Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

STUDENTS’ NAME: _______________________________ FORM 2

NORTHERN EDUCATION DIVISION


2024 JUNIOR CERTIFICATE MOCK EXAMINATIONS

COMPUTER STUDIES MARKING SCHEME


(100 marks)

Monday, 25th March Subject Number: J039


Time Allowed: 2 hours
1:30 – 3:30 pm

Section A (20 marks)


Answer all the twenty questions in this section by encircling the letter representing the correct answer to
the question.

1. D- Margin 12. C – Flash disk


2. B- Toolbar 13. B – Special Purpose Computers
3. B – Ctrl+E 14. C – Portrait
4. C – Motherboard 15. C – Cursor
5. A – Byte 16. C – Title bar
6. C - Subscript 17. A – Slide View
7. B - Information 18. C – Overcrowding
8. D - Modem 19. D – Primary and Secondary
9. B. Central Processing Unit
20. D – Add more notes that could not fit on a
10. C - Projector
11. B - Software slide

Section B (50 marks)


Answer all the questions in this section in the spaces provided.
21. a. What are computer ports?
Physical or virtual interface on a computer that allows it to connect to other devices or peripherals
(1 mark)
b. The figure below shows a desktop computer. Use it to answer the questions that follow.
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 2 of 9 J039

a. Name the ports labelled A, B and C


i. A - VGA port iii. C - Ethernet port
ii. B - USB port
(3 marks)
b. State the function of ports labelled A and C.
i. A – Connects a computer to a display unit/monitor/projector
ii. C – Connects the computer to internet using ethernet cable
(2 marks)
c. State any two devices that can be connected through port labelled B.
i. Flash disk
ii. Keyboard
iii. Mouse (2 marks)
22. a. What are network devices?
Network devices are physical or virtual components used to facilitate communication and data
transmission within a computer network (2 marks)
b. Mention any two network devices?
i. Router v. Modem
ii. Hub vi. Access Point
iii. Switch vii. Firewall
iv. Network Interface Card
(2 marks)
c. Why is the significance of POST?
i. Hardware Integrity Check: POST checks the integrity of critical hardware components such as
the CPU (Central Processing Unit), RAM (Random Access Memory), storage drives, graphics
card, and other essential peripherals. It ensures that these components are functioning properly
and are correctly detected by the system.
ii. Early Detection of Hardware Issues: POST helps to identify any potential hardware failures or
issues that may have occurred since the last boot. By performing diagnostic tests on hardware
components during startup, POST can detect faults such as faulty RAM modules, malfunctioning
storage drives, or loose connections, allowing users to address them before they cause more
significant problems.
iii. System Stability: A successful POST ensures that the hardware components are in a stable state
before the operating system is loaded. This helps prevent unexpected crashes, system errors, and
data loss that may occur due to faulty hardware.
iv. Compatibility Checking: POST verifies the compatibility of installed hardware components with
the system's firmware and ensures that they are recognized and configured correctly. It checks
for any conflicts or inconsistencies that may arise from incompatible hardware configurations.
v. Error Reporting: If any issues are detected during the POST process, the BIOS or UEFI
firmware typically generates error codes or messages to indicate the nature of the problem.
These error codes help users and technicians diagnose and troubleshoot hardware problems
more effectively.
vi. Security: In some cases, POST may include security checks to verify the integrity of the system's
firmware and detect any unauthorized modifications or tampering attempts. This helps enhance
the security of the system and protect against malware attacks that target the boot process.
(2 marks)
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 3 of 9 J039

23. a. Define the term page orientation?


