Computer Studies Questions and Answers - Copy
Computer Studies Questions and Answers - Copy
7014/01
NOVEMBER 2004
(a)Multimedia
-a computer system that combines voice, sound, text, graphics and animation
into a single system.[1]
(b)Check sum
(c) Hacking
(d)Encryption
(e )Internet
1
Computer Science Questions & Answer
(b)State two precautions you would use to protect your computer from
viruses at your school.
-inoculate files
(b) All robots have the same basic components. Give two of these
components, describing clearly the purpose of each.
Component 1: Sensors
Component 2: Micropropcessor
Component 3: Actuators/Limbs/Arms
2
Computer Science Questions & Answer
(c )Give four reasons why the use of robots has gained popularity in various
industries.
-cause de-skilling
3
Computer Science Questions & Answer
Statement 2
condition
Statement 3
Statement 2
( C)
Condition Statement 1
Statement 2
A: Sequence/Linear
B: Iteration/Repetition/Loop
C: Selection
4
Computer Science Questions & Answer
(b)Study the algorithm below and answer the questions that follow.
Begin
Input mark
Add 1 to counter
End if
Print sum
Print counter
(i)Complete the trace table for the algorithm using the following set of
marks:
5
Computer Science Questions & Answer
(iii)The mark -100 is known as the rogue value. What is the purpose of this
value?
5. A personal computer (PC) is supplied with 32MB RAM, 3.2GB hard disk
preloaded with the operating system and software applications. Some of the
applications have interpreters and compilers.
(i)An interpreter
-A program that translates high level language into machine code statement by
statement during execution.
(ii)A compiler
-a program that translates a high level language program into machine code,
the entire program at once.
6
Computer Science Questions & Answer
-user friendly
-allows multi-tasking
-easy to learn
-memory management
-file management
-error handling
-multiprogramming
-task management
-log preparation
-Interrupt handling
-multi tasking is where a user performs more than one task on the same
machine at the same time whereas a multi access system is one in which a
main computer is accessed by many users apparently at the same time via
remote terminals. Each user is allocated a time slice and has the impression
that is the only one using the main computer.[2]
7
Computer Science Questions & Answer
7. The manager of Day and Night Travel Agency has made a proposal to
change their manual payroll to a computerised system. Suggest two factors
that may have motivated the manager to take this step.
(b)Besides conducting the feasibility study, give any three key roles played by
a systems analyst in developing the payroll system.
-data collection
-requirements specification
-system design
Economic feasibility: weighs costs and benefits for coming up with a new
system
8
Computer Science Questions & Answer
Operational feasibility: how much the current work practices and procedures
support the new system
Schedule feasibility: considers the time the project would take to implement.
-data are unprocessed facts whereas information are processed facts (data put
into context) [2]
-fibre optic
-satellite
9
Computer Science Questions & Answer
-so that only authorised users can access the mail box and prevent file
corruption.[1]
10
Computer Science Questions & Answer
(i) Field
(ii) record
(iii) database
-price
-quantity [1]
11
Computer Science Questions & Answer
(ii)Which field can be used as the key field when searching for
specificrecords? Give a reason for your answer.
-ISBN NO.
(iii)Complete the table below indicating the field type for each field including
the field you gave in b (i). The first has been done for you as an example
A B C D E F G H
1 Student name Hist Sci Maths Comp French Total Average
2 Chipo 70 53 18 43 80
3 Patrick 62 82 69 71 51
4 Kesha 21 59 73 89 72
5 Mandla 50 53 19 37 59
6 Ian 75 54 51 57 43
7 Totals 278 301 230 297 305
8 Average 55.6 60.2 46.0 59.4 ***
9
(a)State the difference averages in row 8 and averages in column H
12
Computer Science Questions & Answer
(c) G7 does not show the total number but has hashes (###.....) or
esterics(***…..) displayed.
(i)Suggest a reason why the spreadsheet automatically put these in the cell.
-the cell width is too small to accommodate the length of the total [1]
(ii) How do you make the spread sheet display the total in cell G7?
