You are on page 1of 24

CXC Information Technology

Theory
Past Papers 1997 - 2002

CXC Information Technology


Theory
Past Papers 1997 - 2002
CONTENTS
CXC Exam

Page

1997 ............................................................................................. 2
1998 ............................................................................................. 4
1999.............................................................................................. 7
2000.............................................................................................. 10
2001 ............................................................................................. 13
2002.............................................................................................. 15
2002 specimen ............................................................................. 18

To go to any specific page number, press Ctrl and G on your keyboard,


next type in the page number then click Go To. Close the Go To box.
Ctrl Home takes you to the beginning. Ctrl End takes you to the end.
To view the answers open the answer file. Have them both open at the
desired page and switch from one to the next by clicking on the file name on
your task bar.(usually at the bottom of your screen)

Information Technology - Theory (1997)


1.

2.

(a)

Name a type of device which produces human readable copy.

(b)

Name a type of device which produces a machine readable copy.

(c)

Name a type of device that accepts data in human readable form.

The wide variety of input devices and media is a major factor which adds to the flexibility and
versatility of computer systems. The use of a (i) device which allows users to move around
images on the monitor by the shifting of a lever on the device has made computer programs very
popular. In supermarkets, there are (ii) devices which allow a cashier to key in data on sales and
this data is automatically transmitted to a computer for processing. There are also (iii) devices
that are capable of reading pencil marks on an examination script thereby allowing the test to be
scored automatically. The use of (iv) devices to read in images allows pictures and logos to be
incorporated in a document.
State the technical names for EACH of the devices numbered (i) - (iv) above. Please use the
numbering indicated in the passage to identify your answers.

3.
d

(a)
(b)
(c)
(d)

Convert the decimal number 83 to its binary equivalent.


Convert the binary number 11001101 to its decimal equivalent.
Add the two binary numbers 1101 and 100101.
Explain the difference between discrete and continuous data.

4.

(a)

State THREE ways in which a teacher would use a computer in his or her
job.
State TWO ways in which a journalist would use a computer in his or her job.

(b)
(c)

A large company has decided to computerize the functions of its Human Resource
(Personnel) department. The Computer Department has been given the responsibility for
completing this task.
Name FOUR categories of personnel from the Computer Department that the Computer
Manager must assign to the task, stating clearly ONE function of EACH category.

5.

(a)

(b)
(c)

Describe briefly an application in which a robot (or robotic


arm) is used in industry, stating clearly ONE function that the robot performs.

State TWO advantages of using the robot (or robotic arm)


over using a manual method in the application described in part (a) above.
State ONE advantage to a customer of telemarketing.
2

6.

(d)

State ONE disadvantage to a customer of telemarketing.

(e)

State ONE advantage and ONE disadvantage of teleconferencing.

(a)

State ONE reason why copying a program is considered


to be morally wrong.

(b)

Within a large company, data on each employee is stored in a central location. One file
stores the data on all employees. The data stored on an employee includes his or her
name, address, next of kin, salary range, etc. This data is shared by several departments
and an employee's record can be viewed and modified by many employees from several
departments.
State TWO problems which would arise from sharing of the data in the company.

(c)

Define data encryption

(d)

State 2 other methods used to secure data

(e)

Explain the difference between the role of an applications programmer and that of a
systems programmer in an organization.

7.

(a)

What is meant by the term 'protocol' ?

(b)
f

8.

Explain the difference between the following terms:


(i)
Up-load and Down-load
(ii)
Half-duplex and Duplex
(iii)
Local Area Network and Wide Area Network
(i)
Electronic Mail and Bulletin Board

What is printed by the following algorithm?


COUNT = 1
X=2
WHILE COUNT < 26 do
X=X*2
PRINT COUNT, X
COUNT = COUNT + 5
ENDWHILE

9.

10.

(a)

Explain the difference between a high level programming


language and a machine level language.

(b)

Explain the difference between an interpreter and a compiler.

(c)

Write a pseudocode algorithm to read two numbers and print the lower
value.

(a)

Write a structured algorithm to interchange the values in 2 variables.


