0% found this document useful (0 votes)
294 views10 pages

Form 4 Computer Studies - Paper 1 - Marking Scheme

Form 4 Computer Studies - Paper 1 - Marking Scheme

Uploaded by

dan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
294 views10 pages

Form 4 Computer Studies - Paper 1 - Marking Scheme

Form 4 Computer Studies - Paper 1 - Marking Scheme

Uploaded by

dan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

MARKING SCHEME

COMPUTER STUDIES PAPER 1


FORM FOUR

1. State two objectives of normalization in Databases


 Eliminates redundant data in the database
 Minimize data modification errors
 Simplify the query process
Award 1 mark each max 2
2. Give three qualities of a good system analyst
 Good problem solving skills
 Innovative and creative
 Good communication skills
 Technical skills
 Good interpersonal skills
 Team player
Award 1 mark each max 3

3. Explain how data in a computer system can be secured using


(i) Security monitors
 Involve the use of hardware and software that monitor and keep track of all the activities
performed using computer systems therefore unauthorized users will not gain access to the
system
(ii) Biometric systems
 Involve the use of human body attributes which are unique to authenticate users
Award 1 mark each max 2

4.
(i) Name two inputs devices that may be used as output devices
 Touch screen
 Interactive Whiteboard
Award 1 mark each max 2

(ii) Give two limitations of voice input devices


 Speaker variability
 Homophones
 Limited vocabularies
 Interference from the background
Award 1 mark each max 2

5. Why is fibre optic more secure than Twisted pair and coaxial cables
 Data signals in fibre optic is in form of light which is very difficult to tap
Award 1 mark max 1

1
6. State the function of the following features of a DTP publication window
(i) Pasteboard
 A large blank area where you can place text and graphical objects before arranging them
neatly on the printable area
(ii) Master page
 Used to design a general layout that needs to be applied in all other pages of the publication
Award 2 marks each max 4
7. Mention two effects of shutting down a computer using the wrong procedure
 Leads to data loss
 Damage to computer programs
 Crashing of the hard disk
Award 1 mark each max 2
8. Levine is a System Analyst working with Victoria International Agencies. Levine was requested to
develop a new information system to replace the current system in a stakeholder’s meeting chaired
by the General Manager. Give three reasons to justify why the organization is in need of a new
system yet there is one in place
 New opportunities – a chance to improve the quality of internal processes and service delivery
which cannot be supported by the current system
 Problems- the current system may present undesirable circumstances that prevent the
organization from meeting its goals
 Directives – the new requirements imposed by the management, government or external
influences thus the need to change the current system
 Invention of new systems – they are more successful than the current system
 The management may identify an area of poor performance which increases the level of
indirect expenses thus the need to change the current system.
Award 1 mark each max 3
9. Mention three disadvantages of GUI based operating systems
 Require a lot of computer memory
 Slower and require more power compared to CLI
 Lack of flexibility – the user has within its restrictions and can’t change its functionality
 More expensive
Award 1 mark each max 3
10. Nairobi University ICT hub developed an Expert system to help in disease diagnosis. Describe
three main components that developers must incorporate in this system to make it mimic human
experts
 User interface- this is the display screen that enable the user to interact with the system
 Inference engine- it is a search tool used to get information from the knowledge base
 Knowledge base – it is a database of knowledge in a particular field of study
Award 1 mark each max 3
11. Computer network technicians prefer to use command line based Operating systems when configuring
networks. State three reasons for the preference
 Work well with monitors of low resolutions
 Require limited space
 Run very fast
 Its secure
 Remote access - Consumes fewer networking resources

Award 1 mark each max 3

2
12. Explain the following limitations of Networking
(a) Over reliance
 Organizations that purely rely on network to support their functions may suffer a great loss
when there is a network failure
(b) Data security n
 Data held in network is always under constant security threats which may be inform of illegal
access, theft of data or tapping by unauthorized persons during transmission
Award 2marks each max 4

