0% found this document useful (0 votes)
35 views10 pages

Comp PP1 MS

Uploaded by

25850338naomi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views10 pages

Comp PP1 MS

Uploaded by

25850338naomi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

MURUGI ZONE

PAPER ONE
COMPUTER STUDIES MARKING SCHEME
1. Identify three advantages of using computers in banking (3mks)
- Speed and accuracy
- Easy to access information
- Easy to update records
- Requires less space for storage
- Improves data security and privacy
2. List three facilities that will ensure proper ventilation in a computer lab (3mks)
- Large & enough windows and doors
- Installing air conditioning system
- Avoid overcrowding of either machines or people in the room
3. Give two main functions of a computer input device. (2mks)
- Accepts data & instructions from the user and sends them into the CPU. V
- Converts data into a form that the computer can understand (i.e., machine-
Sensible/readable form)
4. What are turnaround documents? (1mk)
These are documents produced as output and which can be re-used as input by the
computer

5. Using examples, distinguished between:


(i) Primary and secondary (1mk)
Primary storage devices are accessed directly by the CPU, while secondary
storage is not
(ii) Fixed and removable disks (1mk)
Fixed disks are mounted inside the computer system unit, e.g. Hard disk.
Removable disks are not hosed inside the system unit & are portable, e.g. floppy
disk, Jazz disk, Zip disk, flash disk, CD- R, CD – RW, DVD
6. Ann connected new multimedia speakers to her computer and tried to play her favorite music
CD, but no sound came out. Suggest two problems that might have occurred (2mks)

1
- Volume control was too low
- Loose or improper connection to the sound card
- Speakers not powered
- Multimedia not supported
- Lack of analogue cable connecting the optical drive to the motherboard or sound
card
- Sound card drivers not installed

7. Explain the following considerations when purchasing software (2mks)


(i) Authenticity
It is the genuineness, validity or legitimacy of software. The copy of the software
you buy should be accompanied by the license and certificate of authenticity of
the developer.
(ii) Portability
It refers to whether a program can be copied or installed in more than one
computer

8. Give three ways in which operating systems are classified into (3mks)
 The number of users they handle
 The number of tasks they execute concurrently
 Human computer interface

9. Peter tried to retrieve a document file following all the steps correctly. The filename did
not appear in file list box. State three causes for this. (3mks)
- The file may not have been saved
- The file may have been deleted
- The file may be located in a different folder from the one she was trying to
retrieve from (or may have been moved).
- The file may have been destroyed by a computer virus.

2
10. State the use of the following objects in databases. (3mks)
i) Tables -To store related records
ii) Forms -They act as screens for entering, changing & viewing data in tables
iii) Query-Searching for specific records/Data manipulation/Selecting
11. Explain the meaning of the following as used in computer programming. (2mks)
a. Syntax -these are rules that govern the arrangement of commands in a particular
language
b. Semantic - the meaning attached to every command in a particular language.
ii. List three ways in which data integrity can be compromised. (3mks)
a. Natural disasters such as fires, floods and earthquakes.
b. Human errors e.g. inaccurate data entry, accidental deletion.
c. Worms and viruses.
d. Hardware malfunctions.
e. Fraud.
f. Malicious deletion or changing of data.

12. Mobile phones have become common ICT devices. Explain some of the powerful
capabilities that come with some of the latest embedded operating systems (3mks)

a. Wireless communication (LAN)


b. Icons in form of commands
c. Voice recognition
d. Multimedia e.g video MP3 player
e. Java applications
iii. List two disadvantages of fiber optic cable. (2mks)
a. Connectivity devices and the media are expensive.
b. Installation is default because the cable must be carefully handled.
c. It is relatively complex to configure.
13. Describe any two types of data processing methods. (2mks)

a) Manual – Use of a pen and a paper


b) Mechanical – Use of typewriter and calculators
c) Electronic – Use of computers
14. State two advantages of USB port over the parallel port (2mks)
- Faster data transfer rate
- Supports multiple devices

3
15. Differentiate between the terms signal Attenuation and Noise as used in data
communication. (2mks)
Attenuation is loss of signal strength over distance while noise is deterioration of signal
quality

SECTION B
Answer question 16 and any other three questions in this section

16. a) State three advantages of low -level languages (3mks)


i. The program instructions can be executed by the processor much faster as
complex instructing are already broken down into smaller simpler ones
ii. The CPU can easily understand low – level languages without or with little
translation
iii. They have a close control over the hardware, are highly efficient and allow direct
control of each operation
iv. They require less memory space
v. They are stable
vi. Not commonly used, hence can be used to code secret programs
b) Give two differences between a compiler and an interpreter. (2mks)

Interpreters Compilers
Translates the source program one Translates the entire source code at once before
instruction at a time. execution
Translates the program each time it Executes faster than the interpreter since the
runs hence slower than the compiler object code can be stored and retrieved when
required
Interpreted object code occupies less Since compiled object files are larger than the
space than the compiled one interpreted ones, they thus occupy large space

4
c) i) Study this flowchart and use it to answer the questions that follow.

Start

S=1

Y = Y/10

S=S+1

Y< NO
10 ?