3

(b)

The following data represents some sample data of the number of children in several
families:
1 3 5 0 4 6 7 3 5 2 4 0 2 999
999 is the dummy value which terminates the data. Write a pseudocode algorithm to read
in any data in the above format, and print the number of families with no children and
the number of children in the largest family.

Information Technology- Theory (1998)


1.

(a)

Define the term 'protocol' as it relates to data communication.

(b)

Digital transmission can occur in three of the following ways:


(i)
Data can be transmitted in one direction only.
(ii)

Data can be transmitted in both directions but only in one direction at a time.

(i)

Data can be transmitted in both directions simultaneously.

State the correct technical term for EACH of the transmission methods above.
(c)

1.

(i)

Name the type of network that would be suitable for


linking all computers in a building.

(ii)

State ONE advantage of linking the computers in this way.

When a program makes a read write request to the disk drive, the component which reads data
from the disk is moved along a radius to the particular concentric circle on which the data are
stored. When the relevant part of the concentric circle of the disk arrives under the component
which reads the data, the data are read and stored in a special area of memory from which they
could be accessed.
State the proper technical term for EACH of the underlined phrases in the passage above.

2.

Match the following applications with the most appropriate input device.
APPLICATION
Point of sale
Games
Architectural design
Multiple-choice examination
Publishing
Cheque processing
Language processing
Preparing letters

DEVICES
Optical mark reader
Keyboard
Magnetic ink character recognition
microphone
Pads and tablets
Barcode reader
Joystick
Scanner
4

4.

5.

6.

7.

8.

9.

(a)

Define the term resolution as it relates to graphical display.

(b)

Give THREE examples of input devices that can read data directly from source
documents.

(c)

Give TWO advantages of using devices that can read data directly from source
documents .

(a)

What is a computer virus?

(b)

State TWO measures that could be implemented in order to prevent a computer virus
from infecting a computer.

(c)

Identify TWO ways in which a person could be affected by the misuse of personal
information which has been stored in a data bank.

(d)

Identify TWO ways by which personal information which has been stored in a data bank,
may become inaccurate.

(a)

Convert 8710 to its binary equivalent.

(b)

Add the two binary numbers 1101012 and 111012 giving your answer in binary form.

(c)

Give the BCD representation of 5910 .

(d)

Give the BCD representation of -5910.

(a)

CDROMs are used extensively in the field of education. State THREE


features of educational software or CDROMs that make them useful for educational
purposes.

(b)

For EACH of the following, state TWO ways in which Information Technology can assist
employees in the performance of their jobs:
(i)
law enforcement
(ii)
medicine
(iii)
entertainment

(a)

Write a structured algorithm to read in two numbers and print


the higher value.

(b)

Write a structured algorithm to interchange the values in two variables A and B.

(a)

Copy and complete the trace table below for the following
algorithm.
X=5
K = 10
SUM = 45
5

While SUM < 75 do


SUM = SUM + K
Print K
K=K+X
ENDWHILE
Print SUM
X
5

K
10

SUM
55

20
5
(b)
10.

What is printed by the algorithm?

Structured algorithm to read the names and scores of 15 students in a class. The algorithm must
print the name of the student and his/her grade which is determined according to the grading scale
below. The algorithm must also calculate and print the average score for the class.
GRADING SCALE
SCORE
80 or more
65 or more but less than 80
50 or more but less than 65
Less than 50

GRADE
A
B
C
F

CXC THEORY 1999


Attempt ALL Questions.
1.

A computer system consists of several hardware devices and software components.

The

keyboard, mouse and printer are all peripheral devices connected to the systems unit. The systems
unit comprises a Central Processing Unit (CPU) and a component, (A) that holds the data and
programs that are currently being used. The CPU in turn, consists of two components.

One

component (B), directs the internal operations within the CPU; and the other components, (C), is
responsible for the manipulation of the data. In addition, there is another storage component, (D),
which stores data and programs that are not currently being used by the CPU.
State the components that perform EACH of the functions named A to D and underlined above.
(4
marks)
2.

