0% found this document useful (0 votes)
300 views7 pages

f3 Endt1 2025 Computer Studies - Computer Studies - Marking Scheme

Cv

Uploaded by

Evans Mwaura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
300 views7 pages

f3 Endt1 2025 Computer Studies - Computer Studies - Marking Scheme

Cv

Uploaded by

Evans Mwaura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

GITHIGA HIGH SCHOOL

FORM THREE

COMPUTER STUDIES- 451/1

MARKING SCHEME

1. List four examples of documents that can be created using a word processor (2marks)
 Letters
 Reports
 Projects
 Newsletter
 Books
 Essays
 Memos
 Curriculum vitae 1st 4 @1/2 mk
2. Explain four functions of the operating system (4marks)
 Managing the computer inputs devices
 Manages the output devices
 Acts as interface between the user and hardware resources of the computer
 Memory management
 Error handling
 Interrupt handling. 1st 4 @1mk
3. Computer output may be in several forms. Describe each of the following forms listed below give example in
each case
 Softcopy. Information produced by the computer that can be seen or heard but not touched. Eg
sound or display on monitor. (description 1mk , example 1mk)
 Hardcopy. Are information that can be seen and touched. Eg information produced on paper.
(description 1mk, example 1mk)
4. State three application areas of a spreadsheet (3marks)
 Statistical analysis
 Accounting
 Mathematical and scientific
 Forecasting
1st 3 @ 1mk

Page 1 of 7
5. Differentiate between formula bar and cell address (2marks)
 Formula bar is where the cell entry or formula is displayed while cell address shows the location of a
particular cell. (2 or 0. Accept illustration.)
6. a) What is computer system (2marks)
 Is collection of hardware, software and live ware that work together to process and present
information. (WTE 2 or 0)

b) List two ways by which software can be acquired (2marks)


 Borrowing
 In-house developed
 Buying from a vendor
 Downloading from the internet. (1st 2 @ 1mk)
7. Differentiate between relative and absolute cell reference (4marks)
 Relative cell referencing is where the cells referenced in formula keep on changing as the formula is
copied from one cell to another while absolute cell referencing is where the cells referenced in
formula remain constant as the formula is copied from one cell to another. (4 or 2 or 0)
8. Write the following computing a acronyms in full (2marks)
i. ISP. Internet Service Provider
ii. MODEM. Modulation Demodulation
9. Describe the following path C:\windows\systems\Kenya.doc (2marks)
C is the storage device, windows is the folder, systems is the subfolder and Kenya.doc is the file.
Each @ ½ mark
10. State the function of the cache memory (1marks)
 Is a special memory that allow the processor to access data and instructions faster.
 Is a special memory that help to enhance the processing of the processor.
11. a) Differentiate between the headers and footers as used in word processing (2marks)
 Headers are lines of text that appear at the top of every page of the document while footer are lines
of text that appear at the bottom of every page of the document. (2 or
0)
b) Define the term mail merge (1marks)
 Is the process of generating personalized letters, labels or envelopes by merging the main file and
data source

12. State the importance of the following features in a word processor application window (3marks)
Page 2 of 7
a) Title bar
 Indicates the name of the currently running task, with minimize, restore and close button.
b) Ruler bar
 Helps the user to set tabs and indents
c) Formatting toolbar
 Contains icons used to enhance the appearance of the document.
13. Write the equivalent R1C1 reference for G20 (1mark)
 R20C7

14. The formulas below are in the cell K5 write the formulas as they would appear copied in cell R20 (4marks)
K5 R20
=B8+G12 =I23+N27
=H$25/$G$2 =O25/$G$2
=MIN(L5:M18) =MIN(S20:T33)
=RANK(F2,$F$2:$F$20,0) =RANK(M17,$F$2:$F$20,0)
15. State four ways in which computer users can protect from strain and injuries caused by computer. (4marks)
 Avoid too much light in the room
 Painting the room with optimum colors
 Using antiglare screens
 Not sitting for long using the computers
 Taking a break while using the computers
 Having standard furniture. (1st 4 @1mk)
16. Mention three possible causes of warm booting a computer (3marks)
 Hardware failure
 Software failure
 Installation of hardware
 Installation of software
 Virus infection (1st 3 @ 1mk)
17. List four ways through which one can ensure that a computer room is well ventilated (4marks)
 Avoid overcrowding of computers
 Avoid overcrowding of users
 Installation of air fans
 Opening doors and windows
 Having vents in the rooms (1st 4 @1mk)

