Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

QUESTION# Suggested solutions PAPER 2 Mark

Allocation
1. i. a A computer generation is an era or period in the history of computers 2mks
characterized by a major technological development that
fundamentally changed the way computers operate.
b 3mks
Generation Technology
2nd Transistors
5th Artificial Intelligent or Ultra Large Scale Integrated Circuit
st
1 Vacuum tube

c Low-level programming was introduce in the 1st generation of 1mk


computers.

ii. a Sequential construct: Line 1- Line 9 or Line 1-Line 4 or Line 7-Line (Correct construct
9 1mk
Correct range
Looping or Iteration or Repetitive construct: Line 4 – Line 7 1mk) * 2

b X counter P 4mks
5 1 /
5 2 6
5 3 7
5 4 8
5 5 9
5 6 10
INPUT: This algorithm takes a positive whole number 3mks
Processing: Doubles it
Output: Prints(Displays) the result
c.
Start
Start and stop
1mk
GET X
While loop 1mk

Counter = 1 Process diagram


of P= X+counter
and Counter
Counter <=X? 1mks

Input X and
DISPLAY P P = X+ Counter Output P 1mk
Counter = Counter + 1

Stop Counter=counter + 1

1
2 i. a Primary storage device is a device that is in direct contact with the 2+1 mks
. CPU and holds data that are currently in used by the CPU.
Example Register, RAM, cache, ROM
Secondary storage device is a device that is not in direct contact 2+1 mks
The CPU and holds data for future used
Example Hard drive, USB Key, Compact Disc etc
An I/O device is a device that can be used to get data into and process 1+1 mks
data out of a system at the same time.
Example: Touch screen,
i a 1 1 0 1 1 0 1 3mks
i . - 1 1 1 0
1 0 1 1 1 1 1

2mks
1 0 1 1 1 0 1
+ 1 1 0 0
1 1 0 1 0 0 1

ii. a. Number of Fields: 5 Number of Records: 3 2mks

b. StudentId because nor two students can have the same ID 2mks
c. NO, because StudentID= 067 as a primary key already exist in the tabel 2mks
Yes, because no student yet have the primary key StudentID= 066 2mks
3 i. a. Efficiency: Software should not make wasteful use of system State: 1mk
resources such as memory and processor cycles. Correct
Maintainability: Software should be written such that it can evolve Explanation:
to meet the changing needs of customers. 1mk
Reliability: Failures should be as rare as possible.
Accuracy: Software should always output the correct results. Maximum 2
Portability: Software should be able to run on different environments
from which it was created without modification
Reusability: The software should be such that it can easily be used to
create other software
Usability: Users should be able to learn and use the software
b. Difference: 2mk
System Software Application Software
System software are software that Application software are software
control and coordinate computer designed to perform specific
resources so that the computer tasks for end-users. Examples 1*2
user and applications can mks
smoothly interact.

2
Example: Operating system, Example: Word Processing
Device drivers, Language software, Spreadsheet software,
translators, Utility software, Database software(Or
Library programs etc. DBMS),Presentation software,
etc.

ii. a. A user interface is the means of communication or interaction 2mks


between the user and a system( e.g. Computer system)

b. Command Line Interface: State: 1*2 mks


A command line interface (CLI) allows the user to interact with a
system by typing the commands in a command prompt. Explanation:
1*2mks
Graphical User Interface: A graphical user interface allows the user
to interact with a system by selecting and clicking on graphical items
such as icons, menus, dialog boxes, etc.

c. Operating system 1mk


iii. a. A programming paradigm is a programming languages’ approach to 2mks
solving a problem.
b. Procedural programming: You define the whole process and
provide the steps on how to do it.
Declarative language: You state what is to be done while the system 2mks
figures out how to do it.
c.  Python, Java, C++, C#, JavaScript etc. Any 1: 1mk
4 i. a. - Reduced costs through sharing of peripherals and internet 1*3 mks
access
- Staff can share information and get in touch more easily
- Centralized Administration
- Centralized Storage and Backups

b. Hub – A hub will act as central connecting point for the computers in State 1*3mks
a network
Switch – Forward packets(messages) to the different branches
Repeater -Amplify or regenerate signals so that they can be Role: 1*3mks
transmitted onward to their destinations in their original strength and
form.
Transmission media – Used to link the computers in the different
branches

