0% found this document useful (0 votes)
221 views7 pages

2011 Kcse Computer Studies Marking Scheme p1

The document provides solutions and explanations for various questions related to Computer Studies, covering topics such as computer operations, hardware considerations, software properties, and data management. It includes specific examples and definitions, such as the functions of different keys, types of printers, and the importance of encryption and firewalls. Additionally, it discusses advantages of batch processing, characteristics of scripting languages, and the impact of technology on education and business.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
221 views7 pages

2011 Kcse Computer Studies Marking Scheme p1

The document provides solutions and explanations for various questions related to Computer Studies, covering topics such as computer operations, hardware considerations, software properties, and data management. It includes specific examples and definitions, such as the functions of different keys, types of printers, and the importance of encryption and firewalls. Additionally, it discusses advantages of batch processing, characteristics of scripting languages, and the impact of technology on education and business.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

28.

0 COMPUTER STUDIES (451)


Ecolebooks.com
28.1 Computer Studies Paper 1 (451/1)

Solution Marks
1 (a) Tab: Moves the text ahead to the next tab stop or several stops ahead/ right/ 1
forward. 1
(b) Enter: Break the line after the word 'is' so that the word 'an' starts on a new line. 1
- Words from "an" forms a new paragraph. (= 3 marks)
(c) Home: Takes the cursor to the beginning of the 1ine.
- Nothing happens to the text

2 - Computers can be automated or programmed.


- Computers are fast.
- Computers are capable of performing repetitive tasks. Any4 x 1
- Computers can store a lot of information.
- Computers are accurate.
- Can do dangerous tasks. (= 4 marks)
- Give quality output.
- Diligence /don't get tired/sick.

3 - They are more expensive.


- They hold less volume of data.
- They are volatile hence cannot store information once power is off. Any 3 x 1
- Its shorter access time is dependent on the memory size hence increasing the size
of primary memory will eventually lead to longer access time.
- ROM cannot store data (= 3 marks)

4 (a) Point of sale system (POS)/Data base management system/stock control system/ 1
sales management system. Any 2x/=1
(b) Keyboard, barcode scanner, credit card reader.
(c) - Transactions will be accurate.
- Automatic updating of transactions. Any 2x1 = 2
- Automatic updating of stock level.
- Provide daily and periodical summaries for management use. (= 4 marks)
- Improved security/limited access.
- Easy of storage of files.
5 (a) Impact printer/Dot matrix/Daisy wheel. 1
(b) It prints by using spokes which hit the paper hard. 1
The energy is transferred to attached carbon papers.
(= 2 marks)

765
DOWNLOAD MORE RESOURCES LIKE THIS ON ECOLEBOOKS.COM
Ecolebooks.com
6 File properties:
- File types.
- File extension.
- File size. Any 4x/
- Creating time/date of storage/saves time.
- Owner/Account used.
- Time of modification/date.
- Usage conditions/File attributes (Read Only/Archives/Hidden).
- Protection information. (= 2 marks)
- Contents of the file - Access time.

7 - System infected with viruses which occupy memory space.


- Many utilities are running in the background (e.g antivirus). Any 2x 1
- Many applications are opened.
- RAM may be smaller than the required/part of RAM corrupted. (= 2 marks)
- Corrupted Registry.

8 - Enactment of relevant laws to compact the vice.


- Stiff penalties for those found in possession of pirated software. Any 2 x 1
- Sensitize the public on the harm of using pirated copies.
- Making software affordable/cheaper. (= 2 marks)
- Certificates to identify the original software.
- Use of keys,passwords to secure software products.
- Restrict the number of installations.

Solution Marks
9 Hardware consideration:
- Main memory size/volume/capability.
- Hard disk size. Available
- input devices. Available
- output devices. Any 3 x 1
- Processor specification ie. speed/type/hardware.
- Monitor resolution.
- Bandwidth for busses (e.g 64-bit)
- Compatibility (= 3 marks)
- Configuration
- Warranty terms for hardware.