-increase the column width/drag the column until the figure appears
13
Computer Science Questions & Answer
NOVEMBER 2006
PAPER 1:7014/01
14
Computer Science Questions & Answer
-facilities on the internet that enable users to have fast access to global
information resources or allow transfer of information on the World
Wide Web [2]
2.(a)Give four functions of an operating system.
Any four from:
-file management
-memory management
-resource allocation
-interrupt handling
-errors handling
-peripheral device control
-task management
-log preparation [4]
(b)Modern Operating systems use the Graphical user Interface. Explain
what is meant by Graphical User Interface.
-the communication between a user and a computer through the use of
icons, pointing devices, pull down menus.
- the communication between a user and a computer through the use of
graphic symbols/images/pictures[2]
(ii)Give three advantages of the GUI compared to earlier Disk
Operating System.
-allows multi-tasking
-offers help facilities
-easy to learn
-user friendly3]
(c) Which of the following instruction codes could be part of operating
system software as written by a programmer?
A.011100101110101
B. Print Z at LPT 1
C.LDA TOT
-C LDA TOT [1]
(ii)Give a reason for your choice
-operating systems written in low level language using mnemonic codes
15
Computer Science Questions & Answer
-batch processing allows jobs to be collected over a period of time; jobs are
large, processed offline whilst real-time processing allows processing to be
done on line as transactions occur.
16
Computer Science Questions & Answer
(b)A to Z wish to set up a database of its clients. Describe how you would
create the database of the client names, accountnumbers, addresses and
account balances.
-declare fields (eg client name, account number etc) and their data types in the
design view of Ms Access
-create any queries, reports and forms that may be required in the
database.[5]
( c) The database is stored on a hard disc. What type of file access would be
used?
17
Computer Science Questions & Answer
(d)Describe how the clients database could be used in conjunction with the
Word Processor to send the same letter to all clients with balances greater
than zero advising the clients of the balances on their accounts.
-create a query
-in the design view, in the criteria section, under balances, write the criteria >0
-copy the query you created and paste it in a word processor and use mail
merge to send the same letter to different clients.
Or
-calculations of wages/payroll
-statistical calculations
-financial analysis
-tax estimations
18
Computer Science Questions & Answer
-variety of pictures/graphics
-variety of fonts
5. Matetsi High School has a Local Area Network (LAN) which is used by its
students. Students login on a workstation and use software such as word
processors and Spreadsheet. They can also receive and send electronic mail
via a Service Provider. The LAN is a star network which is linked to a Service
Provider for electronic mail (e-mail) access.
(a) In the space provided below, draw a labelled diagram of the star network.
workstation
data cable
workstation Server/central computer/hub
workstation
[4]
workstation
19
Computer Science Questions & Answer
20
Computer Science Questions & Answer
21
Computer Science Questions & Answer
22
Computer Science Questions & Answer
23
Computer Science Questions & Answer
Eject card
Else
Retain card
END IF
(i)What is the relationship between the check number and the PIN?
-check number is the sum of digits in PIN [2]
(ii)Dry run this algorithm for the following two cards when they are
inserted into the ATM and determine the output for each card giving a
reason for your answer.
CARD 1: PIN 2 8 3 7 4 6 5 5 3
CARD 2: PIN 9 8 7 6 8 7 8 9 1
Output for card 1
Start
Read check number from card
Set error count to 0
Set flag to true
24
Computer Science Questions & Answer
25
Computer Science Questions & Answer
NOVEMBER 2007
(a) debug
( c)File generations
-these are new master files which result after updating files by copying (at
most 3 generations are kept)[2]
(d)Random access
(e) byte
26
Computer Science Questions & Answer
(i) Macro
2. In the following algorithm, INT (a) retains the integer value of a whole
number of part a.
e.g if a=3.5 then INT(3.5) which is 3 and if a=6 then INT(a) is equal to INT(6)
which is 6.