3
c. Parallel Transmission Serial Transmission
Serial transmission is the method of Parallel transmission is the
transferring data one bit at a time method of transferring
through the same channel. several bits(usually 8 bits)
at the same time over
separate channels
1+1 mk

1+1mk

4 ii. a. An information system is a set of interrelated components that collect


and process data to produce information. 2mks

b. Validation Verification 4mks


Validation is a check on input Verification is a check on input data
data to ensure that the data is against the source to ensure that it has
sensible or reasonable. been entered correctly
Example: length check, range Example: Proofreading, Double entry,
check, presence check parity check
iii Parallel conversion: because new systems are verified before the old 2marks
one are taken out or
Plunge conversion because it is the fastest method to replace all
computers
5 i. a. 2 input variables 1mks

b.
3mks
(Any correct
output 1mk)

5 i. c. A B AB A+B + 4mks
0 1 0 1 1 1 1mk per column
1 1 1 0 1 1
0 0 0 1 0 1
1 0 0 1 1 1

ii. a. 011101012 = 1658 2mks


Show working

4
b. 011101012 =12110 2mks
Show working

c. 011101012 = 75BCD 2mks


Show working

iii. a. Computer system security is the process of preventing and detecting 2mks
the unauthorized use of computer systems.
b. Confidentiality ensures that unauthorized persons do not have access 1mk
information.

Or it ensures that information is kept secret or private.


Authentication is the process of determining if someone is who they 1mk
declare to be
Integrity ensures that unauthorized persons do not alter information in 1mk
a way that is not detectable by authorized users.

Encryption is the process of transforming a message using an 1mk


algorithm into a form unreadable by anyone except the intended
recipient.
Password is a secret word or phrase used to get access to a system 1mk

6. i. a. Dell laptop because the actual processor speed is 2*2=4 GHz which is 1+1 marks
greater than 3 Ghz of HP

b. Dell Laptop because it has a read and write reader for DVD and CD i.e RW 1+1 marks
c. Dell laptop 1mk
Has high storage capacity/has high speed/capable of backing up
data on DVD or CD 1mark
ii. a. An internet service is a service that is provided only through the internet.
i.e. this service is not available without the internet 2mks

b. - Email 1*3mks
- WWW
- E-Commerce Any 3 excluding
- internet telephony social media
- online banking

c. Cloud storage allows you to save data and files in an off-site


location that you access either through the internet or via a 2mks
dedicated private network connection. Or nothing

5
ii. a. An internet service is a service that is only provided through the
internet.
2mks
I.e. Without the internet, access to these services is not possible.

b. World Wide Web, Electronic mail, Electronic commerce, Internet 1*3mks


telephony, online banking etc Any 3

c.

Advantages of Social Disadvantages of Social


Media in Education Media in Education
- Research - Social media can be
a distraction to
students

- Easy communication - Cyber bullying

- Increased student – - Distribution of


student inappropriate
collaboration contents on the
social media 1*4mks

- Increased student – - Etc.


teacher
collaboration
- Sharing of information
and course contents is
easy

- Social media can help


students to stay
updated, which help in
their career
development.
- Etc.

6
iii. a.

1GB  1024 MB

5GB  X MB
2mks
X= 5*1024MB

X= 5120MB

b.

