Вы находитесь на странице: 1из 23

Prepared by : Mr. O. Duncan (Info. Tech.

Teacher)

Questions according to each objective on the C.X.C Syllabus.


Unit 1-1
1a. Draw a diagram showing the principal components of the central processing unit (including the main
store). On your diagram show the main registers and indicate the paths of data flow.
(b) Describe the purposes of the following registers;
(I)
accumulator (ii) sequence control register (iii) store address register
(c) Explain what is meant by a clock pulse, indicating its purpose in the operation of the Central
Processing Unit. (G1087)
2a. Utility programs are often used to carry out routine operations on files. Name three such utility
programs.
2b. Some devices are controlled by dedicated microprocessors. Suggest two advantages of using a
dedicated microprocessor rather than controlling the device with a microcomputer. (G0789)
3a. Using appropriate examples, explain the difference between discrete and continuous data.
3b. Define the terms hard copy and soft copy. (C0193)
4a. Describe two functions of each of the following components of a computer:
(i) Control Unit
(ii)
Arithmetic Logic Unit
(iii)
Main Memory (C0194)
4b. Draw a diagram showing the components of a computer system, indicating clearly the direction in
which data flow. (C0295)
4c. Name the hardware component that performs each of the following functions:
(i)
Store programs and data that are currently being used by the CPU
(ii)
Performs logical operations within the CPU
(iii)
Stores programs and data that are not currently being used by the CPU
(iv)
Directs internal operations within the CPU
4d. A computer system consists of several hardware devices and software components. The keyboard,
mouse and printer are all peripheral devices connected to the systems unit. The systems unit comprises of a
Central Processing Unit (CPU) and a component, (A), which holds the data and programs that are currently
being used. The C.P.U in turn consists of two components. One component, (B), directs internal operations
within the C.P.U; and the other component, (C), is responsible for the manipulation of the data. In addition,
there is another storage component, (D), which stores data and programs that are not currently being used
by the CPU
State the component that performs each of the functions named A to D and underlined above.
Unit 1-3
1.
A university has a mainframe computer and a large number of terminals for students use.
Each student is allowed a limited amount of backing storage for keeping programs and files.
(a)
What type of backing storage would be most appropriate for keeping students files? Give reason
For your choice.
(b)
What type of storage medium would be most appropriate for keeping back-ups of the files for
recovery in the case of system failure. Give a reason for your choice.
(a)
Describe how an operating system manages the use of terminals from students logging-on to
logging off.
2.

State one advantage and one disadvantage of the first item over the second item in each of the
following pairs:

3.

Each frame of data on magnetic tape stores a character and includes a parity bit. What is a parity
bit and why is it used.

3a.

Describe why buffers are needed for the transmission of data between main store and peripherals.

Page 1 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)

3b.

Suggest an advantage and a disadvantage of increasing the size of a buffer.


Explain the functions of interrupts in the transmission of data.

(a)
(b)
(c)
(d)

(i)
(i)
(i)
(i)

4.

Explain briefly the following terms: bistabe device, gigabyte, operating system, and bar code.

Character printer
Microfilm output
Magnetic tape
Optical disk

(ii)
(ii)
(ii)
(ii)

Line printer
Printed output
Magnetic hard disk
Magnetic hard disk

Unit 1-4
1.
Explain the term buffer?
2a.
2b.

In some microcomputers the operating system is contained in a ROM (read only memory) chip
which is inside of the computer. In other cases the operating system is supplied on a magnetic
disk. Describe the relative advantages and disadvantages of these appraoches.
Spreadsheet programs are an example of general-purpose packages which are now available for
Microcomputers. Briefly describe three other general-purpose packages.

3a.
3b.

Describe one use of a CD-ROM.


Give two reasons why CD-ROMs are suitable for that use.

4a.
4b.
4c.

Explain the difference between serial access to data and direct access to data.
Which storage medium would you choose for files requiring: (i) serial access (ii) direct access.
State an application for which it would be appropriate to use: (i) serial access (ii) direct access

5.
5a.
5b.

Customer of InterBank are issued with plastic cards which have a magnetic stripe on the back.
Give two items of information contained in the magnetic stripe.
The card can be used to get cash from an automatic teller machine (ATM). State two ways the
customer is prevented from drawing large sums of money from the machine.

6.

When customers arrive at a car park, they insert a credit card into a machine and enter a personal
Number. The card stores an account number which is validated and then checked against the
personal number. The account number consists of 6 digits.
Describe three validation checks which may be carried out on the account number.
The account number, time of entering and time of leaving are entered into a serial file. What is a
serial file.
Each night the computer creates a sequential transaction file. What is a sequential transaction file?
The computer then updates the master file. Other than the customers name and addresses, what
information would be held on the master file?

6a.
6b.
6c.
6d.
7a.
7b.
7c.
7d.
7e.

What is a buffer? 7b. Why is a buffer needed between a CPU and a printer?
Compare the use of floppy discs and hard discs by giving two advantages of each.
What is a Local Area Network (LAN)?
Refer to a particular application to explain the use and benefits of a LAN.
Explain why a buffer is used in the output of data to a line printer.

7.

When a program makes a read request to the hard disk, the device which reads data from the disk
Is moved along a radius to the particular concentric circle circle on which the data is stored. When
the relevant part of the concentric circle of the disk arrives under the device which reads the data,
the data is read and stored in a special area of memory from which it could be accessed.
State the proper technical terms for each of the four-underlined phrase in the passage above.

Page 2 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)

Unit 1-5
1.
(a)
(b)
(c)

A microprocessor-controlled sewing machine uses a touch-sensitive pad for input.


What is a touch-sensitive pad?
Why is it an appropriate device in this case
Give another device in the home, other than a computer, where touch sensitive pad may be
appropriate.