13. Give two reasons for extensive use of Electronic Fund Transfer in modern society
 Service flexibility
 Diligent
 Wide coverage
 Instant feedback
 Speedy transaction
 Security
Award 1 mark each max 2

14. State two ways of solving printing problem like lack of two way communication
 Reinstall the printer
 Select the correct printer
 Ensure the printer is on and correctly connected using the data cable
Award 1 mark each max 2

15. Describe two challenges associated with the use of internet services like blogs, social media
networks and instant messaging
 Spread of malicious software
 Security and privacy
 Access to inappropriate content
Award 1 mark each max 2

3
16.
(i) What is test data as used in programming environment
 It is a set of inputs that are used to verify the correctness, performance, and reliability of a
program
Award 2 marks max2
(ii) State three ways employed by computer programmers to make the program code easier to
understand and follow
 Use of comments within the codes
 Code indentation
 Use clear variable names
 Break the codes into smaller function
Award 1 mark each max 3

(iii) Describe a situation where a loop would be useful when writing a program code
 It is preferred when a give block of code is to be executed again and again until a condition is
met

Award 2 mark max 2

(iv) Study the pseudo code below and use it draw a flow chart that will represent in all aspects
1. Start
2. Count =1
3. Average =0
4. For Count =1 to 5 Do
5. Enter Mark1, Mark 2, Mark 3, Mark 4
6. Get the sum
7. Compute Average
8. Is average greater than or equal 50
9. Print Pass
10. Else
11. Output Fail
12. Average =average +Average
13. Count=count +1
14. Endfor
15. Mean score=Average/count
16. Stop

4
Start

Count =1
Average=0

Count<5 No

yes
Enter Mean Score=Average/count
M1.M2,M3,M4

Sum=M1+M2+M3+M4
Average =sum/4 Stop

No Yes
Average>50

Fail Pass

Average=Average + Average
Count=count+1

Start/stop =1mark
Initialization= ½mark
First Condition = ½mark
Input M1,M2,M3 and M4 = ½mark
Process sum and Average =1mark
Second condition = ½mark
Output fail and pass= 1mark
Increment count and average =1mark
Process Mean score 1mark
Logic = 1mark

5
17.
(i) Perform the following number system conversion
(a) 19.187510 to Binary
2 19
2 9 Rem 1 0.1875x2= 0.375 Fraction part ½mark
2 4 Rem 1 0.375 x 2 = 0.75 Whole number part ½mark
2 2 Rem 0 0,75 x 2 = 1.5 Answer 1mark
2 1 Rem 0 0.5 x 2 = 1.0
0 Rem 1

Combine the fraction part and the whole number part


10011+0.0011 = 10011.00112

6
(b) AB16 to Octal
A = 1010 Assigning A and B Binary equivalent = ½mark
B = 1011 Grouping binary bits = ½mark
10 101 011 Answer =1mark
2 5 3
2538

(ii) Perform the twos complement on 1310 -2310, leaving your answer in decimal number system

2 23 2 13
2 11 Rem1Conversion2of 613Remand123 = 1mark
2 5 Rem11c and 2c 2=1mark3 Rem 0
2 2 Rem1Adding 2c of 2 23 to 131= 1 mark
1 Rem
2 1 Rem0 Answer -10 = 1mark
0 Rem 1
0 Rem1
23 = 10111 13 =1101
01000 ........ 1c
01001 ......... 2c
+ 1101
10110

Recompliment 10110 = 01001 +


1
01010

-1010
(iii) Describe three challenges affecting electronic information processing
 Threats to data security
 Lack of legal framework to support electronic processing activities
 Lack of ICT skills Award 1 mark each max 3

(iv) Most organizations today are migrating from manual file system to computerized filling system
so as to have a competitive advantages in discharging their functions. State four advantages of
adopting this innovation
 It enhances security of data
 Enhances data integrity and reduces duplication
 Offer fast access and retrieval of data
 Much easier to update and modify
 Information take less space
Award 1 mark each max 4

