Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Mark Scheme

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Test 1:

1) Discuss briefly what each part of the CPU does: (6 marks)


 Control Unit (2 marks):
o Directs operations of the processor.
o Manages data flow between CPU, memory, and I/O devices.
 Arithmetic Logic Unit (ALU) (2 marks):
o Performs arithmetic operations like addition, subtraction.
o Executes logical operations like AND, OR, and NOT.
 Registers (2 marks):
o Small, high-speed storage within the CPU.
o Temporarily holds data and instructions being used.

2) Suggest one advantage and disadvantage of using SSDs instead of


HDDs. (2 marks)
 Advantage (1 mark): SSDs are faster in data access and boot time.
 Disadvantage (1 mark): SSDs are more expensive per GB compared to
HDDs.

3) List four functions of Operating Systems. (2 marks)


 Answer (2 marks):
o Manages hardware resources.
o Provides a user interface.
o Handles file management.
o Manages multitasking and memory allocation.

4) What is hardware, and list any four hardware components of a


Computer System. (2 marks)
 Answer (2 marks):
o Hardware: The physical components of a computer system.
o Examples: CPU, RAM, Motherboard, Hard Drive.

5) Explain the Fetch-Decode-Execute Cycle. (6 marks)


 Fetch (2 marks): The CPU retrieves an instruction from memory.
 Decode (2 marks): The control unit interprets the instruction.
 Execute (2 marks): The CPU performs the instruction (e.g.,
calculations or data movement).
6) Give any three examples of utility software. (3 marks)
 Answer (3 marks):
o Antivirus software.
o Disk cleanup tools.
o Backup utilities.

7) Explain briefly about GUI and a command-line interface. (4 marks)


 GUI (2 marks): Graphical User Interface uses icons, windows, and
menus for interaction, making it user-friendly.
 Command-line interface (CLI) (2 marks): Text-based interface where
users type commands to perform tasks, offering more control for
advanced users.

8) Difference between Volatile and Non-Volatile Memory. (4 marks)


 Volatile Memory (2 marks): Data is lost when power is turned off
(e.g., RAM).
 Non-Volatile Memory (2 marks): Data is retained even when power is
off (e.g., ROM, hard drives).

9) Explain the role of RAM and ROM. (4 marks)


 RAM (2 marks): Temporary storage used for running programs and
processes. It is fast and volatile.
 ROM (2 marks): Permanent storage containing essential instructions
(e.g., boot process). It is non-volatile.

10) Arrange the following units of data from smallest to largest: (2


marks)
 Answer (2 marks):
o Bit → Nibble → Byte → Kilobyte → Megabyte → Gigabyte →
Terabyte
Test 2:
1) Give two advantages and disadvantages of connecting devices in a network. (2 marks)
 Advantages (1 mark):
o Devices can share resources like printers and files.
o Easier communication between devices using instant messaging or email.
 Disadvantages (1 mark):
o Increased security risks, such as hacking or malware spread.
o If the network fails, devices may lose access to shared resources.

2) Explain about different Network Topologies. (6 marks)


 Star Topology (2 marks): All devices are connected to a central hub or switch. If the hub fails,
the entire network is affected. However, it is easier to add new devices.
 Bus Topology (2 marks): Devices are connected in a line. Easy to set up, but if the main cable
fails, the entire network goes down.
 Ring Topology (2 marks): Devices are connected in a circle. Data travels in one direction. A
failure in one device can break the entire network.

3) What is an NIC? (2 marks)


 Answer (2 marks): A Network Interface Card (NIC) is hardware that allows a device to connect
to a network, either through wired or wireless communication.

4) Briefly describe how data is sent over the Internet. (3 marks)


 Answer (3 marks):
o Data is broken into packets.
o Packets are sent through routers to their destination using IP addresses.
o Packets are reassembled into the original message at the destination.

5) List three types of Malware. (3 marks)


 Answer (3 marks):
o Virus
o Trojan
o Worms

6) John uses the password “pandas” for his School account. Give two reasons why this is a weak
password. (2 marks)
 Answer (2 marks):
o It is short and easy to guess.
o It does not include a mix of uppercase, numbers, or special characters.

7) A LAN covers a larger area than WAN. (True / False) (1 mark)


 Answer (1 mark): False. A WAN (Wide Area Network) covers a larger area than a LAN (Local
Area Network).

8) Mathew posts photos of himself to his blog. He later decides to delete a photo from his blog.
Explain why the photo might not be removed from the internet completely. (2 marks)
 Answer (2 marks):
o Copies of the photo may already exist on other websites or servers.
o Other users may have downloaded or shared the photo before it was deleted.