Match EACH characteristic, listed A to H below with the MOST appropriate device. Write the
letter (A,B,etc.) to represent the characteristic and next to EACH letter write the name of the device
that matches it.
CHARACTERISTIC

DEVICE

A.
B.
C.
D.
E.
F.
G.

Modulates and demodulates signals


Accepts voice inputs
Allow users to input architectural plans
Reads in graphics data
Used for printing architectural plans
Used for entering text documents
Retrieves pricing data from grocery items
H. Used to move the cursor, especially in games

Plotter
Keyboard
Modem
Graphic tablet
Microphone
Barcode reader
Joystick
Scanner
(8 marks)

3.

(a)
(b)

State THREE functions of an operating system.

(3 marks)

Identify the types of processing mode that would be suited for the following applications:
(i) Monthly payroll
(1 mark)
(ii) Transactions at an Automatic Teller Machine
(1 mark)
(iii) Processing electricity bills
(1 mark)
Total 6 marks

4.

(a)
marks)

List THREE ways in which a teacher can use computers in the classroom.

(3

(b)

Suggest TWO reasons why computers may NOT be used in the classroom.

(2 marks)

(c)

State TWO advantages of using computers in the classroom.

(2 marks)

Total 7 marks

5.

(a)

Convert the decimal number 9010 to a binary number.

(2 marks)

(b)

Convert the binary number 110112 to a decimal number.

(c)

Add the two binary numbers 11012 and101012, giving your answer as a binary number.
(2 marks)
Determine the BCD representation of 8710.
(2 marks)
Total 8 marks

(d)

6.

(a)

(i)

Identify ONE application of robots in industry.

(2 marks)

(1 mark)

(ii)

State TWO advantages of using robots in industry.

(2 marks)

(iii)

State ONE disadvantage of using robots in industry.

(1 mark)

(b) For EACH of the following devices, state ONE application in which the use of the device is
essential:
(i)

Scanner

(1 mark)

(ii)

Plotter

(1 mark)

(iii) Modem

(1 mark)

(iv) Magnetic ink-character reader


7.

(a)

(1 mark)
Total 8 marks

In order to secure its data, a company uses the following method for encrypting text:

A letter is replaced by the letter five letters later in alphabetical order. For example, the letter
A is replaced by F, B is replaced by G, and so on. Note that the A is considered to
follow the letter Z.
(i) What would the word ESSAY be stored as?
(2 marks)

(b)

(ii) What is the meaning of the following text?


N LTY NY

(2 marks)

(i)

(1 mark)

(ii)

What is the purpose of a password?


What is meant by the term archiving?

(1 mark)

(iii) Within many organizations, data personnel are stored in a central location from which
various departments can access relevant information. State THREE problems that may
arise because of the sharing of this data.
(3 marks)
Total 9 marks
8.

Programs are written with the general purpose of solving problems. However, it is unlikely that
8

a program will run completely error-free on the first attempt. The process whereby a program is
checked to ensure that it does what was designed for is important in the development of the
(A)
program. There are two main types of errors that can occur: one type of error occurs when the
programmer fails to properly think through the solution to the problem, and the other occurs
(B)
when the programmer does not adequately know the rules of the programming language. It is
(C)
good practice to perform a manual trace on the program, using appropriately selected input
(D)
(E)
values, which checks each segment of the program.
State the proper technical term for EACH of the underlined phrases labeled A to E. (5 marks)
Total 5 marks
9.

(a)

DIFFERENCE = 0
Input A, B
If A < = B Then
DIFFERENCE = A B
Else
DIFFERENCE = B A
Endif
Print DIFFERENCE
What is printed by the algorithm above if the input values are the following?
(i) 20
30
(1 mark)
(ii) 100
100
(1 mark)
(iii) 50
10
(1 mark)

(b)

10.

Write a structure algorithm to prompt the user to input two values which are then stored in A
and B. The algorithm must divide A by B and print the result. The algorithm must keep
prompting for the second number as long as the user enters 0 (zero) for the second number.
(7marks)
Total 10 marks
(i) Write a structure algorithm, which prompts a user to enter an integer value, which is then,
stored in a variable N. The algorithm must then print each integer from 1 to N and it
corresponding square. Each output line must show the integer and its square. You may
assume that the user would enter an integer value.
(5 marks)

(ii)

Modify the algorithm in (i) to determine the sum of all the squares. Print this sum if it is less
than or equal to 1000. Otherwise, print the following message:
THE SUM IS GREATER THAN ONE THOUSAND

(5 marks)
Total 10 marks

CXC IT THEORY 2000


1.

