Form 3 Computer Studies PP1 Ans
Form 3 Computer Studies PP1 Ans
Form 3 Computer Studies PP1 Ans
SECTION A
The varied activities that are performed to convert data into useful
information.
4. One of the keys, which can be used when designing a database, is primary key. What is a
primary key? (1 mark)
The process of preparing the tracks and sectors to receive and store new data.
10. a) Explain why the following controls should be implemented for computer based
systems
(2 marks)
i) Back-ups
2
ii) Passwords
To deter unauthorized access to confidential data and information
101012
-1102
11112
Advantages:
Provides accurate and up to date information.
It utilizes memory
Disadvantages:
It is not easy to program
Does not support multitasking
This file is viewed in terms of what data items it contains and what processing
operations may be performed.
This is a file that is viewed in terms of how data is stored on a storage media
and how the processing operations are made possible.
3
15. Give one example for each of the following types of function used in spreadsheet
(2 marks)
i) Statistical
Average
Count
ii) Mathematical
Sum
Product
A compiler translates the entire source code into object code while
interpreter the source program line by line, allowing the CPU to execute
one line before translating the next.
High level language can be understood by humans while low level languages can be
easily understood by computers.
c) i) Explain the difference between Random Access Memory and Read Only Memory
(2 marks)
RAM is volatile while ROM is non-volatile
Data can read and written in RAM while in ROM one can only read.
4
ii) Define; (4 marks)
i) File
A group of related data items stored in a secondary storage media.
ii) Record
iii) Form
iv) Field
Network model – links are used to express the relationship between different
data items forming a network.
Relational model – related data items are stored together in structures called
relations.
Program recognition
Problem definition
Program design
Program coding
Program testing and debugging
Implementation and maintenance
e) State two types of errors associated with program testing and debugging. (2 marks)
5
Syntax errors
Logical errors
18. The teacher has bought a computer system. The hardware items include 800MHz
processor, 640MB of RAM, a sound card, speakers, a monitor, a keyboard, a 12 GB hard
disk, a floppy disk drive, a CDRW drive, a mouse, a modem, an inkjet printer and a
joystick. The software supplied included: an OS, a BASIC interpreter and the following
packages: spreadsheets, graphics, word processor, art database and games.
Keyboard
Mouse
Joystick
ii) 640 MB
iii) 12GB
c) Some of the students in the school use the computer to do homework. Name the
packages used to:-
i) Do calculations and draw graphs (1 mark)
Sound card
Speakers
ii) Which input device is used only for playing games? (1 Mark)
Joystick
19. (a) Explain the following terms as used in computer science. (3 marks)
6
(i) Hacking.
(b) Computer virus is one of the major data security threat in the world today.
i) What is a virus (1 mark)
iii) Explain any four measures that should be taken to prevent data loss
through viruses.
(4 marks)
Scan any secondary storage devices before use
Install updated antivirus software
Always backup important files or programs
Avoid buying pirated software
Install firewall
iv) Differentiate mechanical data processing method from electronic data (2 marks)
processing method.