700 MB  1 CD

5120 MB  X 3mks

X*700 = 5120
X= 5120/700 = 7.314≈8 CDs
Therefore 8 CDs of size 700MB each are required to store a file of size
5GB
i a. The critical path is a sequence of tasks that determine the earliest 1mk
possible completion date of a project.
7.
b. B -> C -> D 1mk
Since the sum of the durations of the tasks on the critical path give the 2mks
duration of the project,

Duration=2+1+4=7 Weeks
c. Duration of project in weeks=7 weeks
2 marks
Duration of project in days = 7*7=49 Days

Earliest completion date=2nd March + 48 days = 19th April 2021


ii. a. Implementation is the conversion from the use of the present (old) system 2mks
to the operation of the new

b. Phased or Piecemeal implementation 1mk

Advantage 1mk

- It allows users to gradually get used to the new system Any 1


- Training of staff can be done in stages

7
c. - Installation of new system 1*2mks
- Loading of data into new system
- Educating and training of the users of the system Any 2

iii. a. A file format is a particular way that data is encoded for storage in a 2mks
7 computer file.

b. JPEG or JPG : Joint Photographic Experts Group


2mks
All or nothing
HTML : Hypertext Markup Language 2mks
All or nothing

c.
1*2mks
File Folder
File name contains an Folder name does not contain
extension an extension Any 2
A file cannot contain A folder can contain another
another file or folder file or folder.
A file can be sent A folder cannot be sent
directly as an email directly as an email
attachment attachment

PAPER ONE
1 D 11 B 21 A 31 B 41 A
2 B 12 D 22 C 32 C 42 D
3 D 13 B 23 D 33 B 43 A
4 C 14 C 24 C 34 B 44 C
5 C 15 C 25 D 35 D 45 D
6 B 16 B 26 C 36 C 46 B
7 C 17 D 27 C 37 B 47 A
8 A 18 B 28 A 38 A 48 A
9 B 19 D 29 D 39 D 49 C
10 D 20 C 30 C 40 D 50 C

8
PAPER 3
SECTION SOLUTION MARK
ALLOCATION
SECTION 1: 1. Any correct version 1mk
WORD

2. Top margin= 2.5cm 0.5*4mks


Bottom margin=2.5cm
Left margin=2.5 cm
Right margin= 2.5 cm

3. Correct Header 3mks

Image
Presence of image Anywhere: 1mk

Image in right
position: 2mks
4 Subject: Arial bold 1mk

Font size: 13 points 1mk

Alignment: Centered 1mk


5 1mk
Any drop cap:

Correct drop cap in correct 2mks


6 Body Any 2
- Times New Roman 2mks
- Font size 12
- Alignment: Justified

7 Correct comment wrong position 1mk

Correct comment correct position


2mks

8 Last paragraph displayed in 3 columns 2mks or Nothing

9
9 1mk
Use word count feature

Any correct word count

SECTION 2 1. 1*3mks
Any 4 correct columns=1mk

2. Correct merge: D1:G1 1mk

3. =CONCATENATE(B4," ",C4)
2mks
Or
=CONCATENATE(B4,C4) provided it works
well

Any Autofill 1mk

4. Column D width: 12.86cm


2mks

5. G4=PRODUCT(E4,$B$12) 1mk
Autofill 1mk

6. H4=PRODUCT(F4,$B$13)
1mk

Autofill 1mk

7. J4=PRODUCT(I4,$B$14) 2mks

8. J4= =RANK(J6,$J$4:$J$8) Correct formula


2mks

10
9. L4=IF(J4<50,"FailED","Pass") 2mks

10.Column L: Failed text in red by conditional 1mk


formatting

TASK III 1. 2mks


Correct code in correct environment

2. Output: 5 1mk

Output: 60 1mk

3. Input: The algorithm takes 5 integers from


the user 1mks

Processing: The program manipulates the 5 2mks


inputs to get the largest.
Output: The program displays the largest to
the user. 1mk

4. Constructs
- Sequential 1mk
- Loop (or Iterarion) All or nothing
- Selection(Or branching )

Line 4 represents a single line comment


1mk

11

You might also like