Form 3 Computer Studies PP1 Ans

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 7

STRATEGIC ALLIANCE

451 - COMPUTER STUDIES – form 3


MARKING SCHEME
(THEORY)
March/April 2024 - 2 ½ hours

SECTION A

Answer all the questions in this section in the spaces provided.

1. Define the following. (2 marks)


i) Information.

 Refers to processed data that has meaning to the user.

ii) Information Systems.


 Is an arrangement of people, data processes and information that work
together to support and improve the day-to-day operations in a
business and the decision making process?

2. List two differences between analogue and digital data. (2 marks)


 Analog process data that is in continuous form while digital computers
process data that is discrete form.
 Analog computers are slower than digital computers in processing.

3. Define the term data processing as used in computer science. (1 mark)

 The varied activities that are performed to convert data into useful
information.

4. One of the keys, which can be used when designing a database, is primary key. What is a
primary key? (1 mark)

 It is an index that uniquely identifies each record stored in a table.

5. Differentiate between the following.


i) Online and Batch processing. (2 marks)
 Online processing is where data is processed almost immediately it is
received while batch in processing, data is accumulated over a given
period of time then processed at once

The Examiner 1 SET 1


ii) Multitasking and Multiprocessing. (2 marks)

 Multitasking refers to processing more than one task by a single


processing unit while multiprocessing refers to performing more than
one task or process apparently at the same time.

iii) Cold booting and Warm booting. (2 marks)


 Cold booting involves switching on a computer that was completely off
while warm booting involves switching on a computer that was not
completely off but in idle mode.

6. (i) Mention any two examples of pointing input devices


(2 marks)
 Mouse
 Joystick
 Trackball
 Light pen

(ii) Explain the term “Disk formatting” (2


marks)

 The process of preparing the tracks and sectors to receive and store new data.

7. Define an operating system (2 marks)

 An operating system is a system software that identifies and provides hardware


resources in a computer system.

8. Explain TWO characteristics of the 5 th generation computers.


(2 marks)
 Small in size
 High processing power

9. State two functions performed by the UPS (2 marks)

 Provide a stable power supply


 Provide adequate time save your work during a black out

10. a) Explain why the following controls should be implemented for computer based
systems

(2 marks)

i) Back-ups

 To prevent loss of data

2
ii) Passwords
 To deter unauthorized access to confidential data and information

ii) Work out the binary subtraction 101012 - 1102 (2 marks)

101012
-1102
11112

11. Mention 2 advantages and 2 disadvantages of Real-Time processing.


(4 marks)

Advantages:
 Provides accurate and up to date information.
 It utilizes memory

Disadvantages:
It is not easy to program
 Does not support multitasking

12. a) What is a word processor? (1 mark)

 It is an application software that enables one to create, save, edit,


format and print text documents.

b) Outline any 4 editing features of a word processor. (2 marks)

 Undo and redo


 Delete
 Cut and paste
 Copy and paste

13. List 3 advantages of using electronic spreadsheets over manual worksheets


(3 marks)
 It is saves time
 It is accurate since it contains automatic recalculation features
 It contains chatting facility
 It has inbuilt templates

14. Explain the meaning of the following terms.


i) Logical file (1 mark)

 This file is viewed in terms of what data items it contains and what processing
operations may be performed.

ii) Physical file (1mark)

 This is a file that is viewed in terms of how data is stored on a storage media
and how the processing operations are made possible.

3
15. Give one example for each of the following types of function used in spreadsheet
(2 marks)
i) Statistical

 Average
 Count

ii) Mathematical

 Sum
 Product

SECTION B (60 MARKS)

Answer question 16 and any other 3 questions.