2.

Give ONE similarity and ONE difference between EACH of the following pairs:
(a)
(b)
(c)
(d)
(e)

ROM and RAM


ROM and EPROM
Hard disk and floppy disk
Primary storage and secondary storage
Systems software and applications software

(a)

Give BRIEF explanations for EACH of the following terms:


(i)
Word size
(ii)
Buffer
(iii)
Microfilm
(iv)
Bandwidth
(v)
Wide area network

(b)

(i)
(ii)
(iii)

(2 marks)
(2 marks)
(2 marks)
(2 marks)
(2 marks)
Total marks 10
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)

What is electronic eavesdropping?


(1 mark)
What is software piracy?
(1 mark)
State TWO ways in which software piracy may be controlled.
(2 marks)
Total marks 9

3. This question is based on the following extract:


Writing a program to solve a problem
Before writing a program in a high level language, it is advisable to write an algorithm
A
that solves the problem. This algorithm can be written in pseudocode and tested
B
thoroughly for logic errors. First, you perform a dry-run of the algorithm using a wide
C
D
variety of test data to ensure that your algorithm works for all possible cases. Next,
convert your algorithm to the high-level language. Compile your program to correct any
E
syntax errors, which you may have. Run your program and use the same set of test data
F
you used for the dry-run. If you get the same results, your program is working correctly.
Explain the meaning of EACH of the underlined phrases labeled A to F.

(6 marks)
Total marks 6

10

4. The InsureNow Insurance Company has its head office in Bridgetown, Barbados. The
company has one computer, on which it stores all company data. The company handles a lot
of confidential client information about other agents clients.
(a)

(b)
(c)
(d)

5.

6.

(a)

What is teleconferencing?

(1 mark)

(b)

State TWO advantages of teleconferencing.

(2 marks)

(c)

State FOUR hardware requirements for teleconferencing.

(2 marks)

(a)

7.

How can you prevent agents from viewing one anothers confidential files?
(1
mark)
State TWO precautionary measures that can be taken to ensure that, in the
case of a fire, all client data is preserved.
(2 marks)
What can be done to ensure that the client data files are protected in the event
that the computer hard disk fails?
(1 mark)
It is sometimes necessary to send confidential data across the telephone line
(using a modem) to another branch of the company 25 miles away. How can
the company ensure that no on e can eavesdrop on the data while it is being
transmitted?
(1 mark)
Total marks 5

(i) State ONE advantage of a machine language over a high-level languages


(1 mark )
(ii) State TWO advantages of high-level language over a machine languages
(2
marks)

(b)

State THREE advantages of computer networks.

(3 marks)
Total marks 6

(a)

Convert 9910 to its binary equivalent.

(2 marks)

(b)

Add the two binary numbers1101012 and 110112, giving your answer
in decimal form.
(3 marks)

(c)

Explain how an integer can be represented using BCD.

(2 marks)

(d)

Give the BCD representation of - 6510.

(2 marks)
Total marks 9

8. (a)
(b)

Write an algorithm which reads three values, a, b and c and prints the largest of the
three.
(4 marks)
This part is based on the algorithm given below:
Set A to 3
11

Set B to 5
Set SUM to 1
While A < = 50 do
A=A+ B
B=B+A
SUM = SUM + B
EndWhile
Print SUM
Stop
Using the algorithm above:
(i)

Copy and complete the trace table which follows.


A
3

(ii)

B
5

(5 marks)

SUM
1

State what is printed by the algorithm.

(1 mark)
Total marks 10

9.

Write an algorithm to read a positive integer N and find the average of all even
numbers between 1 and N inclusive. Perform any necessary validation. (8 marks)
Total marks 8

10.

Write an algorithm to read the names of 10 items and their prices, and print the name of
the item with the highest price. Assume that no items have the same price. Data is
supplied in the form:
item1, price1, item2, price2, etc.
(7 marks)
Total marks 7

12

CXC 2001
Theory Exams (1 Hrs). 75 Marks
1. a) Fortran was the fisrt 3rd generation language. What are the features distinguishing the third
generation language from the first and second generations?
(3 marks)
b) Give meanings of each of the following:
i)
Logic error
ii)
Test Data
iii)
Source code
iv)
Variable
c) What are the responsibilities of the Chief Programmer?

