Вы находитесь на странице: 1из 8

COMPUTER TECHNOLOGY 4th MARCH 2012 EXAMINATION PAPER

SECTION A Answer all questions from this section. Each question requires ONE answer only. SECTION B Answer all questions from this section. Each question requires THREE answers. SECTION C Answer any THREE questions from this section. Clearly cross out surplus answers. Failure to do this will result in only the first THREE answers being marked.

Time Allowed: 2.5 Hours


Any reference material brought into the examination room must be handed to the invigilator before the start of the examination. Calculators ARE allowed in this examination.

NCC Education Ltd 2012

SECTION A ANSWER ALL QUESTIONS IN THIS SECTION ALL QUESTIONS ARE WORTH 1 MARK

Question 1 As the result of a program instruction being executed, a processor sends a byte of data to a location in RAM. This is: A. C. an input action a storage action B. D. an output action a process action

Question 2 A company specialises in selling books online. It has an information system to manage the sales, stock and customers. This information system is. A. C. a mission critical system an executive support system B. D. a management information system a strategic system

Question 3 The information technology strategy of a business is directly determined by: A. C. the information systems strategy the sales strategy B. D. the business strategy the development strategy

Question 4 Which of the following produces object code? A. C. linker compiler B. D. editor interpreter

Question 5 A particular computer system responds to a stimulus quickly enough to influence the cause of that stimulus. This is a description of: A. C. real time operation multitasking B. D. batch processing multiprogramming

Computer Technology

Page 1 of 7

NCC Education Ltd 2012

Question 6 A variable is used in a computer program to count the number of iterations in a loop. The most suitable data type for this variable is: A. C. floating point integer B. D. string boolean

Question 7 Which of the following types of file usually stores records in chronological order? A. C. master file audit file B. D. transaction file work file

Question 8 Which of the following applications is suitable for connection-mode data transfer? A. C. email uploading a file to a web server B. D. accessing web pages terminal data entry

Question 9 Which of the following is a text based standard? A. C. HTML JPEG B. D. Java PDF

Question 10 Which of the following is a lossy form of data compression? A. C. PDF MPEG B. D. LZW ZIP

Total for Section A: 10 Marks

Section B on next page

Computer Technology

Page 2 of 7

NCC Education Ltd 2012

SECTION B ANSWER ALL QUESTIONS IN THIS SECTION ALL QUESTIONS ARE WORTH 3 MARKS

Question 11 Which THREE (3) of the following business activities could be described as indirect? A. B. C. D. E. F. buildings maintenance scheduling assembly machining product design sales force administration

Question 12 Which THREE (3) of the following are suitable uses for an expert system? A. B. C. D. E. F. processing a payroll diagnosing an illness fault finding in a car engine suggesting restaurants to a tourist booking a hotel controlling traffic lights

Question 13 Which THREE (3) of the following are functions performed by an operating system? A. B. C. D. E. F. hide the complexities of the hardware from the user access web pages allocate memory to processes sort data in a database compile programs manage peripherals

Question 14 Convert the negative denary (decimal) number -55 into an eight bit twos complement binary number. Show the stages of your working

Computer Technology

Page 3 of 7

NCC Education Ltd 2012

Question 15 Which THREE (3) of the following are stages in the binary search algorithm? A. B. C. D. E. F. start at the beginning go to the end record go to the middle record check if the key found is larger than the one required check the next record to see if it is the key required if key is smaller than one required, search lower half of remaining data

Question 16 Which THREE (3) of the following are concerns of the network layer in a communications network? A. B. C. D. E. F. the type of cables the network topology the protocols the contents of the data transmitted the network nodes the connections between nodes

Question 17 Which THREE (3) of the following are internet protocols? A. B. C. D. E. F. TCP PDF GIF UTP DNS Java

Question 18 Which THREE (3) of the following are objectives of the software design process? A. B. C. D. E. F. produce models collect information from users evaluate alternatives test code plan development activities enter data

Computer Technology

Page 4 of 7

NCC Education Ltd 2012

Question 19 Which THREE (3) of the following are reasons to perform adaptive maintenance on a computer system? A. B. C. D. E. F. the system is running too slowly the owning company has introduced new sales procedures legislation requires income to be reported in a new way the users find the interface difficult to use there are bugs in the software new reports are required by management

Question 20 Which THREE (3) of the following methods can be used significantly to reduce the weight of a laptop computer? A. B. C. D. E. F. reduce the amount of RAM reduce the processor speed reduce the bus width remove the CD/DVD drive remove hard drive and replace with solid state secondary storage reduce keyboard size Total for Section B: 30 Marks

Section C on next page

Computer Technology

Page 5 of 7

NCC Education Ltd 2012

SECTION C ANSWER ANY THREE QUESTIONS FROM THIS SECTION

Question 21 a) i. ii. iii. iv. Describe what is meant by a distributed computer system.
(3 marks)

Explain the difference between a program and a process.


(2 marks)

Explain why it is necessary to distinguish between a program and a process.


(3 marks)

A process may be in one of THREE (3) states. Explain what these three states are.
(6 marks)

b) i. ii. State FOUR (4) objectives of a scheduler.


(4 marks)

State TWO (2) scheduling methods.


(2 marks) Total: 20 Marks

Question 22 a) i. ii. iii. Define the term database.


(2 marks)

Define the term DBMS.


(2 marks)

Explain why the data and the applications that manipulate the data should be independent of each other.
(4 marks)

iv.

Explain the importance of a database system presenting multiple views.


(2 marks)

b) i. ii.

Define the term data integrity.


(2 marks)

Explain how a DBMS helps to maintain data integrity.


(3 marks)

Computer Technology

Page 6 of 7

NCC Education Ltd 2012

c) i. ii. Explain what is meant by a database transaction.


(1 mark)

Explain what is meant by the ACID properties of a transaction


(4 marks) Total: 20 Marks

Question 23 a)
i.

Explain what GPS is.


(4 marks)

ii.

Describe TWO (2) situations where GPS is useful to a business.


(4 marks)

b) i. ii. iii. State FOUR (4) reasons why mobile computing is useful to a business.
(4 marks)

Explain TWO (2) concerns that business managers may have over the use of mobile computing by the workforce.
(4 marks)

Describe TWO (2) benefits and TWO (2) disadvantages of using smart phones as mobile computing devices for business activities.
(4 marks) Total: 20 Marks

Question 24 a) i. ii. b) i. ii. iii. Describe what a VPN (Virtual Private Network) is.
(4 marks)

Explain what is meant by DSL (Digital Subscriber Line).


(4 marks)

Describe THREE (3) different ways to implement DSL.


(6 marks)

Explain the advantages of a VPN over other types of network.


(4 marks)

Explain what VoIP is


(2 marks) Total: 20 Marks

Total for Section C: 60 Marks

END OF EXAMINATION PAPER


Computer Technology Page 7 of 7 NCC Education Ltd 2012