Вы находитесь на странице: 1из 25

CXC Information Technology Theory Past Papers 1997 - 2002

ANSWERS CONTENTS Exam Answers Page

1997 ............................................................................................. 2 1998 ............................................................................................. 5 1999.............................................................................................. 7 2000.............................................................................................. 10 2001 ............................................................................................. 14 2002 ............................................................................................. 17 2002 specimen ............................................................................. 21

To go to any specific page number, press Ctrl and G on your keyboard, next type in the page number then click Go To. Close the Go To box. Ctrl Home takes you to the beginning. Ctrl End takes you to the end. To view the Questions open the Past Papers file. Have them both open at the desired pages and switch from one to the next by clicking on the file name on your task bar.(usually at the bottom of your screen)

Information Technology Theory (1997) Answers


1 (a) Printer, plotter or monitor (b) Hard drive, or diskette drive or tape drive (c) Optical Character Reader (OCR) or scanner (i) (ii) (iii) (iv) joystick point of sale terminal optical mark reader scanner

(a) 10100112 (b) 205 (C) 1100102 (b) Discrete data is data which can be counted and continuous data cannot be counted but must be measured.

4 (a) Computer Assisted Learning, storing students records and sourcing teaching material. (b) Preparing articles and researching articles. (c) (i) Systems Analyst : determines systems requirements (ii) Systems Designer : designs blue print for software and hardware (iii) Programmer : develops programs in accordance with requirements (iv) Systems Programmer ; ensures systems environment for running programs is functioning properly

5 (a) A valid description for example: A robotic arm is used in the automobile industry to weld component parts together. (b) reduces employee risk and lowers operating costs. (c) eliminates transportation costs (d) difficult to assess quality of items (e) Advantage : participants are not inconvenienced by commuting Disadvantage : participants cannot utilize a full range of interpersonal communication skills 6 (a) A program represents the work of an individual and unauthorized use of the work is essentially using the property of another person without his or her permission. (b) Sensitive data can be viewed by all persons and unauthorized changes can be made to the data. (c) data encryption is the use of secret procedures for coding and decoding information (d) use of passwords and fireproof cabinets (e) An application programmer develops programs to be used by general users and systems

programmer prepares the operating systems environment for the application program to run. 7 (a) Protocol is the set of rules and procedures to govern the transmission of data. (b)(i) Upload is the process of sending data from the users computer to another computer and download is the process of receiving data from another computer. (ii) Duplex is a transmission system which allows data to be transmitted in both directions at the same time and half-duplex is a transmission system which allows data to be transmitted in both directions but only in one direction at a time. (iii) Local Area Network is two or more computers linked over a small area or building and a wide area network is two or more computers linked over a large area for example across cities or countries. (iv) With electronic mail messages can be accessed by only the addressee and with a bulletin board messages can be accessed by all users. 8 Count 1 6 11 16 21 X 4 8 16 32 64

9 (a) A computer cannot execute code written in a high level language but can execute code written in machine language. (b) After execution of an interpreter the results of the program are achieved with a compiler. The output of the compiler still has to be executed. (C) Read First, Second If First = Second then Print the numbers are equal Else If First < Second then Print First Else Print Second End if End If 10. NoChild = 0 Read Number Largest = Number

WHILE Number <> 999 DO If Number = 0 then NoChild = NoChild + 1 End If If Number > Largest then Largest = Number End If Read Number ENDWHILE If Largest = 999 then Print no data on families Else Print Number of Families with no children = , NoChild Print Largest Number of Children = , Largest End IF

CXC IT 1998 Theory Answers


1. a) b) c) d) Rules and regulations that govern how information is sent and received over communication channels. (i) Simplex (ii) Half duplex(iii) Duplex (i) LAN (ii) Resources such as printers and scanners can be shared, or Files and programs can be shared, or Better communications programs, eg. E-Mail. or Security of information if data is backed up on a network storage device. Read / Write head Application Point of Sale Games Architectural Design Multiple-choice exams Publishing Cheque processing Language processing Preparing letters a) b) c) 5. a) b) c) d) 6. a) b) c) d) 7. a) b) Track c) Sector d) Buffer

2. 3.

a)

Input Device Barcode reader Joystick Pads and Tablets Optical mark reader Scanner Magnetic Ink character recognition Microphone Keyboard

4.

Resolution is a property of the monitors screen, that determines the clarity of the picture. Scanner, MICR, OCR i) Less human error during input ii) Faster data entry A computer program deliberately written to cause harm to a computers software or to cause the computer to malfunction. i) Install an anti-virus program and update regularly. ii) Always scan floppies from other computers, or attachments from e-mails. i) An incorrect medical entry could cost the employee a promotion. ii) An incorrect name on a certificate could render it useless to the owner Deliberate tampering, hard-disk failure, virus corruption etc. 8710 = 10101112 101 00 10 0101 1001 1011 0101 1001 They have a fairly large capacity. They are lightweight and portable. They last very long and have protective coating against dust.
5

They are not easily erased. They give very good sound and picture. b) i) Quick access to records and cases Matching a finger print or photo to one on file ii) Patient record keeping Researching illness Monitoring critically ill patients iii) Use of synthesizers to enhance sounds Read A, B If A = B then Print The numbers are equal Else If A > B then Print A Else Print B Temp = A A=B B = Temp X 5 5 5 5 b) 10. K 10 15 20 25 Sum 45 55 70 90 Print 10 15 20

8.

a)

b)

9.

a)

10, 15, 20, is printed.

Sum = 0 For count = 1 o 15 do: Read Name, Score Sum = Sum + Score If Score > = 80, then Grade =A Else If Score > = 65, then Grade = B Else If Score > = 50, then Grade = C Else Grade = F End IF Print Name, Grade End For Avg = Sum / 15 Print The average score is, Avg

1999 Solutions
1. (I) (ii) (iii) (iv) 2. A B C D E F G H 3. Main Memory / Random Access Memory (RAM) Primary Memory / Main Storage / Immediate Access Storage Control Unit Arithmetic / Logic Unit Disk Storage / Backing Storage / Secondary Storage DEVICES Modem Microphone Graphics Tablet Scanner Plotter Keyboard Barcode Reader Joystick/Keyboard

CHARACTERISTICS Modulates and demodulates signals Accepts voice input Allow users to input architectural plans Reads in graphics data Used for printing architectural plans Used for entering text documents Retrieves pricing data from grocery items Used to move the cursor a) Any 3 of the following:

Booting/Starting, Schedules resources, Controls operation of input/output devices, Loads and initiates executions of a program, Error detection, Multiprogramming/multitasking, Provides security for data and files, Manages files, Multiprocessing b) I) ii) iii) batch processing on-line processing / real-time processing batch processing

4.

a)

Any 3 of the following: to prepare teaching materials, to store students marks, marking Multiple Choice (OMR), for teaching difficult topics simulating experiments, Computer Aided Learning (CAL), Computer Aided Instruction(CAI)

b)

Any 2 of the following Lack of necessary resources, insufficient computers, teachers may not be able to utilize the technology, expensive

c)

Any 2 of the following Easy access to large volumes of information May provide safer conditions eg. used to simulate dangerous experiments Provide more effective use of teacher's time
7

a) b) c) d)

10110102 2710 1000102 1000 0111 I) ii) Used to weld components together in an auto assembly plant Any 2 of the following: Work could be done precisely, Machines do not take industrial action Can be used in situations which may be dangerous to humans Can be used in situations where it is necessary to have dust free and clinically clean environments iii) One of increased costs for repair and maintenance Work may be disrupted severely if robot malfunctions scanner : plotter : modem : MICR : JXXFD I GOT IT to prevent unauthorized access to programs, files and other computer resources it is the process and procedure for storing used files which need to be kept for a long time - employees may be able to fraudulently modify data on themselves or others - employees may be able to have unauthorized access to personal data of other employees - incomplete modification of data by one department may produce inconsistencies in the file system desktop publishing produce engineering drawings telecommuting; accessing the internet Banking, for reading cheques

a)

b)

I) ii) iii) iv) I) ii) I) ii) iii)

7.

a) b)

8.

