0% found this document useful (0 votes)
45 views14 pages

COMP 101: Database Administration

Uploaded by

Tion
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views14 pages

COMP 101: Database Administration

Uploaded by

Tion
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

451/1

COMPUTER STUDIES
PAPER 1 (THEORY)
TIME 2 ½ HOURS.

MARKING SCHEME

SECTION A

1. Define the following terms as used in word processing. (3 marks)


a) word wrap
 it is a formatting feature which makes the text to move to the next line automatically
b) Justification
 It is an alignment feature where both left and right are aligned
c) Drop cap
…………..……………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………………
……..
2. State three advantages of using computers in performing day to day’s tasks. (3marks)
 It has high speed of processing tasks
 It is flexible
 Has high storage space

3. Wanja operates a bookshop in a town. Lately he is finding the task of managing daily transactions
manually overwhelming.
i. Identify the type of management information system that Wanja should acquire (2 marks)

Page 1 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme


electronic
ii. State two benefits that Wanja will gain from using such a system (2 marks)
 High storage
 High processing speed
 Efficiency
4. State three hardware considerations that need made before installing an operating system
(3marks)
 Compatibility
 Availability
 User need
 User friendliness

5. Before the end of every month an electricity service provider sends out field officers to take
consumer meter readings. The data collected by the officers is then keyed into the computer. The system
then generates utility bills which are printed and sent to the consumers.
i. State two transcription errors that are likely to occur during meter reading or input (2 marks)
 Transposition
 Misreading

ii. State two ways such errors can be avoided (1 mark)


 Dry checking
 Using of test data
 Using debugging utilities

6. State three editing tools that are available in most standard word processing software (3 marks)
 Do and redo
 Spelling and grammar checker
 Thesaurus
 Insert mode
 Type over mode

7. Information security should be enforced both physically and logically.


I. Differentiate between the two security mechanisms (2 marks)
 Physical security ensures the content is not tapered with while logical security refers to
securing the meaning of the information
II. State two physical security techniques (2 marks)

Page 2 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme


 Burglar proofing
 Security personnel
 Security cameras (cctv)
8. Explain three types of computer buses found on the computer system board (3 marks)
 Control bus
 Address bus
 Data bus
9. State four disk management tool found in most operating systems (3 marks)
 Defragmentation
 Partitioning
 Disk Scanning
 Disk formatting
 Disk compression
 Disk backup
 Disk diagnostic
10. Highlight the dangers associated with the following:
i. Exposing computers to high humidity (1marks)
 Rusting of the parts of the metallic computer
ii. Purchasing software before assessing requirements (1marks)
 May be a pirated software
iii. Using foreign flash disks on the computer. (1marks)
 May multiply viruses
11. Differentiate between a filter and a query in a database (1 marks)

 Filter if a formatting tool that extract part of the record from the table while query is a
database object used to extract information from the database
12. The payroll system is both a financial system and a human resources system. Explain this statement.
(2marks)
 It is used to perform finance calculations and what if analysis and also used to update and
provide financial records for the workers
13. Explain the importance of the following spreadsheet operations.
a) Freezing columns (1mark)
 It enable the use to view only required records at atime
b) Data validation (1 mark)
 Ensures the records are valid as per the user need
14. List two ways in which computer technology can be used in law enforcement (1 marks)
 Surveillance, crime detection and prevention
 Scene monitoring by the police
Page 3 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme
 Storage of biometric information for investigation of crimes

15. In reference to aviation technology, state two advantages of using simulation in training pilots
(2mks)
 Safety
 Less costly

SECTION B (60 MARKS)


Answer question 16(compulsory) and any other THREE questions from this section.

16. (a) State the stage of program development in which:


(i) A flowchart would be drawn
Design
(ii)The programmer would check whether the program does as required
Testing
(iii) The user guide would be written
Documentation
(iv) The requirements specifications would be written
Analysis

b). A programmer uses program design tools to design a program that can list the odd numbers between

Page 4 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme


0 and 100.

b). (i). Write a pseudo code for this problem. (5mks)

Start Marks award


Odd=1 * Start/ stop – 1 mk
Repeat Repeat/ until -1 mk
Write odd correct statements -3 mks
Odd= Odd+2 *Also accept use of other control statements
Until odd =99 such as while…DO

ii). Draw a flow chart for the pseudo code in 16 b) (i) above. (6mks)

Start

Odd = 1

Write odd

YES
Odd = odd + 2
Is Odd
 99 ?

Page 5 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme


Stop

System flowchart Program flowchart


1 mark for each
correct A program flowchart details the A system flowchart will show the symbol
and flow through a single program flow through a system(A is made procedure
in the up of many programs). symbol
(1x 6=6)
. Each box in the flowchart will Each box will represent a program
represent a single instruction or a or a process made up of multiple
process within the program programs.

b) A system flow chart describes the describe the flow of data through a -
integer, flow of data through a complete particular computer program in a Real, Char,
String, data-processing system data processing system Boolean
Describe the relationship Describe the sequence of logical
between inputs, processing, and operations performed in a
(a) outputs for a system. computer program. (i)State
one difference
between system and program flowchart. (2 marks)

Any one at 2 marks. Difference must be shown

Page 6 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme


(ii) Study the follow flowchart then answer the questions that flow.

Figure 1 Flowchart2

I) Identify the type of flowchart that is represented by the flowchart in figure2


System flow chart ( ½ mark)

II) Name all the flowchart symbols used in this flowchart.

@ ½ mark each. Each name must be associated with the appropriate symbol.
(2 ½ marks)

17. (a) Define the term network topology . Network topology can be viewed in two ways .
Name and Explain the two ways. (5mks)

Network topology:
- Refers to the way computers and other devices have been arranged on a network
or how data passes from one computer to another on a network.

Page 7 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme


-refers to the physical arrangement of the network, especially the location of the
computers, other devices and how the cables are run between the devices.

(i) Logical/Signal topology.


Deals with the way data passes from one device to the next on the network.
Examples of logical topologies are Ethernet and token ring.
(ii) Physical topology.
Refers to the physical layout arrangement of components on the network.
The most common physical topologies are the bus, the star, the ring and the
mesh.

(iii) Explain two factors you would consider before enrolling for an ICT course in a
college. (2mks)
- Cost.
- Job opportunities.
- Where the examinations offered are recognized.
- The organization offering the course.
(d) Differentiate the function SUM and SUMIF as used in spreadsheet. 2mks
-SUM :- Adds values in a range of cells and returns the results
- SUMIF :- Adds values in a range of cells that meets the specified condition and returns the
results.
(e) State two advantages of using fiber optic cables. (2mks)
(i) Noise resistance: It is immune to EMI.
(ii) Less signal attenuation: signal can run for miles without requiring regeneration.
(i) Higher bandwidth: fibre optic cable can support dramatically higher bandwidths (and
hence data rate) than all other cables.
(ii) Smaller and lighter than copper cable hence space limited situations.
(iii) Can be used in hazardous (highly flammable) places because they do not
generate electrical signals.
(iv). Very fast (in light form)
5. In system development, testing is one of the critical stages. Give three reasons why the testing
phase is critical to the systems developer. [3 marks]

 Helps to ensure that the logical ad physical designs and environment are to the users satisfaction
 Help to detect and correct errors
 Gives proof to those skeptical about the working of the system

Page 8 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme


 Helps to establish how the system works under various conditions.

18. A systems analyst has been asked by a doctor to computerize the records she keeps about her
patients. He must first of all collect information about the existing system.
a). Describe four methods he could use to collect this information. 4mks
Any four from:
 Observation
 Questionnaires
 Interviews
 Collecting documents/document review
@ ½ mark each (2 marks)

(b) Once the whole system has been designed it will need to be implemented.
(i) Describe two methods of implementation that could be used. 2mks

Described Any two from:


 parallel running
 direct changeover
 pilot running
 phased implementation.
@ 1 mark each (2 marks)
(ii) Write down two reasons why one of the methods you gave in (b) (i) is better than the
other.

( 2 marks)
(c) After a system is implemented, it is evaluated. Give two reasons why a system should be evaluated.
Any two from: ( 2mks)

Page 9 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking Scheme


 to make sure user requirements have been met
 to identify any shortcomings
 to identify possible improvements

(d) State one difference between system flowchart and program flowchart. (2 marks)

System flowchart Program flowchart


A program flowchart details the A system flowchart will show the
flow through a single program flow through a system(A is made
up of many programs).
. Each box in the flowchart will Each box will represent a program
represent a single instruction or a or a process made up of multiple
process within the program programs.
A system flow chart describes the describe the flow of data through a
flow of data through a complete particular computer program in a
data-processing system data processing system
Describe the relationship Describe the sequence of logical
between inputs, processing, and operations performed in a
outputs for a system. computer program.

