Name: _______________________________ ( ) Class: Sec ______
BUKIT VIEW SECONDARY SCHOOL
PRELIM EXAMINATION
Secondary 4 Express
BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL
BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL
BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL
BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL
BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL BUKIT VIEW SECONDARY SCHOOL
COMPUTING 7155/01
13 September 2018
PAPER 1 Written 2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
------------------------------------------------------------------------------------------------------------------------------------
READ THESE INSTRUCTIONS FIRST
Write your Name, Register Number and Class on the top of this page.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
You should show all your working.
80
Setter: Mr Low Chee Wah Parent’s signature : ______________
This question paper consists of 16 printed pages.
2
1. (a) A company uses spreadsheet software.
Draw a line between the description and the correct spreadsheet
function.
Description Function
AND
It is one of the logical functions
to determine if all conditions in a
test are TRUE
AVERAGE
Returns number rounded up,
away from zero, to the nearest
multiple of significance
CEILING
Returns the mean of the given
numbers
ROUND
Search the data in column and
use associated data in the same
row
VLOOKUP
[4]
3
2. (a) Convert the binary number 11101001 into a denary number. Show
your working.
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………[2]
(b) Convert the denary number 121 into a hexadecimal number.
Show your working.
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………[2]
(c) Convert the hexadecimal number E4 into a binary number. Show
your working.
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………[2]
(d) Convert the binary number 10011100 into a hexadecimal number. Show
your working.
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………[2]
4
3. Insert six of the following words about a being safe and responsible computer user in
the correct place in the text below.
cloud data corruption data loss decoding
encoding firewall private public
router spyware worm
Encryption refers to the process of ……………….. data so that a secret key is
needed for …………………. the data.
The ………………. is a device or computer program that prevents unauthorised
access to or from a ……………… network.
A …………………is a hidden program that secretly collects personal information
about its users and transmits this information to attackers without the users’
knowledge.
…………………….. occurs when computer data is changed or becomes
unreadable. [6]
4. An engineer wants to use a computer program to find out which day in May
experiences the highest temperature in the factory. The average temperature of
each day in May is recorded. There are a total of 30 readings taken for this study.
(a) State the inputs, the outputs and the processes required to find the hottest day
in May.
Inputs
….………………………………………………………………………………
……….…………………………………………………………………………[2]
Outputs
…..………………………………………………………………………………
…….……………………………………………………………………………[2]
5
Processes required
……………………………………………………………………………….
…………………………………………………………………………………… [2]
(b) Is 100 degree Celsius (100oC) a possible extreme data for the input?
Explain your answer.
………………………………………………………………………………
………………………………………………………………………………
.
……………………………………………………………………….…… [2]
5. Name each of the key terms described in the five statements below:
Statement Terms
(a) Creative works that are the creations of the mind
and can exist purely as data with no physical
form.
(b) The legal right of owners to control the use and
distribution of their intellectual property.
(c) Official description of activities that are
authorised or forbidden by the owner of
intellectual property.
(d) Software where the legal protections that are
typically granted to intellectual property have
either expired, been surrendered or are simply
inapplicable.
(e) Demonstration software that is distributed for
free but for a specific evaluation period only.
[5]
6
6. When we use programming language, the source code must be translated
into machine code before it can be run.
(a) What are machine codes?
………………………………………………………………………………
…………………………………………………………………………… [1]
(b) Name the 2 translator programs used to perform the translation and
describe their functions.
(i) ……………………………………………………………………
……………………………………………………………………
(ii) ……………………………………………………………………
…………………………………………………………………… [2]
(c) Explain the computer term “Command Line Interface.”
…………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………… [1]
7
7. A topology describes the physical layout of a network. Understanding the
topology is essential to designing a network.
(a) Describe one advantage of ring topology over bus topology.
………………………………………………………………………………
……………………………………………………………………………[1]
(b) Which topology would you recommend if the requirement is to isolate
fault easily and perform a replacement without affecting the rest of the
network?
………………………………………………………………………………
……………………………………………………………………………[1]
(c) Which network topology is the least reliable in the event of a breakdown
of a computer in the network? Explain your choice.
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………[2]
8. (a) Complete the table for two main differences between RAM and ROM.
S/N RAM ROM
1
[2]
8
(b) Solid-state hard disk is used as an external storage device in certain
circumstances. List one advantage and one disadvantage of this
type of storage device over magnetic storage device.
(i) Advantage: ..……………………………………………………
……………………………………………………………………
(ii) Disadvantage: .…………………………………………………
…………………………………………………………………… [2]
(c) Describe the function of each of the following computer components:
(i) Central processing unit: .……………………………………….
…………………………………………………..…………………
(ii) Arithmetic Logic Unit (ALU): ………………………………….
…………………………………………………..………………… [2]
9. (a) In ensuring that a program works as intended, validation checks
are often added to the codes. What is data validation?
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………… [1]
9
(b) In the following extracts of codes, give the name of validation check.
Extract of codes Name of
validation check
(i) while True:
s = input("Enter name: ")
if (len(s)!=0):
break
else:
print(“Error, try again”)
(ii) while True:
p = float(input("Enter p: "))
if p >= 0.0 and p<= 100.0 :
break
else:
print(“Error, try again”)
(iii) while True:
s = input("Enter name: ")
if len(s) == 2 and s[0] in "ABCDEF" and
s[1].isdigit():
break
else:
print("Error, try again")
(iv) while True:
s = input("Enter Postal Code: ")
if (len(s)==6):
break
else:
print("Error, try again")
[4]
10
10. Study the following flowchart very carefully.
11
(a) Complete the trace table for this flowchart using the following test data:
5, 2, 1 4, 9, 7 6, 1, 3 5, 8, 9 1, 11, 3 0, 0, 0
T1 T2 T3 A B C OUTPUT
[5]
(b) This flowchart does not give correct answers for certain sets of test data.
Suggest a data set that would give an incorrect answer.
Give a reason for your choice.
Data set ...................................................................................................................
................................................................................................................................
Reason ....................................................................................................................
................................................................................................................................
............................................................................................................................ [2]
12
11. (a) The following pseudocode algorithm should:
• input the science test marks of a class of 40 students into an array in sequence
of their class registration number starting from 1
• output the average test mark of the class
• output the registration number of the top student
• output the highest test score
1 count = 0
2 sum = 0
3 max = 100
4 repeat
5
6 input num[count]
7 if num[count] > max then
8 max = num[count]
9 j = count
10 endif
11 sum = sum + num[j]
12 until count = 39
13 Output sum/40, j, max
There are four errors in this pseudo-code. Locate the errors including its line
number and state the correct pseudo-code.
Error 1 ………………………………………………………………………
Correction ……………………………………………………………………
Error 2 ………………………………………………………………………
Correction ……………………………………………………………………
Error 3 ………………………………………………………………………
Correction ……………………………………………………………………
Error 4 ………………………………………………………………………
Correction ……………………………………………………………………
[8]
13
(b) Describe a scenario whereby the above program will not name the
top student correctly. Assume all 40 input data are valid data.
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………… [1]
14
12. An alarm, Y, sends a signal (Y = 1) when certain fault conditions in a
chemical process are detected. The inputs are:
Input Binary Value Condition
1 Leakage detected
L
0 Leakage not detected
1 Temperature >= 150oC
T
0 Temperature < 150oC
1 Pump ON
P
0 Pump OFF
The alarm, Y, returns a value of 1 if:
either (i) Temperature >= 150oC AND Pump is OFF
or (ii) Leakage detected AND Temperature < 150oC
(a) Draw the logic circuit for the above system.
T Y
[5]
15
(b) Complete the truth table for the above system.
L T P Working Space Y
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
16
13. A teacher is interested to store the values of a class test results in an
array and perform some data manipulations with it. The class size is not
expected to be more than 40 students.
Write an algorithm, using pseudocode or a flowchart, which:
• input up to 40 student names and their respective test scores
• stop if the student name = “end”
• output the name and score of the top student(s)
[5]
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
- End of paper -