Sec 2022 Written
Sec 2022 Written
22m
SUBJECT: Computing
PAPER NUMBER: I
DATE: 25th May 2022
TIME: 4:00 p.m. to 6:05 p.m.
Directions to Candidates
Write your index number where indicated at the top of the page.
Answer ALL questions in the spaces provided. You are not allowed to use extra sheets other than
those provided in this booklet.
Good English and orderly presentation are important.
The use of flowchart templates is permitted. The use of calculators is not permitted.
This paper carries 85 marks of the examination.
Question
Number 1 2 3 4 5 6 7 8 9 10 FOR MARKERS’ USE
© The MATSEC Examinations Board reserves all rights on the examination questions in all examination papers set by the said Board.
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
1. As part of their Computing study course, students were given an assignment to research about
the Input and Output components used in wearable devices, such as a smart watch. They were
asked to document their work in any form they prefer, such as a slideshow, a text document,
a web page, a video, etc. They were expected to send their work via email.
a. Which application software must be used by the students for the following tasks:
b. Mention ONE system utility that the teacher should use to prevent from receiving malware
attached with the students’ work.
__________________________________________________________________________ (1)
(Total: 4 marks)
2. Kate, a graphic designer, and a photographer bought a laptop with enough powerful resources
for her work.
a. The laptop has an INTEL i9 9800HK processor which is powered by eight cores of 2.6 GHz
each. Explain what is meant by 2.6 GHz.
____________________________________________________________________________
__________________________________________________________________________ (1)
__________________________________________________________________________ (1)
____________________________________________________________________________
__________________________________________________________________________ (2)
____________________________________________________________________________
__________________________________________________________________________ (1)
Page 2 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
c. Kate took a set of photographs for a wedding in very high-resolution which she will use during
the editing stage and eventually for the printing of the wedding album. The customers chose
35 photos from the entire set and asked Kate to also have them in digital format.
i. Kate made a low-resolution copy of the chosen photos which she later sent to her customers
via email. Give ONE reason why Kate sent the low-resolution and not the high-resolution
version of the chosen photos.
____________________________________________________________________________
__________________________________________________________________________ (1)
ii. The low-resolution photos take up between 350 KB and 482 KB in size. Work out the
maximum storage space in MB required to store the 35 low-resolution photos.
__________________________________________________________________________ (2)
iii. Suggest a suitable system utility software which Kate could use to send the 35 photos as
an email attachment.
__________________________________________________________________________ (1)
(Total: 9 marks)
3. Ħanut, a shopping centre situated in Sliema, uses several CCTV cameras for
security purposes. An operator can watch live or recorded footage, rotate
and zoom the cameras, and create a hard copy of any required screenshot
whenever necessary. The operator can access these cameras by using a
specific software installed on a computer which is in the same building, and
which is equipped with various input and output devices. (Source:
www.flaticon.com)
a. Tick whether the devices listed below are input or output devices and mention ONE use of
such devices in the above scenario.
i. Printer:
(2)
ii. Joystick:
(2)
iii. Monitor:
(2)
Page 3 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
b. The CCTV cameras are connected to a file server which is equipped with various storage
devices.
____________________________________________________________________________
__________________________________________________________________________ (1)
ii. Which type of storage would you recommend, optical or magnetic devices? Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
iii. Mention ONE storage device which the operator can use to save a 5-minute video footage.
__________________________________________________________________________ (1)
(Total: 10 marks)
4. A football club keeps records of all the players which train in their nursery through a database.
a. What type of application software is required for the creation and maintenance of the database?
__________________________________________________________________________ (1)
b. The database is made up of a set of related tables, one of them is called ‘Player’ table. Suggest
the primary key field for this table and its data type.
__________________________________________________________________________ (2)
c. The nursery has several coaches. Each player is assigned to one coach, but each coach can
train several players. What type of relationship exists between the tables ‘Coach’ and ‘Player’?
__________________________________________________________________________ (1)
d. The football club has a website used for the public and a mobile app specifically for the players.
Each player has a user account to log in and use the mobile app. The app has various features
including displaying the player’s personal details, training schedules and game fixtures.
