Form 4 Computer Studies - Paper 1 - Marking Scheme
Form 4 Computer Studies - Paper 1 - Marking Scheme
4.
(i) Name two inputs devices that may be used as output devices
Touch screen
Interactive Whiteboard
Award 1 mark each max 2
5. Why is fibre optic more secure than Twisted pair and coaxial cables
Data signals in fibre optic is in form of light which is very difficult to tap
Award 1 mark max 1
1
6. State the function of the following features of a DTP publication window
(i) Pasteboard
A large blank area where you can place text and graphical objects before arranging them
neatly on the printable area
(ii) Master page
Used to design a general layout that needs to be applied in all other pages of the publication
Award 2 marks each max 4
7. Mention two effects of shutting down a computer using the wrong procedure
Leads to data loss
Damage to computer programs
Crashing of the hard disk
Award 1 mark each max 2
8. Levine is a System Analyst working with Victoria International Agencies. Levine was requested to
develop a new information system to replace the current system in a stakeholder’s meeting chaired
by the General Manager. Give three reasons to justify why the organization is in need of a new
system yet there is one in place
New opportunities – a chance to improve the quality of internal processes and service delivery
which cannot be supported by the current system
Problems- the current system may present undesirable circumstances that prevent the
organization from meeting its goals
Directives – the new requirements imposed by the management, government or external
influences thus the need to change the current system
Invention of new systems – they are more successful than the current system
The management may identify an area of poor performance which increases the level of
indirect expenses thus the need to change the current system.
Award 1 mark each max 3
9. Mention three disadvantages of GUI based operating systems
Require a lot of computer memory
Slower and require more power compared to CLI
Lack of flexibility – the user has within its restrictions and can’t change its functionality
More expensive
Award 1 mark each max 3
10. Nairobi University ICT hub developed an Expert system to help in disease diagnosis. Describe
three main components that developers must incorporate in this system to make it mimic human
experts
User interface- this is the display screen that enable the user to interact with the system
Inference engine- it is a search tool used to get information from the knowledge base
Knowledge base – it is a database of knowledge in a particular field of study
Award 1 mark each max 3
11. Computer network technicians prefer to use command line based Operating systems when configuring
networks. State three reasons for the preference
Work well with monitors of low resolutions
Require limited space
Run very fast
Its secure
Remote access - Consumes fewer networking resources
2
12. Explain the following limitations of Networking
(a) Over reliance
Organizations that purely rely on network to support their functions may suffer a great loss
when there is a network failure
(b) Data security n
Data held in network is always under constant security threats which may be inform of illegal
access, theft of data or tapping by unauthorized persons during transmission
Award 2marks each max 4
13. Give two reasons for extensive use of Electronic Fund Transfer in modern society
Service flexibility
Diligent
Wide coverage
Instant feedback
Speedy transaction
Security
Award 1 mark each max 2
14. State two ways of solving printing problem like lack of two way communication
Reinstall the printer
Select the correct printer
Ensure the printer is on and correctly connected using the data cable
Award 1 mark each max 2
15. Describe two challenges associated with the use of internet services like blogs, social media
networks and instant messaging
Spread of malicious software
Security and privacy
Access to inappropriate content
Award 1 mark each max 2
3
16.
(i) What is test data as used in programming environment
It is a set of inputs that are used to verify the correctness, performance, and reliability of a
program
Award 2 marks max2
(ii) State three ways employed by computer programmers to make the program code easier to
understand and follow
Use of comments within the codes
Code indentation
Use clear variable names
Break the codes into smaller function
Award 1 mark each max 3
(iii) Describe a situation where a loop would be useful when writing a program code
It is preferred when a give block of code is to be executed again and again until a condition is
met
(iv) Study the pseudo code below and use it draw a flow chart that will represent in all aspects
1. Start
2. Count =1
3. Average =0
4. For Count =1 to 5 Do
5. Enter Mark1, Mark 2, Mark 3, Mark 4
6. Get the sum
7. Compute Average
8. Is average greater than or equal 50
9. Print Pass
10. Else
11. Output Fail
12. Average =average +Average
13. Count=count +1
14. Endfor
15. Mean score=Average/count
16. Stop
4
Start
Count =1
Average=0
Count<5 No
yes
Enter Mean Score=Average/count
M1.M2,M3,M4
Sum=M1+M2+M3+M4
Average =sum/4 Stop
No Yes
Average>50
Fail Pass
Average=Average + Average
Count=count+1
Start/stop =1mark
Initialization= ½mark
First Condition = ½mark
Input M1,M2,M3 and M4 = ½mark
Process sum and Average =1mark
Second condition = ½mark
Output fail and pass= 1mark
Increment count and average =1mark
Process Mean score 1mark
Logic = 1mark
5
17.
