STRATEGIC ALLIANCE
451 - COMPUTER STUDIES – form 3
MARKING SCHEME
(THEORY)
March/April 2024 - 2 ½ hours
SECTION A
Answer all the questions in this section in the spaces provided.
1. Define the following. (2 marks)
i) Information.
Refers to processed data that has meaning to the user.
ii) Information Systems.
Is an arrangement of people, data processes and information that work
together to support and improve the day-to-day operations in a
business and the decision making process?
2. List two differences between analogue and digital data. (2 marks)
Analog process data that is in continuous form while digital computers
process data that is discrete form.
Analog computers are slower than digital computers in processing.
3. Define the term data processing as used in computer science. (1 mark)
The varied activities that are performed to convert data into useful
information.
4. One of the keys, which can be used when designing a database, is primary key. What is a
primary key? (1 mark)
It is an index that uniquely identifies each record stored in a table.
5. Differentiate between the following.
i) Online and Batch processing. (2 marks)
Online processing is where data is processed almost immediately it is
received while batch in processing, data is accumulated over a given
period of time then processed at once
The Examiner 1 SET 1
ii) Multitasking and Multiprocessing. (2 marks)
Multitasking refers to processing more than one task by a single
processing unit while multiprocessing refers to performing more than
one task or process apparently at the same time.
iii) Cold booting and Warm booting. (2 marks)
Cold booting involves switching on a computer that was completely off
while warm booting involves switching on a computer that was not
completely off but in idle mode.
6. (i) Mention any two examples of pointing input devices
(2 marks)
Mouse
Joystick
Trackball
Light pen
(ii) Explain the term “Disk formatting” (2
marks)
The process of preparing the tracks and sectors to receive and store new data.
7. Define an operating system (2 marks)
An operating system is a system software that identifies and provides hardware
resources in a computer system.
8. Explain TWO characteristics of the 5 th generation computers.
(2 marks)
Small in size
High processing power
9. State two functions performed by the UPS (2 marks)
Provide a stable power supply
Provide adequate time save your work during a black out
10. a) Explain why the following controls should be implemented for computer based
systems
(2 marks)
i) Back-ups
To prevent loss of data
2
ii) Passwords
To deter unauthorized access to confidential data and information
ii) Work out the binary subtraction 101012 - 1102 (2 marks)
101012
-1102
11112
11. Mention 2 advantages and 2 disadvantages of Real-Time processing.
(4 marks)
Advantages:
Provides accurate and up to date information.
It utilizes memory
Disadvantages:
It is not easy to program
Does not support multitasking
12. a) What is a word processor? (1 mark)
It is an application software that enables one to create, save, edit,
format and print text documents.
b) Outline any 4 editing features of a word processor. (2 marks)
Undo and redo
Delete
Cut and paste
Copy and paste
13. List 3 advantages of using electronic spreadsheets over manual worksheets
(3 marks)
It is saves time
It is accurate since it contains automatic recalculation features
It contains chatting facility
It has inbuilt templates
14. Explain the meaning of the following terms.
i) Logical file (1 mark)
This file is viewed in terms of what data items it contains and what processing
operations may be performed.
ii) Physical file (1mark)
This is a file that is viewed in terms of how data is stored on a storage media
and how the processing operations are made possible.
3
15. Give one example for each of the following types of function used in spreadsheet
(2 marks)
i) Statistical
Average
Count
ii) Mathematical
Sum
Product
SECTION B (60 MARKS)
Answer question 16 and any other 3 questions.
16.
a) What is programming? (2 marks)
Is the process of developing computer instructions to solve a particular
problem.
b) Differentiate between the following terms (4 marks)
i) Compiler from interpreter
A compiler translates the entire source code into object code while
interpreter the source program line by line, allowing the CPU to execute
one line before translating the next.
ii) Source program from object program
Source program refers to a program code that programmer enters n the
program editor window that is not yet translated into machine-readable
form.