Input number
Num=number/2
b=INT (num)
c=num-6
r=c*2
number =b
END WHILE
27
Computer Science Questions & Answer
(a)Dry run this algorithm using the grid below, using 9 as the number input.
[4]
(i)Education
-research
-E-learning
-E-marking [2]
(b) Tourism
-Advertising-information
-bookings
28
Computer Science Questions & Answer
(iii)Agriculture
-greenhouses
-research
-payroll
[2]
4(a) State two main differences between control systems and automated
systems
-lacks the ability to collect & analyse data-can collect and analyse data
29
Computer Science Questions & Answer
-pedestrians waiting to cross the road can be fitted on with traffic flows[2]
5. (a) State any four components that make up computer hardware (each
component should be functionally different from the other)
(b)Name any two storage devices suitable for back up in a bank. Explain why
you think they are appropriate.
Device
-magnetic tape
Explanation
-cheap
Device
Explanation
-robust
30
Computer Science Questions & Answer
(i) communication (e-mails) where messages are transmitted from one use to
the other electronically
(i)Give one problem or danger which might occur when pupils have
unsupervised access to the internet
( c) The IT. Teacher often changes her password to log onto the internet.
(i)Give one reason why the teacher should change her password regularly.
31
Computer Science Questions & Answer
(ii)When changing the password, the IT teacher must type it in twice before
the computer accepts the new password. Why does she have to type the new
password in twice?
-to verify if the password was typed correctly/confirm the new password [2]
(a)Name four fields you would expect to find in the students database file,
one of these fields must be a key field.
[1]
(Advantage1, advantage 2)
32
Computer Science Questions & Answer
(ii)Other than the cost of hardware and software, give two problems that
might occur when introducing a new computerised system (problem 1,
problem2)
8. (a)A typical business microcomputer stores all its software and data files
on a hard disk. It also has a floppy disk drive. List four different reasons why
the floppy disk drive may still be needed.
-the bar code reader scans commodities by light/laser beam; the sequence is
converted into a binary pattern which is the passed onto the computer and
interpreted. [2]
-product/item code
-manufacturer code
33
Computer Science Questions & Answer
Describe three ways in which computer hackers might do more harm than an
office burglar.
-delete/corrupt/change software
-planting of viruses
(b)(i) List four symptoms which may indicate a possible virus attack
-hardware malfunctioning
34
Computer Science Questions & Answer
-inoculate files
-use of firewalls
35
Computer Science Questions & Answer
(b)A clothing shop keeps information about its products on a computer file.
Part of the computer file is shown below.
[2]
(i)Give one reason why only using one letter for the colour code could create
a problem.
(iii)Some of the fields in the clothing file are of fixed length, while others are
of variable length.
-easy to update
[1]
-wastes space on secondary storage medium if fields are short than that
declared
-[1]
-it is easier to back up data held on a server than on many individual machines
-it is easier to store application programs on one computer and make them
available to all users rather than having copies individually installed on each
computer. [2]
(b)LAN and WAN are two different types of networks. What does LAN and
WAN stand for?
