MARKING SCHEME
COMPUTER STUDIES PAPER 1
FORM FOUR
1. State two objectives of normalization in Databases
Eliminates redundant data in the database
Minimize data modification errors
Simplify the query process
Award 1 mark each max 2
2. Give three qualities of a good system analyst
Good problem solving skills
Innovative and creative
Good communication skills
Technical skills
Good interpersonal skills
Team player
Award 1 mark each max 3
3. Explain how data in a computer system can be secured using
(i) Security monitors
Involve the use of hardware and software that monitor and keep track of all the activities
performed using computer systems therefore unauthorized users will not gain access to the
system
(ii) Biometric systems
Involve the use of human body attributes which are unique to authenticate users
Award 1 mark each max 2
4.
(i) Name two inputs devices that may be used as output devices
Touch screen
Interactive Whiteboard
Award 1 mark each max 2
(ii) Give two limitations of voice input devices
Speaker variability
Homophones
Limited vocabularies
Interference from the background
Award 1 mark each max 2
5. Why is fibre optic more secure than Twisted pair and coaxial cables
Data signals in fibre optic is in form of light which is very difficult to tap
Award 1 mark max 1
1
6. State the function of the following features of a DTP publication window
(i) Pasteboard
A large blank area where you can place text and graphical objects before arranging them
neatly on the printable area
(ii) Master page
Used to design a general layout that needs to be applied in all other pages of the publication
Award 2 marks each max 4
7. Mention two effects of shutting down a computer using the wrong procedure
Leads to data loss
Damage to computer programs
Crashing of the hard disk
Award 1 mark each max 2
8. Levine is a System Analyst working with Victoria International Agencies. Levine was requested to
develop a new information system to replace the current system in a stakeholder’s meeting chaired
by the General Manager. Give three reasons to justify why the organization is in need of a new
system yet there is one in place
New opportunities – a chance to improve the quality of internal processes and service delivery
which cannot be supported by the current system
Problems- the current system may present undesirable circumstances that prevent the
organization from meeting its goals
Directives – the new requirements imposed by the management, government or external
influences thus the need to change the current system
Invention of new systems – they are more successful than the current system
The management may identify an area of poor performance which increases the level of
indirect expenses thus the need to change the current system.
Award 1 mark each max 3
9. Mention three disadvantages of GUI based operating systems
Require a lot of computer memory
Slower and require more power compared to CLI
Lack of flexibility – the user has within its restrictions and can’t change its functionality
More expensive
Award 1 mark each max 3
10. Nairobi University ICT hub developed an Expert system to help in disease diagnosis. Describe
three main components that developers must incorporate in this system to make it mimic human
experts
User interface- this is the display screen that enable the user to interact with the system
Inference engine- it is a search tool used to get information from the knowledge base
Knowledge base – it is a database of knowledge in a particular field of study
Award 1 mark each max 3
11. Computer network technicians prefer to use command line based Operating systems when configuring
networks. State three reasons for the preference
Work well with monitors of low resolutions
Require limited space
Run very fast
Its secure
Remote access - Consumes fewer networking resources
Award 1 mark each max 3
2
12. Explain the following limitations of Networking
(a) Over reliance
Organizations that purely rely on network to support their functions may suffer a great loss
when there is a network failure
(b) Data security n
Data held in network is always under constant security threats which may be inform of illegal
access, theft of data or tapping by unauthorized persons during transmission
Award 2marks each max 4
13. Give two reasons for extensive use of Electronic Fund Transfer in modern society
Service flexibility
Diligent
Wide coverage
Instant feedback
Speedy transaction
Security
Award 1 mark each max 2
14. State two ways of solving printing problem like lack of two way communication
Reinstall the printer
Select the correct printer
Ensure the printer is on and correctly connected using the data cable
Award 1 mark each max 2
15. Describe two challenges associated with the use of internet services like blogs, social media
networks and instant messaging
Spread of malicious software
Security and privacy
Access to inappropriate content
Award 1 mark each max 2
3
16.
(i) What is test data as used in programming environment
It is a set of inputs that are used to verify the correctness, performance, and reliability of a
program
Award 2 marks max2
(ii) State three ways employed by computer programmers to make the program code easier to
understand and follow
Use of comments within the codes
Code indentation
Use clear variable names
Break the codes into smaller function
Award 1 mark each max 3
(iii) Describe a situation where a loop would be useful when writing a program code
It is preferred when a give block of code is to be executed again and again until a condition is
met
Award 2 mark max 2
(iv) Study the pseudo code below and use it draw a flow chart that will represent in all aspects
1. Start
2. Count =1
3. Average =0
4. For Count =1 to 5 Do
5. Enter Mark1, Mark 2, Mark 3, Mark 4
6. Get the sum
7. Compute Average
8. Is average greater than or equal 50
9. Print Pass
10. Else
11. Output Fail
12. Average =average +Average
13. Count=count +1
14. Endfor
15. Mean score=Average/count
16. Stop
4
Start
Count =1
Average=0
Count<5 No
yes
Enter Mean Score=Average/count
M1.M2,M3,M4
Sum=M1+M2+M3+M4
Average =sum/4 Stop
No Yes
Average>50
Fail Pass
Average=Average + Average
Count=count+1
Start/stop =1mark
Initialization= ½mark
First Condition = ½mark
Input M1,M2,M3 and M4 = ½mark
Process sum and Average =1mark
Second condition = ½mark
Output fail and pass= 1mark
Increment count and average =1mark
Process Mean score 1mark
Logic = 1mark
5
17.
