Professional Documents
Culture Documents
Theory
Past Papers 1997 - 2002
Page
1997 ............................................................................................. 2
1998 ............................................................................................. 4
1999.............................................................................................. 7
2000.............................................................................................. 10
2001 ............................................................................................. 13
2002.............................................................................................. 15
2002 specimen ............................................................................. 18
2.
(a)
(b)
(c)
The wide variety of input devices and media is a major factor which adds to the flexibility and
versatility of computer systems. The use of a (i) device which allows users to move around
images on the monitor by the shifting of a lever on the device has made computer programs very
popular. In supermarkets, there are (ii) devices which allow a cashier to key in data on sales and
this data is automatically transmitted to a computer for processing. There are also (iii) devices
that are capable of reading pencil marks on an examination script thereby allowing the test to be
scored automatically. The use of (iv) devices to read in images allows pictures and logos to be
incorporated in a document.
State the technical names for EACH of the devices numbered (i) - (iv) above. Please use the
numbering indicated in the passage to identify your answers.
3.
d
(a)
(b)
(c)
(d)
4.
(a)
State THREE ways in which a teacher would use a computer in his or her
job.
State TWO ways in which a journalist would use a computer in his or her job.
(b)
(c)
A large company has decided to computerize the functions of its Human Resource
(Personnel) department. The Computer Department has been given the responsibility for
completing this task.
Name FOUR categories of personnel from the Computer Department that the Computer
Manager must assign to the task, stating clearly ONE function of EACH category.
5.
(a)
(b)
(c)
6.
(d)
(e)
(a)
(b)
Within a large company, data on each employee is stored in a central location. One file
stores the data on all employees. The data stored on an employee includes his or her
name, address, next of kin, salary range, etc. This data is shared by several departments
and an employee's record can be viewed and modified by many employees from several
departments.
State TWO problems which would arise from sharing of the data in the company.
(c)
(d)
(e)
Explain the difference between the role of an applications programmer and that of a
systems programmer in an organization.
7.
(a)
(b)
f
8.
9.
10.
(a)
(b)
(c)
Write a pseudocode algorithm to read two numbers and print the lower
value.
(a)
(b)
The following data represents some sample data of the number of children in several
families:
1 3 5 0 4 6 7 3 5 2 4 0 2 999
999 is the dummy value which terminates the data. Write a pseudocode algorithm to read
in any data in the above format, and print the number of families with no children and
the number of children in the largest family.
(a)
(b)
Data can be transmitted in both directions but only in one direction at a time.
(i)
State the correct technical term for EACH of the transmission methods above.
(c)
1.
(i)
(ii)
When a program makes a read write request to the disk drive, the component which reads data
from the disk is moved along a radius to the particular concentric circle on which the data are
stored. When the relevant part of the concentric circle of the disk arrives under the component
which reads the data, the data are read and stored in a special area of memory from which they
could be accessed.
State the proper technical term for EACH of the underlined phrases in the passage above.
2.
Match the following applications with the most appropriate input device.
APPLICATION
Point of sale
Games
Architectural design
Multiple-choice examination
Publishing
Cheque processing
Language processing
Preparing letters
DEVICES
Optical mark reader
Keyboard
Magnetic ink character recognition
microphone
Pads and tablets
Barcode reader
Joystick
Scanner
4
4.
5.
6.
7.
8.
9.
(a)
(b)
Give THREE examples of input devices that can read data directly from source
documents.
(c)
Give TWO advantages of using devices that can read data directly from source
documents .
(a)
(b)
State TWO measures that could be implemented in order to prevent a computer virus
from infecting a computer.
(c)
Identify TWO ways in which a person could be affected by the misuse of personal
information which has been stored in a data bank.
(d)
Identify TWO ways by which personal information which has been stored in a data bank,
may become inaccurate.
(a)
(b)
Add the two binary numbers 1101012 and 111012 giving your answer in binary form.
(c)
(d)
(a)
(b)
For EACH of the following, state TWO ways in which Information Technology can assist
employees in the performance of their jobs:
(i)
law enforcement
(ii)
medicine
(iii)
entertainment
(a)
(b)
(a)
Copy and complete the trace table below for the following
algorithm.