-LAN covers a small geographical area e.g. office, building, same site whereas a
WAN covers a wide geographical area e.g. countries, cities
-LAN uses cables for communication whereas LAN uses radio links, satellite,
microwave etc.[2]
37
Computer Science Questions & Answer
-firewalls
-Network Adapter
-Cables
[1]
-web browser
38
Computer Science Questions & Answer
(a)Simulation
(b)Expert system
(c )Rogue value
(d)Intranet
[1]
39
Computer Science Questions & Answer
(e)Multimedia system
-the integration of text, sound, video, graphics and animation into a single
system [2]
(f)Technical documentation
-explanation about what the program does/how the system operates and is
meant for fellow programmers and systems analysts.[2]
-temperatures[1]
-calculating
-switches on/off[1]
-kettle
40
Computer Science Questions & Answer
-microwave/oven
-easy to use
-self documenting
-utilities/libraries
-portability
-checking that data is reasonable in the context in which it is used and is done
by a computer program [2]
41
Computer Science Questions & Answer
Range check
-to ensure marks are within the correct boundaries/demarcations e,g between
0 and 100[1]
-investigation
-design
-development
-implementation
-feasibility study
-review/maintenance
42
Computer Science Questions & Answer
LANGUAGE A LANGUAGE B
BEGIN 0100000000000000001010
Number=20 11100000000000000001010
Total =0 00000000000000010110111
DO 101000000000000000010100
ENDWHILE 10001000000000000100000
100010110001100000000000
011111111111111111111111
LANGUAGE C 100010001000100010000000
100000100000000000000000
BEGIN 010001000100010000100010
NUM10101 0000000000000000000000001
ACC,C
STA TOT
LDA NUM
43
Computer Science Questions & Answer
A JAZ B
ADD TOT
STA TOT
LDA NUM
ACC, S,1
STA NUM
JPU A
B HLT
END
(b)(i)Name a program that can translate the entire code of language A to the
code of language B at once
-compiler [1]
(ii)Name a program that can translate the code of language C to the code of B
-assembler [1
(c)Give one reason why operating systems software and computer games are
written in assembly language than in a high level language.
Any of:
-runs faster
44
Computer Science Questions & Answer
-primary storage does not have a very high storage capacity which may be
required by a computer
[3]
RAM ROM
8. Tinashe has seen some cheap movie tickets using the teletext service on
his TV. He is advised to use e-mail 9electronic mail) to order his tickets.
(i)Why could Tinashe not order the movie tickets using the Teletext service?
45
Computer Science Questions & Answer
(iii)Give two reasons why Tinashe used e-mail instead of posting the order.
-e-mail is faster
-weight less
start
Cost=$100 000
OUTPUT COST
Stop
46
Computer Science Questions & Answer
(i)Write down the output for each of the following inputs [4]
INPUT OUTPUT
4 $100 000
12 $110 000
10 $100 000
15 $125 000
-1 mark for correct item
-easier to follow
(iii)Describe two different types of test data that should be used to test the
program when it is written
-standard[1]
-extreme [1]
-abnormal [1]
47
Computer Science Questions & Answer
(c )Explain how the robot is always is always able to follow the left wall
48
Computer Science Questions & Answer
(i)State three ways in which the computer could have acquired the computer
virus
-antivirus
-scan disk
-scan mail
-firewalls [3]
(b)Your teacher has asked you to produce a class newsletter that will include
text and graphics.
(ii)Explain why the software you mentioned above in (a) above would be
most suitable.
-layout
49
Computer Science Questions & Answer
11. The following piece of text has been created using a word processor
package. It needs to be corrected and formatted.
This type of multi- media learning is now a very common feature of distance
education. More learning materials are on CD-ROMS.
Explain carefully how you would use a word processing package to perform
each of the following tasks.
50
Computer Science Questions & Answer
(c )Align /justify all text, except the heading, on both the left and the right.
-click edit on the menu bar and choose paste from the drop down submenu[2]
-highlight paragraph 2
51
Computer Science Questions & Answer
A B C D E
(forecast)
8 Total
12.The following rainfall table for a town in Zimbabwe was created using a
spreadsheet.
(a)Write a formula in cell B8 to calculate the total for the 2001-2002 season
-=sum(b2:b7)
Or =b2+b3+b4+b5+b6+b7 [2]
(b)Explain how you would copy the same formula from cell B8 to cells C8,D8
and E8
-select cell B8
Or select cell B8
52
Computer Science Questions & Answer
( c) There are no rainfall figures for column E,the figures are to be obtained
by averaging rainfall for the previous 3 seasons. Write a formula in cell E2 to
achieve this.
=average (b2:d2)
Or =sum (b2:d2)/3
Or =(b2+c2+d2)/3[2]
(d)Explain how you would insert a graph to show the rainfall pattern for the
2001-2002 season.