A B C D E a)

testing/debugging logic errors/ design syntax errors dry run/ desk check test data I) ii) iii) -10 0 -40

9.

b)

Print "ENTER TWO VALUES" Input A,B While B = 0 do Print " ENTER NON ZERO VALUE" Input B EndWhile QUOTIENT = A/B Print QUOTIENT Print " ENTER POSITIVE INTEGER" Input N Print "NUMBER SQUARE" For NUMBER = 1 to N SQUARE = NUMBER * NUMBER Print NUMBER, SQUARE SUM = SUM + SQUARE EndFor If SUM <= 1000 then Print SUM Else Print " The Sum is Greater than one thousand" Endif.

10.

I)

CXC THEORY 2000 SOLUTIONS


1. a) SIM: DIFF: b) SIM: DIFF: c) SIM: DIFF: d) SIM: DIFF: e) SIM: DIFF: 2. (a) (i) (ii) (iii) (iv) (v) (b) (i) ii. iii. iv. 3. (a) b) c) d) e) f) g) Both store instructions and data RAM is volatile, ROM is a non-volatile Data can be written to RAM, but not to ROM. Both can be used to store information ROM cannot be changed. EPROM: can be erased and new information written. Both store data in a non-volatile form. (Considered secondary storage) Hard disk holds more data and programs and lasts longer. Floppy disk access is slower Both used to hold programs and data. Data in primary storage is lost when electricity goes. Data in secondary storage is not lost when electricity goes. Both contain instructions that tell the computer to do something. System software is used by the operating system or systems personnel, application software is used by everyday users e.g. Word Processing users. The number of bits in a word ( or register) which can be processed at one time. Small high speed storage element used as temporary storage area for data being read from or written to I/O devices. Method of archiving data that uses a microfilm recorder to create photographs of data for storage. A measure of the amount of data that can be transmitted at one time through a communications channel. A network that spans a large geographical area including cities and even countries. Tapping into a communications channel to retrieve information. The unauthorized copying of software. Using registration keys that are only available with purchase of the software. Penalties for anyone found with pirated software.

high level language: allows users to write in a familiar, more English-like notation, rather than numbers or abbreviations. pseudocode: a set of English-like statements used to specify the logic of an algorithm. logic errors: errors which occur because of incorrect reasoning in a program (we know they are present when a program produces incorrect or invalid results). dry-run: the execution of a program by hand using appropriate test data. compile: the process of converting from a high-level language to machine language. It also detects errors in the use of the language. syntax errors: errors which occur when the rules for forming statements in a program are violated.
10

4.

(a) (b) c) d)

Using an individual password for each client file. Use fireproof cabinets to store back-up copies of files. Keep copies of data off-site. Keep backup copies on disk/CD/tape/other removable storage. Use data encryption. Teleconferencing is the use of computers, videos, audio and communications technology to enable people in different locations to see, hear and talk with one another. This part was generally well done. However, some candidates made reference to the advantages of telecommuting. Modem, camera, sound card, microphone, speakers, telephone, monitor. Machine language can be directly executed by the computer whereas a high level language has to be translated to machine language. OR A well-coded machine language program will run faster than the equivalent high-level language program. It is easier to program using a high level language than machine language. The same program can be run (possibly with minor changes) on a different make of computer. A machine language program would have to be completely re-coded to run on a different make of computer. Any THREE of the following: Sharing of peripheral devices e.g. scanners, printers. Sharing of programs and data. e.g. network version of Microsoft (R) Word. Better communications e.g. email. Security of information. Data backed up on network storage device. Easier access to databases-private and public databases. 11000112 10100002=8010 The 4 digit binary representation for each digit is used. A positive sign is indicated by the pattern 10102, and a negative sign by 10112 1011 6 0110 5 0101

5.

(a) (b) (c)

6.

(a)(i)

(ii)

(b)

7.

(a) (b) (c) (d)

8.

(a)

Algorithm to read three values a, b, c, and print the largest. Largest = a If b > Largest then Largest = b If c > Largest then Largest = c Print Largest

11

(b)

(i)

Trace table A 3 8 21 55 B 5 13 34 89 SUM 1 14 48 137

(II) 9.

137 is printed.

