You are on page 1of 6

ZERAKI ACHIEVERS EXAMINATION (2023)

FORM ONE TERM-3


COMPUTER STUDIES
MARKING SCHEME
1. State four factors to consider when choosing a secondary storage device
 Cost
 Access speed
 Storage size/Storage capacity
 Compatibility
 Data safety
 Portability
Award 1mark each max 4
2. Use the diagram below to answer the questions that follow

Figure 1 Figure 2 Figure 3

(i) Identify the type of operating system represented in Figure 1,2 and 3
 Figure 1 – Menu Driven
 Figure 2 – Graphical User Interface
 Figure 3 – Command line
Award 1 mark each max 3
(ii) State four advantages of the operating system represented in Figure 3
 Execute very fast
 Require small space for storage
 Can with computers that have very low screen resolutions
 Uses very few system resources
Award 1 nark each max 4
3. Describe the following terms as used with Monitors
(i) Pixel
 Pixel is a picture element and are tiny dots which are used to form the images displayed on the
screen
(ii) Resolution
 It refer to number of pixel per inch on the screen
Award 2marks each max 4

1
4. State four Keyboard keys that works in a state of ON/OFF switches in operation
 Caps lock
 Num lock
 Scroll lock
 Insert Key
Award 1mark each max 4

5. State five ways of ensuring that a computer lab is well burglar proofed
 Have grill doors and windows
 Install CCTV camera at strategic places within the lab
 Install security alarm system
 Use biometric system at the entrance
 Use smart cards to open the doors at the entrance
 Employ security personnel to keep watch
 The room should always be under lock and key while not in use
Award 1 mark each max 5
6. Matilda a student from Kanga High School was typing his assignment on a computer using Microsoft
windows Operating system. After 10 minutes the computer’s graphical user interface refused to respond
to his typing on the keyboard at the same time he was unable to move the mouse pointer on the screen.
State five possible causes of this anomaly
 Malware attacks
 Corrupt drivers
 Outdated drivers
 Faulty ports on the motherboard
 Not enough memory
 Physical damage
Award 1 mark each max 5
7. Jeff bought a laptop from PC World Limited in Nairobi. The Sales person received the cash and then
gave Jeff the warranty document to read and sign before he would issue him with a receipt. Describe
three basic requirements that must be contained in this warranty document
 Scope of coverage- This is the period for which the warranty is valid
 Callout response and liability agreement- how long should the supplier take to repair a fault or
replace the product, and if he/she delays who bears the cost.
 Preventative maintenance - Preventive maintenance is the act of performing regularly scheduled
maintenance activities to help prevent unexpected failures in the future.
Award 1 mark each max 3
8. State four features of Dynamic Random Access memory
 DRAM require refreshing because it loses its content even with constant power supply
 Slower type of memory
 Consume more power
 It is larger than the SRAM
 DRAM cells are made of Transistors and capacitors
Award 1 mark each max 4

2
9. Describe the functions of the following Disk management operations
(i) Disk Defragmentation
 Reduce the access time
 Create more free space on the disk by consolidating scattered files
(ii) Disk Partitioning
 For backup purposes
 To allow installation of more than one operating system
Award 1mark each max 4

10. Describe two reasons why smaller computers like Laptop tend to be more expensive than Desktops
 They are small in size therefore users can move with them from one place to another with ease.
They are conveniently portable. This makes more expensive
 Energy efficient. Laptops have inbuilt rechargeable battery that therefore they can be used in
places without electricity once charged
 Integrated peripheral device. The technology used to develop small computer is more advance.
The peripheral devices are integrated together
Award I mark each max 4
11. Briefly describe how computers are used in Sport Management
 VAR system used to assist the center referee in making decisions
 Computer based programs are used to create match fixtures
 Computer applications accurately compute match results and present the in table
 Match officials communicate with each other using audio and text based gadgets during the
match
 Online booking for fans who want to watch the matches
Award 1 mark each max 5
Note that the technology must be included
12. Name three Input and three Output devices used by the cashier at the Electronic Point of Sale (6marks)
Input
 Keyboard
 Input
 Touch Screen
 Finger print scanner
 QR code Scanner
Award 1 mark each max 3

Output
 Monitor
 Printer
 Speaker
Award 1 mark each max 3

13. State four limitations of Floppy disks


 Limited storage space
 Slow access speed
 Modern computers do not floppy disk because they lack floppy drive
 Highly affected by magnetism
Award 1 mark each max 4

3
14. Name three devices that can be connected to the computer using the following interface cable
(i) VGA
 Projector
 TV
 Monitor
Award 1 mark each max 3
(ii) Serial cable
 Printer
 Mouse
 Keyboard
 Modem
Award 1 mark each max 3

15. The diagram below represent a computer component. Use it to answer the questions that follow

Figure 4
(i) Identify the component represented in Figure 4
 Power Supply unit
(ii) State two functions of the component in (i) above
 Convert Alternating currents to Direct current
 Supply power to all the components within the system unit

Award 1 mark each max 3


16.
(i) State four examples of Registers used in a computer
 Instruction Register
 Address Register
 Accumulator
 Storage Register
Award 1 mark each max 4
(ii) Describe three functional elements of the Central Processing Unit
 Control unit- Responsible for coordinating all the processing activities of the cpu
 Arithmetic logic unit- Perform arithmetic and logical functions
 Main memory- It is memory that is accessed directly the processor. It store data and applications
that are currently in use
Award 1 mark each max 3

4
(iii) Explain what is meant by volatile memory in computer
 Refer to memory that loses its content when power is switched off
Award 2 marks each max 2
17.
(i) Give four differences between Impact and Non-Impact printers
Impact Printer Non-Impact
Slow Fast
Cheap Expensive
Low quality output High quality output
Production of multiple copies possible Production of multiple copies impossible
Award 1 mark each max 4

(ii) Range of capabilities is one of the factors one must consider when choosing a printer. State five
features that a printer must possess to meet the requirements of this factor
 Support wireless connectivity
 Printing using different paper sizes
 Duplex printing
 Printing from mobile devices like tablets, phones etc.
 Varied printing color
 Support network connection
Award 1 mark each max 5

18. List five precautions you would take to avoid damaging magnetic media
 Do not expose magnetic media to a stronger magnetic field
 Do not expose magnetic media to excess heat
 Do not drop magnetic media on the ground
 Do not fold , bend or put heavy weight on a magnetic media
 Do not touch the magnetic media surfaces
 Do not remove the magnetic media from the drive when it is still being accessed
Award 1 mark each max 5

19. Give four features of USB interfacing cables


 Transmit data one bit at a time at a very high speed
 Support multiple connection of devices
 Provide quality data transmission
 Support plug and play
Award 1 mark each max 4

5
20. One of the functions of the operating system is to protect information and programs in a computer.
Briefly describe five ways employed by the operating system to achieve this function
 Create user name and password- The operating system give user a platform create user name and
password. Only users with correct credentials will be allowed to login the system
 Enforce the use of Biometric systems to authenticate the users. This involves the use of human
features like finger print, voice code and facial recognition to identify users. The operating system
provide an environment in which these systems operate
 Having firewalls to filter data and information. Windows operating systems have inbuilt firewalls
that monitors and controls the incoming and outgoing network traffic based on predefined rules
 Log file to track events in the computer. They serve as a detailed record of what has happened
within a system, which can be used for troubleshooting problems or investigating security
incidents.
 Backup facility. Operating system have mechanisms of creating duplicate copies of a file and then
save them in a separate location. These backup files can be used to reconstruct the system in case
the main file is corrupt or damaged
Award 1 mark each max 5

You might also like