53
Computer Science Questions & Answer
(a)Electronic Commerce
-an output document which has details added to it and then used as an
input at a later stage
-eg electricity bills, water bills, multiple choice answer sheets, cheques [1]
( c)Gigabyte
-1 billion bytes
1024MB[1]
(d)Multiprogramming
(f)Interrupt
54
Computer Science Questions & Answer
(g)Spooling
-data from the processor is written to a faster access storage device being
released to a slow output device eg printer.
(h)End –User
(i)Hardcopy
-printed output
(j)Icon
(k)Software Piracy
55
Computer Science Questions & Answer
-memory management
-file management
-interrupt handling
-multitasking
-multiprogramming
-multi-access [6]
56
Computer Science Questions & Answer
-it is permanent
[3]
-leads to de-skilling
5(a) Describe any three differences between high level and low level
language.
57
Computer Science Questions & Answer
(b)Operating systems are written using low level languages; explain any
reason why operating systems are written using in low level language.
80-100 Distinction
70-79 Credit
50-69 Pass
0-49 Fail
1. Initialise variables
2. While mark <>999
3. Input mark
4. If mark >80 and mark <=100 THEN
5. GRADE is Distinction
6. END IF
7. IF Mark >70 and mark <=80 THEN
8. GRADE IS CREDIT
9. END IF
10.IF Mark >50 and mark <=69 THEN
11. GRADE is pass
12.END IF
13.IF mark >0 and mark <=50 THEN
14. GRADE IS FAIL
15.END IF
58
Computer Science Questions & Answer
16.END WHILE
(a)In the table below, dry run the algorithm using the following test
data. Where there is no output indicate “no output”
Mark Grade
45 Fail
80 Credit
75 Credit
90 Distinction
70 No output
50 Fail
999 No output
[3]
(b)The algorithm has an error. What is the problem with the algorithm?
Identify any error in the above program.
(a)(i)Joystick
59
Computer Science Questions & Answer
( b)Name one way in which words can be input to a computer other than
by a keyboard.
-scanner
-voice commands
-memory management
-file management
-interrupt handling
-multitasking
-multiprogramming
-multi-access [4]
-payroll
-electricity billing
-water billing
60
Computer Science Questions & Answer
-airline reservation
-hotel reservation
Reasons
-means carrying out more than one task on the same machine at the same
time.[1]
Reason
(b)State three devices that can be used to input photographs into the
computer.
-digital camera
-scanner
61
Computer Science Questions & Answer
-web camera
(c )Explain how you would move a picture from one file to another
-right click while pointing on the picture and choose cut from the drop
down sub menu
-open the file in which you want to move the picture to.
-right click and choose paste from the drop down sub menu [3]
Explain any three sensible ways in which the data can be protected from
illegal access.
(i)-use firewalls
62
Computer Science Questions & Answer
(c )(i)Apart from hacking and power failure, students’ data can be lost in a
number of ways, suggest any two ways in which the student data can be
lost.
-viruses[1]
(ii)For each of the two ways you named in (i) above, suggest one method
of preventing data loss.
prevention
2. Corruption of data
Prevention
63
Computer Science Questions & Answer
surname
First name
sex
Date of birth
class
address
Telephone number
class
sport
(b)The systems analyst wants to use the surname as the key field.
64
Computer Science Questions & Answer
(ii)Explain why the surname filed may not be a sensible field to use as a
key field
-it identifies a group of records, it does not identify a record uniquely [1]
(iii)Suggest one field which can be added to the information system for
use as the key field
(c) Name the stage in the systems development life cycle where the
screen layouts are prepared.
-design [1]
-checking that data is reasonable in the context it is being used and is done
by a computer program
Validation check 1
Validation check 2
Presence check-checking that all the necessary fields are present [1]
Validation check 3
Validation check 4
65
Computer Science Questions & Answer
12. An electricity Supply Authority has to bill its customers once a month.
Every month, meter readers visit each customer and fill out a meter card
which can be read by a document reader. Fig 7.0 shows the meter card
that the authority uses(diagram provided)
(a)Name the method that is used to read data from the meter cards into the
computer.