2.

The Queenstown Telephone company provides a telephone service for all telephone users in the
City of Queenstown. Every three months each customer pays a fixed rental charge of $24, plus a
charge of 8cents for each unit used. Bills are printed by the Companys computer using a line
printer.
The address of the Queenstown Telephone Company is Busby House, Bell Lane, Queenstownunder-Hill, QH4 3TC.
Design a standard layout which could be used for sending the bills to customers. Use your design
To show the bill that would be sent to Mrs. Laura Olivia Caller, 25 Humber Close, Queenstownunder-Hill, QH& 2EX, who has used 204 telephone units. Make clear in your diagram those items
which are printed by the computer.

(a)

(b)

The number of telephone units used by each customer is calculated by taking a reading from the
Customers meter. The reading is then input into the Companys computer, together with the
customers reference number. With the help of an example, or otherwise, describe the steps
involved in calculating the amount due from a customer, and printing the appropriate data on the
customers bill.

3.

A supermarket warehouse stores a variety of items which are delivered to the supermarket when
They are needed. Also, items from manufacturers are received in the warehouse from time to time.
The warehouse computer maintains a stock file, which holds information on all items stored in the
warehouse.

(a)
(b)
(c)

Give examples of two typical records which might appear in the stock file.
Carefully describe each field in the stock file, and explain its purpose.
For each of the fields, describe suitable validation tests that could be applied to the data.

4.

In the 1970s most data used by computers was typed in by keypunch operators. Now much of the
Data is typed in automatically. For each of the following, describe a different method of collecting
the data automatically, and describe the data that would be collected.

(a)
(b)
(c)

Selling goods at a supermarket checkout.


Recording the stock levels when counting the number of items in stock in a warehouse.
Recording the electricity meter reading of a customer.

5a.
5b.
5c.

Describe in detail, why a computer has to have interrupts of different priorities.


Explain the difference between serial transmission of data and the parallel transmission of data.
Give one input device and one output device which can use serial transmission. Briefly explain
why this method of transmission is appropriate.
Give one input device and one output device which can use parallel transmission . Briefly explain
why this method of transmission is appropriate.

5d.
6

A key-to-disc system is being used to enter dates in the format DD MM YY. For example, 27 June
1972 would be entered as 27 06 72.

(a)
(b)
(c)

Enter a date containing an error which should be detected by validation.


Describe a validation check which would detect this error.
How is an error detected by verification?

Page 3 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


8.

Give two uses of expert systems.

9.

What is the purpose of each of the following steps when changing from a manual to a computer
system.

10.

A credit card company issues a personal credit card to each of its customers. Each card carries a
unique reference number and is signed by its owner.
When the customer wishes to purchase goods from a shop he or she may, instead of paying cash,
use the card to obtain goods on credit. To do so, the customer hands the personal credit card to the
sales assistant; the assistant makes a copy of the reference number and customers name on a
special slip of paper, and notes the amount owed by the customer. The slip is then signed by the
customer and returned to the credit card company.
At the end of each month the credit card company sends the customer a bill listing all the
customers transactions during the month, and the customer pays the credit card company the
amount owing.

(a)
(b)
(c)
(d)
11.

A Company is used by the credit card company for handling customers accounts and sending
monthly bills to customers. Explain why batch processing is an appropriate method of processing
customers transactions and producing monthly bills.
Describe the measures which should be taken to ensure that the data processed by the computer is
accurate. Indicate the problems that would be caused if the various types of data were inaccurate.
It is proposed that every shop using the credit card system should be connected to the companys
computer by an on-line terminal. Indicate the advantages and disadvantages of this proposal. State,
with reasons, whether you would agree with the proposals.
The companys computer contains a great deal of personal data. Why should the company take
care that this data is kept private.

(a)
(b)
(c)

An Automatic Teller Machine (ATM) allows bank customers to withdraw cash from a machine at
Any time of the day or night.
State two other ways that an ATM helps customers.
Customers use two devices for data input. What are they?
State two kinds of output which may be used to pass information to the customer.

12.

What is meant by multi-access?

13.

A bar code is an input device which reads data presented in a machine-readable form. Give two
other input devices which can read data automatically. In each case give an example of an
application which can make use of the device.

14a.

For Each of OMR, OCR and MICR, give an application in which that technology is frequently
used.
Data security refers to the protection of data from destruction or corruption. State three measures
which can be employed to ensure data security.

14b.

15. The wide variety of input devices and media is a major factor which adds to the flexibility and
versatility of computer systems. The use of a (i) device which allows users to move around images
on the monitor by the shifting of a lever on the device has made computer games more popular. In
supermarkets, there are (ii) devices that allows the cashier to key in data on sales and this data is
automatically transmitted to a computer for processing. There are also (iii) devices that are capable
of reading pencils marks on an examination script thereby allowing the test to be scored
automatically. The use of (iv) devices to read in images allows pictures and logos to be
incorporated in a document.
State the technical names for EACH of the devices numbered (i) - (iv).

Page 4 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)

16a.

Match the following applications with the most appropriate input device.
APPLICATION
DEVICES
Point-of-sale
optical mark reader
Games
keyboard
Architectural design
magnetic ink character recognition
Multiple-choice examination
microphone
Publishing
pads and tablets
Cheque processing
barcode reader
Language processing
joystick
Preparing letters
scanner

16b.

Match EACH characteristics, listed A to H below with the MOST appropriate device.
CHARACTERISTIC
DEVICE
Modulates and demodulates signals
Plotter
Accepts voice inputs
Keyboard
Allow users to input architectural plans
Modems
Reads in graphics data
Graphics tablet
Used for printing architectural plans
Microphone
Used for entering text documents
Barcode reader
Retrieve pricing data from grocery items
Joystick
Used to move the cursor
Scanner

Unit 1-6
1

How is handshaking used when a document is being printed?

