Computer Science Questions & Answer
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL (ZIMSEC)
QUESTION AND ANSWER MODULE: COMPUTER STUDIES O-LEVEL PAPER 1
7014/01
NOVEMBER 2004
1. Explain the meaning of the following terms.
(a)Multimedia
-a computer system with CD-ROM/speaker/sound
card/microphone/graphics/video/animation/text
-a computer system that combines voice, sound, text, graphics and animation
into a single system.[1]
(b)Check sum
-result of adding up all elements (bits/bytes/number) to produce a single
element to check for errors before transmission /transfer of data [1]
(c) Hacking
-illegal/unauthorised access into private files/data/information/computer
systems [1]
(d)Encryption
-scrambling data before transmission
-encoding/making data unreadable for security reasons [1]
(e )Internet
-World-wide network of computers/international network of computers
-global interconnection of computer networks.[1]
1
Computer Science Questions & Answer
2. What is a computer virus?
-A program /software which replicates/copies itself to the computer to disturb
its functionality/corrupts/interferes with a computer system. Eg boot viruses
[3]
(b)State two precautions you would use to protect your computer from
viruses at your school.
Any two from:
-loading an antivirus program
-scan disks before use
-inoculate files
-use firewalls to filter content coming from outside
-avoid downloading mails from untrusted sites/sources [2]
3.(a)What is the meaning of the termrobotics?
-the study of the design and work of robots [2]
(b) All robots have the same basic components. Give two of these
components, describing clearly the purpose of each.
Any two from:
Component 1: Sensors
Purpose: to capture/collect/read data from the environment
Component 2: Micropropcessor
Purpose: to process data/to do data manipulations
Component 3: Actuators/Limbs/Arms
Purpose: to produce movement/to alter the environment in some way.[4]
2
Computer Science Questions & Answer
(c )Give four reasons why the use of robots has gained popularity in various
industries.
Any four from:
-can work in hazardous /dangerous conditions
-monotonous /repetitive tasks can be easily done
-reduce labour costs as they need not to be paid
-quality of work is consistent
-improved productivity as they can work 24 hours a day/non-stop.
-goods made to precision/accuracy [4]
(d)Give two disadvantages of the use of robotics in society
Any two from:
-loss of jobs/leads to unemployment
-initial set up costs are high
-cause de-skilling
-they cannot work when there is no electricity
-they can only do what they are programmed to do.[2]
3
Computer Science Questions & Answer
4. The following flowcharts represent three program constructs. Name the
program constructs in the spaces provided.
(A) (B) Statement 1
Statement 1
Statement 2
condition
Statement 3
Statement 2
( C)
Condition Statement 1
Statement 2
A: Sequence/Linear
B: Iteration/Repetition/Loop
C: Selection
4
Computer Science Questions & Answer
(b)Study the algorithm below and answer the questions that follow.
(NB. In this algorithm <= implies less than or equal to)
Set counter to zero
Begin
Input mark
If counter <=4 then
Add 1 to counter
Add mark to sum
End if
Until mark =-100
Print sum
Print counter
(i)Complete the trace table for the algorithm using the following set of
marks:
25, 20, 23, 24, 20, 30,-100
MARK SUM COUNTER
0 0
25 25 1
20 25 2
23 45 3
24 68 4
20 92 5
30 112 5
-100 112 5
(TO CHECK ON NUMBER OF MARKS ALLOCATED)
(ii)What is the purpose of the algorithm?
-to find the sum of the 5 marks
5
Computer Science Questions & Answer
(iii)The mark -100 is known as the rogue value. What is the purpose of this
value?
-to terminate the loop/procedure
-to stop further data entry
5. A personal computer (PC) is supplied with 32MB RAM, 3.2GB hard disk
preloaded with the operating system and software applications. Some of the
applications have interpreters and compilers.
(i)What does RAM stand for?
-Random Access Memory
(ii)Briefly explain the use of RAM.
-Used to store data and instructions currently being processed /awaiting
processing.
(b)Briefly explain the purpose of:
(i)An interpreter
-A program that translates high level language into machine code statement by
statement during execution.
-a translator that converts source code to object code line by line.[1]
(ii)A compiler
-a program that translates a high level language program into machine code,
the entire program at once.
-a translator that converts source code to object code at once [1]
( c)Give two advantages of hard disk over floppy disk
Any two from:
-high capacity storage medium
-offers direct access to data which if fast
6
Computer Science Questions & Answer
-is more robust and resistant [2]
(d)The P.C is supplied with a Graphics User Interface (G.U.I).State three
advantages of using GUI instead of the command line operating system.
-user friendly
-offers on line help
-allows multi-tasking
-easy to learn
6. Define the term operating system.
-a suite of programs that direct operations in a computer system [1]
(b)State five functions of operating system
Any five from
-memory management
-file management
-error handling
-peripheral device control
-multiprogramming
-task management
-log preparation
-Interrupt handling
( c) Distinguish between multitasking and multi access systems.
-multi tasking is where a user performs more than one task on the same
machine at the same time whereas a multi access system is one in which a
main computer is accessed by many users apparently at the same time via
remote terminals. Each user is allocated a time slice and has the impression
that is the only one using the main computer.[2]
7
Computer Science Questions & Answer
7. The manager of Day and Night Travel Agency has made a proposal to
change their manual payroll to a computerised system. Suggest two factors
that may have motivated the manager to take this step.
Any two from
-computers can keep information for a long time safely
-computerised systems reduce redundancy of data
-computers are fast in data processing [2]
(accept any reasonable point)
(b)Besides conducting the feasibility study, give any three key roles played by
a systems analyst in developing the payroll system.
Any three from:
-data collection
-requirements specification
-system design
-designing a test plan/test strategy
-coming up with an implementation plan/strategy.[3]
( c) Describe any three aspects a systems analyst would consider when
carrying out a feasibility study
Any three from
Use (TELOS as the acronym to remember the types of feasibilities).
Technology: does the technology exist to implement the new system
Economic feasibility: weighs costs and benefits for coming up with a new
system
Legal feasibility: is the system within the legal framework of a nation
8
Computer Science Questions & Answer
Operational feasibility: how much the current work practices and procedures
support the new system
Schedule feasibility: considers the time the project would take to implement.
8. What is the difference between data and information?
-data are unprocessed facts whereas information are processed facts (data put
into context) [2]
(b)Describe the difference between validation and verification
-validation means a check done by a computer on the reasonableness and
completeness of data whereas verification is a check on transcription errors
done by a human being [4]
9. A company uses e-mail to communicate with its officers in different
geographical sites using WAN as well as officers in the same building LAN.
(a)What does WAN and LAN stand for?
WAN: Wide Area Network [1]
LAN: Local Area Network [1]
(b)State two communication media which can be used by WAN
Any two from:
-fibre optic
-copper cables/twisted pair/telephone cables
-microwave/radio waves/radio links/UHF cable
-satellite
(ii)Give two advantages of using e-mail over conventional postal system.
Any two from:
-faster to send mail
-cheaper than post
9
Computer Science Questions & Answer
-offers 24 hour service
-offers a delivery report
-can be received anywhere
-offers multiple addressing
-enables attachments of graphics /pictures on mail.[2]
(iii)What is the use of a mail box in an e-mail?
-to store messages [1]
(iv)Why is a password necessary in e-mail communication?
-so that only authorised users can access the mail box and prevent file
corruption.[1]
10.(a)What is the meaning of the term Computer Aided Design?
-the use of a computer to produce technical and architectural drawings used
by engineers.
-the use of a computer to help in the drawing of designs from which
objects/buildings are to be constructed or manufactured.[2]
(b)Give three advantages of CAD over manual design method.
Any three from:
-drawings can be reproduced quickly
-drawings can be scaled up/down
-automatic calculation of quantities and costs of materials
-can rotate images
-offers 3-D view
-allows cropping of shapes
-pictures can be zoomed
10
Computer Science Questions & Answer
-offers a library of parts
-can be easily integrated with other packages
-easy to modify designs
(c)Give two examples of the use of CAD
-design of buildings/fitted cupboards
-design of machine parts
-design of software [2]
11. Explain what is meant by the following terms:
(i) Field
-combination of characters [1]
(ii) record
-a group of related fields [1]
(iii) database
-a collection of logically related files. [1]
(b)Buyall is a bookshop that sells a variety of books. The bookshop wishes to
keep records of these books in a database. Below are some of the fields to be
used in the database structure
ISBN NO; AUTHOR; TITLE; PUBLISHER; DATE PUBLISHED.
(i)Give any other important field that has been omitted
Any one from
-price
-quantity [1]
(Accept a reasonable field)
11
Computer Science Questions & Answer
(ii)Which field can be used as the key field when searching for
specificrecords? Give a reason for your answer.
-ISBN NO.
Reason: it is a unique identifier of a particular book
(iii)Complete the table below indicating the field type for each field including
the field you gave in b (i). The first has been done for you as an example
FIELD NAME FIELD TYPE
ISBN NO. CHAR
AUTHOR TEXT/STRING/CHAR
TITLE TEXT/STRING/CHAR
PUBLISHER TEXT/STRING/CHAR
DATE PUBLISHED DATE/TIME
PRICE NUMERIC/CURRENCY
QUANTITY NUMBER
12. The table below is a portion of a Spreadsheet showing marks of five
students.
A B C D E F G H
1 Student name Hist Sci Maths Comp French Total Average
2 Chipo 70 53 18 43 80
3 Patrick 62 82 69 71 51
4 Kesha 21 59 73 89 72
5 Mandla 50 53 19 37 59
6 Ian 75 54 51 57 43
7 Totals 278 301 230 297 305
8 Average 55.6 60.2 46.0 59.4 ***
9
(a)State the difference averages in row 8 and averages in column H
Row 8-averages subject mark [1]
Column H-Average student mark [1]
12
Computer Science Questions & Answer
(b)In worksheets /spread sheets there is a feature of automatic recalculation
which is made electronic spread sheets very popular. While inputting marks,
the capture clerk entered the mark 43 for Chipo in computer studies instead
of 63 . Which other cell or cells will be affected if this is automatically
corrected?
-G2, H2, E7, E8 [2]
(c) G7 does not show the total number but has hashes (###.....) or
esterics(***…..) displayed.
(i)Suggest a reason why the spreadsheet automatically put these in the cell.
-the cell width is too small to accommodate the length of the total [1]
(ii) How do you make the spread sheet display the total in cell G7?
