Comp PP1 MS
Comp PP1 MS
PAPER ONE
COMPUTER STUDIES MARKING SCHEME
1. Identify three advantages of using computers in banking (3mks)
- Speed and accuracy
- Easy to access information
- Easy to update records
- Requires less space for storage
- Improves data security and privacy
2. List three facilities that will ensure proper ventilation in a computer lab (3mks)
- Large & enough windows and doors
- Installing air conditioning system
- Avoid overcrowding of either machines or people in the room
3. Give two main functions of a computer input device. (2mks)
- Accepts data & instructions from the user and sends them into the CPU. V
- Converts data into a form that the computer can understand (i.e., machine-
Sensible/readable form)
4. What are turnaround documents? (1mk)
These are documents produced as output and which can be re-used as input by the
computer
1
- Volume control was too low
- Loose or improper connection to the sound card
- Speakers not powered
- Multimedia not supported
- Lack of analogue cable connecting the optical drive to the motherboard or sound
card
- Sound card drivers not installed
8. Give three ways in which operating systems are classified into (3mks)
The number of users they handle
The number of tasks they execute concurrently
Human computer interface
9. Peter tried to retrieve a document file following all the steps correctly. The filename did
not appear in file list box. State three causes for this. (3mks)
- The file may not have been saved
- The file may have been deleted
- The file may be located in a different folder from the one she was trying to
retrieve from (or may have been moved).
- The file may have been destroyed by a computer virus.
2
10. State the use of the following objects in databases. (3mks)
i) Tables -To store related records
ii) Forms -They act as screens for entering, changing & viewing data in tables
iii) Query-Searching for specific records/Data manipulation/Selecting
11. Explain the meaning of the following as used in computer programming. (2mks)
a. Syntax -these are rules that govern the arrangement of commands in a particular
language
b. Semantic - the meaning attached to every command in a particular language.
ii. List three ways in which data integrity can be compromised. (3mks)
a. Natural disasters such as fires, floods and earthquakes.
b. Human errors e.g. inaccurate data entry, accidental deletion.
c. Worms and viruses.
d. Hardware malfunctions.
e. Fraud.
f. Malicious deletion or changing of data.
12. Mobile phones have become common ICT devices. Explain some of the powerful
capabilities that come with some of the latest embedded operating systems (3mks)
3
15. Differentiate between the terms signal Attenuation and Noise as used in data
communication. (2mks)
Attenuation is loss of signal strength over distance while noise is deterioration of signal
quality
SECTION B
Answer question 16 and any other three questions in this section
Interpreters Compilers
Translates the source program one Translates the entire source code at once before
instruction at a time. execution
Translates the program each time it Executes faster than the interpreter since the
runs hence slower than the compiler object code can be stored and retrieved when
required
Interpreted object code occupies less Since compiled object files are larger than the
space than the compiled one interpreted ones, they thus occupy large space
4
c) i) Study this flowchart and use it to answer the questions that follow.
Start
S=1
Y = Y/10
S=S+1
Y< NO
10 ?
YE
S
Stop
(I) Give the expected output from the flowchart when the value of Y is:
(i) 48 (1 marks)
Solution:
Y = 48
= 48/10
= 4.8
4.8 <10 YES
Y = 4.8
S=1
(ii) 9170 (2 marks)
Solution:
Y = 9170
= 9170/10
= 917
917 <10 NO
5
؞S=S+1
=1+1
S=2
917/10 = 91.7
91.7 < 10 NO
؞S=2+1=3
Y = 91.7/10 = 9.17
9.17 < 10 YES
؞S=3
(iii) – 800 (2 marks)
-800/10 = -80
-80 < 10 YES
؞S=1
(II) Write the pseudocode that can be used to create a program represented by the above
Flowchart.
Start
S=1
Read
Repeat Y
Y = Y/10
IF (Y <10) THEN
S=S+1
ENDIF
UNTIL Y < 10
PRINT S
Stop
6
17. a.Use two complement to perform the following arithmetic operations
i) 1510 -1210 (4mks)
a) 1510
= 11112
1210= 11002 1 mk
Ones complement of = 11002 = 00112 (1mk)
2c5 of 0011 = 0011+ 1 = 0100 mk
Therefore:
11112
+ 01002
Overflow bit 10112
0011 +
= 00112 1 mk
01100 1
b) 10112 is a ones complement binary representation of negative number using four bits work out
the likely positive equivalent in base 10. (4mks)
1011 -ve number
0100 +ve number 1
= 1 x 22 = 4
1 1 1
c) Convert the decimal fraction 10.37510 into its binary equivalent (3mks)
Whole numbers
10/2 =5 R 0
5/ 2 =2 R 1 read upward. 1 mk
2/2 =1 R 0
½ =0 R 1
0 . 375 x 2 = 0.75
. 75 x 2 = 1.50 read the whole number downwards 1 mk
. 5x 2 = 1.00
= 0.011
7
d) Assuming the existence of base five, list the numbers used in the number system (1mk)
Base five numbers
0, 2, 3, 4 1mk
18. a) State and explain two disadvantages that will come about if a network was to be
installed in your school. (4mks)
o High initial cost – The cost of buying network hardware and software is very high.
o Security issues – The data on the network is prone to illegal access threats.
b) Discuss two disadvantages of wireless networks. (4mks)
i) Difficult to establish or configure
ii) Initial cost is very high
c) Write the following abbreviation in full. (2mks)
i) F.T.P
File Transfer Protocol
ii) H.T.T.P
Hyper text transfer protocol
8
19. a) Explain why a computer is able to display the correct time and date when it has just be
switched on. (2mks)
Because it is set and stored in a special memory known as the complementary metal – oxide semiconductor
(cmos) chip which is powered by cmos battery
c) Distinguish parallel changes over from straight change over as used in system
implementation. (2mks)
Parallel change over both old and new systems are run parallel to end other for some time until
users have confidence in new system is stopped and discarded and the new system started
9
immediately. While in straight change over the system is immediately implemented and the
old one discarded
10