Write an algorithm to read a positive integer N and find the average of all even numbers between 1 and N inclusive. Perform any necessary validation. Solution Read N If N < 0 then print Error-must be positive Else sum = 0 count=0 For j =2 to N step 2 do sum= sum + j count= count + 1 Endfor If count = 0 then print There are no even numbers between 1 and , N else print Average is , sum/count EndIf stop NB. The Else part could also be written as shown on here. Else Sum=0, Count=0, Even=2 While Even < = N do Sum = Sum + Even; Even = Even + 2 Count = Count + 1 Endwhile If Count = 0 then Print There are no even numbers between 1 and N Else Print Average is , Sum / Count Endif

10.

Write an algorithm to read the names of 10 items and their prices and print the name of the

12

item with the highest price. Assume that no items have the same price. Data is supplied in the form: item 1, price 1, item 2, price 2, etc. highprice = 0 For j = 1 to 10 do read item, price If price > highprice then highprice = price expensiveItem = item Endif Endfor Print Most expensive item is , expensiveItem.

13

JUNE 2001 CXC IT THEORY ANSWERS 1. Suggested Responses a. Ability to write a sequence of operations using like syntax. Ability to refer to variables in the natural state (by the given name) rather than using binary locations in the computer. Ability to use the same written program on different machines. Logic error - error in how the algorithm goes about solving the problem. Test Data Input data testing the system response to a range of inputs, including critical situations. Source Code Human Readable text version of a program in a high level language. Variable a symbolic representation of an element whose value can be assigned and changed. To see that the specifications laid down by the analysis team are correctly understood by the programming team, and efficiently satisfied by the programs produced. Arithmetic/Logic Unit - Does the Arithmetic and Logic operations of the computer.

Random Access Memory - Holds data and instructions about to be used by the central processing unit. 3. Suggested Responses a. Data means raw information, essentially meaningless in its initial state. Information can be used and assimulated in a meaningful manner by a human, and usually input to a system for Information is used for decision-making. i.e. Data arranged in a meaningful and organized manner and is useful to the user. (i) UPLOAD - Sending information along data communication channels TO another machine from the users machine. - With the operation being activated by the user. If the candidate includes the fact that the other machine is the host or the server the full two marks are given. (ii) Wide Area Network (Definition of abbreviation) - A connected group of computers spanning a large geographical area. - Connections usually made by some form of radiobased linkage. Microfilm serial Microfiche direct access Reel-to-reel tape serial Cartridge tape serial

b.

b.

c.

2.

Suggested responses a. Programmable Read Only Memory - System manufacturer can embed his own data or instructions into the chip, as part of the make-up of a computer system. c. b. Central Processing Unit - Carries out operations on data specified by the instruction code of a program.

14

b. 4. Suggested Responses a. (i) Interact with the user and give the user a way to issue commands to the computer. (ii) Manage the arrangement for storing files. c. (iii) Manage/Control the hardware components to allow complete system use. Plus a wide range of other good answers. b. c. d. e. The menu immediately lets you pick commands within the context, to do operations. Primary storage has a shorter access time; It is faster. Disk storage carries direct access, tape is serial access. Any three of the following: 5. Suggested Responses a. A plotter, because - it actually produces drawn lines with a linedrawing action, OR - it can, usually handle a larger paper size. Protect the diskette from dust Protect the diskette from moisture Do not drop or step on a diskette Do not store at extreme high or low temperaturesstore between 10 C to 45C. Do not touch or unnecessarily expose the magnetic surface. Do not force the diskette into the drive.

Problem: The ribbon is worn or ribbon is incorrectly placed, OR Print head gap too wide/hammers not striking properly. Solution: Change the ribbon cartridge, or place the ribbon correctly OR set the head gap. The light pen Signals the system when the scanning point on the screen strikes the tip of the pen. Since the system actually can calculate where the scanning point was located at that instant, it can tell where the pen was located at that time. The system registers the positional changes and draws lines or does actions as required. Mouse-type button features are also included with the device. A light pen is light sensitive and so can also be used as a pickup device for bar-code reading. ANY three of the above- one mark each. The notions in the bolded text must be included in the particular answer item.

d.

Both of them recognize shape of character. BUT The Magnetic ink character recognition reads the character using the ability to detect magnetic ink, whereas optical character, recognition relies on reflected light.

