Sei sulla pagina 1di 32

Information Technology Theory (1994)

1. Describe TWO functions of EACH of the following components of a computer. (i) Control Unit (iii) Main Memory 2. (ii) Arithmetic/Logic Unit

State ONE advantage and ONE disadvantage of the first items over the second items in EACH Of the following pairs: (a) (b) (c) (d) (i) (i) (i) (i) Character printer Microfilm output Magnetic Tape Optical disk (ii) (ii) (ii) (ii) Line printer Printed output Magnetic hard disk Magnetic hard disk

3.

(a)

Explain briefly EACH of the following terms: (i) (Iii) Bitable device Operating system (ii) (IV) Gigabyte Bar code

(b)

(i) (ii) (iii)

What is an expert system Name ONE area in which expert systems are used Give ONE advantage and ONE disadvantage of using an expert system In the area named at (ii) above

4.

Each regional office of the Jamaica Food Crop Marketing Agency uses a system of hardware, Software and communication channels that connects hardware devices to provide its computing services. Information is collected at the regional offices and at the end of the day it is transferred to a main-frame computer at the head office in Kingston. At nights, this main-frame at head office collates the information and transfers it to the regional offices. The communication system is complex since each network at the regional offices uses different rules establish to govern the way data is transmitted in the particular network. Apart from providing up-to-date information to users through its regional offices, the system allows users access to the information at their own homes. However, to utilize this facility user must subscribe to its special service which allows them to send and receive massages to/from other users. The cost of this facility is affordable to the average home-users since subscription fee is small and the only other capital cost is the prices of a device which converts digital signals into analogue signals and vice versa. State the proper technical terms for EACH of the FOUR underline phrases in the above passage.

5.

A.

Describe TWO jobs of EACH of the following: (i) (ii) (iv) System Analyst Computer Operator Database Administrator

b. c. 6. a.

State TWO ways in which a computer can be used by a teacher in his/her job. State TWO ways in which the computer is beneficial to banking industry. For EACH of OMR, OCR and MICR, give an application in which that technology is frequently used.

b.

Data security refers to the protection of data from destruction or corruption. State THREE measures which can be employed to ensure data security In a certain character coding system, each character occupies 7 bits and the letters of the Alphabet is assigned consecutive codes. If M is represented by 1010001, what it is representation of H? What is the value of X in the following equations? 5210 X2 = 111112

7.

a.

b.

8.

a. b.

What is the purpose of formatting or initializing a diskette? What is major interfacing device for (i) (ii) a command language interface? A graphical user interface

c. 9. a. b.

Explain briefly ONE distinguishing feature of EACH interface mentioned in part ii Write an algorithm to interchange the values in 2 variable A & B Write an algorithm to read the names and ages of 10 people and print the name of the oldest person. Assume that there is no person of the same age. Data is supplied in the following form: name, age, name, age etc. Write an algorithm to read an integer value for SCORE and print the appropriate grade based on the following: SCORE 80 or more Less than 80 but 65 or more Less than 65 but 50 or more Less than 50 GRADE A B C F

10.

a.

b.

What is printed by the following algorithm when n =5? If (n = 1) or (n = 2) then h=1 Else f=1 g=1 For j = 1 to n 2 do h=f+g

f=g g=h Print h End for End if Print f, g Stop

Information Technology Theory (1994)


1. (i) The control unit does any of the following: Reads and interpret program instruction Directs the operation of the internal processor component Controls the flow of programs and data in and out of primary memory Controls the flow of information to and from I/O devices. (ii) The Arithmetic Logic Unit: Performs all arithmetic operations Performs logical operations Stores the data which can be immediately processed by the program Instructions. (iii) The Main Memory: Stores programs instructions prior to execution Stores the data which can be immediately processed by the program instructions Store information temporarily after processing is complete. 2. a. printer printer b. Advantage Microfilm output can store much more information in a small space than printed output. Microfilm is more expensive than Microfilm needs special equipment to read the Information. c. Advantage Magnetic tape is cheaper than magnetic hard disk Magnetic tape has a larger capacity than magnetic hard disk slower access to data/records Records cannot be accessed directly Records cannot be updated in place Advantage Character printer is cheaper than a line Character printer is slower than a line