X=5
K = 10
SUM = 45
5
K
10
SUM
55
20
5
(b)
10.
Structured algorithm to read the names and scores of 15 students in a class. The algorithm must
print the name of the student and his/her grade which is determined according to the grading scale
below. The algorithm must also calculate and print the average score for the class.
GRADING SCALE
SCORE
80 or more
65 or more but less than 80
50 or more but less than 65
Less than 50
GRADE
A
B
C
F
The
keyboard, mouse and printer are all peripheral devices connected to the systems unit. The systems
unit comprises a Central Processing Unit (CPU) and a component, (A) that holds the data and
programs that are currently being used. The CPU in turn, consists of two components.
One
component (B), directs the internal operations within the CPU; and the other components, (C), is
responsible for the manipulation of the data. In addition, there is another storage component, (D),
which stores data and programs that are not currently being used by the CPU.
State the components that perform EACH of the functions named A to D and underlined above.
(4
marks)
2.
Match EACH characteristic, listed A to H below with the MOST appropriate device. Write the
letter (A,B,etc.) to represent the characteristic and next to EACH letter write the name of the device
that matches it.
CHARACTERISTIC
DEVICE
A.
B.
C.
D.
E.
F.
G.
Plotter
Keyboard
Modem
Graphic tablet
Microphone
Barcode reader
Joystick
Scanner
(8 marks)
3.
(a)
(b)
(3 marks)
Identify the types of processing mode that would be suited for the following applications:
(i) Monthly payroll
(1 mark)
(ii) Transactions at an Automatic Teller Machine
(1 mark)
(iii) Processing electricity bills
(1 mark)
Total 6 marks
4.
(a)
marks)
List THREE ways in which a teacher can use computers in the classroom.
(3
(b)
Suggest TWO reasons why computers may NOT be used in the classroom.
(2 marks)
(c)
(2 marks)
Total 7 marks
5.
(a)
(2 marks)
(b)
(c)
Add the two binary numbers 11012 and101012, giving your answer as a binary number.
(2 marks)
Determine the BCD representation of 8710.
(2 marks)
Total 8 marks
(d)
6.
(a)
(i)
(2 marks)
(1 mark)
(ii)
(2 marks)
(iii)
(1 mark)
(b) For EACH of the following devices, state ONE application in which the use of the device is
essential:
(i)
Scanner
(1 mark)
(ii)
Plotter
(1 mark)
(iii) Modem
(1 mark)
(a)
(1 mark)
Total 8 marks
In order to secure its data, a company uses the following method for encrypting text:
A letter is replaced by the letter five letters later in alphabetical order. For example, the letter
A is replaced by F, B is replaced by G, and so on. Note that the A is considered to
follow the letter Z.
(i) What would the word ESSAY be stored as?
(2 marks)
(b)
(2 marks)
(i)
(1 mark)
(ii)
(1 mark)
(iii) Within many organizations, data personnel are stored in a central location from which
various departments can access relevant information. State THREE problems that may
arise because of the sharing of this data.
(3 marks)
Total 9 marks
8.
Programs are written with the general purpose of solving problems. However, it is unlikely that
8
a program will run completely error-free on the first attempt. The process whereby a program is
checked to ensure that it does what was designed for is important in the development of the
(A)
program. There are two main types of errors that can occur: one type of error occurs when the
programmer fails to properly think through the solution to the problem, and the other occurs
(B)
when the programmer does not adequately know the rules of the programming language. It is
(C)
good practice to perform a manual trace on the program, using appropriately selected input
(D)
(E)
values, which checks each segment of the program.
State the proper technical term for EACH of the underlined phrases labeled A to E. (5 marks)
Total 5 marks
9.
(a)
DIFFERENCE = 0
Input A, B
If A < = B Then
DIFFERENCE = A B
Else
DIFFERENCE = B A
Endif
Print DIFFERENCE
What is printed by the algorithm above if the input values are the following?
(i) 20
30
(1 mark)
(ii) 100
100
(1 mark)
(iii) 50
10
(1 mark)
(b)
10.
