0% found this document useful (0 votes)
3 views14 pages

Githiga High School: Answer All Questions in This Section in The Spaces Provided

The document is a marking scheme for a Computer Studies Trial Paper 1 for 2024, outlining various sections and questions related to computer memory, artificial intelligence, desktop publishing, operating systems, ICT in agriculture, and network management. It includes definitions, advantages, disadvantages, and application areas of different computer concepts, as well as practical tasks like flowchart interpretation and binary arithmetic. The document serves as a guide for assessing students' understanding of computer studies topics.

Uploaded by

Evans Mwaura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views14 pages

Githiga High School: Answer All Questions in This Section in The Spaces Provided

The document is a marking scheme for a Computer Studies Trial Paper 1 for 2024, outlining various sections and questions related to computer memory, artificial intelligence, desktop publishing, operating systems, ICT in agriculture, and network management. It includes definitions, advantages, disadvantages, and application areas of different computer concepts, as well as practical tasks like flowchart interpretation and binary arithmetic. The document serves as a guide for assessing students' understanding of computer studies topics.

Uploaded by

Evans Mwaura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

COMPUTER STUDIES

PAPER 1 2024

TRIAL 4

MARKING SCHEME

SECTION A (40 marks)


Answer all questions in this section in the spaces provided

1. Name two functions of each of the following memories in a computer system


(2 marks)
(a) RAM
-RAM - hold data that is urgently needed by the processor
- Short term storage/ temporary storage for holding data instruction
during processing
(b) Hard disk

ol
Hard disk - used to store large volumes of data that is not urgently
ho
required by the processor.
Also for back up of os and data
Sc

2. List two application areas of artificial intelligence ( 2 marks)


 Application areas of artificial intelligence
- Expert system
h

- Natural language processing


ig

- Robotics
- Artificial neural networks
H

3. Explain briefly the following terms as used in desktop publishing (3 marks)


(a) Embedded object
a

a separate image/ graphic/ clip that is placed into a file e.g. movie clip
ig

pasted into DTP document


ith

would be considered as an embedded object


G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


(b) Auto flow
Auto flow: Facility that allows text to flow automatically from one textbox
to the next when the first text box is full
(c) Zoom
Zoom - changing the magnification of publication page either to get a
closer view (zoom in) or to see more of the page at a reduced size (zoom
out).
4. Give four ways of identifying an illegal copy of an operating system (4 marks)
- No license agreement as certificate of authenticity
- Prices that are extremely cheap
- No documentation manual
- When one connects to the internet for authentication, the report from the
manufacturer indicates that the user may be a victim of software counterfeit.
5. State three ways in which horticultural farmers can benefit from the use of
information and communication technology (3 marks)
- Source of information for the best farming practices

ol
- Searching tool for best market for their produce
- Marketing tool
ho
- ICT can also be used by farmers to manage complex business systems
6. Define the following terms (2 marks)
(a) Password
Sc

Password – Is a code that must be keyed in so as to access a file or a


system
h

Authentication – is the process of verifying a log on credentials of a user


ig

requesting access to a computer system or a resource.


(b) Authentication
H

Authentication – is the process of verifying a log on credentials of a user


a

requesting access to a computer system or a resource.


ig

7. Outline three roles of an internet service provider(ISP) (3 marks)


- Link user to the internet
ith

- Host websites
- Provide customized email addresses
G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


- Manage internet traffic
- Provide firewalls
8. State two roles of
(a) Webmaster (2 marks)
o Design, develop and test websites
- Maintain the websites
- Upload information into the website
- Monitor or control access to the website

(b) Network administrator (2 marks)


o Configure a computer network
o Maintain and enforce network security measures
o Check the user of computer network resources
o Troubleshoot a network
9. List three advantages of using computer aided design (3 marks)
 Easy simulation and testing of models
 Duplicates of design are easy to produce

ol
 Easier to make changes or update the original design
 The length of time taken to draw design is reduced/ faster
ho
10. List two files used in mail merging (2 marks)
 Primary file/ main document
Sc

 Secondary file/ data source


 Merged file / letter
11. State any three disadvantages of using the magnetic tape (3 marks)
h

 Wastage of space due to inter record gap (IRG)


ig

 Tapes are susceptible (prone) to dust, stroke and magnetic fields which
distort data on the tape
H

 Tapes have short life span (average of about 2 years)


 Data stored on a tape must be read/ accessed sequentially
a

 Data stored on magnetic tape ( and - disk) is not human readable e.g. if you
ig

wish to verify the accuracy of data stored on tape, a computer run would
ith

have to be made, in order to read the content on the tape and print it.
G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