Object code is a program code that is in machine-readable form.
iii) Pseudo-code from flowchart
A pseudocode is a set of instructions written in human readable form but
expressing the processing logic of a program while the Flow chart is a tool
for analyzing processes.
iv) High level computer language from low-level computer language
High level language can be understood by humans while low level languages can be
easily understood by computers.
c) i) Explain the difference between Random Access Memory and Read Only Memory
(2 marks)
RAM is volatile while ROM is non-volatile
Data can read and written in RAM while in ROM one can only read.
4
ii) Define; (4 marks)
i) File
A group of related data items stored in a secondary storage media.
ii) Record
Group of related fields that represent a single data item.
iii) Form
Is a template that is specifically prepared to enable faster input of data in
the worksheet.
iv) Field
A character or combination of characters that that represent information
of the same data type.
d) Explain three effects of introduction of ICT in workplaces.
(3 marks)
Efficiency
Improved quality of production
Improved speed of production
17. a) What is a database? (1 mark)
It is a collection of related data items organized and structured together for
easy access and retrieval.
b) Differentiate a table and a query as used in database (2 marks)
A table is a collection of related records while a query is a statement used to
extract, change analyze and request for specific data form one or more tables.
c) State and briefly explain any two-database models (4 marks)
Network model – links are used to express the relationship between different
data items forming a network.
Relational model – related data items are stored together in structures called
relations.
d) List down the six stages in program development. (6 marks)
Program recognition
Problem definition
Program design
Program coding
Program testing and debugging
Implementation and maintenance
e) State two types of errors associated with program testing and debugging. (2 marks)
5
Syntax errors
Logical errors
18. The teacher has bought a computer system. The hardware items include 800MHz
processor, 640MB of RAM, a sound card, speakers, a monitor, a keyboard, a 12 GB hard
disk, a floppy disk drive, a CDRW drive, a mouse, a modem, an inkjet printer and a
joystick. The software supplied included: an OS, a BASIC interpreter and the following
packages: spreadsheets, graphics, word processor, art database and games.
a) List three input devices from the given specifications. (3 marks)
Keyboard
Mouse
Joystick
b) Explain the meaning of the following (6 marks)
i) 800Mhz
800 Megahertz refers to the processor speed
ii) 640 MB
640 Megabytes refers to the size of the Random Access Memory
iii) 12GB
12 Gigabytes refers to the memory size of the Hard drive
c) Some of the students in the school use the computer to do homework. Name the
packages used to:-
i) Do calculations and draw graphs (1 mark)
Microsoft Office Excel
ii) Write an essay (1 mark)
Microsoft Office Word
iii) Make a poster (1 mark)
Microsoft Office Publisher
d) Students enjoy playing noisy computer games
i) Which hardware items do you need to produce sound? (2 marks)
Sound card
Speakers
ii) Which input device is used only for playing games? (1 Mark)
Joystick
19. (a) Explain the following terms as used in computer science. (3 marks)
6
(i) Hacking.
Refers to eavesdropping in order to access private or confidential
information from the internet or poorly secured information systems.
(ii) Data privacy.
Refers to the right of an individual to have information about him/her
regarded as confidential.
(iii) Data integrity.
Refers to the correct and completeness of data
(b) Computer virus is one of the major data security threat in the world today.
i) What is a virus (1 mark)
It is a destructive program, designed by malicious people with the
intention of destroying files, programs and the entire computer system.
ii) State any three ways virus can transmitted
(3marks)
Through the internet
Use of external storage devices
Pirated software, movies and music
iii) Explain any four measures that should be taken to prevent data loss
through viruses.
(4 marks)
Scan any secondary storage devices before use
Install updated antivirus software
Always backup important files or programs
Avoid buying pirated software
Install firewall
iv) Differentiate mechanical data processing method from electronic data (2 marks)
processing method.
In electronic data processing devices that have electronic intelligence are
used to automate data processing activity while in mechanical data
processing, the devices do not have electronic intelligence.
v) Differentiate between data security and data privacy. (2 marks)
Data security is the protection of data or programs against threats that
may lead to the loss of confidentiality, integrity and illegal modification of
data and information.
Data privacy is the right of an individual to have information about
him/her regarded as confidential.