-increase the column width/drag the column until the figure appears
13
Computer Science Questions & Answer
NOVEMBER 2006
PAPER 1:7014/01
1. Explain, using examples where appropriate, the meaning of the
following computer terms:
(a)Microprocessor
-an electronic chip inside a computer responsible for data processing
- a central processing unit on a silicon chip [1]
(b)Analogue input device
-a device that enters continuously varying data like sound into a
computer system eg microphone.[1]
(c )EFTPOS
-Electronic Funds Transfer Point of Sale, the payment of item purchased
by electronically moving funds from purchaser’s account to the shop’s
account.[2]
(d)Bit
-binary digit, 0 or 1[1]
(e)Sorting
-arranging of records according to a key field in a defined order, i.e
ascending or descending.[1]
(f)Merging
-means a combining two or more files /records /cells to form a single
one.(file/record/cell)
(g)Multi processing
-the use of two or more processors in a computer to process data
simultaneously [1]
(h)Information Technology
-use of computers and telecommunications systems to process data,
transmit text/data, speech, videos and other files.[1]
(i)Assembler
-a program that translates mnemonic codes /symbolic addresses into
machine code [1]
(j)Information Superhighway
14
Computer Science Questions & Answer
-facilities on the internet that enable users to have fast access to global
information resources or allow transfer of information on the World
Wide Web [2]
2.(a)Give four functions of an operating system.
Any four from:
-file management
-memory management
-resource allocation
-interrupt handling
-errors handling
-peripheral device control
-task management
-log preparation [4]
(b)Modern Operating systems use the Graphical user Interface. Explain
what is meant by Graphical User Interface.
-the communication between a user and a computer through the use of
icons, pointing devices, pull down menus.
- the communication between a user and a computer through the use of
graphic symbols/images/pictures[2]
(ii)Give three advantages of the GUI compared to earlier Disk
Operating System.
-allows multi-tasking
-offers help facilities
-easy to learn
-user friendly3]
(c) Which of the following instruction codes could be part of operating
system software as written by a programmer?
A.011100101110101
B. Print Z at LPT 1
C.LDA TOT
-C LDA TOT [1]
(ii)Give a reason for your choice
-operating systems written in low level language using mnemonic codes
-one instruction translates into one machine code instruction [1]
15
Computer Science Questions & Answer
(d)Distinguish between batch processing and real-time processing
-batch processing allows jobs to be collected over a period of time; jobs are
large, processed offline whilst real-time processing allows processing to be
done on line as transactions occur.
-batch processing is not time sensitive whereas real-time processing is time
sensitive
3.(a)What is an Expert System?
Any one from:
-a computer system programmed with the knowledge of human experts to
deliver advice in a particular knowledge domain.
-a computer system which is designed to mimic human experts in a particular
domain of knowledgethe performance of human experts on some specialised
reasoning task.
-a computer system which encapsulates the knowledge and expertise of
human experts in a particular field of knowledge
-a computer program that attempts to replicate
-a computer system that be programmed to assume some of the capabilities
normally associated with human intelligence [2]
(b)A company of Legal Practioners (Lawyers) wishes to set up an Expert
System for its clients. Describe three features that should make up such a
system.
1. Knowledge Base: a database containing facts, rules and figures about a
particular knowledge domain.
2. Inference Engine: procedure or means of using the knowledge in a
knowledge base.
3. Human Computer Interface: the communication between a user and the
expert system.[3]
16
Computer Science Questions & Answer
4. You work for A to Z Suppliers who have recently computerised their
operations. They have bought an integrated suite of applications comprising
of a Word Processor, aSpreadsheet, a Desktop Publisher and Database. All
applications can access each other.
(a)Give two advantages of integrated suite of applications
-menus and commands are common
-data can be easily exported between programs
-faster to install/need to install individual programs
-files can be linked between different programs
-cheaper than buying separate programs
(b)A to Z wish to set up a database of its clients. Describe how you would
create the database of the client names, accountnumbers, addresses and
account balances.
-log into a database application program, eg Ms Access
-set the database name
-set the table name
-declare fields (eg client name, account number etc) and their data types in the
design view of Ms Access
-Set any validation rules and field limitations
-set the primary key field eg account number
-enter details for records in the table in the datasheet view
-create any queries, reports and forms that may be required in the
database.[5]
( c) The database is stored on a hard disc. What type of file access would be
used?
-direct access [1]
17
Computer Science Questions & Answer
(d)Describe how the clients database could be used in conjunction with the
Word Processor to send the same letter to all clients with balances greater
than zero advising the clients of the balances on their accounts.
-create a query
-in the design view, in the criteria section, under balances, write the criteria >0
-view the query in the datasheet view.
-open a word processor
-copy the query you created and paste it in a word processor and use mail
merge to send the same letter to different clients.
Or
-create a query in a database for balances greater than zero as criterion
-type standard letter
-merge fields and mail merge, send the documents to printer.[3]
(e)Suggest two ways A to Z might use the Spreadsheet
-calculations of wages/payroll
-creating account statements and budgets
-statistical calculations
-profit and loss calculations
-financial analysis
-tax estimations
-create graphs /charts for data analysis
(f)Describe three features of the Desktop Publishing Package that would
make it more suitable than a word processor for producing advertising
materials for A to Z suppliers.
Any three from:
18
Computer Science Questions & Answer
-more advanced formatting of text and pictures
-variety of pictures/graphics
-more templates /formats to use
-variety of fonts
-allows for text to flow around a picture
-allows cropping of pictures [3]
5. Matetsi High School has a Local Area Network (LAN) which is used by its
students. Students login on a workstation and use software such as word
processors and Spreadsheet. They can also receive and send electronic mail
via a Service Provider. The LAN is a star network which is linked to a Service
Provider for electronic mail (e-mail) access.
(a) In the space provided below, draw a labelled diagram of the star network.
workstation
data cable
workstation Server/central computer/hub
workstation
[4]
workstation
(b)Give one advantage and one disadvantage of a star network
compared to ring network.
Advantage
Any one from:
-easier to add a new workstation
-no collision of data
-more security due to central control
-reliable-market proven network [1]
Disadvantage
Any one from
19
Computer Science Questions & Answer
-if central computer is down the whole network is down
-overburden on the central computer as all data passes through it
-more cables are needed and its costly [1]
(c ) In order to access the e-mail Service Provider a modem is required.
What is the function of a modem?
-to convert analogue data to digital data for transmission and vice versa
[2]
6. (a) List the following storage media in terms of increasing access
speed.
Hard disk
CD ROM
RAM
Floppy diskette
Answer
-floppy diskette
-CD ROM
-Hard disk
-RAM [2]
(b) List the following storage media in terms of increasing memory
capacity.
RAM
Hard Disk
Floppy Disk
CD ROM
Answer
-Floppy disk
-RAM
-CD ROM
-Hard Disk [2[]
(c ) Describe four main features of a multi-media system.
Any four from:
-sound card/loud speaker
-CD ROM drives
-High quality graphics card
-high resolution monitor
20
Computer Science Questions & Answer
-high capacity disk
-authoring software
7. Explain the purpose of the following stages in systems analysis.
Feasibility
-to determine if the proposed system is viable (TELOS), whether costs
outweigh benefits for introducing a new system [1]
Investigation
-identify the problems of the system and the root causes of the
problems[1]
Analysis
-an indepth study of the current system and a determination of
requirements for the new system.
-data collection is carried out [1]
Design
-to make a blue print of the system
-specification of new system inputs/output/flowcharts drawn
-create user in interface [1]
Implementation
-to put the new system into place
-testing of programs, buyingequipment, trainingusers, stalling hardware
-putting system into use [1]
Review
-an assessment/evaluation of the system, evaluating its performance in
relation to set objectives [1]
8. Some students at Zim Research College wish to count the number of
cars passing through a bus street at night and simultaneously monitor
the sound level in the street. They decide to use data logging
techniques for this study.
(a)Identify suitable sensors that the students could use.
-Weight sensor
-pressure sensor
-proximity sensor
-sound sensor
-light sensor [2]
21
Computer Science Questions & Answer
(b)Describe the procedure the students would carry out
-connect e,g light sensor and sound sensor along the roadside
-sensors will be recording data each time a car passes on the roadside
-specify the logging period and the interval
-display the data on a list on the screen
-save the data for use on disk.
9. The rapid growth of Information Technology and computers have
also given rise to computer crime.
(a)Describe the following crimes.
(i)Hacking
-illegal/unauthorised access to data files on someone’s computer by
cracking passwords.[2]
(ii)Computer Fraud
-use of computers to illegally transfer funds electronically from one
account to another.[1]
(b)Suggest three measures, other than physical ones, which an
organisation might take to prevent unauthorised access to important
data.
Any three from:
Measure 1: dataencryption: scrambling data before transmission,
rendering it unreadable to someone who does not have the decryption
key.[1]
Measure 2: Use of firewalls: a combination of hardware and software
that filters content coming into a private network.[1]
Measure 3: Use of user names and passwords: ensures that only
authorised users who know company passwords can access computer
systems.[1]
Measure 4: restricted access to files (access rights)[1]
Measure 5: Biometric security measures: use of physiological
characteristics such as finger prints, iris recognition, face recognition.[1]
( c) Computer criminals may also write and spread computer viruses.
Suggest two precautions to prevent infection of computers by viruses.
Any two from:
Precaution 1: use of antivirus software
Precaution 2: inoculation of files
22
Computer Science Questions & Answer
Precaution 3: use of firewalls
Precaution 4: avoiding downloading e-mails/files from unknown sites
Precaution 5: scanning secondary storage media before use
10.(a)In programming , a repetition may be achieved using a
REPEAT…UNTIL loop or WHILE…DO…….ENDWHILE programming loop.
Explain the difference between the two programming loops.
-Repeat….Until loop is executed at least once since it tests the condition
after the loop, after at least a single execution whereas a while…do…end
while loop may never be executed because the condition is tested at
the beginning of the loop.[2]
(b)When a card is inserted into an ATM (Automated Teller Machine) at
Zim People’s Bank, the owner is required to enter a 9-digit Personal
Identification Number (PIN). A check number is stored on the card and
can be read by the ATM when the card is inserted. A student suggest
the following algorithm to test the validity of a PIN.
Set flag to true
Set count to 0
Set total to 0
Read check number on card
WHILE count is less than 9
DO
Input a digit
Read digit
Add digit to total
Add 1 to count
END WHILE
If total equals the check number THEN
Set flag to true
ELSE
Set flag to false
END If
If flag is true THEN
Process transaction
23
Computer Science Questions & Answer
Eject card
Else
Retain card
END IF
(i)What is the relationship between the check number and the PIN?
-check number is the sum of digits in PIN [2]
(ii)Dry run this algorithm for the following two cards when they are
inserted into the ATM and determine the output for each card giving a
reason for your answer.
CARD 1: PIN 2 8 3 7 4 6 5 5 3
CARD 2: PIN 9 8 7 6 8 7 8 9 1
Output for card 1
Process transaction and eject card [2]
Reason: sum equals 43 which is the check sum [2]
Output for card 2
Card retained/card rejected [2]
Reason: sum is not equal to check sum [2]
(c )(i) Explain why this algorithm is not 100% efficient in checking the
PIN entered.
-the digits may be interchanged and still works (does not test for
transposition)
(ii)Suggest how you might improve the algorithm to make it more
efficient.
-use the modulus 11 method which is a more efficient method for
calculating check digits[2]
(iii)In real life, an ATM gives the card holder a maximum of 3 chances
to enter a PIN correctly otherwise it retains the card on the third wrong
attempt. Re-write the algorithm in pseudocode so that it gives the user
three chances to enter the PIN correctly before it retains the card.
Start
Read check number from card
Set error count to 0
Set flag to true
24
Computer Science Questions & Answer
WHILE error count is less than 3
Set count to 0
Set total to 0
WHILE count is less than 9
Input a digit
Add a digit to total
Add I to count
END WHILE
IF total equals check number
Set flag to true
Set error count to 3
ELSE
Set flag to false
Add 1 to error count
END IF
END WHILE
IF flag is true
Process transaction
Eject card
END IF
Stop
25
Computer Science Questions & Answer
NOVEMBER 2007
COM PUTER STUDIES 7014/01
1. Explain the meaning of these computer terms.
(a) debug
-to locate and correct errors in a program [1]
(b) Computer fraud
-money –related crime committed with a computer [1]
( c)File generations
-grandfather-father –son files
-these are new master files which result after updating files by copying (at
most 3 generations are kept)[2]
(d)Random access
-means retrieving records by going directly to a record (direct access)
-retrieving a record by referring to its address directly in memory [2]
(e) byte
-combination of 8 bits in any order
(f)Polling-checking of peripherals/terminals by the processor to determine if
they need processor attention.
-automatic checking of peripherals/terminals to determine their readiness to
receive or send data.[1]
(g)Assembler-a program which converts assembly language into machine code
-a translator which converts assembly language into machine code [2]
(h)Rogue value-a value used to terminate a procedure, not acted upon by an
algorithm
-a value used to terminate further data entry into a procedure [1]
26
Computer Science Questions & Answer
(i) Macro
- a sequence of instructions that are executed under a single stroke[1]
(j)Control character-a character which sends a signal to alter /interrupt the
sequence of operations
-send during transmission of data [1]
2. In the following algorithm, INT (a) retains the integer value of a whole
number of part a.
e.g if a=3.5 then INT(3.5) which is 3 and if a=6 then INT(a) is equal to INT(6)
which is 6.
Read this algorithm.
Input number
While number <> 0 DO
Num=number/2
b=INT (num)
c=num-6
r=c*2
number =b
END WHILE
Print r(counter 6), r(counter 5),r(counter 4),r (counter3),r(counter 2),r(counter
1)
N.B Print r(counter 6) will print the value of r at counter 6.
27
Computer Science Questions & Answer
(a)Dry run this algorithm using the grid below, using 9 as the number input.
Number Num b C R counter
9 45 4 0.5 1 1
4 2 2 0 0 2
2 1 1 0 0 3
1 0.5 0 0.5 1 4
0 5
6
Counter 6 Counter 5 Counter 4 Counter 3 Counter Counter 1
2
[4]
(b)Explain the purpose of this algorithm.
-to convert a number to binary (0s and 1s) [1]
3. Explain two uses of computers in each of the following fields.
(i)Education
-research
-keeping students records
-Computer Based instruction/Computer Aided Learning.
-E-learning
-E-marking [2]
(b) Tourism
-keeping records of tourists
-Advertising-information
-bookings
-communication with tourists (e-mail).
28
Computer Science Questions & Answer
(iii)Agriculture
-greenhouses
-records keeping (agricultural records for farms)
-research
-payroll
-agricultural expert system
[2]
NB.One-word answers not permitted.
4(a) State two main differences between control systems and automated
systems
Control systems automated systems
-act on broad tasks -dedicated to a particular task.
-allow user interaction -do not allow user interaction
-lacks the ability to collect & analyse data-can collect and analyse data
(b)Many computer controlled devices are activated by sensors. Write down
the types of sensors that might be used to.
(i)switch on lights when it is dusk,
-light sensor/photo sensor/darkness sensor [1]
(ii) activate traffic lights when cars approach a junction
-pressure/distance/contact/proximity/movement sensor [1]
(c ) The traffic light system of a large town is to be computerised. The lights
at many junctions are to be controlled by a single central computer.
Suggest two benefits that introduction of the system would have.
-enables better synchronisation
29
Computer Science Questions & Answer
-speed of traffic can be controlled
-traffic distribution can be monitored and controlled
-pedestrians waiting to cross the road can be fitted on with traffic flows[2]
5. (a) State any four components that make up computer hardware (each
component should be functionally different from the other)
(i) input device e,g mouse[1]
(ii)Processing device e.g CPU (Central Processing Unit)[1]
(iii)Storage device e,g magnetic disk[1]
(iv)Output device eg monitor [1]
(b)Name any two storage devices suitable for back up in a bank. Explain why
you think they are appropriate.
Device
-magnetic tape
Explanation
-cheap
-higher storage capacity [2]
Device
-optical disk/zip disk/hard disk
Explanation
(if choice is hard disk)
-robust
-offers direct access which offers fast access to records
30
Computer Science Questions & Answer
6. (a) Explain any three uses of the internet
(i) communication (e-mails) where messages are transmitted from one use to
the other electronically
(ii)E-commerce; buying and selling over the internet
(iii)File Transfer (downloading files)
(iv)Entertainment-music, videos, internet games etc
(v)Research (through search engines)[3]
NB.Only three uses were required.
(b)The internet is widely used in schools.
(i)Give one problem or danger which might occur when pupils have
unsupervised access to the internet
-access to unsafe sites-cultural erosion (e.g. pupils can view pornographic
images)
-some pupils might download some viruses [2]
(ii)How can this problem or danger be prevented?
Any one from:
-ensuring strong supervision
-making use of anti-virus software
-setting security levels[1]
( c) The IT. Teacher often changes her password to log onto the internet.
(i)Give one reason why the teacher should change her password regularly.
-to reduce the chances of students/other people guessing/knowing her
passwords [1]
31
Computer Science Questions & Answer
(ii)When changing the password, the IT teacher must type it in twice before
the computer accepts the new password. Why does she have to type the new
password in twice?
-to verify if the password was typed correctly/confirm the new password [2]
7. A school administration system uses a students database file which
contains information on students.
(a)Name four fields you would expect to find in the students database file,
one of these fields must be a key field.
Field 1: student ID/student number/ID number
Field 2: student name/surname/address/next of kin
Field 3: student surname/sports house, sex
Field 4: class/club/date of birth [4]
NB: STUDENTS TO CHOOSE ANY FOUR FIELDS THAT INCLUDES A PRIMARY
KEY FIELD.
(b)Give one reason why the school would need to
(i) modify a record
-if a student transfers/dies/is expelled from school/changes address
[1]
(ii) add a record to the database file
-if a new students joins the school[1]
( c) (i) Give two advantages of using a computerised school administration
system
(Advantage1, advantage 2)
-reduces data duplication
-reduces data redundancy
32
Computer Science Questions & Answer
-maintains data integrity
-easy access to stored data
-easy to search records [2]
(ii)Other than the cost of hardware and software, give two problems that
might occur when introducing a new computerised system (problem 1,
problem2)
-resistance from staff
-need for training maintenance costs
-increase in overhead costs, eg electricity [2]
8. (a)A typical business microcomputer stores all its software and data files
on a hard disk. It also has a floppy disk drive. List four different reasons why
the floppy disk drive may still be needed.
Any four from:
-to copy new software/restore software on hard disk
-to try out sample software
-to transfer information from one computer to another
-to restore data from back up copy
-to make back up copies of data [4]
(b)(i)Describe briefly the operation of a bar code reader
-the bar code reader scans commodities by light/laser beam; the sequence is
converted into a binary pattern which is the passed onto the computer and
interpreted. [2]
(ii)List four items of information represented on bar codes
-product/item code
-manufacturer code
33
Computer Science Questions & Answer
-country of origin code
-check digit [4]
9.(a) “Hacking” is where someone gains illegal access to a computer system.
This is usually done using a remote terminal or microcomputer.
Describe three ways in which computer hackers might do more harm than an
office burglar.
Any three from.
-delete/corrupt/change software
-transfer funds fraudulently from company accounts
-expose/sell company’s secrets/confidential information
-planting of viruses
-encryption/changing of passwords [3]
(b)(i) List four symptoms which may indicate a possible virus attack
Any four from:
-programs take long to load
-accessing the hard disk takes a long time
-files disappear, strange files appear
-irritating/strange error messages appearing
-executable files change in size
-hardware malfunctioning
-failure to boot (bad sectors on hard disk)
-difficulty in opening /closing files
-may restart continuously/unnecessarily
-difficulty in opening/closing files
34
Computer Science Questions & Answer
-unexplained memory usage on hard disk (disk full)
-drive lights come on without reason.
(ii)List four ways of preventing virus attack
Any four from
-inoculate files
- use memory –resident anti virus
-use disks from reputable sources/companies
-write –protect disks
-avoid downloading software from unknown sites
-use of firewalls
-avoid pyrating of software
-scan disks before use. [4]
10.Many countries have data protection legislation. Recommend three rules
for the legislation.
Any three from
-personal data must be processed and obtained fairly and lawfully
-personal data must be held for specified purposes
-personal data must be kept accurate and up to date
-personal data must not be kept longer than necessary
-personal data must be kept secure [3]
35
Computer Science Questions & Answer
(b)A clothing shop keeps information about its products on a computer file.
Part of the computer file is shown below.
Style Description Size Colour Number Price
Chinese Collar 3 piece suite 70 B 0025 $250 000
Sleeveless Printed T-Shirt 24 W 0026 $30 000
Sabrosso Blue Jeans 38 B 0027 $200 000
Kello Shirts 16 R 0028 $60 000
Tangello Formal Trousers 41 G 0029 $70 000
Sauyo Cap 12 B 030 $12 000
(i)The colour has been coded B=Blue,R=Red etc. Give two advantages of
coding data
Any two from
-saves time when entering data/ensures fast data entry
-reduces typing errors
-saves storage space
-provides secrecy of data
[2]
(i)Give one reason why only using one letter for the colour code could create
a problem.
Any one from
-some colours begin with the same letter (eg Blue,Black)
-one may run out of colours[1]
(iii)Some of the fields in the clothing file are of fixed length, while others are
of variable length.
Give one advantage of using fixed length fields
Any one from
-easy to update
-easy to estimate file sizes accurately
36
Computer Science Questions & Answer
-faster to search for a records
[1]
(iv)Give one disadvantage of fixed length fields
- leads to truncation of data
-wastes space on secondary storage medium if fields are short than that
declared
-[1]
11. Computer hardware can be linked to form networks. Give two
advantages a network has over stand alone computers (advantage 1,
advantage 2)
-users can share expensive resources (printers, software, and data)
-users can communicate (e-mails, work groups)
- it is easier to set up new users ad equipment
-it is easier to back up data held on a server than on many individual machines
-it is easier to store application programs on one computer and make them
available to all users rather than having copies individually installed on each
computer. [2]
(b)LAN and WAN are two different types of networks. What does LAN and
WAN stand for?
LAN: Local Area Network
WAN: Wide Area Network [2]
(c )Give the main difference between a LAN and a WAN
-LAN covers a small geographical area e.g. office, building, same site whereas a
WAN covers a wide geographical area e.g. countries, cities
-LAN uses cables for communication whereas LAN uses radio links, satellite,
microwave etc.[2]
37
Computer Science Questions & Answer
( d) Networks create security concerns because of the increased number of
users sharing the system. Give three ways of making a network more
secure.(way 1,way 2,way 3)
Any three from
-use of user names and passwords
-data encryption during transmission
-firewalls
-setting access levels/access rights [3]
( e)Name one item of hardware that is required to connect a computer to a
LAN
Any one from
-Network Interface Card
-Network Adapter
-Cables
[1]
(f)Name an item of software that is required to connect a computer to a
WAN
-web browser
-communication software [1]
38
Computer Science Questions & Answer
NOVEMBER 2008 PAPER 1:7014/01
1. By giving examples in each case, explain the meaning of the following
computer terms:
(a)Simulation
-the use of a computer based model to represent a system/phenomenon.[1]
-any valid example, eggs virtual aircraft/aircraft flight control/model of a
physical situation.
(b)Expert system
Any one from:
-a computer system which is designed to mimic human experts in a
particular domain of knowledge
-a computer system which encapsulates the knowledge and expertise of
human experts in a particular field of knowledge
-a computer program that attempts to replicate the performance of human
experts on some specialised reasoning task.
-a computer system that be programmed to assume some of the
capabilities normally associated with human intelligence [2]
(c )Rogue value
-an unusual value/out of range value/abnormal value
-value used to terminate a loop /show end of data input [2]
(d)Intranet
-as network of computers within the same organisation
-that uses same protocol as the global internet’s
-a local area network providing internet facilities within an organisation using
internet protocol
[1]
39
Computer Science Questions & Answer
(e)Multimedia system
-computer system with sound, text, graphics, video, animation and
CDROM/DVDROM, CD WRITER
-the integration of text, sound, video, graphics and animation into a single
system [2]
(f)Technical documentation
-details about the program designed for fellow programmer
-enables changes to be made to program/debugging
-explanation about what the program does/how the system operates and is
meant for fellow programmers and systems analysts.[2]
(g) Electronic conferencing
-several people at remote locations engage in live video discussions/debates,
using the internet/WAN [2]
2. A refrigerator is a household item that contains a microprocessor
For this processor’
(i) state the input
-temperatures[1]
(ii) describe the processing,
-calculating
-comparison with set/optimum temperature [1]
(iii)state the input
-switches on/off[1]
(b)State two other household items that contains a microprocessor
-toaster sandwich maker
-kettle
40
Computer Science Questions & Answer
-microwave/oven
-washing machine [2]
3. Give three points to consider when choosing a programming language to
use.
-easy to use
-if language is well structured
-self documenting
-good run time diagnostics
-input, output facilities
-utilities/libraries
-portability
-speed of execution [3]
4. Last year Muchabaiwa High School stored their examination marks on a
computer. At the end of the year, some pupil’s examination marks were
wrong when printed out. To try to stop this from happening again, the
computer teacher has decided to use data validation and verification.
(a)With reference to the above, explain what is meant by
(i) data verification
-checking input data for transcription errors by entering data twice or
comparing the source with destination
-checking for transcription errors and is done by a human being.[2]
(ii) data validation
-checking input data by a computer program to ensure that data is suitable or
realistic for the task at hand.
-checking that data is reasonable in the context in which it is used and is done
by a computer program [2]
41
Computer Science Questions & Answer
(b)Explain how each of the following methods of data validation could be
used in this situation.
Range check
-to ensure marks are within the correct boundaries/demarcations e,g between
0 and 100[1]
Presence check-to ensure that marks are entered [1]
Type check-to ensure that data entered is correct. [1]
5. The systems development life cycle can be broadly categorised into
different stages. One of the stages is the analysis stage.
(a)List any four stages other than the analysis stage
-problem identification/preliminary study
-investigation
-design
-development
-implementation
-feasibility study
-review/maintenance
(b)Describe the analysis stage
-defining requirements for the system
-data collection (using questionnaires interviews etc)
-data flow diagram drawing
-evaluating alternative solutions
-selecting hardware and software for the system [4]
42
Computer Science Questions & Answer
6. A computer program to find the sum of integers 1 to 20 can be written in
three different languages A, B, C as illustrated below:
LANGUAGE A LANGUAGE B
BEGIN 0100000000000000001010
Number=20 11100000000000000001010
Total =0 00000000000000010110111
WHILE NUMBER <> 1 000100000000000000010100
DO 101000000000000000010100
Total=total +number 101100000000000000000000
Number =number -1 10000000000000000000000
ENDWHILE 10001000000000000100000
100010110001100000000000
011111111111111111111111
LANGUAGE C 100010001000100010000000
100000100000000000000000
BEGIN 010001000100010000100010
NUM10101 0000000000000000000000001
TOT 0000 0000000000000000000000000
ACC,C
STA TOT
LDA NUM
43
Computer Science Questions & Answer
A JAZ B
ADD TOT
STA TOT
LDA NUM
ACC, S,1
STA NUM
JPU A
B HLT
END
(a)Classify the languages as high level language, assembly language or
machine code.
(i)High Level Language-A [1]
(ii)Machine Code- B[1]
(iii)Assembly Language –C[1]
(b)(i)Name a program that can translate the entire code of language A to the
code of language B at once
-compiler [1]
(ii)Name a program that can translate the code of language C to the code of B
-assembler [1
(c)Give one reason why operating systems software and computer games are
written in assembly language than in a high level language.
Any of:
-assembly language is closer to machine, there is s one to one relationship
between assembly language and machine
-runs faster
44
Computer Science Questions & Answer
-secure as few people know it[1]
(d)Give two disadvantages of assembly language compared to a high level
language.
-machine specific/not portable
-difficult to learn/to program
-much longer [3]
7. Most computer systems have primary storage and secondary storage
(a)Give two limitations of primary storage which makes secondary storage
necessary
-primary storage does not have a very high storage capacity which may be
required by a computer
-primary storage is volatile as compared to secondary storage
-primary storage is expensive as compared to secondary storage
[3]
(b)Explain how ROM differs from RAM
RAM ROM
-Volatile -non volatile
-re-writtable -not rewritable
-Temporary -permanent [2]
8. Tinashe has seen some cheap movie tickets using the teletext service on
his TV. He is advised to use e-mail 9electronic mail) to order his tickets.
(i)Why could Tinashe not order the movie tickets using the Teletext service?
-teletext is one way (can only receive but cannot send)
(ii)What is electronic Mail?
-message sent from one computer to another electronically [1]
45
Computer Science Questions & Answer
(iii)Give two reasons why Tinashe used e-mail instead of posting the order.
-e-mail is faster
-e-mail is cheaper than letter post
-weight less
-can incorporate pictures and videos
-large volumes of data can be sent by data compression
-can receive mail from any part of the world
-offers 24 hour service [2]
(b)The following flowchart is used for calculating the cost of sending a
telegram
start
N>10 Y Cost=$100 000+(N-10)*$5000
Cost=$100 000
OUTPUT COST
Stop
46
Computer Science Questions & Answer
(i)Write down the output for each of the following inputs [4]
INPUT OUTPUT
4 $100 000
12 $110 000
10 $100 000
15 $125 000
-1 mark for correct item
(ii)Give one advantage of using a flowchart as a program development tool
-easier to follow
-breaks down the problem into smaller components [1]
(iii)Describe two different types of test data that should be used to test the
program when it is written
-standard[1]
-extreme [1]
-abnormal [1]
9. An electronic motor –driven robot navigates its way through a maze by
always following the left wall. The robot is controlled by a microprocessor.
The microprocessor sends control signals to the robot’s motors depending on
the input from sensing detectors suitably attached to the robot. The diagram
below shows the top view of the maze. The dashed line shows the path to be
followed by the robot R from start S to finish F.(See next page)
47
Computer Science Questions & Answer
(a)Name two components of a microprocessor
-control unit (CU)[1]
-arithmetic logic unit (ALU)[1]
(b)State two sensors which could be used to detect a wall
Any two from
-distance sensor/proximity sensor [1]
-infrared sensor /light sensor [1]
-pressure sensor/touch sensor [1]
(c )Explain how the robot is always is always able to follow the left wall
-robot sends signals continuously to the left wall [1]
-sensor received the reflected signals and sends to a microprocessor
-sensor senses distance from wall and sends to microprocessor [1]
(d)Another microprocessor-controlled robot navigates its way through the
maze by following the right wall, Draw, on the diagram, (on page 11) a path
to be followed by this robot in moving from S to F.(to draw on the diagram)
48
Computer Science Questions & Answer
10.(a)A computer in your school computer room has detected a computer
virus.
(i)State three ways in which the computer could have acquired the computer
virus
-Infected disk [1]
-opened suspicious e-mails [1]
-through the internet [1]
(ii)Give three critical precautions against computer viruses.
-antivirus
-physical protection eg locking computer rooms
-scan disk
-scan mail
-firewalls [3]
(b)Your teacher has asked you to produce a class newsletter that will include
text and graphics.
(i)Identify the software that you would use
-desktop publishing software
-word processing software
(ii)Explain why the software you mentioned above in (a) above would be
most suitable.
-layout
-changing size of text and graphics
-ready-made layouts [3]
49
Computer Science Questions & Answer
11. The following piece of text has been created using a word processor
package. It needs to be corrected and formatted.
Computer Aided Learning In Zimbabwe.
Computer Aided Learning is used as an alternative to normal classroom
methods in most secondary schools. However, at this level students are limited
by access arrangements for computers.
This type of multi- media learning is now a very common feature of distance
education. More learning materials are on CD-ROMS.
The use of Computer based learning is on the increase in Zimbabwe. The
people are finding out that an IT training school is often more expensive than
using CAL.
Explain carefully how you would use a word processing package to perform
each of the following tasks.
(a)Underline the heading Computer Aided Learning in Zimbabwe
-highlight the heading
-click the Bold Icon on the formatting Toolbar [
(accept an reasonable variation, e.g. short cut keys)
(b)Insert page numbers on the document without entering each one
separately.
-click insert on the menu bar
-choose page numbers from the drop down sub menu
-specify the position and alignment of the page numbers
-choose the numbering styles
50
Computer Science Questions & Answer
-click ok to finish [2]
(c )Align /justify all text, except the heading, on both the left and the right.
-highlight all text
-click the justify icon on the formatting toolbar [2]
(accept reasonable variation)
(d)Move the first paragraph to the end of the document
-highlight the first paragraph
-click edit on the menu bar
-choose cut from the drop down sub menu
-position the cursor at the end of the document
-click edit on the menu bar and choose paste from the drop down submenu[2]
(accept reasonable variation, e.g. use of short cut keys.
(e)Divide paragraph 2 in two columns
-highlight paragraph 2
-format on the menu bar
-choose columns from the drop down sub menu
-specify the number of columns (2)
-click on ok to finish [2]
(accept any reasonable variation)
51
Computer Science Questions & Answer
A B C D E
1 2001-2002 2002-2003 2003-2004 2004-2005
(forecast)
2 October 356 200 286
3 November 421 325 214
4 December 524 505 568
5 January 125 138 89
6 February 561 702 735
7 March 521 562 547
8 Total
12.The following rainfall table for a town in Zimbabwe was created using a
spreadsheet.
(a)Write a formula in cell B8 to calculate the total for the 2001-2002 season
Any one from:
-=sum(b2:b7)
Or =b2+b3+b4+b5+b6+b7 [2]
(b)Explain how you would copy the same formula from cell B8 to cells C8,D8
and E8
-select cell B8
-choose copy option
-highlight cells C8 to E8 and select paste
Or select cell B8
52
Computer Science Questions & Answer
-use autofill and drag to E8[2]
( c) There are no rainfall figures for column E,the figures are to be obtained
by averaging rainfall for the previous 3 seasons. Write a formula in cell E2 to
achieve this.
=average (b2:d2)
Or =sum (b2:d2)/3
Or =(b2+c2+d2)/3[2]
(d)Explain how you would insert a graph to show the rainfall pattern for the
2001-2002 season.
-high light A1:B7
-click on insert and select chart on the chart icon
-follow steps [2]
53
Computer Science Questions & Answer
NOVEMBER 2009 PAPER 1:7014/01
1. By giving suitable examples in each case, explain the meaning of the
following computer terms.
(a)Electronic Commerce
-buying and selling on the internet [1]
(b) Turnaround document
-an output document which has details added to it and then used as an
input at a later stage
-eg electricity bills, water bills, multiple choice answer sheets, cheques [1]
( c)Gigabyte
-1 billion bytes
1024MB[1]
(d)Multiprogramming
-running two or more programs concurrently on the same machine.
-the concurrent execution of two more or more programs
-the operating system allocates program a small amount of processor time
(quantum) before moving on to the next.[1]
(e) Desktop Publishing
-an extension of word processing which offers advanced editing and
formatting features[1]
(f)Interrupt
-a signal from a source or device seeking the attention of the processor eg a
keyboard key pressed generates an interrupt.
54
Computer Science Questions & Answer
-a signal generated by an event that alters the sequence in which a
processor executes instructions, anotherexample hardware, hardware
failure.1]
(g)Spooling
-a technique used to speed up communication between devices which
operate at different speeds
-data from the processor is written to a faster access storage device being
released to a slow output device eg printer.
(Means simultaneous peripheral online[1]
(h)End –User
-people who use computers
-final users of an application or system
-final users of a program or an application1]
(i)Hardcopy
-printed output
-printed, permanent output on paper.[1]
(j)Icon
-a small picture /graphic/image representing a command or piece of
software/file [1]
(k)Software Piracy
-illegal copying and selling of and buying of copyrighted software without
proper certification [1]
2. File access in a system can either be random or sequential.
(a)Define Random Access
-means direct access to data where one can go straight to a record eg on
disk
55
Computer Science Questions & Answer
-means retrieving a record by referring to its address directly in memory [1]
(b)Distinguish between sequential and serial access
-sequential access is where records are retrieved according to their primary
key sequence and records are sorted whereas in serial access, records are
retrieved by reading item by item, following the order in which they are
stored on a secondary storage medium. [2]
3. Give any six functions of the operating system.
-memory management
-file management
-peripheral device control
-interrupt handling
-maintaining security by checking user ids and passwords
-multitasking
-multiprogramming
-multi-access [6]
4. Doctors use expert systems to help diagnose patients’ illnesses.
(a)Explain what you understand by the term “expert system”
Any one from:
-A computer program designed to perform the functions of human experts.
-a computer system which is designed to mimic human experts in a
particular domain of knowledge
-a computer system which encapsulates the knowledge and expertise of
human experts in a particular field of knowledge
56
Computer Science Questions & Answer
-a computer program that attempts to replicate the performance of human
experts on some specialised reasoning task.[2]
(b)Give any three advantages of using an expert system.
Any three from:
-takes less tine to solve a problem
-it has more expertise than one human expert
-it is permanent
-it is cheaper as it does not need to be paid wages /salaries
-conclusions are based on pure logic, no emotions come into play.
[3]
( c) Give one disadvantage of using an expert system.
-initial set up costs are high
-considerable training is required to use the system
-lack common sense
-leads to de-skilling
5(a) Describe any three differences between high level and low level
language.
High level low level
-problem-specific -machine specific
-Easier to learn -difficult to learn
-may consists of English like statements -may consists of mnemonic
codes[3]
57
Computer Science Questions & Answer
(b)Operating systems are written using low level languages; explain any
reason why operating systems are written using in low level language.
-it is machine specific
-it is closer to machine language.[1]
-offers more security since it is difficult to learn
(c)Students at school are usually taught using high level programming
languages; explain why students are first taught to write programs in high
level languages.
-high level languages are easier to learn
6. The following algorithm is used to grade students’ marks for an
examination using the following grading scale.
80-100 Distinction
70-79 Credit
50-69 Pass
0-49 Fail
1. Initialise variables
2. While mark <>999
3. Input mark
4. If mark >80 and mark <=100 THEN
5. GRADE is Distinction
6. END IF
7. IF Mark >70 and mark <=80 THEN
8. GRADE IS CREDIT
9. END IF
10.IF Mark >50 and mark <=69 THEN
11. GRADE is pass
12.END IF
13.IF mark >0 and mark <=50 THEN
14. GRADE IS FAIL
15.END IF
58
Computer Science Questions & Answer
16.END WHILE
(a)In the table below, dry run the algorithm using the following test
data. Where there is no output indicate “no output”
Mark Grade
45 Fail
80 Credit
75 Credit
90 Distinction
70 No output
50 Fail
999 No output
[3]
(b)The algorithm has an error. What is the problem with the algorithm?
Identify any error in the above program.
-it does not show output for boundary values [1]
(c)Rewrite the algorithm showing how the error can be corrected.
If mark>=80 and mark<=100[1]
7. Give one example of the use of each of the following:
(a)(i)Joystick
-playing computer games
(ii)Magnetic ink character reader(MICR)
-clearing cheques in banks
(iii )optical mark reader(OMR)
-marking multiple choice examinations papers.
59
Computer Science Questions & Answer
( b)Name one way in which words can be input to a computer other than
by a keyboard.
-scanner
-voice commands
8. An operating system is a program.
(a)Give four tasks carried out by an operating system.
-memory management
-file management
-peripheral device control
-interrupt handling
-maintaining security by checking user ids and passwords
-multitasking
-multiprogramming
-multi-access [4]
(b)Name an application that makes use of batch processing.
Any one from
-payroll
-electricity billing
-water billing
-gas billing [1]
(c )What is meant by real time processing?
-a type of processing in which data input to the system must be processed
immediately to influence an on-going task.[2]
60
Computer Science Questions & Answer
(d)Name an application that uses real-time processing and explain why it
is the most appropriate.
-airline reservation
-hotel reservation
-booking systems for theatre
-nuclear reactor safety systems
-chemical process control.
Reasons
In each of these systems, results are required immediately to influence an
ongoing task.[2]
(d)Micro computers can carry out multi-tasking. What is meant by
multitasking
-means carrying out more than one task on the same machine at the same
time.[1]
9. A group of tourists from Zambia and China has been requested to
produce a flyer with details and photographs of all of the most popular
tourist attractions in Zimbabwe.
(a)Which software would be the most appropriate in the production of
the flyer and justify your answer.
-word processor/desktop publishing
Reason
-it has advanced formatting features
(b)State three devices that can be used to input photographs into the
computer.
-digital camera
-scanner
61
Computer Science Questions & Answer
-web camera
-mobile phone fitted with a digital camera [3]
(c )Explain how you would move a picture from one file to another
-Click on the picture to highlight it
-right click while pointing on the picture and choose cut from the drop
down sub menu
-open the file in which you want to move the picture to.
-right click and choose paste from the drop down sub menu [3]
10.A school keeping students records on a computer is concerned about
the security of students’ data from illegal access.
Explain any three sensible ways in which the data can be protected from
illegal access.
(i)-use firewalls
(ii)-use of user ids and passwords
(iii)-physical security measures on computer installations,eg use of locks
-use of biometric security measures
-restricted access to computer installations [3]
(b)The school is located in an area susceptible to power failure. State any
one measure the school can apply to protect the data loss due to power.
-using uninterruptible power supply (ups)
-using alternative power sources such as generators [1]
62
Computer Science Questions & Answer
(c )(i)Apart from hacking and power failure, students’ data can be lost in a
number of ways, suggest any two ways in which the student data can be
lost.
-viruses[1]
-intentional deletion by hackers [1]
(ii)For each of the two ways you named in (i) above, suggest one method
of preventing data loss.
1. Loss through viruses
prevention
-use anti virus software
2. Corruption of data
Prevention
-use of back up.
11. An information system for students enrolling into a school is to be
designed. The information system will keep the following details about
students: surname, first name, sex, date of birth, class, address, telephone
number, club, sport.
(a)Design an input screen layout for this system
See next page.
63
Computer Science Questions & Answer
INPUT FORM FOR A STUDENTS ENROLMENT SYSTEM
surname
First name
sex
Date of birth
class
address
Telephone number
class
sport
(b)The systems analyst wants to use the surname as the key field.
(i) Explain what you understand by the term key field
-a field which uniquely identifies a record [1]
64
Computer Science Questions & Answer
(ii)Explain why the surname filed may not be a sensible field to use as a
key field
-it identifies a group of records, it does not identify a record uniquely [1]
(iii)Suggest one field which can be added to the information system for
use as the key field
-student number/student ID [1]
(c) Name the stage in the systems development life cycle where the
screen layouts are prepared.
-design [1]
(d)Student information system is to be validated on entry
(i)Define the term validation
-checking that data is reasonable in the context it is being used and is done
by a computer program
-checking data for reasonableness, completeness and accuracy and is done
by a computer program.[1]
(ii)Describe any three validation checks which can be supplied on the
student data on entry.
Any three from:
Validation check 1
Range check-checking data falls within a particular range [1]
Validation check 2
Presence check-checking that all the necessary fields are present [1]
Validation check 3
Type check-checking that data conforms to a particular data type
Validation check 4
65
Computer Science Questions & Answer
Check digit check-adding an extra digit to a particular pattern of digits,
calculated from them and appended to it for validation purposes.[1]
12. An electricity Supply Authority has to bill its customers once a month.
Every month, meter readers visit each customer and fill out a meter card
which can be read by a document reader. Fig 7.0 shows the meter card
that the authority uses(diagram provided)
(a)Name the method that is used to read data from the meter cards into the
computer.
-Optical Mark Recognition [1]
(b)Explain the principle of this method of capturing data
-a beam of light is used to detect a mark/symbol at a particular position on a
document, which is then interpreted.
(c) State and explain two validation checks that the computer can carry out
on the data that has been read (check 1, check 2)
Validation check 1
-character check: to check that the account number contains only
numbers/digits and no letters
66
Computer Science Questions & Answer
Validation check 2
-presence check: to check that all the necessary fields are present eg customer
account number etc.
(d)The data on the meter card (indicated on diagram) is transferred to a
transaction file. The transaction file is then used to update the Master file.
The diagram below is part of the systems flowchart for the billing program.
sorted master
file
Update Program
Master file
Update master file print file containing
Statements
(i)Suggest three items of data that might be stored in the Master file but not
in the Transaction file.
Item 1: name and surname of customer
Item 2: stand number/address
Item 3: gender, contact details, employment details
(ii)Give two reasons why magnetic tape rather than a hard disk is used as the
storage medium in this application
67
Computer Science Questions & Answer
-offers sequential access, which is the most suitable for the application
-cheaper storage medium
-can produce back up immediately [2]
(iii)Before the update is started, the transaction file is first sorted into the
same order as that in the master file.
Explain why
-to read and compare the two records and to avoid missing other data
-faster in updating as they are of the same order
(iv)What type of processing is most suitable for this application?
-batch processing [1]
(v)Name one other type of data processing, giving an example of an
application where that processing is carried out
Type of processing: real time [1]
Example: booking systems (hotel, theatre)[1]
vi.For security against hackers
68
Computer Science Questions & Answer
QUESTON AND ANSWER MODULE
NOVEMBER 2010 PAPER 1
7014/01
1. Explain, using examples where appropriate, the meaning of the following
computer terms:
(a)Internet
Suggested answers
-a global interconnection of computer networks
-mother of networks
-interconnection of computers on a global scale [2]
(b)Hardware
-physical components of a computer e.g. mouse, keyboard
-tangible components of a computer system e.g. mouse keyboard etc [2]
( c)Electronic conferencing
-holding meetings over the internet in certain circumstances while hearing and
seeing each other e, g video conferencing [1]
(d)Control system
-a combination of components, hardware & software that controls a non-
computer equipment [1]
-the integration of a computer and other peripherals to control machinery and
plant
(e)De-skilling
-loss of work-related skill due to computerisation [1]
(f)Algorithm
-A sequence of instructions for solving a particular problem, eg pseudocode[2]
69
Computer Science Questions & Answer
(g)Compiler
-a translator that converts source code to object code in one go
-a program that converts high level language to machine code at once [2]
(h)Data Logging
-the automatic recording of physical quantities by a data logger
(i)Array
-a collection of homogenous data elements which are referred to under a
single name, e.g. an array of numbers can be declared as NUM=ARRAY [1…..N]
of numbers [2]
2. Most industries’ have now resorted to the use of Computer Aided Design
(CAD).
(a)Explain what you understand by the term Computer Aided Design.
-A computer program/system that can be used to produce technical and
architectural drawings by engineers [2[
(b)Describe any three advantages of using CAD
Any three from:
-more accurate drawings are produced
-drawing is done much faster than by hand
-has a library of parts
-offers powerful editing features e.g. adding colour
-images can be easily cropped
-images can be easily zoomed
-images can be easily rotated [6]
NB. Advantages to be described to get full marks
70
Computer Science Questions & Answer
(c)Give two disadvantages of using CAD
-causes de-skilling
-a good CAD system is expensive to set up
-requires considerable training and skill to use the system [2]
3. List three advantages and three disadvantages of speech output over
screen or printed output
Advantages
-appeals to a larger audience
-a faster way of transmitting information
Disadvantages
-those who cannot hear cannot use the system
-differences in pronunciation can cause misinterpretation
-a good speech output system is expensive to set up
-requires more powerful processors
(b)How might speech output help the following:
(i)the housewife
-by giving her some instructions on how to prepare a meal [1]
(ii)The disabled
-text to speech translators for the blind
(iii)the car driver
-warning messages:’ you are low on oil’, ‘release hand brake’ etc
71
Computer Science Questions & Answer
4. A database for a sports club contains a file of its members. Part of the file
is shown below.
Members’ No Surname First Sex Date of Birth
Name
0022 Mutanga James M 12/12/75
0018 Mhlanga Harriet F 03/04/77
0101 Nkomo Samkeliso F 08/09/74
0011 Danga James M 08/08/74
(a)Which field should be used as a key field? Explain your answer
-Members’ No[1]
-it uniquely identifies a club member(record[1]
b.Explain why it is not necessary to give the age as one of the fields
-age changes/needs continuous changing [1]
-age can be calculated from date of birth [1]
(c ) The sex of each member has been coded F or M. Suggest two reasons for
this.
Reason 1
-to ensure quicker data entry [1]
Reason 2
-to reduce typing errors
-to save memory space in memory
(d)It is decided to store members’ addresses in the database. Explain why it
would be advisable to use more than one field to store the addresses.
-address field may be too long for reports
-address may need mailing labels (will not work if single)
72
Computer Science Questions & Answer
-address line is too long/will make it difficult to make queries on the database
using the address[1]
(e)Name a device that you would use to input a photograph into the data file
-scanner
-digital camera
5. A community library in Chipinge may use a paper based record keeping
system, a convectional computer file system or database.
(a)Explain what is meant by a database
-a collection of logically related files
-a collection of related records
-an organised collection of structured data
-a system containing many different but interconnected files[1]
(b)Outline four advantages of using a database in an application such as a
library
Any four from:
-accessibility easy/faster
-reduce data redundancy
-maintains data integrity
-improves data security as enforced by a database administrator
-maintains data consistency
-easy production of reports
-easy handling of enquiries
-data is shareable
73
Computer Science Questions & Answer
-there is program-data independence
6. (a) What is an operating system
-a set of programs that directs computer operations
-a suite of programs that control the operation of a computer
-a set of programs that runs/drives a computer [2]
(b)Describe four tasks carried out by operating systems.
Any four from
-memory management
-file management
-peripheral device control
-multiprogramming
-error handling
-interrupt handling
-back up management
-start up the computer
(c ) The form of interface between the operator and the computer be either
be command line or graphical.
(i)Explain what you understand by the term graphical user interface.
-an operating system which interacts with a user through the use of
icons/pictures and clicking on menus/wimp
-the communication between a user and a computer through the use of
graphical images or symbols [2]
(ii)Describe any three advantages of using a Graphical User Interface
operating system as compared to a command line interface
-it is user friendly
74
Computer Science Questions & Answer
-offers multi-tasking
-offers online help
-faster to enter commands through clicking
-easy to use[3]
(iii)Describe any two advantages of using a command line interface operating
system
-use less memory
-faster to use once you have learnt the commands
-inexpensive hardware
-enables better security [2]
7.(a)A software company sends information to its customers by personalised
letters. These letters are created using e-mail merge facility. Describe the
process involved mail merge.
-produce the form letter/generic text
-open data source/data file and insert merge fields
-merge the form letter to the data source/data file[3]
(b)The company decides that the best method of sending mail to its customers
would be to use electronic mail. The company will connect to the Electronic
Mail Service Provider using a dial up facility through telephone lines. Name a
device that will enable the company’s computer dial to dial up to the service
provider and explain its function.
Device
-modem (modulator-demodulator [1]
Function
-to convert analogue signals to digital signals or vice versa.[1]
75
Computer Science Questions & Answer
(c )Give one advantage of electronic mail over sending ordinary letters
Any one from:
-cheaper
-faster/instant transmission
-undelivered messages returned
-offers a delivery report
-no stationery or paper used
-offers multiple addressing
-has facilities of attaching pictures and photographs
-large quantities of data can be transmitted using data compression techniques
[1]
8. Agreenhouse uses a microprocessor to monitor the climatic conditions for
plants.
(a)Name any three input devices to be used in the system.
-temperature sensor
-humidity sensor
-light level sensor
-carbon dioxide/oxygen level sensor [3]
(b)Name any two components which are controlled by the microprocessor in
the system to maintain a stable environment.
-heater
-air conditioner
-lights
-water valve [2]
76
Computer Science Questions & Answer
(c )Describe the processing to be done by the microprocessor in the system
-compares the current temperature with priest temperature
-compares the current humidity with the pre-set humidity
-compares the current light level with the pre-set light level
-compares the current oxygen /carbon dioxide level with the pre-set [3]
(d)Describe the output from the system.
-sends a signal to switch on/off the heater
-sends a signals to switch on/off the lights
- sends a signals to switch on/off the water supply
- sends a signals to switch on/off the oxygen/carbon dioxide supply.[2]
9. The spread sheet given is used to calculate weekly food costs at Mabvazuva in Wedza. It
is used to predict the effects of changing the number of animals.
A B C D E F G
1 Animal Number Cost of Preparation Number Cost of 1 Total cost
Name of food s Of Animal per Per week
Animals For 1 Cost for 1 Meals week
Meal/anim meal/anim Per
al al Week/anima
l
2 Elephan 20 $200 000 $100 000 14 $4200000 $84000000
t
3 Lion 5 $500 000 $100 000 7
4 Zebra 50 $300 000 $100 000 21
5 Crocodil 10 $700 000 $100 000 3
e
6 Leopard 5 $350 000 $100 000 3
7 Impala 100 $650 000 $100 000 21
8 Kudu 30 $400 000 $100 000 14
9
10
11
12
77
Computer Science Questions & Answer
(a)State the cell which tells you the number of leopards in the game park.
-B6[1]
(b)The Game Park gives the crocodiles to Garwe lodge in Harare. Since there
are no crocodiles in the game park, explain how you can use the spread sheet
package to delete row number 5.
-put the cell pointer in row 5
-right click the mouse button
-choose the delete option from the sub menu that comes up.
(accept any other reasonable variation)[2]
( c) The computer operator at the game park used a formula to work out the
total cost of feeding elephants per week. Write down a suitable formula he
might have used in cell G2.
=B2*(C2+D2)*E2/B2*F2
(d)Describe how a user can copy a formula in cell F2 into cells F3 to F8
-Activate cell F2
-Click on the bottom right corner of cell F2 until the pointer turns into the copy
mode
-drag the formula through cell F8(drag and fill)[2]
(e)Describe how the spreadsheet can be inserted into a word processed
letter to be sent to the National Parks.
- highlight the cells which contain data
-click edit on the menu bar
-choose copy from the drop down sub menu
-open the word processed letter
-click edit on the menu bar
78
Computer Science Questions & Answer
-choose paste [4]
10. Choose an appropriate methods of entering data for the following
situations or applications, in each case justify your answer
(a)Marking multiple choice examination scripts
-Optical Mark recognition /mark sense reader [2]
-can read shaded portions of documents.
(b)Computer Aided Design
-light pen/track ball/mouse/puck with graphic tablet
-easier to control and manipulate [2]
( c)Retail Outlet
-bar code reader/scanner/laser/magnetic stripe reader/smart card/EFTPOS,
Radio tag systems
-can read and interpret bar codes on commodities in retail outlets.[2]
(d)Getting quality coloured images into a Desktop Publisher System
-scanner/digital cameras
-device used to input graphics
(e)Reading cheques in a bank
-Magnetic ink character reader
-security/difficult to read [2]
(e) Production of a music sheet from a music keyboard
-MIDI based keyboard [2]
79
Computer Science Questions & Answer
NOVEMBER 2011
7014/01
1. What is a turn-around document?
- a document produced at one stage, has more information added/appended
to it and then used as an input at a later stage. eg a multiple choice scanner
sheet[1]
(b)Define a byte
-eight bits/ a group of bits that form a character [1]
( c) (i) Name any two peripheral devices that can be used for data input
Any two from
-keyboard
-mouse
-scanner
-MICR
-lightpen
-touchscreen
-web cam
-joystick
-OMR
-OCR
(accept any reasonable input device)[2]
80
Computer Science Questions & Answer
(ii)Describe an application where each of the input devices you have named
above can be used.
Keyboard-to type in data ad instructions [1]
Mouse –used to click on icons and menus to run programs [1]
Scanner-used to capture text or picture images
OMR –used to mark multiple choice examination scripts
MICR-used to clear cheques in banks
(Accept reasonable application of a named input device)
(d)Define the term encryption and give one reason why it is used in data
transmission.
-scrambling data before transmission
-converting data into unreadable form/scribing data/putting data into cypher
text[1]
Reason-to prevent unauthorised access/as a security measure to prevent
hackers from accessing data [1]
(e)(i)What does RAM stand for?
-Random Access Memory[1]
(ii)Give two functions of RAM
Any two from:
-acts as a data buffer
-stores contents of the screen
-stores data immediately needed by the CPU
-stores data in transit [2]
81
Computer Science Questions & Answer
(f)What does ROM stand for?
-Read Only Memory [1]
(ii)Give ay two functions of ROM
-stores boot up programs
-stores CMOS programs
-stores firmware
-stores programs essential for the normal running of a computer [2]
2. Marada High School has recently received a donation of computers. The
school’s computers are already connected to the Local Area Network. The
Head is intending to have to have the computers connected to the internet
so that he can easily communicate with his bosses and friends.
(a)State any two requirements for connecting to the internet.
Any two from:
-modem
-internet Service Provider
-web browser
-WIFI
-Telephone line/satellite/radio link/broad band/fibre optic [2]
(b)Give any two advantages that the school will have in using e-mail.
Any two from:
-provide 24-hour service
-there is fast transmission of data
-offers a delivery report
-offers multiple addressing
82
Computer Science Questions & Answer
-less costly for sending mails over long distances
-less paper work
-offers attachments of graphics/pictures [2]
(c ) Besides e-mail, state any other four facilities that will be offered by the
Internet to enhance learning or teaching at the school.
Any four from:
-chat sessions
-internet collaborative projects
-discussion forums
-search engines to research for information
-virtual library
-usenet groups
3. After connecting the school’s computers to the Internet, the head of
Academia High School was made aware that this development would expose
the computers to risks such as viruses.
(a)What is a computer virus?
-an illegal program that disrupts the operations of a computer, multiplies
itself.[3]
(b)Identify any two types of viruses that can attack a computer system.
Any two from:
-Boot sector viruses
-file viruses
-macro viruses
-trojan horses
-internet viruses
83
Computer Science Questions & Answer
-worms
-parasitic viruses
[2]
( c)Describe two ways in which viruses would eater the school’s computers.
Any two from:
-use of foreign, infected cds/flash disks/memory cards
-downloading software from the internet
-opening e-mails from unknown sites
-accessing untrusted web sites on the internet [2]
( d)Identify two precautions that the school would take to prevent or
minimise the spread of viruses into the school’s computers.
Any two from:
-install updated anti virus software
-scan foreign disks before disks
-firewalls
-buy software from authorised dealers
-inoculate files [2]
4. Chinyuke Company has decided to employ a Systems Analyst and a team
of Programmers so that they develop their own computer system rather than
rely on pre-designed systems. The following is a list of stages of a Systems
Development Life cycle.
Feasibility study
Analysis
Design
Implementation
84
Computer Science Questions & Answer
Testing
Installation
Maintenance
(a)Choose any three of the stages and briefly describe what is involved in
each stage.
Any three from
Feasibility study
-determining whether it is worth proceeding with a project or not by
considering technology, costs/benefits, time frame, how people’s working lives
would be affected etc[3]
Analysis
-an in-depth study of the current system and determining requirements for the
new system
-involves data collection techniques.[3]
Design
-making a blue print of the new system
-involves user interface design [3]
Testing
-means testing for standard, extreme and abnormal data
-a test plan/strategy is created [3]
Installation
-commissioning and putting the new system into place [3]
Maintenance
-making any modifications to the new system [3]
85
Computer Science Questions & Answer
(b) State two advantages of user-designed systems.
Any two from:
-can meet user requirements
-easy to modify
-it is cheaper to maintain
-it is cheaper to establish [2]
5. Mrs Chenungo has received a new brand of computers from her son in the
diaspora. She wants to use the computer for home use. She decided that an
operating system with a Graphical User Interface (GUI) be installed in the
computer.
(a)Using an example, define the term operating system
-a set/suite of programs that directs operations in a computer eg windows 8.
(b)State any three functions of operating system.
-memory management
-file management
-peripheral device control
-log preparation
-task management
-security by checking user ids and passwords
-multi –access
( c) State thee advantages of using GUI.
Any three from.
-User friendly
-allows multi-tasking
86
Computer Science Questions & Answer
-offers on line help
-novices can easily use it[3]
(d)State two disadvantages of GUI
-requires high resolution monitors
-usually slow to load
-occupies more RAM space [2]
6. After receiving a donation of computers, Knowledge Summit High has
decided to use one computer for administration to enter all students’
records. The school Head designed the following form to collect details of
each student. The head entered some fields and records in the form as given
below.
Student Number First Name Surname Class Date of birth
0034 Rudo Mhepo 3A1 14/07/1998
0002 Rosemary Adams 2B2 30/06/1999
0020 Chido Taona 1A1 12/02/2000
0004 Barbra Dennis Lower A 13/03/1996
0005 Panashe Sipuma Upper B 13/03/1994
(a)Define a field
-a collection of fields [1]
(b)What is a key field in a database?
-a field which uniquely identifies a record [1]
( c) In the form above, which field can be used as a key field?
-student number [1]
87
Computer Science Questions & Answer
(d)From the form above, give two fields of different data types.
Any two from:
Field data type
First name text
Class memo
Student number text
Date of birth date&time [2]
(e)Explain the meaning of a record
-a combination/collection of related fields
-a row in a database [1]
(f)How many records do we have in this form?
5[1]
(g)Define a database
-a collection of logically related files [1]
(h)List the first name(s) of students that will be displayed when the following
query is done
-panashe
(i)Give two advantages to the school for using a Database Management
System.
Any two from:
-eliminates data redundancy
-easy access to stored data
-maintains data integrity
-improved data security as enforced by the database administrator [2]
88
Computer Science Questions & Answer
7. The use of robotics within manufacturing sector is now science fact, and
not fiction.
(a)Define a robot
-a computerised mechanical machine which is capable of doing work that is
normally done by human beings
-a computer controlled machine that is sufficiently flexible to be able to do a
variety of tasks [1]
(b)State three advantages of using robots
Any three from:
-can work in dangerous/harmful environments
-can work 24 hours a day
-improved productivity
-robots do not go on strike
-can work with precision/accuracy
-can do repetitive work easily
-cheap as they do not required wages/pay [2]
(c )State two disadvantages of using robots.
Any two from:
-High cost of purchase
-can cause de-skilling
-may increase unemployment
-expensive to maintain
89
Computer Science Questions & Answer
8. Computer programs can be programs are developed in both low and high
level languages.
(a)What is meant by machine language?
-the actual zeros and ones
-machine specific
-not portable
-language understood by a computer
-machine language need not be translated.
(b)What is meant by assembly language?
-low language written in mnemonic codes/symbols
-machine specific
-not portable [2]
(c )Give two examples of software types that are developed using low level
languages.
Any two from:
-games software
-operating systems
-simulation software
(d)State three examples of 4th generation languages
-java
-visual c++
-visual basic
-HTML
-Dreamweaver
90
Computer Science Questions & Answer
-flash
-utility software
9. The following are the three basic control structures used in structured
programming.
(c)
(a) (b)
condition
condition
Name and explain the function of each programming construct shown above.
(i)Structure (a)
Sequence/Linear: involves executing one instruction after the other [2]
(ii) Structure (b)
Selection/Decision: one route is followed depending on the result of a
condition [2]
(iii)Structure ( c)
Repetition/Looping/Iteration
-involves repeatedly executing a certain group of statements until a certain
condition is met.[2]
91
Computer Science Questions & Answer
10. A student designed the following pseudocode, which he will develop into
a program to help him do a certain mathematical calculation.
START
Power=0
Number =1
WHILE Power <5
DO
Number =Number *2
Power =Power +1
PRINT Number
END WHILE
END
(a)What is the value of power at the end of the program?
5[1]
(b)Dry run the pseudocode and write down its output.
16
32
( c)What will be the output if the statement PRINT Number is placed
immediately after ENDWHILE.
32 [1]
92
Computer Science Questions & Answer
(d)Why was number initialised to zero ( 0) in the algorithm?
To have a starting value [2]
11. The SDA at Sunshine Secondary School bought 20 computers for the
school. An information Technology consultant advised them to set up a LAN
which they would later hook-up to a WAN.
(a)What does the term WAN stand for?
-Wide Area Network [1]
(b)Identify any three features of a LAN
-Network cables
-server
-hub
-covers a small geographical site eg same room, site [3]
( c) Explain the meaning of the term Electronic Scabbing?
-transfer of computer duties from striking workers in one location to non-
strikers in another location electronically using the internet.[2]
93
Computer Science Questions & Answer
NOVEMBER 2012
7014/01
1. Explain the following computer terms, use relevant examples where
appropriate.
(a)Check digit
Any one from.
-an additional number placed at the end of the original number calculated
from the other numbers e,g employee code number/account number(for
validation purposes)
-a calculated digit attached /appended to a numeric field to assure validity
when referenced in the future eg customer account/employee
number/product number in a supermarket.[2]
(b)Feasibility study
-it is a preliminary investigation of a problem used to decide whether a
solution is possible and how it may be done [2]
( c) Debugging
-means finding and correcting errors in a program e.g logic and coding
errors[2]
(d)Modem
-a communication device that translates digital data to analogue /vice versa
using telephone line/modulator –demodulator device that translates digital
data to analogue /vice versa[2]
(e)Compiler
-a program that translates a complete program into object code before it can
be executed [2]
94
Computer Science Questions & Answer
(f)Pseudocode
Any one from
-a method used to express the logic required in the solution of a problem using
English –like statements/phrases
-provides a means of expressing algorithms without worrying about the syntax
of a particular language.[2]
(g)Scrolling
-the ability to move line/pages on a screen either vertically or horizontally [2]
2. After a program has been planned, it is given a dry run.
(a)Explain the term dry run.
-the use of test data to check manually the paths through a system or
flowchart or program without using a computer [1]
(b)Name any two types of errors in a computer program
-semantic error
-syntax error
-logical error
-run time/execution error [2]
(c )Distinguish between a program and a process
-a program is a complete set of instructions that can be executed by the
computer to perform some tasks whereas a process is a task or operation that
has to be carried out within a computer system e.g editing, sorting a file[2]
3. (a)Define the term systems analysis
-A detailed investigation into the current system and a determination of
requirements for the new system
-can involve data collection procedures e.g questionnaires, interviews,
observations, record inspection etc.[2]
95
Computer Science Questions & Answer
(b)Add two missing stages to the following
1. Feasibility study
2. Systems study and analysis
3. Systems design
4. Programming
-implementation/conversion
-control and review/evaluation [2]
( c) Documentation is important to any system. Explain the terms program
and user documentation.
(i) program documentation means a complete description of the problem
-supports the use of charts, helpful notes, program listings, test data ad
expected results
-it is designed so that programmers can amend or improve the program [2]
(ii)User documentation-it is sometimes extracted from the full program
documentation
And should give user sufficient information to load and run the
program/package
-it is designed for the user and should therefore be easy to read and non-
technical
-it is overall description of the system –objectives, inputs required, processing
done and output produced [2]
(d)Describe any one changeover procedure that can be applied on a system
changeover.
Any one from:
-Parallel changeover-when the new system is run alongside the with old
system
96
Computer Science Questions & Answer
-Phased changeover-this involves changing from the old to the new system in a
number of stages rather than at once
-direct/straight/crash changeover-this is the complete replacement of the old
system by the new system at one go.[2]
-Pilot-where the new system is implemented in a certain department of the
total implementation area. Other departments will still be using the old
system.
4. A database is linked with applications by a database management system.
(a)State any four functions of Database Management System
Any four from:
-maintains data in the database by adding new records, deleting dead records
and amending records
-it provides facilities for various for different types of file processing e.g. print
reports link or merge contents
-it acts as the function of providing security for data in the database
-restart facilities after a hardware of software failure i.e back-up and recovery.
-it provides data dictionary
-it provides the creation and maintenance of data
-offers query handling/searching [4]
(b)Distinguish between a Database Administrator and Database
Management System.
-database administrator is a person responsible for supervising /maintaining
/manning vital operations on the database held on a computers whereas a
database management system is a set of programs designed to link user
applications with the database[2].
97
Computer Science Questions & Answer
( c) Give one example of a Database Management System used on micro
computers
Any one from.
-Ms Access
-Dbase
-Paradox [1]
5. (a) Name two methods of updating a master file
Method 1
-updating by copying/grandfather-father-son (file generations)[1]
Method 2
-updating is situ/in position [1]
(b)Distinguish data from information
-data are raw facts/unprocessed facts /facts not put into context whereas
information are processed facts/facts put into context [2]
( c) Name a purchase order that can be read by a computer or converted to a
machine readable form
-source document (e.g. electricity bills, gas bills[1]
(d)(i)Give three ways in which screen outputs can highlight entries
Any three from:
-colour
-bold face
-reverse video
-a blinking cursor
-underline
98
Computer Science Questions & Answer
-italics
-word art
-fonts
-animations
-highlighter [3]
(ii)State in correct order the steps taken to change font size of a word in a
document
-highlight the word
-click on the font size icon on the formatting toolbar
-make an adjustment of the font size
[3]
(Accept reasonable variation)
(e)Name the system which uses remote terminals in retail establishments to
enter data at the locations where business is transacted.
-point of (POS)
6. Identify two types of application software
-Ms Word
-Ms Access
-Ms Excel
-Corel Draw
-Power point
-Publisher [2]
99
Computer Science Questions & Answer
(b)List three components of an integrated package
-Spreadsheet
-Word Processing
-Database management system
-Presentation
-Desktop Publishing [3]
( c) Name a specialised drawing software that helps architects and engineers.
-auto cad/cad(computer aided design)
-cam (computer aided manufacture)[1]
(d)State the name given to a set of instructions that when added to an
operating system or application program can destroy the product and even
infect some files.
-virus [1]
7.(i) Explain why computer systems are widely used for process control in
industries such as the chemical industry
-computers can work for 24 hours a day
-computers can do monotonous tasks
-computers can do dangerous or unpleasant tasks
-once set up and installed, computers are economical than human beings
-faster than a human being
-computers are very fast to carry out operations
-computers can handle very complex calculations in a short space of time.
100
Computer Science Questions & Answer
(ii)Describe the organisation of such systems including the types of hardware
needed to capture and process the data.
-a computer used for chemical process control must have sensors to permit
process monitoring
-transducers to convert the information collected by the sensors into voltages
-real-time clock so that it can respond to events in real-time
-analogue to digital converters to change information to binary form[4]
8. (a) Give two reasons why the continuing Information Technology
revolution is leading to loss of jobs.
Any two from:
-computers can do jobs meant for so many people
-computers are consistent
-computers are very fast to perform operations
-computers can do work 24 hours a day
-computers do not go on strike
-computers can even operate I harmful environments [2]
(b) “In the near future, computer keyboards will be obsolete as every
computer will be capable of direct speech input”
State three disadvantages of the use of direct speech input
-any three from
-some noisy environments are not suitable for speech input
-it would be time consuming to speak eg mathematical expressions than type
them
-punctuations will be a problem
-it is difficult for the machine to identify different voices (speaker)
101
Computer Science Questions & Answer
-use of homophones eg rhyme words continuous speed
-takes more ram space
-no consistency (repeat)
-does accommodate the dumb [3]
9. Single chip computers embedded into a plastic credit card size are used to
store personal and financial records. Information can be read from or stored
on the card using special terminals.
(a)List two advantages and two disadvantages of using such cards.
Advantages
Any two from:
-a lot of information can be stored on the card
-can be kept by the holders
-easy way of having data eg medical records available wherever you are
-could be used as an identity card holding scanned photograph can be used for
purchasing
-money can be carried in electronic form and that offers more security to
customers.[2]
Disadvantages
Any two from
-might be difficult to replace
-the card could be lost or destroyed accidentally
-cannot read data without special equipment [2]
102
Computer Science Questions & Answer
(b)State any two conditions that need to be met for such cards to be widely
used.
Any two from
-the card would need to be cheap
-robust
-easily replaceable
-difficult to forge
-secure against fraudulent use
-convenient to use [2]
10. An international agency owning a large collection of photographs sells
copies to newspaper publishers. The agency decides to store a copy of the
collection on optical discs such as CD-ROM.
(a)Give two reasons why the optical disc is an appropriate medium.
Any two from:
-they store large amounts of data/has a huge capacity because of their huge
capacity they distribute software on a single disk
-it is not easily damaged
-it is not very difficult to keep
-they can be used in multi-media systems
-it can only be read from but cannot be altered
-high access speed [2]
103
Computer Science Questions & Answer
(b)State two differences between RAM and ROM
Any two from:
RAM ROM
Volatile Non volatile
Rewritable Not re-Writable
Temporary Permanent
[2]
11. State two functions of an Automated Teller Machine (ATM).
Any two from
-cash dispensing
-checking account balances
-money transfers
-payment of bills
-mini statements preparation [2]
(b)Explain any one benefit of using an ATM
(i)to the customer
-no need to wait in long queues in banks-you just use an ATM
-no need of carrying a lot of cash to make payment of bills, accounts etc
-customers can obtain money and other banking services at any time of the
day or night (offers 24 hour service)
[2]
(ii)to the bank
-the bank does not need to employ so many people
-no need for building expensive banking halls
-ATMS can be placed in public places such as supermarkets, walls of banks and
building societies [2]
104
Computer Science Questions & Answer
12. A large company uses electronic mailing system to communicate between
its offices in different geographical sites using WAN as well as between
offices in the same building using LAN.
(a)What does WAN stand for
-wide area network [1]
(b)Name two communication methods that can be used within a WAN
-telephone system
-satellite
-WIFI
-Radio
(c)Give three advantages of using an electronic mail system.
Any three form
-both parties no need to be present
-can send messages quickly to several people at once
-cheaper to send large volumes of data
-offers 24 hour service
-offers more security through passwords
-pictures can be sent
[3]
105
Computer Science Questions & Answer
13. A doctor may store patients details either on a microcomputer or on a
card index file.
Give two advantages of using a micro-computer
-Easy to amend records/update
-fast information retrieval
-records are secure [2]
(b)Give two advantages of using a card index file.
-easy to use
- a hard copy can be carried
-cheaper
-acts as back up [2]
14. A school decides to set up a database for its pupils and staff. The
database will include data on:
(i)each student
(ii) each teacher
(iii) parent and home
(iv) medical records
Give two items to be included in the database for
(a)each student
-first name
-class
-surname
-date of birth
- sex [2]
106
Computer Science Questions & Answer
(b) each teacher
-I.D Number
-first name
-address
-telephone number
-last name
-telephone number
-Next of kin
-date of joining service [2]
(c) parent and home
-name
-address
-telephone number (home, work)
-name of child [2]
(d)medical records
-doctor’s name
-telephone number
-recent illness
-special needs
-doctor’s ID Number
-Allergies
[2]
***********************the end***********************************
107