(4)
(2)

2. What does EACH of the following abbreviations stand for, and what is the purpose of each of the
components listed?
a.
b.
c.
d.

PROM
CPU
ALU
RAM

(4)

3. a) Explain the difference between data and information


b) Explain the terms
i) UPLOAD

ii) WAN

c) Which of the following are serial access type?


Microfilm, microfiche, reel to reel tape, cartridge tape
4.

a) Outline 3 main functions of a computers operating system

(2)
(4)

(4)
(3)

b) How does a pull-down menu help you in completing your task more easily

(1)

c) Give the most important advantage of primary storage over secondary storage.

(1)

d) Give the most important advantage of disk storage over tape storage.

(1)

e) In using diskettes, one precaution is: Keep diskettes away from magnetic fields.
Give 3 further precautions in the use of diskettes to store files.
5.

6.

a) Which print output device is best suited for printing an architectural drawing of
the front view of a new building, and why?

a)

(3)

(2)

b) A dot matrix printer is producing very faded output. Give one likely reason for this
problem and explain what must be done to remedy it.

(2)

c) Explain the operations of a light pen.

(3)

d) Give 1 similarity and 1 difference between OCR and MICR operation .

(2)

A certain computer uses an unsigned binary floating point representation for positive real
13

numbers. The mantissa is an 8 bit normalized fraction and the exponent is an 8 bit twos
complement integer. In a particular case, the mantissa is 10010011 and the exponent is 00110011.
What is the number being represented?
(General students only).
(3)
b)

Convert the binary number 01010101 to decimal.

c) Convert the decimal number 7 (seven) to a binary number

(1)
(1)

.
7. a) The use of information for strategic purposes can sometimes involve a violation of
ethics. Give 2 ways in which this statement is true.

(2)

b) In dealing with computer security, explain ONE advantage of software restrictions


compared with physical restrictions.

(2)

c)

What is telecommuting ? What major developments have contributed to make


telecommuting a feasible option?

(2)

8. The following terms relate to memory and data storage. Give the meaning and purpose of
EACH.
a) Backing up
c) Address
b) Read/Write Head
d) Access time
(8)
9.

Consider the following:


INPUT X, Y, Z
Y = X +Y
X=XY
Y=X+Y
IF X > Y THEN
Z=X-Y-Z
ELSE
Z = X +Y + Z
ENDIF
PRINT X, Y, Z
What is printed by the algorithm if the input is
a) 1, 1, 1 ?
b) 1, 2, 3 ?

10.

(6)

A certain account at a bank earns compound interest on a yearly basis, and has no deposits or
withdrawals. The balance after a year has passed is given by the formula:
This Years Balance = Last Years Balance * (1 + Interest rate), where Interest Rate is
given as a decimal fraction. For example , 25% must be entered as 0.25)
Write a structured algorithm to do the following:
a) Request the user to provide the interest rate as a decimal, the number of years to compute
interest for and the starting balance.
b) Read in the Interest Rate R and the value of N which is the number of years to
compute interest for.
14

c) Read in the starting balance


d) Compute and display the balance including the interest, after N years have passed.
(5)

Year 1 Theory Exam 2002


1 Hrs
Answer All Questions.
1. a) Name the TWO main components of the Central Processing Unit
b) For the 2 components named in part (a) discuss their main functions.
c) Give 1 difference between PROM and EPROM
d) What is Half Duplex transmission ?

(2 marks)
(2 marks)
(1 mark)
(2 marks)

2. a) You have saved a file on diskette. You later find that although you see the file listed you cannot
open the file from the diskette. Give one possible reason for this problem.
(1 mark)
b) One of the things done in a high level format is the creation of a File Allocation Table (FAT) What
is the purpose of a file Allocation Table?
(1 mark)
c) Explain how a fixed head system on a hard disk pack unit can reduce the access time for the device.
(2 marks)
d) With reference to a hard disk arrangement, give the difference between a track and a
cylinder.
(1 mark)
e) A disk system has 6 disk surfaces, with one moving head for each surface. A certain track has 10
sectors forming a ring, each sector carrying K byte. How many
i. bytes are there in each K byte sector?
ii. K bytes are there in the entire cylinder.

