0% found this document useful (0 votes)
48 views10 pages

Mock Exam

NOTES

Uploaded by

trendyandy07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views10 pages

Mock Exam

NOTES

Uploaded by

trendyandy07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Name: …………………………………………………………….

Computer Science Paper 2 Time: 2 Hours


Instructions
Answer all questions

1 Explain the following computer terms, use relevant examples where appropriate.
(a) Check digit
is a calculated one-digit number used to ensure data integrity. The check digit is
the last digit of a barcode number OR
also known as a checksum character, is the number located on the far right side of
a bar code. The purpose of a check digit is to verify that the information on the
barcode has been entered correctly.
(b) Feasibility study
an assessment of the practicality of a proposed plan or method OR
An analysis and evaluation of a proposed project to determine if it is technically
feasible, is feasible within the estimated cost, and will be profitable.

(c) Debugging
Is the detection, location and correction of faults (or bugs) causing errors in a
program, errors being observed through error messages. OR
the routine process of locating and removing computer program bugs, errors or
abnormalities
(d) Modem
Modulator-Demodulator,
Converts digital signals from the computer into analogue signals for transmission.
(e) Compiler
Is a program that translates a high-level language program, source program, into
machine code
(f) Scrolling
Is the action up a screen OR
the action of moving displayed text or graphics up, down, or across on a computer screen in
order to view different parts of them.

1
2 After a program has been planned, it is given a dry run.
(a) Explain the term dry run
Is the process of working through a program manually
Is useful for locating errors, particularly run-time errors[1]
(b) Name any two types of errors in a computer program.
Runtime(execution) eg division by zero, syntax, logical [2]
(c) Distinguish between a program and a process
program is a group of instructions to carry out a specified task whereas
the process is a program in execution. [2]

3 (a) Define the term System Analysis


An investigation into a problem and how how a new system will solve it. It involves the use
fact finding techniques, identification of requirements, DFD, software & hardware
requirements, methods of implementation [2]

(b) Add the two missing stages to the following:


1 feasibility study
2 system study and analysis
3 system design
4 programming
5 Conversion/ installation [1]
6 Maintenance [1]
(c) Documentation is important to any system. Explain the terms program and user
documentation
(i) program documentation a

A document that helps to ensure that a system can be maintained after completion,

Intended for the programmers with instructions on how to debug errors and will consist of
flowcharts/pseudo codes/, program listings and detailed written statements of algorithms and
procedures involved. [1]

(ii) user documentation


Intended for the user with instructions on how to run/start the program, enter data, to
exit the program, samples of input data and output results, what problems to expect,
how to handle them, etc. [1]

2
(d) Describe any one changeover procedure that can be applied on a system change over.
Pilot - whole system is implemented at one branch and tested. If succefull then its
implemented in all other branches

Phased – part of the new system is implemented in stages until whole system takes control

Direct – abrupt change from old to new

Parallel – new and old running at the same and the other one is dropped. [2]

4 A database is linked with applications by a database management system.


(a) State any four functions Database Management Systems
-improved data sharing

-Improved data security

-better data integration

-minimized data inconsistency

-improved data access

-improved decision making

-Increased end-user productivity

(b) Distinguish between a Database Administrator and Database Management System

Is to store and manage infor in the database, can also review, design, implementing
contents of the database, back up contents of the database, can be called database
coordinator or database programmer
DBMS is software that handles the storage, retrieval, and updating of data in a
computer system [2]
(d) Give one example of a Database Management System used on micro-computers.
Ms Access, Oracle, MySQL [1]

5 A school decides to set up a database for its pupils and staff. The database will include
data on
(i) Each student
(ii) Each teacher
(iii) Parent and home
(iv)Medical records

3
Give any two items (fields) to be included in the database for
(a) Each student
Name, Surname, Student ID, Class, etc [2]
(b) Each teacher
Teacher name, qualification, address [2]
(c) Parents and home
Name, Address, Phone Numbers [2]
(d) Medical records
Family doctor name, ailment type, etc [2]
6 (a) What is the meaning of the term Computer Aided Design (CAD)
Use of a computer system to produce drawings as part of the design of some
construction project eg layout of a house plan [1]

(b) Give three advantages of CAD over the manual design method
(i) Easy Saving and Sharing
(ii) Creating Easy Sketches:
(iii) Work Faster
(iv) With CAD accurate designs can be produced, size & resolution of the drawing
can be changed easily [3]
(b) Give two peripherals associated with CAD applications
A peripheral device connects to a computer system to add functionality

- Digitizers are specifically designed to input graphic information into a computer.


They consist of either a hand-held stylus that resembles a pen, or a puck that is
similar to a mouse yet has a clear window displaying crosshairs and a section
containing a number of buttons.
- Mouse, Keyboard, Light pen, [2]

(e) Give two examples of the use of CAD


Drawing of house plans, electronic systems [2]

6(g) A company uses e-mail to communicate with its officers in different geographical sites
using WAN as well as officers in the same building using LAN.

(i) What doers WAN and LAN stand for?


Wide Area Network
Local Area Network [2]

(ii) State two communication media which can be used by WAN.

4
Satellite, microwave, coaxial cable, twisted pair cables, radio [2]

(iii) Give two advantages of using email over conventional postal system.

Speed, cost, convenience, privacy and security, [2]

(iv) Explain the term Video conferencing ****(teleconferencing)****

Video conferencing is a live connection between people in separate locations for the
purpose of communication, usually involving audio as well as video.

the system needs a microphone, a camera, a monitor and either a speaker or headphones.
The video conferencing unit or computer programme uses software to convert the inputs
into a digital signal that is sent to the remote unit. [3]

7 (a)(i) Give any two advantages of using a high-level language for writing a program
similar to the human language, therefore are user-friendly, easy to code, debug and
maintain.
compilers/interpreters to translate source code to machine language. We can compile the
source code written in high level language to multiple machine languages. Thus, they are
machine independent language. [2]
(ii) Give two benefits of writing a program using low level language
Are machine dependent hence provides security.
Need less space [2]

(b) Explain the purpose of the following program translators


(i) Interpreters
interpreter translates each instruction, executes it and then the next instruction is
translated and this goes on until end of the program.[2]
(ii) assemblers
An Assembler takes programs written in the Assembly Language and compiles it to
Machine Language that the CPU can work with .[2]
(c) List three types of loops in programming.
While do, For-to-do, Repeat until [3]
(d) Name the following program flowchart symbols
(i)
Process [1]

5
(ii)
Decision [1]

8 An expert system is designed for mineral prospecting.


(a) Define an expert system
systems have been developed to mimic the expertise and knowledge of an
expert in a particular field. For example:
- prospecting for oil or minerals
- diagnosing a person’s illness [1]
(b) Describe the steps taken to create and test an expert system
- information is gathered from experts in the field
- the knowledge base is created
- information gathered from experts is added to the knowledge base
- the rule (base) is created
- the inference engine is created
- the user interface is designed/created (often use Yes/No options or multichoice)

The system, once set up, needs to be tested using data with known outcomes to see if
it functions correctly. [4]
(c) State any two examples of expert system applications
- prospecting for oil or minerals
- diagnosing a person’s illness

- tax and financial calculations


- complex “thinking” tasks such as chess

- route scheduling for delivery vehicles [2]

6
9 (a) Convert 1BE916 to binary
1 B E 9
0001 1011 1110 10012
[3]
(b) What is the octal equivalent of the decimal 8?
Working [1]

Answer 108 [1]

(c) Show how the decimal number 8 can be represented using 8-bits

Working [1]
Answer 0000 00102 [1]

10. Complete the truth table to show the output from the logic gate shown

A C

Y
D

A B C D Y
0 0 0 1 0
0 1 1 0 0
1 0 1 1 1
1 1 1 0 0
[4]

7
11. (a) Study the flowchart below and complete the immediate trace table below for the
following data set: 15, -2, 8, 0, 2 error

Count Number Total X Average Output


1 0 0
2 15 15 1 - -
3 -2 - - - -
4 8 23 2 - -
5 0 23 3 - -
6 2 25 4 6.25 6.25
[5]
(b) State the purpose of this flow chart.
Finds the average of any five numbers [1]
12 Study the following program flow chart carefully and complete part 10(a) and 10(b)
above

Start

Count= 1, X=0

Total =0

Input number

Total = total + number


Y
Is number
> 0?

x=x+1

Count=count + 1

N
Is count >
5?

8
Y

Average = total/X
13 To gain access to a database, a user must type in a ser ID and then a password
which needs to be verified.
(a) How is a password verified?
Entered password is compared with what is stored [1]
(b) In spite of these safeguards, unauthorised access to the database is still possible. What
could be done:
(i) to prevent data from being used by unauthorised people?
Computer must be inaccessible, therefore can be locked.
Hardware firewall
Software firewall
Disablement of File & Printer Sharing on Internet
Connection
Access level
Biometric Devices [1]
(ii) to prevent loss of data once the database has been illegally accessed?
Restore data from back-up [2]

14. Identify any three advantages of a client server

Centrality, Accessibility, Security, Back-up and Recovery possible [3]

15 Data Protection Rules give rights to individuals and provide that personal data stored on
computer systems must be kept secure.

(a) Give one legal right of individuals

The right to life.


The right to liberty and freedom.
The right to the pursuit of happiness.
The right to live your life free of discrimination.
The right to control what happens to your own body and to make medical decisions for
yourself. [1]
(b) Give one hardware method of protecting personal data
Computer acting as a Firewall [1]
(c) Give one software method of protecting personal data
Encrypting data using encrypting software,
Firewalling
Password-protect documents. ... [1]
(d) Explain the term copyright

9
Copyright is a form of intellectual property protection provided by the laws of the
counytry. Copyright protection is available for original works of authorship that are fixed
in a tangible form, whether published or unpublished. [2]

10

You might also like