(c) State and explain two validation checks that the computer can carry out
on the data that has been read (check 1, check 2)
Validation check 1
66
Computer Science Questions & Answer
Validation check 2
-presence check: to check that all the necessary fields are present eg customer
account number etc.
sorted master
file
Update Program
Master file
Statements
(i)Suggest three items of data that might be stored in the Master file but not
in the Transaction file.
(ii)Give two reasons why magnetic tape rather than a hard disk is used as the
storage medium in this application
67
Computer Science Questions & Answer
-offers sequential access, which is the most suitable for the application
(iii)Before the update is started, the transaction file is first sorted into the
same order as that in the master file.
Explain why
-to read and compare the two records and to avoid missing other data
68
Computer Science Questions & Answer
7014/01
(a)Internet
Suggested answers
-mother of networks
(b)Hardware
( c)Electronic conferencing
-holding meetings over the internet in certain circumstances while hearing and
seeing each other e, g video conferencing [1]
(d)Control system
(e)De-skilling
(f)Algorithm
69
Computer Science Questions & Answer
(g)Compiler
-a program that converts high level language to machine code at once [2]
(h)Data Logging
(i)Array
2. Most industries’ have now resorted to the use of Computer Aided Design
(CAD).
70
Computer Science Questions & Answer
-causes de-skilling
Advantages
Disadvantages
(i)the housewife
(ii)The disabled
-warning messages:’ you are low on oil’, ‘release hand brake’ etc
71
Computer Science Questions & Answer
4. A database for a sports club contains a file of its members. Part of the file
is shown below.
-Members’ No[1]
b.Explain why it is not necessary to give the age as one of the fields
(c ) The sex of each member has been coded F or M. Suggest two reasons for
this.
Reason 1
Reason 2
72
Computer Science Questions & Answer
-address line is too long/will make it difficult to make queries on the database
using the address[1]
(e)Name a device that you would use to input a photograph into the data file
-scanner
-digital camera
-accessibility easy/faster
-data is shareable
73
Computer Science Questions & Answer
-memory management
-file management
-multiprogramming
-error handling
-interrupt handling
-back up management
(c ) The form of interface between the operator and the computer be either
be command line or graphical.
-an operating system which interacts with a user through the use of
icons/pictures and clicking on menus/wimp
74
Computer Science Questions & Answer
-offers multi-tasking
-easy to use[3]
-inexpensive hardware
(b)The company decides that the best method of sending mail to its customers
would be to use electronic mail. The company will connect to the Electronic
Mail Service Provider using a dial up facility through telephone lines. Name a
device that will enable the company’s computer dial to dial up to the service
provider and explain its function.
Device
Function
75
Computer Science Questions & Answer
-cheaper
-faster/instant transmission
[1]
-temperature sensor
-humidity sensor
-heater
-air conditioner
-lights
76
Computer Science Questions & Answer
-compares the current light level with the pre-set light level
-compares the current oxygen /carbon dioxide level with the pre-set [3]
A B C D E F G
1 Animal Number Cost of Preparation Number Cost of 1 Total cost
Name of food s Of Animal per Per week
Animals For 1 Cost for 1 Meals week
Meal/anim meal/anim Per
al al Week/anima
l
2 Elephan 20 $200 000 $100 000 14 $4200000 $84000000
t
3 Lion 5 $500 000 $100 000 7
4 Zebra 50 $300 000 $100 000 21
5 Crocodil 10 $700 000 $100 000 3
e
6 Leopard 5 $350 000 $100 000 3
7 Impala 100 $650 000 $100 000 21
8 Kudu 30 $400 000 $100 000 14
9
10
11
12
77
Computer Science Questions & Answer
(a)State the cell which tells you the number of leopards in the game park.
-B6[1]
(b)The Game Park gives the crocodiles to Garwe lodge in Harare. Since there
are no crocodiles in the game park, explain how you can use the spread sheet
package to delete row number 5.
-choose the delete option from the sub menu that comes up.
