Githiga High School: Computer Studies PAPER 1 2024 Trial 2 Marking Scheme
Githiga High School: Computer Studies PAPER 1 2024 Trial 2 Marking Scheme
PAPER 1 2024
TRIAL 2 https://tapeducationcons.co.ke
MARKING SCHEME
ol
(Input) (Processing) (Output)
ho
2. Charles Babbage is regarded as the father of modern computing, yet he never fully implemented
his idea. Explain his contribution. (2 marks)
Charles Babbage designed a machine that could calculate a long series of numbers and print the
Sc
outcome. He later improves the design by incorporating the idea of programming using
punched cards (from of programmed instructions) but did not construct it. This idea was later
used in developing the first programmable computer.
h
- Computers are being used to monitor and control industrial processes. The computer age
has seen the wide use of controlled devices called robots.
ig
details helps the law enforcers to carry out criminal investigations speedily.
4. Highlight four measures you would put in place to protect computer users from unhealthy
G
8. Kariuki, a computer vendor in Nakuru County, was sent by his boss to deposit a cheque worth
Ksh 12,000. The cheque was passed through a device similar to the one shown in Fig. 2.1
alongside.
Fig. 2.1
ol
ho
Sc
h
ig
(b) Explain why the cheque was passed through the device. (2 marks)
ig
The cheque reader is used to read characters written using magnetic ink that contain
important banking information such as the cheque number and the code of the issuing
ith
bank.
G
Logic operations are based on the computer’s capacity to compare two or more values. For
example, it may compare whether a piece of data is greater than, less than, equal to or not equal
to another.
10. Fig. 2.4 shows electronic pathways on a section of a motherboard. Study the illustration and
answer the questions that follow.
ol
ho
Sc
This is the pathway for timing and controlling functions sent by the control unit
to other parts of the system.
a
Address bus:
ig
This is the pathway used to locate the storage position in a memory where the
data to be processed next is found.
ith
Data bus:
This is the pathway where the actual data transfer takes place.
11. Using an illustration, describe how data and instructions flow between the CPU and other
G
He should consider replacing the monitor with a better CRT or a flat panel display.
ol
A blog (short for weblog) is a personal online journal that is frequently updated
ho
and intended for general public consumption.
Sc
(b)
H
16. (a) (i) Name six steps in program development cycle in their
Problemdefinition
Feasibility study
System design
Programming
System
implementation
and h/w
configuration
Operation and
maintenance
- Pascal - Java
ol
ho
(Any programming language that uses English like syntax)
(c) Study the program below and design its equivalent flowchart (8 marks)
G
START
Readln (Name)
If (average > =50) then Comment: = ‘well done’ Else
Comment: = ‘Repeat’,
End.
ol
ho
Sc
h
ig
H
a
(a) State any two negative effects of introducing robots in a manufacturing plant
ig
17.
(2 marks)
ith
Wide use of robots probably increases the unemployment rate. With the
enrollment of robots and improvement of working efficiency, factories need not
so many labors that many people are fired.
G
(vii) Computer greatly improves the speed of data input, output, processing,
and transmission.
(c) Name three types of special purpose memories used in a computer (3 marks)
Buffers
Registers
Cache memory
ol
(d) Explain the purpose of the system clock (2 marks)
ho
Ensure the correct synchronization of the fetch and execute cycle
Sc
(e) (i) In word processing, differentiate between text wrap and word wrap
(2 marks)
Text wrap is the process of fitting text around an image with a narrow
h
margin. Depending on the size and placement of the image, the text may
ig
Word wrap- As text approaches the end of a line (the margin), if a word
won't fit it wraps or continues at the beginning of the following line.
a
ig
ith
(iii) List any three types of section breaks used in word. (3 marks)
Next page
G
continuous
Even page
Odd page
He noted that the notebook PCs that appeared to be physically similar had price
differences some up to Ksh 120,000.
(i) Explain two types of processors from the programmer’s point of view.
(4 marks)
Complex Instruction Set Computers (CISC)
CISC is made up of complex instructions micro-coded into the processor. This
design was popularised by Intel Corporation and is widely used on Pentium
processors.
Reduced Instruction Set Computers (RISC)
RISC uses a few instruction sets than CISC; hence it is less costly. Motorola and
Sun Microsystems companies have been the main manufacturers of RISC
processors.
(ii) Explain why the processor specifications contribute to difference in process.
(2 marks)
Computer prices depend on the type of processor (manufacturer), speed and the
amount of cache installed into the microprocessor.
(iii) List two other processor manufacturers other than Intel. (2 marks)
Other processor manufacturers are Advanced Micro Devices (AMD) and Cyrix.
(iv) Differentiate between Core i3 and quad core processors in terms of internal
architecture.
ol (2 marks)
A core i3 processor contains eight processors or cores in a single silicon chip,
ho
while a quad core processor has four processors or cores on a single chip.
buffer
registers
cache
h
(c) Explain how the CPU registers may be used to carry out a basic calculation
ig
- The data 10 and 14 are fetched from memory (RAM) and placed in
the Data register (DR) via the memory Buffer Register and the Address
register.
a
ig
Table 3.1
(a) Assuming the Computer Studies folder is in drive E; draw the corresponding tree
diagram for Form 1 folder and its subfolders.
ol (5 marks)
ho
E: ⧵>
Sc
Computer Studies
h
ig
Form 4
H
a
ig
(b) The head of department wants to create a subfolder named Projects within the Form 4
folder. Outline the steps she would follow to create the subfolder. (5 marks)
(i) Select the drive D: where the subfolder is located.
(ii) Within drive D:, select the Computer Studies folder.
(iii) Within the Computer Studies folder, select Form 4.
(iv) In the Form 4 folder, click the File menu, point to New then click Folder.
(d) Outline how you would delete a file CAT 1 that was later created in the Networking
subfolder within the Form 4 folder. (3 marks)
(i) Select drive D:.
(ii) Within drive D:, select Computer Studies folder.
(iii) Within Computer Studies folder, select Form 4 folder then select the Networking
folder.
(iv) In the Networking folder, right click the file CAT 1, then click delete.
20. (a) Write the following abbreviations in full. (3 marks)
(b) Distinguishing between binary and octal number systems and give an
example of each (2 marks)
ol
(c) Write – 2 in twos compliment notation in byte fom (4 marks)
ho
2 = 00000010
(d) (i) Explain the term nibbles as used in data representation in computers
(2 marks)
H
(ii) Arrange the following data units in ascending order of size (2 marks)
FE16