6.
7.

b. Answer 8510 c. Answer 1112 a. Personal. Information can be used in violation of privacy, for marketing purposes. Corporate Industrial information can be surreptitiously used for personal or other corporate gain (Industrial Espionage) b. - Software restrictions can allow access to a portion of data with restriction on access to other portions.

15

- Software restrictions can allow someone far away to maintain access, with the appropriate privileges still in force. - Software restrictions can allow the system to be used for other things, which data access restrictions. c. Telecommuting is where an employee works at home, with a long-range connection to the office computer. Contributions: 8. a. The Internet High speed modems High speed telephone lines Satellite down-links for long range connection The cost of maintaining a full size office.

10.

PRINT ENTER THE INTEREST RATE AS A DECIMAL FRACTION INPUT R PRINT GIVE THE NUMBER OF YEARS INPUT N PRINT GIVE THE STARTING BALANCE INPUT BALANCE FOR YEAR = 1 TO M Do BALANCE = BALANCE * (1 + R) NEXT YEAR PRINT THE BALANCE WILL BE, BALANCE _____________________________________________________________ NB Prompts 1 mark, Consistent variables 1 mark, Print 1 mark, Loop 1 mark, Formula 1 mark.

Backing up means to create a copy of all or some information on a separate storage area as a safety measure in case the original is lost or damaged. The read-write head reads information on the surface of the media and puts information onto the media. (The meaning and purpose for this device can be simultaneously embodied) The address locates the element of data. It is used in specifying where information will be written to, or read from. Access time the average time taken to read or write an element of data using a particular storage type. Important depending on the work youre doing and the speed required.

b.

c.

d.

9.

a) Answers: -1 1 1 b) Answers: -2 1 2 _____________________________________________________________

16

17

CXC IT JUN 2002 Answers


1. (a) (b) Control Unit and the ALU Control Unit controls the internal operations of the CPU, interprets program instruction and controls the flow of data through the computer. The ALU is responsible for all calculations and comparisons in the computer. E PROM can be erased by ultra violet rays and reprogrammed where as PROM can only be programmed once and not erased. Transmission where data can be sent or received but not simultaneously e.g. CB radio. The file may have been corrupted or the disk damaged in location of the file. File Allocation Table (FAT) Table of information the operating system uses to locate files on a disk. It contains files, file types and locations. In a fixed system on a hard disk. The heads are positioned 1 over each track therefore the heads do not have to move in and out to get tothe required track. Access is immediate and therefore faster. A track is a concentric ring on the surface of a disk on which data is stored. A cylinder is made up of all tracks of the same radius on different platters all lying one above the other. (i) (ii) k =1/2 x 1024 = 512 k or approx 100k No. of bytes in whole cylinder = 6 x 10 x 512 = 30720 KB 1 byte = 8 bits, 32 bytes = 4 bytes A 32 bit machine needs to transfer data 4 bytes at a time while the ole needed on Decrete data is data that can be counted only as wholes. Eg. Books. Integers are whole numbers without decimal parts therefore good for discrete data. Continuous data has to be measured. Eg. Height Real numbers and floating point systems have fractional parts therefore suitable for continuous data. Magnetic tape is serial because to search for a data item one has to start at the beginning of the tape and search until the data is found. Floppy disk is a direct access medium because the drive locates the item by going directly to its address. Microfilm is a real of film about 100 200 ft long on which is stored microscopic images of documents. 2 applications of OMR (ie. 2 uses) (i) to mark multiple choice exams. (ii) to collect data from survey forms. OCR = Optical character Reader or Optical Character Recognition.

(c) (d) 2. (a) (b)

(c)

(d)

(e) 3. (a) (b)

4.

(a) (b) (c)

5.

(a)

(b)

18

(c) (d)

1024 x 768 resolution has more pixels per square inch than 640 x 480. Therefore it will give a clearer picture. Advantage: Touch Screen is easier to use than a mouse. Disadvantage : i) Touch Screen more expensive than ordinary monitor, (special software required), (ii) Selections limited as touch points need to be big enough for a finger. A lot more options available with the mouse. Custom software is software created specifically for a user. Customized software is general purpose software bought off the shelf but altered to suit the needs of the user. The user pays a fee. (i) (ii) (iii) 10 = 10102 10 as 8 bits = 0000 10102 10 = 000010102 -10 = 11110101 10 = -10 = 000010102 11110101 +1 11110110 (ones complement rep) (twos complement rep)

(e)

6.