2.

Give a commercial or industrial application for which each of the following devices might be
used. (a) Daisy wheel printer (b) Laser printer (c) Visual display unit. (d) Line printer (e) plotter
Explain why a buffer is used in the output of data to a line printer.
Define the terms hard copy and soft copy.

3.
4.
5.

State one advantage and one advantage and one disadvantage of the first item over the second item
in each of the following pairs:
(a)
(i) Character printer
(ii) Line Printer
(b)
(i) Microfilm output
(ii) Printed output
(c)
(i) Magnetic Tape(ii) Magnetic hard disk
(d)
(i) Optical disk
(ii) Magnetic hard disk

6.

State one difference between character printers and line printers

7a.
7b.
7c.

Name a type of device which produces a human readable copy


Name a type of device which produces a machine-readable copy.
Name a type of device that accepts data in human readable form.

8a.
8b.
8c

Define the term resolution as it applies to a graphics display.


Give THREE examples of input devices that can read data directly from source documents.
Give two advantages of using devices that can read data directly from source documents.

Unit 1-7
1.
Give an example of an application which uses Optical Character Recognition (OCR) and an
advantage of its use.
2a.
What is the maximum number of different characters which can be represented using a group of
eight bits?

Page 5 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


2b.
2c.

A certain computer is able to represent only the 26 upper case letter A to Z, the 26 lower case letter
a to z and the ten digits 0 to 9. What is the minimum number of bits required to represent this set
of characters?
If the computer were also able to represent a full stop, a comma and a question mark, how many
bits would be required for each character? Give a reason for your answer.

3.

A certain computer uses 21-bit words, each of which can be used to store three characters. What is
the maximum number of characters in the computers character set?

4a.
4b.

Explain the difference between analogue data and digital data.


Give an example of data which would be represented in: (i) analogue form (ii) digital form

5a.

In ASCII C=code, the letter of the alphabet are stored using consecutive codes. If 1000010
represent B, what is the representation of G?
Give the binary value of 2310 + 11012.

5b.
7.

Explain briefly EACH of the following terms: bistable device, gigabyte, operating system,
barcode.

8a.
8b.

In a certain character coding system, each character occupies 7 bits and the letters of the alphabet
are assigned consecutive codes. If 1010001 represent M, whats the representation of H.
What is the value of X in the following equations? 5210 X2 = 111112.

9a.
9b.
9c.
9d.

Convert the decimal number 55 to its binary equivalent.


Convert the binary number 1011010 to its decimal equivalent.
Add the binary numbers 11010 and 10011
The ASCII code for the letter H has a decimal equivalent of 72. What is the ASCII code for P.

10.

Define the following: source code, object code, compiler

11a.
11b.
11c.
11d.

Convert the decimal number 5710 to a binary number.


Convert the binary number 110111012 to a decimal number.
Explain the parity, as it relates to the coding of characters.
Add the binary numbers 1101012 and 1011102.

12a.
12b.
12c.
12d.

Convert the decimal number 83 to its binary equivalent.


Convert the binary number 11001101 to its decimal equivalent.
Add the two binary number 1101 and 100101
Explain the difference between discrete and continuous data.

13a.
13b.
13c.
13d.

Convert 8710 to its binary equivalent.


Add the two binary numbers 1101012 and 111012, giving your answer in binary form.
Give the BCD representation of 5910.
Give the BCD representation of 5910.

14a.
14b.
14c.
14d.

Convert the decimal number 9010 to a binary number.


Convert the binary number 110112 to a decimal number.
Add the two binary numbers 11012 and 101012, giving your answer as a binary number.
Determine the BCD representation of 8710.

Unit 1-8
1.
State two functions performed by the operating system in a computer.
2.
Describe three different tasks that could be performed by a computer operating system.

Page 6 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


3.

Operating systems perform some tasks which would otherwise need to be done by a computer
Operator and some which an operator would not.
(i)
Give three tasks performed by an operating system which could otherwise be performed
by the computer operator.
(ii)
Give one task performed by an operating system which would not otherwise be
performed.

4.
5.

Name two facilities you would expect to find in a computer based learning system.
Many operating systems use a tree structure for directories. Use a labeled diagram to describe a
typical structure, showing directories and subdirectories.

6.

List (4) functions of an operating system.

7a.
7b.

State three functions of an operating system.


Identify the type of processing mode that would be suited for the following applications:
(i)
Monthly payroll (ii) Transactions at an ATM. (iii) Processing electricity bills

Unit 1-9
1a.
Describe the facilities offered by commercial word processing systems.
1b.
Indicate how the use of word processors has changed the work carried out by typists and
secretaries.
1c.
Indicate the advantages, for management and the general public, of introducing word processors
into commercial organizations.
1d.
The introduction of computers and computerized equipment into large organizations is often
blamed for causing unemployment.
Give reasons why the introduction of computers sometimes causes unemployment.
1e.
Give reasons why, in other cases, the introduction of computers does not cause unemployment.
2a..
2b.
2c.
3.

Give one benefit to the user of custom written software.


Give one benefit to the user of general-purpose software.
Explain briefly ONE distinguishing feature of each interface : (i) Command Language Interface
(ii) Graphical User Interface
State one difference between general-purpose software package and specialized software package.

Unit 1-10
1.
Describe two benefits of Graphical User Interfaces.
2.
What is the major interfacing device for: (i) a command language interface (ii) a GUI
3.

