iii)- rounding down errors e.g Truncating 10.65 =10. The difference is the error 0.65 [1]
[accept any variations max 3]

2. a(i) Binary - 01101012 [1]


ii) Octal - 1658 [1]
iii) Hexadecimal - 7516 [1]
b) -maximum precision for a given number for a given number of bits [1]
-only one representation for each number [1]
[max 2]
c) -screen is divided into a grid, and each square on the grid is called a pixel [1]
-one bit in memory represent a pixel in a monochrome screen and one byte correspond to
a pixel in colour screen [1]
- if the bit is 1, the pixel is on and if the bit is 0, the pixel is off [1]
[max 2]
3 a) –use of barcodes [1]
-use hand held laser gun/wand reader to read the barcodes [1]
- use of touch screen/touch till [1]
- use of keyboards to enter data [1]
[Max 3]
b) Audit Trail- provides a means of tracking by keeping records of every transaction that has
been entered into the system to see how a particular figure was arrived at
-it keeps records of who used the system,when and how long –this monitors suspicious or
unauthorised use of computers [1]
Reasons
-in order to meet legal requirement [1]
-protection against fraud and against theft of stock [1]
-every business must produce a set of accounts based on verifiable facts [1]
[one mark for explanation, one mark for each reason max 3]

Prepared by Kurenzvi T Sandringham High School


Contact: [email protected] or 0773 040 903
4. a) circuit switching
-a physical pathway is established between sender and receiver for the duration of the
data transfer
- dedicated communications channel is established for the duration of the call [1]
[any one]
Packet switching
-divides the message to be transmitted into packets which may take different roots in
transmission, packets are reassembled at the receiving end [1]
b) -more efficient use of lines [1]
-less likey to be affected by network failure [1]
- better security/data is less likely to be intercepted [1]
- multiple routes are available to transmit data [1]
-cost depends on the number of packets not distance [1]
-network is not tied/congested [1]
[any two] [max 2]
c) -destination address [1]
-source address [1]
-packet sequence number [1]
-checksum for error checking [1]
[any two] [max 2]

d(i) Distributed systems


-a system in which resources e.g processors, disk storage, printers exist in separate notes
with transparent access to these resources made possible [1]
Centralised system
-a system in which all processing is carried out in one central location [1]

ii) - data is held locally thereby reducing transmission costs [1]


- Processing is faster as each workstation can do its own processing [1]
- Can meet specific needs of each local user [1]
- If central computer goes down, workstations are not affected [1]
- Particular PCs can be dedicated to particular applications [1]
[Any three] [max 3]

5. a)-comments typed as part of code [1]


- use of meaningful data names [1]
- indentation of program lines [1]
- modularity-splitting codes into smaller so that it is easier to follow [1]
-use of special reserved words [1]
[Max 3]
b) Removes redundant parts of source code, e.g. spaces/white space [1]
- Removes comments from the program [1]
- Checked validity of reserved words within the program code [1]
- Tokenises reserved words (replacing of reserved words like If, While,with shorter tokens [1]
- Tokenises operators [1]
- Checks validity of symbols and variable names variable names [1]
- Creates the symbol table [1]
[max 4]

Prepared by Kurenzvi T Sandringham High School


Contact: [email protected] or 0773 040 903
6. a) -data Integrity- refers to the correctness, validity and accuracy of data [1]
b) -at point of entry, wrong information typed [1]
-data corrupted during transmission [1]
-data lost during transmission [1]
-data affected by virus [1]
[any two max 2]
c) -apply different validation techniques eg type check
-data verification/double entry and compairing
- data protection methods eg virus checking [2]
[any two]
d) -open the entire database in exclusive mode
-lock all the table being modified
-lock the record currently being modified
-lock the table currently being edited
-open table in Read Only Mode [any three] [3]

e) -one of the two user’s task must be aborted to allow the other to proceed
-records needs to be updated in the same sequence so that no user calls up record 2
before record 1 [2]
7 a) Dynamic-the size of the file varies/always change in size during program execution [1]
Example: binary tree,stack,queue,stack [1]
b) Static-the size of the file has to be declared and is fixed prior to its application
-the size of the file does not change during program execution,it is fixed [1]
Example: array [1]

8 a) Sorting-arranging of records/data in a pre-defined/predetermined order


eg ascending [1]
Usage - sorting transaction file in the order of a master file [1]
Merging-combining two or more related records to form an ordered file [1]
Usage - when updating a master file using a transaction file [1]

b) -the way the data is stored/whether the data is partially sorted [1]
-length of records to be sorted [1]
-storage media used to store data eg main memory, disk tape [1]
-can data fit into main memory at the same time [1]
-processing speed of machine [1]
- efficiency when perfoming the task [1]
[Max 4]
9 a) -must generate any of the available addresses on the file
-must be fast to calculate
-should minimises collision (synonyms) [2]
b) -the record that has caused collision should be placed at the next available free space
-store the record in a separate overflow and leave a tag in the original location to indicate
where to look next [2]

Prepared by Kurenzvi T Sandringham High School


Contact: [email protected] or 0773 040 903
c) -adress is calculated using a harshing algorithm
-the record is read
- the record is logically deleted by setting a flag to zero,the record will be physically
present [2]

10 a(i) MICR-characters written in special ink(iron oxide) is magnetised and characters are read
by MICR using the strength of the magnetism [1]
Application – cheque processing in banks [1]
ii) OCR –characters are scanned/read by an optical character reader which converts text into
binary and software converts the scanned image into text [1]
Application- scanning text from textbook, billing systems, invoices for payment [1]
[accept any variations on application]

b)- Back up files-magnetic tape is used for store data for back up purposes
-storing transaction files-stores records in the order in which it takes place
-stores archive materials –stores historical data for future use [4]
[any two distinct uses with its description]

11 a) -file management
-memory management
- interrupt handling
- peripheral device control
- resource allocation
-input/output control
- multiprogramming
-checking user Ids and passwords [any three] [3]

b) -compression software-compressing data so that it occupies little space


- Virus Scan Utility: These are programs that protect computers from virus
attacks, for example Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.
- Sort Utilities: These are programs used to arrange data, files and records
into a specific ordered sequence, for instance in ascending or descending
order of a given key.
-Editors: These are programs used to make changes to data already held in the
computer [4]
[Any two explained utilities-1 mark for naming and 1 mark for explanation max
4]

c) loaders –loads compiled program into the memory [1]

Prepared by Kurenzvi T Sandringham High School


Contact: [email protected] or 0773 040 903
12 a) - a mail merge facility in word processing package is used [1]
- create a standard letter with variable to be filled in from the database [1]
-when mail merge is executed, there is automatic production of personalised letters to
each family in the database [1]
[max 3]
b(i) -long periods staring at screen causes eye strain
- continual use of the same mucle cause repetitive Strain Injury (RSI)
- long periods of non movement causes back strain
- effects on eye of radiation from screen [any two ] [2]

ii) -staff musttake short breaks and move around regularly [1]
-use adjustable chairs to support back [1]
-use anti glare screen [1]
- use wrist pads [1]
- use natural support keyboards [1]
[max 2]

13 a) function factorial(n) [1]


Begin
If n= 0 or n=1 then [1]
Factorial=1 [1]
Else
Factorial=n*factorial(n-1) [1]
End [ max 4]
[accept any variations]

b) -allows programmers to write a program which mirrors the solution [1]


-recursive solution are shorter than non recursive programs [1]
-easier for the programmer to write [1]
[max 2]

Prepared by Kurenzvi T Sandringham High School


Contact: [email protected] or 0773 040 903

You might also like