(a)

(iv)

10 = 000010102 10 = 1000 1010 (Sign & Magnitude rep) If there are any 1s then the number of ones are

(b) 7. (a)

(i), (ii) and (iv). even. (i) (ii) (iii)

Game playing joystick, wheel, speakers. Teleconferencing microphones, speakers presenting a report printer, scanner.

(b)

Line printer prints characters, 1 line at a time and is faster than a character printer which prints 1 character at a time. Some one joins a newsgroup to (1) read and discuss news items on a particular subject. (2) Write and post news items on a particular subject. Internet Relay Chat users send and receive typed messages instantaneously across the internet while maintaining live contact with many other users at once. Electronic mail messages sent from one computer user to another to a location the end user can access via his computer at a time convenient to him. The 2 users are not in live contact. Messages may not be read instantly.

8.

(a) (b)

(c)

(i)

HTML Hypertext Markup Language a language used to format, style or create web pages.

19

(ii) (iii)

File Transfer Protocol (FTP) a standard used to upload and download files with other computers on the Internet. CADD Computer Aided Design and Drafting. - software used to produce architectural and engineering drawings on a computer.

9.

(a)

(i) (ii)

Cost of transportation from address to work or the distance between (i.e. mileage) The names and addresses could be given without their consent to someone who wants to do business with them.

(b)

- Keep back up copies on disks in a fire proof cabinet. Keep back up copies at another location.

10.

(a) (b) (c)

Electronic eavesdropping the unauthorized use of electronic devices capable of intercepting, recording or printing electronic communications or moving data. The password is to give the user the ability to descramble or restore the file to its original form. To create and maintain the network. To provide security i.e. to control or prevent access to different files and folders or to the network itself. Read A, B Average = A + B 2 Print Average Read X,Y Sum = X + Y Average = Sum 2 Print Sum

11.

OR

12.

For Count = 1 to 100 Do Read Name$, Price If Price < 50 then Print Name$ End IF End for Read Name$, Age, Sex$ WHILE Name$ <> End DO IF Age <> 2 then IF Sex$ = M then If Age > 15 then Fee= $50 Else Fee= $40 End IF

13.

20

Print Name$, Fee END IF IF Sex$ = F then IF Age > 15 then Fee=$40 Else Fee=$30 END IF Print Name$, Fee END IF END IF ENDWHILE 14. X 1 3 6 2 3 Z=Z+X X=ZX Y=Z+Y Z=YZ Y=YXZ Print 1 1 2 Y 2 Z 3 4

21

CXC IT TECHNICAL SPECIMEN PAPER THEORY 2002 (ANSWERS)


1. a) b) 512 bytes = Kilobyte. K x 18 sectors * 80 rings (tracks) * 2 sides = 1440 Kb A byte is the smallest unit of data storage that can be directly accessed in memory. A word is the amount of data that will flow in the systems data bus in one instance. It is the amount of data the system will access at one time

2. a) Application software is used for the user to achieve what he plans to achieve. System software is for the purpose of getting the system ready, preparing it for work and improving or optimizing its performance. Such as operating system functions) b) 3 functions of the operating system i) ii) iii) iv) v) providing a user interface- user startup screen or desktop organizing file storage scheduling of tasks. (queueing and handling jobs.) providing security providing & protecting reserved memory storage for running applications.