John receives computer hardware from a friend who lives in the United States of America, but the
Software was missing. He, therefore, decided to purchase the necessary software. In order for his
system to run he realized that he would have to purchase software to manage the resources of the
computer as well as software that could provide for his particular needs. For both types of
software he had a choice of two styles of interface; one which was command driven or the other
which provide screen listings with options from which the user could select appropriate functions.
Some software provides user interfaces which display small graphic images that can be selected
when the function they represented is required. Since John intended to use his computer in his
family business, he had a choice of acquiring software written especially for his business or
general-purpose software. He noted, however, that if he purchased general-purpose software, that
he would have to do some modification to allow it to meet his specific need.
State the proper technical terms for each of the SIX underlined passages.

4.
5.

State one difference between EACH of the following: command line interface and GUI.
Name the hardware component that allows users to move the cursor.

Page 7 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


Unit 1-11
1. What is the purpose of formatting or initializing a diskette.
Unit 1-14.
1. Give two advantages of electronic mail over normal post.
2. A secondary school is planning to purchase a new set of computers and you have been asked to give
advice. Comment on the following.
(a) The advantages and disadvantages of installing a local network of computers, rather than separate
computers.
(b) The advantages and disadvantages of being able to link into a central mainframe computer.
(c) The relative merits of 16-bit and 8-bit microcomputers.
3.

There are now many dial-up information systems which can be accessed using a home computer,
together with a modem and communications software. As well as displaying information in viewdata
format, they contain programs which users can download, and many offer electronic mail.
Explain what is meant by each of the underlined terms.

4. Describe two ways a network manager could protect shared data and programs from corruption.
5. Explain why an office would install a star network rather than a linear network.
6a. What is electronic mail 6b. Give two advantages of electronic mail over normal post.
6.

Abacus College has a Local Area Network (LAN) which is used by its students. Students log on at a
workstation and use software such as wordprocessors and spreadsheets.
(a) Draw a labeled diagram of a LAN.
(b) Explain what the operating system of a LAN does when a user logs on and selects a spreadsheet
package.
(c) Explain how the operating system allows users to share a printer.
7a. Draw a labeled diagram showing a local area network (LAN) which can be connected to a wide area
network (WAN).
7b. Give one feature available on a WAN that is not available on a LAN.
7c. Define each of the following terms as it applies to data transmission: voice band, simplex, halfduplex.
7.

Each regional office of the Jamaican Food Crop Marketing Agency uses a system of hardware,
software and communications channels that connects hardware devices to provide its computing
services. Information is collected at the regional offices and at the end of the day it is transferred to a
mainframe computer at the head office in Kingston. At nights, this mainframe at head office collates
the information and transfers it to the regional offices. The communication system is complex since
each network at the regional office uses different rules establish to govern the way data is transmitted
in the particular network. Apart from providing up-to-date information to users through its regional
offices, the system allows users access to the information at their homes. However, to utilize this
facility users must subscribe to its special service which allows them to send and receive messages
to/from other users. The cost of this facility is affordable to the average home-user since the
subscription fee is small and the only other capital cost is the price of a device which convert digital
signals to analogue signals and vice versa.
State the proper technical terms for each of the four underlined phrases in the above passage.

8.

Name the hardware component that modulates and demodulates signals.

9a. What is meant by the term protocol?


9b. Explain the difference between the following terms:
(i)
Upload and Download (ii) Half-Duplex and Duplex (iii) Local Area Network and Wide Area
Network (iv) Electronic mail and Bulletin Board

Page 8 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


10a.
10b.

Define the term protocol as it relates to data communication.


Digital transmission can occur in three of the following ways:
(i)
Data can be transmitted in one direction only.
(ii)
Data can be transmitted in both directions but not at the same time
(iii)
Data can be transmitted in both directions simultaneously.
State the correct technical term for each of the transmission methods above.

Unit 2-1
1a.
Explain briefly the difference between an assembly language and a high level language.
1b.
As high level languages have developed, various facilities have been provided to make program
development easier and more efficient. Describe the facilities that are now available.
1c.
Some high level languages allow a number of data types to be used. By referring to appropriate
programming languages, describe the data types with which you are familiar.
2.
3.
4a.
4b.

Explain what is meant by a compiler, indicating why compilers are needed.


Give two features of high level languages which are not shared by assembly languages.
Explain the difference between a high level programming language and a machine level language.
Explain the difference between an interpreter and a compiler

Unit 2-2
1. Explain the difference between string data and numeric data.
Unit 2-3/4
1. Workers entering a building use cards which have the sum of their 9-digit personal identification
Numbers (PIN) stored on them. When a card holder passes a card through the card reader and keys in a
9-digit PIN, the following algorithm is used to check the validity of that PIN.
initialize count and total to zero
read the sum of the PIN digits
while the count is less than nine do
input a digit
total equals total plus digit
count equals count plus one
endwhile
if the total equals the sum allow access
else sound alarm
(a) Explain the output obtained for CARD ONE and CARD TWO when they are passed through the card
reader with the following PINs keyed in.
CARD ONE with 43 as the sum of its PIN digits and the PIN 283746553 is keyed in.
CARD TWO with 59 as the sum of its PIN digits and the PIN 987687891 is keyed in.
(b) Secrets areas require an 11-digit PIN. The sum of the first eight digits and the sum of the last three
Digits are stored on these cards. Modify and rewrite the algorithm to check a secret area PIN 8888
8888 888 which is keyed in after a card with 64 24 stored on it has been passed through the card
reader.

Page 9 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


2.

Read this algorithm.


Make count_one = 0
Make count_two = 0
READ character
WHILE character IS NOT a full stop DO
IF character = a space or a punctuation mark THEN
Make count_one = count_one + 1
ELSE
Make count_two = count_two + 1
ENDIF
READ character
ENDWHILE
Make count_one = count_one + !
Make answer = count_two/count_one
OUTPUT answer
END

(a)
(b)
(c)
(d)

If the input is My name is Bill. , what is the output


What do the variables count_one, count_two and answer represent?
What happens if the following data is entered? Hello, What is my name?
Explain how the algorithm should be modified to cope with an exclamation mark (!) at the end of the
data.

