0% found this document useful (0 votes)
275 views9 pages

Computer Studies - Computer Studies Form 2 - Zeraki Achievers 5.0 - Marking Scheme

Uploaded by

kipepeosafespace
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views9 pages

Computer Studies - Computer Studies Form 2 - Zeraki Achievers 5.0 - Marking Scheme

Uploaded by

kipepeosafespace
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

[Type here]

ZERAKI ACHIEVERS’ EXAMINATIONS


Term 3 - 2022
COMPUTER STUDIES (MARKING SCHEME)
FORM TWO (2)
TIME: 2½ HOURS

Name: …………………………………………………………. Adm No: ……………….


School: ……………………………………………………….. Class: …………………..
Signature: …………………………………………………….. Date: …………………...

INSTRUCTIONS TO CANDIDATES

Write your name and index number in the spaces provided above.
Sign and write the name of examination in the spaces provided above.
This paper consists of TWO sections; A and B.
Answer ALL the questions in section A. and B
All answers should be written in the spaces provided on the question paper.

For official Use Only


Section Question Candidates Score
A 1-15

16

17
B 18

19

TOTAL 100

Page 1 of 9
[Type here]

This paper consists of 9 printed pages


Section A (40 marks) Answer ALL the Questions in this Section.
1. State the meaning of the term computer software. (2marks)
Set of instructions that guide the computer on what to do and how to do
it.
2. State three features of fifth generation computers (3marks)
Large memory capacity
Large storage capacity
High processing speed
Easily portable/small in size
Artificial intelligence
3. Differentiate between home page and web page as used in the internet (2marks)
Home is the first page displayed when one opens a particular internet site
while web page is other parts of the website displayed
4. State three characteristics of mainframe computers (3marks)
Are smaller compared to super computers
Small storage compared to super computers
Small memory compared to super computers
Low processing speed compared to super computers
Generate less heat compared to super computers
5. The management of an organization intends to purchase a printer. State three
factors that they should consider during purchase. (3marks)
Volume of print out
Quality of the printer
Speed of the printer
Cost of the printer
Availability in the market
Technology ie coloured or not

Page 2 of 9
[Type here]

6. Describe each of the following computer cables:


i.) Parallel cables; (2 marks)
Transmit data simultaneously
Faster in speed
ii.) Serial cables; (2 marks)
Transmit data one bit at a time
Relatively slower compared to parallel
7. A computer technician has observed a lot of dust on the computers in computer
laboratory. State three precautions that need to be put in place to avoid this.
Mop the lab regularly
Have door mat at the door
Place curtains in the room windows
Cover the computer with dust covers (3marks)
8. Explain the term proofreading as used in word processing. (2marks)
The process of going through the document to ensure its free of
typographical or spelling errors.
9. State the function of each of the following computer keyboard keys when using a
word processor:
i.) End (1mark)
Moves courser to the end of current line
ii.) Insert (1mark)
Allows one change between insert mode and type over mode
iii.) Backspace (1mark)
Deletes character to the left of the courser
10. Explain two problems associated with the computer hard disk. (4marks)
Attack by virus
Crash
Fragile

Page 3 of 9
[Type here]

11. State the spreadsheet function that can be used to obtain each of the following
values in a worksheet:
i.) Number of cells with values in a column. (1mark)
Count
ii.) Mean of values in a range of cells. (1mark)
Average
12. A school intends to install internet communication service in school. State any
three advantages of this service to the students. (3marks)
Sharing of resources
Communication
Research
E learning
E commerce
E business
13. State two ways in which one can create a password which cannot be easily
accessed by hackers. ( 2marks)
Having combination of letters
Making it long enough
Making it not easy to guess
14. State two ways through which a computer user can minimize Repetitive Strain
Injuries (RSI) associated with the use of a computer. (2marks)
Having antiglare screens
Having standard furniture
Avoid staying in the computers for long
Avoiding bright paints in the lab
15. Identify four tasks that can be achieved using a Desktop Publishing program
from the following list of tasks. (2 marks)
i.) Managing students records in school
ii.) Creation a calendar
iii.) Designing a building structure

Page 4 of 9
[Type here]

iv.) Creating a banner


v.) Creating a book cover
vi.) Processing of examination results
vii.) Creating business cards.
Creation of calendar
Creating banner
Creating book cover
Creating business cards

SECTION B. ( 60 marks)
Answer ALL the Questions in this Section
16. a) Give any three differences between label and value. (3mks)
Labels cannot be manipulated mathematically while values can be
manipulated mathematically
Labels are aligned to the left of the cell while values are aligned to the right
of the cell
Labels are alphanumeric characters while values are numeric characters.

