Jan 2021 Answers Csec

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

FORM 5 IT

1. The Caribbean Development Bank plans to fund a project to establish meteorological station
in a Caribbean Island, to forecast and monitor weather conditions in the region. The type of
computer system suitable for this project is a supercomputer.
i. State TWO reasons why a super computer is suitable for this project.
then it says state TWO reasons why a super computer is suitable. It uses the words
state, therefore there is no need to go in depth and its worth 2 marks
- It can store large amounts of information
- It can perform calculations very quickly

(question 1 a reflects the types of computers from the syllabus)

ii. The local area networks of stakeholders throughout the Caribbean region are to be
connected to the supercomputer to form a wide area network, using
telecommunication lines.
i. Identify the MOST important hardware device that is necessary for this
connection.
Router
When using different devices with a modem, a router is needed.

ii. State the role of the hardware device identified in (b) (i).
The Router directs data from a modem and sends it to different devices that
are connected to it

(question 1 b falls under web technologies)

iii. State TWO examples of industries, other than weather forecasting, in which
supercomputers are still being used.
So we are back to types of computers
- Space exploration
- Scientific Research
- Artificial Intelligence check

iv. State TWO characteristics of desktop or personal computers that make them popular
among computer users.
- There are a wide variety of applications that are available to perform
popular tasks. E.g. photo editors
- They are relatively cheap. E.g.
- They can be very small e.g cell phones

Examples are not necessary; I am just giving you a refresher.

v. State Two areas where desktop or personal computers are widely used.
-offices, homes etc

So what you notice, questions are now being group around different areas of the syllabus instead as
separate parts that you would have seen in the previous years. The next question is excel, it used to
have a separate section for all the practicals. So you need to take this into consideration and read
properly when writing your exam

vi. The information in Worksheet 1 below shows the total sales for each of the months
January, February and March, for five sales persons in their particular districts.

For example, Kathleen Albert, a salesperson from the Port-of Spain district has sales
of $1925, $1500 and $1350 for the months of January, February and March
respectively.

The data in the range A1:E8 of Worksheet 2 was summarized and reorganized from
Worksheet 1, the original worksheet, to allow for easier reading.

Worksheet 1

Worksheet 2
i) Identify the feature/function of the spreadsheet which was used to produce the
summarized data in Worksheet 2.
Pivot Table

ii) State the information that is provided when a value in the Grand Total row of
Worksheet 2 is double clicked.
The information provided is the formula. Double clicking it displays the cells used for
the calculation.

iii) If the values in Worksheet 1 are updated, the values in Worksheet 2 are not
automatically updated. State the TWO steps required, in the correct order, to
manually update the values in Worksheet. 2.

1. First right click on the table


2. Refresh.

Not on the syllabus.

iv) Complete the missing parameters in the VLOOKUP formula for Cell B10 of Worksheet
2, to find the amount of sales made during the month of March by the salesperson in
Cell A10.

=VLOOKUP ( ________, _________, _________, ________)

A10 $A$2 : $E$8, 4, True


Which column we checking (4) , is it sorted in
any order (true)
Do not include a1…title

Pivot table rules

1. First look for range


2. Check for the column in the table that is needed
3. Say if the pivot table is in alphabetical or numerical order.
v) State the change that should be made to Parameter 3 in (f) (iv), in order to obtain
the Grand Total for the salesperson in Cell A10.
4 changes to 5 (column 4 changes to colum 5)

2. Jay is the information and communications technology (ICT) manager of Hemprezz Power, a
renewable energy company. The proprietor has announced that the company will be
expanding with new branches opening in the neighbouring city.
i. Jay has outlined to the proprietor that in order to facilitate the expansion multiple
computer systems would be needed.
i. List the FOUR basic components that each computer system should have.
Keyboard, Mouse, Monitor, System Unit
Input, Output, Memory, CPU
ii. Jay has listed a number of specialized peripheral devices that will be
required. Complete the table below by indicating the category of EACH
device.

Device Category
Joystick Input
Scanner Input

ii. Jay will need to set up a wired network to facilitate communication between the
computer systems.
i. List THREE types of transmission media that could be used to facilitate the
communication.
Twisted pair, Fibre Optic and Coaxial

ii. Identify the transmission in (b) (i) which would be MOST appropriate for use
in the scenario described.
Twisted pair. (cheapest/most widely adopted)

iii. In presenting his proposal for the expansion to the proprietor. Jay prepares the
following spreadsheet which outlines the costs of materials for one of the new
branches, Rock Site Startup.
Write the formula which is required to calculate the total cost in EACH of the
following cells.

i. Cell D4
=B4 * C4

j. Cell D14
=sum(D4:D12)
iv. To improve the presentation of the document, Jay formatted Cell A1 across all
columns as shown in the spreadsheet in (c).
i. Identify the formatting feature used.
Merge and centre

ii. List the steps taken by Jay, in the correct order, to apply the formatting
feature identified in (d) (i).
Type the heading in A1 first
Select A1 to E1
Click Merge and Center
v. State the steps, in the correct order, required to create a formula to find the average
of a range of numbers in a spreadsheet.
Type the equal sign
Then type AVERAGE
Put the range in brackets
e.g. =AVERAGE(B2:B6)

3. Chavvi was nominated to serve as the team lead for planning an ICT symposium, hosted by
Hemprezz Power.
i. List THREE groups of ICT related personnel that Chavvi will need to invite to the
symposium.