3. Computer programs need to be tested.


(a)
How should test data be chosen?
(b)
How does a trace routine help to test a program?
(c)
Most programs contain repetition and selection instructions. With the help of examples explain
what is meant by (i) repetition (ii) selection .
4. Two concepts of structured programming are top-down design (using modules) and stepwise
refinement of a module.
(a) Give two reason s why top-down design may help a programmer to write error-free programs.
(b) What is meant by stepwise refinement.
5.Read this algorithm.
Set the word_count to 0
Set the char_count to 0
Read the next word
REPEAT
Set length to number of character in the word
Increase the char_count by length
Increase word_count by 1
Read the next word
UNTIL the word is SENT
Set the average to char_cout divided by word_count
Output the average
(a) Using the data
table.

I LIKE COMPUTER STUDIES SENT , Dry run the algorithm by completing this

Page 10 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)

Word_count

Char_count

Word

Length

(b)
(c)
(d)
(e)
6.

Is word =
SENT?

Output

What is the purpose of each of the variables word_count and char_count?


What is purpose of the algorithm?
What is the purpose of the word SENT
What problem will occur if this data is used? THE COMPUTER WAS SENT FOR REPAIR SENT
The following algorithm is used to award grades in an examination. The examination consists of
two papers which are given marks called markA and markB.
READ name, markA, markB
IF markA is greater than 70 THEN
IF markB is greater than 70 THEN
Grade is 1
ELSE
IF markB is greater than 40 THEN
Grade is 2
ELSE
Grade is fail
ENDIF
ENDIF
ELSE
IF markA is greater than 40 THEN
IF markB is greater than 70 THEN
Grade is 2
ELSE
Grade is fail
ENDIF
ENDIF
ELSE
Grade is fail
ENDIF
ENDIF
PRINT name, grade

For each of the following sets of data write down the output.
(a)
John Williams, 80, 85 (b) Mary Brown, 45, 60 (c) Ian Ford, 40, 39
7a.
7b.
7c.

Give three items which should be included in the technical documentation of a program, but not in
the user documentation.
Give one reason why technical documentation is necessary.
Give two items of user documentation other than the name of the program.

Page 11 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)

8a.

Using a trace table, dry run the following algorithm. Show the output at each stage.
Set the count equal to zero
Set the number equal to negative one
Set the total equal to zero
Repeat
Count equals the count plus one
Number equals the number plus two
Total equals the total plus number
Print the total
Until the count equals four
Count
0

(b)
(c)
9.
10.
11.
12
13
14

Number
-1

Total
0

Output

What is the output if the loop terminates when the count equals 5?
Change the algorithm so that it uses a WhileDoEndwhile structure instead of a RepeatUntil
structure.
Write a pseudocode algorithm to read a positive integer N followed by N integers. For these N integer,
the algorithm must count and print the number of zero and non-zero values.
Write a pseudocode algorithm to print a conversion table from miles to kilometers. The table ranges
from 5 to 100 miles in steps of 5 (1 mile = 1.61 kilometers).
Write a pseudocode algorithm to read a set of positive integers (terminated by 0) and print their
average as well as the largest of the set.
Write an algorithm to interchange the values in 2 variables A & B
Write an algorithm to read the names and ages of 10 people and print the name of the oldest person.
Assume that that there are no persons of the same age. Data is supplied in the following form: name,
age, name, age etc.
Write an algorithm to read an integer value for SCORE and print the appropriate grade based on the
following:
SCORE
GRADE
80 or more
A
less than 80 but
65 or more

less than 65 but


50 or more

less than 50

15 Write a pseudocode to read in three numbers and print the highest and lowest number.

Page 12 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


16 The following data represents some sample score obtained by students in a test:
5, 4,
7,
10,
0,
1,
0,
9,
8,
999
999 is the dummy value which terminates the data. Write a pseudocode algorithm to read any data in
the above format, and print the number of students scoring 0 and the number scoring 10.
17. Write an algorithm which prompts the user to enter the price of an item and which calculates and
prints the new price after a discount of 12%.
18. Write an algorithm to read in two numbers into A and B. The algorithm should store the smaller in A
and the larger in B, and then print A and B.
19. Write an algorithm to read ELEVEN number, find their average and print it. The algorithm should
also print the number of times the number 6 occurs in the data. For example, given the input data:
8 4
6
9
6
5
6
10
7
0
16
The algorithm should print 7 as the number of times 6 occurs.
20. Write a pseudocode algorithm to read two numbers and print the lower value.
21. The following data represents some sample data of the number of children in several families:
1 3
5
0
4
6
7
3
5
2 4 0 2 999
999 is the dummy value which terminates the data. Write a pseudocode to read in any data in the above
format, and print
(a) the number of families with no children; and
(b) the largest number of children existing in any family
22 Write a structured algorithm to read in TWO numbers and print the higher value.
23 Write a structured algorithm to interchange the values in TWO variables A and B.
24 Write a structured algorithm to read the names and scores of fifteen students in a class. The algorithm
must print the name of the student and his/her grade which is determined according to the grading
scale below. The algorithm must also calculate and print the average score for the class.
GRADING SCALE
SCORE
GRADE
80 or more
A
65 or more but less than 80
B
50 or more but less than 65
C
Less than 50
F
25.

Write a structured algorithm to prompt the user to input two values which are then stored in A and
B. The algorithm must divide A by B and print the result. The algorithm must keep prompting for
the second number as long as the user enters 0 (zero) for the second number

26a.

