Академический Документы
Профессиональный Документы
Культура Документы
Teacher)
State one advantage and one disadvantage of the first item over the second item in each of the
following pairs:
3.
Each frame of data on magnetic tape stores a character and includes a parity bit. What is a parity
bit and why is it used.
3a.
Describe why buffers are needed for the transmission of data between main store and peripherals.
Page 1 of 23
3b.
(a)
(b)
(c)
(d)
(i)
(i)
(i)
(i)
4.
Explain briefly the following terms: bistabe device, gigabyte, operating system, and bar code.
Character printer
Microfilm output
Magnetic tape
Optical disk
(ii)
(ii)
(ii)
(ii)
Line printer
Printed output
Magnetic hard disk
Magnetic hard disk
Unit 1-4
1.
Explain the term buffer?
2a.
2b.
In some microcomputers the operating system is contained in a ROM (read only memory) chip
which is inside of the computer. In other cases the operating system is supplied on a magnetic
disk. Describe the relative advantages and disadvantages of these appraoches.
Spreadsheet programs are an example of general-purpose packages which are now available for
Microcomputers. Briefly describe three other general-purpose packages.
3a.
3b.
4a.
4b.
4c.
Explain the difference between serial access to data and direct access to data.
Which storage medium would you choose for files requiring: (i) serial access (ii) direct access.
State an application for which it would be appropriate to use: (i) serial access (ii) direct access
5.
5a.
5b.
Customer of InterBank are issued with plastic cards which have a magnetic stripe on the back.
Give two items of information contained in the magnetic stripe.
The card can be used to get cash from an automatic teller machine (ATM). State two ways the
customer is prevented from drawing large sums of money from the machine.
6.
When customers arrive at a car park, they insert a credit card into a machine and enter a personal
Number. The card stores an account number which is validated and then checked against the
personal number. The account number consists of 6 digits.
Describe three validation checks which may be carried out on the account number.
The account number, time of entering and time of leaving are entered into a serial file. What is a
serial file.
Each night the computer creates a sequential transaction file. What is a sequential transaction file?
The computer then updates the master file. Other than the customers name and addresses, what
information would be held on the master file?
6a.
6b.
6c.
6d.
7a.
7b.
7c.
7d.
7e.
What is a buffer? 7b. Why is a buffer needed between a CPU and a printer?
Compare the use of floppy discs and hard discs by giving two advantages of each.
What is a Local Area Network (LAN)?
Refer to a particular application to explain the use and benefits of a LAN.
Explain why a buffer is used in the output of data to a line printer.
7.
When a program makes a read request to the hard disk, the device which reads data from the disk
Is moved along a radius to the particular concentric circle circle on which the data is stored. When
the relevant part of the concentric circle of the disk arrives under the device which reads the data,
the data is read and stored in a special area of memory from which it could be accessed.
State the proper technical terms for each of the four-underlined phrase in the passage above.
Page 2 of 23
Unit 1-5
1.
(a)
(b)
(c)
2.
The Queenstown Telephone company provides a telephone service for all telephone users in the
City of Queenstown. Every three months each customer pays a fixed rental charge of $24, plus a
charge of 8cents for each unit used. Bills are printed by the Companys computer using a line
printer.
The address of the Queenstown Telephone Company is Busby House, Bell Lane, Queenstownunder-Hill, QH4 3TC.
Design a standard layout which could be used for sending the bills to customers. Use your design
To show the bill that would be sent to Mrs. Laura Olivia Caller, 25 Humber Close, Queenstownunder-Hill, QH& 2EX, who has used 204 telephone units. Make clear in your diagram those items
which are printed by the computer.
(a)
(b)
The number of telephone units used by each customer is calculated by taking a reading from the
Customers meter. The reading is then input into the Companys computer, together with the
customers reference number. With the help of an example, or otherwise, describe the steps
involved in calculating the amount due from a customer, and printing the appropriate data on the
customers bill.
3.
A supermarket warehouse stores a variety of items which are delivered to the supermarket when
They are needed. Also, items from manufacturers are received in the warehouse from time to time.
The warehouse computer maintains a stock file, which holds information on all items stored in the
warehouse.
(a)
(b)
(c)
Give examples of two typical records which might appear in the stock file.
Carefully describe each field in the stock file, and explain its purpose.
For each of the fields, describe suitable validation tests that could be applied to the data.
4.
In the 1970s most data used by computers was typed in by keypunch operators. Now much of the
Data is typed in automatically. For each of the following, describe a different method of collecting
the data automatically, and describe the data that would be collected.
(a)
(b)
(c)
5a.
5b.
5c.
5d.
6
A key-to-disc system is being used to enter dates in the format DD MM YY. For example, 27 June
1972 would be entered as 27 06 72.
(a)
(b)
(c)
Page 3 of 23
9.
What is the purpose of each of the following steps when changing from a manual to a computer
system.
10.
A credit card company issues a personal credit card to each of its customers. Each card carries a
unique reference number and is signed by its owner.
When the customer wishes to purchase goods from a shop he or she may, instead of paying cash,
use the card to obtain goods on credit. To do so, the customer hands the personal credit card to the
sales assistant; the assistant makes a copy of the reference number and customers name on a
special slip of paper, and notes the amount owed by the customer. The slip is then signed by the
customer and returned to the credit card company.
At the end of each month the credit card company sends the customer a bill listing all the
customers transactions during the month, and the customer pays the credit card company the
amount owing.
(a)
(b)
(c)
(d)
11.
A Company is used by the credit card company for handling customers accounts and sending
monthly bills to customers. Explain why batch processing is an appropriate method of processing
customers transactions and producing monthly bills.
Describe the measures which should be taken to ensure that the data processed by the computer is
accurate. Indicate the problems that would be caused if the various types of data were inaccurate.
It is proposed that every shop using the credit card system should be connected to the companys
computer by an on-line terminal. Indicate the advantages and disadvantages of this proposal. State,
with reasons, whether you would agree with the proposals.
The companys computer contains a great deal of personal data. Why should the company take
care that this data is kept private.
(a)
(b)
(c)
An Automatic Teller Machine (ATM) allows bank customers to withdraw cash from a machine at
Any time of the day or night.
State two other ways that an ATM helps customers.
Customers use two devices for data input. What are they?
State two kinds of output which may be used to pass information to the customer.
12.
13.
A bar code is an input device which reads data presented in a machine-readable form. Give two
other input devices which can read data automatically. In each case give an example of an
application which can make use of the device.
14a.
For Each of OMR, OCR and MICR, give an application in which that technology is frequently
used.
Data security refers to the protection of data from destruction or corruption. State three measures
which can be employed to ensure data security.
14b.
15. The wide variety of input devices and media is a major factor which adds to the flexibility and
versatility of computer systems. The use of a (i) device which allows users to move around images
on the monitor by the shifting of a lever on the device has made computer games more popular. In
supermarkets, there are (ii) devices that allows the cashier to key in data on sales and this data is
automatically transmitted to a computer for processing. There are also (iii) devices that are capable
of reading pencils marks on an examination script thereby allowing the test to be scored
automatically. The use of (iv) devices to read in images allows pictures and logos to be
incorporated in a document.
State the technical names for EACH of the devices numbered (i) - (iv).
Page 4 of 23
16a.
Match the following applications with the most appropriate input device.
APPLICATION
DEVICES
Point-of-sale
optical mark reader
Games
keyboard
Architectural design
magnetic ink character recognition
Multiple-choice examination
microphone
Publishing
pads and tablets
Cheque processing
barcode reader
Language processing
joystick
Preparing letters
scanner
16b.
Match EACH characteristics, listed A to H below with the MOST appropriate device.
CHARACTERISTIC
DEVICE
Modulates and demodulates signals
Plotter
Accepts voice inputs
Keyboard
Allow users to input architectural plans
Modems
Reads in graphics data
Graphics tablet
Used for printing architectural plans
Microphone
Used for entering text documents
Barcode reader
Retrieve pricing data from grocery items
Joystick
Used to move the cursor
Scanner
Unit 1-6
1
2.
Give a commercial or industrial application for which each of the following devices might be
used. (a) Daisy wheel printer (b) Laser printer (c) Visual display unit. (d) Line printer (e) plotter
Explain why a buffer is used in the output of data to a line printer.
Define the terms hard copy and soft copy.
3.
4.
5.
State one advantage and one advantage and one disadvantage of the first item over the second item
in each of the following pairs:
(a)
(i) Character printer
(ii) Line Printer
(b)
(i) Microfilm output
(ii) Printed output
(c)
(i) Magnetic Tape(ii) Magnetic hard disk
(d)
(i) Optical disk
(ii) Magnetic hard disk
6.
7a.
7b.
7c.
8a.
8b.
8c
Unit 1-7
1.
Give an example of an application which uses Optical Character Recognition (OCR) and an
advantage of its use.
2a.
What is the maximum number of different characters which can be represented using a group of
eight bits?
Page 5 of 23
A certain computer is able to represent only the 26 upper case letter A to Z, the 26 lower case letter
a to z and the ten digits 0 to 9. What is the minimum number of bits required to represent this set
of characters?
If the computer were also able to represent a full stop, a comma and a question mark, how many
bits would be required for each character? Give a reason for your answer.
3.
A certain computer uses 21-bit words, each of which can be used to store three characters. What is
the maximum number of characters in the computers character set?
4a.
4b.
5a.
In ASCII C=code, the letter of the alphabet are stored using consecutive codes. If 1000010
represent B, what is the representation of G?
Give the binary value of 2310 + 11012.
5b.
7.
Explain briefly EACH of the following terms: bistable device, gigabyte, operating system,
barcode.
8a.
8b.
In a certain character coding system, each character occupies 7 bits and the letters of the alphabet
are assigned consecutive codes. If 1010001 represent M, whats the representation of H.
What is the value of X in the following equations? 5210 X2 = 111112.
9a.
9b.
9c.
9d.
10.
11a.
11b.
11c.
11d.
12a.
12b.
12c.
12d.
13a.
13b.
13c.
13d.
14a.
14b.
14c.
14d.
Unit 1-8
1.
State two functions performed by the operating system in a computer.
2.
Describe three different tasks that could be performed by a computer operating system.
Page 6 of 23
Operating systems perform some tasks which would otherwise need to be done by a computer
Operator and some which an operator would not.
(i)
Give three tasks performed by an operating system which could otherwise be performed
by the computer operator.
(ii)
Give one task performed by an operating system which would not otherwise be
performed.
4.
5.
Name two facilities you would expect to find in a computer based learning system.
Many operating systems use a tree structure for directories. Use a labeled diagram to describe a
typical structure, showing directories and subdirectories.
6.
7a.
7b.
Unit 1-9
1a.
Describe the facilities offered by commercial word processing systems.
1b.
Indicate how the use of word processors has changed the work carried out by typists and
secretaries.
1c.
Indicate the advantages, for management and the general public, of introducing word processors
into commercial organizations.
1d.
The introduction of computers and computerized equipment into large organizations is often
blamed for causing unemployment.
Give reasons why the introduction of computers sometimes causes unemployment.
1e.
Give reasons why, in other cases, the introduction of computers does not cause unemployment.
2a..
2b.
2c.
3.
Unit 1-10
1.
Describe two benefits of Graphical User Interfaces.
2.
What is the major interfacing device for: (i) a command language interface (ii) a GUI
3.
John receives computer hardware from a friend who lives in the United States of America, but the
Software was missing. He, therefore, decided to purchase the necessary software. In order for his
system to run he realized that he would have to purchase software to manage the resources of the
computer as well as software that could provide for his particular needs. For both types of
software he had a choice of two styles of interface; one which was command driven or the other
which provide screen listings with options from which the user could select appropriate functions.
Some software provides user interfaces which display small graphic images that can be selected
when the function they represented is required. Since John intended to use his computer in his
family business, he had a choice of acquiring software written especially for his business or
general-purpose software. He noted, however, that if he purchased general-purpose software, that
he would have to do some modification to allow it to meet his specific need.
State the proper technical terms for each of the SIX underlined passages.
4.
5.
State one difference between EACH of the following: command line interface and GUI.
Name the hardware component that allows users to move the cursor.
Page 7 of 23
There are now many dial-up information systems which can be accessed using a home computer,
together with a modem and communications software. As well as displaying information in viewdata
format, they contain programs which users can download, and many offer electronic mail.
Explain what is meant by each of the underlined terms.
4. Describe two ways a network manager could protect shared data and programs from corruption.
5. Explain why an office would install a star network rather than a linear network.
6a. What is electronic mail 6b. Give two advantages of electronic mail over normal post.
6.
Abacus College has a Local Area Network (LAN) which is used by its students. Students log on at a
workstation and use software such as wordprocessors and spreadsheets.
(a) Draw a labeled diagram of a LAN.
(b) Explain what the operating system of a LAN does when a user logs on and selects a spreadsheet
package.
(c) Explain how the operating system allows users to share a printer.
7a. Draw a labeled diagram showing a local area network (LAN) which can be connected to a wide area
network (WAN).
7b. Give one feature available on a WAN that is not available on a LAN.
7c. Define each of the following terms as it applies to data transmission: voice band, simplex, halfduplex.
7.
Each regional office of the Jamaican Food Crop Marketing Agency uses a system of hardware,
software and communications channels that connects hardware devices to provide its computing
services. Information is collected at the regional offices and at the end of the day it is transferred to a
mainframe computer at the head office in Kingston. At nights, this mainframe at head office collates
the information and transfers it to the regional offices. The communication system is complex since
each network at the regional office uses different rules establish to govern the way data is transmitted
in the particular network. Apart from providing up-to-date information to users through its regional
offices, the system allows users access to the information at their homes. However, to utilize this
facility users must subscribe to its special service which allows them to send and receive messages
to/from other users. The cost of this facility is affordable to the average home-user since the
subscription fee is small and the only other capital cost is the price of a device which convert digital
signals to analogue signals and vice versa.
State the proper technical terms for each of the four underlined phrases in the above passage.
8.
Page 8 of 23
Unit 2-1
1a.
Explain briefly the difference between an assembly language and a high level language.
1b.
As high level languages have developed, various facilities have been provided to make program
development easier and more efficient. Describe the facilities that are now available.
1c.
Some high level languages allow a number of data types to be used. By referring to appropriate
programming languages, describe the data types with which you are familiar.
2.
3.
4a.
4b.
Unit 2-2
1. Explain the difference between string data and numeric data.
Unit 2-3/4
1. Workers entering a building use cards which have the sum of their 9-digit personal identification
Numbers (PIN) stored on them. When a card holder passes a card through the card reader and keys in a
9-digit PIN, the following algorithm is used to check the validity of that PIN.
initialize count and total to zero
read the sum of the PIN digits
while the count is less than nine do
input a digit
total equals total plus digit
count equals count plus one
endwhile
if the total equals the sum allow access
else sound alarm
(a) Explain the output obtained for CARD ONE and CARD TWO when they are passed through the card
reader with the following PINs keyed in.
CARD ONE with 43 as the sum of its PIN digits and the PIN 283746553 is keyed in.
CARD TWO with 59 as the sum of its PIN digits and the PIN 987687891 is keyed in.
(b) Secrets areas require an 11-digit PIN. The sum of the first eight digits and the sum of the last three
Digits are stored on these cards. Modify and rewrite the algorithm to check a secret area PIN 8888
8888 888 which is keyed in after a card with 64 24 stored on it has been passed through the card
reader.
Page 9 of 23
(a)
(b)
(c)
(d)
I LIKE COMPUTER STUDIES SENT , Dry run the algorithm by completing this
Page 10 of 23
Word_count
Char_count
Word
Length
(b)
(c)
(d)
(e)
6.
Is word =
SENT?
Output
For each of the following sets of data write down the output.
(a)
John Williams, 80, 85 (b) Mary Brown, 45, 60 (c) Ian Ford, 40, 39
7a.
7b.
7c.
Give three items which should be included in the technical documentation of a program, but not in
the user documentation.
Give one reason why technical documentation is necessary.
Give two items of user documentation other than the name of the program.
Page 11 of 23
8a.
Using a trace table, dry run the following algorithm. Show the output at each stage.
Set the count equal to zero
Set the number equal to negative one
Set the total equal to zero
Repeat
Count equals the count plus one
Number equals the number plus two
Total equals the total plus number
Print the total
Until the count equals four
Count
0
(b)
(c)
9.
10.
11.
12
13
14
Number
-1
Total
0
Output
What is the output if the loop terminates when the count equals 5?
Change the algorithm so that it uses a WhileDoEndwhile structure instead of a RepeatUntil
structure.
Write a pseudocode algorithm to read a positive integer N followed by N integers. For these N integer,
the algorithm must count and print the number of zero and non-zero values.
Write a pseudocode algorithm to print a conversion table from miles to kilometers. The table ranges
from 5 to 100 miles in steps of 5 (1 mile = 1.61 kilometers).
Write a pseudocode algorithm to read a set of positive integers (terminated by 0) and print their
average as well as the largest of the set.
Write an algorithm to interchange the values in 2 variables A & B
Write an algorithm to read the names and ages of 10 people and print the name of the oldest person.
Assume that that there are no persons of the same age. Data is supplied in the following form: name,
age, name, age etc.
Write an algorithm to read an integer value for SCORE and print the appropriate grade based on the
following:
SCORE
GRADE
80 or more
A
less than 80 but
65 or more
less than 50
15 Write a pseudocode to read in three numbers and print the highest and lowest number.
Page 12 of 23
Write a structured algorithm to prompt the user to input two values which are then stored in A and
B. The algorithm must divide A by B and print the result. The algorithm must keep prompting for
the second number as long as the user enters 0 (zero) for the second number
26a.
Write a structured algorithm which prompts a user to enter an integer value which is then stored in
a variable N. The algorithm must then print each integer from 1 to N and its corresponding square.
Each output line must show the integer and its square. You may assume that the user wold enter an
integer value.
26b.
Modify the algorithm in (I) to determine the sum of all the squares. Print this sum if it is less than
or equal to 1000. Otherwise, print the following message:
THE SUM IS GREATER THAN OE THOUSAND
Page 13 of 23
2.
3.
M
1
Z
8
Complete the following trace table for the following algorithm, given that the number 4 is the input value X
Read X
For M = 1 to X do
Y=XM
Z = 5 *Y M
End
Print Z
(b)What is printed by the algorithm?
4.
Page 14 of 23
Copy and complete the trace table below for the following algorithm.
X=5
K = 10
SUM = 45
While SUM < 75 do
SUM = SUM + K
Print K
K=K+X
Endwhile
Print SUM
X
5
K
10
SUM
55
20
5
(c) What is printed by the algorithm.
6.
DIFFERENCE = 0
Input A,B
If A <=B Then
DIFFERENCE = A B
Else
DIFFERENCE = B A
Endif
Print DIFFERENCE
What is printed by the algorithm above if the input values are the following?
(i) 20 30
(ii) 100 100
(iii) 50 10
Unit 2-6
1.
Programs are written with the general purpose of solving problems. However, it is unlikely that a
program will run completely error-free on the first attempt. The process whereby a program is
checked to ensure that it does what it was designed for is important in the development of the
program. There are two main type of errors that can occur; one type of error occurs when the
programmer fails to properly think through the solution to the problem, and the other occurs when
the programmer does not adequately know the rules of the programming language. It is good
practice to perform a manual trace on the program, using appropriately selected input values,
which checks each segment of the program.
State the proper technical term for EACH of the underlined phrases labeled A to E.
Unit 2-7
1.
Explain the relationship between a compiler, a source program and an object program.
Unit 3-1
1.
Many cities have computer controlled traffic lights.
(a)
State two events which may have caused a sudden change in the flow of traffic.
(b)
How are details of traffic flow collected?
(c)
How can the computer to control the flow of traffic?
2.
Give one application for which the use of multimedia computer ( a computer with a
CD-ROM, sound and powerful video capabilities).
3.
Give three features of a camera that contains a microprocessor which makes it different to the one
That does not.
Page 15 of 23
Describe two features of a desktop publishing package that make it more suitable than a
word-processing package for producing a school newspaper.
Explain how a scanner could help.
A bank introduces banking by telephone and machines that allow customers to withdraw cash
outside the bank.
Give one advantage for bank workers.
Give two disadvantages for bank customers.
7.
For each of the devices below, describe a computer application which uses the device. In each case
Give an example of data which might be collected by the device and indicate the processing which
might be carried out. (i) Bar-code reader (ii) temperature sensor (iii) on-line enquiry terminal.
8.
A seven segment display is used is used to indicate which floor a lift is on. Each segment is
numbered as shown.
A byte is used t hold the data needed to light the correct segments. Bit 0 is always zero. For
example, 3 is represented by
and by
7
1
0
0
(a) If the lift is to stop at more than one floor, the data is held in successive bytes. The contents of the two
successive bytes are
First byte
Second byte
1
1
1
1
1
0
1
1
1
1
0
0
0
1
0
0
An order processing system holds details of stock items in one file and suppliers in another. Each
Stock record consists of a
4 character item code, 12 character description of the item, 4-digit number giving the number in
stock, 4 digit number giving the reorder level, 2-character code for the supplier in that order.
(a)
Show how the data for French Fries is stored if they are supplied by Packaged Foods Ltd. Whose
code is PF and there are 1250 in stock. The code for French Fries is FF37 and the reorder level is
500.
Page 16 of 23
State two validation checks that could be used on the number in stock.
Each item code can be read by an optical character reader. Explain what the order processing
system should do with the stock file each time an item is sold.
State the type of access needed
Once a day the order processing system checks its stock levels and , if necessary, prints orders for
suppliers. Explain how the system does this.
(d)
(e)
10.
(a)
(b)
A school uses data-logging to collect data about temperature, pressure, wind speed and direction.
Describe the hardware and software needed to collect and display the data.
How can this data be used to predict the next days weather?
11.(a)
(d)
A large store wishes to simulate the queues and servicing of customers so that it can decide
whether or not to employ extra staff. Describe the input, processing and output of this simulation.
Give two reasons for using simulations.
12
(a)
(b)
13 A group of shops is supplied from a central warehouse. Each shop sends a regular list of stock
requirements to the warehouse. Staff at the warehouse order goods from a number of different
suppliers. Goods are then dispatched from the warehouse to the individual shops.
Describe how a computer might be used at the central warehouse. Your answer should refer to input,
output, processing, hardware and use of files.
14a. Identify any TWO jobs industries and, for EACH, state how the use of the computer has resulted in
either a change of procedures for TWO jobs or made jobs obsolete.
14b.Name FOUR jobs that have been created by the computer industry.
14c. What is a videotext system?
14d.Describe TWO distinct uses of videotext systems.
14e. Name TWO distinct effects that videotext systems can have on the traditional Post Office.
15a. State THREE functions that are likely to be computerized when the Board of Directors of a private
hospital installs computers at the hospital.
15b.A local bank with several branches have decided to computerize its operations.
(i)
State TWO new job positions that would be created in the bank.
(ii)
State One additional service that the bank would now be able to provide
Unit 3-2
1.
Two concepts of structured programming are top down design (using modules) and stepwise
refinement of a module.
(a)
Give two reasons why top-down design may help a programmer to write error free programs.
(b)
What is meant by stepwise refinement.
Unit 3-3
1.
Plants grow in boxes containing soil which must always be damp. How could a computer system
help to keep the soil damp? Explain the purpose of each item of hardware you mention.
2.
Describe how CD-ROMs can help pupils in their studies.
3.
CD-ROMs are used extensively in the filed of education. State THREE features of educational
software on CD-ROMs that make them useful for educational purposes.
Page 17 of 23
6b.
The company is to introduce a new system in which payments are transferred electronically from
customers bank accounts.
(i)
Discuss the advantaged and disadvantages of the new system for the company and for the
customers.
(ii)
Outline the main stages in the new system.
7.
8a.
8b.
Many countries have data protection legislation. Recommend three rules for the legislation.
Give examples of computer crime.
Explain how companies can help protect themselves against computer crime.
8.
Describe typical hardware configurations which would be needed for the systems indicated below.
For each give an indication of the tasks which the system could be expected to perform.
A process control system, for two liquids being mixed together in a heated container, the
temperature and the rates of supply of the liquids must be kept under control.
A Word Processing system.
An airline booking system.
8a.
8b.
8c.
9a.
9b.
9c.
10a.
10b.
11.
12a.
12b.
12c.
12d.
Page 18 of 23
In order to secure its data, a company uses the following method for encryption text:
A letter is replaced by the letter five letters later in alphabetical order. For example, the letter A
is replaced by F, B is replaced by G and so on. Note that the letter A is considered to
follow Z.
(i)
What would the word ESSAY be stored as?
(ii)
What is the meaning of the following text? N LTY NY
(iii)
What is the purpose of a password?
(iv)
What is meant by the term archiving?
(v)
Within many organizations, data on personnel are stored in a central location from which
various departments can access relevant information. State THREE problems that may
arise because of the sharing of this type of data.
Unit 3-5
1.
State one reason why copying a program is considered to be morally wrong.
2.
Refer to Question 12a (3-4)
Unit 3-6
1.
A company wants its sales people to be able to use portable computers in their cars.
(a)
Suggest two ways that the sales people can use their portable computers to send orders to head
office.
(b)
Describe two problems that could occur with this system.
(c)
Describe the possible social effects on the sales people using such a system.
2.
Name three peripheral devices which are used in Computer Aided Manufacturing but which are
not commonly used in an office..
3.
The Statistic Department holds confidential information on the citizen of a country. Since its
databases are online and are connected to the telephone company via a modem, any person with a
computer and a modem can potentially access from the databases. Outdated data are usually stored
at other locations.
(a)
State one method which can be used to prevent unauthorized users from accessing data stored in
the databases.
State two methods which can be used to prevent users from accessing data from files to which
they do not have access.
State one potential danger that may exist when legitimate users within the Statistic Department
import data into the departments computer.
State two strategies to protect the archived data into the departments computer.
(b)
(c)
(d)
Unit 3-7
1.
A Car Manufacturer manufactures robots. Describe one advantage and one disadvantage to the
manufacturer.
2.
Give two uses of Expert Systems.
3.
Below is shown part of a database containing details of students examination results. The sex of
each student has been coded as M for male and F for female.
Surname
Initials
Student ID
Sex
Maths
Science
PATEL
L
951324
M
56
64
GREGORY
E
952853
M
47
43
FOSTER
W
953216
F
76
67
KIRKLAND
J
954286
M
34
45
PATEL
D
956385
F
78
45
COLLINS
D
956284
F
87
68
WITCOMBE
L
952952
M
45
57
Page 19 of 23
4.
(a)
(b)
(c)
some computer systems are designed for medical diagnosis. When details of a patients symptoms
are entered, the system suggests possible cause of the illness. The medical knowledge contained
in the system is provided by doctors. Such systems are examples of Expert Systems.
Suggests two benefits which are offered by the use of the medical expert systems.
Why might some people be worried about the use of computers in this application?
Give another application for an expert system..
5a.
5b.
6a.
Give one way, other than unemployment, that the introduction of computers has affected those
who make cartoon films.
Explain how an artist, without the aid of a computer, would create a film to show the stick man
walking across the screen and sitting on the chair.
6b.
6c.
Explain how a computer could be used to create a film to show the stick man walking across the
screen and sitting on the chair.
7a.
7b.
7c.
8.
The increase in the level of computerization in offices, together with the decrease in the cost and
the availability of data communication services have created new ways of conducting business.
Some employees now have an opportunity to perform their work from home a process known as
telecommuting.
State two items of hardware that an employee must have when she is telecommuting.
State one advantage to the employee of telecommuting.
State one disadvantage to the employee of telecommuting.
(a)
(b)
(c)
9.
The owner of a large department store in the city center is planning to offer telemarketing services
to the general public. Currently, his retailing business customers are encouraged to browse the
store. They are normally offered assistance by the sales clerk. If a customer is satisfied with a
particular item, he/she takes it to the cashier where the customer must pay in cash. After the
transaction is completed, the customer must take away the items purchased.
(a)
(b)
State two additional services that the owner should offer so that he could introduce telemarketing.
State one change that the owner must make in the operation of his business so that he could
introduce telemarketing.
State one reason why a customer might still choose to visit the store to make a purchase even
though the customer might have to travel a long distance to get to the store.
(c)
Page 20 of 23
Telephones can obtain microelectronic components which allow more operations than just calling
a number. For example some have a last number recall using a single key press rather than reentering all the digits.
Describe one similar feature which microelectronic technology makes possible in telephones.
A sequential access file is corrupted. Describe how the file can be retrieved.
4.
(a)
(b)
5.
(a)
(b)
4a.
4b.
Describe how analog-to-digital converters are used in the monitoring of a patients heart beat.
If digital-to-analogue converters are added to the system, what improvements could be made to the
patient monitoring system? Include a comment on feedback.
5
14.
7a.
7b.
7c.
State two ways in which a computer can be used by a teacher in his/her job.
List four ways in which medical personnel may use information technology in their jobs.
State THREE ways in which a journalist would use a computer in his or her job.
State two ways in which a journalist would use a computer I his or her job.
A large company has decided to computerize the functions of its Human Resource (Personnel)
department. The Computer Department has been given the responsibility for completing this task.
Name four categories of personnel from the Computer Department that the Computer Department
Manager must assign to the task, stating clearly one function of each category.
8.
9a.
9b.
9c.
For each of the following, state TWO ways in which Information Technology can assist employees in
the performance of their jobs:
(i) law enforcement (ii)
medicine
(iii)
entertainment
List three ways in which a teacher can use computers in the classroom.
Suggest two reasons why computers may not be used in the classroom.
State two advantages of using computers in the classroom.
Unit 3-9
1a.
List three features which a user would find helpful in a computer aided design (CAD) package
when designing parts of a motor car.
1b.
Give input devices which are suitable for CAD.
1c.
Give two advantages of a CAD/CAM (Computer Aided Design/Computer Aided Manufacture)
system compared to a system which does not use computers.
3.
(a)
(b)
In an office, workers produce letters and invoices using typewriters and keep accounts using
calculators. They also use card files to keep details of customers and products. Managers has
decided to introduce computers to help to do this work.
State the kinds of software you recommend for
(i) the production of letters
(ii) keeping customer and product information.
Explain how the software would help to
(i)
produce a letter to all customers informing them of a new product
(ii)
answer a customers enquiry about the availability of a given product.
Page 21 of 23
Electronic funds transfer (EFT) is used to transfer the wages from the companys bank to a
workers bank. Give one advantage to the company and one disadvantage for the worker of the use
of EFT.
How can programs be run at the same time on one computer.
6.
7.
8.
(iii)
database administrator
What is the difference between the role of an applications programmer and that of a systems
programmer in an organization.
Page 22 of 23
Page 23 of 23