(1 mark)
(1 mark)

3. a) An old 30 pin memory module (SIMM) was capable of providing 1 byte at a time to the CPU. A
32-bit machine would require 4 of these to work together in a single bank. Explain why this is so.
(2 marks)
b) Integers are good for representing discrete data. Real numbers and floating point values are good
for representing continuous data. Explain these statements.
(2 marks)
4. a) Explain why magnetic tape is a serial access medium .
b) Explain why a floppy disk is considered a direct access medium .
c) What is microfilm?
15

(1 mark)
(1 mark)
(1 mark)

5. a) Give 2 applications for the use of an Optical Mark Reader (OMR)


b) Give 2 meanings of the abbreviation OCR

(1 mark)
(2 marks)

c)

Explain why a monitor screen specified as 1024 x 768 is expected to give a clearer picture than
one specified as 640 x 480.
(1 mark)
d) Give 1 advantage and 1 disadvantage of a touch screen as compared to the use of a mouse
(2 marks)
e) Give 1 difference between custom software and customized software
(1 mark)

6 a) Using 8 bit binary representation, give the


i)
ii)
iii)
iv)

binary conversion for the decimal number 10


(1 )
ones complement representation for the decimal number NEGATIVE 10
(1 )
twos complement representation for the decimal number NEGATIVE 10 (1 )
sign-and-magnitude representation for the decimal number NEGATIVE 10 (1 )

c) Using even parity with an 8 bit data byte, where the leftmost bit is to be used as the parity bit,
which of the following are valid patterns?
i)
00000000
ii)
00000011
iii)
00000010
iv)
10000001
(2 marks)
7. a) Merles basic computer system has a monitor, keyboard, system unit, mouse and modem.
2 additional devices that would enhance each of the following:

Give

i) Game playing
ii) Teleconferencing
iii) Presenting a report
8. a) Give 2 reasons why someone would join a newsgroup
(2 marks)
b) Give the meaning of the following abbreviations and for each case explain the purpose
i) HTML
ii) FTP
iii) CADD
(6 marks)
9. a) A large company offers free transportation or a transport allowance to its employees. For this
purpose it has prepared a list of names and addresses of employees. In those areas with many
persons needing transport, the company provides transportation.
i)
ii)

Besides names and address, give 1 other item of information that might be desirable
in this case.
(1 mark)
Explain 1 way in which the information collected here might be misused
(1 mark)

16

b) A foreign university keeps records of past student performance on a computer database. The
entire building is destroyed by fire along with the records. Give 2 methods that might have
been used to allow record keeping to continue .
(2 marks)
10. a) Explain the term electronic eavesdropping.
b) In the case of an encrypted file, what is the purpose of a password?
c) Give 2 typical responsibilities of a net work manager

(1 mark)
(2 marks)
(2 marks)

SECTION 3 PROGRAMMING
ATTEMPT ALL QUESTIONS
11. Write an algorithm or program to read in 2 numbers and find the average of the numbers.

(5 marks)

12. Write a program to names and prices of 100 items and print the names of those items with prices
less than $50.
(6 )
13. A concert organizer wants to charge different entrance prices as follows.
Males over the age of 15 yrs pay $50 while females over the age of 15 pay $40. Females 15 yrs old
or younger pay $20 while the males 15 yrs old or younger pay $30. No person under 2 yrs is
allowed. Write a program or algorithm to read the name, age and sex of EACH patron, and for
EACH person, to print out the name and entrance fee. The program must stop when it encounters a
person named END
(14 marks)
14. (a) Copy and complete the following trace table, for the algorithm given. (Note there
are 5 lines to be traced in the algorithm. )
(4 marks)
X
1

Y
2

Z
3
4

The Algorithm:
X=1
Y=2
Z=3
Z=Z+X
X=Z-X
Y=Z+Y
Z=Y-Z
Y=YX-Z
PRINT X, Y, Z
(b) What is finally printed by the algorithm?