10 (a) Advantages:
- Shifts time of processing to when computers are less busy. Any 2 x 1
- No user input required hence no idle computer time as it awaits input.
- Input is done once (batch). (= 2 marks)
- Can enable use of hired equipment hence cost effective. 1
(= 3 marks)
(b) Batch processing.
- Electronic.
766
DOWNLOAD MORE RESOURCES LIKE THIS ON ECOLEBOOKS.COM
11 Ecolebooks.com
Advantages:
- Can be used in the absence of human teachers.
- Combines the expertise of many teachers hence more knowledgeable. Any 3 x 1
- Reduces cost of hiring many teachers/serves many students.
- Preservation of scarce expertise.
- Students can learn on time. ( = 3 marks)

12 - Encryption.
- Firewalls.
- User profiles/passwords/user. Any 3 x 1
- Limit the number of log-in attempts.
- Audit trail/tracking.
- Physical protection of computers. (= 3 marks)

13 (a) Input mask: Is a layout/format that filters the data that can be entered in a field. 1
(b) Default value: Used to specify the value that is automatically entered in a field
when a new record is created. 1
(= 2 marks)
14 (a) Warranty: If a software has a problem then it can be replaced. 1
If not working can be returned for repair. 1
(b) Portability: To ascertain the compatibility with other systems. (= 2marks)
15 - Booking and reservations. eg. hotel, car, bus, air ticket.
- Space explorations.
- Intensive care units (hospital). (ICU) Any 2 x 1
- Chemical plants/nuclear
- Military security (= 2marks)
- Banking eg. ATM.

16 (a) Characteristic of scripting language:


- Use of tags.
- It is interpreted and not compiled. Any 2 x 1
- Do not have declaration part.
- User friendly (= 2 marks)
-Are portable.
-Must be embedded in the browser.

I (b) Syntax Errors: Errors arising due to violation of language rules.


Logical Errors: Errors arising from poor logic such as incorrect use of formulas/
semantic. Any2
Runtime Errors: Occur when there is abrupt interruption of running program. (Error name 1
When the running program stops abruptly. Description 1)
(= 4 marks)

767
DOWNLOAD MORE RESOURCES LIKE THIS ON ECOLEBOOKS.COM
(c) (i)Ecolebooks.com
I. Input transp_means 1
2. If Transp_means = Public Then
Transp_ allowance= 200
Else
Transp_ allowance = 300 1
3. Print Transp_allowance 1
4. Exit

/ inputs

l decision
START

Read Transp_ Means 1 Alt. process

NO

Alt Process
Transp-allowance
= 300

/ output
Transp-allowance
= 200

(= 4 marks)

Print Transp_ allowance

END

(ii) - Flowcharts require templates/complex symbols/special software while


pseudo code
requires only a text editor.
- Drawing flowcharts takes a Jot of time. Any 2x1
- Flowcharts occupy more space.
- Flowcharts permit development of logic sequences which cannot be coded
using valid structured code. (=2 marks)
- Translation of flow charts into individual code is harder/difficulty.
Total for Question 16 15 marks

768
DOWNLOAD MORE RESOURCES LIKE THIS ON ECOLEBOOKS.COM
17 (a)Ecolebooks.com
- Binary coded Decimal (BCD) )(4 bits).
- American Standard Code for information interchange (ASCII).
- Extended BCD interchange code.(EBCDIC) Any 3 x 1
- Unicode.
......- Standard BCD (6 bits) (= 3 marks)

(b) (i) 110,= 4+2 1


=6
0.101,=
I l
i + T 1
1 1
Sum = 6 + T7 4 T
= 6+or6.625 1
(ii) 12
2 6RO
2 3 RO 1
2 1R1
2 OR 1

0.6875 X 2=1375
0.375 X 2 = 0.75 1
0.75 X 2 =1.5
0.5 X 2 = 1.00

1100 + 0.1011 1
= 1100.1011, 1
(c) 1 1 0 0 1. 0 1 0 1
1 1 0. 0 1 1 order
10011.0001 1