9) How do you identify that a website is fake? (3 marks)


 Answer (3 marks):
o The URL may have spelling errors or strange extensions.
o There is no padlock symbol (HTTPS) in the address bar.
o The website might ask for sensitive information unnecessarily.

10) Explain about Encryption and Anti-malware software. (4 marks)


 Encryption (2 marks): Converts data into a code to protect it from unauthorized access during
transmission.
 Anti-malware Software (2 marks): Detects and removes malicious software like viruses,
Trojans, and ransomware.

11) Chris has received an email claiming to be from his Bank. The email requests that she follows a
link to update her password immediately. Explain the danger of following the instructions in the
email. (2 marks)
 Answer (2 marks):
o The email could be a phishing attempt to steal personal or financial information.
o The link might lead to a fake website that installs malware.

12) Suggest three pieces of advice you would give a friend to help them stay safe online. (3 marks)
 Answer (3 marks):
o Use strong, unique passwords for every account.
o Avoid clicking on suspicious links or downloading unknown files.
o Keep your software and antivirus up to date.

13) Explain the terms: i) Cyberbullying ii) Trolling iii) Cybercrime (6 marks)
 Cyberbullying (2 marks): Using digital platforms to harass, threaten, or intimidate someone.
 Trolling (2 marks): Posting inflammatory or off-topic messages online to provoke others.
 Cybercrime (2 marks): Criminal activities conducted using computers or the internet, such as
hacking or identity theft.

14) What is Phishing? (2 marks)


 Answer (2 marks): Phishing is a fraudulent attempt to steal sensitive information, such as
passwords or credit card details, by pretending to be a trustworthy entity in emails or messages.

15) Give one way in which your web activity can be tracked? (1 mark)
 Answer (1 mark): By using cookies, which store data about your browsing habits and
preferences.

Grading Scheme
 Total Marks: 40
 Pass Mark: 32 (80%)

1. What is meant by data logging?


Data logging refers to the process of automatically collecting, recording, and storing data over
time using sensors, instruments, or computers. This data is often used for analysis, monitoring,
and decision-making. (3 marks)

2. Sarah is creating a webpage for her project.


Correct answer:
c) <img src="forest.jpg"> (2 marks)

3. Identify the tags covered by A, B, and C.


A: <title>
B: </h1>
C: </html> (3 marks)

4. Give four common features of a website.


1. Navigation menu
2. Multimedia content (e.g., images, videos)
3. Hyperlinks
4. Search functionality (3 marks)

5. What is meant by plagiarism?


Plagiarism is the act of using someone else's work, ideas, or content without proper
acknowledgment or permission, presenting it as your own. It is considered unethical and can lead
to legal consequences. (3 marks)

6. Features of word processors and DTP software:


a) Indents: Adjust the space between the text and the document margin for better formatting.
b) Tabs: Used to align text or create space between sections of text.
c) Line breaks: Create a new line without starting a new paragraph.
d) Lists: Organize information in bullet points or numbered format. (4 marks)

7. What sort of things are covered by copyright law?


1. Literary works (books, articles)
2. Artistic works (paintings, photos)
3. Music, films, and software (3 marks)

8. What are Cascading Style Sheets (CSS)?


CSS is a style sheet language used to define the layout and design of a webpage, including colors,
fonts, and spacing. (2 marks)

9. Functions:
a) Sum: Adds a range of numbers together.
b) Max: Finds the largest value in a range. (2 marks)

10. Examples of graphs in a spreadsheet:


1. Bar chart
2. Pie chart
3. Line graph (3 marks)

11. Why are forms used in databases?


Forms provide a user-friendly interface for entering, editing, and viewing data in a database,
making the process more intuitive and efficient. (2 marks)

12. Spreadsheet improvements and formula:


a) Three ways to improve appearance:
1. Add borders to the table for clarity.
2. Use bold text for headings.
3. Apply color coding or shading to distinguish rows or columns. (3 marks)
b) Formula for cell D3:
=B3*C3 (2 marks)

13. Three ways to find an existing image to edit:


1. Search for images in an online repository (e.g., stock photo websites).
2. Use the image library on your device.
3. Scan a physical photo or document. (3 marks)

14. What is a hyperlink? How do you create one in a spreadsheet?


A hyperlink is a clickable link that redirects to another webpage, file, or location within a
document.
To create one in a spreadsheet: Use the =HYPERLINK(URL, "Text") function to insert a link.
(2 marks)

Total Marks: 40

You might also like