Disadvantage

Disadvantage printed output

Disadvantage

d. magnetic

Advantage

Optical disk has a larger capacity than hard disk Optical disk can retain data longer than magnetic hard disk Optical disk is read only therefore

information Disadvantage than magnetic hard disk Optical disk is read only 3. a. (i) (ii) (iii) (iv) Bistable device exists in one of two possible state Gigabyte is 1,000,000,000 bytes or 109 bytes Operating system is a set of programs used for controlling the operations of a computer system Bar Code is a series of parallel light and dark lines representing a code place on a product for identifying that product. An expert system is a program that reproduces the and thought processes of human experts in certain well defined (ii) fields. areas of application-any ONE of the following: (iii) medicine diagnosis of infections blood diseases prescription of medicine geology: search for mineral deposits chemistry: identifying molecular structure of compounds does not display biased judgements does not jump to conclusions face of contrary evidence systematically considers all possible alternatives not good at judgement requiring common sense cannot adapted easily to new rules and concepts cannot reason across disciplines Protocol (IV) Modem cannot be tampered with Optical disk is slower, more expenses

b. knowledge

(i)

Advantages Disadvantages -

4.

(i) (iii)

Local Area Network (ii) Bulletin Board or Electronic Mail

5.

a.

(i)

A system Analyst does any of the following: Perform feasibility studies Derive information system requirements/specifications Design information systems Perform system reviews

(ii)

A Computer Operator does any of the following: Prepare equipments to run jobs Mount and remove tapes, disks, and diskettes Monitor operations during the running of job

(iii)

A Database Administrator does any of the following: Design a database Create a database Maintain a database Coordinate discussion between user groups

b.

A teacher can use the computer to do any of the following: (i) (ii) (iii) (iv) (v) To develop courseware to store students records to use Computer Aided Instruction software to teach students to use the computer to mark scripts

c.

The computer is beneficial to the banking industry: (i) (ii) (iii) (iv) to provide management with useful information for running the bank to keep records of transactions by customers to provide electronic funds transfer to provide automated teller services reading of answers to multiple-choice question. converts a printed document to machine-readable so that it could be edited on a computer used by banks for reading information on cheques

6. form

a.

OMR OCR MICR -

b.

To ensure data security one may:

(i) (ii) (iii) (iv) (v) 7. a. H M H

use fire-proof cabinets are storing tapes and disks perform backup and recovery procedures properly implement a password system to prevent unauthorized access use anti-virus software use software features to restrict access to certain records = = = M 5 {H is 5 consecutive spaces to the left of M} 1010001 = 81 {decimal value} 81 5 = 76 1001100{binary = = 111112 = = 21 = 31{decimal

value} b. value} 5210-x2

X2 10101{binary} 8. a. of the specific addresses, b. command (i) (ii)

52 - 31

One format a diskette to place electronic marks on the surface diskette so that data can be written to and read from their

The keyboard is the major interfacing device for a language interface The mouse is the major interfacing device for a graphical user Interface

c.

Using a command language interface (CLI), the user points (or icon) of a data file or programs or a selection from a menu and activates the program or selection by clicking the pointing devices (usually mouse) 9. a. C=A A=B B=C OLDAGE = 0 For j = 1-10 Read NAME, AGE If AGE > OLDAGE then OLDAGE = AGE OLDPERSON = NAME

b.

EndIf End for Print The oldest person is, OLDPERSON 10. a. Read SCORE If SCORE>= 80 then Print A Else if SCORE>65 then Print B Else if SCORE>=50 then Print C Else Print F EndIf b. The following is printed by the algorithm when n = 5: 2 3 5 3

Information Technology (1995)


1. (a) (b) (c) (d) 2. 3. List TWO benefits of Computer Aided Design and Draughting. Name THREE peripheral devices which are used in Computer Aided Manufacturing but Which are not commonly used in an office. State a measure which can be adopted to minimize data and/or program corruption or loss In the event of a hard disk failure. What is software piracy?

Draw a labeled diagram showing the main components of a computer system, indicating clearly The direction in which data flow. (a) (b) (c) (d) Convert the decimal number 55 to its binary equivalent. Convert the binary number 1011010 to its decimal equivalent. Add the binary numbers 11010 and 10011 The ASCII code for the letter H has a decimal equivalent of 72. What is the ASCII code for the letter P.

4.

When a program makes a read request to the hard disk, the device which reads data from the disk is moved along a radius to the particular concentric circle on which the data is stored. When the relevant part of the concentric circle of the disk arrives under the device which reads the data, the data is read and stored in a special area of memory from which it could be accessed. State the proper technical terms for EACH of the FOUR underline phrase in the passage above.

5.

(a) (b) (a) (b)

Identify FOUR measures to secure data. State TWO advantages and TWO disadvantages of normal mail over electronic mail. List FOUR ways in which medical personnel may use information technology in there Jobs. State TWO job functions of EACH of the following computer personnel: (i) Network manager (ii) Database administrator

6.

7.

(a)

John receive computer hardware from a friend who lives in the United States of America, but the software was missing. He therefore decided to purchase the necessary software. In order for his system to run he realized that he would have to purchase software to manage the resources of the computer as well as software which could provide for his particular needs. For both types of software he had a choice of two styles of interface; one which was command driven or the other which provide screen listing with options from which the user could select appropriate functions. Some software provides user interfaces which display small graphic images that can be selected when the function they represented is required. Since John intended to use the computer in his family business, he had a choice of software. He noted, however, that if he purchased general-purpose software, that he would have to do some modification to allow it to meet his specific need.

State the proper technical terms for EACH of the SIX underlined passages.

(b) 8.

State TWO functions of an operating system.

What is printed by the following algorithm? SUM = 0 N = 20 WHILE N < 30 DO SUM = SUM + N PRINT N, SUM N=N+3 ENDWHILE

9.

(a)

Define the following: (i) (ii) (iii) Source code Object code Compiler

(b)

Draw a labeled diagram to illustrate the relationship between source code, object code And compiler.

(c)
10.

Write a pseudocode algorithm to read in THREE numbers and print the highest and lowest number.

The following data represents some sample score obtained by students in a test: 5 999 999 is the dummy value which terminates the data. Write pseuodocode algorithm to read any data in the above format, and print the number of students scoring 0 and the number scoring 10. 4 7 10 0 6 0 1 0 9 8

Information Technology Theory(1995)


1. (a) Computer Aided Design And Draughting Provides: (i) Improve accuracy and legibility of engineering drawing (ii) Ease of making alterations to designs leading to increased productivity (iii) Decrease time for developing blue prints (iv) Increased detail (v) Simulation/cost estimation facilities (I) Sensors (ii) Robots (iii) Guided Pallsest

(b) (c)

Copy files unto backup devices on a regular basis and in the event of a hard disk failure Failure recouvery is accomplished by replacing the damage and lost files on the hard disk By the last copy of the files from the back-up device. Software piracy is the illegal copying of programs CPU Output Device

(d) 2. Input Device

Backing Storage

3.

(a)

2 2 2 2 2 2 2

55 27 13 6 3 1 0

1 1 1 0 1 1 5510 = 1101112

(b) 1 0 26 25 1 24 1 23 0 1 22 21 0 20

1011010 = 26 + 25 + 24 + 23 + 22+ 21 = 90 (c) 11010 10011 101101 P = 72 + 8 = 80 = 1010000 {Binary Equivalent} (I) a. read/write head (ii) track (iii) Sector (iv) Buffer

(d) 4. 5.

One Can Secure data by:

(i) Encryption b. Adv:

(ii) Virus Protection (I) (ii)

(iii) Passwords Physical access Restriction

Parcel Can be sent Sent to more people (people without computer) Mail Could be lost Mail takes a longer time

Disadv (I) 6. (a)

Medical Personnel May use information technology for: (i) (iii) Storing Patient Records Health education (ii) (iv) Expert System Monitoring patients

b)

(I)

A Network Manager Does Any Of The Following: Starts up and shuts down the network Grants access and privilages Monitors use of the network and other shareable resources Liaise with other network managers re. Connectivity.

(ii)

A Database Administrator Does: Grants Access to data Makes modification to database structure

7.

(a)

(I) (iii) (v)

System Software (ii) Menus (iv) Custom Written (vi)

Application Software Icons Customization

(b)

Two functions of an operating system are: (I) Input/output Control SUM 20 43 69 98 Source code is program written in a programming language Object code machine language, program produce by a computer A compiler is a computer program which converts a program written in a high level programming language to machine code. (ii) File and disk management

8.

N 20 23 26 29 (a) (i) (ii) (iii)

9.

(b) SOURCE CODE COMPILER OBJECT CODE

(c)

read A, B, C if A > B then LARGEST = A SMALLEST = B Else LARGEST = B SMALLEST = A EndIf If C > LARGEST then LARGEST = C If C > SMALLEST then SMALLEST = C Print LARGEST Print SMALLEST

10.

ZEROCOUNT = 0 TENCOUNT = 0 Input NUMBER While NUMBER not equal 999 do If NUMBER = 0 then ZEROCOUNT + 1 If NUMBER = 10 then TENCOUNT + 1 Read NUMBER ENDWHILE Print NUMBER OF STUDENTS SCORING 0, ZEROCOUNT Print NUMBER OF STUDENTS SCORING 10, TENCOUNT

Information Technology (1996)


1. State ONE difference between EACH of the following. (a) (b) (c) (d) (e) 2. (a) (b) (c) (d) 3. Command-line interface and graphical user interface Impact printers and non-impact printers Character printers and line printers General purpose software package and specialized software package Simplex and Duplex transmission Convert the decimal number 5710 to a binary number. Convert the binary number 110111012 to a decimal number Explain the term parity, as it relates to the coding of characters. Add the binary numbers 1101012 and 1011102

Name the hardware component that performs EACH of the following functions: (a) (b) (c) (d) (e) (f) (g) Store programs and data that are not currently being used by the CPU Performs the logical operations within the CPU Stores programs and data that are not currently being used by the CPU Modulates and demodulates signals Reads from disks Directs internal operations within the CPU Allows users to move cursor

4.

The Statistic Department holds confidential information on the citizen of a country. Since its database are online and are connected to the telephone company via a modem, Any person with a computer and a modem can potentially access from the databases. Outdated data are usually stored at other locations. (a) (b) (c) (d) State ONE method which can be used to prevent unauthorized user from accessing Data stored in the databases State TWO methods which can be used to prevent users from accessing data from files To which they do not have access. State ONE potential danger that may exist when legitimates user within the Statistic Department import data into the departments computer. State TWO strategies to protect the archiving data from physical damage.]

5.

(a)

The increase in the level of computerization in offices, together with the decrease in the cost and the availability of data communication services have created new ways of conducting business. Some employees now have an opportunity to perform their work from home a process know as telecommuting (i) State TWO items of hardware that an employee must have if he/she is telecommuting. (ii) State ONE advantage to the employee of telecommuting

ii (iii) State ONE disadvantage to the employee of telecommuting. (b) The owner of a large department store in the city center is planning to offer telemarketing Service to the general public. Currently, his retailing business customers are encouraged To browse in the store. They are normally offered assistance by the sales clerk. If a customer Is satisfied with a particular item, he/she takes the item to the cashier where the customer must pay in cash. After the transaction is completed, the customer must take away the item(s) Purchased.

(i) State TWO additional services that the owner should offer so that he could introduce Telemarketing. (ii) State ONE change that the owner must take in the operation of his business so that he could Introduce telemarketing.

(iii) State ONE reason why a customer might still choose to visit the store to make a purchase even though the customer might have to travel a long distance to get to the store. 6. (a) (b) State THREE functions that are likely to be computerized when the Board of Directors of a private hospital installs computer at the hospital. A local bank with several branches has decided to computerize its operations. (i) State TWO new job positions that would be created in the bank. (ii) 7. (a) State ONE additional service that the bank would now be able to provide.

The Computer Science teacher in a secondary school is attempting to convince the Chemistry teacher to use Computer Aided Learning (CAL) software in the teaching of Chemistry. (i) State TWO benefits that the computer science teacher could cite to convince the Chemistry teacher

(ii) State TWO obstacles that would prevent the Chemistry teacher from using the computer in teaching. 8. (a) Copy the following trace table in your answer booklet. X 4 4 4 4 M 1 Y Z 8

Complete the following trace table for the following algorithm, given that the number 4 are the input value X. Read X For M = 1 to X do Y = X-M Z + 5*Y-M End Print Z (b) 9. What is printed by the algorithm?

(a) Write an algorithm, which promotes the user to enter the price of an item and which calculates and prints the new price after a discount of 12%. (b) Write an algorithm to read in TWO numbers into A and B. The algorithm should store The smaller in A and the larger in B, and print A and B.

10. Write an algorithm to read ELEVEN numbers, find their average and print it. The algorithm should also print the number of times the number 6 occurs in the data. For example, given the input data: 8 4 6 9 6 5 6 10 7 0 16

The algorithm should print 7 as the average and 3 as the number of times 6 occur.

Information Technology Theory (1996)


1. a. b. i. i. ii. c. d. e. 2 A. 2 2 2 2 2 2 57 28 14 7 3 1 0 1 0 0 1 1 1 i. ii. i. i. interfacing device for command-line driven interface is the keyboard While that for graphical user interface is the mouse. Impact printers can produce multiple carbon copies of a document while Non-impact cannot. Impact printers are noisier than non-impact printers Line printers are faster than character printer Line printers are more expensive than character printers General purpose software packages can be used to perform a wide Variety of tasks while specialized software packages cannot. Duplex transmits data in both directions Simplex transmit data in one direction only.

5710 = 1110012 b. 1 1 0 1 1 1 0 21 1 20

27 26 25 24 23 22 7 6 4 3 2 0 110111012 = 2 + 2 + 2 + 2 + 2 + 2 = 22110

c.

Parity is used as a checking system or dummy value within the coding of Character. It is used to detect whether the transmission or coding of data is complete or accurate. 110101 + 101110 11000112

d.

3.

a. b. c. d. e. f. g. a. b. c. d.

RAM (Random Access Memory) ALU (Arithmetic Logic Unit) Secondary Storage (eg. Diskettes, magnetic tape, etc) MODEM Read/Write Head CU (Control Unit) Input Device (keyboard, mouse, etc.) Password protection Password protection Data encryption Virus infection Store archived data in fireproof cabinets Store backup copies of archive data Store archive data away from the element (wind, rain, etc) i. Modem Telephone Fax machine * * Reduction in travel expenses/fuel consumption Working men and women would be able to spend more time with their families.

4.

5.

a.

ii.

iii headquarters b. i. ii. iii.

The worker might miss out on promotion opportunities at central Home delivery of items purchased. Subscription of magazines advertising products to customer Use of electronic fund transfer instead of cash payment for goods bought To examine products being bought

6.

a.

i. ii. iii. iv. v.

Record-keeping, payroll, billing, and ordering of drugs and supplies Automating the recording of patients history Monitoring critically ill patients in surgery and intensive care unit Recording and analyzing the result of health screening examination to help detect diseases that might otherwise go unnoticed. Recording and interpreting the result of electrocardiograms (ECG S) Progrsammers. Database administrator.

b. c. 7. a.

i. ii.

EFT (Electronic Fund Transfer) ATM (Automated Teller Machines) i. * ii. * Computer could be used to simulate experiments eliminating the use of dangerous chemicals Slow students could learn at their own pace Teacher not computer literate Large class size Cost of computer hardware and software

8.

a. X 4 4 4 4 M 1 2 3 4 Y 3 2 1 0 Z 14 8 2 -4

b.

-4

9.

a.

Input A Input B C=B If A>B B=A A=C EndIf Print A, B

10.

SUM = 0 SIXCOUNT = 0 For COUNT = 1 TO 11 do Input NUMBER SUM = SUM + NUMBER If NUMBER = 6 SIXCOUNT = SIXCOUNT + 1 EndIf

End If AVERAGE = SUM divide by 11 Print AVERAGE, SIXCOUNT

Information Technology Theory (1997)

1.

(a) (b) (c)

Name a type of device, which produces a readable copy. Name a type of device, which produces a machine-readable copy. Name a type of device that accepts data in human readable form.

2.

The wide variety of input devices and media is a major factor which adds to the flexibility and versatility of computer systems. The use of a (i) device which allows users to move around images on the monitor by the shifting of a level on the device have made computer games very popular. In supermarkets, there are (ii) devices which allow a cashier to key in data on sales and this data is automatically transmitted to a computer for processing. There are also (iii) devices that are capable of reading pencil marks on an examination script thereby allowing the test to be stored automatically. The use of (iv) the use of (iv) devices to read in images allows pictures and logos to be incorporated in a document. State the technical names for EACH of the devices numbered (i) (iv) in the passage above. Please use the numbering indicated in the passage to identify your answers.

3.

(a) (b) (c) (d)

Convert the decimal number 83 to its binary equivalent. Convert the binary number 11001101 to its decimal equivalent. Add the two binary number 1101 and 100101. Explain the difference between discrete and continuous data. State THREE ways in which a teacher would use a computer in his or her job. State TWO ways in which a journalist would use a computer in his or her job. A large company has decided to computerize the functions of its Human Resources (Personnel) department. The Computer Department has been given the responsibility for completing this task. Name FOUR categories of personnel from the Computer Department that the Computer Department Manager must assign to the task, stating clearly ONE function for EACH Category.

4.

(a) (b) (c)

5.

(a) (b) (c) (d)

Describe briefly an application in which a robot(or robotic arm) is used in industry, stating clearly ONE function that the robot performs State TWO advantages of using the robot(robotic arm) over using a manual method in the application described in part (a) above. State ONE advantage to a customer of telemarketing. State ONE disadvantage to a customer of Telemarketing.

(e) 6. (a) (b)

State ONE advantage and ONE disadvantage of teleconferencing. State ONE reason why copying a program is considered to be morally wrong. Within a large company, data on each employee is stored in a central location. One file store The data on all employees. The data stored on a employee include his or her name, address, next of kin, salary range, etc. This data is shared by several departments and an employees record can be viewed and modified by many employees from several departments. State TWO problems which would arise from the sharing of the data in the company.

(c) (d) (e) 7. (a) (b)

What is data encryption? State TWO methods, other than data encryption, used to secure data. Explain the difference between the role of an applications programmer and that of a systems programmer in an organization. What is meant by the term protocol? Explain the difference between the following terms: (i) (ii) (iii) (iv) Up-load and down-load Half-duplex and duplex Local area network and wide area network Electronic mail and bulleting board

8.

What is printed by the following algorithm? COUNT = 1 X=2 WHILE COUNT < 26 DO X=X+2 PRINT COUNT, X COUNT = COUNT + 5 ENDWHILE

9.

(a) (b) (c)

Explain the difference between a high level programming language and a machine level language. Explain the difference between an interpreter and a compiler. Write a pseudocode algorithm to read two numbers and print the lower value.

10.

The following data represents some sample data of the number of children in several families: 1 3 5 0 4 6 7 3 5 2 4 0 2 999 999 is the dummy value which terminates the data. Write a pseudocode algorithm to read in any data in the above format, and print (a) (b) The number of families with no children; and The largest number of children existing in any family.

Information Technology Theory (1997)


1. (a) (b) (c) 2. 3. (i) (iii) (a) 2 2 2 2 2 2 2 83 41 20 10 5 2 1 0 1 1 0 0 1 0 1 Printer Plotter Scanner Keyboard Joy stick (ii) Optical Mark Readers (iv) Point of sale terminals Scanners

83 = 10100112 (b) 1 27 1 26 0 25 0 24 1 23 1 22 0 21 1 20

11001101

= 27 + 2 6 + 2 3 + 2 2 + 2 0 = 128 + 64 + 8 + 4 +1 = 205

(d)

1101 +1 0 0 1 0 1

110010 (e) 4. (a) 1993 Question 1 (a) i. ii. iii. i. ii. To store students records to use Computer Aided Instruction to aid in teaching to mark scripts To research a topic using the internet to create articles PERSONNEL Programmers Data Entry Clerks Database Administrator System Analysts FUNCTION Writes program that solve specific problems Uses key-entry devices to enter raw data into machine-readable format. Creates and controls the use of an organizations database. The analyst interacts with various users of a computer system, and with programmers to help analyze, design, and implement the new computer system.

(b)

(c) i. ii. iii. iv.

5.

a.. Robotic arms are use in the manufacture of motor vehicle. One function that the robotic arm serves is to spray the motor cars with uniform coat of paint. b. 1. ii. iii. The robot doesnt miss it wastes less than haft as mush paint as a human painter does. They are not effected by the dangerous fumes or heat, therefore they dont get sick

c. d. e.

The customer doesnt have to travel long distances to acquire a product. The customer is unable to examine the product closely before purchase Adv: Disadv: the customer can see their friends or relatives anywhere on the Globe while speaking to them. the cost of the equipment and service are high

6.

(a)

Because it is taking away from the creator of the program the right to earn from is or her creation.

(b)

1. ii.

The integrity of the data is a risk seeing that anybody can modify it There is no secrecy

(c) (d)

Data encryption is the scrambling of data to render it unintelligible to an Unauthorized recipient. 1. ii. Password protection Lock away the disk and computers when they are not in use

(e)

An APPLICATION PROGRAMMER writes programs for user. A SYSTEM PROGRAMMER creates and maintains operating system, monitor data base programs, and so forth. A protocol is a formal set of rules that govern how communication or exchange of data takes place over a network I UP-LOAD is the process of reading data from a users computer storage and send it to another computer via communication channel. DOWNLOAD is the process whereby programs or data are transferred via Communication channels, from a computer and stored on a media Location at the user site. HALF DUPLEX is a transmission system that allows data to be transmitted in one direction at a time.That is, the system can transmit and receive data but not at the same time. DUPLEX is a transmission system that allows data to be transmitted in both direction at the same time.This system is sometime call Full Duplex. A LOCAL AREA NETWORK is the linking of computer or terminal r in the same building or site so that they can communicate. This communication usually takes place along cables A WIDE AREA NETWORK is the linking of computer or terminals over a wide geographical area in order to facilitate communication. This communication system uses the telephone line, satellite, microwave transmissions or any other medium that facilitates long distance communication. ELECTRONIC MAIL is mail or massages transmitted electronically by computer via communication channels. It is usually for such massages to be held in a central store for retrieval at the users convenience. A BULLETIN BOARD is an electronic equivalent of a conventional bulletin board. It is used as part of a communication network where users can post massages, read massages posted by other users, communicate with the system operator and upload or download programs.

(a) (b)

ii.

Iii

iv.

8. COUNT 1 6 11 16 21 26 X 2 4 6 8 10 12 PRINTED 1, 4 6, 6 11, 8 16, 10 21, 12

The following is printed: 1, 4, 6, 6, 11, 8, 16, 10, 21, 12 9. a. An HIGH LEVEL PROGRAMMING LANGUAGE is one that is more intelligible to human beings and before it can be understood by the machine it has to be converted to a form that the machine can understand, MACHINE LANGUAGE consists of data and instruction as coded binary digits, 0s and 1s. No translation is necessary for the computer to understand this language. INTERPRETERS translate high-level language statements one at a time, executing each step immediately after it has been translated. No permanent object Program is generated: each time a source program statement is encountered, it is re-interpreted. COMPILERS translate the entire source code ( all statements ) to its object code before execution takes place. A permanent object program is generated; Whenever changes are made to the source code the program has to be re-compiled for the changes to take place. READ A READ B IF A < B PRINT A ELSE PRINT B ENDIF 10. READ NUMB 0COUNT = 0 HIGHEST = NUMB

b.

c.

WHILE NUMB <> 999 DO IF NUMB = 0 THEN 0COUNT = 0COUNT + 1 ENDIF IF NUMB > HIGHEST THAN HIGHEST = NUMB ENDIF READ NUMB ENDWHILE PRINT number of families with no children =, OCOUNT PRINT largest number children =, HIGHEST

Information Technology Theory (1999)

1.

A computer system consists of several hardware devices and software components. The keyboard, mouse and printer are all peripheral devices connected to the system unit. The system unit comprises a Central Processing Unit (CPU) and a component, (A) that holds the data and programs that are currently being used. The CPU in turn, consist of two component, One component, (B), directs the internal operations within the CPU; and the other component, (C), is responsible for the manipulation of the data. In addition, there is another storage component, (D), which stores data and programs that are not currently being used by the CPU. State the component that performs EACH of the functions named A to D and underline above.

2.

Match EACH characteristic, listed A to H below with the MOST appropriate device. Write the letter (A,B etc.) to represent the characteristic and next to EACH letter write the name of the device that matches it. CHARACTERISTIC DEVICE A. B. C. D. E. F. G. H. Modulates and demodulates signals Accepts voice inputs Keyboard Allow user to input architectural plans Reads in graphics data Graphics tablet Used for printing architectural plans Microphone Used for entering text documents Barcode reader Retrieves pricing data from grocery items Joystick Used to move the cursor Scanner Plotter Modern

3.

(a) (b)

State THREE functions of an operating system. Identify the type of processing mode that would be suited for the following applications: (i) Monthly payroll

(ii) (iii)

Transactions at an Automatic Teller Machine Processing electricity bills

4.

(a) (b) (c)

List THREE ways in which a teacher can use computers in classroom. Suggest TWO reasons why computer may NOT be used in the classroom. State TWO advantages of using computer in the classroom.

5.

(a) (b) (c) (d)

Convert the decimal number 9010 to binary number. Convert the binary number 110112 to a decimal number. Add the two binary numbers 11012 and 101012, giving your answer as a binary number. Determine the BCD representation of 8710

6.

(a)

(i) (ii) (iii)

Identify ONE application of robots in industry. State TWO advantages of using robots in industry. State ONE disadvantage of using robots in industry.

(b)

For EACH of the following devices, state ONE application in which the use of the device is essential: (i) (ii) (iii) (iv) Scanner Plotter Modem Magnetic ink-character reader

7.

(a) text:

In order to secure its data, a company uses the following method for encrypting

A letter is replaced by the letter five letters later in alphabetic order. For example, the letter A is replaced by F, B is replaced by G, and so on. Note that the letter A is considered to follow the letter Z. (i) What would be the word ESSAY be stored as?

(ii) (b) (i) (ii) (iii) location from THREE

What is the meaning of the following text? N LTYNY What is the purpose of a password? What is meant by the term archiving? Within many organizations, data on personnel are stored in a central which various departments can access relevant information. State problems that may arise because of the sharing of this type of data.

8.

Programs are written with the general purpose of solving problems. However, it is unlikely that a program will run completely error-free on the first attempt. The process whereby a program is checked to ensure that it does what it was designed for is important in the development of the program. There are two main types of errors that can occur: one type of error occurs when the programmer fails to properly think through the solution to the problem, and the other occurs when the programmer does not adequately know the rules of the programming language. It is good practice to perform a manual trace on the program, appropriately selected input values, which checks each segment of the program. State the proper technical term for EACH of the underlined phrase labeled A to E.

9.

(a)

DIFFERENCE = 0 Input A,B If A <= B Then DIFFERENCE = A-B Else DIFFERENCE = B-A Endif Print DIFFERENCE What is printed by the algorithm above if the input values are the following? (i) (ii) (iii) 20 100 50 30 100 10

(b)

Write a structure algorithm to prompt the user to input two values which are then stored in A and B. The algorithm must divide A by B and print the result. The algorithm must keep Prompting for the second number as long as the user enters 0 (zero) for the second number.

10.

(i) Write a structured algorithm, which prompts a user to enter an integer value, which is then stored in a variable N. The algorithm must then print each integer from 1 to N and its corresponding square. Each output line must show the integer and its square. You may assume that the user would enter an integer value. (iii) Modify the algorithm in (i) to determine the sum of all the squares. Print this sum if it is less than or equal to 1000. Otherwise, print the following message: THE SUM IS GREATER THAN ONE THOUSAND

Potrebbero piacerti anche