Which THREE of the below mentioned IT roles are involved in the development and
maintenance of the above scenario? Explain your answer.
Page 4 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
Role 1: ___________________________________________________________(1)
Explanation: _____________________________________________________________
___________________________________________________________(1)
Role 2: ___________________________________________________________(1)
Explanation: _____________________________________________________________
___________________________________________________________(1)
Role 3: ___________________________________________________________(1)
Explanation: _____________________________________________________________
___________________________________________________________(1)
(Total: 10 marks)
c. An office situated in Rome sends emails to clients that are located all over the world.
d. Data accessed by starting at the beginning and then searched through in sequence, until the
required information is found.
g. A doctor uses a computer to examine digital x-rays stored on the server found in the same
building.
i. LAN ii. WAN iii. MAN (1)
Page 5 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
h. This memory component stores the data of the operating system and programs that are
currently running, for access by the CPU.
i. ROM ii. Flash Memory iii. MAN (1)
i. a Serial Access ii. a Direct Access iii. both Serial and Direct Access (1)
(Total: 10 marks)
6. Examine the logic circuit and the incomplete truth table shown below, and answer the questions
that follow.
A B C D E F X
0 0 0 1 0 0 0
0 0 1
0 1 0 1 1 0 1
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
a. Identify the logic gates marked as G1, G2, and G3 and draw their corresponding symbol.
G1
(2)
G2
(2)
G3
(2)
(Total: 8 marks)
Page 6 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
7. An Operating System (OS) is a very important system software that acts as an interface
between computer hardware components and the user. Which OS function from the ones listed
below fits best in the following descriptions:
(Total: 5 marks)
8. X-Rays produce radioactive waves which are harmful to the body. For this reason, the
algorithm shown below is used as a safety measure. Answer the questions that follow.
a. Mention ONE type of analogue data and ONE type of digital data in the above scenario.
__________________________________________________________________________ (2)
Page 7 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
__________________________________________________________________________ (2)
i. (1)
ii. (1)
d. Mention ONE variable that needs to be declared when coding the above algorithm in JAVA and
briefly explain its use.
__________________________________________________________________________ (2)
____________________________________________________________________________
__________________________________________________________________________ (2)
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________ (3)
(Total: 13 marks)
9. A software development house employs several programmers who must log on to the
company’s system to access their work.
a. Mention ONE reason why it is important for the company that all programmers are logged in
the system using their personal account.
____________________________________________________________________________
__________________________________________________________________________ (1)
__________________________________________________________________________ (1)
c. Mention ONE way how the company can protect their system from being hacked.
__________________________________________________________________________ (1)
Page 8 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
d. Mention ONE way how the company can protect against loss or corruption of files due to
hardware failure.
__________________________________________________________________________ (1)
e. The company recommends that all employees take a 10-minute break every hour.
Mention TWO ways how the employees could ensure security from unauthorized people to
access their computer whilst taking regular breaks.
____________________________________________________________________________
__________________________________________________________________________ (2)
(Total: 6 marks)
a. Mention the datatype which would be suitable to store the following data:
b. Analyse the JAVA code snippet shown below and answer the questions below.
Line 1: do{
Line 2: System.out.print(“Enter a number:”);
Line 3: Keyboard.readInt(num);
Line 4: if (num % 2 == 0)
Line 5: odd++;
Line 6: else
Line 7: even++;
Line 8: while (num > 0);
Line 9: System.out.println(“Even numbers: ” + odd);
Line 10: System.out.println(“Odd numbers: ” + even);
__________________________________________________________________________ (1)
__________________________________________________________________________ (1)
Page 9 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
____________________________________________________________________________
__________________________________________________________________________ (1)
____________________________________________________________________________
__________________________________________________________________________ (1)
v. The program snippet includes a logical error. Rewrite the lines of code that contain such
error.