(d) COMP (100101)= 011010 + 1

001101 1
011011
101000

Carry = 0 recomplement the answer


010111 1
+ 1 1
011000
Total for Question 17 15 marks
18 (a) (i) Cell margin: Its the space between the boundary of the cell and the text/
content inside the cell. 1
(ii) Nested table: is a table created inside another table. 1

769
DOWNLOAD MORE RESOURCES LIKE THIS ON ECOLEBOOKS.COM
Ecolebooks.com
(b) - In line with text.
- Square Behind
- text. Infront of
- text. Tight. Any 4x/
- Through.
- Top and bottom.
- None.
-
(= 2 marks)
Solution Marks
(c) () Axis label: Data corresponding to the vertical or horizontal lines of a given
chart whereas ie x-axis and y-axis.
Data label: are data that provide additional information about a data marker
which represents a single data point on a value that originates
from a worksheet cell.
(= 2 marks)
(ii) Cropping is the process of trimming/cutting/hiding vertical or horizontal
edges of an object/picture while sizing is the process of enlarging/expanding
or reducing/contracting an object/ picture
to appropriate dimension. (= 2 marks)
(d) (i) = Product (B3:C3)=Product (C3,B3) 1
(ii) = & B &8C5 + C5 = Product (&B &* *C5)+C5 2
(iii) = Count 1f (C2:C5 = 110) 2
(iv)= Min (d2:d5) 2
Total for Question 18 15 marks
19 (a) Surfing: Its the process of accessing /browsing/visiting internet resources like 1
webpages. 1
Uploading: Transferring files from a computer to a remote computer. l
lnbox: Folder/place in email system where incoming messages are stored/saved.
(b) - Slower than a wired network.
- The network can be less stable, wireless reception may be impaired by other
wireless and wired devices within the network. Any 3 x 1
- Risk of outsider accessing the network.
- Very difficult to configure.
- Very hard to secure. (= 3 marks)
- Very hard to trouble shoot.

(e) - Block in appropriate content/Firewall/Filter.


- Set limits on downloads.
- Monitor where children go online. Any 3xI
- Counsel children eg. not talking to strangers online.
- Supervise them.
- Giving user accounts/passwords/log ins. (= 3 marks)

770
DOWNLOAD MORE RESOURCES LIKE THIS ON ECOLEBOOKS.COM
(d)Ecolebooks.com
- Threat to privacy.
Organisation "system admn"
Can snoop into peoples mails.
- Email can be unsolicited/spam mail.
Messages can be sent to masses of people without their consents. Any 3x2
- Vulnerability to machine failures.
- Emails can be overwhelming when many messages are received leading to
email overload and going through each of them can be taxing.
- Email can be faked.
- Email attached can be a source of viruses. (= 6 marks)
- Email technology not available to all/Technology illiteracy.
- Encourage illicit communication such as immoral behaviour.

Total for Question 19 15 marks


Solution Marks
20 (a) Current system may be experiencing problems thereby being unable to meet
organisation requirements.
- New directives may be received from authorities and the organisation must
comply.
- Changes in the operating environment forces the organisation to change in Any 3x2
order to fit and continue in business. eg. competition.
- Changes in technology requiring the upgrading or total change in the existing
system.
- Peer pressure need to remain fashion (= 6 marks)

(b) (i) Sample data should be provided so that all modules can be tested. 1
(ii) Output reports show that the system actually works/testing process/expected 1
output ..
(c) (i) Manual: Manual files stored in cabinets/books/paper/in-tray/out-tray. 1
(ii) Electronic: Secondary storage devices/individual storage devices eg. Flash . 1
(d) () Student: Master file/Parent/Reference File/Primary. 1
Register: Transaction file/Child table/Secondary. 1

(ii) Master file: Data is static/Permanent/Semi-permanent. l


Transaction file: Data is dynamic/Temporary/Changes frequently 1

(iii) Key field: Student number/Admission No./Reg. No./File No. 1


Total for Question 20 15 marks

771
DOWNLOAD MORE RESOURCES LIKE THIS ON ECOLEBOOKS.COM

You might also like