Computer PP1 MS
Computer PP1 MS
Page 1 of 8
7. Give two advantages and two disadvantages of display devices (e.g., monitors).
(4 marks)
Advantages:
✔ The time required to obtain the output is fast.
✔ Display devices are normally quiet.
Disadvantages:
✔ Output produced is only temporary (i.e., will be lost when the device is turned off).
✔ Unsuitable for users with visual impairments.
8. (a) Explain briefly why increasing the main memory may improve the performance (e.g.,
speed) of a computer system. (1 mark)
✔ The computer system can then have more memory space for putting temporary data
freely, without the need to clear up the space occupied by unused data.
(b) Explain the term memory address as used in primary memory (1 mark)
✔ A memory address is simply a unique number that identifies the location of a
particular byte in memory.
12. (a) Expalin the term workstation as used in a networked environment (1 mark)
✔ A workstation is a networked computer used to access the contents of the central computer (i.e., the server).
(b)What is a server? (1 mark)
✔ A server is the central computer in a network used to manage network resources.
13. (a) Explain briefly identification and authentication in computer access control. (2 marks)
✔ Identification verifies that a person is a valid user.
✔ Authentication verifies that a person is the one he or she claims to be.
(b)What is a personal identification number (PIN)? (1 mark)
✔ A personal identification number is a numeric password, either assigned by a company
Page 2 of 8
or selected by a user.
14. (a) Explain the term ergonomics. (1 mark)
✔ Ergonomics is the science of designing equipment and workplaces to maximize the safety, comfort, and
efficiency of the people who use them.
(b)Suggest two possible causes of eyestrain. (2 marks)
✔ Watching the monitor for too long.
✔ Low refresh rate of monitor.
15. State Three benefits of telecommuting. (3 marks)
✔ Reduce time and expense spent traveling to the office.
✔ Eliminate travel during unsafe weather conditions.
✔ Allow a more flexible work schedule.
✔ Require less office space, furniture, and so on.
SECTION B
Answer question 16 (compulsory) and any other three questions from this section
16. (a) (i) State and describe three types of error can occur in programming: (3 Marks)
✔ Syntax errors are mistakes in the programming language’s keywords or control structures. They
show up when the program is being entered.
✔ Runtime errors show up when the program is run. The program begins to run but the computer
cannot carry out one of the instructions and crashes.
✔ Logical errors occur when the program runs but produces wrong results. They show up when the
program is being tested.
(ii) When is a programming language considered structured? (2 marks).
Supports
✔ Modulation
✔ Use of control structures
If..else (selection)
While..do (loops)
Case selection
(b) (i) The Global Science Museum is not large and can become over-crowded when more than 300 people are in the
building. They would like a program that will stop visitors from entering when more than 300 visitors are in the building.
Design a Pseodocode segment for this problem using a REPEAT loop. You do not have to worry about visitors who leave
the building, just those who have entered. (3 Marks)
✔ set total number of visitors to zero at start of day
✔ repeat
✔ get entry money from visitor
✔ add one to the visitors’ total
✔ until visitors’ total is more than 300
✔ stop visitors entering
(ii)Indentify Three aspects of a good HCI? . (3 Marks)
After compilation, the object program can be saved for future use without compilingthe source program
again.
(ii) Give one advantage of interpreters over compliers (1 mark)
Since the program statements are translated and executed one by one, it is easier forthe programmer to
know which statement is incorrect.
(iii) Explain briefly why the source codes must be translated again if the programmer wants
to use the program on a computer with a different platform. (1 mark)
Object codes are machine-dependent and they are only executable on the same
computer platform where they are translated.
(iv) Explain why a programmer may prefer to write code for device drivers using low level languages
(1 Mark)
✔ Low levels languages requires little or no translation and makes efficient and fast use of hardware
17. (a) (i) With the aid of examples, explain number complements in the Binary number systems
(2 marks)
✔ Ones complement worked out by switching bits (or derived from subtraction of a digit form the base –
two). e.g. one’s complement of 10112 is 01002.
✔ Twos complement worked out by adding 1 to ones complement e.g. twos complement of 10112 is
01002+12=01012.
(ii) Outline the benefits of using binary number complementation in computers. (2 marks)
✔ Only one procedure required to do both addition and subtraction viz addition
✔ No need for explicit negative number representation as use of complementation enables representation
of negative numbers using whole “positive” numbers
✔ Any two @ 1 mark each.
(b) (i) Why is binary number system best suited for use in computers? (2 marks)
✔ Convenience:-easy to use with 2 state devices because uses two digits to represent all
situations in a computer.
✔ No need for explicit negative number representation as use of complementation enables
representation of negative numbers using whole “positive” numbers. This saves on storage
usage.
✔ Multiplication and division achieved by merely shifting the bits e.g. to the left to multiply by 2
and shift to the right divide by 2.
✔ Any two @ 1 mark each.
(ii) Convert the following base two number into base ten. (2 marks)
11.01
(iii) Convert the following base sixteen number into base two. (2 marks)
DEF=
✔ D=13, = 1101
✔ E=14, = 1110
✔ F=15, = 1111
=110111101111
(c) Carry out the following binary arithmetic:
(i) 11 + 10 (1 mark)
11
+10
101
{Each @ 1 mark}
(b) (i) Suggest two possible reasons for data preparation errors. (2 marks)
(ii) Suggest two possible reasons for data input errors. (2 marks)
(c) (i) Distinguish between data validation and data verification. (1 mark)
✔ Data validation is a process of checking data before processing to ensure that the data is correct.
✔ Data verification is a process of checking if the data entered is consistent to the source data.
✔ Enter the data twice by the same operator and then compare the two data sets.
✔ Enter the data independently by two different operators and then compare the two data sets.
✔ Type checks determine if the different pieces of data input are of specific data types.
e.g., Check if the NAME field contains alphabets only.
iii. Range Check (1 mark)
✔ Range checks determine if the values entered fall within specific ranges.
e.g., Check if the data entered in the EXAM field fall within the range from 0 to 100.
iv. Control Total Check (1 mark)
✔ Control total checks determine if the amounts of data entered are correct by
comparing the manually calculated totals with the computer-calculated totals.
e.g., Calculating the total test scores of students.
v. Parity Checks (1 mark)
✔ Parity checks determine if the binary data transmitted through communication channels is
corrupted, by counting the number of bit 1’s in each signal (including the parity bit at the end).
19. (a) (i) Explain the term search engine (1 mark)
✔ A search engine is a program used to search for information on the Internet.
(ii) Peter and Mary use the same keyword to search for information. Suggest two reasons
why their search results may vary. (2 marks)
✔ They may be using different search engines.
Page 6 of 8
✔ Some relevant sites may be added or removed.
✔ Time causes
(iii) State one disadvantage of using an e-mail account provided by the Internet service
provider (ISP). (1 mark)
✔ The e-mail account can only be used as long as the client is still subscribing to the ISP’s services.
(b) (i) Explain the term URL (1 mark)
✔ Uniform Resource Locator. It defines the route to a file on the World Wide Web (WWW).
(ii) For the URL http://www.csklsc.net/pe/calendar.htm,
http stands for (1 mark)
✔ HyperText Transfer Protocol.
The domain name is (1 mark)
✔ www.csklsc.net.
The top-level domain (TLD) is (1 mark)
✔ net.
pe stands for (1 mark)
✔ a subdirectory name on the server.
(c) (i) Explain the term communication protocol (1 mark)
✔ agreed-upon and established standard, and in this way all manufacturers of hardware and software
that are using the protocol do so in a similar fashion to allow for interoperability.
✔ network standard for Internet communications. computer sends data over the Internet, the data is
divided into packets. Each packet contains the data, as well as the recipient (destination), the origin
(sender), and the sequence information used to reassemble the data at the destination. Each packet
travels along the fastest individual available path to the recipient's computer via communications
devices called routers.
(iii)Give Two examples of wireless-based communications channels. (2 marks)
✔ Microwaves -are high-frequency radio waves that are sent through the atmosphere and space.
✔ Cellular Radio - is a form of broadcast radio that is used widely for mobile communications, specifically
wireless modems and cell phones
✔ Infrared - is a wireless transmission media that sends signals using infrared light waves. Infrared
transmission requires a line-of-sight transmission and short distances under a few hundred metres
✔ Broadcast radio- is a wireless transmission medium that distributes radio signals through the air over
long distances such as between cities, regions
20. (a).Describe the role of the systems analyst. (2 Marks)
Page 7 of 8
✔ A systems analyst observes, clarifies and models an existing system;
with a view to improving it through computerisation.
(b) Describe Two techniques used by the systems analyst in requirements elicitation. (2 Marks)
✔ Identifying the data requirements and the data flow of the current system.
✔ A system specification is the document that results from (the requirements elicitation in) the design
stage.
✔ It contains a clear problem specification,
✔ The system inputs
✔ The system outputs
✔ Any set assumptions, limitations.
Describe Two events that might spark an iterative process in software development. (2 Marks)
✔ Any change or error correction must be taken right back to first stage to check that the design is still correct
and valid because finding errors at later stages in the process is very expensive.
(e) (i) Describe briefly the three basic e-commerce models. (3 Marks)
✔ Business-to-consumer (B2C) e-commerce consists of the sale of goods to the general public.
✔ Consumer-to-consumer (C2C) e-commerce occurs when one consumer sells directly to another,
such as in an online auction.
✔ Business-to-business (B2B) e-commerce consists of businesses providing goods and services to
other businesses.
(ii) Apart from parental control, state one other ways of Internet censorship. (2 marks)
Page 8 of 8