Write a structure algorithm to prompt the user to input two values which are then stored in A
and B. The algorithm must divide A by B and print the result. The algorithm must keep
prompting for the second number as long as the user enters 0 (zero) for the second number.
(7marks)
Total 10 marks
(i) Write a structure algorithm, which prompts a user to enter an integer value, which is then,
stored in a variable N. The algorithm must then print each integer from 1 to N and it
corresponding square. Each output line must show the integer and its square. You may
assume that the user would enter an integer value.
(5 marks)
(ii)
Modify the algorithm in (i) to determine the sum of all the squares. Print this sum if it is less
than or equal to 1000. Otherwise, print the following message:
THE SUM IS GREATER THAN ONE THOUSAND
(5 marks)
Total 10 marks
2.
Give ONE similarity and ONE difference between EACH of the following pairs:
(a)
(b)
(c)
(d)
(e)
(a)
(b)
(i)
(ii)
(iii)
(2 marks)
(2 marks)
(2 marks)
(2 marks)
(2 marks)
Total marks 10
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(6 marks)
Total marks 6
10
4. The InsureNow Insurance Company has its head office in Bridgetown, Barbados. The
company has one computer, on which it stores all company data. The company handles a lot
of confidential client information about other agents clients.
(a)
(b)
(c)
(d)
5.
6.
(a)
What is teleconferencing?
(1 mark)
(b)
(2 marks)
(c)
(2 marks)
(a)
7.
How can you prevent agents from viewing one anothers confidential files?
(1
mark)
State TWO precautionary measures that can be taken to ensure that, in the
case of a fire, all client data is preserved.
(2 marks)
What can be done to ensure that the client data files are protected in the event
that the computer hard disk fails?
(1 mark)
It is sometimes necessary to send confidential data across the telephone line
(using a modem) to another branch of the company 25 miles away. How can
the company ensure that no on e can eavesdrop on the data while it is being
transmitted?
(1 mark)
Total marks 5
(b)
(3 marks)
Total marks 6
(a)
(2 marks)
(b)
Add the two binary numbers1101012 and 110112, giving your answer
in decimal form.
(3 marks)
(c)
(2 marks)
(d)
(2 marks)
Total marks 9
8. (a)
(b)
Write an algorithm which reads three values, a, b and c and prints the largest of the
three.
(4 marks)
This part is based on the algorithm given below:
Set A to 3
11
Set B to 5
Set SUM to 1
While A < = 50 do
A=A+ B
B=B+A
SUM = SUM + B
EndWhile
Print SUM
Stop
Using the algorithm above:
(i)
(ii)
B
5
(5 marks)
SUM
1
(1 mark)
Total marks 10
9.
Write an algorithm to read a positive integer N and find the average of all even
numbers between 1 and N inclusive. Perform any necessary validation. (8 marks)
Total marks 8
10.
Write an algorithm to read the names of 10 items and their prices, and print the name of
the item with the highest price. Assume that no items have the same price. Data is
supplied in the form:
item1, price1, item2, price2, etc.
(7 marks)
Total marks 7
12
CXC 2001
Theory Exams (1 Hrs). 75 Marks
1. a) Fortran was the fisrt 3rd generation language. What are the features distinguishing the third
generation language from the first and second generations?
(3 marks)
b) Give meanings of each of the following:
i)
Logic error
ii)
Test Data
iii)
Source code
iv)
Variable
c) What are the responsibilities of the Chief Programmer?
(4)
(2)
2. What does EACH of the following abbreviations stand for, and what is the purpose of each of the
components listed?
a.
b.
c.
d.
PROM
CPU
ALU
RAM
(4)
ii) WAN
(2)
(4)
(4)
(3)
b) How does a pull-down menu help you in completing your task more easily
(1)
c) Give the most important advantage of primary storage over secondary storage.
(1)
d) Give the most important advantage of disk storage over tape storage.
(1)
e) In using diskettes, one precaution is: Keep diskettes away from magnetic fields.
Give 3 further precautions in the use of diskettes to store files.
5.