Page orientation refers to the orientation of the content on a printed or digital page in relation to its
width and height (1 mark)
b. Explain the two kinds of page orientation.
i. Portrait Orientation: In portrait orientation, the height of the page is greater than its width.
This means that the page is taller than it is wide.
ii. Landscape Orientation: In landscape orientation, the width of the page is greater than its
height. This means that the page is wider than it is tall.
(4 marks)
24. a. What is booting?
Refers to the process of starting up a computer system and loading its operating system (OS) into
memory so that the computer becomes functional and ready to use (1 mark)
b. Differentiate cold booting from warm booting?
i. Cold booting refers to starting a computer system from a completely powered-off state while
warm booting, also known as a soft reboot or a restart, refers to restarting a computer system
without completely powering it off.
ii. During a cold boot, the computer's power is turned off, and all system components lose power
while during a warm boot, the computer's power remains on, but the operating system is
restarted
iii. Cold booting typically takes longer than warm booting because the system needs to perform a
full initialization of hardware components and load the operating system from scratch while
warm booting skips some steps in the boot process, such as the BIOS/UEFI initialization and
POST.
(2 marks)
25. a. Explain how the following can be prevented or minimised when using a computer.
i. Wrist strain
a. Using standard furnisher
b. Taking some regular short breaks
c. Avoid prolonged use of computer
(2 marks)
ii. Eye strain
a. Proper adjustment of screen c. Taking some short breaks in
brightness between
b. Using ant-grey d. Avoiding prolonged use of
screens/monitors computers
(2 marks)
b. Give any one reasons why is it important to check the properties of a computer system
i. Identifying Hardware Issues: Regular system checks can help identify hardware problems such
as failing hard drives, overheating components, or malfunctioning RAM modules. Addressing
these issues promptly can prevent system crashes, data loss, and hardware damage.
ii. Ensuring System Performance: Checking system performance metrics such as CPU usage,
memory usage, and disk space can help identify bottlenecks and performance issues. Optimizing
system performance can improve efficiency and productivity.
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 4 of 9 J039

iii. Detecting Software Problems: System checks can help identify software issues such as
incompatible drivers, corrupted files, or malware infections. Detecting and resolving these issues
promptly can prevent system instability, crashes, and security vulnerabilities.

iv. Maintaining Security: Regular system checks can help ensure that security software such as
antivirus programs, firewalls, and system updates are up to date. This helps protect the system
against security threats such as viruses, malware, and unauthorized access.

v. Preventing Data Loss: Checking backup systems and verifying data integrity can help prevent
data loss in the event of hardware failure, software corruption, or other unforeseen
circumstances. Regular backups ensure that critical data is protected and can be restored if
needed.

vi. Optimizing Resource Usage: Monitoring resource usage and managing background processes
can help optimize system resources such as CPU, memory, and disk space. This ensures that
resources are allocated efficiently and prevents system slowdowns or crashes due to resource
exhaustion.

vii. Compliance and Auditing: For organizations, regular system checks help ensure compliance
with regulatory requirements and internal policies. Auditing system configurations, user access
controls, and security settings helps maintain a secure and compliant computing environment.
(1 mark)
26. a. Why is it important to put a user password on computers
i. Protect the computer from unauthorised use
ii. Protects computer resources
(1 mark)
b. Outline the steps in unprotecting a word document.
i. Click on file (Office button)
ii. The info
iii. Protect/Unprotect Document
iv. Enter the password and press ok
(4 marks)
27. a. Name any two views present in Ms Word?
i. Reading View/Mode iii. Print Layout (View)
ii. Normal View iv. Web Layout (View)
(2 marks)
b. State any two factors to consider when choosing a printer.
i. Print speed iii. Print technology (LaserJet/Inkjet
ii. Printout colour iv. Printer main use
(2 marks)
c. Differentiate transitions from animations as used in PowerPoint presentation.
i. Transitions are effects applied to slide transitions, controlling how one slide transitions to
the next during a presentation while animations are effects applied to individual elements
within a slide, such as text, images, shapes, or other objects
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 5 of 9 J039

ii. They are used to add visual interest and create smooth, professional-looking transitions
between slides while they are used to add movement or visual effects to specific elements on
a slide, making them appear, disappear, or move in various ways during the presentation.
iii. Transitions can include effects such as fades, wipes, slides, or zooms, among others while
animations can include entrance effects (how an object appears on the slide), emphasis
effects (highlighting or drawing attention to an object), exit effects (how an object disappears
from the slide), and motion paths (movement of an object along a specified path).
iv. Transitions are typically applied to the entire slide and affect the transition between one slide
and the next while animations are applied to individual objects or elements on a slide and
can be customized to control the timing, duration, and order of animation effects.
2 marks)
28. a. State any two effects of viruses on computers.
i. May lead to software loss iii. Lead to hardware failure
ii. Lead to data loss iv. Slows down computer operations
(2 marks)
b. Explain the importance of an antivirus in a computer.
Helps to protect computers from being affected by vireses
(2 marks)
29. Explain the impact of computers on the following;
a. Environment
Poor computer waste disposal affects the environment/pollution/emission of harmful gases
(2 marks)
b. Education
i. e-learning iii. digital libraries
ii. helps in teaching and learning
(2 marks)
c. Culture
i. how people communicate, work, create, and interact with information
ii. loss of cultural and traditional values
(2 marks)
30. Briefly explain how you can insert a header in a word document.
i. Go to insert, choose inset header, type the header and click close or just double click outside the
header field
ii. Double click on the very top of the page, type the header, click close or double click anywhere
outside the header field
(3 marks)
Section C (30 marks)
Answer all the three questions in this section in the spaces provided
31. a. Explain any one advantage of using mail merge.
i. Personalization: Mail merge allows users to create personalized documents, such as letters,
emails, or labels, by automatically inserting individualized information from a data source into a
template. This enables organizations to address recipients by name and tailor content to their
specific needs or preferences, increasing engagement and relevance.
ii. Time Efficiency: Mail merge can save time and effort by automating the process of generating
multiple documents with similar content but different data. Instead of manually creating each
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 6 of 9 J039

