ADVANCED CERTIFICATE OF SECONDARY EDUCATION EXAMINATION (ACSEE)
FORM SIX PRE – MOCK INTERSCHOOLS JOINT EXAMINATION - 2025
COMPUTER SCIENCE 1
136/1
Time: 3:00 Hours Date: Monday 20th January 2025 p.m.
Instructions
1. This paper consists of section A and B with a total of ten (10) questions.
2. Answer all questions in section A and two (2) questions from section B.
3. Section A carries seventy (70) marks and section B carries thirty (30) marks.
4. Cellular phones and any unauthorized materials are not allowed in the examination room.
5. Write your Examination Number on every page of your answer booklet(s) provided.
Page 1 of 3
Form Six Pre – Mock Interschool Joint Exams 2025
SECTION A: (70 Marks)
1. a) Explain the meaning of Central Processing Unit and its Components (04 Marks)
b) What is the difference between Dynamic RAM (DRAM) and Static RAM (SRAM)?
(03 Marks)
c) What is the difference between optical drives and SSD. Provide examples and the use for
each. (03 Marks)
2. a) Discuss the real-life application of Simplex, Half-duplex, Full-duplex communication modes
at your environment. (04 Marks)
b) A computer network can be classified based on various criteria. However, the most common
criteria are Classification based on geographical area, Classification based on ownership/access
restriction, Classification based on topology and Classification based on architecture. Explain
different types of computer networks based on geographical area. (04 Marks)
c) Explain the following terms and provide examples for each: (02 Marks)
I. Transmission media
II. Physical topology
3. a) Using laws of Boolean algebra, simplify the following expression: A𝐴𝐵 + 𝐴𝐵𝐶 + 𝐴𝐵𝐶
(04 Marks)
b) Define the following gates and draw their circuit: (06 Marks)
(i) NOT
(ii) OR
(iii) AND
(iv) NAND
(v) NOR
(vi) XOR
4. a) A security model is a framework that determines how security is implemented by implementing
security policies. Briefly explain five security models. (05 Marks)
b) What is attack as it is used in computer security? (01 Mark)
c) Explain four types of attack (04 Marks)
5. (a) Give the meaning of a pointer. (01 Mark)
(b) State three advantages of a pointer. (03 Marks)
(c) Explain three the advantage of dynamic data structure. (03 Marks)
Page 2 of 3
Form Six Pre – Mock Interschool Joint Exams 2025
6. A programmer uses a program design tool that can allow user to inter two integers then;
(a) Draw a flowchart to reads two values, determines the largest value and prints the largest
value with an identifying message. (04 Marks)
(b) Write a pseudo code for (a) above. (04 Marks)
(c) Differentiate flowchart from pseudo code. (02 Marks)
7. (a) Explain four differences between high-level languages and low-level languages. (4 Marks)
(b) Write a C++ program that asks the user to enter the length of the sides of a triangle and
outputs the type of the triangle (Scalene, Isosceles and Equilateral). (06 Marks)
SECTION B: (30 Marks)
8. The Dar es Salaam Institute of Technology has recently experienced exponential increase of the
students and staff members. The institute has planned to establish a database to store their data
and be handled easily. Describe six advantages the institute would enjoy from the new plan.
(15 Marks)
9. A new bank TBP established in Dodoma is planning to own branches in 10 more regions of
Tanzania. The bank wants to have all its offices to be connected electronically. Describe six
important devices which can assist the bank to implement the idea. (15 Marks)
10. (a) What is cloud computing? (01 Mark)
(b) Explain types of services offered in cloud computing. (06 Marks)
(c) Cloud computing services are helpful in a variety of circumstances. What are the four
importance of clouds computing? (08 Marks)
Page 3 of 3
Form Six Pre – Mock Interschool Joint Exams 2025
FORM SIX PRE MOCK INTER SCHOOLS JOINT EXAMINATION
2025
MARKING SCHEME FOR
COMPUTER SCIENCE 1
1. a) Explain the meaning of Central Processing Unit and its Components. (marks 4)
ANSWER
CPU is considered as the computer’s heart or brain because of the core functions it
executes. executes all arithmetic and logical operations as well as organizing the activities
of all other computer units. It is housed on the motherboard or system board as a
microprocessor chip. It can also be called a microprocessor or processor
Components of Central Processing Unit
i) Control Unit (CU) organizes the processing of data and instructions. It
does not do any actual processing of data. It acts as a supervisor to control and coordinate
the activities of other units of a computer.
ii) Arithmetic logic unit (ALU) also known as the computer’s mathematical brain, consists
of two units namely arithmetic unit and logic unit. The arithmetic unit performs arithmetic
operations on the data that is made available to it.
iii) Memory unit (MU) also known as processor registers or CPU registers are storage
spaces for units of memory that are used to transfer data for immediate use by the CPU.