(1 mark)

17

2002 SPECIMEN PAPER (New Format for 2002)

CXC IT
Specimen Paper For Exam 2002
2 Hours
SECTION 1 - 35 marks
1. (a) On a diskette, each sector has 512 bytes of storage. There are 18 sectors in a
track. Each side of the disk has 80 rings. What is the total amount of storage
space on the disk?
(2 marks)
(b) With respect to information storage in a computers memory: Explain the
difference between a byte and a word.
Total 9 marks

(2 marks)

2. (a) Explain the difference between application software and system software.
(2 marks)
(b) Give THREE functions of the operating system.

(3 marks)

(c) Explain how a graphical user interface can make an operating system easier to use than a
command line interface.
(2 marks)
(d) Give TWO situations where a plotter is considered preferable to a laser printer.
(2 marks)
3. A computer user has 400 typed documents on a disk, and may need to access any one
them. These documents concern ten different things.
(a) Give an advantage of making directories or folders in this case.

(1 mark)

(b) The user can remember the date and time of making a particular file, but not the
name of the file. Explain ONE way the user can get to retrieve that file.
(2 marks)
Total 3 marks
4. (a) Explain the difference between odd parity and even parity.

(2 marks)

(b) The ASCII representation for the letter D is I000I00


I. What is the ASCII representation for the letter C? (1 mark)
II. What is the ASCII representation for the letter G? (1 mark)
(c) Give the decimal equivalent for the binary number 01001001.

(1 mark)

(d) Give the binary equivalent for the decimal number 25.

(1 mark)

18

(e) Add the two binary numbers 00110011 and 00100110 giving the answer as a binary number.
(1 mark)

5. (a) Give ONE DIFFERENCE and ONE SIMILARITY between Optical Character
Recognition and MICR.
(2 marks)
(b) What is a bar code?

(1 mark)

(c) Give TWO ways in which a bar code can be used in an accounting system.

(2 marks)

(d) Give TWO advantages of using ready-made software compared with using custom-made software.
(2 marks)
Total 7 marks

6. (a) BRIEFLY explain what is Electronic Mail.

(1 mark)

(b) Give TWO differences between a LAN and a WAN.

(2 marks)

(c) What is meant by the tem Broadcast Transmission?

(1 mark)

(d) BRIEFLY explain what is a Newsgroup.

(1 mark)
Total 5 marks

19

SECTION II 25 marks
Answer all questions in this section.
7. BRIEFLY state what EACH of the following means:
(a) Internet Relay Chat
(b) Telecommuting
(c) Teleconferencing
(d) Telemarketing
(e) Web Browser

(5 marks)

8. (a) Give THREE purposes for which a company can use its web site.

(2 marks)

(b) Through E-commerce, people can buy many things using the internet. Give ONE
other way in which the internet facilitates individuals buying and selling items.
(1 mark)
(c) A certain internet location has the following address:
http://www.ici-yes.com/students.htm
Give the significance of EACH of the parts of the URL:
http, www, icl-yes, com, students.htm

(5 marks)
Total 9 marks

9. (a) What is encryption?

(1 mark)

(b) Physical access restrictions are better than passwords or encryption. Give ONE
argument in favor of the statement given.
(2 marks)
(d) Give TWO methods of protecting oneself from computer viruses.

(2 marks)
Total 5 marks

10. List THREE typical functions and responsibilities of EACH of the following:
(a) Systems Analyst
(b) Programmer
Total 6 marks

SECTION III - PROGRAMMING


20

This section if for Technical Proficiency Candidates Only


(30 Marks)
11. Write an algorithm, using pseudocode, to read in two integers and print the value of
the value of the larger integer.
(5 marks)
12. Write a structured algorithm to find the sum of N integers, where the value of N is to
be supplied by the user. Each of the N integers is to be supplied by the user.
(7 marks)
13. Under a certain income tax system, taxation is computed according to the following:
INCOME RANGE
Below $200,000
Between $200.000 and $400,000
More than $400,000

TAXATION
No tax
20% of the excess income above $200,000
$40,000 plus 40% of the excess income above
$400,000

Write a structured algorithm to read the names and incomes of fifteen people, and to compute their
income taxes. For each person, the algorithm must print the name of the person alongside their tax
figure.
(12 marks)
14. (a) Copy and complete the following trace table, for the algorithm given. Note there
are seven lines to be traced in the algorithm.
(5 marks)
X
1
2

Y
1

Z
1

The Algorithm:
X=1
Y=1
Z=1
X=X+Y
Y=X*Y
Z=X+Y
X=X+Y
Y=X*Y
IF Z < X THEN X = Z
IF Z > = X THEN Y = X
PRINT X, Y, Z
(b) What is finally printed by the algorithm?