document separately, users can create a single template and merge it with a data source to
produce multiple personalized documents quickly and efficiently.
iii. Accuracy: Mail merge reduces the risk of errors and inconsistencies that may occur when
manually entering data into documents. By pulling information directly from a data source, such
as a spreadsheet or database, mail merge ensures that the information is accurate and up to
date, minimizing the chances of typos, misspellings, or data entry mistakes.
iv. Consistency: Mail merge helps maintain consistency across multiple documents by using a
single template as the basis for all merged documents. This ensures that all documents have a
consistent layout, formatting, and branding, enhancing professionalism and brand identity.
v. Scalability: Mail merge is scalable and can be used to generate large numbers of personalized
documents efficiently. Whether sending hundreds of personalized letters to customers, generating
customized invoices for clients, or printing individualized labels for mailing lists, mail merge can
handle large volumes of data and documents with ease.
vi. Flexibility: Mail merge offers flexibility in terms of the types of documents that can be created
and the data sources that can be used. Users can merge templates with various types of data
sources, including spreadsheets, databases, and contact lists, to create a wide range of
personalized documents for different purposes, such as marketing campaigns, customer
communications, or administrative tasks.
vii. Streamlined Communication: Mail merge streamlines communication processes by automating
the creation and distribution of personalized documents. Whether sending promotional emails to
a mailing list, generating personalized letters for fundraising campaigns, or creating
individualized certificates for event attendees, mail merge simplifies the process of reaching out
to recipients with targeted messages.
(2 marks)
b. Briefly describe the process of mail merging.
i. Create Your Document Template:
a. Open Microsoft Word and create a new document.
b. Design your document template, including any static text, graphics, or formatting that
you want to appear in all merged documents.
c. Insert placeholders (known as merge fields) where you want the personalized information
from your data source to appear. These merge fields will be replaced with data from your
data source during the merge process.
ii. Start the Mail Merge Wizard:
a. In Microsoft Word, navigate to the "Mailings" tab on the ribbon.
b. Click on the "Start Mail Merge" button and select the type of document you want to
create (e.g., letters, emails, labels).
c. Choose the option to "Step-by-Step Mail Merge Wizard" to guide you through the
process.
iii. Select Your Data Source:
a. In the Mail Merge Wizard, select the option to use an existing data source.
b. Browse for and select your data source file (e.g., Excel spreadsheet).
c. Confirm the worksheet or table within the data source that contains the information you
want to merge.
iv. Insert Merge Fields:
a. In your document template, place the cursor where you want to insert merge fields.
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 7 of 9 J039