( c) The computer operator at the game park used a formula to work out the
total cost of feeding elephants per week. Write down a suitable formula he
might have used in cell G2.
=B2*(C2+D2)*E2/B2*F2
-Activate cell F2
-Click on the bottom right corner of cell F2 until the pointer turns into the copy
mode
78
Computer Science Questions & Answer
( c)Retail Outlet
-scanner/digital cameras
79
Computer Science Questions & Answer
NOVEMBER 2011
7014/01
(b)Define a byte
( c) (i) Name any two peripheral devices that can be used for data input
-keyboard
-mouse
-scanner
-MICR
-lightpen
-touchscreen
-web cam
-joystick
-OMR
-OCR
80
Computer Science Questions & Answer
(ii)Describe an application where each of the input devices you have named
above can be used.
(d)Define the term encryption and give one reason why it is used in data
transmission.
81
Computer Science Questions & Answer
-stores firmware
-modem
-web browser
-WIFI
(b)Give any two advantages that the school will have in using e-mail.
82
Computer Science Questions & Answer
(c ) Besides e-mail, state any other four facilities that will be offered by the
Internet to enhance learning or teaching at the school.
-chat sessions
-discussion forums
-virtual library
-usenet groups
(b)Identify any two types of viruses that can attack a computer system.
-file viruses
-macro viruses
-trojan horses
-internet viruses
83
Computer Science Questions & Answer
-worms
-parasitic viruses
[2]
( c)Describe two ways in which viruses would eater the school’s computers.
-firewalls
Feasibility study
Analysis
Design
Implementation
84
Computer Science Questions & Answer
Testing
Installation
Maintenance
(a)Choose any three of the stages and briefly describe what is involved in
each stage.
Feasibility study
Analysis
-an in-depth study of the current system and determining requirements for the
new system
Design
Testing
Installation
Maintenance
85
Computer Science Questions & Answer
-easy to modify
5. Mrs Chenungo has received a new brand of computers from her son in the
diaspora. She wants to use the computer for home use. She decided that an
operating system with a Graphical User Interface (GUI) be installed in the
computer.
-memory management
-file management
-log preparation
-task management
-multi –access
-User friendly
-allows multi-tasking
86
Computer Science Questions & Answer
87
Computer Science Questions & Answer
(d)From the form above, give two fields of different data types.
Class memo
5[1]
(g)Define a database
(h)List the first name(s) of students that will be displayed when the following
query is done
-panashe
88
Computer Science Questions & Answer
7. The use of robotics within manufacturing sector is now science fact, and
not fiction.
(a)Define a robot
-improved productivity
-expensive to maintain
89
Computer Science Questions & Answer
8. Computer programs can be programs are developed in both low and high
level languages.
-machine specific
-not portable
-machine specific
(c )Give two examples of software types that are developed using low level
languages.
-games software
-operating systems
-simulation software
-java
-visual c++
-visual basic
-HTML
-Dreamweaver
90
Computer Science Questions & Answer
-flash
-utility software
9. The following are the three basic control structures used in structured
programming.
(c)
(a) (b)
condition
condition
Name and explain the function of each programming construct shown above.
(i)Structure (a)
(iii)Structure ( c)
Repetition/Looping/Iteration
91
Computer Science Questions & Answer
10. A student designed the following pseudocode, which he will develop into
a program to help him do a certain mathematical calculation.
START
Power=0
Number =1
DO
Number =Number *2
Power =Power +1
PRINT Number
END WHILE
END
5[1]
16
32
32 [1]
92
Computer Science Questions & Answer
11. The SDA at Sunshine Secondary School bought 20 computers for the
school. An information Technology consultant advised them to set up a LAN
which they would later hook-up to a WAN.