____________________________________________________________________________
__________________________________________________________________________ (2)
(Total: 10 marks)
Page 10 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
Blank Page
Page 11 of 12
SEC09/1.22m
DO NOT WRITE ABOVE THIS LINE
Blank Page
Page 12 of 12
Index Number:_________________ SEC09/2A.22m
SUBJECT: Computing
PAPER NUMBER: IIA
DATE: 27th May 2022
TIME: 4:00 p.m. to 6:05 p.m.
Directions to Candidates
Write your index number where indicated at the top of the page.
Answer ALL questions in the spaces provided. You are not allowed to use extra sheets other than
those provided in this booklet.
Good English and orderly presentation are important.
The use of flowchart templates is permitted. The use of calculators is not permitted.
This paper carries 85 marks of the examination.
Question
Number 1 2 3 4 5 FOR MARKERS’ USE
© The MATSEC Examinations Board reserves all rights on the examination questions in all examination papers set by the said Board.
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
b. Should the 3rd Generation Programming Language (3GL) or a 4th Generation Language (4GL)
be used for programming the mobile app? Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
c. The following Assembly Language program snippet includes few instructions from the entire
instruction set of the robo-cleaner.
Line 6: STA 101; Stores the contents of accumulator A in memory address 101.
____________________________________________________________________________
__________________________________________________________________________ (1)
ii. Mention ONE opcode, ONE operand and ONE label from the above program snippet.
Page 2 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
iii. Mention ONE instruction from the above program snippet in which the Arithmetic and Logic
Unit (ALU) is not involved during the CPU fetch and execute cycle. Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
iv. Complete the following trace table showing the changes in the values of registers A, X and
memory address 101 during execution of the program.
Line 5
Line 5
Line 5
Line 5
(3)
____________________________________________________________________________
__________________________________________________________________________ (1)
vi. Write the equivalent of the above program in ONE JAVA statement.
__________________________________________________________________________ (1)
d. Suggest ONE way how the robo-cleaner can connect to the Internet.
__________________________________________________________________________ (1)
(Total: 16 marks)
Page 3 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
2. One use of Hexadecimal numbers is to define different colours. Each colour is made up of
three parts: RED (R), GREEN (G) and BLUE (B). Each part is represented using a 2-digit
hexadecimal value. For example, the hex code for the colour orange is FF6400 16 as shown in
the diagram below.
R R G G B B
F F 6 4 0 0
a. If each part of the code is stored as binary in an 8-bit register, show the binary bit pattern for
the red part of the above code (FF16). Show your working.
____________________________________________________________________________
__________________________________________________________________________ (2)
____________________________________________________
____________________________________________________
____________________________________________________________________________
__________________________________________________________________________ (2)
c. Can each part of the colour code be stored in a 6-bit register? Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
i. To obtain the colour green, the thermometer subtracts 20010 from the
red part of the orange colour code (FF16 - 20010) using a Two’s (Source:
www.flaticon.com)
Complement 9-bit register. Show the green colour code in
hexadecimal. Show your working.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________ (6)
Page 4 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
ii. Draw the flowchart for the digital thermometer in the space below.
(4)
(Total: 16 marks)
a. Construct a Boolean logic statement, using X, P, F and S, to represent the conditions necessary
for the system to raise the exit barrier.
__________________________________________________________________________ (2)
b. Draw a logic circuit for the above system in the space below.
(2)
Page 5 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
c. Draw the truth table for the above system in the space below.
(2)
d. This system uses an AVR32 processor which is a 16-bit Single Core, 150 MHz CPU.
i. A CPU is made up of the Control Unit (CU) and the Arithmetic and Logic Unit (ALU). Mention
THREE registers found in a CPU. For each mentioned register, indicate in which unit it is
found and its purpose.
(2)
(2)
(2)
__________________________________________________________________________ (1)
iii. Explain how the wordlength affects the performance of the CPU.
____________________________________________________________________________
__________________________________________________________________________ (1)
Page 6 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
iv. How does the address bus limit the maximum RAM size that a system can have? Explain
by means of an example.
____________________________________________________________________________
__________________________________________________________________________ (2)
____________________________________________________________________________
__________________________________________________________________________ (1)
vi. An important function of the CPU is the fetch and execute cycle. Briefly explain the concept
of the fetch and execute cycle.
