CS F4 Paper 2
CS F4 Paper 2
INSTRUCTIONS TO CANDIDATES
Write your name, Centre number and candidate number in the space provided on the answer sheet/answer
booklet.
If you use more than one sheet of paper fasten the sheets together
You are reminded to use good English and clear presentation in your answers
(c) Outline any three risks to the business for adopting e-business
1…………………………………………………………………………………………………..
……………………………………………………………………………………………………..
2……………………………………………………………………………………………………
……………………………………………………………………………………………………..
3………………………………………………………………………………………………........
………………………………………………………………………………………………….[3]
4 (a) What is an expert system?
……………………………………………………………………………………………………
………………………………………………………………………………………………….[2]
(b) Outline and explain any three components of an expert system.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………….[6]
……………………………………………………………………………………………………
………………………………………………………………………………………………….[2]
(b) Convert the following to denary. Show all workings.
(i) 1011
Answer …………………………………………………………………………………………[2]
(ii) 110101
Answer………………………………………………………………………………………… [2]
(b) Convert the following to hexadecimal numbers to binary. Show working
(i) D4
Answer………………………………………………………………………………………….[3]
(ii) 16F
Answer………………………………………………………………………………………….[3]
(c) With the aid of a diagram, illustrate the OR gate and the truth table.
[3]
6 (a) Discuss any two data verification techniques.
1……………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………...[2]
………………………………………………………………………………………………………………………
2……………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………...[2]
(b) List any three ways of protecting data from hackers.
1…………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………………
2………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………
3…………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………..[3]
(c) Outline any three measures an organization can use to recover lost data.
1……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………..
2……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………..
3……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………...[3]
7(a) Differentiate simplex and full duplex transmission mode.
……………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
………………………………………………………………………………………………………………….[4]
Switch………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
Router……………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………...[4]
(c) Outline the types of test data that can be used during program testing phase.
1…………………………………………………………………………………………………………………..
2……………………………………………………………………………………………………………………
3………………………………………………………………………………………………………………….[3]
(c) Write an algorithm for a program that determines if the number entered is an odd or even number.
[10]
(d) Differentiate the terms,
(i) Constant and Variable
……………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………...[2]
(ii) Local variable and Global Variable
……………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………………...
………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………[2]
END