b. Click on the "Insert Merge Field" button in the Mail Merge Wizard.
c. Select the fields from your data source that you want to insert into the document. These
fields will be replaced with actual data during the merge process.
v. Preview and Complete the Merge:
a. Preview your merged documents to ensure that the merge fields are correctly populated
with data from your data source.
b. Use the Mail Merge Wizard to navigate through the merged documents and make any
necessary adjustments.
c. Once you are satisfied with the preview, complete the merge process to generate the final
merged documents.
vi. Save and Distribute:
a. Save your merged documents to your desired location.
b. Depending on the type of document you created, you can print them, save them as
individual files, or send them directly via email.
NB: The steps could be written differently provided they explain the process in chronological
order and completes the whole mail merge process
(8 marks)
32. Describe any five factors you would consider when preparing a presentation.
i. Audience Analysis: Understand your audience's demographics, interests, knowledge level, and
expectations. Tailor your content, tone, and delivery style to resonate with your audience and
address their specific needs and interests.
ii. Purpose and Objectives: Clearly define the purpose of your presentation and identify specific
objectives you want to achieve. Determine what key messages you want to convey and what
actions or decisions you want your audience to take as a result of your presentation.
iii. Content Structure: Organize your content in a logical and coherent structure that flows
smoothly from introduction to conclusion. Use clear headings, subheadings, and bullet points to
outline main ideas and key points. Ensure that your content is well-organized and easy to follow.
iv. Visual Design: Choose appropriate visuals, such as slides, images, charts, graphs, and
multimedia, to enhance your presentation and reinforce key messages. Use consistent branding,
color schemes, fonts, and formatting to create a professional and visually appealing design.
v. Engagement Techniques: Incorporate engaging techniques to capture and maintain your
audience's attention throughout the presentation. Use storytelling, anecdotes, examples,
questions, polls, and interactive elements to make your presentation memorable and impactful.
vi. Delivery Style: Practice and refine your delivery style to ensure clarity, confidence, and
authenticity. Pay attention to your tone of voice, body language, gestures, and eye contact. Speak
clearly and at an appropriate pace, and be prepared to adapt your delivery based on audience
reactions and feedback.
vii. Technology and Equipment: Familiarize yourself with the technology and equipment you'll be
using during the presentation, such as presentation software, audiovisual equipment, and remote
control devices. Test your equipment beforehand to ensure everything is working properly and
troubleshoot any potential issues.
viii. Timing and Pace: Manage your time effectively to cover all key points within the allotted time
frame. Practice pacing your delivery and allow time for transitions, audience interaction, and
Q&A sessions. Be mindful of time constraints and avoid rushing through your presentation or
exceeding your allotted time.
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 8 of 9 J039

ix. Feedback and Evaluation: Solicit feedback from colleagues, mentors, or trusted individuals to
review your presentation and provide constructive criticism. Incorporate feedback to refine and
improve your presentation content, delivery, and effectiveness.
x. Contingency Planning: Anticipate potential challenges or disruptions that may arise during the
presentation, such as technical issues, distractions, or unexpected questions. Develop
contingency plans to address these challenges effectively and maintain composure and
professionalism.
(10 marks)
33. Describe any five functions of an operating system (OS).
i. Process Management:The OS manages processes, which are programs or tasks running on the
computer. It allocates system resources (CPU time, memory, and I/O devices) to processes,
schedules their execution, and provides mechanisms for inter-process communication and
synchronization.
ii. Memory Management:The OS manages system memory (RAM) by allocating memory to
processes, ensuring efficient use of available memory, and providing mechanisms for virtual
memory management (swapping data between RAM and disk storage) to extend available
memory capacity.
iii. File System Management: The OS manages file systems, which organize and store data on
storage devices such as hard drives, SSDs, and external storage. It provides file management
operations such as creating, reading, writing, deleting, and organizing files and directories, as
well as ensuring data integrity and security.
iv. Device Management: The OS manages input/output (I/O) devices such as keyboards, mice,
monitors, printers, storage devices, and network interfaces. It provides device drivers to
interface with hardware devices, handles device initialization and configuration, and
coordinates data transfer between devices and processes.
v. User Interface: The OS provides a user interface (UI) that allows users to interact with the
computer system. This can include command-line interfaces (CLI), graphical user interfaces
(GUI), or touch-based interfaces, depending on the OS and user preferences. The UI provides
access to system resources, applications, and settings.
vi. Security and Access Control: The OS implements security mechanisms to protect the computer
system and its resources from unauthorized access, malware, and other security threats. This
includes user authentication, access control policies, encryption, firewalls, antivirus software,
and security updates to mitigate vulnerabilities.
vii. System Performance Monitoring and Optimization: The OS monitors system performance
metrics such as CPU usage, memory usage, disk activity, and network traffic. It provides tools
and utilities for performance analysis, troubleshooting, and optimization to improve system
efficiency, responsiveness, and reliability.
viii. Networking: The OS provides networking capabilities to enable communication and data
exchange between computers and devices on a network. This includes support for network
protocols, configuration of network settings, and management of network connections, such as
wired Ethernet, Wi-Fi, and VPN connections.
ix. Error Handling and Recovery: The OS handles errors, faults, and exceptions that occur during
system operation, such as hardware failures, software errors, or user mistakes. It provides
mechanisms for error detection, recovery, and fault tolerance to minimize system downtime and
data loss.
STUDENTS’ NAME: ____________________________ FORM 2
2024 NED Page 9 of 9 J039

(10 marks)
END OF MARKING SCHEME

You might also like