6.
a) Which print output device is best suited for printing an architectural drawing of
the front view of a new building, and why?
a)
(3)
(2)
b) A dot matrix printer is producing very faded output. Give one likely reason for this
problem and explain what must be done to remedy it.
(2)
(3)
(2)
A certain computer uses an unsigned binary floating point representation for positive real
13
numbers. The mantissa is an 8 bit normalized fraction and the exponent is an 8 bit twos
complement integer. In a particular case, the mantissa is 10010011 and the exponent is 00110011.
What is the number being represented?
(General students only).
(3)
b)
(1)
(1)
.
7. a) The use of information for strategic purposes can sometimes involve a violation of
ethics. Give 2 ways in which this statement is true.
(2)
(2)
c)
(2)
8. The following terms relate to memory and data storage. Give the meaning and purpose of
EACH.
a) Backing up
c) Address
b) Read/Write Head
d) Access time
(8)
9.
10.
(6)
A certain account at a bank earns compound interest on a yearly basis, and has no deposits or
withdrawals. The balance after a year has passed is given by the formula:
This Years Balance = Last Years Balance * (1 + Interest rate), where Interest Rate is
given as a decimal fraction. For example , 25% must be entered as 0.25)
Write a structured algorithm to do the following:
a) Request the user to provide the interest rate as a decimal, the number of years to compute
interest for and the starting balance.
b) Read in the Interest Rate R and the value of N which is the number of years to
compute interest for.
14
(2 marks)
(2 marks)
(1 mark)
(2 marks)
2. a) You have saved a file on diskette. You later find that although you see the file listed you cannot
open the file from the diskette. Give one possible reason for this problem.
(1 mark)
b) One of the things done in a high level format is the creation of a File Allocation Table (FAT) What
is the purpose of a file Allocation Table?
(1 mark)
c) Explain how a fixed head system on a hard disk pack unit can reduce the access time for the device.
(2 marks)
d) With reference to a hard disk arrangement, give the difference between a track and a
cylinder.
(1 mark)
e) A disk system has 6 disk surfaces, with one moving head for each surface. A certain track has 10
sectors forming a ring, each sector carrying K byte. How many
i. bytes are there in each K byte sector?
ii. K bytes are there in the entire cylinder.
(1 mark)
(1 mark)
3. a) An old 30 pin memory module (SIMM) was capable of providing 1 byte at a time to the CPU. A
32-bit machine would require 4 of these to work together in a single bank. Explain why this is so.
(2 marks)
b) Integers are good for representing discrete data. Real numbers and floating point values are good
for representing continuous data. Explain these statements.
(2 marks)
4. a) Explain why magnetic tape is a serial access medium .
b) Explain why a floppy disk is considered a direct access medium .
c) What is microfilm?
15
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(2 marks)
c)
Explain why a monitor screen specified as 1024 x 768 is expected to give a clearer picture than
one specified as 640 x 480.
(1 mark)
d) Give 1 advantage and 1 disadvantage of a touch screen as compared to the use of a mouse
(2 marks)
e) Give 1 difference between custom software and customized software
(1 mark)
c) Using even parity with an 8 bit data byte, where the leftmost bit is to be used as the parity bit,
which of the following are valid patterns?
i)
00000000
ii)
00000011
iii)
00000010
iv)
10000001
(2 marks)
7. a) Merles basic computer system has a monitor, keyboard, system unit, mouse and modem.
2 additional devices that would enhance each of the following:
Give
i) Game playing
ii) Teleconferencing
iii) Presenting a report
8. a) Give 2 reasons why someone would join a newsgroup
(2 marks)
b) Give the meaning of the following abbreviations and for each case explain the purpose
i) HTML
ii) FTP
iii) CADD
(6 marks)
9. a) A large company offers free transportation or a transport allowance to its employees. For this
purpose it has prepared a list of names and addresses of employees. In those areas with many
persons needing transport, the company provides transportation.
i)
ii)
Besides names and address, give 1 other item of information that might be desirable
in this case.
(1 mark)
Explain 1 way in which the information collected here might be misused
(1 mark)
16
b) A foreign university keeps records of past student performance on a computer database. The
entire building is destroyed by fire along with the records. Give 2 methods that might have
been used to allow record keeping to continue .