They are used temporarily to store data, instructions, addresses and intermediate results
and send them to the processor.
b) What is the difference between Dynamic RAM (DRAM) and Static RAM
(SRAM)? (marks 3)
ANSWER
Dynamic RAM is commonly used as a computer’s main memory. Each DRAM memory
cell comprises a transistor and a capacitor within an integrated circuit, and a data bit is
stored in the capacitor. While Static RAM (SRAM) is composed of four to six transistors.
It preserves data in the memory as long as power is supplied to the system, unlike DRAM,
which must regularly be refreshed. SRAM is faster but most expensive, making DRAM
the more common memory in computer systems.
c) What is the difference between optical drives and SSD. Provide examples and the
use for each. (marks 3)
ANSWER
A solid-state drive (SSD) is a storage device that uses integrated circuit assemblies to store
data persistently, typically using flash memory, and functioning as secondary storage in the
hierarchy of computer storage.
Solid-state drive (SSD) which is used in compact devices such as laptops and tablets. An
optical drive is an internal or external computer disk drive that uses laser beam technology
to read and write data. Examples includes CD, DVD and Blue- Ray disk.
2. a) Discuss the real-life application of Simplex, Half-duplex, Full-duplex communication
modes at your environment (marks 4)
ANSWER
Simplex mode Data can only be transmitted in one direction; hence communication is
unidirectional. As a result, they cannot convey a message to the sender. Simplex systems
use unidirectional communication, in which we only need to provide a command/signal
and do not require a response. Loudspeakers, television and remote control, radio call,
keyboard and monitor are examples of simplex mode.
Half-duplex data transmission implies that data can be delivered in both directions on a
single signal carrier, but not simultaneously.
For example, on a local area network using half-duplex transmission technology, one
workstation can send data on the line and then immediately receive data on the line from
the same direction in which the data was just transferred. On contrary to the half-duplex
transmission, which requires a bidirectional line (one that can transmit data in both ways),
data can only be delivered in one direction at a time. A radio call used by police is an
example of half-duplex communication in which messages are sent one at a time but in
both directions.
Full duplex mode allows data transfer in both directions simultaneously. A telephone
network is an example of full duplex communication since it allows two people to talk and
listen simultaneously across a telephone line.
b) A computer network can be classified based on various criteria. However, the most
common criteria are Classification based on geographical area, Classification based
on ownership/access restriction, Classification based on topology and Classification
based on architecture. Explain different types of computer networks based on
geographical area. (marks 4)
ANSWER
Personal Area Network (PAN) is a computer network built around a single person. It
comprises a computer, mobile device, or personal digital assistant. PAN connects personal
gadgets to a digital network and the internet by establishing communication between them.
PAN is the smallest network which is very personal. This type of network normally ranges
from around 10 meters.
A Local Area Network (LAN) is a collection of computer and peripheral devices that are
linked in a specific location, such as a school, laboratory, home, or business building. It is
a network that is extensively used for sharing resources such as files, printers, games, and
other applications. For example, connecting computers and printers at home or office.
Metropolitan Area Network (MAN) is a computer network that extends across an entire
city, college campus, or a small region. This network type is larger than LAN, which is
mainly limited to a single building or site. Depending upon the type of configuration, this
type of network allows you to cover an area from several miles to tens of miles. In other
words, when two or more LANs network are connected for communication, it becomes a
MAN network.
Wide Area Network (WAN) is a type of computer network that extends over large
geographical areas, such as whole country, states, and the continent or entire globe. An
example of a Wide Area Network is the internet. When many LANs and MAN networks
are connected to each other for the purpose of communication, the formed network will be
termed WAN.
c) Explain the following terms and provide examples for each: (marks 2)
I. Transmission media
II. Physical topology
ANSWER
I. A transmission media is any communication channel that uses electromagnetic signals to
transmit data from the transmitter to the receiver. The primary role is to transmit data in the
form of bits across the network. Data transmission functions similarly to a physical path
between the sender and the recipient. For instance, in a copper cable network, the bits are
in the form of electrical signals, whereas in a fibre network, the bits are available in light
pulses.
II. Physical topology refers to the physical layout of a network which includes the devices,
installation, and location. The physical topology can be classified as bus, ring, star, tree,
mesh and hybrid.