This question focusses on ICT related professionals. To get the anser read the entire
question and the letter. (it uses the works, netrowks etc
- Network Administrator
- Network Technician
- Systems Analyst
- Systems Administrator

ii. State TWO ways in which the extensive use of ICT has positively impacted the file of
business.
- Efficiency of delivery
- Easier hiring of staff
- E-commerce
- Advertising online

Chavvi was asked to prepare a memorandum to the director general outlining the plans for the
symposium.

The following is an extract from the memorandum prepared using the Word format.

Memorandum

TO: Mrs Judy Staton

Director General

FROM Chavvi Sampson

Head, Cybersecurity

DATE: 2 April 2020

SUBJECT: Cybersecurity Exercise 202

In an increasingly connected world, it is necessary to defend the critical infrastructure of each


country, to understand how the attacker works, to know what to look for within a data centre
infrastructure and to have the ability to address the business security strategy.
For approximately eight hours, the multidisciplinary teams will compete with each other to achieve
the full range of challenges and defence, with an expert’s guidance.

Participant Profile

It is recommended that the participants have responsibility for the following

 Networks
 Network communications
 Infrastructure

It is recommended that they have prior knowledge in the following:

 Basic Windows and Linux commands


 Networks knowledge
 Basic threat knowledge
 Basic firewall and IPS configuration
 Security
 Incident response

iii. State ONE reason for using bullets and numbering in a Word document
Make things easier to read or follow

iv. Other than bullets and numbering, identify TWO formatting features used in the
extract from the memorandum
Bold, Italics, Left align, Tabs
v. Describe how the positions of paragraph 1 and 2 from the extract can be
interchanged, using the drag and drop feature.

1. Highlight paragraph one


2. Click on the highlighted part of the text
3. Drag and drop after the last line of paragraph 2

(similar to a cut and paste metjod by moving)


vi. Describe the steps used in conducting a spell check in a Word document
1. Click on the Review tab
2. In the proofing group, click on Spelling and Grammar
3. Compare the suggested words with your word
4. Select the best options; ignore, or replace

vii. The pseudocode will calculate and output the number of participants and the
average age of all participants attending the ICT symposium. The algorithm will
terminate and display the output when an age of 999 is entered.

Complete the following pseudocode by filling in the blank spaces, labelled 1-10, with
the MOST appropriate variables and/or reserve words.

Start
Set COUNT  0
Set AGE  0
Set AVERAGE  0
Set TOTAL  0

_____________________ “Enter Participants age”


1

Read AGE
WHILE AGE <> _________________ ____________________
2 3

Set TOTAL  TOTAL + AGE


Set COUNT  COUNT + _____________________________
4
Set ____________________  TOTAL/COUNT
5
Write “Enter another age or 999 to terminate the program”

Read __________________
6

______________
7
Write “The Number of Participants are:”, _______________
8
Write “The average age of Participants are:”,_______________
9

_____________
10
1. PRINT/WRITE
2. 999
3. DO
4. 1 ---- to use a counter use add it to one,,, so as it loops it will continue to add
the amount of times its repeated
5. AVERAGE (TO CALCULATE THE AVEARGE)
6. AGE
7. ENDWHILE
8. COUNT
9. AVERAGE
10. STOP

Please remember they cannot test you on an actual programming language, only
pseudocode is tested.
4. a. The Stennet Marketing Company collects personal data from customers which it stores on
computers.
i. State TWO possible effects of improper storage of data
- Difficult to find records
- Loss of records
- Duplication of Records
- Susceptible to hacking
- Corrupted files
ii. Sate TWO measures that can be used to protect the data stored on a computer
- Passwords
- Encryption
- Firewall
- Anitvirus

b. i. Outline the function of the loop construct in computer programming

A loop repeats a set of commands until a condition is met

ii. State TWO distinguishing features for EACH of the following types of loops.

 WHILE….ENDWHILE
- has the conditions checked at the start of the loop and will execute/run commands when
the condition is true

 REAPEAT…..UNTIL
Has the conditions checked at the end of the loop and the commands are executed/run at
least once before the check happens.
c. You are hired as a programmer by Stennet Marketing Company, to write a pseudocode for
a supermarket. This pseudocode would be presented to the company, before the source
code is written. The requirements for the pseudocode are as follows:

 Prompt the cashier to enter the price and quantity of items.


 Calculate the discount amount at 5% of the total, if the total is greater than $500
 Otherwise, calculate the discount amount at 10% of the total
 The algorithm should output the total and discount.

Write the pseudocode with the requirements as outlined above.

Title: Algorithm to find total and discount

Variables: P, Q, T, D

Start

Print “Enter the price and quantity”

Read (P, Q)

T=P*Q

IF T >500 then

D = T * 5%
Else

D = T * 10%

ENDIF

PRINT “The total is”, T

PRINT “The discount is”, D

END

d) Write the pseudocode, using NESTED IF STATEMENTS, to do the following

IF the mark entered is greater than or equal to 70, then display the statement “GRADE A”. Otherwise,
if the mark entered is greater than or equal to 60, then display the statement “GRADE B”. For all
other marks entered, display the statement “GRADE NOT AVAILABLE”.

Title: Algorithm to determine grade

Variables: M

Start

Print “Enter the mark”

Read (M)

If M>=70 then

PRINT “Grade A”

Else IF M >-60 then

PRINT “GRADE B”

ELSE

PRINT “GRADE NOT AVAILABLE£

ENDIF

ENDIF

You might also like