c) It is much easier to access a file, program or function by clicking on an icon or graphic. You do not have to learn and memorize commands to type at the keyboard as is required for command line interface. d) A plotter may be preferable to a page printer if it is necessary to draw continuous lines across multiple pages. The work of a plotter is to draw lines. When drawing plotted lines a plotter is preferred. 3. a) Folders can be used to group files of a similar topic, purpose or time. Folders reduce the amount of time spent searching for a file. b) He can get a listing of all files created, (also modified or accessed) on a particular day. In Windows he can click Start/ Find/ Files or Folders/ Select the folder to search (eg C or Floppy A) / Date tab/ find all files/ Created/ between or during dates you type in. 4. a. Under odd parity, the number of 1 bits in a byte must come to an odd number. If they dont then the 9th bit is set to 1 so the total number becomes odd. If in the eight bit byte the number of 1 s is already odd the 9 th bit is kept at 0. If on transmission of the byte the number of 1s among the 9 bits is not odd, then an error must have occurred. Under even parity the total number of 1s is kept to an even number amongst the 9 bits. b. (i) D to C : subtract 1. Answer 1000 011 (ii) D to G : Add 3. ie add 112 Answer 1000 111 c. Answer 73. d) Answer 11 001 e. Answer 101 11001

22

5.

a)

Differences OCR MICR


The characters need only be clearly Sensing of magnetic ink is required to formed then it can be identified using a identify the characters light- sensitive reader Or able to use the entire alphabet and Restricted to numbers primarily can now accept well shaped hand written characters Similarity both direct input into the computer. Both involve sensing of characters

b. Bar code - a sequence of vertical printed bars that represent a number used to identify an item or person. c. 2 ways a bar code is used in an accounting system for identifying & pricing of an item at the Point of Sale to keep track of items sold and their numbers d. Ready made software is cheaper to obtain and is more likely to be familiar to the employees. Also a large no. of people use readymade software therefore new employees may already be familiar with it. 6. a. Electronic mail means messages prepared by 1 computer user & sent to another via computer to be stored in a location accessible to the other via a computer. c. Broadcast transmission is an arrangement with multiple systems where a transmission is sent to all machines simultaneously. .d. A newsgroup is a list of articles, accessible via computer, written and read by various users who are interested in a particular area of discussion. 7. a) Internet Relay Chat see Internet Concepts handout. b)Telecommuting is where an employee can work outside the regular office and can communicate with the company via email, direct dial up into the computer network, and other electronic method. c) Teleconferencing is where a group of people can communicate live with the live

23

transmission of voice and video d. Telemarketing is the use of telephone lines and computers to market products, manage accounts & communicate with customers. .e. Web Browser - see Internet Concepts handout. 8. a) Three purposes for which a company can use its web site See Internet Concepts handout. .b) One other way in which the internet facilitates buying and selling items :
The buyers & sellers can communicate on the internet but use mailed cheques instead of finalizing payments over the internet. c) http is the protocol that specifies the kind of transfer method to be used. www means World Wide Web icl-yes is the name of the internet sever com is the domain (commercial) students.htm is the specification of the hypertext file to be viewed. 9. a) Encryption means converting a document to an unreadable form to be deciphered only by the use of a password. .b) Someone may leak out the password or code to a friend who is unauthorized. With physical access restrictions only authorized users can use the computer. .c) Use up-to-date antivirus software, Operate a good back up system

Write protect your diskettes whenever copying files to a strange computer. Use software from bona-fide sources only.

10. The Systems Analyst: Investigates the current system with a view to making computer based improvements. Plans the design of the new Information Technology system Overseas the introduction of the new information system. The Programmer must 11. design the program(s) based on the system specification. (ie based on the computers and software available and the requirements laid down by the analyst) Produce documentation for the program. (so that users can understand & to help later programmers make updates or alterations necessary). Prepare the program and test it. Maintain the program during its operation. (Ie. fix an errors that may come up) Read X, Y IF X = Y then Print They are equal

24

ELSE If X > Y then Print X, is the bigger of the two Else Print Y, is the bigger of the two End If END IF 12.. Print How many numbers are there? Input N Sum = 0 For I = 1 to N do Print Number , I Print Give the value Input X Sum = Sum + X End For Print THE SUM IS , Sum

13. For I = 1 to 15 Input Personname$, Income If Income < 200 000 then Tax = 0 Else If Income <= 400 000 then Tax = 0.2 * (Income 200 000). Else Tax = 40 000 + 0.4 * (Income 400 000) End IF EndIf Print Personname$, Tax, End For

14. Trace Table completed X 1 2 4 Y 1 2 4 Z 1 4 4

25

4, 4, 4 will be printed for X,Y,Z

Вам также может понравиться