Any one at 2 marks. Difference must be show.


e) Study the following flowchart then answer the questions that follow.

Figure 2

Page 10 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking


Scheme
i). Identify the type of flowchart that is represented above in figure2

System flow chart ( ½ mark)

ii). Name all the flowchart symbols used in this flowchart (e) figure 2 above.

@ ½ mark each. Each name must be associated with the appropriate symbol.
(2 ½ marks)
19. (a) Describe each of the following data processing methods and give an example of
where used. (6mks)
(i) Online processing – Data is processed immediately it is received e.g.
internet banking, online payment system using credit card.
(ii) Batch processing – Data is accumulated as a group then it is processed as one/ a
group. Eg in payroll system
(iii) Real-time – Computer processes the incoming data as soon as it occurs,
up to dates the transactions file and gives an immediate response, that
would affect the events as they happen e.g. making reservations for
airlines seats, hotels etc.
(b) Make a clear difference between:- (6mks)
(i) Logical file and physical file – Viewed in terms of what data items it contain
and details of what processing operations may be performed on the data
items. Physical files is one that is viewed in terms of how data is stored on a
storage
media and hoe the processing operations are made possible.
ii). Master file and back-up file – Master file is the main file that contains
relatively permanent records about particular items or entries. Back-up file
is used to
hold copies of data or information from the fixed storage (hard disk)
(iii) Random and indexed sequential file organization methods.
Page 11 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking
Scheme
Random – Also direct file organization records are stored randomly but
accessed directly on a storage medium. Indexed sequential records are stored
and accessed in a particular order using an index used to enable the computer
to locate individual records on storage media.
(c) An organization is facing threats to data integrity. Explain three of how the threats can
be minimized.
(3mks)
- Backup data preferably on external storage media.
- Control access to data by enforcing security measures.
- Design user interface that minimize unauthorized access.
- Using error detection and correction software when transmitting data.
- Use devices that directly capture data from the source such as bar code readers.
- Digital cameras, optical CR.

20. (a) Give one reason why data and information in a computer system needs to be converted
to other number systems other than binary.
(1mks)
- Higher number systems are used in computing to reduce the streams of binary into
manageable form.
- Help to improve the processing speed.
- Optimize memory usage.

(b) Explain one reason for use of binary in digital technology.


(1mks)

- It is easier to develop devices that understand binary language.


- Device a designed using binary logic are simple more reliable and consume the
energy.

(c) ii). Using twos complement, workout : 1510 - 810 in binary form. (4mks)
= 15+(-8)
Convert 810 to its binary equivalent then write its two’s complement
Page 12 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking
Scheme
15 = 11111 ,
To 8 bit =00011111

8= 1000
To 8bit = 00001000
11110111 BitwiseNOT of 8 =1’C
2’C = 11110111+1 = 11111000

00001111
+ 11111000
( 1) 00000111
Overflow is ignored = 000001112
And in binary form the difference Is a positive number (000001112 (710)

i) Twos complement is the most popular way of representing negative numbers in computer
Systems. Give an advantage of using this method.
- There are no two ways of representing a zero as in the case with the other two methods
- Effective addition and subtraction can be done even with numbers that are represented
with a sign bit without a need for extra circuitries to examine the sign of an operand.

(d) Using BCD coding system convert 796 to binary. (3mks)

2 7 Rem 2 9 Rem 2 6 Rem


2 3 1 2 4 1 2 3 0

Page 13 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking


Scheme
2 1 1 2 2 0 2 1 1
0 1 2 1 0 0 1
0 1

79610 = 0111100101102

(b). Convert each of the following to the number system indicated:


i). 111.1012 to decimal; (3 marks)
 111=1x22+1x21+1x20=4+2+1 = 710
0.101 = 1x2-1+1x2-2+1x2-3
= 0.5+0.25+0.125
= 0.62510
⁖111.1012 = 7.62510

(ii). 14.687510 to binary [4 marks]


 14 = 11102
0.6875x2 = 1.375

0.375x2 = 0.75
0.75x2 = 1.50
0.50x2 = 1.00
Decimal portion
0.10112
1110.10112

Page 14 of 14 ANESTAR SCHOOLS LANJET 2022 Computer P1 Marking


Scheme

You might also like