Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
70 views7 pages

Form 3 Computer Marking Scheme

The document is a marking scheme for the Computer Studies Paper 1 exam for Rev Muhoro School for the Deaf, dated July 2024. It includes instructions for candidates, a breakdown of exam sections, and a variety of questions covering topics such as data processing, computer hardware, and software. The marking scheme outlines the structure of the exam, including the allocation of marks for each question.

Uploaded by

Kelvin Kasyoki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views7 pages

Form 3 Computer Marking Scheme

The document is a marking scheme for the Computer Studies Paper 1 exam for Rev Muhoro School for the Deaf, dated July 2024. It includes instructions for candidates, a breakdown of exam sections, and a variety of questions covering topics such as data processing, computer hardware, and software. The marking scheme outlines the structure of the exam, including the allocation of marks for each question.

Uploaded by

Kelvin Kasyoki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

REV MUHORO SCHOOL FOR THE DEAF

451/1 - COMPUTER STUDIES – Paper 1

(THEORY)
July. 2024
Time: 2½ Hrs.
MARKING SCHEME

Instruction to candidates

a) Write your name and admission number in the space provided above.
b) This paper consists of two sections A and B.
c) Answer all the questions in section A.
d) Answer question 16 and any other three questions from section B.
e) All answers should be written in the space provided in the question paper.
f) This paper consists of 12 printed pages.
g) Do not remove any pages from this booklet.
h) Candidates should check the question paper to ascertain that all the pages are printed as indicated and
that no questions are missing.
i) Candidates should answer the questions in English.

For Examiner’s Use Only

Section Question Candidate’s


Number Score
A 1-15
16
17
B 18
19
20
Total

SECTION A (40 MARKS)


Answer ALL questions in the spaces provided

1 FORM 3 END TERM II EXAM -2024


1. Differentiate between data and information. (2 marks)
Data is raw facts that are meaningless to the user but meaningful to the computer while information is data that has been
processed and is meaningful to the user but meaningless to the computer.

2. The current monitor technology uses LED back lit technology. Give two advantages of using LED monitors over
CRT monitors (2 marks)
 Images formed in LED do not suffer from angle distortion
 LED have low power consumption than CRT
 LED have a higher resolution than CRT
3. Name four categories of input devices (2 marks)
 Keying devices .
 Scanning devices
 Automated method
 Pointing devices
4. State any two physical measures taken to protect a computer laboratory from unauthorized access.(2 marks)
 Burglar proofing the room
 Use of alarms
 Use of padlocks
 Use of special cards
 Employing security guards
5. Differentiate between proofreading and formatting a document as used in word processing (2 marks)
 Proofreading is the process of checking whether the document has typographical or grammatical errors
 Formatting a document refers to enhancing the appearance of a document to be attractive and appealing to the eye
of the reader
6. Convert the decimal number 20.375 to it binary number system equivalent (3 marks)
20 = 101002
.375 x 2 = 0.75
.75 x 2 = 1.5
.5 x 2 = 1.0
Hence 20.37510 = 10100.0112
7. Pat has installed internet in his home computer in order to use it for browsing. State three ways in which he
would prevent viruses from infecting the computer. (3 marks)
 Using antivirus software
 Surfing smart e.g. avoid certain sites/ovoid downloading certain attachments
 Use of firewalls to prevent certain attachments/hackers
 Use of complex password to restrict data access
 Scanning downloads
 Enabling the security settings in the browser
8. State the type of error that would occur in data processing for each of the following cases:
a) Entering the number 315 instead of 351 (1 mark)
 Transposition error

b) Entering the text “Kwys” instead of “Keys” (1 mark)

 Transcription error

9. State four factors to consider when selecting an input device for use in a computer room. (4 marks)
 Compatibility with existing system
 Cost of the device

2 FORM 3 END TERM II EXAM -2024


 Extra features in the device
 Purpose of the device
 Nature of data to be captured
 Portability
10. State three functions of Un-Interruptible Power Supply (UPS) (3 marks)
 Stabilizes power
 Stores power
 Alerts user through an alarm system when power is down
11. Distinguish between a page break and a column break as used in a word processor. (3 marks)
 Page breaks marks the end of a page while column page marks the end of a column
 NB accept illustrations
12. State three factors to consider when selecting an operating system to install in a computer. (3 marks)
 Hardware configuration a computer e.. RAM.HDD, and other system requirements
 Type of computer in terms of size and make
 User-friendliness
 Number of users it can support
 Cost
 Applications intended for use in the computer
13. Differentiate between analogue signal and digital signal as used in computers. (2 marks)
 Analog data uses values that change continuously while digital uses values that are descrett

 NB. Accept illustrations


14. Differentiate between filtering and hiding of rows/columns as used in spreadsheets (2 marks)
 Filtering is the process of finding and working with a subset of related worksheet.this will display only the
rows that meet the condition or criteria specified.
 Hiding columns: it the process of making a columnl not be shown on the display or printed when you print the
worksheet. The column is not deleted.
15. a) Define the term computer virus (2 marks)
These are malicious programs that are designed to harm the computer system, data information and programs
b) Give three characteristics of a computer infected by virus. (3 marks)
 files take long to open/ load  Its takes long time to startup or boot
 Disabling pheripheral devices  Files disappearing mysteriously
 Drives not in use getting accessed  Change of file names and space occupied
SECTION B (60 MARKS)
Answer question 16 (compulsory) and any other THREE questions from this section.
16. a) Binary systems have been used to develop most electronic devices. Give three advantages of using binary.
(3 marks)
 It is difficult to develop devices that can understand or process natural languages directly it is easier to
develop electrical circuits based on binary ON/OFF
 All forms of data can be represented in binary system format
 Binary devices are more reliable
 They became smaller in size
 They use less energy
b) Convert the following number systems (6 marks)
i) 37.62510 to binary
Using long division get the binary of 3710 =1001012
get the binary of the decimal by multiplying repeatedly by two i.e 0.625 10=0.1012
Add the binary of the whole number and the decimal
1001012+0.1012=100101.1012