(i) Perform the following number system conversion
(a) 19.187510 to Binary
2 19
2 9 Rem 1 0.1875x2= 0.375 Fraction part ½mark
2 4 Rem 1 0.375 x 2 = 0.75 Whole number part ½mark
2 2 Rem 0 0,75 x 2 = 1.5 Answer 1mark
2 1 Rem 0 0.5 x 2 = 1.0
0 Rem 1
6
(b) AB16 to Octal
A = 1010 Assigning A and B Binary equivalent = ½mark
B = 1011 Grouping binary bits = ½mark
10 101 011 Answer =1mark
2 5 3
2538
(ii) Perform the twos complement on 1310 -2310, leaving your answer in decimal number system
2 23 2 13
2 11 Rem1Conversion2of 613Remand123 = 1mark
2 5 Rem11c and 2c 2=1mark3 Rem 0
2 2 Rem1Adding 2c of 2 23 to 131= 1 mark
1 Rem
2 1 Rem0 Answer -10 = 1mark
0 Rem 1
0 Rem1
23 = 10111 13 =1101
01000 ........ 1c
01001 ......... 2c
+ 1101
10110
-1010
(iii) Describe three challenges affecting electronic information processing
Threats to data security
Lack of legal framework to support electronic processing activities
Lack of ICT skills Award 1 mark each max 3
(iv) Most organizations today are migrating from manual file system to computerized filling system
so as to have a competitive advantages in discharging their functions. State four advantages of
adopting this innovation
It enhances security of data
Enhances data integrity and reduces duplication
Offer fast access and retrieval of data
Much easier to update and modify
Information take less space
Award 1 mark each max 4
18.
(i) Give four command buttons from Picture tools used to make an image more visually appealing
Adjust
Picture style
7
Arrange
Size
Award 1 mark each max 4
(iii) Briefly describe the following features of Microsoft Excel screen layout
(a) Formula bar
A textbox in which a cell entry or a formula is displayed during typing or editing of cell
content
(b) Name Box
Used to display the cell address or name of the selected cells or range
Award 2 marks each max 4
19.
(i) Mention three functions of a form in a database
Links the user with the database
Make data entries in the underlying tables
View data
Award 1 mark each max 3
(ii) Use an example to explain the following data types as used in DBMS
(a) Calculated
This data types is used to store data created from a formula. For example a field total can be set
to calculated if the data stored in it comes from unit cost and quantity [Unit cost]*[quantity]
(b) Yes/No
This is a logical data type for an entry that is yes or no, true or false. For example a field may
require you to answer whether you are a male or female
Award 2 marks each max 4
(iii) Describe the types of relationships depicted by the diagram below
(a)
8
One –to – one relationship – this indicates that one record in the people’s table corresponds to
only bone record in the drivers licenses table
(b)
One – to – many relationship – it indicates that one record in the city’s table corresponds to
many records in the customers table.
Award 2marks each max 4
(iv) The table below is an extract from a database table use it to answer the questions that follows
Product Code Product Name Date of Birth Unit cost Quantity Total
01001101 Maize 02/03/2002 2000 10 20000
01223030 Millet 12/12/2002 1000 20 20000
10239345 Wallet 03/09/2005 100 10 1000
19019001 Sweet 09/09/2006 1000 5 5000
(a) Write an input mask that will display the product names as represented in the table
>L<??????????????
Award 2 marks max 2
<=Date() – The date must be today or earlier date but cannot allow future date
Accept year of Birth between 2002 and 2006
>=#01/01/2002# AND <#31/12/2006#
Award 1 mark each max
20.
(a) Explain the following terms as used in Data security
(i) Exploits
An exploit is a program, or piece of code, designed to find and take advantage of a security flaw
or vulnerability in an application or computer system, typically for malicious purposes such as
installing malware.
(ii) Intellectual property right
Intellectual property rights are the rights given to persons over the creations of their minds.
They usually give the creator an exclusive right over the use of his/her creation for a certain
period of time.
Award 2 marks each max 4
(b) State five measure against theft that school managers need to impose to safeguard their
computer laboratories
Employ security personnel
Reinforce weak access points like windows and doors using grilled doors
9
Insure the hardware resource
Motivate workers
Install alarm systems
Install cctv camera
Use Biometric system to access computer room
Use door that are opened using swipe cards
Award 1 mark each max 5
(c) Give three reasons for the adoption of e-commerce platform by most businesses
No reach limitation
Product and price comparison
Flexibility for customers
Affordable advertising and marketing
Cost reduction
Award 1 mark each max 3
10