0% found this document useful (0 votes)
21 views9 pages

g.12 Cs End of Term 1 Test Marking Scheme - 2025

The document outlines the marking scheme for the Grade 12 Computer Science End of Term 1 Test for 2025, detailing various sections and topics covered in the test. It includes definitions of key concepts, comparisons of memory types, the workings of ATM systems, and maintenance methods for computer systems. Additionally, it addresses the importance of data integrity, cybersecurity, and the implications of system changes.

Uploaded by

vascojunior802
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views9 pages

g.12 Cs End of Term 1 Test Marking Scheme - 2025

The document outlines the marking scheme for the Grade 12 Computer Science End of Term 1 Test for 2025, detailing various sections and topics covered in the test. It includes definitions of key concepts, comparisons of memory types, the workings of ATM systems, and maintenance methods for computer systems. Additionally, it addresses the importance of data integrity, cybersecurity, and the implications of system changes.

Uploaded by

vascojunior802
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CONFIDENTIAL

MARKING SCHEME FOR GRADE 12 CS END OF TERM 1 TEST – 2025


SECTION A [50 marks]
1.
a) A keyboard is an input device that contains keys (buttons) that the user presses to
enter data and instructions into a computer.
b) E-learning is electronic learning where delivery of educational content is done
through digital devices like computers, tablets and smartphones.
c) End-user is a person who uses the computer software or program to accomplish a task
or goal.
d) Data integrity is the assurance that digital information remains accurate, consistent and
complete throughout its lifecycle.
e) Cybercrime is an act of using Information and Communication Technology (ICT) for
activities against the law. It is an illegal activity involving computers, the internet or
network devices.
2.
a) Printer
b) (i) Similarity between RAM and ROM:
 RAM and ROM are both storage devices that hold or store data/information in a
computer system
 RAM and ROM can both be accessed by using a type of address bus register to identify
the specific memory cell or cells which should carry information being read from the
memory of the device
 RAM and ROM are both types of memory which represent information present in them
as a series of binary digits (bits)
(ii) Differences between RAM and ROM:
 RAM is volatile memory that temporarily stores data while ROM is non-volatile memory
that permanently stores instructions for the computer
 RAM is used for both read and write while ROM is used only for reading
 RAM needs electricity to flow to retain information while ROM is permanent
c) Antivirus software needs to be regularly updating:
 Because viruses and other malware are created every day.
 So that you remove viruses from your computer system regularly.
3. (a) On-off-on in binary code can be written as 010
(b) 10102 to octal is 128
Working:
Firstly convert 10102 to base10
= (1x8) + (0x4) + (1x2) + (0x1)
=8+0+2+0

1|Page
= 1010
Then, secondly convert 1010 to base8
8 10
8 1 r2
0 r1

Thus, 10102 to Octal (base8) = 128

(c)
 because binary digits are data format that computers understand
 because binary digits are easier for computers to process
 because binary digits take up less space in computer memory
 because binary digits offer a simple way for computers to work
 because binary digits offer an efficient way to control logic circuits and detect
electrical signals true (1) and false (0) states
4. a) A record is a single entry in a file or in a dataset – a collection of related data about a
single entry while a file is an organized collection of related records. A file, typically contains
multiple records and is used to store data.
b)
 String types (text, char, vchar, etc)
 Numerical types (integer, Float, DoubleFloat, Decimal, etc)
 Temporary types (Timestamp, Date, Time, etc)
 Booleans types (A value in these fields can be one of the two options, usually TRUE or
FALSE)
c) Foreign key
5. a)
i) Root Directory is Local disk (C :)
ii.
 Documents and setting
 Local Text Files
 Program Files
 WINDOWS
b)
i. Starting a computer
ii. Manages tasks during processing
iii. Configures peripheral devices
iv. Schedules tasks and updates required to be done by the computer
v. Manages computer memory
vi. Monitors performance of computer programs, networks and memory
2|Page
vii. Loads and runs programs: it manage the running of multiple programs and tasks in the
memory.
viii. Provides security features to the computer system
ix. Provides user interface so that the user can interact with the computer.
x. Reports errors to alert the user so that an action can be taken.
xi. Spooling-a specialized form of multitasking programs.
xii. Handles interrupts generated by different devices or programs.

6. a)
 face,
 fingerprints,
 hand geometry,
 palm print,
 voice
b)
 Privacy concerns
 Data security risks
 False positives and false negatives
 Lack of standardization
 Ethical and legal issues
 High implementation costs
 Potential for surveillance and abuse
c)
 Multifactor authentication (using password or PIN) at ATM card, smart card
 Secure infrastructure (by way of using CCTv)
 Audit trails (protecting customers)
 Secure processes
 Continuous communication
7.
a)
 ATM allows customers easy access to banking services at any time
 ATM are convenient by allowing customers to perform quick self-service transactions.
b) Input ------- entering card
 card reader at the point of inserting the smart card and
 inserting PIN on the Keypad
 indicating amount to withdraw or any other service needed
Processing -------reading user’s card

