CSEC IT Theory Jun 2004 Tec

Embed Size (px)

Citation preview

  • 7/30/2019 CSEC IT Theory Jun 2004 Tec

    1/4

    CXC IT THEORY JUN 2004

    SECTION I AND II

    ANSWER ALL QUESTIONS

    SECTION I

    1. (a) Name the hardware component of a computer that performs EACH

    of the following functions:

    (i) Directs internal operations within the CPU

    (ii) Stores programs and data that are currently being used by the CPU

    (iii) Stores instructions that are used during the boot-up process.

    (3 marks)

    (b) State TWO factors that affect the quality of the display on the monitor. (2 marks)

    Total 5 marks

    2. (a) Choose ONE appropriate method of data entry for EACH of the following

    situations or applications:

    (i) Production of CD-ROM based text from existing books

    (ii) Marking multiple choice examination scripts

    (iii) Entering sound into the computer (3 marks)

    (b) Briefly describe how the following types of printers generate hardcopy

    output:

    (i) Dot-matrix

    (ii) Thermal

    (iii) Ink-jet (3 marks)

    Total 6 marks

    3. List TWO advantages and TWO disadvantages of an integrated software package

    over a collection of separate applications packages running under a common

    operating environment. (4 marks)

  • 7/30/2019 CSEC IT Theory Jun 2004 Tec

    2/4

    4. (a) State the binary and BCD representation for 187. (4 marks)

    (b) Using eight-bit, twos complement binary numbers, compute 11-7.

    (2 marks)

    Total 4 marks

    5. (a) What is the difference between a command-line interface and a graphical- user interface?

    (2 marks)

    (b) State TWO advantages of installing more than one operating systems on a stand-alone

    microcomputer. (2 marks)

    Total 4 marks

    6. (a) List TWO advantages and TWO disadvantages of using a network in place of stand-alone

    computers. (4 marks)

    (b) You have one diskette that you use to store files related to the work you do for school.

    Your club and home. Describe an efficient way to organize the various files on your

    diskette. (2 marks)

    (c) You boot up your computer but nothing is displayed on the monitor. List TWO things

    you would do to troubleshoot the problem. (1 mark)

    Total 7 marks

    SECTION II

    7. (a) A small company is interested in setting up and Internet caf to allow users to make

    cheap voice to voice, overseas, telephone calls over the internet. Apart from computers

    and Internet access:

    (i) What peripheral device must be attached to EACH computer?

    (ii) What component must be present in the system unit of each computer?

    (iii) What financial transaction MUST the Internet caf make before calls can be

    provided to its customers? ( 3 marks)

    (b) (i) What is a search engine?

    (ii) Why is search engine useful when surfing the net? (2 marks)

    Total 5 marks

    8. (a) As part of a project to modernize the police force in a country, computers

    and related equipment have been installed in the Intelligence Unit of the

  • 7/30/2019 CSEC IT Theory Jun 2004 Tec

    3/4

    police force and all staff in the unit have been trained to use computers.

    State THREE uses of the computers in the Intelligence Unit.

    (3 marks)

    (b) State THREE different computer-related crimes and identify TWO measures that shouldbe put in place to prevent them. (5 marks)

    Total 8 marks

    9. (a) (i) What is meant by the terms CAD and CAM?

    (ii) Why are CAD and CAM usually integrated? (4 marks)

    (b) Outline THREE typical functions which a network manager would have

    to undertake in order to maintain a LAN-based system. (3 marks)

    Total 7 marks

    10. (a) For information to be useful, it must be organized. List TWO other

    qualities that the information must have to make it useful. (2 marks)

    (b) List THREE measures you would take to ensure that your computer

    system is protected from viruses. (3 marks)

    (c) Briefly explain the differences between backing up and archiving

    data. (2 marks)

    (d) The election office has a large amount of vital and sensitive information.

    Describe THREE steps that should be taken to protect the data againstdeliberate theft or corruption.

    (3 marks)

    Total 10 marks

    PROGRAMMING

    ANSWER ALL QUESTIONS.

    11. Write pseudocode to calculate the cost of importing a car. First a tax of 2% of the original cost of

    the car is added to the cost of the car to give a landing cost. Then, if the car is 5 years or less a

    transportation tax of 15% of the original cost of the car is charged. If the car is older than 5 years,

    the transportation tax is 20%. The final cost of importing the car is calculated by adding thetransportation tax to the landing cost.

    Total 4 marks

  • 7/30/2019 CSEC IT Theory Jun 2004 Tec

    4/4

    12. (a) Write a structured algorithm to perform the following:

    - Prompt the user to input two numbers and a character. A choice of a character

    A for Add, or S for subtract is to be used.

    - According to the character input, printout the sum, or difference of the two

    numbers. (9 marks)

    (b) Modify the algorithm so that it keeps repeating until zero is entered for both numbers.

    And a space for the character. Do not re-write code.

    (5 marks)

    Total 14 marks

    13. (a) What levels of programming languages are represented below:

    (i) R1: 110011

    (ii) R2: SELECT NAME FROM LIST

    (iii) R3: MUL 6, 2 (5 marks)

    (b) Give ONE advantage of using each of the following:

    (i) an interpreter

    (ii) a complier. (4 marks)

    Total 7 marks

    14. Consider the following pattern:

    Example: A+B is equivalent to +AB

    The pattern places the operator (+ in the example above) BEFORE it operands (the A and B).

    Correct the following equations if necessary:

    (i) X/Y = / X / Y (1 mark)

    (ii) A (B*C) = - A * BC (2 marks)

    (iii) (A*A*A) = A*AA (2 marks)

    Total 5 marks