MOCK EXAMINATION
COMPUTING PAPER 1
SEPTEMBER 2016 SESSION
MARKING SCHEME
NB : the marking guide is flexible and not exhaustive, there is room for new marking points.
For queries, comments and clarification feel free to contact me at [email protected] or
0773 040 903
Wish you the best as you prepare your students for the final Exams
Prepared by Kurenzvi T Sandringham High School
Contact:
[email protected] or 0773 040 903
1 a) -a method of program development in which the main problem is divided into sub
problems/smaller tasks [1]
-each sub problem/task is individually solved [1]
b) -easier to understand and debug [1]
-easier to mantain [1]
-shorten development time [1]
- allows specialisation/team work [1]
-it is easier for someone to take over a set of self-contained modules [1]
-large project becomes easier to monitor and control [1]
-modules can be used again and again in different or parts of the same program [1]
[Max 2]
c) passing by value- the actual value/data is passed to the calling procedure [1]
- the value is not altered/changed [1]
Passing by address/reference- the address of the value is passed to a calling procedure [1]
-the value is changed/altered [1]
[Max 4]
d(i) -errors reported during translation eg syntax error [1]
(ii) -errors reported during program execution e.g division by zero [1]
(iii)- rounding down errors e.g Truncating 10.65 =10. The difference is the error 0.65 [1]
[accept any variations max 3]
2. a(i) Binary - 01101012 [1]
ii) Octal - 1658 [1]
iii) Hexadecimal - 7516 [1]
b) -maximum precision for a given number for a given number of bits [1]
-only one representation for each number [1]
[max 2]
c) -screen is divided into a grid, and each square on the grid is called a pixel [1]
-one bit in memory represent a pixel in a monochrome screen and one byte correspond to
a pixel in colour screen [1]
- if the bit is 1, the pixel is on and if the bit is 0, the pixel is off [1]
[max 2]
3 a) –use of barcodes [1]
-use hand held laser gun/wand reader to read the barcodes [1]
- use of touch screen/touch till [1]
- use of keyboards to enter data [1]
[Max 3]
b) Audit Trail- provides a means of tracking by keeping records of every transaction that has
been entered into the system to see how a particular figure was arrived at
-it keeps records of who used the system,when and how long –this monitors suspicious or
unauthorised use of computers [1]
Reasons
-in order to meet legal requirement [1]
-protection against fraud and against theft of stock [1]
-every business must produce a set of accounts based on verifiable facts [1]
[one mark for explanation, one mark for each reason max 3]
Prepared by Kurenzvi T Sandringham High School
Contact:
[email protected] or 0773 040 903
4. a) circuit switching
-a physical pathway is established between sender and receiver for the duration of the
data transfer
- dedicated communications channel is established for the duration of the call [1]
[any one]
Packet switching
-divides the message to be transmitted into packets which may take different roots in
transmission, packets are reassembled at the receiving end [1]
b) -more efficient use of lines [1]
-less likey to be affected by network failure [1]
- better security/data is less likely to be intercepted [1]
- multiple routes are available to transmit data [1]
-cost depends on the number of packets not distance [1]
-network is not tied/congested [1]
[any two] [max 2]
c) -destination address [1]
-source address [1]
-packet sequence number [1]
-checksum for error checking [1]
[any two] [max 2]
d(i) Distributed systems
-a system in which resources e.g processors, disk storage, printers exist in separate notes
with transparent access to these resources made possible [1]
Centralised system
-a system in which all processing is carried out in one central location [1]
ii) - data is held locally thereby reducing transmission costs [1]
- Processing is faster as each workstation can do its own processing [1]
- Can meet specific needs of each local user [1]
- If central computer goes down, workstations are not affected [1]
- Particular PCs can be dedicated to particular applications [1]
[Any three] [max 3]
5. a)-comments typed as part of code [1]
- use of meaningful data names [1]
- indentation of program lines [1]
- modularity-splitting codes into smaller so that it is easier to follow [1]
-use of special reserved words [1]
[Max 3]
b) Removes redundant parts of source code, e.g. spaces/white space [1]
- Removes comments from the program [1]
- Checked validity of reserved words within the program code [1]
- Tokenises reserved words (replacing of reserved words like If, While,with shorter tokens [1]
- Tokenises operators [1]
- Checks validity of symbols and variable names variable names [1]
- Creates the symbol table [1]
[max 4]
Prepared by Kurenzvi T Sandringham High School
Contact:
[email protected] or 0773 040 903
6. a) -data Integrity- refers to the correctness, validity and accuracy of data [1]
b) -at point of entry, wrong information typed [1]