-Network cables
-server
-hub
93
Computer Science Questions & Answer
NOVEMBER 2012
7014/01
(a)Check digit
-an additional number placed at the end of the original number calculated
from the other numbers e,g employee code number/account number(for
validation purposes)
(b)Feasibility study
( c) Debugging
-means finding and correcting errors in a program e.g logic and coding
errors[2]
(d)Modem
(e)Compiler
-a program that translates a complete program into object code before it can
be executed [2]
94
Computer Science Questions & Answer
(f)Pseudocode
-a method used to express the logic required in the solution of a problem using
English –like statements/phrases
(g)Scrolling
-the use of test data to check manually the paths through a system or
flowchart or program without using a computer [1]
-semantic error
-syntax error
-logical error
95
Computer Science Questions & Answer
1. Feasibility study
3. Systems design
4. Programming
-implementation/conversion
-supports the use of charts, helpful notes, program listings, test data ad
expected results
-it is designed so that programmers can amend or improve the program [2]
And should give user sufficient information to load and run the
program/package
-it is designed for the user and should therefore be easy to read and non-
technical
-Parallel changeover-when the new system is run alongside the with old
system
96
Computer Science Questions & Answer
-Phased changeover-this involves changing from the old to the new system in a
number of stages rather than at once
-maintains data in the database by adding new records, deleting dead records
and amending records
-it provides facilities for various for different types of file processing e.g. print
reports link or merge contents
-it acts as the function of providing security for data in the database
-restart facilities after a hardware of software failure i.e back-up and recovery.
97
Computer Science Questions & Answer
-Ms Access
-Dbase
-Paradox [1]
Method 1
Method 2
-data are raw facts/unprocessed facts /facts not put into context whereas
information are processed facts/facts put into context [2]
-colour
-bold face
-reverse video
-a blinking cursor
-underline
98
Computer Science Questions & Answer
-italics
-word art
-fonts
-animations
-highlighter [3]
(ii)State in correct order the steps taken to change font size of a word in a
document
[3]
-point of (POS)
-Ms Word
-Ms Access
-Ms Excel
-Corel Draw
-Power point
-Publisher [2]
99
Computer Science Questions & Answer
-Spreadsheet
-Word Processing
-Presentation
-virus [1]
7.(i) Explain why computer systems are widely used for process control in
industries such as the chemical industry
-once set up and installed, computers are economical than human beings
100
Computer Science Questions & Answer
-a computer used for chemical process control must have sensors to permit
process monitoring
(b) “In the near future, computer keyboards will be obsolete as every
computer will be capable of direct speech input”
101
Computer Science Questions & Answer
9. Single chip computers embedded into a plastic credit card size are used to
store personal and financial records. Information can be read from or stored
on the card using special terminals.
Advantages
-easy way of having data eg medical records available wherever you are
-could be used as an identity card holding scanned photograph can be used for
purchasing
-money can be carried in electronic form and that offers more security to
customers.[2]
Disadvantages
102
Computer Science Questions & Answer
(b)State any two conditions that need to be met for such cards to be widely
used.
-robust
-easily replaceable
-difficult to forge
-they store large amounts of data/has a huge capacity because of their huge
capacity they distribute software on a single disk
103
Computer Science Questions & Answer
RAM ROM
Volatile Non volatile
Rewritable Not re-Writable
Temporary Permanent
[2]
-cash dispensing
-money transfers
-payment of bills
-no need of carrying a lot of cash to make payment of bills, accounts etc
-customers can obtain money and other banking services at any time of the
day or night (offers 24 hour service)
[2]
-ATMS can be placed in public places such as supermarkets, walls of banks and
building societies [2]
104
Computer Science Questions & Answer
-telephone system
-satellite
-WIFI
-Radio
[3]
105
Computer Science Questions & Answer
-easy to use
-cheaper
14. A school decides to set up a database for its pupils and staff. The
database will include data on:
(i)each student
(a)each student
-first name
-class
-surname
-date of birth
- sex [2]
106
Computer Science Questions & Answer
-I.D Number
-first name
-address
-telephone number
-last name
-telephone number
-Next of kin
-name
-address
(d)medical records
-doctor’s name
-telephone number
-recent illness
-special needs
-doctor’s ID Number
-Allergies
[2]
***********************the end***********************************
107