Write a structured algorithm which prompts a user to enter an integer value which is then stored in
a variable N. The algorithm must then print each integer from 1 to N and its corresponding square.
Each output line must show the integer and its square. You may assume that the user wold enter an
integer value.

26b.

Modify the algorithm in (I) to determine the sum of all the squares. Print this sum if it is less than
or equal to 1000. Otherwise, print the following message:
THE SUM IS GREATER THAN OE THOUSAND

Page 13 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


Unit 2-5
1.

What is printed by the following algorithm when n = 5?


If (n = 1) or (n = 2) then
H=1
else
f=1
g=1
for j = 1 to n-2 do
h=f+g
f=g
g=h
print h
endfor
end if
print f, g
stop

2.

What is printed by the following algorithm?


SUM =0
N = 20
WHILE N < 30 DO
SUM = SUM + N
PRINT N, SUM
N=N+3
ENDWHILE

3.

Copy the following trace table in your answer booklet.


X
4
4
4
4

M
1

Z
8

Complete the following trace table for the following algorithm, given that the number 4 is the input value X
Read X
For M = 1 to X do
Y=XM
Z = 5 *Y M
End
Print Z
(b)What is printed by the algorithm?
4.

What is printed by the following algorithm?


COUNT = 1
X=2
WHILE COUNT < 26 DO
X=X+2
PRINT COUNT, X
COUNT = COUNT + 5
ENDWHILE

Page 14 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


5.

Copy and complete the trace table below for the following algorithm.
X=5
K = 10
SUM = 45
While SUM < 75 do
SUM = SUM + K
Print K
K=K+X
Endwhile
Print SUM
X
5

K
10

SUM
55

20
5
(c) What is printed by the algorithm.
6.

DIFFERENCE = 0
Input A,B
If A <=B Then
DIFFERENCE = A B
Else
DIFFERENCE = B A
Endif
Print DIFFERENCE
What is printed by the algorithm above if the input values are the following?
(i) 20 30
(ii) 100 100
(iii) 50 10

Unit 2-6
1.
Programs are written with the general purpose of solving problems. However, it is unlikely that a
program will run completely error-free on the first attempt. The process whereby a program is
checked to ensure that it does what it was designed for is important in the development of the
program. There are two main type of errors that can occur; one type of error occurs when the
programmer fails to properly think through the solution to the problem, and the other occurs when
the programmer does not adequately know the rules of the programming language. It is good
practice to perform a manual trace on the program, using appropriately selected input values,
which checks each segment of the program.
State the proper technical term for EACH of the underlined phrases labeled A to E.
Unit 2-7
1.
Explain the relationship between a compiler, a source program and an object program.
Unit 3-1
1.
Many cities have computer controlled traffic lights.
(a)
State two events which may have caused a sudden change in the flow of traffic.
(b)
How are details of traffic flow collected?
(c)
How can the computer to control the flow of traffic?
2.

Give one application for which the use of multimedia computer ( a computer with a
CD-ROM, sound and powerful video capabilities).

3.

Give three features of a camera that contains a microprocessor which makes it different to the one
That does not.

Page 15 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


4a.
4b.
5
(a)
(b)

Describe two features of a desktop publishing package that make it more suitable than a
word-processing package for producing a school newspaper.
Explain how a scanner could help.
A bank introduces banking by telephone and machines that allow customers to withdraw cash
outside the bank.
Give one advantage for bank workers.
Give two disadvantages for bank customers.

7.

For each of the devices below, describe a computer application which uses the device. In each case
Give an example of data which might be collected by the device and indicate the processing which
might be carried out. (i) Bar-code reader (ii) temperature sensor (iii) on-line enquiry terminal.

8.

A seven segment display is used is used to indicate which floor a lift is on. Each segment is
numbered as shown.

A byte is used t hold the data needed to light the correct segments. Bit 0 is always zero. For
example, 3 is represented by
and by
7
1

0
0

(a) If the lift is to stop at more than one floor, the data is held in successive bytes. The contents of the two
successive bytes are
First byte
Second byte

1
1

1
1

1
0

1
1

1
1

0
0

0
1

0
0

Which floors, in the correct order, does it visit?


(b) What bit pattern is used to indicate floor 2.
(c) The lift is travelling downwards to stop at floors 5,3, and 1. When it stops at floor 5, a passenger gets
in.
(i)
This passenger presses the button for floor 2. How does the system ensure that the lift stops at
floors at 3, 2 and 1 in that order?
(ii)
Suggest what the system might do if this passenger presses the button for floor 6 instead of
floor 2.
9.

An order processing system holds details of stock items in one file and suppliers in another. Each
Stock record consists of a
4 character item code, 12 character description of the item, 4-digit number giving the number in
stock, 4 digit number giving the reorder level, 2-character code for the supplier in that order.

(a)

Show how the data for French Fries is stored if they are supplied by Packaged Foods Ltd. Whose
code is PF and there are 1250 in stock. The code for French Fries is FF37 and the reorder level is
500.

Page 16 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


(b)
(c)

State two validation checks that could be used on the number in stock.
Each item code can be read by an optical character reader. Explain what the order processing
system should do with the stock file each time an item is sold.
State the type of access needed
Once a day the order processing system checks its stock levels and , if necessary, prints orders for
suppliers. Explain how the system does this.

(d)
(e)
10.
(a)
(b)

A school uses data-logging to collect data about temperature, pressure, wind speed and direction.
Describe the hardware and software needed to collect and display the data.
How can this data be used to predict the next days weather?

11.(a)
(d)

A large store wishes to simulate the queues and servicing of customers so that it can decide
whether or not to employ extra staff. Describe the input, processing and output of this simulation.
Give two reasons for using simulations.

12
(a)
(b)

A hospital uses a database to keep details of patients.


Give one hardware method of preventing illegal access.
Give one software method for preventing illegal access.