(i) Perform the following number system conversion
(a) 19.187510 to Binary
2 19
2 9 Rem 1 0.1875x2= 0.375 Fraction part ½mark
2 4 Rem 1 0.375 x 2 = 0.75 Whole number part ½mark
2 2 Rem 0 0,75 x 2 = 1.5 Answer 1mark
2 1 Rem 0 0.5 x 2 = 1.0
0 Rem 1
Combine the fraction part and the whole number part
10011+0.0011 = 10011.00112
6
(b) AB16 to Octal
A = 1010 Assigning A and B Binary equivalent = ½mark
B = 1011 Grouping binary bits = ½mark
10 101 011 Answer =1mark
2 5 3
2538
(ii) Perform the twos complement on 1310 -2310, leaving your answer in decimal number system
2 23 2 13
2 11 Rem1Conversion2of 613Remand123 = 1mark
2 5 Rem11c and 2c 2=1mark3 Rem 0
2 2 Rem1Adding 2c of 2 23 to 131= 1 mark
1 Rem
2 1 Rem0 Answer -10 = 1mark
0 Rem 1
0 Rem1
23 = 10111 13 =1101
01000 ........ 1c
01001 ......... 2c
+ 1101
10110
Recompliment 10110 = 01001 +
1
01010
-1010
(iii) Describe three challenges affecting electronic information processing
Threats to data security
Lack of legal framework to support electronic processing activities
Lack of ICT skills Award 1 mark each max 3
(iv) Most organizations today are migrating from manual file system to computerized filling system
so as to have a competitive advantages in discharging their functions. State four advantages of
adopting this innovation
It enhances security of data
Enhances data integrity and reduces duplication
Offer fast access and retrieval of data
Much easier to update and modify
Information take less space
Award 1 mark each max 4
18.
(i) Give four command buttons from Picture tools used to make an image more visually appealing
Adjust
Picture style
7
Arrange
Size
Award 1 mark each max 4
(ii) List four types of mail merge documents
Letters
Envelopes
Mailing labels
Catalogues
E-mail messages
Award 1 mark each max 4
(iii) Briefly describe the following features of Microsoft Excel screen layout
(a) Formula bar
A textbox in which a cell entry or a formula is displayed during typing or editing of cell
content
(b) Name Box
Used to display the cell address or name of the selected cells or range
Award 2 marks each max 4
(iv) Describe three data management features supported by Microsoft Excel
Sorting- arranging data items a particular order
Filtering –It is quick and easy way of finding and working with a subset of related worksheets
Validation –A facility that restrict invalid data entry in a cell
Subtotal and Grand total- used to summarize a worksheet list to display grouped subtotal and
grand totals
Award 1 mark each max 3
19.
(i) Mention three functions of a form in a database
Links the user with the database
Make data entries in the underlying tables
View data
Award 1 mark each max 3
(ii) Use an example to explain the following data types as used in DBMS
(a) Calculated
This data types is used to store data created from a formula. For example a field total can be set
to calculated if the data stored in it comes from unit cost and quantity [Unit cost]*[quantity]
(b) Yes/No
This is a logical data type for an entry that is yes or no, true or false. For example a field may
require you to answer whether you are a male or female
Award 2 marks each max 4
(iii) Describe the types of relationships depicted by the diagram below
(a)
8
One –to – one relationship – this indicates that one record in the people’s table corresponds to
only bone record in the drivers licenses table
(b)
One – to – many relationship – it indicates that one record in the city’s table corresponds to
many records in the customers table.
Award 2marks each max 4
(iv) The table below is an extract from a database table use it to answer the questions that follows
Product Code Product Name Date of Birth Unit cost Quantity Total
01001101 Maize 02/03/2002 2000 10 20000
01223030 Millet 12/12/2002 1000 20 20000
10239345 Wallet 03/09/2005 100 10 1000
19019001 Sweet 09/09/2006 1000 5 5000
(a) Write an input mask that will display the product names as represented in the table
>L<??????????????
Award 2 marks max 2
(b) Set a validation rule in the date of Birth column to
Restrict entries of future dates
<=Date() – The date must be today or earlier date but cannot allow future date
Accept year of Birth between 2002 and 2006
>=#01/01/2002# AND <#31/12/2006#
Award 1 mark each max
20.
(a) Explain the following terms as used in Data security
(i) Exploits
An exploit is a program, or piece of code, designed to find and take advantage of a security flaw
or vulnerability in an application or computer system, typically for malicious purposes such as
installing malware.
(ii) Intellectual property right
Intellectual property rights are the rights given to persons over the creations of their minds.
They usually give the creator an exclusive right over the use of his/her creation for a certain
period of time.
Award 2 marks each max 4
(b) State five measure against theft that school managers need to impose to safeguard their
computer laboratories
Employ security personnel
Reinforce weak access points like windows and doors using grilled doors
9
Insure the hardware resource
Motivate workers
Install alarm systems
Install cctv camera
Use Biometric system to access computer room
Use door that are opened using swipe cards
Award 1 mark each max 5
(c) Give three reasons for the adoption of e-commerce platform by most businesses
No reach limitation
Product and price comparison
Flexibility for customers
Affordable advertising and marketing
Cost reduction
Award 1 mark each max 3
(d) Mention three factors to consider when choosing an ISP
Cost
Speed
Connection Reliability
Customer support
Type of connection
Award 1 mark each max 3
10