(2 marks)
10. a) Explain the term electronic eavesdropping.
b) In the case of an encrypted file, what is the purpose of a password?
c) Give 2 typical responsibilities of a net work manager
(1 mark)
(2 marks)
(2 marks)
SECTION 3 PROGRAMMING
ATTEMPT ALL QUESTIONS
11. Write an algorithm or program to read in 2 numbers and find the average of the numbers.
(5 marks)
12. Write a program to names and prices of 100 items and print the names of those items with prices
less than $50.
(6 )
13. A concert organizer wants to charge different entrance prices as follows.
Males over the age of 15 yrs pay $50 while females over the age of 15 pay $40. Females 15 yrs old
or younger pay $20 while the males 15 yrs old or younger pay $30. No person under 2 yrs is
allowed. Write a program or algorithm to read the name, age and sex of EACH patron, and for
EACH person, to print out the name and entrance fee. The program must stop when it encounters a
person named END
(14 marks)
14. (a) Copy and complete the following trace table, for the algorithm given. (Note there
are 5 lines to be traced in the algorithm. )
(4 marks)
X
1
Y
2
Z
3
4
The Algorithm:
X=1
Y=2
Z=3
Z=Z+X
X=Z-X
Y=Z+Y
Z=Y-Z
Y=YX-Z
PRINT X, Y, Z
(b) What is finally printed by the algorithm?
(1 mark)
17
CXC IT
Specimen Paper For Exam 2002
2 Hours
SECTION 1 - 35 marks
1. (a) On a diskette, each sector has 512 bytes of storage. There are 18 sectors in a
track. Each side of the disk has 80 rings. What is the total amount of storage
space on the disk?
(2 marks)
(b) With respect to information storage in a computers memory: Explain the
difference between a byte and a word.
Total 9 marks
(2 marks)
2. (a) Explain the difference between application software and system software.
(2 marks)
(b) Give THREE functions of the operating system.
(3 marks)
(c) Explain how a graphical user interface can make an operating system easier to use than a
command line interface.
(2 marks)
(d) Give TWO situations where a plotter is considered preferable to a laser printer.
(2 marks)
3. A computer user has 400 typed documents on a disk, and may need to access any one
them. These documents concern ten different things.
(a) Give an advantage of making directories or folders in this case.
(1 mark)
(b) The user can remember the date and time of making a particular file, but not the
name of the file. Explain ONE way the user can get to retrieve that file.
(2 marks)
Total 3 marks
4. (a) Explain the difference between odd parity and even parity.
(2 marks)
(1 mark)
(d) Give the binary equivalent for the decimal number 25.
(1 mark)
18
(e) Add the two binary numbers 00110011 and 00100110 giving the answer as a binary number.
(1 mark)
5. (a) Give ONE DIFFERENCE and ONE SIMILARITY between Optical Character
Recognition and MICR.
(2 marks)
(b) What is a bar code?
(1 mark)
(c) Give TWO ways in which a bar code can be used in an accounting system.
(2 marks)
(d) Give TWO advantages of using ready-made software compared with using custom-made software.
(2 marks)
Total 7 marks
(1 mark)
(2 marks)
(1 mark)
(1 mark)
Total 5 marks
19
SECTION II 25 marks
Answer all questions in this section.
7. BRIEFLY state what EACH of the following means:
(a) Internet Relay Chat
(b) Telecommuting
(c) Teleconferencing
(d) Telemarketing
(e) Web Browser
(5 marks)
8. (a) Give THREE purposes for which a company can use its web site.
(2 marks)
(b) Through E-commerce, people can buy many things using the internet. Give ONE
other way in which the internet facilitates individuals buying and selling items.
(1 mark)
(c) A certain internet location has the following address:
http://www.ici-yes.com/students.htm
Give the significance of EACH of the parts of the URL:
http, www, icl-yes, com, students.htm
(5 marks)
Total 9 marks
(1 mark)
(b) Physical access restrictions are better than passwords or encryption. Give ONE
argument in favor of the statement given.