13 A group of shops is supplied from a central warehouse. Each shop sends a regular list of stock
requirements to the warehouse. Staff at the warehouse order goods from a number of different
suppliers. Goods are then dispatched from the warehouse to the individual shops.
Describe how a computer might be used at the central warehouse. Your answer should refer to input,
output, processing, hardware and use of files.
14a. Identify any TWO jobs industries and, for EACH, state how the use of the computer has resulted in
either a change of procedures for TWO jobs or made jobs obsolete.
14b.Name FOUR jobs that have been created by the computer industry.
14c. What is a videotext system?
14d.Describe TWO distinct uses of videotext systems.
14e. Name TWO distinct effects that videotext systems can have on the traditional Post Office.
15a. State THREE functions that are likely to be computerized when the Board of Directors of a private
hospital installs computers at the hospital.
15b.A local bank with several branches have decided to computerize its operations.
(i)
State TWO new job positions that would be created in the bank.
(ii)
State One additional service that the bank would now be able to provide
Unit 3-2
1.
Two concepts of structured programming are top down design (using modules) and stepwise
refinement of a module.
(a)
Give two reasons why top-down design may help a programmer to write error free programs.
(b)
What is meant by stepwise refinement.
Unit 3-3
1.
Plants grow in boxes containing soil which must always be damp. How could a computer system
help to keep the soil damp? Explain the purpose of each item of hardware you mention.
2.
Describe how CD-ROMs can help pupils in their studies.
3.
CD-ROMs are used extensively in the filed of education. State THREE features of educational
software on CD-ROMs that make them useful for educational purposes.

Page 17 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


Unit 3-4
1.
Many wordprocessors can be combined with other software to form integrated packages
(a)
Name one such type of software.
(b)
Describe how it may be used with a wordprocessor.
(c)
Give two benefits of using an integrated package.
2.
3.
4.
5a.
5b.
6a.

What are computer viruses?


State two ways in which the Data Protection Act can ensure the rights of individuals.
Usually the government laws give people the right to see a copy of their personal data which is
stored on computer files and have it changed if it is not correct. Explain why, in some countries,
people are not allowed to see the information stored about them on government and police files
Give two examples of computer crime.
Give two methods of protecting a system against computer crime.
An electricity company uses a computer for customer accounts. Customers can pay their bills at
any branch office. Each office is connected on-line to the main computer and details any of
transaction are immediately recorded.
Outline the measures which should be taken to prevent unauthorized access to the accounts file.

6b.

The company is to introduce a new system in which payments are transferred electronically from
customers bank accounts.
(i)
Discuss the advantaged and disadvantages of the new system for the company and for the
customers.
(ii)
Outline the main stages in the new system.

7.
8a.
8b.

Many countries have data protection legislation. Recommend three rules for the legislation.
Give examples of computer crime.
Explain how companies can help protect themselves against computer crime.

8.

Describe typical hardware configurations which would be needed for the systems indicated below.
For each give an indication of the tasks which the system could be expected to perform.
A process control system, for two liquids being mixed together in a heated container, the
temperature and the rates of supply of the liquids must be kept under control.
A Word Processing system.
An airline booking system.

8a.
8b.
8c.
9a.
9b.
9c.

What is meant by Data Integrity?


State TWO examples where the lack of data integrity can cause loss, inconvenience or
embarrassment.
Data Security involves the protection of data from destruction or corruption. State THREE
measures which can be employed to ensure data security.

10a.
10b.

Identify FOUR measures to secure data.


State TWO advantages and TWO disadvantages of normal mail over electronic mail.

11.

What is Data Encryption.

12a.
12b.

What is a computer virus.


State tow measures that could be implemented in order to prevent computer virus from infecting a
computer.
Identify two ways in which a person can be affected by the misuse of personal information which
has been stored in a data bank.
Identify two ways by which personal information, stored in a data bank, may become inaccurate.

12c.
12d.

Page 18 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


13a.

In order to secure its data, a company uses the following method for encryption text:
A letter is replaced by the letter five letters later in alphabetical order. For example, the letter A
is replaced by F, B is replaced by G and so on. Note that the letter A is considered to
follow Z.
(i)
What would the word ESSAY be stored as?
(ii)
What is the meaning of the following text? N LTY NY
(iii)
What is the purpose of a password?
(iv)
What is meant by the term archiving?
(v)
Within many organizations, data on personnel are stored in a central location from which
various departments can access relevant information. State THREE problems that may
arise because of the sharing of this type of data.

Unit 3-5
1.
State one reason why copying a program is considered to be morally wrong.
2.
Refer to Question 12a (3-4)
Unit 3-6
1.
A company wants its sales people to be able to use portable computers in their cars.
(a)
Suggest two ways that the sales people can use their portable computers to send orders to head
office.
(b)
Describe two problems that could occur with this system.
(c)
Describe the possible social effects on the sales people using such a system.
2.

Name three peripheral devices which are used in Computer Aided Manufacturing but which are
not commonly used in an office..

3.

The Statistic Department holds confidential information on the citizen of a country. Since its
databases are online and are connected to the telephone company via a modem, any person with a
computer and a modem can potentially access from the databases. Outdated data are usually stored
at other locations.

(a)

State one method which can be used to prevent unauthorized users from accessing data stored in
the databases.
State two methods which can be used to prevent users from accessing data from files to which
they do not have access.
State one potential danger that may exist when legitimate users within the Statistic Department
import data into the departments computer.
State two strategies to protect the archived data into the departments computer.

(b)
(c)
(d)
Unit 3-7
1.