12. With reference to cables list two reasons why a keyboard may not function
correctly (2 marks)
o Reasons why keyboard may not function correctly in reference to cabling
o Keyboard might not be connected through the right port
o Keyboard might not be connected at all to the port
o Pin(s) in the keyboard could be bent or broken
o There could be breakage of the cable
13. Kenya has been facing a lot of problems from insurgents of Alshabab terror
group in Somalia. Give three ways in which robots could be used by Amison
during war in Somalia. ( 3 marks)
 Ways in which robots can be used in the army
 Detect bombs set up by the enemy and then detonate them
 Spy on the activities of the enemy
 Clear land mines any disarm bombs
 Confuse the enemy by deploying decoys
 Retrieve items from dangerous war zones
14. The formula = $Z49 + G$19 was typed in cell K31 and was copied to cell P17 of a

ol
spreadsheet. Write the formula in the destination cell (1 mark)
ho
– H20 + P$18
15. (a) Simulation is one of the application areas of computers.Define the term
Sc

simulation (1 mark)
Stimulation – is the modeling /imitating/mimicking/demonstrating real world
situations.
h

(b) Name two application areas of simulation (2 marks)


ig

Application areas of simulation


 Aviation
H

 Lab forecasting
 Missile launch
a

 Entertainment games
ig

 Space exploration
 Vehicle accidents
ith

 Medical training
G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


SECTION B (60 marks)

Answer question 16 and any other three questions in this section

16. Study this flowchart and use it to answer questions that follows

ol
ho
Sc
h
ig
H
a
ig
ith
G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


(a) Give the expected output from the flowchart when the value of Y is

(6 marks)

(i) 48
=1
(ii) 9170
=3
(iii) 800
=1
(b) Write the pseudocode that can be used to create a program represented
by the above flowchart (6 marks)
pseudocode
Start
S=1 start / stop – 1mk
Read Y initialization – 1mk

ol
Repeat input/ output – 1mk
Y-Y/10 looping – 1mk
ho
If Y <10 Then if statement -1mk
S=S+1 logical sequence – 1mk
End if
Sc

Until Y<10
Print S
Stop
h
ig

(c) State three advantages of low-level languages (3 marks)


 Advantages of low - level languages
H

 The CPU can easily understand low - level languages without or


with little translation
a

 The program instructions can be executed by the processor much


ig

faster as complex instructions are already broken down into


smaller simpler ones
ith

 They have a closes control over the hardware, are highly efficient
and allow direct control of each operation
G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


 They require less memory space
 They are stable i.e. do not crash once written
 Not commonly used, hence can be used to code secret programs
17. (a) Use twos complement to perform the following arithmetic operations
(i) 1510 - 1210 (4 marks)
1510
= 11112
1210=10112 √1 mk

Ones complement of = 11002 = 00112 √(1mk)


Therefore:
11112
+ 10112 √(mk)
Overflow bit (1) 10112
1011 +
+ 1 (overflow bit)
= 11002 √ 1mk
(ii) 101112-10112 (3 marks)

101112 - 10112
ol
ho
Ones complement of 010112 = 101002√ 1mk
Sc

Therefore

101112
h
ig

10100
H

(1)01011 √1mk

Add the overflow bit


a
ig

010112 + 12 =011002 √1mk


ith
G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


(b) 10112 is a ones complement binary representation of a negative number
using four bits work out the likely positive equivalent in base 10.
(4 marks)

Binary positive is 00102 √2mks

Convert to base 10 √1mk

= + 210 √1mk

(c) Convert the decimal fraction 10.37510 into its binary equivalent (4 marks)

Whole numbers

10/2 =5 R 0

5/2 =2 R 1 read upward. √1 mk

2/2 =1 R 0

½ =0 R 1
ol
ho
Fractional part
Sc

0.375x 2 = 0.75

.75 x 2 = 1.50 read the whole number downwards √1mk


h
ig

.5 x 2 = 1.00
H

= 0.0112

Combine the two


a
ig

= 10102 + 0.0112 √1mk


ith

= 1010.0112 √1mk
G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


(d) Assuming the existence of base five, list all the digits used in the number
system (1 mark)
Base five numbers

0, 1, 2, 3, 4 √1mk

18. (a) A company in Nyeri town wishes to link its offices that are spread across
the county through wireless or fibre optic network media.
(i) State three advantages of using wireless over fibre optic network
media (3 marks)
Advantages of wireless over Fibre optic
- No cumbersome cabling needed between sites
- Do not require access rights on the land between the buildings
- Wireless support un-directed signals therefore allowing more
recipients
- Allows remote access to the network to the network signals
- Less risks of vandalism

ol
(ii) Name two wireless communication devices (2 marks)
 access points
ho
 Wireless antenna
 Personal computer memory card international association card
Sc