-data corrupted during transmission [1]
-data lost during transmission [1]
-data affected by virus [1]
[any two max 2]
c) -apply different validation techniques eg type check
-data verification/double entry and compairing
- data protection methods eg virus checking [2]
[any two]
d) -open the entire database in exclusive mode
-lock all the table being modified
-lock the record currently being modified
-lock the table currently being edited
-open table in Read Only Mode [any three] [3]
e) -one of the two user’s task must be aborted to allow the other to proceed
-records needs to be updated in the same sequence so that no user calls up record 2
before record 1 [2]
7 a) Dynamic-the size of the file varies/always change in size during program execution [1]
Example: binary tree,stack,queue,stack [1]
b) Static-the size of the file has to be declared and is fixed prior to its application
-the size of the file does not change during program execution,it is fixed [1]
Example: array [1]
8 a) Sorting-arranging of records/data in a pre-defined/predetermined order
eg ascending [1]
Usage - sorting transaction file in the order of a master file [1]
Merging-combining two or more related records to form an ordered file [1]
Usage - when updating a master file using a transaction file [1]
b) -the way the data is stored/whether the data is partially sorted [1]
-length of records to be sorted [1]
-storage media used to store data eg main memory, disk tape [1]
-can data fit into main memory at the same time [1]
-processing speed of machine [1]
- efficiency when perfoming the task [1]
[Max 4]
9 a) -must generate any of the available addresses on the file
-must be fast to calculate
-should minimises collision (synonyms) [2]
b) -the record that has caused collision should be placed at the next available free space
-store the record in a separate overflow and leave a tag in the original location to indicate
where to look next [2]
Prepared by Kurenzvi T Sandringham High School
Contact:
[email protected] or 0773 040 903
c) -adress is calculated using a harshing algorithm
-the record is read
- the record is logically deleted by setting a flag to zero,the record will be physically
present [2]
10 a(i) MICR-characters written in special ink(iron oxide) is magnetised and characters are read
by MICR using the strength of the magnetism [1]
Application – cheque processing in banks [1]
ii) OCR –characters are scanned/read by an optical character reader which converts text into
binary and software converts the scanned image into text [1]
Application- scanning text from textbook, billing systems, invoices for payment [1]
[accept any variations on application]
b)- Back up files-magnetic tape is used for store data for back up purposes
-storing transaction files-stores records in the order in which it takes place
-stores archive materials –stores historical data for future use [4]
[any two distinct uses with its description]
11 a) -file management
-memory management
- interrupt handling
- peripheral device control
- resource allocation
-input/output control
- multiprogramming
-checking user Ids and passwords [any three] [3]
b) -compression software-compressing data so that it occupies little space
- Virus Scan Utility: These are programs that protect computers from virus
attacks, for example Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.
- Sort Utilities: These are programs used to arrange data, files and records
into a specific ordered sequence, for instance in ascending or descending
order of a given key.
-Editors: These are programs used to make changes to data already held in the
computer [4]
[Any two explained utilities-1 mark for naming and 1 mark for explanation max
4]
c) loaders –loads compiled program into the memory [1]
Prepared by Kurenzvi T Sandringham High School
Contact:
[email protected] or 0773 040 903
12 a) - a mail merge facility in word processing package is used [1]
- create a standard letter with variable to be filled in from the database [1]
-when mail merge is executed, there is automatic production of personalised letters to
each family in the database [1]
[max 3]
b(i) -long periods staring at screen causes eye strain
- continual use of the same mucle cause repetitive Strain Injury (RSI)
- long periods of non movement causes back strain
- effects on eye of radiation from screen [any two ] [2]
ii) -staff musttake short breaks and move around regularly [1]
-use adjustable chairs to support back [1]
-use anti glare screen [1]
- use wrist pads [1]
- use natural support keyboards [1]
[max 2]
13 a) function factorial(n) [1]
Begin
If n= 0 or n=1 then [1]
Factorial=1 [1]
Else
Factorial=n*factorial(n-1) [1]
End [ max 4]
[accept any variations]
b) -allows programmers to write a program which mirrors the solution [1]
-recursive solution are shorter than non recursive programs [1]
-easier for the programmer to write [1]
[max 2]
Prepared by Kurenzvi T Sandringham High School
Contact:
[email protected] or 0773 040 903