COMP 101: Database Administration
COMP 101: Database Administration
COMPUTER STUDIES
PAPER 1 (THEORY)
TIME 2 ½ HOURS.
MARKING SCHEME
SECTION A
3. Wanja operates a bookshop in a town. Lately he is finding the task of managing daily transactions
manually overwhelming.
i. Identify the type of management information system that Wanja should acquire (2 marks)
5. Before the end of every month an electricity service provider sends out field officers to take
consumer meter readings. The data collected by the officers is then keyed into the computer. The system
then generates utility bills which are printed and sent to the consumers.
i. State two transcription errors that are likely to occur during meter reading or input (2 marks)
Transposition
Misreading
6. State three editing tools that are available in most standard word processing software (3 marks)
Do and redo
Spelling and grammar checker
Thesaurus
Insert mode
Type over mode
Filter if a formatting tool that extract part of the record from the table while query is a
database object used to extract information from the database
12. The payroll system is both a financial system and a human resources system. Explain this statement.
(2marks)
It is used to perform finance calculations and what if analysis and also used to update and
provide financial records for the workers
13. Explain the importance of the following spreadsheet operations.
a) Freezing columns (1mark)
It enable the use to view only required records at atime
b) Data validation (1 mark)
Ensures the records are valid as per the user need
14. List two ways in which computer technology can be used in law enforcement (1 marks)
Surveillance, crime detection and prevention
Scene monitoring by the police
Page 3 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme
Storage of biometric information for investigation of crimes
15. In reference to aviation technology, state two advantages of using simulation in training pilots
(2mks)
Safety
Less costly
b). A programmer uses program design tools to design a program that can list the odd numbers between
ii). Draw a flow chart for the pseudo code in 16 b) (i) above. (6mks)
Start
Odd = 1
Write odd
YES
Odd = odd + 2
Is Odd
99 ?
b) A system flow chart describes the describe the flow of data through a -
integer, flow of data through a complete particular computer program in a Real, Char,
String, data-processing system data processing system Boolean
Describe the relationship Describe the sequence of logical
between inputs, processing, and operations performed in a
(a) outputs for a system. computer program. (i)State
one difference
between system and program flowchart. (2 marks)
Figure 1 Flowchart2
@ ½ mark each. Each name must be associated with the appropriate symbol.
(2 ½ marks)
17. (a) Define the term network topology . Network topology can be viewed in two ways .
Name and Explain the two ways. (5mks)
Network topology:
- Refers to the way computers and other devices have been arranged on a network
or how data passes from one computer to another on a network.
(iii) Explain two factors you would consider before enrolling for an ICT course in a
college. (2mks)
- Cost.
- Job opportunities.
- Where the examinations offered are recognized.
- The organization offering the course.
(d) Differentiate the function SUM and SUMIF as used in spreadsheet. 2mks
-SUM :- Adds values in a range of cells and returns the results
- SUMIF :- Adds values in a range of cells that meets the specified condition and returns the
results.
(e) State two advantages of using fiber optic cables. (2mks)
(i) Noise resistance: It is immune to EMI.
(ii) Less signal attenuation: signal can run for miles without requiring regeneration.
(i) Higher bandwidth: fibre optic cable can support dramatically higher bandwidths (and
hence data rate) than all other cables.
(ii) Smaller and lighter than copper cable hence space limited situations.
(iii) Can be used in hazardous (highly flammable) places because they do not
generate electrical signals.
(iv). Very fast (in light form)
5. In system development, testing is one of the critical stages. Give three reasons why the testing
phase is critical to the systems developer. [3 marks]
Helps to ensure that the logical ad physical designs and environment are to the users satisfaction
Help to detect and correct errors
Gives proof to those skeptical about the working of the system
18. A systems analyst has been asked by a doctor to computerize the records she keeps about her
patients. He must first of all collect information about the existing system.
a). Describe four methods he could use to collect this information. 4mks
Any four from:
Observation
Questionnaires
Interviews
Collecting documents/document review
@ ½ mark each (2 marks)
(b) Once the whole system has been designed it will need to be implemented.
(i) Describe two methods of implementation that could be used. 2mks
( 2 marks)
(c) After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated.
Any two from: ( 2mks)
(d) State one difference between system flowchart and program flowchart. (2 marks)
Figure 2
ii). Name all the flowchart symbols used in this flowchart (e) figure 2 above.
@ ½ mark each. Each name must be associated with the appropriate symbol.
(2 ½ marks)
19. (a) Describe each of the following data processing methods and give an example of
where used. (6mks)
(i) Online processing – Data is processed immediately it is received e.g.
internet banking, online payment system using credit card.
(ii) Batch processing – Data is accumulated as a group then it is processed as one/ a
group. Eg in payroll system
(iii) Real-time – Computer processes the incoming data as soon as it occurs,
up to dates the transactions file and gives an immediate response, that
would affect the events as they happen e.g. making reservations for
airlines seats, hotels etc.
(b) Make a clear difference between:- (6mks)
(i) Logical file and physical file – Viewed in terms of what data items it contain
and details of what processing operations may be performed on the data
items. Physical files is one that is viewed in terms of how data is stored on a
storage
media and hoe the processing operations are made possible.
ii). Master file and back-up file – Master file is the main file that contains
relatively permanent records about particular items or entries. Back-up file
is used to
hold copies of data or information from the fixed storage (hard disk)
(iii) Random and indexed sequential file organization methods.
Page 11 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking
Scheme
Random – Also direct file organization records are stored randomly but
accessed directly on a storage medium. Indexed sequential records are stored
and accessed in a particular order using an index used to enable the computer
to locate individual records on storage media.
(c) An organization is facing threats to data integrity. Explain three of how the threats can
be minimized.
(3mks)
- Backup data preferably on external storage media.
- Control access to data by enforcing security measures.
- Design user interface that minimize unauthorized access.
- Using error detection and correction software when transmitting data.
- Use devices that directly capture data from the source such as bar code readers.
- Digital cameras, optical CR.
20. (a) Give one reason why data and information in a computer system needs to be converted
to other number systems other than binary.
(1mks)
- Higher number systems are used in computing to reduce the streams of binary into
manageable form.
- Help to improve the processing speed.
- Optimize memory usage.
(c) ii). Using twos complement, workout : 1510 - 810 in binary form. (4mks)
= 15+(-8)
Convert 810 to its binary equivalent then write its two’s complement
Page 12 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking
Scheme
15 = 11111 ,
To 8 bit =00011111
8= 1000
To 8bit = 00001000
11110111 BitwiseNOT of 8 =1’C
2’C = 11110111+1 = 11111000
00001111
+ 11111000
( 1) 00000111
Overflow is ignored = 000001112
And in binary form the difference Is a positive number (000001112 (710)
i) Twos complement is the most popular way of representing negative numbers in computer
Systems. Give an advantage of using this method.
- There are no two ways of representing a zero as in the case with the other two methods
- Effective addition and subtraction can be done even with numbers that are represented
with a sign bit without a need for extra circuitries to examine the sign of an operand.
79610 = 0111100101102
0.375x2 = 0.75
0.75x2 = 1.50
0.50x2 = 1.00
Decimal portion
0.10112
1110.10112