YE
S

Stop

(I) Give the expected output from the flowchart when the value of Y is:
(i) 48 (1 marks)
Solution:
Y = 48
= 48/10
= 4.8
4.8 <10 YES
Y = 4.8
S=1
(ii) 9170 (2 marks)
Solution:
Y = 9170
= 9170/10
= 917
917 <10 NO

5
‫؞‬S=S+1
=1+1
S=2
917/10 = 91.7
91.7 < 10 NO

‫؞‬S=2+1=3
Y = 91.7/10 = 9.17
9.17 < 10 YES

‫؞‬S=3
(iii) – 800 (2 marks)
-800/10 = -80
-80 < 10 YES

‫؞‬S=1
(II) Write the pseudocode that can be used to create a program represented by the above
Flowchart.
Start
S=1
Read
Repeat Y
Y = Y/10
IF (Y <10) THEN
S=S+1
ENDIF
UNTIL Y < 10
PRINT S
Stop

6
17. a.Use two complement to perform the following arithmetic operations
i) 1510 -1210 (4mks)
a) 1510
= 11112
1210= 11002 1 mk
Ones complement of = 11002 = 00112  (1mk)
2c5 of 0011 = 0011+ 1 = 0100 mk
Therefore:
11112
+ 01002
Overflow bit 10112
0011 +
= 00112  1 mk

ii) 101112- 10112 (3mks)


Ones complement of 010112 = 101002 1 mk
2cs = 10101
Therefore 10111
10101 1
1 01100

01100  1

b) 10112 is a ones complement binary representation of negative number using four bits work out
the likely positive equivalent in base 10. (4mks)
1011 -ve number
0100 +ve number  1

= 1 x 22 = 4
1 1 1
c) Convert the decimal fraction 10.37510 into its binary equivalent (3mks)
Whole numbers
10/2 =5 R 0
5/ 2 =2 R 1 read upward.  1 mk
2/2 =1 R 0
½ =0 R 1
0 . 375 x 2 = 0.75
. 75 x 2 = 1.50 read the whole number downwards  1 mk
. 5x 2 = 1.00
= 0.011

Combine the two


= 10102 + 0.0112 1mk
= 1010.0112 1 mk

7
d) Assuming the existence of base five, list the numbers used in the number system (1mk)
Base five numbers
0, 2, 3, 4  1mk

18. a) State and explain two disadvantages that will come about if a network was to be
installed in your school. (4mks)
o High initial cost – The cost of buying network hardware and software is very high.
o Security issues – The data on the network is prone to illegal access threats.
b) Discuss two disadvantages of wireless networks. (4mks)
i) Difficult to establish or configure
ii) Initial cost is very high
c) Write the following abbreviation in full. (2mks)

i) F.T.P
File Transfer Protocol
ii) H.T.T.P
Hyper text transfer protocol

d) With the aid of a diagram, discuss Hybrid topology. (4mks)

e) Discuss one advantages network. (2mks)


Resource sharing Distributed processing Cost effectiveness
Reliability

8
19. a) Explain why a computer is able to display the correct time and date when it has just be
switched on. (2mks)

Because it is set and stored in a special memory known as the complementary metal – oxide semiconductor
(cmos) chip which is powered by cmos battery

b) Discuss two types of special memories found in a Computer System. (4mks)


i. Buffers – Special memories found in the input / output devices.
ii. Cache – Fast type of RAM found in the processor.
iii. Register - Hold one piece of date at a time and are found in the ALU

c) i) Define a Bus with reference to a computer system. (1mk)


Bus – This are electronic pathways or links
ii) List two examples of buses. (2mks)
Data, Address and Bus
d) Distinguish between a power cable and interface cable. (2mks)
A power cable is used to transmit data from the source (socket) to the computer while
interface cables are special cables used to connect peripheral cables to the system unit.
e) Differentiate between the different types of RAM. (4mks)
Static RAM – is a fast type of RAM located inside the microprocessor
Dynamic RAM – is a relatively slow type of RAM. It has the tendency for the stored
charge to leak a way even with constant power supply hence requires periodic
recharging.
20. a) i) Define a system. (1mk)
Is a set of organized components which intersect in a given environment and within a
specified boundary to achieve collective goals.
ii) Explain system entropy. (2mks)
It means decay where a system slowly becomes useless to the user due to improvement in
user requirements
b) State three circumstances that can lead to development of information systems (3mks)
i) New opportunity ii) Problems iii Directives

c) Distinguish parallel changes over from straight change over as used in system
implementation. (2mks)
Parallel change over both old and new systems are run parallel to end other for some time until
users have confidence in new system is stopped and discarded and the new system started

9
immediately. While in straight change over the system is immediately implemented and the
old one discarded

d) Discuss two fact finding methods. (4mks)


Interviews – it is carried out with relevant stakeholders in order to get views about the current
system.
Questionnaires – Special purpose document that allows a person to collect information and
opinions from people who receive and respond to it.
Observation – Require the observer to participate or watch closely as a person performs
activities in order to learn about the system.
Automated method – Used when one wants to get actual data which may be difficult to get
through interviews,observation or questionnaires.
e) Differentiate an open system from a closed system. (2mks)
An Open system is that which interacts and communicates with its environment
constantly. It receives inputs from & gives output to the environment.
A closed system is that which does not interact or communicate with its environment. It
does not communicate to or receive communication from its environment.
f) List two responsibilities of a system analyst. (2mks)

a) Review an existing system and making recommendation on how to improve or implement an


alternative system
b) Working hand in hand with programmers to construct a computerized system.
c) Coordinating training of new system users and owners.

10

You might also like