____________________________________________________________________________
__________________________________________________________________________ (1)
vii. Mention ONE reason why the AVR32 processor is not ideal for a laptop.
____________________________________________________________________________
__________________________________________________________________________ (1)
(Total: 19 marks)
4. BeFit Inc. owns and operates a fitness centre, and the company is planning to upgrade its
computerised system to cater for a wider range of services. BeFit Inc. will be using the services
of APlus Logistics Ltd for the renewal of their system.
a. The Systems Analyst is one IT role who will be engaged by APlus Logistics Ltd. Briefly explain
the role of a systems analyst.
____________________________________________________________________________
__________________________________________________________________________ (1)
b. Identify TWO ways how a systems analyst can collect information during the ‘Present System
Study’ phase.
____________________________________________________________________________
__________________________________________________________________________ (2)
c. APlus Logistics Ltd has a team of testers to test the system and provide feedback for further
tuning and enhancements before launching the product. In which phase of the system
development life cycle does this happen?
__________________________________________________________________________ (1)
Page 7 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
d. Once the system has been coded, three types of documentation should have been produced
in the process. Briefly describe the three types of documentation.
i. Technical Documentation.
____________________________________________________________________________
__________________________________________________________________________ (1)
____________________________________________________________________________
__________________________________________________________________________ (1)
____________________________________________________________________________
__________________________________________________________________________ (1)
e. One of the system development life cycle stages is the Implementation and Changeover Stage.
i. Briefly explain what happens in the implementation phase.
____________________________________________________________________________
__________________________________________________________________________ (1)
ii. Suggest a suitable changeover method and give a reason for your answer.
____________________________________________________________________________
__________________________________________________________________________ (2)
f. The current system that BeFit Inc. uses has a menu-driven user
interface which includes a menu, as shown on the right, and which is
coded in JAVA as shown in the program snippet below.
Line 1: do{
Line 2: System.out.println(“1. Members”);
Line 3: System.out.println(“2. Administrator”);
Line 4: System.out.println(“3. Exit”);
Line 5: System.out.print(“Menu option:”);
Line 6: option = Keyboard.readInt();
Line 7: switch (option) {
Line 8: case 1: System.out.println(“Members Menu”);
Line 9: case 2: System.out.println (“Administrator Menu”);
Line 10: }
Line 11: } while (option != 3);
Page 8 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
__________________________________________________________________________ (1)
__________________________________________________________________________ (1)
iii. Suggest a solution to this error without changing the decision construct used.
__________________________________________________________________________ (1)
iv. Re-write the switch construct only using a different decision construct.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________ (3)
g. The system analyst remarked that the system will be more user-friendly if the menu-driven
interface is changed to a Graphical User Interface. Briefly explain how a GUI will be more
user-friendly.
____________________________________________________________________________
__________________________________________________________________________ (1)
(Total: 17 marks)
a. Define ‘network’.
(Source:
www.flaticon.com)
_______________________________________________________________
_________________________________________________________________________ (1)
Page 9 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
ii. Give ONE advantage of using LAN over WLAN. Explain your answer.
____________________________________________________________________________
__________________________________________________________________________ (2)
c. If several individuals from around the globe want to play games in multiplayer mode, what
type of network is required? Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
d. Mention ONE network component that is required for connecting to a WAN. Briefly explain its
use.
____________________________________________________________________________
__________________________________________________________________________ (2)
____________________________________________________________________________
__________________________________________________________________________ (3)
__________________________________________________________________________ (1)
g. Gaming in multiplayer mode around the globe usually involve the player to log on to a virtual
private network using their username and password.
i. What measure is required to avoid hackers from stealing the players’ username and
password when logging in? Briefly explain how this measure works.
____________________________________________________________________________
__________________________________________________________________________ (2)
ii. Is your answer in part (i) above a measure to enforce data security or data integrity?
Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
(Total: 17 marks)
Page 10 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
Blank Page
Page 11 of 12
SEC09/2A.22m
DO NOT WRITE ABOVE THIS LINE
Blank Page
Page 12 of 12
Index Number:_________________ SEC09/2B.22m
SUBJECT: Computing
PAPER NUMBER: IIB
DATE: 27th May 2022
TIME: 4:00 p.m. to 6:05 p.m.
Directions to Candidates
Write your index number where indicated at the top of the page.
Answer ALL questions in the spaces provided. You are not allowed to use extra sheets other than
those provided in this booklet.
Good English and orderly presentation are important.
The use of flowchart templates is permitted. The use of calculators is not permitted.
This paper carries 85 marks of the examination.
Question
Number 1 2 3 4 5 FOR MARKERS’ USE
© The MATSEC Examinations Board reserves all rights on the examination questions in all examination papers set by the said Board.
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
language?
__________________________________________________________________________ (1)
b. Mention ONE factor why the manufacturers programmed the smartphone app using JAVA and
not Assembly language.
____________________________________________________________________________
__________________________________________________________________________ (1)
____________________________________________________________________________
__________________________________________________________________________ (2)
____________________________________________________________________________
__________________________________________________________________________ (2)
e. Every program, whether coded in Low- and High-level language must be translated into a
language understood by the computer, as shown in the diagram below.
____________________________________________________________________________
__________________________________________________________________________ (2)
ii. Identify which translator is used for programs coded in Low-Level Language.
__________________________________________________________________________ (1)
iii. Identify which translators are used for programs coded in High-Level Language.
__________________________________________________________________________ (2)
Page 2 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
iv. What programming error is detected whilst a program is being translated? Give an example
of such error.
____________________________________________________________________________
__________________________________________________________________________ (2)
f. Suggest ONE way how the robo-cleaner can connect to the Internet.
__________________________________________________________________________ (1)
(Total: 14 marks)
2. One use of Hexadecimal numbers is to define different colours. Each colour is made up of
three parts: RED (R), GREEN (G) and BLUE (B). Each part is represented using a 2-digit
hexadecimal value. For example, the hex code for the colour orange is FF6400 16 as shown in
the diagram below.
R R G G B B
F F 6 4 0 0
a. If each part of the code is stored as binary in an 8-bit register, show the binary bit pattern for
the red part of the above code (FF16). Show your working.
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________ (2)
____________________________________________________
____________________________________________________
____________________________________________________________________________
__________________________________________________________________________ (2)
c. Can each part of the colour code be stored in a 6-bit register? Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
Page 3 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
1: _____________________________________________________________________ (1)
2: _____________________________________________________________________ (1)
3: _____________________________________________________________________ (1)
4: _____________________________________________________________________ (1)
e. The digital thermometer can also connect to the smartphone and send the temperature
readings on a software installed on the smartphone. Is this software a system software or an
application software? Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
f. The digital thermometer sends the temperature readings to the smartphone using the 8-bit
ASCII character coding system.
__________________________________________________________________________ (1)
Page 4 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
____________________________________________________________________________
__________________________________________________________________________ (1)
__________________________________________________________________________ (1)
(Total: 15 marks)
− the number plate has been recorded by the system (P=1); (Source:
− whether the car belongs to a resident (S=1) or; www.flaticon.com)
− a fee has been paid (F=1).
a. The logic circuit for the cark park automated system is shown below. Determine the TWO
missing logic gates.
b. Complete the below truth table for the above system. (2)
P F S Z X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
This question continues on next page.
Page 5 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
c. This system uses an AVR32 processor which is a 16-bit Single Core, 150 MHz CPU.
i. A CPU is made up of the Control Unit (CU) and the Arithmetic and Logic Unit (ALU). Briefly
explain the purpose of these units.
____________________________________________________________________________
__________________________________________________________________________ (2)
ii. The CPU contains several registers. Complete the missing sections of the table below:
Instruction
Register
(2)
ALU
(2)
iii. One of the key features of computer architecture is the use of the System Bus. Mention the
bus that corresponds to the descriptions shown below.
Description Bus
iv. The AVR32 processor has a 16-bit data bus. What term is used to refer to the size of the
data bus?