(1 mark)
21

SECTION IV
PRODUCTIVITY TOOLS
This section if for General Proficiency Candidates only
The following Question relates to Word-processing:
15. (a) Suppose you have just typed three lines of text, and you want to end the page at
that point, and start a new page. How do you end the page at that point? (1 mark)
(b) State the difference between the backspace and Delete keys.

(1 mark)

(c) State the difference between right-aligned and fully justified.

(1 mark)

(d) Give the difference type-over mode and insert mode.

(1 mark)

(e) For a multi-page document, give TWO reasons why it is better to apply the page
Numbering feature than to manually type in the page number on every page .
(2 marks)
(f) Suppose you wish to join the second and third paragraphs of a document into one
Paragraph: how do you do this?
(2 marks)
(g) Match the following text presentations with the appearance formatting feature that
produces that appearance. For example, the first item is done with normal text, so on your
answer paper you should say A is normal text.
Presentation
A. text
B. text
C. text
D. text
E. text
(2 marks)

Feature
normal
italic
underline
large size
bold
Total 10 marks

16. The following question relates to Spreadsheets


A
B
C
D
E
F
G
1
Mon
Tue
Wed
Thur
Fri
Weekly
2
Jim
1
2
1
1
2
7
3
Jack
2
3
3
1
2
11
4
John
2
2
2
2
2
10
5
Total
5
7
6
4
6
28
The table above represents a section of a spreadsheet. The row and column buttons are indicated.
(a) What formula would you use in cell D5?

(1 mark)

(b) (i) If the value in B2 is changed to 4, what happens to the value in cell B5? (1 mark)
22

(ii) Which cell values will change due to the change in B5?

(1 mark)

(c) G5 contains the formula (G2+G3+G4) or = G2 + G3 + G4. If the contents of cell G5 are moved to
cell H6, what formula will be present in the position H6?
(1 mark)
(d) If cell G2 has + B2+C2+D2+E2+F2 (or = B2+C2+D2+E2+F2) and the data in cell C2 is deleted
and nothing is typed back into cell C2, what value is displayed in cell G2?
(1 mark)
(e) If the entire column C were deleted not just the data but the actual column, what is the resulting
position of the cell with word Weekly in it?
(1 mark)
(f) If G2 has the formula as in part d above, and the entire column C were deleted (as in c above) what
happens to the value in cell G2?
(1 mark)
(g) If G5 has the formula as given in (c) above and a new row is added between Jims row and Jacks
row, what happens to the formula being used to compute the weekly total? (1 mark)
(h) If G5 has the formula as given in (c) above and a new row is added between Jims row and Jacks
row, what value is displayed in cell G5?
(1 mark)
Total 10 marks
The following question relates to Databases:
17. Consider the following data:
Number
00-12
01-15
00-25
01-18
01-01

Item Name
Drinking Glass
Large Plastic Bowls
Spoons
Knives
Forks

Fragile
yes
no
no
no
no

Weight
1.5
2.5
0.5
0.5
0.5

Quantity
15
20
10
30
25

(a) You are to design the database structure. The Fragile field will only carry
values of either Yes or No, indicating whether the object is fragile. In your
answer book, draw up a table as shown below, filling in the characteristics of each
field in the structure.
(6 marks)
Field Name

Field Type

Field Size

(b) Suppose you are to make a query. The table below shows a condition being
applied on the quantity field, in the case of finding records of items where the
quantity is greater than 5.
23

Number

ItemName

Fragile

Weight

Quantity
>5

In your answer booklet, make a similar illustration depicting a query to find items
With weight less than or equal to 20.
(2 marks)
(c) Which of the fields in the database must have unique field values?

24

(2 marks)

You might also like