Page 3 of 7
18. State two differences between a CD-R and a DVD -RW (4marks)
 CD-R has a capacity of about 700mb while the DVD-RW has a capacity of about 4.7gb
 CD-R is recordable, the content cannot be changed once written while CD-RW is re-writable the content
can be changed severally. (1st 2 @ 2mk)
19. Explain three types of computer buses (6marks)
 Control bus: performs all the timing and control functions sent by the control unit.
 Address bus: locate the storage location in memory where the next instruction or data to be processed is
held
 Data bus: is where the actual data transfer takes place. (state 1mk, explanation 1mk)
20. List four sources of graphical objects you can insert in a document (4marks)
 Digital camera
 Scanners
 Clip art
 Gallery
 Drawing
 Downloads
 Screen short (1st 4 @1mk)
21. Describe the three main steps in creating a mail merge (3marks)
 Creating main document/ primary file
 Creating data source/secondary file
 Creating merged file
22. State three data security practices that can be carried out by an organization to protect data. (3marks)
 Regular back up
 Keep back up away from users
 Educate users on data security
 Use of licensed /original software. (1st 3 @ 1mk)

23. With aid of illustration differentiate between landscape and portrait page orientation (4marks)
Page 4 of 7
Portrait where the text and graphics are printed with the longest side being vertical
Landscape. where the text and graphics are printed with the longest side being horizontal

land scape portrait

24. State two ways of creating a table (2marks)


 Importing from other application
 Drawing
 Inserting. (1st 2 @ 1mk)
25. Define the term file as used in operating system (1marks)
 Is a collection of related data given a unique name.
26. Explain the following commands as used with operating systems (2marks)
a. Renaming file
 Giving a file a different name.
b. Sort file
 Arrangement of files in in a particular order.

27. List any four programs that always run in the background when computer is started (2marks)
 Date
 Time
 Calendar
 Antivirus
 Volume control. (1st 4 @ ½ mark)

28. Define the following terms (2marks)


(i) Hot swapping

Page 5 of 7
 Is the connection/installation or removal of device from the computer when the computer is on and
be recognized by the operating system.
(ii) Master /slave configuration. (2 marks)
 Is the connection of more than device on a single controller and be recognized by the operating
system
29. List four requirements for basic computer setup and cabling (2marks)
 Manual/documentation
 Pliers
 Screw driver
 Antistic wrist member
30. Name three controllers that can be used to connect hard disk (3marks)
 Serial Advanced Technology Attachment (SATA)
 Enhanced Integrated Drive Electronics. (EIDE)
 Small Computer System Interface. (SCSI)
31. Give three functions of Database management software. (3marks)
 Allow one to add record
 Allow one to delete record
 Enable one to modify records
 To update existing records
 Act as interface between database and other programs
 Ensure security of data
 Keep statistics of data (1st 3 @ 1mk)

32. Differentiate between the following terms as used in database.


a. Validation rule and validation text. (2 marks)
 Validation rule are logical expressions that restricts the values to be entered in a field, while
validation text is the message that appears once the validation rule is violated
b. Table and query. (2 marks)
 A table is a database structure that is used to hold related records while a query is a statement used
to extract, change, analyze or extract for specific data from one or more tables

33. List four requirements for internet connectivity. (4 marks)


 Inter net service provider
Page 6 of 7
 Modem
 Computer
 Transmission media
 Internet software. (1st 4 @ 1mk)

Page 7 of 7

You might also like