(2 marks)
(d) Give TWO methods of protecting oneself from computer viruses.
(2 marks)
Total 5 marks
10. List THREE typical functions and responsibilities of EACH of the following:
(a) Systems Analyst
(b) Programmer
Total 6 marks
TAXATION
No tax
20% of the excess income above $200,000
$40,000 plus 40% of the excess income above
$400,000
Write a structured algorithm to read the names and incomes of fifteen people, and to compute their
income taxes. For each person, the algorithm must print the name of the person alongside their tax
figure.
(12 marks)
14. (a) Copy and complete the following trace table, for the algorithm given. Note there
are seven lines to be traced in the algorithm.
(5 marks)
X
1
2
Y
1
Z
1
The Algorithm:
X=1
Y=1
Z=1
X=X+Y
Y=X*Y
Z=X+Y
X=X+Y
Y=X*Y
IF Z < X THEN X = Z
IF Z > = X THEN Y = X
PRINT X, Y, Z
(b) What is finally printed by the algorithm?
(1 mark)
21
SECTION IV
PRODUCTIVITY TOOLS
This section if for General Proficiency Candidates only
The following Question relates to Word-processing:
15. (a) Suppose you have just typed three lines of text, and you want to end the page at
that point, and start a new page. How do you end the page at that point? (1 mark)
(b) State the difference between the backspace and Delete keys.
(1 mark)
(1 mark)
(1 mark)
(e) For a multi-page document, give TWO reasons why it is better to apply the page
Numbering feature than to manually type in the page number on every page .
(2 marks)
(f) Suppose you wish to join the second and third paragraphs of a document into one
Paragraph: how do you do this?
(2 marks)
(g) Match the following text presentations with the appearance formatting feature that
produces that appearance. For example, the first item is done with normal text, so on your
answer paper you should say A is normal text.
Presentation
A. text
B. text
C. text
D. text
E. text
(2 marks)
Feature
normal
italic
underline
large size
bold
Total 10 marks
(1 mark)
(b) (i) If the value in B2 is changed to 4, what happens to the value in cell B5? (1 mark)
22
(ii) Which cell values will change due to the change in B5?
(1 mark)
(c) G5 contains the formula (G2+G3+G4) or = G2 + G3 + G4. If the contents of cell G5 are moved to
cell H6, what formula will be present in the position H6?
(1 mark)
(d) If cell G2 has + B2+C2+D2+E2+F2 (or = B2+C2+D2+E2+F2) and the data in cell C2 is deleted
and nothing is typed back into cell C2, what value is displayed in cell G2?
(1 mark)
(e) If the entire column C were deleted not just the data but the actual column, what is the resulting
position of the cell with word Weekly in it?
(1 mark)
(f) If G2 has the formula as in part d above, and the entire column C were deleted (as in c above) what
happens to the value in cell G2?
(1 mark)
(g) If G5 has the formula as given in (c) above and a new row is added between Jims row and Jacks
row, what happens to the formula being used to compute the weekly total? (1 mark)
(h) If G5 has the formula as given in (c) above and a new row is added between Jims row and Jacks
row, what value is displayed in cell G5?
(1 mark)
Total 10 marks
The following question relates to Databases:
17. Consider the following data:
Number
00-12
01-15
00-25
01-18
01-01
Item Name
Drinking Glass
Large Plastic Bowls
Spoons
Knives
Forks
Fragile
yes
no
no
no
no
Weight
1.5
2.5
0.5
0.5
0.5
Quantity
15
20
10
30
25
(a) You are to design the database structure. The Fragile field will only carry
values of either Yes or No, indicating whether the object is fragile. In your
answer book, draw up a table as shown below, filling in the characteristics of each
field in the structure.
(6 marks)
Field Name
Field Type
Field Size
(b) Suppose you are to make a query. The table below shows a condition being
applied on the quantity field, in the case of finding records of items where the
quantity is greater than 5.
23
Number
ItemName
Fragile
Weight
Quantity
>5
In your answer booklet, make a similar illustration depicting a query to find items
With weight less than or equal to 20.
(2 marks)
(c) Which of the fields in the database must have unique field values?
24
(2 marks)