18.
(i) Give four command buttons from Picture tools used to make an image more visually appealing

 Adjust
 Picture style
7
 Arrange
 Size
Award 1 mark each max 4

(ii) List four types of mail merge documents


 Letters
 Envelopes
 Mailing labels
 Catalogues
 E-mail messages
Award 1 mark each max 4

(iii) Briefly describe the following features of Microsoft Excel screen layout
(a) Formula bar
 A textbox in which a cell entry or a formula is displayed during typing or editing of cell
content
(b) Name Box
 Used to display the cell address or name of the selected cells or range
Award 2 marks each max 4

(iv) Describe three data management features supported by Microsoft Excel


 Sorting- arranging data items a particular order
 Filtering –It is quick and easy way of finding and working with a subset of related worksheets
 Validation –A facility that restrict invalid data entry in a cell
 Subtotal and Grand total- used to summarize a worksheet list to display grouped subtotal and
grand totals
Award 1 mark each max 3

19.
(i) Mention three functions of a form in a database
 Links the user with the database
 Make data entries in the underlying tables
 View data
Award 1 mark each max 3

(ii) Use an example to explain the following data types as used in DBMS
(a) Calculated
 This data types is used to store data created from a formula. For example a field total can be set
to calculated if the data stored in it comes from unit cost and quantity [Unit cost]*[quantity]
(b) Yes/No
 This is a logical data type for an entry that is yes or no, true or false. For example a field may
require you to answer whether you are a male or female
Award 2 marks each max 4
(iii) Describe the types of relationships depicted by the diagram below
(a)

8
 One –to – one relationship – this indicates that one record in the people’s table corresponds to
only bone record in the drivers licenses table
(b)

 One – to – many relationship – it indicates that one record in the city’s table corresponds to
many records in the customers table.
Award 2marks each max 4
(iv) The table below is an extract from a database table use it to answer the questions that follows
Product Code Product Name Date of Birth Unit cost Quantity Total
01001101 Maize 02/03/2002 2000 10 20000
01223030 Millet 12/12/2002 1000 20 20000
10239345 Wallet 03/09/2005 100 10 1000
19019001 Sweet 09/09/2006 1000 5 5000

(a) Write an input mask that will display the product names as represented in the table
 >L<??????????????
Award 2 marks max 2

(b) Set a validation rule in the date of Birth column to


Restrict entries of future dates

 <=Date() – The date must be today or earlier date but cannot allow future date
Accept year of Birth between 2002 and 2006
 >=#01/01/2002# AND <#31/12/2006#
Award 1 mark each max
20.
(a) Explain the following terms as used in Data security
(i) Exploits
 An exploit is a program, or piece of code, designed to find and take advantage of a security flaw
or vulnerability in an application or computer system, typically for malicious purposes such as
installing malware.
(ii) Intellectual property right
 Intellectual property rights are the rights given to persons over the creations of their minds.
They usually give the creator an exclusive right over the use of his/her creation for a certain
period of time.
Award 2 marks each max 4
(b) State five measure against theft that school managers need to impose to safeguard their
computer laboratories
 Employ security personnel
 Reinforce weak access points like windows and doors using grilled doors

9
 Insure the hardware resource
 Motivate workers
 Install alarm systems
 Install cctv camera
 Use Biometric system to access computer room
 Use door that are opened using swipe cards
Award 1 mark each max 5

(c) Give three reasons for the adoption of e-commerce platform by most businesses
 No reach limitation
 Product and price comparison
 Flexibility for customers
 Affordable advertising and marketing
 Cost reduction
Award 1 mark each max 3

(d) Mention three factors to consider when choosing an ISP


 Cost
 Speed
 Connection Reliability
 Customer support
 Type of connection
Award 1 mark each max 3

10

You might also like