A Car Manufacturer manufactures robots. Describe one advantage and one disadvantage to the
manufacturer.
2.
Give two uses of Expert Systems.
3.
Below is shown part of a database containing details of students examination results. The sex of
each student has been coded as M for male and F for female.
Surname
Initials
Student ID
Sex
Maths
Science
PATEL
L
951324
M
56
64
GREGORY
E
952853
M
47
43
FOSTER
W
953216
F
76
67
KIRKLAND
J
954286
M
34
45
PATEL
D
956385
F
78
45
COLLINS
D
956284
F
87
68
WITCOMBE
L
952952
M
45
57

Page 19 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


(a)
(b)
(c)

On the diagram, mark and label a fieldname, record.


Which field could be used as a key field?
Describe the steps you would take to print the details of all the male students in surname order.
details of female students must not be printed.

4.
(a)
(b)
(c)

some computer systems are designed for medical diagnosis. When details of a patients symptoms
are entered, the system suggests possible cause of the illness. The medical knowledge contained
in the system is provided by doctors. Such systems are examples of Expert Systems.
Suggests two benefits which are offered by the use of the medical expert systems.
Why might some people be worried about the use of computers in this application?
Give another application for an expert system..

5a.
5b.

Describe one use of an expert system.


Describe two different ways in which the knowledge base of the expert system could be improved.

6a.

Give one way, other than unemployment, that the introduction of computers has affected those
who make cartoon films.
Explain how an artist, without the aid of a computer, would create a film to show the stick man
walking across the screen and sitting on the chair.

6b.

6c.

Explain how a computer could be used to create a film to show the stick man walking across the
screen and sitting on the chair.

7a.
7b.
7c.

What is an expert system


Name one area in which expert systems are used.
Give one advantage and one disadvantage of using an expert system in the area named above.

8.

The increase in the level of computerization in offices, together with the decrease in the cost and
the availability of data communication services have created new ways of conducting business.
Some employees now have an opportunity to perform their work from home a process known as
telecommuting.
State two items of hardware that an employee must have when she is telecommuting.
State one advantage to the employee of telecommuting.
State one disadvantage to the employee of telecommuting.

(a)
(b)
(c)
9.

The owner of a large department store in the city center is planning to offer telemarketing services
to the general public. Currently, his retailing business customers are encouraged to browse the
store. They are normally offered assistance by the sales clerk. If a customer is satisfied with a
particular item, he/she takes it to the cashier where the customer must pay in cash. After the
transaction is completed, the customer must take away the items purchased.

(a)
(b)

State two additional services that the owner should offer so that he could introduce telemarketing.
State one change that the owner must make in the operation of his business so that he could
introduce telemarketing.
State one reason why a customer might still choose to visit the store to make a purchase even
though the customer might have to travel a long distance to get to the store.

(c)

Page 20 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


Unit 3-8
1
a.
b.

Telephones can obtain microelectronic components which allow more operations than just calling
a number. For example some have a last number recall using a single key press rather than reentering all the digits.
Describe one similar feature which microelectronic technology makes possible in telephones.
A sequential access file is corrupted. Describe how the file can be retrieved.

4.
(a)
(b)

Banks have increased their use of computers considerably.


Give two benefits to customers.
Give two disadvantages to customers.

5.
(a)
(b)

A government computer stores data about cars and their owners.


State one advantage to a car owner of this arrangement.
Who, other than the government and car owners, could reasonably be given permission to use this
data? Give two possible answers and explain your answers.

4a.
4b.

Describe how analog-to-digital converters are used in the monitoring of a patients heart beat.
If digital-to-analogue converters are added to the system, what improvements could be made to the
patient monitoring system? Include a comment on feedback.

5
14.
7a.
7b.
7c.

State two ways in which a computer can be used by a teacher in his/her job.
List four ways in which medical personnel may use information technology in their jobs.
State THREE ways in which a journalist would use a computer in his or her job.
State two ways in which a journalist would use a computer I his or her job.
A large company has decided to computerize the functions of its Human Resource (Personnel)
department. The Computer Department has been given the responsibility for completing this task.
Name four categories of personnel from the Computer Department that the Computer Department
Manager must assign to the task, stating clearly one function of each category.

8.

9a.
9b.
9c.

For each of the following, state TWO ways in which Information Technology can assist employees in
the performance of their jobs:
(i) law enforcement (ii)
medicine
(iii)
entertainment
List three ways in which a teacher can use computers in the classroom.
Suggest two reasons why computers may not be used in the classroom.
State two advantages of using computers in the classroom.

Unit 3-9
1a.
List three features which a user would find helpful in a computer aided design (CAD) package
when designing parts of a motor car.
1b.
Give input devices which are suitable for CAD.
1c.
Give two advantages of a CAD/CAM (Computer Aided Design/Computer Aided Manufacture)
system compared to a system which does not use computers.
3.
(a)
(b)

In an office, workers produce letters and invoices using typewriters and keep accounts using
calculators. They also use card files to keep details of customers and products. Managers has
decided to introduce computers to help to do this work.
State the kinds of software you recommend for
(i) the production of letters
(ii) keeping customer and product information.
Explain how the software would help to
(i)
produce a letter to all customers informing them of a new product
(ii)
answer a customers enquiry about the availability of a given product.

Page 21 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)


4.
5.

Electronic funds transfer (EFT) is used to transfer the wages from the companys bank to a
workers bank. Give one advantage to the company and one disadvantage for the worker of the use
of EFT.
How can programs be run at the same time on one computer.

6.

Name four jobs created by the computer industry.

7.

Describe two jobs of each of the following:


(i) system analyst
(ii) computer operator
(iv) network manager

8.

(iii)

database administrator

What is the difference between the role of an applications programmer and that of a systems
programmer in an organization.

Page 22 of 23

Prepared by : Mr. O. Duncan (Info. Tech. Teacher)

Page 23 of 23

Вам также может понравиться