b) Use the table below to answer questions that follows use relative cell
reference where applicable
A B C D E F G H
NAM GENDE BASIC ALLOWANC GROSSPA TA NET RAN
1 E R PAY E Y X PAY K
2 KEN M 56000
3 ANN F 54000
4 JOY F 52000
5 FRED M 50000
6 SAM M 48000
7
8 0.2 0.15
9
Given that:
The male get 20% of the basic salary allowance while the female get 25% of
basic salary allowance

Page 5 of 9
[Type here]

Gross pay = Basic salary + Allowance


Every employee is taxed 15% of the Grosspay
Net pay = Grosspay – tax
Write the formula to calculate:
i) Ken’s Allowance= $B$8 * C2 (2mks)
ii) Ann’s Gross pay = C3+D3 (1mk)
iii) Joy’s Tax = $C$8 * E4 (2mks)
iv) Fred net pay = E5 – F5 (1mk)
v) Sam’s Rank to see if the highest Net pay
=RANK(G6,$G$2:$G$6)(2mks)
c) Explain the following database components. (3mks)
i) Worksheet: Combination of rows and columns where data entry is
done.
ii) Database: Used to manage data and records of the database
iii) Graph: Used to carry out data comparisons and analysis
d) What is a cell: Intersection of rows and columns. (1mk)
17. a) What is a database? (1mk)
Is a collection of related data items organized so as to provide consistent and
controlled access to data items
b) Give any three advantages of electronic database. (3mks)
Allows one to add records
Allows one to delete records
Allows easy access of data
Acts as interface between database and other application programs
Ensure security of data items
Keep statistics of data
c) Differentiate between. (6mks)
i.) Default value and caption
Default value is a text that automatically appear in the datasheet if no
value is entered. While caption is more descriptive name for a field to
be used in a table.
Page 6 of 9
[Type here]

ii.) Validation rule and validation text


Validation rule is a logical expression that restricts illegal entry while
validation text is a message that appear while validation rule is
violated
iii.) Indexed and primary key.
Indexed facilitated organization of records while is a field that
uniquely identifies a record in a database
d) What is a control as used in database? (1mk)
Are objects placed on a form that are manipulated by an action
e) Explain the function of forms in database. (1mk)
Enable view and entry of data
f) State any three examples of action query. (3mks)
Update
Append
Make table
Delete _
18. Copyright laws are laws granting authors the exclusive privilege to produce,
distribute, perform or display their creative works. It is a legal framework for
protecting the works such as book publishing, motion-picture production and
recording. State two challenges that are posed to these laws by ICT (2 marks)
Piracy
Alteration
Eavesdropping
Industrial espionage
b) Explain how data in a computer system is secured using: (4 marks)
(i)
Password
Deters unauthorized persons from accessing the date_
(ii) User access level
Ensures data is accessed in hierarchically order_

Page 7 of 9
[Type here]

c) State three ways of preventing data from theft. (3marks)


Deter unauthorized physical access
Password
Biometrics
Insure hardware and software
Backup data
d) State two characteristics of a computer that is infected by computer viruses
Taking too long to boot up
Loss of files (2marks)
e) State two measures that can be put in place to control piracy of software
Enforce laws that protect owner data
Make software and digital content is cheap
Use license and certificate of identity
Set admin passwords that deter illistalation (2marks)
f) Pesa Mingi Company has offices in Nairobi and Kampala connected to a network.
The management is convinced that someone is illegally gaining access to the data in
their computers. State Two ways in which the company can overcome this problem.
(2marks)
Data encryption
Password
User level rights.
19. a What is word processor software? (1mk)
Application program that enables to create, edit, save and print word
document
b) Give any three paragraph formatting feature used in MS. Word. (3mks)
Drop cap
Alignment
Indentation
Setting tabs
Bullets and numbering

Page 8 of 9
[Type here]

c) State the meaning of the following short cut commands as used in word processor.
(4mks)
a. Ctrl + C: Copy
b. Ctrl + V: Paste
c. Ctrl + F: Find
d. Ctrl + S: Save
d) State any two examples of drop caps that can be used in text formatting. (2mks)
Dropped
In margin
e) Study the text below and answer questions that follow

WHAT IS A METHODOLOGY?
The term methodology is not well defined either in Literature or by practitioners. There
is very little agreement as to what it means other than at a general level. The term is
usually used very loosely and yet it is used very extensively.
This loose use does not mean that there are no definitions, simply that there are
no universally agreed definitions. At The General Level, It Is Regarded as a
recommended series of steps and procedures to be followed in the course and
developing an information system. In a brief a d h o c survey, this proves to
be about the maximum that people will agree to and of course such a definition raises
many more questions than it answers.

Identify any four formatting features used in the above paragraph. (4mks)
Bold
Underline
Character spacing
Line spacing
Upper case
alignment
d) What is a word wrap? (1mk)
Is where the text automatically moves to the next page

Page 9 of 9

You might also like