3 FORM 3 END TERM II EXAM -2024


ii) BCD.EF16 to Octal
HEXADECIMAL B C D E F
BINARY 1011 1100 1101 1110 1111
Group In terms of three 101,111,001,101.111,011,110
To octal 5715.7368

iii) 011101002 to decimal


7
0x2 =0 1x24=16 0x21=0
1x26=64 0x23=0 0x20=0
1x25=32 1x22=4 0+64+32+16+0+4+0+0=11610
c) Using twos complement, perform the following arithmetic operation leaving your answer in decimal notation.
(6 marks)
3910 – 1910 add the binary of 3910 to the twos complement of
3910 – 1910 1910
using long division get the binary of:
3910 = 1001112 11101101
1910= 100112 +0100111
write the binary of 1910 in 8-bits 1910= (1)00010100 ignore the overflow
000100112
ones complement of the binary of 1910=11101100 (1x24)+(1x22)=2010
twos complement ones complement =11101101

17. a) A publisher intends to use a desktop publishing programme to create a publication which is to have many
graphics. State three ways in which the graphics may be acquired for this purpose. (3 marks)
 Using digital camera
 Scanning thegraphics from other sources
 Downloading from the Internet
 Drawing/Drawing tools
 Clipart

b) i) Differentiate between a formulae and a function. (2 marks)

Formulae are mathematical expressions that create relationship between values on cells while functions are inbuilt
formulae

ii) Interpret each of the following spreadsheet formula:

=count if (D2:D9,”>” B4) (2 mark)

Count those values in the range D2;D9 with values greater than the value in cell B4

=sumif (B3:B11,”4M”, D3:D11) (2 marks)

Sum the values in the cell range D3;D11 for records whose corresponding values in cell range B3:B11 equals to “4M”

e) i) Define the term database. (2marks)

it is a collection of related data that is organized for ease of access update and retrieval

4 FORM 3 END TERM II EXAM -2024


ii) The following are the fields of products table in a database created to store records of products
manufactured in factory:

State the appropriate data type for each field (4 marks)

 Product number Autonumber/Text


 Product name Text/String
 Price Currency/Number
 Product description Memo/Text/String

18. a) Distinguish between a computer drive and computer driver. (2 marks)


A computer drive is a hardware component that facilitates storage and retrieval of data on a removable
storage device while a computer driver is sets of instructions installed/ incorporated to the operating system
the controls the functionality of their specific peripheral devices.
b) State any four factors to consider when selecting an operating system. (4 marks)
 The hardware configuration of a computer e.g. memory capacity, processor speed and hard disk capacity.
 The type of computer in terms of size and make. For example, some earlier Apple computers would not run on
Microsoft Operating systems
 The application software intended for the computer
 User – friendliness of the operating system
 The documentation available
 The cost of the operating system
 Reliability and security provided by the operating system
 The number of processors and hardware it can support
 The number of users it can support.
c) Define the term file in relation to the operating system. (2 marks)
 This is the smallest unit of data storage in a computer. Every user document in a computer is stored
in files of specified formats depending on the program used to create it.
 Files can also be defined as a collection of related data items given unique name for ease of access,
manipulation and storage.

d) The operating system stores details of a file for easy identification and retrieval of files. Explain any
three file details the operating system uses to search and identify a file. (3 marks)
 A unique name and an optional extension; the name and extension are separated by a period (.).
 The file size
 The date and time the file was created or modified.
 The file type
e) State four types of system software. 4 marks)

 Operating system
 Networking software
 Utility software
 Firmware
19. (a)using place value method convert 4110 in to binary equivalent (4 marks)

26 25 24 23 22 21 20
64 32 16 8 4 2 1

5 FORM 3 END TERM II EXAM -2024


41-32= +9=1
9-16= -7=0
9-8= +1=1
1-4= -3=0
1-2= -1=0
1-1=0=1
1010012

(b) Convert -1710 to binary and leave answer in signed magnitude (4 marks)

2 17 REM
2 8 1
2 4 0
2 2 0
2 1 0
0 1

=(1)10001

(c) Differentiate between online and real time Electronic Data Processing Mode and give example in each
case. (4 marks)

Online data processing-data is processed automatically on a remote computer known as server

Real time- computer processes the incoming data as soon as its occurs and gives an immediate feedback in real
time

(d) State three limitations of electronic data processing. (3 marks)

 Security of data maybe compromised during storage or while on networks if appropriate measures are not
taken
 Lack of legal frameworks in many countries that should support online and distributed electronic
processing activities
 Lack of technical skills among many workers to suport electric data processing.

20. a) Define a computer system (2 marks)


It is a collection of three entities ( software, hardware and liveware) that collectively work together to achieve a stated
goal
b) Explain the components of computer system (6 marks)
 hardware- these are the tangible parts of a computer
 software- these are set of instructions guide the computer on what to perform
 liveware- this is the user of the computer

c) Diffferentiate between impact printers and non impact printers (4 marks)


Impact printers Non impact printers
Use ink ribbons Use ink catilages

6 FORM 3 END TERM II EXAM -2024


They are expensive to acquire Cheap to acquire
High maintenance cost Low maintenance cost
Produce a lot of noise Produce little noise
Low quality printout High quality printout

d) State and explain the type of scanners used in point of sale terminals (3 marks)
Optical barcode reader- they are used to read barecodes on items which identify the items uniquely

7 FORM 3 END TERM II EXAM -2024

You might also like