0% found this document useful (0 votes)
13 views

Computer Science Nov 2017 (Structured)

Uploaded by

bonganisek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Computer Science Nov 2017 (Structured)

Uploaded by

bonganisek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

1. By giving suitable examples where appropriate, explain the meaning of the following terms.

(a) Hacking
________________________________________________________________________ [2]

(b) Encryption
________________________________________________________________________[2]

(c) Simulation
_______________________________________________________________________ [2]

(d) Multiprogramming
________________________________________________________________ ______ [2]

(e) Array
__________________________________________________________________________ [2]

(f) De-skilling

_________________________________________________________ [2]

(g) Check-digit
________________________________________________________________________ [2]

(h) Electronic Scabbing


________________________________________________________________ [2]

2. (a) Illustrate, using labelled diagrams, the following logic gates:

[For the OR and AND gate, use x,y as inputs and z as output.

For the NOT gate use A as input and B as output]

(i) AND gate |2|

(ii) OR gate |2]

(iii) NOT gate [2]


3. The manager of Day and Night Agency has made a proposal to change their manual payroll to a
computerised system. Before computerisation is done, fact gathering has to be done.

(a) Suggest any two factors that may have motivated the manager to suggest for a computerised
system.

1. ________________________________________________________________________________

2. ________________________________________________________________________________

[2]

(b) Describe the following fact gathering methods:

(i) Interviews
__________________________________________________________________________________
__________________________________________________________________________________

[2]

(ii) Observation
__________________________________________________________________________________
__________________________________________________________________________________
_ [2]

(iii) Questionnaires
__________________________________________________________________________________
__________________________________________________________________________________

[2]

(c) Identify any two roles that will be performed by the systems analyst during the whole process
of coming up with a new computerised system.

1. _________________________________________________________________

2. _____________________________________________________________ [2]
(d) Arrange the following first four stages of the systems development life cycle in their correct
order:

Fact finding, analysis, feasibility study, problem identification.

1. …………………………………………………………………………………………………………………………………

2. …………………………………………………………………………………………………………………………………….

3. …………………………………………………………………………………………………………………………………

4. ……………………………………………………………………………………………………………………………………

[4]

(e) (i) Differentiate between user and technical documentation.

__________________________________________________________________________________
________________________________________________________________________________[2]

(ii) State one item included in the technical documentation

_______________________________________________________________________________[1]

4 (a) The following flowcharts represent three program constructs

1. A [1]

2. B [1

3. C [1]
(b) Give any three differences between a high level language and machine code

(c) An algorithm is shown below.

Set counter to zero

Begin

Input mark

If counter<= 4

Then

Add 1 to counter

End if

Until mark= —100

Print sum Print counter

|NB: in this algorithm <= 4 implies less than or equal to]


(i) Complete the trace table for the algorithm using the following set of marks:

[5]

(ii) State the use of the algorithm.

(iii) The mark —100 is known as the rogue value.

State any two uses of the rogue value.

1. ______________________________________________

2. ______________________________________________

[2]

(f) (i) State any two examples of fourth generation programming languages. [2]

(ii) State and explain any one example of program errors [2]

(g) Explain the purpose of an interpreter [2|


5. A company uses e-mail to communicate with its officers in different geographical sites using
WAN. The company also uses WLAN for offices in the same building. Each of the managers in
company has a company mobile phone to use for various transactions.

(a) State what the acronyms below stand for:

1. WAN _______________________

2. WLAN __________ _____________ [2]

b) (i) State any two communication media which can be used by WAN. [2]

(ii) Give any two advantages of using WLAN. [2]

(iii) State one use of a mail box in an e-mail communication.


__________________________________________________________________________________
________________________________________________________________________________

[2]

(iv) State the importance of passwords in e-mail communication.


_______________________________________________________________________________[2]

(v) A parent is concerned about the effects of social networks on his child.

Identify two items of advice you would give to the parent and/or to the child to reduce the
negative effects of social networks such as Whatsapp.

1.________________________________________________________________________________

[2]
6. (a) Explain the meaning of the term robotics.

[2]

(b) All robots have the same basic components.

Give any two of these components describing the use of each.

Component 1 ___________________________________________________________________

Use ______________________________________________________________________

Component 2 __________________________________________________________________

Use ___________________________________________________________________________

[4]

(c) Give any four reasons why the use of robots has gained popularity in various industries.

1. ____________________________________________________________________________

2. ______________________________________________________________________________

3. ______________________________________________________________________________

[4]

4. (d) Give any two disadvantages of the use of robots in society.

1. _______________________________________________________________________________

2.
________________________________________________________________________________

[2]

7. (a)

(i) D and R service station has purchased a set of ten computers for use in its ICT Department. They
need to hire a computer professional for initial set up.

Name the type of specialist for the job.

_______ _______________ _ ___________________________ [1]


(ii) State any four ICT employment posts that arc created by the introduction of computers at D
and R service station.

1. ______________________________________

2. _______________________________________

3. ________________________________________

[4]

(b) D and S Service Station needs to protect data held on its computers against corruption, theft
or accidental loss.

(i) Identify any two ways data on the computers would get corrupted

[2]

(ii) Explain any one method the company would use to recover its data after corruption.
__________________________________________________________________________________
________________________________________________________________ [2]

8. The following diagram shows a typical expert system.

(a) Identify the missing labels W, X, Y, Z using the following list of possible options.

Inference engine, knowledge base, user-inference, expert system shell


W _________________________________________________

X ________________________________________________

Y ____________________ ' ______________________________

Z ________________________________________________________

[4]

(b) During consultation of a medical expert system, wrong diagnosis was given to a doctor. Suggest
four probable causes why a wrong diagnosis was given.
__________________________________________________________________________________
________________________________________________________________________________

2.________________________________________________________________________________
__________________________________________________________________________________

3. _ ___________ _________________________________________________________________

4.________________________________________________________________________________

[4]

You might also like