__________________________________________________________________________ (1)
Page 6 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
____________________________________________________________________________
__________________________________________________________________________ (1)
vi. An important function of the CPU is the fetch and execute cycle. Continue the below missing
steps:
Step 2:
(1)
Step 4:
(1)
Step 5:
(1)
(Total: 20 marks)
4. BeFit Inc. owns and operates a fitness centre, and the company is planning to upgrade its
computerised system to cater for a wider range of services. BeFit Inc. will be using the services
of APlus Logistics Ltd for the renewal of their system.
a. The Systems Analyst is one IT role who will be engaged by APlus Logistics Ltd. Briefly explain
the role of a systems analyst.
____________________________________________________________________________
__________________________________________________________________________ (1)
b. Identify TWO ways how a systems analyst can collect information during the ‘Present System
Study’ phase. Tick the correct answers. (2)
Interviews
Developing a specification report
Trying the existing system
Testing for Syntax Errors
Developing a code
Page 7 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
c. APlus Logistics Ltd has a team of testers to ensure that the system is error-free. In which
phase of the system development life cycle does this happen?
__________________________________________________________________________ (1)
d. Once the system has been coded, three types of documentation should have been produced
in the process. Choose from the following types of documentation to complete the following
paragraph:
(3)
product; it does not go into how the product is designed and how it works internally.
e. One of the system development life cycle stages is the Implementation and Changeover Stage.
The systems analyst decided that it is best to change to the new system using a Direct
Changeover method.
____________________________________________________________________________
__________________________________________________________________________ (1)
ii. Mention ONE other changeover method and briefly explain how it works.
____________________________________________________________________________
__________________________________________________________________________ (2)
Page 8 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
f. The current system that BeFit Inc. uses has a menu-driven user
interface which includes a menu as shown on the right and which
is coded as shown in the JAVA program snippet below.
ii. If the user enters letter ‘a’ as a menu option, the program crashes.
____________________________________________________________________________
__________________________________________________________________________ (1)
__________________________________________________________________________ (1)
Page 9 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
iii. An if-else construct could have been used instead of the switch decision construct as shown
in the incomplete code shown below. Fill in the missing code.
Line 8: _______________________________________________________________(1)
g. The system analyst remarked that the system will be more user-friendly if the menu-driven
interface is changed to a GUI. What does the acronym GUI stand for?
__________________________________________________________________________ (1)
(Total: 20 marks)
a. Define network.
______________________________________________________________ (Source:
www.flaticon.com)
__________________________________________________________________________ (1)
LAN: _______________________________________________________________(1)
WLAN: _______________________________________________________________(1)
Page 10 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
__________________________________________________________________________ (1)
iii. Data in a LAN is transferred faster between the connected devices than in WLAN. Briefly
explain why.
____________________________________________________________________________
__________________________________________________________________________ (1)
c. If several individuals from around the globe want to play games in multiplayer mode, a WAN
is required. What does the acronym WAN stand for?
__________________________________________________________________________ (1)
d. Mention ONE network which is a WAN and which is used by people from around the globe, and
mention TWO uses of such network.
Network: _______________________________________________________________(1)
Use 1: _______________________________________________________________(1)
Use 2: _______________________________________________________________(1)
e. Mention ONE network component that is required for connecting to a WAN. Briefly explain its use.
____________________________________________________________________________
__________________________________________________________________________ (2)
f. Gaming in multiplayer mode around the globe usually requires the player to log on to a virtual
private network using their username and password.
i. The method used to avoid hackers from stealing the players’ details is called data
encryption. Briefly explain how data encryption works.
____________________________________________________________________________
__________________________________________________________________________ (1)
ii. Data encryption is a data integrity measure. Do you agree with this statement? Explain.
____________________________________________________________________________
__________________________________________________________________________ (2)
iii. Mention TWO methods how the players can ensure password security.
____________________________________________________________________________
__________________________________________________________________________ (2)
(Total: 16 marks)
Page 11 of 12
SEC09/2B.22m
DO NOT WRITE ABOVE THIS LINE
Blank Page
Page 12 of 12