3|Page
 When the Machine reads the user’s card through the magnetic strips or magnetic chip to
retrieve account information.
 The prompts the user to enter Personal Identification Number (PIN)
Output --------depositing user’s cash out of the machine, printing the receipt, and
display interface
 screen display
 speaker
 receipt printer
 cash depositor
d) security features
 surveillance cameras
 vibration, temperature and tilt sensors
 encryption technology
 alarm systems
 improving convenience and safety
 card user verification methods
 biometric verification
 two-factor authentication
 protecting customer data
 secure card reader
 PIN security for transactions
 Hardware security modules
 Protecting ATMs from network threats
 Regular software updates
 Firewalls and IDs
8.
a) A computer system is a set of integrated devices that input, output, process, and store data
and information
b)
 Input devices,
 Processing devices,
 Storage devices,
 Output devices and
 Communication devices
c)
 Batch processing systems
 Interactive systems
 Control systems
 Satellite navigation Systems
 Expert Systems
 Automated systems

4|Page
9.
a) Batch processing system is a computerized system that processes transactions
accumulated over a period of time
b) A real-time transaction is the data processing which is done immediately input is taken in
while batch processing system waits for longer to receive accumulated data which is later
processed at the end and in groups.
c) Tasks
i. Payroll processing, generating utility bills, Retail outlet bills, bank billings -- for
batch processing
ii. Credit card payments, ATM transactions, recurring payments e.g. paying DSTV
subscription – Real-time processing
10.
a)
 card number
 PIN/ Secret code
 Validity period
 Account number
 Account holder’s name
b)
 it is costly to replace the smart card to the customer
 Keeping the transaction records can be costly because it involves lots of resources to
carry out such tasks
c)
 It can be used in an ATM machine
 It can be used as an identification of the user
 It can be used as an electronic purse
SECTION B [20 MARKS]
1.
a)
 Time-consuming processes: manual record management is incredibly time consuming
 Human error: mistakes in manual data entry are inevitable and lead to inaccurate learner
records
 Storage and accessibility: Paper records also take up a lot of physical space and as your
record collection grows, finding specific documents become increasingly difficult.
 Security risks: paper records are vulnerable to loss, theft and damage from natural
disasters like fires or floods.
 Delays in accessing accurate data slows down critical decision making processes

b)

5|Page
 Method 1: Phased implantation method-this is a staged method whereby one part
of the overall system that needs changing is changed. If any problems arise, they are
limited in scope and therefore non-critical. But once the system has been successfully
changed in one area, the other areas can follow suit, with any lessons learned during
the changeover used to ensure the success of the changeover as a whole.

Advantage:
 better planning and use of resources
 each project is broken into smaller components, each component being reviewed
before proceeding to the next one
 reduced risk
 potential long term savings
 improved customer feedback
 lower risk of scope
 allows for better allocation of resources

 Method 2: Parallel changeover method:-Both the old and the new systems run side-
by-side, using, using live data so that project managers can compare the efficiency
and reliability of the new system. Once they are satisfied, the old system is taken
offline and the new system becomes fully active and utilized across the organization

Advantage:
 It carries the lowest risk.
 If something goes wrong at any point, the entire system can be reverted back to its
original state

 Method 3: Direct changeover: - There’s a single fixed point where one system stops
being used and the new one becomes live.

Advantage:
 This method is the cheapest, quickest and easiest form of system changeover.

c) To process information quickly and accurately to save time and increase productivity
d)
 Technical feasibility study
 Operational feasibility study
 Economic feasibility study
 Legal feasibility study
 schedule feasibility study
e)
 User documentation
 Technical documentation
f)

6|Page
 Preventive maintenance: this involves taking proactive measure to avoid potential
system issues, emphasizing the importance of regular updates and systematic checks
to maintain the system in a state of peak efficiency and effectiveness.
 Corrective maintenance: this type of maintenance is crucial for corrective software
maintenance, focusing on identifying existing problems within the system. It typically
involves resolving software glitches or repairing hardware
 Adaptive maintenance: this approach focusses on modifying and updating systems
to meet evolving requirements. It includes tasks such as updating software for
enhanced compatibility
 Perfective maintenance: focused on enhancing the system, this type of maintenance
involves incorporating new features into software or making strategic improvements.
These updates boost system performance and user experience, ensuring the system
meets and exceeds user expectations.

2. FLOWCHART
a)

START

Enter b, h

IF (b < 0) INPUT Error


or (h < 0)

Calculate
Area=⅓*b*h

Area

STOP

7|Page
b)
 b
 h
c)
 Error
 Area of Triangle

d) A flowchart is a graphical way of writing a program pseudocode. As a programming


tool, a flowchart graphically depict the logical steps used to carry out a task and show how
the steps relate to each other.

3.
a)
i. NOT gate
ii. NAND gate
iii.
 In burglar alarms and buzzers
 In push button switches
 In functioning street lights
 In data transfer functions
 In circuits involving computational and processing.
b)
i. W is Explanation Base (Module)
X is User Interface
ii. The Inference Engine
iii.
 SENSE: the Expert system lacks common sense needed in decision
making.
 CREATIVENESS: the Expert system cannot respond creatively like a
human expert would in unusual circumstances.
 ERRORS: Errors may occur in knowledge base and this leads into
wrong decisions.
 ENVIRONMENTS: if the knowledge base is changed, it cannot adapt
to changing environments.
c)
i. Bus Topology
ii. Advantage:
 It is cost effective
 Least amount of cables.
 Used in small networks
 It is easy to understand
 It is easy to expand.
Disadvantages

8|Page
 If the cable fails then the whole network fails
 If the network traffic is heavy or nodes are more the performance of the
network decreases.
 Cables have limited length
 It is slower than the ring topology.

9|Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy