Sei sulla pagina 1di 3

CXC IT 2001

Theory Exams (1 Hrs). 75 Marks


1. a) Fortran was the fisrt 3rd generation language. What are the features distinguishing the third
generation language from the first and second generations?
(3 marks)
b) Give meanings of each of the following:
i)
Logic error
ii)
Test Data
iii)
Source code
iv)
Variable
c) What are the responsibilities of the Chief Programmer?

(4)
(2)

2. What does EACH of the following abbreviations stand for, and what is the purpose of each of the
components listed?
a.
b.
c.
d.

PROM
CPU
ALU
RAM

(4)

3. a) Explain the difference between data and information


b) Explain the terms
i) UPLOAD

ii) WAN

c) Which of the following are serial access type?


Microfilm, microfiche, reel to reel tape, cartridge tape
4.

a) Outline 3 main functions of a computers operating system

(2)
(4)

(4)
(3)

b) How does a pull-down menu help you in completing your task more easily

(1)

c) Give the most important advantage of primary storage over secondary storage.

(1)

d) Give the most important advantage of disk storage over tape storage.

(1)

e) In using diskettes, one precaution is: Keep diskettes away from magnetic fields.
Give 3 further precautions in the use of diskettes to store files.
5.

6.

a) Which print output device is best suited for printing an architectural drawing of
the front view of a new building, and why?

a)

(3)

(2)

b) A dot matrix printer is producing very faded output. Give one likely reason for this
problem and explain what must be done to remedy it.

(2)

c) Explain the operations of a light pen.

(3)

d) Give 1 similarity and 1 difference between OCR and MICR operation .

(2)

A certain computer uses an unsigned binary floating point representation for positive real

numbers. The mantissa is an 8 bit normalized fraction and the exponent is an 8 bit twos
complement integer. In a particular case, the mantissa is 10010011 and the exponent is 00110011.
What is the number being represented?
(3)
b)

Convert the binary number 01010101 to decimal.

c) Convert the decimal number 7 (seven) to a binary number

(1)
(1)

.
7. a) The use of information for strategic purposes can sometimes involve a violation of
ethics. Give 2 ways in which this statement is true.

(2)

b) In dealing with computer security, explain ONE advantage of software restrictions


compared with physical restrictions.

(2)

c)

What is telecommuting ? What major developments have contributed to make


telecommuting a feasible option?

(2)

8. The following terms relate to memory and data storage. Give the meaning and purpose of
EACH.
a) Backing up
c) Address
b) Read/Write Head
d) Access time
(8)
8.

Consider the following:


INPUT
Y = X +Y
X=XY
Y=X+Y
IF X > Y THEN
Z=X-Y-Z
ELSE
Z = X +Y + Z
ENDIF
PRINT X, Y, Z
What is printed by the algorithm if the input is
a) 1, 1, 1 ?
b) 1, 2, 3 ?

9.

(6)

A certain account at a bank earns compound interest on a yearly basis, and has no deposits or
withdrawals. The balance after ayear has passed is given by the formula:
This Years Balance = Last Years Balance * (1 + Interest rate), where Interest Rate is
given as a decimal fraction. For example , 25% must be entered as 0.25)
Write a structured algorithm to do the following:
a) Request the user to provide the interest rate as a decimal, the number of years to compute
interest for and the starting balance.

b) Read in the Interest Rate R and the value of N which is the number of years to
compute interest for.
c) Read in the starting balance
d) Compute and display the balance including the interest, after N years have passed. (5)

Potrebbero piacerti anche