16.
a) What is programming? (2 marks)

 Is the process of developing computer instructions to solve a particular


problem.

b) Differentiate between the following terms (4 marks)

i) Compiler from interpreter

 A compiler translates the entire source code into object code while
interpreter the source program line by line, allowing the CPU to execute
one line before translating the next.

ii) Source program from object program

 Source program refers to a program code that programmer enters n the


program editor window that is not yet translated into machine-readable
form.
 Object code is a program code that is in machine-readable form.

iii) Pseudo-code from flowchart

 A pseudocode is a set of instructions written in human readable form but


expressing the processing logic of a program while the Flow chart is a tool
for analyzing processes.

iv) High level computer language from low-level computer language

 High level language can be understood by humans while low level languages can be
easily understood by computers.

c) i) Explain the difference between Random Access Memory and Read Only Memory
(2 marks)
 RAM is volatile while ROM is non-volatile
 Data can read and written in RAM while in ROM one can only read.
4
ii) Define; (4 marks)

i) File
A group of related data items stored in a secondary storage media.

ii) Record

 Group of related fields that represent a single data item.

iii) Form

 Is a template that is specifically prepared to enable faster input of data in


the worksheet.

iv) Field

 A character or combination of characters that that represent information


of the same data type.

d) Explain three effects of introduction of ICT in workplaces.


(3 marks)
 Efficiency
 Improved quality of production
 Improved speed of production

17. a) What is a database? (1 mark)

 It is a collection of related data items organized and structured together for


easy access and retrieval.

b) Differentiate a table and a query as used in database (2 marks)

 A table is a collection of related records while a query is a statement used to


extract, change analyze and request for specific data form one or more tables.

c) State and briefly explain any two-database models (4 marks)

 Network model – links are used to express the relationship between different
data items forming a network.
 Relational model – related data items are stored together in structures called
relations.

d) List down the six stages in program development. (6 marks)

 Program recognition
 Problem definition
 Program design
 Program coding
 Program testing and debugging
 Implementation and maintenance
e) State two types of errors associated with program testing and debugging. (2 marks)
5
 Syntax errors
 Logical errors

18. The teacher has bought a computer system. The hardware items include 800MHz
processor, 640MB of RAM, a sound card, speakers, a monitor, a keyboard, a 12 GB hard
disk, a floppy disk drive, a CDRW drive, a mouse, a modem, an inkjet printer and a
joystick. The software supplied included: an OS, a BASIC interpreter and the following
packages: spreadsheets, graphics, word processor, art database and games.

a) List three input devices from the given specifications. (3 marks)

 Keyboard
 Mouse
 Joystick

b) Explain the meaning of the following (6 marks)


i) 800Mhz

 800 Megahertz refers to the processor speed

ii) 640 MB

 640 Megabytes refers to the size of the Random Access Memory

iii) 12GB

 12 Gigabytes refers to the memory size of the Hard drive

c) Some of the students in the school use the computer to do homework. Name the
packages used to:-
i) Do calculations and draw graphs (1 mark)

 Microsoft Office Excel

ii) Write an essay (1 mark)

 Microsoft Office Word

iii) Make a poster (1 mark)

 Microsoft Office Publisher

d) Students enjoy playing noisy computer games


i) Which hardware items do you need to produce sound? (2 marks)

 Sound card
 Speakers

ii) Which input device is used only for playing games? (1 Mark)

 Joystick

19. (a) Explain the following terms as used in computer science. (3 marks)
6
(i) Hacking.

 Refers to eavesdropping in order to access private or confidential


information from the internet or poorly secured information systems.

(ii) Data privacy.

 Refers to the right of an individual to have information about him/her


regarded as confidential.

(iii) Data integrity.

 Refers to the correct and completeness of data

(b) Computer virus is one of the major data security threat in the world today.
i) What is a virus (1 mark)

 It is a destructive program, designed by malicious people with the


intention of destroying files, programs and the entire computer system.

ii) State any three ways virus can transmitted


(3marks)

 Through the internet

 Use of external storage devices

 Pirated software, movies and music

iii) Explain any four measures that should be taken to prevent data loss
through viruses.
(4 marks)
 Scan any secondary storage devices before use
 Install updated antivirus software
 Always backup important files or programs
 Avoid buying pirated software
 Install firewall

iv) Differentiate mechanical data processing method from electronic data (2 marks)
processing method.

 In electronic data processing devices that have electronic intelligence are


used to automate data processing activity while in mechanical data
processing, the devices do not have electronic intelligence.

v) Differentiate between data security and data privacy. (2 marks)

 Data security is the protection of data or programs against threats that


may lead to the loss of confidentiality, integrity and illegal modification of
data and information.
 Data privacy is the right of an individual to have information about
him/her regarded as confidential.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy