0% found this document useful (0 votes)
944 views

Computer Studies Questions and Answers - Copy

The document is a question and answer module for Computer Studies O-Level Paper 1 from ZIMSEC, covering various computer science concepts such as multimedia, computer viruses, robotics, algorithms, operating systems, and database management. It includes definitions, explanations, and examples of terms, as well as practical questions related to programming constructs and system analysis. The content is structured in a question-answer format, suitable for exam preparation.

Uploaded by

keedsavage49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
944 views

Computer Studies Questions and Answers - Copy

The document is a question and answer module for Computer Studies O-Level Paper 1 from ZIMSEC, covering various computer science concepts such as multimedia, computer viruses, robotics, algorithms, operating systems, and database management. It includes definitions, explanations, and examples of terms, as well as practical questions related to programming constructs and system analysis. The content is structured in a question-answer format, suitable for exam preparation.

Uploaded by

keedsavage49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 107

Computer Science Questions & Answer

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL (ZIMSEC)

QUESTION AND ANSWER MODULE: COMPUTER STUDIES O-LEVEL PAPER 1

7014/01

NOVEMBER 2004

1. Explain the meaning of the following terms.

(a)Multimedia

-a computer system with CD-ROM/speaker/sound


card/microphone/graphics/video/animation/text

-a computer system that combines voice, sound, text, graphics and animation
into a single system.[1]

(b)Check sum

-result of adding up all elements (bits/bytes/number) to produce a single


element to check for errors before transmission /transfer of data [1]

(c) Hacking

-illegal/unauthorised access into private files/data/information/computer


systems [1]

(d)Encryption

-scrambling data before transmission

-encoding/making data unreadable for security reasons [1]

(e )Internet

-World-wide network of computers/international network of computers

-global interconnection of computer networks.[1]

1
Computer Science Questions & Answer

2. What is a computer virus?

-A program /software which replicates/copies itself to the computer to disturb


its functionality/corrupts/interferes with a computer system. Eg boot viruses
[3]

(b)State two precautions you would use to protect your computer from
viruses at your school.

Any two from:

-loading an antivirus program

-scan disks before use

-inoculate files

-use firewalls to filter content coming from outside

-avoid downloading mails from untrusted sites/sources [2]

3.(a)What is the meaning of the termrobotics?

-the study of the design and work of robots [2]

(b) All robots have the same basic components. Give two of these
components, describing clearly the purpose of each.

Any two from:

Component 1: Sensors

Purpose: to capture/collect/read data from the environment

Component 2: Micropropcessor

Purpose: to process data/to do data manipulations

Component 3: Actuators/Limbs/Arms

Purpose: to produce movement/to alter the environment in some way.[4]

2
Computer Science Questions & Answer

(c )Give four reasons why the use of robots has gained popularity in various
industries.

Any four from:

-can work in hazardous /dangerous conditions

-monotonous /repetitive tasks can be easily done

-reduce labour costs as they need not to be paid

-quality of work is consistent

-improved productivity as they can work 24 hours a day/non-stop.

-goods made to precision/accuracy [4]

(d)Give two disadvantages of the use of robotics in society

Any two from:

-loss of jobs/leads to unemployment

-initial set up costs are high

-cause de-skilling

-they cannot work when there is no electricity

-they can only do what they are programmed to do.[2]

3
Computer Science Questions & Answer

4. The following flowcharts represent three program constructs. Name the


program constructs in the spaces provided.

(A) (B) Statement 1


Statement 1

Statement 2

condition

Statement 3

Statement 2

( C)

Condition Statement 1

Statement 2

A: Sequence/Linear

B: Iteration/Repetition/Loop

C: Selection

4
Computer Science Questions & Answer

(b)Study the algorithm below and answer the questions that follow.

(NB. In this algorithm <= implies less than or equal to)

Set counter to zero

Begin

Input mark

If counter <=4 then

Add 1 to counter

Add mark to sum

End if

Until mark =-100

Print sum

Print counter

(i)Complete the trace table for the algorithm using the following set of
marks:

25, 20, 23, 24, 20, 30,-100

MARK SUM COUNTER


0 0
25 25 1
20 25 2
23 45 3
24 68 4
20 92 5
30 112 5
-100 112 5
(TO CHECK ON NUMBER OF MARKS ALLOCATED)

(ii)What is the purpose of the algorithm?

-to find the sum of the 5 marks

5
Computer Science Questions & Answer

(iii)The mark -100 is known as the rogue value. What is the purpose of this
value?

-to terminate the loop/procedure

-to stop further data entry

5. A personal computer (PC) is supplied with 32MB RAM, 3.2GB hard disk
preloaded with the operating system and software applications. Some of the
applications have interpreters and compilers.

(i)What does RAM stand for?

-Random Access Memory

(ii)Briefly explain the use of RAM.

-Used to store data and instructions currently being processed /awaiting


processing.

(b)Briefly explain the purpose of:

(i)An interpreter

-A program that translates high level language into machine code statement by
statement during execution.

-a translator that converts source code to object code line by line.[1]

(ii)A compiler

-a program that translates a high level language program into machine code,
the entire program at once.

-a translator that converts source code to object code at once [1]

( c)Give two advantages of hard disk over floppy disk

Any two from:

-high capacity storage medium

-offers direct access to data which if fast

6
Computer Science Questions & Answer

-is more robust and resistant [2]

(d)The P.C is supplied with a Graphics User Interface (G.U.I).State three


advantages of using GUI instead of the command line operating system.

-user friendly

-offers on line help

-allows multi-tasking

-easy to learn

6. Define the term operating system.

-a suite of programs that direct operations in a computer system [1]

(b)State five functions of operating system

Any five from

-memory management

-file management

-error handling

-peripheral device control

-multiprogramming

-task management

-log preparation

-Interrupt handling

( c) Distinguish between multitasking and multi access systems.

-multi tasking is where a user performs more than one task on the same
machine at the same time whereas a multi access system is one in which a
main computer is accessed by many users apparently at the same time via
remote terminals. Each user is allocated a time slice and has the impression
that is the only one using the main computer.[2]

7
Computer Science Questions & Answer

7. The manager of Day and Night Travel Agency has made a proposal to
change their manual payroll to a computerised system. Suggest two factors
that may have motivated the manager to take this step.

Any two from

-computers can keep information for a long time safely

-computerised systems reduce redundancy of data

-computers are fast in data processing [2]

(accept any reasonable point)

(b)Besides conducting the feasibility study, give any three key roles played by
a systems analyst in developing the payroll system.

Any three from:

-data collection

-requirements specification

-system design

-designing a test plan/test strategy

-coming up with an implementation plan/strategy.[3]

( c) Describe any three aspects a systems analyst would consider when


carrying out a feasibility study

Any three from

Use (TELOS as the acronym to remember the types of feasibilities).

Technology: does the technology exist to implement the new system

Economic feasibility: weighs costs and benefits for coming up with a new
system

Legal feasibility: is the system within the legal framework of a nation

8
Computer Science Questions & Answer

Operational feasibility: how much the current work practices and procedures
support the new system

Schedule feasibility: considers the time the project would take to implement.

8. What is the difference between data and information?

-data are unprocessed facts whereas information are processed facts (data put
into context) [2]

(b)Describe the difference between validation and verification

-validation means a check done by a computer on the reasonableness and


completeness of data whereas verification is a check on transcription errors
done by a human being [4]

9. A company uses e-mail to communicate with its officers in different


geographical sites using WAN as well as officers in the same building LAN.

(a)What does WAN and LAN stand for?

WAN: Wide Area Network [1]

LAN: Local Area Network [1]

(b)State two communication media which can be used by WAN

Any two from:

-fibre optic

-copper cables/twisted pair/telephone cables

-microwave/radio waves/radio links/UHF cable

-satellite

(ii)Give two advantages of using e-mail over conventional postal system.

Any two from:

-faster to send mail

-cheaper than post

9
Computer Science Questions & Answer

-offers 24 hour service

-offers a delivery report

-can be received anywhere

-offers multiple addressing

-enables attachments of graphics /pictures on mail.[2]

(iii)What is the use of a mail box in an e-mail?

-to store messages [1]

(iv)Why is a password necessary in e-mail communication?

-so that only authorised users can access the mail box and prevent file
corruption.[1]

10.(a)What is the meaning of the term Computer Aided Design?

-the use of a computer to produce technical and architectural drawings used


by engineers.

-the use of a computer to help in the drawing of designs from which


objects/buildings are to be constructed or manufactured.[2]

(b)Give three advantages of CAD over manual design method.

Any three from:

-drawings can be reproduced quickly

-drawings can be scaled up/down

-automatic calculation of quantities and costs of materials

-can rotate images

-offers 3-D view

-allows cropping of shapes

-pictures can be zoomed

10
Computer Science Questions & Answer

-offers a library of parts

-can be easily integrated with other packages

-easy to modify designs

(c)Give two examples of the use of CAD

-design of buildings/fitted cupboards

-design of machine parts

-design of software [2]

11. Explain what is meant by the following terms:

(i) Field

-combination of characters [1]

(ii) record

-a group of related fields [1]

(iii) database

-a collection of logically related files. [1]

(b)Buyall is a bookshop that sells a variety of books. The bookshop wishes to


keep records of these books in a database. Below are some of the fields to be
used in the database structure

ISBN NO; AUTHOR; TITLE; PUBLISHER; DATE PUBLISHED.

(i)Give any other important field that has been omitted

Any one from

-price

-quantity [1]

(Accept a reasonable field)

11
Computer Science Questions & Answer

(ii)Which field can be used as the key field when searching for
specificrecords? Give a reason for your answer.

-ISBN NO.

Reason: it is a unique identifier of a particular book

(iii)Complete the table below indicating the field type for each field including
the field you gave in b (i). The first has been done for you as an example

FIELD NAME FIELD TYPE


ISBN NO. CHAR
AUTHOR TEXT/STRING/CHAR
TITLE TEXT/STRING/CHAR
PUBLISHER TEXT/STRING/CHAR
DATE PUBLISHED DATE/TIME
PRICE NUMERIC/CURRENCY
QUANTITY NUMBER

12. The table below is a portion of a Spreadsheet showing marks of five


students.

A B C D E F G H
1 Student name Hist Sci Maths Comp French Total Average
2 Chipo 70 53 18 43 80
3 Patrick 62 82 69 71 51
4 Kesha 21 59 73 89 72
5 Mandla 50 53 19 37 59
6 Ian 75 54 51 57 43
7 Totals 278 301 230 297 305
8 Average 55.6 60.2 46.0 59.4 ***
9
(a)State the difference averages in row 8 and averages in column H

Row 8-averages subject mark [1]

Column H-Average student mark [1]

12
Computer Science Questions & Answer

(b)In worksheets /spread sheets there is a feature of automatic recalculation


which is made electronic spread sheets very popular. While inputting marks,
the capture clerk entered the mark 43 for Chipo in computer studies instead
of 63 . Which other cell or cells will be affected if this is automatically
corrected?

-G2, H2, E7, E8 [2]

(c) G7 does not show the total number but has hashes (###.....) or
esterics(***…..) displayed.

(i)Suggest a reason why the spreadsheet automatically put these in the cell.

-the cell width is too small to accommodate the length of the total [1]

(ii) How do you make the spread sheet display the total in cell G7?

-increase the column width/drag the column until the figure appears

13
Computer Science Questions & Answer

NOVEMBER 2006

PAPER 1:7014/01

1. Explain, using examples where appropriate, the meaning of the


following computer terms:
(a)Microprocessor
-an electronic chip inside a computer responsible for data processing
- a central processing unit on a silicon chip [1]
(b)Analogue input device
-a device that enters continuously varying data like sound into a
computer system eg microphone.[1]
(c )EFTPOS
-Electronic Funds Transfer Point of Sale, the payment of item purchased
by electronically moving funds from purchaser’s account to the shop’s
account.[2]
(d)Bit
-binary digit, 0 or 1[1]
(e)Sorting
-arranging of records according to a key field in a defined order, i.e
ascending or descending.[1]
(f)Merging
-means a combining two or more files /records /cells to form a single
one.(file/record/cell)
(g)Multi processing
-the use of two or more processors in a computer to process data
simultaneously [1]
(h)Information Technology
-use of computers and telecommunications systems to process data,
transmit text/data, speech, videos and other files.[1]
(i)Assembler
-a program that translates mnemonic codes /symbolic addresses into
machine code [1]
(j)Information Superhighway

14
Computer Science Questions & Answer

-facilities on the internet that enable users to have fast access to global
information resources or allow transfer of information on the World
Wide Web [2]
2.(a)Give four functions of an operating system.
Any four from:
-file management
-memory management
-resource allocation
-interrupt handling
-errors handling
-peripheral device control
-task management
-log preparation [4]
(b)Modern Operating systems use the Graphical user Interface. Explain
what is meant by Graphical User Interface.
-the communication between a user and a computer through the use of
icons, pointing devices, pull down menus.
- the communication between a user and a computer through the use of
graphic symbols/images/pictures[2]
(ii)Give three advantages of the GUI compared to earlier Disk
Operating System.
-allows multi-tasking
-offers help facilities
-easy to learn
-user friendly3]
(c) Which of the following instruction codes could be part of operating
system software as written by a programmer?
A.011100101110101
B. Print Z at LPT 1
C.LDA TOT
-C LDA TOT [1]
(ii)Give a reason for your choice
-operating systems written in low level language using mnemonic codes

-one instruction translates into one machine code instruction [1]

15
Computer Science Questions & Answer

(d)Distinguish between batch processing and real-time processing

-batch processing allows jobs to be collected over a period of time; jobs are
large, processed offline whilst real-time processing allows processing to be
done on line as transactions occur.

-batch processing is not time sensitive whereas real-time processing is time


sensitive

3.(a)What is an Expert System?

Any one from:

-a computer system programmed with the knowledge of human experts to


deliver advice in a particular knowledge domain.

-a computer system which is designed to mimic human experts in a particular


domain of knowledgethe performance of human experts on some specialised
reasoning task.

-a computer system which encapsulates the knowledge and expertise of


human experts in a particular field of knowledge

-a computer program that attempts to replicate

-a computer system that be programmed to assume some of the capabilities


normally associated with human intelligence [2]

(b)A company of Legal Practioners (Lawyers) wishes to set up an Expert


System for its clients. Describe three features that should make up such a
system.

1. Knowledge Base: a database containing facts, rules and figures about a


particular knowledge domain.

2. Inference Engine: procedure or means of using the knowledge in a


knowledge base.

3. Human Computer Interface: the communication between a user and the


expert system.[3]

16
Computer Science Questions & Answer

4. You work for A to Z Suppliers who have recently computerised their


operations. They have bought an integrated suite of applications comprising
of a Word Processor, aSpreadsheet, a Desktop Publisher and Database. All
applications can access each other.

(a)Give two advantages of integrated suite of applications

-menus and commands are common

-data can be easily exported between programs

-faster to install/need to install individual programs

-files can be linked between different programs

-cheaper than buying separate programs

(b)A to Z wish to set up a database of its clients. Describe how you would
create the database of the client names, accountnumbers, addresses and
account balances.

-log into a database application program, eg Ms Access

-set the database name

-set the table name

-declare fields (eg client name, account number etc) and their data types in the
design view of Ms Access

-Set any validation rules and field limitations

-set the primary key field eg account number

-enter details for records in the table in the datasheet view

-create any queries, reports and forms that may be required in the
database.[5]

( c) The database is stored on a hard disc. What type of file access would be
used?

-direct access [1]

17
Computer Science Questions & Answer

(d)Describe how the clients database could be used in conjunction with the
Word Processor to send the same letter to all clients with balances greater
than zero advising the clients of the balances on their accounts.

-create a query

-in the design view, in the criteria section, under balances, write the criteria >0

-view the query in the datasheet view.

-open a word processor

-copy the query you created and paste it in a word processor and use mail
merge to send the same letter to different clients.

Or

-create a query in a database for balances greater than zero as criterion

-type standard letter

-merge fields and mail merge, send the documents to printer.[3]

(e)Suggest two ways A to Z might use the Spreadsheet

-calculations of wages/payroll

-creating account statements and budgets

-statistical calculations

-profit and loss calculations

-financial analysis

-tax estimations

-create graphs /charts for data analysis

(f)Describe three features of the Desktop Publishing Package that would


make it more suitable than a word processor for producing advertising
materials for A to Z suppliers.

Any three from:

18
Computer Science Questions & Answer

-more advanced formatting of text and pictures

-variety of pictures/graphics

-more templates /formats to use

-variety of fonts

-allows for text to flow around a picture

-allows cropping of pictures [3]

5. Matetsi High School has a Local Area Network (LAN) which is used by its
students. Students login on a workstation and use software such as word
processors and Spreadsheet. They can also receive and send electronic mail
via a Service Provider. The LAN is a star network which is linked to a Service
Provider for electronic mail (e-mail) access.

(a) In the space provided below, draw a labelled diagram of the star network.

workstation

data cable
workstation Server/central computer/hub
workstation

[4]
workstation

(b)Give one advantage and one disadvantage of a star network


compared to ring network.
Advantage
Any one from:
-easier to add a new workstation
-no collision of data
-more security due to central control
-reliable-market proven network [1]
Disadvantage
Any one from

19
Computer Science Questions & Answer

-if central computer is down the whole network is down


-overburden on the central computer as all data passes through it
-more cables are needed and its costly [1]
(c ) In order to access the e-mail Service Provider a modem is required.
What is the function of a modem?
-to convert analogue data to digital data for transmission and vice versa
[2]
6. (a) List the following storage media in terms of increasing access
speed.
Hard disk
CD ROM
RAM
Floppy diskette
Answer
-floppy diskette
-CD ROM
-Hard disk
-RAM [2]
(b) List the following storage media in terms of increasing memory
capacity.
RAM
Hard Disk
Floppy Disk
CD ROM
Answer
-Floppy disk
-RAM
-CD ROM
-Hard Disk [2[]
(c ) Describe four main features of a multi-media system.
Any four from:
-sound card/loud speaker
-CD ROM drives
-High quality graphics card
-high resolution monitor

20
Computer Science Questions & Answer

-high capacity disk


-authoring software
7. Explain the purpose of the following stages in systems analysis.
Feasibility
-to determine if the proposed system is viable (TELOS), whether costs
outweigh benefits for introducing a new system [1]
Investigation
-identify the problems of the system and the root causes of the
problems[1]
Analysis
-an indepth study of the current system and a determination of
requirements for the new system.
-data collection is carried out [1]
Design
-to make a blue print of the system
-specification of new system inputs/output/flowcharts drawn
-create user in interface [1]
Implementation
-to put the new system into place
-testing of programs, buyingequipment, trainingusers, stalling hardware
-putting system into use [1]
Review
-an assessment/evaluation of the system, evaluating its performance in
relation to set objectives [1]
8. Some students at Zim Research College wish to count the number of
cars passing through a bus street at night and simultaneously monitor
the sound level in the street. They decide to use data logging
techniques for this study.
(a)Identify suitable sensors that the students could use.
-Weight sensor
-pressure sensor
-proximity sensor
-sound sensor
-light sensor [2]

21
Computer Science Questions & Answer

(b)Describe the procedure the students would carry out


-connect e,g light sensor and sound sensor along the roadside
-sensors will be recording data each time a car passes on the roadside
-specify the logging period and the interval
-display the data on a list on the screen
-save the data for use on disk.
9. The rapid growth of Information Technology and computers have
also given rise to computer crime.
(a)Describe the following crimes.
(i)Hacking
-illegal/unauthorised access to data files on someone’s computer by
cracking passwords.[2]
(ii)Computer Fraud
-use of computers to illegally transfer funds electronically from one
account to another.[1]
(b)Suggest three measures, other than physical ones, which an
organisation might take to prevent unauthorised access to important
data.
Any three from:
Measure 1: dataencryption: scrambling data before transmission,
rendering it unreadable to someone who does not have the decryption
key.[1]
Measure 2: Use of firewalls: a combination of hardware and software
that filters content coming into a private network.[1]
Measure 3: Use of user names and passwords: ensures that only
authorised users who know company passwords can access computer
systems.[1]
Measure 4: restricted access to files (access rights)[1]
Measure 5: Biometric security measures: use of physiological
characteristics such as finger prints, iris recognition, face recognition.[1]
( c) Computer criminals may also write and spread computer viruses.
Suggest two precautions to prevent infection of computers by viruses.
Any two from:
Precaution 1: use of antivirus software
Precaution 2: inoculation of files

22
Computer Science Questions & Answer

Precaution 3: use of firewalls


Precaution 4: avoiding downloading e-mails/files from unknown sites
Precaution 5: scanning secondary storage media before use

10.(a)In programming , a repetition may be achieved using a


REPEAT…UNTIL loop or WHILE…DO…….ENDWHILE programming loop.
Explain the difference between the two programming loops.
-Repeat….Until loop is executed at least once since it tests the condition
after the loop, after at least a single execution whereas a while…do…end
while loop may never be executed because the condition is tested at
the beginning of the loop.[2]
(b)When a card is inserted into an ATM (Automated Teller Machine) at
Zim People’s Bank, the owner is required to enter a 9-digit Personal
Identification Number (PIN). A check number is stored on the card and
can be read by the ATM when the card is inserted. A student suggest
the following algorithm to test the validity of a PIN.

Set flag to true


Set count to 0
Set total to 0
Read check number on card
WHILE count is less than 9
DO
Input a digit
Read digit
Add digit to total
Add 1 to count
END WHILE
If total equals the check number THEN
Set flag to true
ELSE
Set flag to false
END If
If flag is true THEN
Process transaction

23
Computer Science Questions & Answer

Eject card
Else
Retain card
END IF
(i)What is the relationship between the check number and the PIN?
-check number is the sum of digits in PIN [2]
(ii)Dry run this algorithm for the following two cards when they are
inserted into the ATM and determine the output for each card giving a
reason for your answer.
CARD 1: PIN 2 8 3 7 4 6 5 5 3
CARD 2: PIN 9 8 7 6 8 7 8 9 1
Output for card 1

Process transaction and eject card [2]


Reason: sum equals 43 which is the check sum [2]
Output for card 2
Card retained/card rejected [2]
Reason: sum is not equal to check sum [2]
(c )(i) Explain why this algorithm is not 100% efficient in checking the
PIN entered.
-the digits may be interchanged and still works (does not test for
transposition)
(ii)Suggest how you might improve the algorithm to make it more
efficient.
-use the modulus 11 method which is a more efficient method for
calculating check digits[2]
(iii)In real life, an ATM gives the card holder a maximum of 3 chances
to enter a PIN correctly otherwise it retains the card on the third wrong
attempt. Re-write the algorithm in pseudocode so that it gives the user
three chances to enter the PIN correctly before it retains the card.

Start
Read check number from card
Set error count to 0
Set flag to true

24
Computer Science Questions & Answer

WHILE error count is less than 3


Set count to 0
Set total to 0
WHILE count is less than 9
Input a digit
Add a digit to total
Add I to count
END WHILE
IF total equals check number
Set flag to true
Set error count to 3
ELSE
Set flag to false
Add 1 to error count
END IF
END WHILE
IF flag is true
Process transaction
Eject card
END IF
Stop

25
Computer Science Questions & Answer

NOVEMBER 2007

COM PUTER STUDIES 7014/01

1. Explain the meaning of these computer terms.

(a) debug

-to locate and correct errors in a program [1]

(b) Computer fraud

-money –related crime committed with a computer [1]

( c)File generations

-grandfather-father –son files

-these are new master files which result after updating files by copying (at
most 3 generations are kept)[2]

(d)Random access

-means retrieving records by going directly to a record (direct access)

-retrieving a record by referring to its address directly in memory [2]

(e) byte

-combination of 8 bits in any order

(f)Polling-checking of peripherals/terminals by the processor to determine if


they need processor attention.

-automatic checking of peripherals/terminals to determine their readiness to


receive or send data.[1]

(g)Assembler-a program which converts assembly language into machine code

-a translator which converts assembly language into machine code [2]

(h)Rogue value-a value used to terminate a procedure, not acted upon by an


algorithm

-a value used to terminate further data entry into a procedure [1]

26
Computer Science Questions & Answer

(i) Macro

- a sequence of instructions that are executed under a single stroke[1]

(j)Control character-a character which sends a signal to alter /interrupt the


sequence of operations

-send during transmission of data [1]

2. In the following algorithm, INT (a) retains the integer value of a whole
number of part a.

e.g if a=3.5 then INT(3.5) which is 3 and if a=6 then INT(a) is equal to INT(6)
which is 6.

Read this algorithm.

Input number

While number <> 0 DO

Num=number/2

b=INT (num)

c=num-6

r=c*2

number =b

END WHILE

Print r(counter 6), r(counter 5),r(counter 4),r (counter3),r(counter 2),r(counter


1)

N.B Print r(counter 6) will print the value of r at counter 6.

27
Computer Science Questions & Answer

(a)Dry run this algorithm using the grid below, using 9 as the number input.

Number Num b C R counter


9 45 4 0.5 1 1
4 2 2 0 0 2
2 1 1 0 0 3
1 0.5 0 0.5 1 4
0 5
6

Counter 6 Counter 5 Counter 4 Counter 3 Counter Counter 1


2

[4]

(b)Explain the purpose of this algorithm.

-to convert a number to binary (0s and 1s) [1]

3. Explain two uses of computers in each of the following fields.

(i)Education

-research

-keeping students records

-Computer Based instruction/Computer Aided Learning.

-E-learning

-E-marking [2]

(b) Tourism

-keeping records of tourists

-Advertising-information

-bookings

-communication with tourists (e-mail).

28
Computer Science Questions & Answer

(iii)Agriculture

-greenhouses

-records keeping (agricultural records for farms)

-research

-payroll

-agricultural expert system

[2]

NB.One-word answers not permitted.

4(a) State two main differences between control systems and automated
systems

Control systems automated systems

-act on broad tasks -dedicated to a particular task.

-allow user interaction -do not allow user interaction

-lacks the ability to collect & analyse data-can collect and analyse data

(b)Many computer controlled devices are activated by sensors. Write down


the types of sensors that might be used to.

(i)switch on lights when it is dusk,

-light sensor/photo sensor/darkness sensor [1]

(ii) activate traffic lights when cars approach a junction

-pressure/distance/contact/proximity/movement sensor [1]

(c ) The traffic light system of a large town is to be computerised. The lights


at many junctions are to be controlled by a single central computer.

Suggest two benefits that introduction of the system would have.

-enables better synchronisation

29
Computer Science Questions & Answer

-speed of traffic can be controlled

-traffic distribution can be monitored and controlled

-pedestrians waiting to cross the road can be fitted on with traffic flows[2]

5. (a) State any four components that make up computer hardware (each
component should be functionally different from the other)

(i) input device e,g mouse[1]

(ii)Processing device e.g CPU (Central Processing Unit)[1]

(iii)Storage device e,g magnetic disk[1]

(iv)Output device eg monitor [1]

(b)Name any two storage devices suitable for back up in a bank. Explain why
you think they are appropriate.

Device

-magnetic tape

Explanation

-cheap

-higher storage capacity [2]

Device

-optical disk/zip disk/hard disk

Explanation

(if choice is hard disk)

-robust

-offers direct access which offers fast access to records

30
Computer Science Questions & Answer

6. (a) Explain any three uses of the internet

(i) communication (e-mails) where messages are transmitted from one use to
the other electronically

(ii)E-commerce; buying and selling over the internet

(iii)File Transfer (downloading files)

(iv)Entertainment-music, videos, internet games etc

(v)Research (through search engines)[3]

NB.Only three uses were required.

(b)The internet is widely used in schools.

(i)Give one problem or danger which might occur when pupils have
unsupervised access to the internet

-access to unsafe sites-cultural erosion (e.g. pupils can view pornographic


images)

-some pupils might download some viruses [2]

(ii)How can this problem or danger be prevented?

Any one from:

-ensuring strong supervision

-making use of anti-virus software

-setting security levels[1]

( c) The IT. Teacher often changes her password to log onto the internet.

(i)Give one reason why the teacher should change her password regularly.

-to reduce the chances of students/other people guessing/knowing her


passwords [1]

31
Computer Science Questions & Answer

(ii)When changing the password, the IT teacher must type it in twice before
the computer accepts the new password. Why does she have to type the new
password in twice?

-to verify if the password was typed correctly/confirm the new password [2]

7. A school administration system uses a students database file which


contains information on students.

(a)Name four fields you would expect to find in the students database file,
one of these fields must be a key field.

Field 1: student ID/student number/ID number

Field 2: student name/surname/address/next of kin

Field 3: student surname/sports house, sex

Field 4: class/club/date of birth [4]

NB: STUDENTS TO CHOOSE ANY FOUR FIELDS THAT INCLUDES A PRIMARY


KEY FIELD.

(b)Give one reason why the school would need to

(i) modify a record

-if a student transfers/dies/is expelled from school/changes address

[1]

(ii) add a record to the database file

-if a new students joins the school[1]

( c) (i) Give two advantages of using a computerised school administration


system

(Advantage1, advantage 2)

-reduces data duplication

-reduces data redundancy

32
Computer Science Questions & Answer

-maintains data integrity

-easy access to stored data

-easy to search records [2]

(ii)Other than the cost of hardware and software, give two problems that
might occur when introducing a new computerised system (problem 1,
problem2)

-resistance from staff

-need for training maintenance costs

-increase in overhead costs, eg electricity [2]

8. (a)A typical business microcomputer stores all its software and data files
on a hard disk. It also has a floppy disk drive. List four different reasons why
the floppy disk drive may still be needed.

Any four from:

-to copy new software/restore software on hard disk

-to try out sample software

-to transfer information from one computer to another

-to restore data from back up copy

-to make back up copies of data [4]

(b)(i)Describe briefly the operation of a bar code reader

-the bar code reader scans commodities by light/laser beam; the sequence is
converted into a binary pattern which is the passed onto the computer and
interpreted. [2]

(ii)List four items of information represented on bar codes

-product/item code

-manufacturer code

33
Computer Science Questions & Answer

-country of origin code

-check digit [4]

9.(a) “Hacking” is where someone gains illegal access to a computer system.


This is usually done using a remote terminal or microcomputer.

Describe three ways in which computer hackers might do more harm than an
office burglar.

Any three from.

-delete/corrupt/change software

-transfer funds fraudulently from company accounts

-expose/sell company’s secrets/confidential information

-planting of viruses

-encryption/changing of passwords [3]

(b)(i) List four symptoms which may indicate a possible virus attack

Any four from:

-programs take long to load

-accessing the hard disk takes a long time

-files disappear, strange files appear

-irritating/strange error messages appearing

-executable files change in size

-hardware malfunctioning

-failure to boot (bad sectors on hard disk)

-difficulty in opening /closing files

-may restart continuously/unnecessarily

-difficulty in opening/closing files

34
Computer Science Questions & Answer

-unexplained memory usage on hard disk (disk full)

-drive lights come on without reason.

(ii)List four ways of preventing virus attack

Any four from

-inoculate files

- use memory –resident anti virus

-use disks from reputable sources/companies

-write –protect disks

-avoid downloading software from unknown sites

-use of firewalls

-avoid pyrating of software

-scan disks before use. [4]

10.Many countries have data protection legislation. Recommend three rules


for the legislation.

Any three from

-personal data must be processed and obtained fairly and lawfully

-personal data must be held for specified purposes

-personal data must be kept accurate and up to date

-personal data must not be kept longer than necessary

-personal data must be kept secure [3]

35
Computer Science Questions & Answer

(b)A clothing shop keeps information about its products on a computer file.
Part of the computer file is shown below.

Style Description Size Colour Number Price


Chinese Collar 3 piece suite 70 B 0025 $250 000
Sleeveless Printed T-Shirt 24 W 0026 $30 000
Sabrosso Blue Jeans 38 B 0027 $200 000
Kello Shirts 16 R 0028 $60 000
Tangello Formal Trousers 41 G 0029 $70 000
Sauyo Cap 12 B 030 $12 000
(i)The colour has been coded B=Blue,R=Red etc. Give two advantages of
coding data

Any two from

-saves time when entering data/ensures fast data entry

-reduces typing errors

-saves storage space

-provides secrecy of data

[2]

(i)Give one reason why only using one letter for the colour code could create
a problem.

Any one from

-some colours begin with the same letter (eg Blue,Black)

-one may run out of colours[1]

(iii)Some of the fields in the clothing file are of fixed length, while others are
of variable length.

Give one advantage of using fixed length fields

Any one from

-easy to update

-easy to estimate file sizes accurately


36
Computer Science Questions & Answer

-faster to search for a records

[1]

(iv)Give one disadvantage of fixed length fields

- leads to truncation of data

-wastes space on secondary storage medium if fields are short than that
declared

-[1]

11. Computer hardware can be linked to form networks. Give two


advantages a network has over stand alone computers (advantage 1,
advantage 2)

-users can share expensive resources (printers, software, and data)

-users can communicate (e-mails, work groups)

- it is easier to set up new users ad equipment

-it is easier to back up data held on a server than on many individual machines

-it is easier to store application programs on one computer and make them
available to all users rather than having copies individually installed on each
computer. [2]

(b)LAN and WAN are two different types of networks. What does LAN and
WAN stand for?

LAN: Local Area Network

WAN: Wide Area Network [2]

(c )Give the main difference between a LAN and a WAN

-LAN covers a small geographical area e.g. office, building, same site whereas a
WAN covers a wide geographical area e.g. countries, cities

-LAN uses cables for communication whereas LAN uses radio links, satellite,
microwave etc.[2]

37
Computer Science Questions & Answer

( d) Networks create security concerns because of the increased number of


users sharing the system. Give three ways of making a network more
secure.(way 1,way 2,way 3)

Any three from

-use of user names and passwords

-data encryption during transmission

-firewalls

-setting access levels/access rights [3]

( e)Name one item of hardware that is required to connect a computer to a


LAN

Any one from

-Network Interface Card

-Network Adapter

-Cables

[1]

(f)Name an item of software that is required to connect a computer to a


WAN

-web browser

-communication software [1]

38
Computer Science Questions & Answer

NOVEMBER 2008 PAPER 1:7014/01

1. By giving examples in each case, explain the meaning of the following


computer terms:

(a)Simulation

-the use of a computer based model to represent a system/phenomenon.[1]

-any valid example, eggs virtual aircraft/aircraft flight control/model of a


physical situation.

(b)Expert system

Any one from:

-a computer system which is designed to mimic human experts in a


particular domain of knowledge

-a computer system which encapsulates the knowledge and expertise of


human experts in a particular field of knowledge

-a computer program that attempts to replicate the performance of human


experts on some specialised reasoning task.

-a computer system that be programmed to assume some of the


capabilities normally associated with human intelligence [2]

(c )Rogue value

-an unusual value/out of range value/abnormal value

-value used to terminate a loop /show end of data input [2]

(d)Intranet

-as network of computers within the same organisation

-that uses same protocol as the global internet’s

-a local area network providing internet facilities within an organisation using


internet protocol

[1]

39
Computer Science Questions & Answer

(e)Multimedia system

-computer system with sound, text, graphics, video, animation and


CDROM/DVDROM, CD WRITER

-the integration of text, sound, video, graphics and animation into a single
system [2]

(f)Technical documentation

-details about the program designed for fellow programmer

-enables changes to be made to program/debugging

-explanation about what the program does/how the system operates and is
meant for fellow programmers and systems analysts.[2]

(g) Electronic conferencing

-several people at remote locations engage in live video discussions/debates,


using the internet/WAN [2]

2. A refrigerator is a household item that contains a microprocessor

For this processor’

(i) state the input

-temperatures[1]

(ii) describe the processing,

-calculating

-comparison with set/optimum temperature [1]

(iii)state the input

-switches on/off[1]

(b)State two other household items that contains a microprocessor

-toaster sandwich maker

-kettle

40
Computer Science Questions & Answer

-microwave/oven

-washing machine [2]

3. Give three points to consider when choosing a programming language to


use.

-easy to use

-if language is well structured

-self documenting

-good run time diagnostics

-input, output facilities

-utilities/libraries

-portability

-speed of execution [3]

4. Last year Muchabaiwa High School stored their examination marks on a


computer. At the end of the year, some pupil’s examination marks were
wrong when printed out. To try to stop this from happening again, the
computer teacher has decided to use data validation and verification.

(a)With reference to the above, explain what is meant by

(i) data verification

-checking input data for transcription errors by entering data twice or


comparing the source with destination

-checking for transcription errors and is done by a human being.[2]

(ii) data validation

-checking input data by a computer program to ensure that data is suitable or


realistic for the task at hand.

-checking that data is reasonable in the context in which it is used and is done
by a computer program [2]

41
Computer Science Questions & Answer

(b)Explain how each of the following methods of data validation could be


used in this situation.

Range check

-to ensure marks are within the correct boundaries/demarcations e,g between
0 and 100[1]

Presence check-to ensure that marks are entered [1]

Type check-to ensure that data entered is correct. [1]

5. The systems development life cycle can be broadly categorised into


different stages. One of the stages is the analysis stage.

(a)List any four stages other than the analysis stage

-problem identification/preliminary study

-investigation

-design

-development

-implementation

-feasibility study

-review/maintenance

(b)Describe the analysis stage

-defining requirements for the system

-data collection (using questionnaires interviews etc)

-data flow diagram drawing

-evaluating alternative solutions

-selecting hardware and software for the system [4]

42
Computer Science Questions & Answer

6. A computer program to find the sum of integers 1 to 20 can be written in


three different languages A, B, C as illustrated below:

LANGUAGE A LANGUAGE B

BEGIN 0100000000000000001010

Number=20 11100000000000000001010

Total =0 00000000000000010110111

WHILE NUMBER <> 1 000100000000000000010100

DO 101000000000000000010100

Total=total +number 101100000000000000000000

Number =number -1 10000000000000000000000

ENDWHILE 10001000000000000100000

100010110001100000000000

011111111111111111111111

LANGUAGE C 100010001000100010000000

100000100000000000000000

BEGIN 010001000100010000100010

NUM10101 0000000000000000000000001

TOT 0000 0000000000000000000000000

ACC,C

STA TOT

LDA NUM

43
Computer Science Questions & Answer

A JAZ B

ADD TOT

STA TOT

LDA NUM

ACC, S,1

STA NUM

JPU A

B HLT

END

(a)Classify the languages as high level language, assembly language or


machine code.

(i)High Level Language-A [1]

(ii)Machine Code- B[1]

(iii)Assembly Language –C[1]

(b)(i)Name a program that can translate the entire code of language A to the
code of language B at once

-compiler [1]

(ii)Name a program that can translate the code of language C to the code of B

-assembler [1

(c)Give one reason why operating systems software and computer games are
written in assembly language than in a high level language.

Any of:

-assembly language is closer to machine, there is s one to one relationship


between assembly language and machine

-runs faster

44
Computer Science Questions & Answer

-secure as few people know it[1]

(d)Give two disadvantages of assembly language compared to a high level


language.

-machine specific/not portable

-difficult to learn/to program

-much longer [3]

7. Most computer systems have primary storage and secondary storage

(a)Give two limitations of primary storage which makes secondary storage


necessary

-primary storage does not have a very high storage capacity which may be
required by a computer

-primary storage is volatile as compared to secondary storage

-primary storage is expensive as compared to secondary storage

[3]

(b)Explain how ROM differs from RAM

RAM ROM

-Volatile -non volatile

-re-writtable -not rewritable

-Temporary -permanent [2]

8. Tinashe has seen some cheap movie tickets using the teletext service on
his TV. He is advised to use e-mail 9electronic mail) to order his tickets.

(i)Why could Tinashe not order the movie tickets using the Teletext service?

-teletext is one way (can only receive but cannot send)

(ii)What is electronic Mail?

-message sent from one computer to another electronically [1]

45
Computer Science Questions & Answer

(iii)Give two reasons why Tinashe used e-mail instead of posting the order.

-e-mail is faster

-e-mail is cheaper than letter post

-weight less

-can incorporate pictures and videos

-large volumes of data can be sent by data compression

-can receive mail from any part of the world

-offers 24 hour service [2]

(b)The following flowchart is used for calculating the cost of sending a


telegram

start

N>10 Y Cost=$100 000+(N-10)*$5000

Cost=$100 000

OUTPUT COST

Stop

46
Computer Science Questions & Answer

(i)Write down the output for each of the following inputs [4]

INPUT OUTPUT
4 $100 000
12 $110 000
10 $100 000
15 $125 000
-1 mark for correct item

(ii)Give one advantage of using a flowchart as a program development tool

-easier to follow

-breaks down the problem into smaller components [1]

(iii)Describe two different types of test data that should be used to test the
program when it is written

-standard[1]

-extreme [1]

-abnormal [1]

9. An electronic motor –driven robot navigates its way through a maze by


always following the left wall. The robot is controlled by a microprocessor.
The microprocessor sends control signals to the robot’s motors depending on
the input from sensing detectors suitably attached to the robot. The diagram
below shows the top view of the maze. The dashed line shows the path to be
followed by the robot R from start S to finish F.(See next page)

47
Computer Science Questions & Answer

(a)Name two components of a microprocessor

-control unit (CU)[1]

-arithmetic logic unit (ALU)[1]

(b)State two sensors which could be used to detect a wall

Any two from

-distance sensor/proximity sensor [1]

-infrared sensor /light sensor [1]

-pressure sensor/touch sensor [1]

(c )Explain how the robot is always is always able to follow the left wall

-robot sends signals continuously to the left wall [1]

-sensor received the reflected signals and sends to a microprocessor

-sensor senses distance from wall and sends to microprocessor [1]

(d)Another microprocessor-controlled robot navigates its way through the


maze by following the right wall, Draw, on the diagram, (on page 11) a path
to be followed by this robot in moving from S to F.(to draw on the diagram)

48
Computer Science Questions & Answer

10.(a)A computer in your school computer room has detected a computer


virus.

(i)State three ways in which the computer could have acquired the computer
virus

-Infected disk [1]

-opened suspicious e-mails [1]

-through the internet [1]

(ii)Give three critical precautions against computer viruses.

-antivirus

-physical protection eg locking computer rooms

-scan disk

-scan mail

-firewalls [3]

(b)Your teacher has asked you to produce a class newsletter that will include
text and graphics.

(i)Identify the software that you would use

-desktop publishing software

-word processing software

(ii)Explain why the software you mentioned above in (a) above would be
most suitable.

-layout

-changing size of text and graphics

-ready-made layouts [3]

49
Computer Science Questions & Answer

11. The following piece of text has been created using a word processor
package. It needs to be corrected and formatted.

Computer Aided Learning In Zimbabwe.

Computer Aided Learning is used as an alternative to normal classroom


methods in most secondary schools. However, at this level students are limited
by access arrangements for computers.

This type of multi- media learning is now a very common feature of distance
education. More learning materials are on CD-ROMS.

The use of Computer based learning is on the increase in Zimbabwe. The


people are finding out that an IT training school is often more expensive than
using CAL.

Explain carefully how you would use a word processing package to perform
each of the following tasks.

(a)Underline the heading Computer Aided Learning in Zimbabwe

-highlight the heading

-click the Bold Icon on the formatting Toolbar [

(accept an reasonable variation, e.g. short cut keys)

(b)Insert page numbers on the document without entering each one


separately.

-click insert on the menu bar

-choose page numbers from the drop down sub menu

-specify the position and alignment of the page numbers

-choose the numbering styles

50
Computer Science Questions & Answer

-click ok to finish [2]

(c )Align /justify all text, except the heading, on both the left and the right.

-highlight all text

-click the justify icon on the formatting toolbar [2]

(accept reasonable variation)

(d)Move the first paragraph to the end of the document

-highlight the first paragraph

-click edit on the menu bar

-choose cut from the drop down sub menu

-position the cursor at the end of the document

-click edit on the menu bar and choose paste from the drop down submenu[2]

(accept reasonable variation, e.g. use of short cut keys.

(e)Divide paragraph 2 in two columns

-highlight paragraph 2

-format on the menu bar

-choose columns from the drop down sub menu

-specify the number of columns (2)

-click on ok to finish [2]

(accept any reasonable variation)

51
Computer Science Questions & Answer

A B C D E

1 2001-2002 2002-2003 2003-2004 2004-2005

(forecast)

2 October 356 200 286

3 November 421 325 214

4 December 524 505 568

5 January 125 138 89

6 February 561 702 735

7 March 521 562 547

8 Total

12.The following rainfall table for a town in Zimbabwe was created using a
spreadsheet.

(a)Write a formula in cell B8 to calculate the total for the 2001-2002 season

Any one from:

-=sum(b2:b7)

Or =b2+b3+b4+b5+b6+b7 [2]

(b)Explain how you would copy the same formula from cell B8 to cells C8,D8
and E8

-select cell B8

-choose copy option

-highlight cells C8 to E8 and select paste

Or select cell B8

52
Computer Science Questions & Answer

-use autofill and drag to E8[2]

( c) There are no rainfall figures for column E,the figures are to be obtained
by averaging rainfall for the previous 3 seasons. Write a formula in cell E2 to
achieve this.

=average (b2:d2)

Or =sum (b2:d2)/3

Or =(b2+c2+d2)/3[2]

(d)Explain how you would insert a graph to show the rainfall pattern for the
2001-2002 season.

-high light A1:B7

-click on insert and select chart on the chart icon

-follow steps [2]

53
Computer Science Questions & Answer

NOVEMBER 2009 PAPER 1:7014/01

1. By giving suitable examples in each case, explain the meaning of the


following computer terms.

(a)Electronic Commerce

-buying and selling on the internet [1]

(b) Turnaround document

-an output document which has details added to it and then used as an
input at a later stage

-eg electricity bills, water bills, multiple choice answer sheets, cheques [1]

( c)Gigabyte

-1 billion bytes

1024MB[1]

(d)Multiprogramming

-running two or more programs concurrently on the same machine.

-the concurrent execution of two more or more programs

-the operating system allocates program a small amount of processor time


(quantum) before moving on to the next.[1]

(e) Desktop Publishing

-an extension of word processing which offers advanced editing and


formatting features[1]

(f)Interrupt

-a signal from a source or device seeking the attention of the processor eg a


keyboard key pressed generates an interrupt.

54
Computer Science Questions & Answer

-a signal generated by an event that alters the sequence in which a


processor executes instructions, anotherexample hardware, hardware
failure.1]

(g)Spooling

-a technique used to speed up communication between devices which


operate at different speeds

-data from the processor is written to a faster access storage device being
released to a slow output device eg printer.

(Means simultaneous peripheral online[1]

(h)End –User

-people who use computers

-final users of an application or system

-final users of a program or an application1]

(i)Hardcopy

-printed output

-printed, permanent output on paper.[1]

(j)Icon

-a small picture /graphic/image representing a command or piece of


software/file [1]

(k)Software Piracy

-illegal copying and selling of and buying of copyrighted software without


proper certification [1]

2. File access in a system can either be random or sequential.

(a)Define Random Access

-means direct access to data where one can go straight to a record eg on


disk

55
Computer Science Questions & Answer

-means retrieving a record by referring to its address directly in memory [1]

(b)Distinguish between sequential and serial access

-sequential access is where records are retrieved according to their primary


key sequence and records are sorted whereas in serial access, records are
retrieved by reading item by item, following the order in which they are
stored on a secondary storage medium. [2]

3. Give any six functions of the operating system.

-memory management

-file management

-peripheral device control

-interrupt handling

-maintaining security by checking user ids and passwords

-multitasking

-multiprogramming

-multi-access [6]

4. Doctors use expert systems to help diagnose patients’ illnesses.

(a)Explain what you understand by the term “expert system”

Any one from:

-A computer program designed to perform the functions of human experts.

-a computer system which is designed to mimic human experts in a


particular domain of knowledge

-a computer system which encapsulates the knowledge and expertise of


human experts in a particular field of knowledge

56
Computer Science Questions & Answer

-a computer program that attempts to replicate the performance of human


experts on some specialised reasoning task.[2]

(b)Give any three advantages of using an expert system.

Any three from:

-takes less tine to solve a problem

-it has more expertise than one human expert

-it is permanent

-it is cheaper as it does not need to be paid wages /salaries

-conclusions are based on pure logic, no emotions come into play.

[3]

( c) Give one disadvantage of using an expert system.

-initial set up costs are high

-considerable training is required to use the system

-lack common sense

-leads to de-skilling

5(a) Describe any three differences between high level and low level
language.

High level low level

-problem-specific -machine specific

-Easier to learn -difficult to learn

-may consists of English like statements -may consists of mnemonic


codes[3]

57
Computer Science Questions & Answer

(b)Operating systems are written using low level languages; explain any
reason why operating systems are written using in low level language.

-it is machine specific

-it is closer to machine language.[1]

-offers more security since it is difficult to learn

(c)Students at school are usually taught using high level programming


languages; explain why students are first taught to write programs in high
level languages.

-high level languages are easier to learn

6. The following algorithm is used to grade students’ marks for an


examination using the following grading scale.

80-100 Distinction

70-79 Credit

50-69 Pass

0-49 Fail

1. Initialise variables
2. While mark <>999
3. Input mark
4. If mark >80 and mark <=100 THEN
5. GRADE is Distinction
6. END IF
7. IF Mark >70 and mark <=80 THEN
8. GRADE IS CREDIT
9. END IF
10.IF Mark >50 and mark <=69 THEN
11. GRADE is pass
12.END IF
13.IF mark >0 and mark <=50 THEN
14. GRADE IS FAIL
15.END IF
58
Computer Science Questions & Answer

16.END WHILE

(a)In the table below, dry run the algorithm using the following test
data. Where there is no output indicate “no output”

Mark Grade
45 Fail
80 Credit
75 Credit
90 Distinction
70 No output
50 Fail
999 No output
[3]

(b)The algorithm has an error. What is the problem with the algorithm?
Identify any error in the above program.

-it does not show output for boundary values [1]

(c)Rewrite the algorithm showing how the error can be corrected.

If mark>=80 and mark<=100[1]

7. Give one example of the use of each of the following:

(a)(i)Joystick

-playing computer games

(ii)Magnetic ink character reader(MICR)

-clearing cheques in banks

(iii )optical mark reader(OMR)

-marking multiple choice examinations papers.

59
Computer Science Questions & Answer

( b)Name one way in which words can be input to a computer other than
by a keyboard.

-scanner

-voice commands

8. An operating system is a program.

(a)Give four tasks carried out by an operating system.

-memory management

-file management

-peripheral device control

-interrupt handling

-maintaining security by checking user ids and passwords

-multitasking

-multiprogramming

-multi-access [4]

(b)Name an application that makes use of batch processing.

Any one from

-payroll

-electricity billing

-water billing

-gas billing [1]

(c )What is meant by real time processing?

-a type of processing in which data input to the system must be processed


immediately to influence an on-going task.[2]

60
Computer Science Questions & Answer

(d)Name an application that uses real-time processing and explain why it


is the most appropriate.

-airline reservation

-hotel reservation

-booking systems for theatre

-nuclear reactor safety systems

-chemical process control.

Reasons

In each of these systems, results are required immediately to influence an


ongoing task.[2]

(d)Micro computers can carry out multi-tasking. What is meant by


multitasking

-means carrying out more than one task on the same machine at the same
time.[1]

9. A group of tourists from Zambia and China has been requested to


produce a flyer with details and photographs of all of the most popular
tourist attractions in Zimbabwe.

(a)Which software would be the most appropriate in the production of


the flyer and justify your answer.

-word processor/desktop publishing

Reason

-it has advanced formatting features

(b)State three devices that can be used to input photographs into the
computer.

-digital camera

-scanner

61
Computer Science Questions & Answer

-web camera

-mobile phone fitted with a digital camera [3]

(c )Explain how you would move a picture from one file to another

-Click on the picture to highlight it

-right click while pointing on the picture and choose cut from the drop
down sub menu

-open the file in which you want to move the picture to.

-right click and choose paste from the drop down sub menu [3]

10.A school keeping students records on a computer is concerned about


the security of students’ data from illegal access.

Explain any three sensible ways in which the data can be protected from
illegal access.

(i)-use firewalls

(ii)-use of user ids and passwords

(iii)-physical security measures on computer installations,eg use of locks

-use of biometric security measures

-restricted access to computer installations [3]

(b)The school is located in an area susceptible to power failure. State any


one measure the school can apply to protect the data loss due to power.

-using uninterruptible power supply (ups)

-using alternative power sources such as generators [1]

62
Computer Science Questions & Answer

(c )(i)Apart from hacking and power failure, students’ data can be lost in a
number of ways, suggest any two ways in which the student data can be
lost.

-viruses[1]

-intentional deletion by hackers [1]

(ii)For each of the two ways you named in (i) above, suggest one method
of preventing data loss.

1. Loss through viruses

prevention

-use anti virus software

2. Corruption of data

Prevention

-use of back up.

11. An information system for students enrolling into a school is to be


designed. The information system will keep the following details about
students: surname, first name, sex, date of birth, class, address, telephone
number, club, sport.

(a)Design an input screen layout for this system

See next page.

63
Computer Science Questions & Answer

INPUT FORM FOR A STUDENTS ENROLMENT SYSTEM

surname

First name

sex

Date of birth

class

address

Telephone number

class

sport

(b)The systems analyst wants to use the surname as the key field.

(i) Explain what you understand by the term key field

-a field which uniquely identifies a record [1]

64
Computer Science Questions & Answer

(ii)Explain why the surname filed may not be a sensible field to use as a
key field

-it identifies a group of records, it does not identify a record uniquely [1]

(iii)Suggest one field which can be added to the information system for
use as the key field

-student number/student ID [1]

(c) Name the stage in the systems development life cycle where the
screen layouts are prepared.

-design [1]

(d)Student information system is to be validated on entry

(i)Define the term validation

-checking that data is reasonable in the context it is being used and is done
by a computer program

-checking data for reasonableness, completeness and accuracy and is done


by a computer program.[1]

(ii)Describe any three validation checks which can be supplied on the


student data on entry.

Any three from:

Validation check 1

Range check-checking data falls within a particular range [1]

Validation check 2

Presence check-checking that all the necessary fields are present [1]

Validation check 3

Type check-checking that data conforms to a particular data type

Validation check 4

65
Computer Science Questions & Answer

Check digit check-adding an extra digit to a particular pattern of digits,


calculated from them and appended to it for validation purposes.[1]

12. An electricity Supply Authority has to bill its customers once a month.
Every month, meter readers visit each customer and fill out a meter card
which can be read by a document reader. Fig 7.0 shows the meter card
that the authority uses(diagram provided)

(a)Name the method that is used to read data from the meter cards into the
computer.

-Optical Mark Recognition [1]

(b)Explain the principle of this method of capturing data

-a beam of light is used to detect a mark/symbol at a particular position on a


document, which is then interpreted.

(c) State and explain two validation checks that the computer can carry out
on the data that has been read (check 1, check 2)

Validation check 1

-character check: to check that the account number contains only


numbers/digits and no letters

66
Computer Science Questions & Answer

Validation check 2

-presence check: to check that all the necessary fields are present eg customer
account number etc.

(d)The data on the meter card (indicated on diagram) is transferred to a


transaction file. The transaction file is then used to update the Master file.
The diagram below is part of the systems flowchart for the billing program.

sorted master
file
Update Program
Master file

Update master file print file containing

Statements

(i)Suggest three items of data that might be stored in the Master file but not
in the Transaction file.

Item 1: name and surname of customer

Item 2: stand number/address

Item 3: gender, contact details, employment details

(ii)Give two reasons why magnetic tape rather than a hard disk is used as the
storage medium in this application

67
Computer Science Questions & Answer

-offers sequential access, which is the most suitable for the application

-cheaper storage medium

-can produce back up immediately [2]

(iii)Before the update is started, the transaction file is first sorted into the
same order as that in the master file.

Explain why

-to read and compare the two records and to avoid missing other data

-faster in updating as they are of the same order

(iv)What type of processing is most suitable for this application?

-batch processing [1]

(v)Name one other type of data processing, giving an example of an


application where that processing is carried out

Type of processing: real time [1]

Example: booking systems (hotel, theatre)[1]

vi.For security against hackers

68
Computer Science Questions & Answer

QUESTON AND ANSWER MODULE

NOVEMBER 2010 PAPER 1

7014/01

1. Explain, using examples where appropriate, the meaning of the following


computer terms:

(a)Internet

Suggested answers

-a global interconnection of computer networks

-mother of networks

-interconnection of computers on a global scale [2]

(b)Hardware

-physical components of a computer e.g. mouse, keyboard

-tangible components of a computer system e.g. mouse keyboard etc [2]

( c)Electronic conferencing

-holding meetings over the internet in certain circumstances while hearing and
seeing each other e, g video conferencing [1]

(d)Control system

-a combination of components, hardware & software that controls a non-


computer equipment [1]

-the integration of a computer and other peripherals to control machinery and


plant

(e)De-skilling

-loss of work-related skill due to computerisation [1]

(f)Algorithm

-A sequence of instructions for solving a particular problem, eg pseudocode[2]

69
Computer Science Questions & Answer

(g)Compiler

-a translator that converts source code to object code in one go

-a program that converts high level language to machine code at once [2]

(h)Data Logging

-the automatic recording of physical quantities by a data logger

(i)Array

-a collection of homogenous data elements which are referred to under a


single name, e.g. an array of numbers can be declared as NUM=ARRAY [1…..N]
of numbers [2]

2. Most industries’ have now resorted to the use of Computer Aided Design
(CAD).

(a)Explain what you understand by the term Computer Aided Design.

-A computer program/system that can be used to produce technical and


architectural drawings by engineers [2[

(b)Describe any three advantages of using CAD

Any three from:

-more accurate drawings are produced

-drawing is done much faster than by hand

-has a library of parts

-offers powerful editing features e.g. adding colour

-images can be easily cropped

-images can be easily zoomed

-images can be easily rotated [6]

NB. Advantages to be described to get full marks

70
Computer Science Questions & Answer

(c)Give two disadvantages of using CAD

-causes de-skilling

-a good CAD system is expensive to set up

-requires considerable training and skill to use the system [2]

3. List three advantages and three disadvantages of speech output over


screen or printed output

Advantages

-appeals to a larger audience

-a faster way of transmitting information

Disadvantages

-those who cannot hear cannot use the system

-differences in pronunciation can cause misinterpretation

-a good speech output system is expensive to set up

-requires more powerful processors

(b)How might speech output help the following:

(i)the housewife

-by giving her some instructions on how to prepare a meal [1]

(ii)The disabled

-text to speech translators for the blind

(iii)the car driver

-warning messages:’ you are low on oil’, ‘release hand brake’ etc

71
Computer Science Questions & Answer

4. A database for a sports club contains a file of its members. Part of the file
is shown below.

Members’ No Surname First Sex Date of Birth


Name
0022 Mutanga James M 12/12/75
0018 Mhlanga Harriet F 03/04/77
0101 Nkomo Samkeliso F 08/09/74
0011 Danga James M 08/08/74
(a)Which field should be used as a key field? Explain your answer

-Members’ No[1]

-it uniquely identifies a club member(record[1]

b.Explain why it is not necessary to give the age as one of the fields

-age changes/needs continuous changing [1]

-age can be calculated from date of birth [1]

(c ) The sex of each member has been coded F or M. Suggest two reasons for
this.

Reason 1

-to ensure quicker data entry [1]

Reason 2

-to reduce typing errors

-to save memory space in memory

(d)It is decided to store members’ addresses in the database. Explain why it


would be advisable to use more than one field to store the addresses.

-address field may be too long for reports

-address may need mailing labels (will not work if single)

72
Computer Science Questions & Answer

-address line is too long/will make it difficult to make queries on the database
using the address[1]

(e)Name a device that you would use to input a photograph into the data file

-scanner

-digital camera

5. A community library in Chipinge may use a paper based record keeping


system, a convectional computer file system or database.

(a)Explain what is meant by a database

-a collection of logically related files

-a collection of related records

-an organised collection of structured data

-a system containing many different but interconnected files[1]

(b)Outline four advantages of using a database in an application such as a


library

Any four from:

-accessibility easy/faster

-reduce data redundancy

-maintains data integrity

-improves data security as enforced by a database administrator

-maintains data consistency

-easy production of reports

-easy handling of enquiries

-data is shareable

73
Computer Science Questions & Answer

-there is program-data independence

6. (a) What is an operating system

-a set of programs that directs computer operations

-a suite of programs that control the operation of a computer

-a set of programs that runs/drives a computer [2]

(b)Describe four tasks carried out by operating systems.

Any four from

-memory management

-file management

-peripheral device control

-multiprogramming

-error handling

-interrupt handling

-back up management

-start up the computer

(c ) The form of interface between the operator and the computer be either
be command line or graphical.

(i)Explain what you understand by the term graphical user interface.

-an operating system which interacts with a user through the use of
icons/pictures and clicking on menus/wimp

-the communication between a user and a computer through the use of


graphical images or symbols [2]

(ii)Describe any three advantages of using a Graphical User Interface


operating system as compared to a command line interface

-it is user friendly

74
Computer Science Questions & Answer

-offers multi-tasking

-offers online help

-faster to enter commands through clicking

-easy to use[3]

(iii)Describe any two advantages of using a command line interface operating


system

-use less memory

-faster to use once you have learnt the commands

-inexpensive hardware

-enables better security [2]

7.(a)A software company sends information to its customers by personalised


letters. These letters are created using e-mail merge facility. Describe the
process involved mail merge.

-produce the form letter/generic text

-open data source/data file and insert merge fields

-merge the form letter to the data source/data file[3]

(b)The company decides that the best method of sending mail to its customers
would be to use electronic mail. The company will connect to the Electronic
Mail Service Provider using a dial up facility through telephone lines. Name a
device that will enable the company’s computer dial to dial up to the service
provider and explain its function.

Device

-modem (modulator-demodulator [1]

Function

-to convert analogue signals to digital signals or vice versa.[1]

75
Computer Science Questions & Answer

(c )Give one advantage of electronic mail over sending ordinary letters

Any one from:

-cheaper

-faster/instant transmission

-undelivered messages returned

-offers a delivery report

-no stationery or paper used

-offers multiple addressing

-has facilities of attaching pictures and photographs

-large quantities of data can be transmitted using data compression techniques

[1]

8. Agreenhouse uses a microprocessor to monitor the climatic conditions for


plants.

(a)Name any three input devices to be used in the system.

-temperature sensor

-humidity sensor

-light level sensor

-carbon dioxide/oxygen level sensor [3]

(b)Name any two components which are controlled by the microprocessor in


the system to maintain a stable environment.

-heater

-air conditioner

-lights

-water valve [2]

76
Computer Science Questions & Answer

(c )Describe the processing to be done by the microprocessor in the system

-compares the current temperature with priest temperature

-compares the current humidity with the pre-set humidity

-compares the current light level with the pre-set light level

-compares the current oxygen /carbon dioxide level with the pre-set [3]

(d)Describe the output from the system.

-sends a signal to switch on/off the heater

-sends a signals to switch on/off the lights

- sends a signals to switch on/off the water supply

- sends a signals to switch on/off the oxygen/carbon dioxide supply.[2]


9. The spread sheet given is used to calculate weekly food costs at Mabvazuva in Wedza. It
is used to predict the effects of changing the number of animals.

A B C D E F G
1 Animal Number Cost of Preparation Number Cost of 1 Total cost
Name of food s Of Animal per Per week
Animals For 1 Cost for 1 Meals week
Meal/anim meal/anim Per
al al Week/anima
l
2 Elephan 20 $200 000 $100 000 14 $4200000 $84000000
t
3 Lion 5 $500 000 $100 000 7
4 Zebra 50 $300 000 $100 000 21
5 Crocodil 10 $700 000 $100 000 3
e
6 Leopard 5 $350 000 $100 000 3
7 Impala 100 $650 000 $100 000 21
8 Kudu 30 $400 000 $100 000 14
9
10
11
12

77
Computer Science Questions & Answer

(a)State the cell which tells you the number of leopards in the game park.

-B6[1]

(b)The Game Park gives the crocodiles to Garwe lodge in Harare. Since there
are no crocodiles in the game park, explain how you can use the spread sheet
package to delete row number 5.

-put the cell pointer in row 5

-right click the mouse button

-choose the delete option from the sub menu that comes up.

(accept any other reasonable variation)[2]

( c) The computer operator at the game park used a formula to work out the
total cost of feeding elephants per week. Write down a suitable formula he
might have used in cell G2.

=B2*(C2+D2)*E2/B2*F2

(d)Describe how a user can copy a formula in cell F2 into cells F3 to F8

-Activate cell F2

-Click on the bottom right corner of cell F2 until the pointer turns into the copy
mode

-drag the formula through cell F8(drag and fill)[2]

(e)Describe how the spreadsheet can be inserted into a word processed


letter to be sent to the National Parks.

- highlight the cells which contain data

-click edit on the menu bar

-choose copy from the drop down sub menu

-open the word processed letter

-click edit on the menu bar

78
Computer Science Questions & Answer

-choose paste [4]

10. Choose an appropriate methods of entering data for the following


situations or applications, in each case justify your answer

(a)Marking multiple choice examination scripts

-Optical Mark recognition /mark sense reader [2]

-can read shaded portions of documents.

(b)Computer Aided Design

-light pen/track ball/mouse/puck with graphic tablet

-easier to control and manipulate [2]

( c)Retail Outlet

-bar code reader/scanner/laser/magnetic stripe reader/smart card/EFTPOS,


Radio tag systems

-can read and interpret bar codes on commodities in retail outlets.[2]

(d)Getting quality coloured images into a Desktop Publisher System

-scanner/digital cameras

-device used to input graphics

(e)Reading cheques in a bank

-Magnetic ink character reader

-security/difficult to read [2]

(e) Production of a music sheet from a music keyboard

-MIDI based keyboard [2]

79
Computer Science Questions & Answer

NOVEMBER 2011

7014/01

1. What is a turn-around document?

- a document produced at one stage, has more information added/appended


to it and then used as an input at a later stage. eg a multiple choice scanner
sheet[1]

(b)Define a byte

-eight bits/ a group of bits that form a character [1]

( c) (i) Name any two peripheral devices that can be used for data input

Any two from

-keyboard

-mouse

-scanner

-MICR

-lightpen

-touchscreen

-web cam

-joystick

-OMR

-OCR

(accept any reasonable input device)[2]

80
Computer Science Questions & Answer

(ii)Describe an application where each of the input devices you have named
above can be used.

Keyboard-to type in data ad instructions [1]

Mouse –used to click on icons and menus to run programs [1]

Scanner-used to capture text or picture images

OMR –used to mark multiple choice examination scripts

MICR-used to clear cheques in banks

(Accept reasonable application of a named input device)

(d)Define the term encryption and give one reason why it is used in data
transmission.

-scrambling data before transmission

-converting data into unreadable form/scribing data/putting data into cypher


text[1]

Reason-to prevent unauthorised access/as a security measure to prevent


hackers from accessing data [1]

(e)(i)What does RAM stand for?

-Random Access Memory[1]

(ii)Give two functions of RAM

Any two from:

-acts as a data buffer

-stores contents of the screen

-stores data immediately needed by the CPU

-stores data in transit [2]

81
Computer Science Questions & Answer

(f)What does ROM stand for?

-Read Only Memory [1]

(ii)Give ay two functions of ROM

-stores boot up programs

-stores CMOS programs

-stores firmware

-stores programs essential for the normal running of a computer [2]

2. Marada High School has recently received a donation of computers. The


school’s computers are already connected to the Local Area Network. The
Head is intending to have to have the computers connected to the internet
so that he can easily communicate with his bosses and friends.

(a)State any two requirements for connecting to the internet.

Any two from:

-modem

-internet Service Provider

-web browser

-WIFI

-Telephone line/satellite/radio link/broad band/fibre optic [2]

(b)Give any two advantages that the school will have in using e-mail.

Any two from:

-provide 24-hour service

-there is fast transmission of data

-offers a delivery report

-offers multiple addressing

82
Computer Science Questions & Answer

-less costly for sending mails over long distances

-less paper work

-offers attachments of graphics/pictures [2]

(c ) Besides e-mail, state any other four facilities that will be offered by the
Internet to enhance learning or teaching at the school.

Any four from:

-chat sessions

-internet collaborative projects

-discussion forums

-search engines to research for information

-virtual library

-usenet groups

3. After connecting the school’s computers to the Internet, the head of


Academia High School was made aware that this development would expose
the computers to risks such as viruses.

(a)What is a computer virus?

-an illegal program that disrupts the operations of a computer, multiplies


itself.[3]

(b)Identify any two types of viruses that can attack a computer system.

Any two from:

-Boot sector viruses

-file viruses

-macro viruses

-trojan horses

-internet viruses

83
Computer Science Questions & Answer

-worms

-parasitic viruses

[2]

( c)Describe two ways in which viruses would eater the school’s computers.

Any two from:

-use of foreign, infected cds/flash disks/memory cards

-downloading software from the internet

-opening e-mails from unknown sites

-accessing untrusted web sites on the internet [2]

( d)Identify two precautions that the school would take to prevent or


minimise the spread of viruses into the school’s computers.

Any two from:

-install updated anti virus software

-scan foreign disks before disks

-firewalls

-buy software from authorised dealers

-inoculate files [2]

4. Chinyuke Company has decided to employ a Systems Analyst and a team


of Programmers so that they develop their own computer system rather than
rely on pre-designed systems. The following is a list of stages of a Systems
Development Life cycle.

Feasibility study

Analysis

Design

Implementation

84
Computer Science Questions & Answer

Testing

Installation

Maintenance

(a)Choose any three of the stages and briefly describe what is involved in
each stage.

Any three from

Feasibility study

-determining whether it is worth proceeding with a project or not by


considering technology, costs/benefits, time frame, how people’s working lives
would be affected etc[3]

Analysis

-an in-depth study of the current system and determining requirements for the
new system

-involves data collection techniques.[3]

Design

-making a blue print of the new system

-involves user interface design [3]

Testing

-means testing for standard, extreme and abnormal data

-a test plan/strategy is created [3]

Installation

-commissioning and putting the new system into place [3]

Maintenance

-making any modifications to the new system [3]

85
Computer Science Questions & Answer

(b) State two advantages of user-designed systems.

Any two from:

-can meet user requirements

-easy to modify

-it is cheaper to maintain

-it is cheaper to establish [2]

5. Mrs Chenungo has received a new brand of computers from her son in the
diaspora. She wants to use the computer for home use. She decided that an
operating system with a Graphical User Interface (GUI) be installed in the
computer.

(a)Using an example, define the term operating system

-a set/suite of programs that directs operations in a computer eg windows 8.

(b)State any three functions of operating system.

-memory management

-file management

-peripheral device control

-log preparation

-task management

-security by checking user ids and passwords

-multi –access

( c) State thee advantages of using GUI.

Any three from.

-User friendly

-allows multi-tasking

86
Computer Science Questions & Answer

-offers on line help

-novices can easily use it[3]

(d)State two disadvantages of GUI

-requires high resolution monitors

-usually slow to load

-occupies more RAM space [2]

6. After receiving a donation of computers, Knowledge Summit High has


decided to use one computer for administration to enter all students’
records. The school Head designed the following form to collect details of
each student. The head entered some fields and records in the form as given
below.

Student Number First Name Surname Class Date of birth


0034 Rudo Mhepo 3A1 14/07/1998
0002 Rosemary Adams 2B2 30/06/1999
0020 Chido Taona 1A1 12/02/2000
0004 Barbra Dennis Lower A 13/03/1996
0005 Panashe Sipuma Upper B 13/03/1994
(a)Define a field

-a collection of fields [1]

(b)What is a key field in a database?

-a field which uniquely identifies a record [1]

( c) In the form above, which field can be used as a key field?

-student number [1]

87
Computer Science Questions & Answer

(d)From the form above, give two fields of different data types.

Any two from:

Field data type

First name text

Class memo

Student number text

Date of birth date&time [2]

(e)Explain the meaning of a record

-a combination/collection of related fields

-a row in a database [1]

(f)How many records do we have in this form?

5[1]

(g)Define a database

-a collection of logically related files [1]

(h)List the first name(s) of students that will be displayed when the following
query is done

-panashe

(i)Give two advantages to the school for using a Database Management


System.

Any two from:

-eliminates data redundancy

-easy access to stored data

-maintains data integrity

-improved data security as enforced by the database administrator [2]

88
Computer Science Questions & Answer

7. The use of robotics within manufacturing sector is now science fact, and
not fiction.

(a)Define a robot

-a computerised mechanical machine which is capable of doing work that is


normally done by human beings

-a computer controlled machine that is sufficiently flexible to be able to do a


variety of tasks [1]

(b)State three advantages of using robots

Any three from:

-can work in dangerous/harmful environments

-can work 24 hours a day

-improved productivity

-robots do not go on strike

-can work with precision/accuracy

-can do repetitive work easily

-cheap as they do not required wages/pay [2]

(c )State two disadvantages of using robots.

Any two from:

-High cost of purchase

-can cause de-skilling

-may increase unemployment

-expensive to maintain

89
Computer Science Questions & Answer

8. Computer programs can be programs are developed in both low and high
level languages.

(a)What is meant by machine language?

-the actual zeros and ones

-machine specific

-not portable

-language understood by a computer

-machine language need not be translated.

(b)What is meant by assembly language?

-low language written in mnemonic codes/symbols

-machine specific

-not portable [2]

(c )Give two examples of software types that are developed using low level
languages.

Any two from:

-games software

-operating systems

-simulation software

(d)State three examples of 4th generation languages

-java

-visual c++

-visual basic

-HTML

-Dreamweaver

90
Computer Science Questions & Answer

-flash

-utility software

9. The following are the three basic control structures used in structured
programming.
(c)
(a) (b)

condition
condition

Name and explain the function of each programming construct shown above.

(i)Structure (a)

Sequence/Linear: involves executing one instruction after the other [2]

(ii) Structure (b)

Selection/Decision: one route is followed depending on the result of a


condition [2]

(iii)Structure ( c)

Repetition/Looping/Iteration

-involves repeatedly executing a certain group of statements until a certain


condition is met.[2]

91
Computer Science Questions & Answer

10. A student designed the following pseudocode, which he will develop into
a program to help him do a certain mathematical calculation.

START

Power=0

Number =1

WHILE Power <5

DO

Number =Number *2

Power =Power +1

PRINT Number

END WHILE

END

(a)What is the value of power at the end of the program?

5[1]

(b)Dry run the pseudocode and write down its output.

16

32

( c)What will be the output if the statement PRINT Number is placed


immediately after ENDWHILE.

32 [1]

92
Computer Science Questions & Answer

(d)Why was number initialised to zero ( 0) in the algorithm?

To have a starting value [2]

11. The SDA at Sunshine Secondary School bought 20 computers for the
school. An information Technology consultant advised them to set up a LAN
which they would later hook-up to a WAN.

(a)What does the term WAN stand for?

-Wide Area Network [1]

(b)Identify any three features of a LAN

-Network cables

-server

-hub

-covers a small geographical site eg same room, site [3]

( c) Explain the meaning of the term Electronic Scabbing?

-transfer of computer duties from striking workers in one location to non-


strikers in another location electronically using the internet.[2]

93
Computer Science Questions & Answer

NOVEMBER 2012
7014/01

1. Explain the following computer terms, use relevant examples where


appropriate.

(a)Check digit

Any one from.

-an additional number placed at the end of the original number calculated
from the other numbers e,g employee code number/account number(for
validation purposes)

-a calculated digit attached /appended to a numeric field to assure validity


when referenced in the future eg customer account/employee
number/product number in a supermarket.[2]

(b)Feasibility study

-it is a preliminary investigation of a problem used to decide whether a


solution is possible and how it may be done [2]

( c) Debugging

-means finding and correcting errors in a program e.g logic and coding
errors[2]

(d)Modem

-a communication device that translates digital data to analogue /vice versa


using telephone line/modulator –demodulator device that translates digital
data to analogue /vice versa[2]

(e)Compiler

-a program that translates a complete program into object code before it can
be executed [2]

94
Computer Science Questions & Answer

(f)Pseudocode

Any one from

-a method used to express the logic required in the solution of a problem using
English –like statements/phrases

-provides a means of expressing algorithms without worrying about the syntax


of a particular language.[2]

(g)Scrolling

-the ability to move line/pages on a screen either vertically or horizontally [2]

2. After a program has been planned, it is given a dry run.

(a)Explain the term dry run.

-the use of test data to check manually the paths through a system or
flowchart or program without using a computer [1]

(b)Name any two types of errors in a computer program

-semantic error

-syntax error

-logical error

-run time/execution error [2]

(c )Distinguish between a program and a process

-a program is a complete set of instructions that can be executed by the


computer to perform some tasks whereas a process is a task or operation that
has to be carried out within a computer system e.g editing, sorting a file[2]

3. (a)Define the term systems analysis

-A detailed investigation into the current system and a determination of


requirements for the new system

-can involve data collection procedures e.g questionnaires, interviews,


observations, record inspection etc.[2]

95
Computer Science Questions & Answer

(b)Add two missing stages to the following

1. Feasibility study

2. Systems study and analysis

3. Systems design

4. Programming

-implementation/conversion

-control and review/evaluation [2]

( c) Documentation is important to any system. Explain the terms program


and user documentation.

(i) program documentation means a complete description of the problem

-supports the use of charts, helpful notes, program listings, test data ad
expected results

-it is designed so that programmers can amend or improve the program [2]

(ii)User documentation-it is sometimes extracted from the full program


documentation

And should give user sufficient information to load and run the
program/package

-it is designed for the user and should therefore be easy to read and non-
technical

-it is overall description of the system –objectives, inputs required, processing


done and output produced [2]

(d)Describe any one changeover procedure that can be applied on a system


changeover.

Any one from:

-Parallel changeover-when the new system is run alongside the with old
system

96
Computer Science Questions & Answer

-Phased changeover-this involves changing from the old to the new system in a
number of stages rather than at once

-direct/straight/crash changeover-this is the complete replacement of the old


system by the new system at one go.[2]

-Pilot-where the new system is implemented in a certain department of the


total implementation area. Other departments will still be using the old
system.

4. A database is linked with applications by a database management system.

(a)State any four functions of Database Management System

Any four from:

-maintains data in the database by adding new records, deleting dead records
and amending records

-it provides facilities for various for different types of file processing e.g. print
reports link or merge contents

-it acts as the function of providing security for data in the database

-restart facilities after a hardware of software failure i.e back-up and recovery.

-it provides data dictionary

-it provides the creation and maintenance of data

-offers query handling/searching [4]

(b)Distinguish between a Database Administrator and Database


Management System.

-database administrator is a person responsible for supervising /maintaining


/manning vital operations on the database held on a computers whereas a
database management system is a set of programs designed to link user
applications with the database[2].

97
Computer Science Questions & Answer

( c) Give one example of a Database Management System used on micro


computers

Any one from.

-Ms Access

-Dbase

-Paradox [1]

5. (a) Name two methods of updating a master file

Method 1

-updating by copying/grandfather-father-son (file generations)[1]

Method 2

-updating is situ/in position [1]

(b)Distinguish data from information

-data are raw facts/unprocessed facts /facts not put into context whereas
information are processed facts/facts put into context [2]

( c) Name a purchase order that can be read by a computer or converted to a


machine readable form

-source document (e.g. electricity bills, gas bills[1]

(d)(i)Give three ways in which screen outputs can highlight entries

Any three from:

-colour

-bold face

-reverse video

-a blinking cursor

-underline

98
Computer Science Questions & Answer

-italics

-word art

-fonts

-animations

-highlighter [3]

(ii)State in correct order the steps taken to change font size of a word in a
document

-highlight the word

-click on the font size icon on the formatting toolbar

-make an adjustment of the font size

[3]

(Accept reasonable variation)

(e)Name the system which uses remote terminals in retail establishments to


enter data at the locations where business is transacted.

-point of (POS)

6. Identify two types of application software

-Ms Word

-Ms Access

-Ms Excel

-Corel Draw

-Power point

-Publisher [2]

99
Computer Science Questions & Answer

(b)List three components of an integrated package

-Spreadsheet

-Word Processing

-Database management system

-Presentation

-Desktop Publishing [3]

( c) Name a specialised drawing software that helps architects and engineers.

-auto cad/cad(computer aided design)

-cam (computer aided manufacture)[1]

(d)State the name given to a set of instructions that when added to an


operating system or application program can destroy the product and even
infect some files.

-virus [1]

7.(i) Explain why computer systems are widely used for process control in
industries such as the chemical industry

-computers can work for 24 hours a day

-computers can do monotonous tasks

-computers can do dangerous or unpleasant tasks

-once set up and installed, computers are economical than human beings

-faster than a human being

-computers are very fast to carry out operations

-computers can handle very complex calculations in a short space of time.

100
Computer Science Questions & Answer

(ii)Describe the organisation of such systems including the types of hardware


needed to capture and process the data.

-a computer used for chemical process control must have sensors to permit
process monitoring

-transducers to convert the information collected by the sensors into voltages

-real-time clock so that it can respond to events in real-time

-analogue to digital converters to change information to binary form[4]

8. (a) Give two reasons why the continuing Information Technology


revolution is leading to loss of jobs.

Any two from:

-computers can do jobs meant for so many people

-computers are consistent

-computers are very fast to perform operations

-computers can do work 24 hours a day

-computers do not go on strike

-computers can even operate I harmful environments [2]

(b) “In the near future, computer keyboards will be obsolete as every
computer will be capable of direct speech input”

State three disadvantages of the use of direct speech input

-any three from

-some noisy environments are not suitable for speech input

-it would be time consuming to speak eg mathematical expressions than type


them

-punctuations will be a problem

-it is difficult for the machine to identify different voices (speaker)

101
Computer Science Questions & Answer

-use of homophones eg rhyme words continuous speed

-takes more ram space

-no consistency (repeat)

-does accommodate the dumb [3]

9. Single chip computers embedded into a plastic credit card size are used to
store personal and financial records. Information can be read from or stored
on the card using special terminals.

(a)List two advantages and two disadvantages of using such cards.

Advantages

Any two from:

-a lot of information can be stored on the card

-can be kept by the holders

-easy way of having data eg medical records available wherever you are

-could be used as an identity card holding scanned photograph can be used for
purchasing

-money can be carried in electronic form and that offers more security to
customers.[2]

Disadvantages

Any two from

-might be difficult to replace

-the card could be lost or destroyed accidentally

-cannot read data without special equipment [2]

102
Computer Science Questions & Answer

(b)State any two conditions that need to be met for such cards to be widely
used.

Any two from

-the card would need to be cheap

-robust

-easily replaceable

-difficult to forge

-secure against fraudulent use

-convenient to use [2]

10. An international agency owning a large collection of photographs sells


copies to newspaper publishers. The agency decides to store a copy of the
collection on optical discs such as CD-ROM.

(a)Give two reasons why the optical disc is an appropriate medium.

Any two from:

-they store large amounts of data/has a huge capacity because of their huge
capacity they distribute software on a single disk

-it is not easily damaged

-it is not very difficult to keep

-they can be used in multi-media systems

-it can only be read from but cannot be altered

-high access speed [2]

103
Computer Science Questions & Answer

(b)State two differences between RAM and ROM

Any two from:

RAM ROM
Volatile Non volatile
Rewritable Not re-Writable
Temporary Permanent
[2]

11. State two functions of an Automated Teller Machine (ATM).

Any two from

-cash dispensing

-checking account balances

-money transfers

-payment of bills

-mini statements preparation [2]

(b)Explain any one benefit of using an ATM

(i)to the customer

-no need to wait in long queues in banks-you just use an ATM

-no need of carrying a lot of cash to make payment of bills, accounts etc

-customers can obtain money and other banking services at any time of the
day or night (offers 24 hour service)

[2]

(ii)to the bank

-the bank does not need to employ so many people

-no need for building expensive banking halls

-ATMS can be placed in public places such as supermarkets, walls of banks and
building societies [2]

104
Computer Science Questions & Answer

12. A large company uses electronic mailing system to communicate between


its offices in different geographical sites using WAN as well as between
offices in the same building using LAN.

(a)What does WAN stand for

-wide area network [1]

(b)Name two communication methods that can be used within a WAN

-telephone system

-satellite

-WIFI

-Radio

(c)Give three advantages of using an electronic mail system.

Any three form

-both parties no need to be present

-can send messages quickly to several people at once

-cheaper to send large volumes of data

-offers 24 hour service

-offers more security through passwords

-pictures can be sent

[3]

105
Computer Science Questions & Answer

13. A doctor may store patients details either on a microcomputer or on a


card index file.

Give two advantages of using a micro-computer

-Easy to amend records/update

-fast information retrieval

-records are secure [2]

(b)Give two advantages of using a card index file.

-easy to use

- a hard copy can be carried

-cheaper

-acts as back up [2]

14. A school decides to set up a database for its pupils and staff. The
database will include data on:

(i)each student

(ii) each teacher

(iii) parent and home

(iv) medical records

Give two items to be included in the database for

(a)each student

-first name

-class

-surname

-date of birth

- sex [2]

106
Computer Science Questions & Answer

(b) each teacher

-I.D Number

-first name

-address

-telephone number

-last name

-telephone number

-Next of kin

-date of joining service [2]

(c) parent and home

-name

-address

-telephone number (home, work)

-name of child [2]

(d)medical records

-doctor’s name

-telephone number

-recent illness

-special needs

-doctor’s ID Number

-Allergies

[2]

***********************the end***********************************

107

You might also like