3. a) Using laws of Boolean algebra, simplify the following expression: A𝐴𝐵 + 𝐴𝐵𝐶 + 𝐴𝐵𝐶
(marks 3)
ANSWER
b) Define the following gates and draw their circuit: (marks 6)
(i) NOT
(ii) OR
(iii) AND
(iv) NAND
(v) NOR
(vi) XOR
ANSWER
NOT gate Unlike OR and AND gates, the NOT gate is the digital circuit with only one
input signal and one output signal, and its output signal complements its input signa. The
logical symbol of the NOT gate is
OR gate is the digital circuit with two or more input signals, and its output signal is the
OR combination of its input signal. The logical symbol of the OR gate is
AND gate is the digital circuit with two or more input signals, and its output signal is the
AND combination of its input signal. The logical symbol of the AND gate is
NAND stands for NOT-AND and refers to the complement of AND gate output. It works
oppositely to the AND gate. The NAND gate has two or more input signals, and its output
signal complements the AND gate. The logical symbol of the NAND gate is
NOR stands for NOT-OR, it refers to the complement of OR gate output. It works
oppositely to the OR gate. The NOR gate has two or more input signals, and its output
signal complements the OR gate. The logical symbol of the NOR gate is
XOR has only two inputs, and its output is one (1) only when two inputs are at
opposite inputs, that is, 1 and 0. The logical symbol of the exclusive OR is
4. a) A security model is a framework that determines how security is implemented by
implementing security policies. Briefly explain five security models. (marks 5)
ANSWER
Bell-LaPadula (BLP) security model is also, called the multi-level model, was proposed
by Bell and LaPadula for enforcing access control for computer systems. In this model,
each subject (user) and each object (resources such as, files) is assigned one of the security
levels: top secret, secret, confidential, classified and unclassified.
Biba security model was published to handle integrity issues which BLP Model did not
address. The goal of the Biba model was to prevent unauthorized users from making
modifications to particular computer resources.
Clark-Wilson model distinguishes between two types of objects, namely Constrained Data
Items (CDIs) and Unconstrained Data Items ((UDIs). It also addresses two types of
transactions which are Integrity Verification Procedures (IVPs) and transaction procedures
(TPs).
Chinese Wall model’s theory is based on a conflict of interest, which states that a single
user should not have access to confidential information belonging to two separate
interested and participating stakeholders. User behavior influences access control policies.
Harrison–Ruzzo–Ullman (HRU) The BLP model lacks mechanisms for changing access
rights and deleting subjects and objects due to the results. The HRU model addresses these
issues by defining an authorization system to assign access rights and verify compliance
with any policy, preventing unauthorized access.
b) what is attack as it is used in computer security? (marks 1)
ANSWER
An attack is an information security threat involving the unauthorized acquisition,
modification, destruction, removal, implant, or disclosure of information.
c) explain four types of attack (marks 4)
Interception attack is the act that occurs when an individual who is not authorized gets
access to files, data, conversation, e-mail, etc., between two individuals who are
communicating. It can be performed either when data are in motion or stationary. In the
interception, the attack
occurs before the information reaches the intended recipient.
Interruption attack This occurs when the individual who is not authorized to access data
gains access to information between two communicating individuals making the services
unavailable temporarily or permanently. The person interrupts the information such as,
files, conversations, E-mails, etc.
Modification attack This is editing the content of information from an individual without
the person or organization’s consent. This is referred to as an integrity attack because the
data integrity is damaged. When the data is compromised, this can cause a severe problem
for an individual or organization.
Fabrication attack refers to the act of generating incorrect data and insert it alongside
authentic data. This involves generating data, processes, communications, or other similar
activities within a system. Fabrication attacks initially affect integrity but can also be
considered availability attacks.
5. (a) give the meaning of a pointer. (marks 1)
ANSWER
A pointer is a variable whose value is the address of another variable, that is, the direct
address of the memory location.
(b) state three advantages and disadvantage of a pointer. (marks 6)
ANSWER
The following are the advantages of pointers:
(a) It can return multiple values from a function
(b) It reduces the code and improves performance
(c) It retrieves strings and trees
(d) Used with arrays, structures, and functions
(e) It allows you to access any memory location in the computer’s memory
(f) It can allocate and de-allocates memory dynamically
The following are the disadvantages of pointers:
(a) If it is wrongly referenced, it will affect the entire program.
(b) It may lead to a memory leak if the dynamically allocated memory is not freed.
(c) An uninitialized pointer leads to a segmentation fault.
(c) explain three the advantage of dynamic data structure. (marks 3)
ANSWER
The following are the advantages of dynamic data structure:
(a) It makes the most efficient use of memory since the data structure only uses as much
memory as it needs.
(b) The memory allocation is not fixed so there will be no problem adding and removing
data items.
(c) Easier to program as there is no need to check data structure size.
