g.12 Cs End of Term 1 Test Marking Scheme - 2025
g.12 Cs End of Term 1 Test Marking Scheme - 2025
1|Page
= 1010
Then, secondly convert 1010 to base8
8 10
8 1 r2
0 r1
(c)
because binary digits are data format that computers understand
because binary digits are easier for computers to process
because binary digits take up less space in computer memory
because binary digits offer a simple way for computers to work
because binary digits offer an efficient way to control logic circuits and detect
electrical signals true (1) and false (0) states
4. a) A record is a single entry in a file or in a dataset – a collection of related data about a
single entry while a file is an organized collection of related records. A file, typically contains
multiple records and is used to store data.
b)
String types (text, char, vchar, etc)
Numerical types (integer, Float, DoubleFloat, Decimal, etc)
Temporary types (Timestamp, Date, Time, etc)
Booleans types (A value in these fields can be one of the two options, usually TRUE or
FALSE)
c) Foreign key
5. a)
i) Root Directory is Local disk (C :)
ii.
Documents and setting
Local Text Files
Program Files
WINDOWS
b)
i. Starting a computer
ii. Manages tasks during processing
iii. Configures peripheral devices
iv. Schedules tasks and updates required to be done by the computer
v. Manages computer memory
vi. Monitors performance of computer programs, networks and memory
2|Page
vii. Loads and runs programs: it manage the running of multiple programs and tasks in the
memory.
viii. Provides security features to the computer system
ix. Provides user interface so that the user can interact with the computer.
x. Reports errors to alert the user so that an action can be taken.
xi. Spooling-a specialized form of multitasking programs.
xii. Handles interrupts generated by different devices or programs.
6. a)
face,
fingerprints,
hand geometry,
palm print,
voice
b)
Privacy concerns
Data security risks
False positives and false negatives
Lack of standardization
Ethical and legal issues
High implementation costs
Potential for surveillance and abuse
c)
Multifactor authentication (using password or PIN) at ATM card, smart card
Secure infrastructure (by way of using CCTv)
Audit trails (protecting customers)
Secure processes
Continuous communication
7.
a)
ATM allows customers easy access to banking services at any time
ATM are convenient by allowing customers to perform quick self-service transactions.
b) Input ------- entering card
card reader at the point of inserting the smart card and
inserting PIN on the Keypad
indicating amount to withdraw or any other service needed
Processing -------reading user’s card
3|Page
When the Machine reads the user’s card through the magnetic strips or magnetic chip to
retrieve account information.
The prompts the user to enter Personal Identification Number (PIN)
Output --------depositing user’s cash out of the machine, printing the receipt, and
display interface
screen display
speaker
receipt printer
cash depositor
d) security features
surveillance cameras
vibration, temperature and tilt sensors
encryption technology
alarm systems
improving convenience and safety
card user verification methods
biometric verification
two-factor authentication
protecting customer data
secure card reader
PIN security for transactions
Hardware security modules
Protecting ATMs from network threats
Regular software updates
Firewalls and IDs
8.
a) A computer system is a set of integrated devices that input, output, process, and store data
and information
b)
Input devices,
Processing devices,
Storage devices,
Output devices and
Communication devices
c)
Batch processing systems
Interactive systems
Control systems
Satellite navigation Systems
Expert Systems
Automated systems
4|Page
9.
a) Batch processing system is a computerized system that processes transactions
accumulated over a period of time
b) A real-time transaction is the data processing which is done immediately input is taken in
while batch processing system waits for longer to receive accumulated data which is later
processed at the end and in groups.
c) Tasks
i. Payroll processing, generating utility bills, Retail outlet bills, bank billings -- for
batch processing
ii. Credit card payments, ATM transactions, recurring payments e.g. paying DSTV
subscription – Real-time processing
10.
a)
card number
PIN/ Secret code
Validity period
Account number
Account holder’s name
b)
it is costly to replace the smart card to the customer
Keeping the transaction records can be costly because it involves lots of resources to
carry out such tasks
c)
It can be used in an ATM machine
It can be used as an identification of the user
It can be used as an electronic purse
SECTION B [20 MARKS]
1.
a)
Time-consuming processes: manual record management is incredibly time consuming
Human error: mistakes in manual data entry are inevitable and lead to inaccurate learner
records
Storage and accessibility: Paper records also take up a lot of physical space and as your
record collection grows, finding specific documents become increasingly difficult.
Security risks: paper records are vulnerable to loss, theft and damage from natural
disasters like fires or floods.
Delays in accessing accurate data slows down critical decision making processes
b)
5|Page
Method 1: Phased implantation method-this is a staged method whereby one part
of the overall system that needs changing is changed. If any problems arise, they are
limited in scope and therefore non-critical. But once the system has been successfully
changed in one area, the other areas can follow suit, with any lessons learned during
the changeover used to ensure the success of the changeover as a whole.
Advantage:
better planning and use of resources
each project is broken into smaller components, each component being reviewed
before proceeding to the next one
reduced risk
potential long term savings
improved customer feedback
lower risk of scope
allows for better allocation of resources
Method 2: Parallel changeover method:-Both the old and the new systems run side-
by-side, using, using live data so that project managers can compare the efficiency
and reliability of the new system. Once they are satisfied, the old system is taken
offline and the new system becomes fully active and utilized across the organization
Advantage:
It carries the lowest risk.
If something goes wrong at any point, the entire system can be reverted back to its
original state
Method 3: Direct changeover: - There’s a single fixed point where one system stops
being used and the new one becomes live.
Advantage:
This method is the cheapest, quickest and easiest form of system changeover.
c) To process information quickly and accurately to save time and increase productivity
d)
Technical feasibility study
Operational feasibility study
Economic feasibility study
Legal feasibility study
schedule feasibility study
e)
User documentation
Technical documentation
f)
6|Page
Preventive maintenance: this involves taking proactive measure to avoid potential
system issues, emphasizing the importance of regular updates and systematic checks
to maintain the system in a state of peak efficiency and effectiveness.
Corrective maintenance: this type of maintenance is crucial for corrective software
maintenance, focusing on identifying existing problems within the system. It typically
involves resolving software glitches or repairing hardware
Adaptive maintenance: this approach focusses on modifying and updating systems
to meet evolving requirements. It includes tasks such as updating software for
enhanced compatibility
Perfective maintenance: focused on enhancing the system, this type of maintenance
involves incorporating new features into software or making strategic improvements.
These updates boost system performance and user experience, ensuring the system
meets and exceeds user expectations.
2. FLOWCHART
a)
START
Enter b, h
Calculate
Area=⅓*b*h
Area
STOP
7|Page
b)
b
h
c)
Error
Area of Triangle
3.
a)
i. NOT gate
ii. NAND gate
iii.
In burglar alarms and buzzers
In push button switches
In functioning street lights
In data transfer functions
In circuits involving computational and processing.
b)
i. W is Explanation Base (Module)
X is User Interface
ii. The Inference Engine
iii.
SENSE: the Expert system lacks common sense needed in decision
making.
CREATIVENESS: the Expert system cannot respond creatively like a
human expert would in unusual circumstances.
ERRORS: Errors may occur in knowledge base and this leads into
wrong decisions.
ENVIRONMENTS: if the knowledge base is changed, it cannot adapt
to changing environments.
c)
i. Bus Topology
ii. Advantage:
It is cost effective
Least amount of cables.
Used in small networks
It is easy to understand
It is easy to expand.
Disadvantages
8|Page
If the cable fails then the whole network fails
If the network traffic is heavy or nodes are more the performance of the
network decreases.
Cables have limited length
It is slower than the ring topology.
9|Page