(b) (i) Differentiate between Ethernet and token ring topology


(2 marks)
h

In Ethernet topology , all computer listen to the network media and a


ig

particular computer can only send data when none of the others is
H

sending while in token ring (topology the data to be transmitted is placed


in a special packet which then goes around the network. Only the
a

computer whose address is on the data held in the token will pick the
ig

token to read it.


ith
G

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


(ii) List two advantages and two disadvantages of hierarchical
network topology (4 marks)
Advantages
- Provide centralized control
- Easy to add and remove notes
- Easy to isolate faults
- If a non- critical node falls, the network is not affected since
partial communication is still possible
- It is possible to give control in the network to the DTE’s other than
server
- Enhances data security and privacy
Disadvantages
- If the parent node fails, the network fails because it controls all
other computers in the network
- If the linear backbone fails, the network fails
- Installation is expensive
- Data moves slowly along the branches
- It is difficult or complex to implement in a wide area network
(c)
ol
State two importance of the Front-End Processors (FEP) in a network
ho
system (2 marks)

 They link terminals to the central/ host computers


Sc

 They are used to control the communication information between the


various work stations and the host computer
 They handle input and output activities from various terminals
 They relieve the main processor from excess storage and processing
h

by handling some of the limited processing activities


ig

(d) Describe peer to peer networking (2 marks)


This is a network situation where all the connected computers are equal
H

and each work station in the network acts both as the client to resources
hosted by other computers and a server to the resources it hosts.
a
ig

19. (a) Give two reasons for storing files in directories and sub directories
ith

(2 marks)
 Classification of related files will be easier
 - Retrieving central files will be easier
G

10

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


(b) Explain time sharing data processing mode giving two advantages and
two disadvantages of its application (6 marks)
Time sharing mode is where the central processor serves two or more
users with different processing requirement
Advantages
 Better services to user since the output is fast
 User interaction is possible through terminals
Disadvantages
 The user has no control over the central computer
 The response time is slow where there are many tasks
(c) List four importance of training the staff or users after the
implementation of a new system (4 marks)

 To remove the fear of change from them


 To convince the staff of the user department on the effectiveness and
efficiency of the new system

ol
To enable the staff run the system or to show users how the system
can help them perform their job better
ho
 To enable the staff to cope with the processing tasks of the new
system
Sc

(d) List three contents of a feasibility study report ( 3 marks)


Contents of feasibility study report
h

 Recommendations on whether to continue or abandon the project


 Methods used to collect data
ig

 Benefits and limitations expected (whether cost effective)


 Technology required to develop and maintain the project
H

 Installation and running cost


a
ig
ith
G

11

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


20. The information below is maintained by the patron of ICT club. Study it and
answer the questions that follow.
Name Form Admission Membership Group
number number
Grace 4K 2720 S001 Lion
Memo 3G 2812 T001 Zebra
Faith 2K 2929 T003 Zebra
Tabitha 4G 2712 M001 Warthog
Marion 3R 2820 A001 Warthog
Chemutai 2G 2915 S002 Lion
Albina 2R 2926 N001 Elephant
Jane 4R 2946 AB001 Elephant
Janet 3K 2805 T002 Zebra
Rita 1R 3229 N002 Elephant
Elvis 1G 3213 M002 Warthog

(a) Explain the terms fields, records and file (3 marks)


 Field values are the values assigned to the attributes i.e. actual

ol
names classes,
 The field value for each student constitutes a record
ho
 The collection of all student records is the file.
(b) State the most appropriate data type for the fields
Sc

(a) Admission number (1 mark)


Admission number - Text
h

(b) Membership number (1 mark)


ig

Membership number - Text


H

(c) Name the most appropriate primary key for the database (1 mark)
Membership number
a
ig
ith
G

12

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


(d) If a database was to be created from the list; the following objects: forms,
Tables, queries and reports are likely to be used
(i) State the purpose of each of the objects (4 marks)

Table

 – for storing data


Form
 – data entry, editing and viewing the records
Query
 – extracting data based on some criteria, performing
calculations

Reports

 – creating summaries for data, performing calculations

(ii) Name the objects that cannot be used to store date in the list

ol (3 marks)
ho
 - Forms
 - Queries
Sc

 - Reports
(iii) Give the number of field values that are in the list (1 mark)
55 (correct = 1mk)
h

(iv) Give the number of records that are in the list (1 mark)
ig

11 (correct = 1mk)
H
a
ig
ith
G

13

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD


ol
ho
Sc
h
ig
H
a
ig
ith

THIS IS THE LAST PRINTED .


G

14

©2024 TRIAL 4 COMPUTER PP1 TAP EDUCATION CONSULTANCY LTD

You might also like