6. A programmer uses a program design tool that can allow user to inter two integers then;
(a) Draw a flowchart to reads two values, determines the largest value and prints the
largest value with an identifying message. (marks 4)
ANSWER
(b) Write a pseudo code for (a) above. (4 marks)
ANSWER
• Start
• Read VALUE1 and VARUE2, as integer datatype
• check if ( VALUE1 > VALUE2)
print max is VALUE1
• else
print print max is VALUE2
• Stop
(c) Differentiate flowchart from pseudo code. (2 marks)
ANSWER
A flowchart is an illustrative representation that shows the sequence of operations that must
be followed to solve a problem. It can be defined as a diagrammatic representation of an
algorithm. WHILE Pseudocode is a representation of algorithm that contains a detailed
description of instructions that a computer must follow in a particular order to solve a given
problem.
7. (a) Explain four differences between high-level languages and low-level languages. (4
marks)
(b). Write a program that asks the user to enter the length of the sides of a triangle and
outputs the type of the triangle (Scalene, Isosceles and Equilateral). (6 marks)
ANSWER
SECTION B 30 MARKS
8. A new bank TBP established in Dodoma is planning to own branches in 10 more regions
of Tanzania. The bank wants to have all its offices to be connected electronically.
Describe six important devices which can assist the bank to implement the idea. (15
marks)
ANSWER
Network devices are physical hardware that allows electronic devices to communicate
with each other. Examples of network devices include routers, modems, Switches and
Network Interface Cards (NIC).
Modem: Modem is a device that enables a computer to send or receive data over telephone
or cable lines. The data stored on the computer is digital, whereas a telephone line or cable
wire can transmit only analog data.
Repeater: A repeater is a physical layer device. Its main function is to regenerate the signal
over the same network before the signal becomes too weak or corrupted to extend the
length to which the signal can be transmitted over the same network.
Hub: This is a multiport repeater. It connects multiple wires coming from different
branches; for example, the connector in a star topology connects different stations.
Intelligent Hub: This is the type of hub that works like active hubs and includes remote
management capabilities. It also provides flexible data rates to network devices. Moreover,
they enable an administrator to monitor the traffic passing through the hub and configure
each port.
Bridge: This operates at the data link layer. A bridge is a repeater with add on the
functionality of filtering content by reading the MAC addresses of the source and
destination.
Switch: This network device uses a packet switching technique to receive, store and
forward data packets on the network. The switch maintains a list of network addresses of
all the devices connected to it. It is sometimes known as an intelligent hub
Routers: This is a device like a switch that routes data packets based on their IP addresses.
The router is mainly a Network Layer device.
Gateway: A gateway, as the name suggests, is a passage to connect two networks together
that may work upon different networking models.
Brouter: This is also known as the bridging router, which is a device that combines features
of both bridge and router. It can work either at the data link layer or a network layer.
1. (a) What is cloud computing? (1 marks)
ANSWER
Cloud computing is the term that describes any service delivered over the Internet.
A motivation behind cloud computing is to provide computing services outside a locally
installed computer or computer network, generally outside a local premise. These
computing services, typically hardware and software, are usually delivered through the
Internet by third-party companies.
(b) Explain types of services offered in cloud computing. (6 marks)
ANSWER
Infrastructure as a Service (IaaS): This sort of cloud computing is concerned with
providing hardware services such as real and virtual servers on demand for various
applications such as, hosting and storage. IaaS is commonly used to host a website or a
mobile application. In the case of non-free IaaS, the membership price is usually paid
monthly or according to any other arrangement negotiated.
Software as a Service (SaaS): This type of cloud computing is concerned with providing
software as a service. Instead of installing software on your computer, you access it over
the Internet and utilize it in your daily activities on demand. SaaS includes web-based email
(such as Yahoo and Gmail), collaboration software such as Google documents (Google
docs) and file storage such as Dropbox and Google drive.
Platform as a Service (PaaS): This type of cloud computing service provides tools for
developing and deploying applications that run on a remote server. An example of PaaS is
writing, compiling, and running computer programs using online compilers (such
as C++ compiler)
(c) Cloud computing services are helpful in a variety of circumstances. What are the four
importance of clouds computing. (8 marks)
ANSWER
Cloud computing services are helpful in a variety of circumstances. Some of the
benefits are:
Backup and restoration: It is easy to back up your data offsite and restore it if something
goes wrong.
Low cost: It allows you to save a lot of money because it doesn’t require any hardware.
Security: Cloud security covers the set of controls, policies, technologies, procedures, and
services that ensure the safety of the hosted services over the Internet and protect cloud
data and infrastructure. The benefits of the rapid operation, flexibility, and scalability have
made cloud computing famous among many business organizations. Cloud computing
offers state-of-the-art security mechanisms that guarantee data is stored and handled safely.
Easiness in deploying an application: It is easy to deploy an application you developed
because you do not need to buy your server, manage and maintain it. Convenience: Access
to cloud-based services may be done anywhere, provided you have access to the Internet.