COMP F3 PP1 MS
COMP F3 PP1 MS
451/1
FORM THREE MARKING SCHEME
SECTION A (40Marks)
1. Define the following terms:
a. Analog data is data that is continuous in nature
b. Digital data is data that is discrete in nature
2. Transposition is error caused by interchanging digits such as 369 instead of 396 while truncation is
error that results from chopping off the floating point fractional part.
3.
a. The term auxiliary storage refers to secondary storage devices
b. Examples of auxiliary storage include diskettes, hard disk, flash disk, compact disk, DVD
4.
a. The term user-friendly refers to ease of use of a system or a program (1 mark)
b. Multi-tasking operating system supports processing of more than one task by a single processor
apparently at the same time while multiprocessing operating system coordinates processing one or
more tasks by several processors apparently at the sametime.
5.
Be in a calm and orderly manner
Identify the source and raise the alarm
Identify safe and clear exit routes
Vacate the premises as fast as possible
6.
a. The term internet refers to the global interconnection of computers and computer networks for
purpose of communication and resource sharing (1 mark)
b.
Connectivity devices such as a computer
Transmission media either guided or unguided
Internet service provider
Networking software such as a browser
c. An Internet Service Provider is an organisation that provides internet services to subscribed
customers at a fee
7. Serial port RS32 are the traditional COM ports that supported low transmission rates one bit at a time
while USB is a special serial port that offers faster bits transmission rate and can support a variety of
devices. (2 marks)
8.
Providing learning resources such as digital content, (3 marks)
Drill learners on important practical skills through simulation. Enhanced monitoring and
evaluation.
Better management of educational resources and time,
Improved access to learning resources such as Internet and e-Books
9.
a. Interoperability means working in harmony with an external or existing system.
b. Portability means that the software can be installed in more than one platform or operating system.
(1 mark)
10.
i. Every item on a page is contained in a frame and can be edited and formatted
independently.
2
3. Focus, Structured Query Language (SQL), RPG Il (1 mark)
b.
Flowcharts are better way of communicating the system logic.
With a flowchart, problem can be analyzed in a more effective way.
Graphical representation of design serves as a good program documentation
Flowchart make it easier to debug and maintain a program.
c.
17.
a.
Job scheduling — setting of priorities and time slices.
I/O management — device drivers are used to manage I/O devices.
Memory management - partitions memory into frames
Error handling Performs error detection and trying to fix if possible.
Security management — provides security to the system.
3
b.
GUI is for user-friendly than command-line based
GU/ usually provide good help facilities
In GUI, what you see is what you get (WYSIWYG)
They let you play multimedia applications, such as video
Most GU/ operating systems support multi-tasking
c.
Open source software refers to software whose source code (programmed set of
instructions) is freely made available to users. (2 marks)
Proprietary software proprietary software is software whose source code is private to the
manufacturer. (2 marks)
d. Small scale farmers can benefit from the use of information and communication technology (ICT)
by marketing their products, getting access to information on best farming practices, sharing
information amongst themselves (2 marks)
e. Drives, Folders and files
18.
a. The term field properties refer to characteristics of a field such as size, format, indexed or not and
domain values.
b.
PatientlD - Alphanumenric or Text
Patient Name – Text
Consultancy Fee - Currency;
Number
c.
i. PatientlD should be the primary key because it can be unique and indexed (3 marks)
ii.The primary key enforces entity integrity
d. Using criteria expression like Visits>2
19.
a. Data security refers to protection of data against unauthorized access or modification. (1 mark)
b.
i.Encryption- This involves encoding data using an encryption key to make it meaningless to
anybody without a decryption key.
ii.User Accounts refers to access right granted to a user to access or use definite system resources.
(2 marks)
iii.Biometric sign in refers to logging in using biometric features such as fingerprints.
(2marks)
c.
Long enough preferably more than six characters
A combination of letters and numbers
Allow automatic or on demand change to a new password
Encrypted so that other people may not read it,
d.
Abnormally slow in executing a command
May be restarting abnormally
May be constantly hanging
4
Running applications may terminate abnormally
Failure to recognize a storage media
e.
Install up-to-date antivirus software
Enable right protection on removable storage media.
Scan external devices before opening
Update and upgrade antiviruses
20.
a.
i. On-line processing. (2 marks)
ii.
Process requests from terminals
Facilitate sharing of hardware and software resources,
Enforce data and information security.
Regulate access to all network resources.
b.
i. Transcription errors are errors that result from incorrect data entry
ii. Truncation errors are errors that result from chopping off the fractional part of a
floating point number.
iii. Rounding errors are errors that result from rounding up or down the
fractional part of the floating point number.
c.
i. In random organization, records are accessed directly order in which they were
stored not withstanding while in indexed-sequential Records are stored sequentially
but access is by use of an index instead of sequential method.
ii. Logical files are viewed in terms of what data item it contains while a physical file
is viewed in terms of how data is stored on a storage device.
d. Data collection, Input, Processing and Output.
5
6