0% found this document useful (0 votes)
854 views4 pages

O Level Computer Science Exam June 2017

This document contains instructions for a data security exam with six sections containing multiple choice and written response questions. The questions cover topics such as: 1) Data encryption, backup, firewalls, and data integrity. 2) Batch and online processing, human-computer interfaces, and network device roles. 3) Components of the central processing unit, system buses, and instruction cycles. 4) Logic circuits, input/output devices, binary arithmetic, and octal conversions. 5) Database definitions, sample employee database design, and keys. 6) Scenario about setting up computer literacy training labs with questions about operating system functions and hardware.

Uploaded by

Nadine Monkam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
854 views4 pages

O Level Computer Science Exam June 2017

This document contains instructions for a data security exam with six sections containing multiple choice and written response questions. The questions cover topics such as: 1) Data encryption, backup, firewalls, and data integrity. 2) Batch and online processing, human-computer interfaces, and network device roles. 3) Components of the central processing unit, system buses, and instruction cycles. 4) Logic circuits, input/output devices, binary arithmetic, and octal conversions. 5) Database definitions, sample employee database design, and keys. 6) Scenario about setting up computer literacy training labs with questions about operating system functions and hardware.

Uploaded by

Nadine Monkam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

[Link].

com
June 2017 Code: 0595

Instructions: answer any five questions (Two hours)


1. (a) briefly describe the following terms in relation to data security
(i) Data Encryption (2 marks)
(ii) Backup (2 marks)
(iii) Fire wall (2 marks)

(b) Briefly explain what is meant by data integrity (3 marks)

(c) state the difference between data verification and data validation (4 marks)

(d) (i) Briefly explain what you understand by computer simulation (2 marks)

(ii) state two advantages and two disadvantages of computer simulation (4 marks)

2. (a) Explain briefly the following data processing methods


(i) Batch processing (2 marks)
(ii) Online processing (2 marks)

(b) Describe the following types of human-computer interface

(i) Command line interface (3 marks)

(ii) Graphical User Interface (3 marks)

(iii) Menu-driven interface (3 marks)

(c) State the main role of each of the following network devices

(i) Bridge (1 mark)

(ii) Router (2 mark)

(iii) Modem (2 marks)

(d) Explain the difference between synchronous and asynchronous data transmission (2 marks)

3. (a) Draw a labelled diagram showing the basic components of a Central Processing Unit (4 marks)
(b) State three system buses that connect the components in (a) above (3 marks)
(c) Name four steps in the machine instruction cycle (4 marks)
(d) The following algorithm is intended to read three numbers and determine their product.
Start
1. Set Count = 1
2. While Product = 1
3. While (Count <= 3) Do
4. Get a Number, N
5. Set Product = Product * N
6. Set Count = Count + 1
7. Print Product
8. Endwhile
END

11 [Link]
[Link]
June 2017 Code: 0595

Assume that the three numbers that are read in line 4 are 2,3 and 5

(i) Determine the output that is printed on line 7 each time the loop instructions are executed. (3 marks)
(ii) Draw a flow chart for the algorithm (6 marks)

4. (a) Given the logic circuit below:

A
F

G
D

(I) Write the logical expression for F and G (2 marks)


(II) Write TWO logic expression for H, first in terms of F and G, and then in terms of A, B, C and
D (3 marks)
(III) Given the following inputs to the logic circuit: A = TRUE, B = FALSE, C = FALSE, D = TRUE,
determine the values of F, G and H (3 marks)

(b) With aid of a suitable example in each case, state the meaning of:

(i) Input device (2 marks)

(ii) Output device (2 marks)

(iii) Input/output device (2 marks)

(c) Use binary arithmetic to evaluate

(i) 1100101 – 1010 (2 marks)

(ii) 1101011 + 1101 (2 marks)

(d) Convert the octal number 505 to a binary number (2 marks)

5. (a) Give simple definitions or explanations for the terms: - character, field, record, file, and database (5
marks)
(b) Assume you want to create a database of employees of a company, the departments they work for,
and their salaries. The tables below show sample data in the database.

12 [Link]
[Link]
June 2017 Code: 0595

EMPLOYEE DEPARTMENT
ID FNAME LNAME DEPTCODE SALCODE DEPTCODE DEPARTMENT
1 John Doe EN S1
EN Engineering
3 Mary Hopkins MK S2
4 Peter Miles HR S2 MK Marketing
6 Chris Jenkins EN S3 HR Human Relations
8 Susan Jenkins MK S1

SALARY
SALCODE SALARY
S1 300000
S2 250000
S3 200000
S4 100000

(I) State the number of fields and records in the EMPLOYEE table (2 marks)
(II) What do you understand by the term key database? (2 marks)
(III) What is the most appropriate key for each of the three tables (3 marks)
(IV) With the keys chosen above, if the company has another employee whose FNAME, LNAME,
DEPTCODE and SALCODE are the same as for john Doe, how can the database management
system distinguish between these two employees? (2 marks)
(V) Would it be possible to add another employee called johnny Walker whose ID is 6? Explain
your answer. (2 marks)
(VI) Explain the problem that will arise if you try to add an employee whose SALCODE is S10,
without making any other change in the database. What change would you make so that
this employee’s data can be stored in the database? (4 marks)

6. John wants to set up a company to train people on Computer Literacy. Some of the people to train only
wants to know about using machines running the Microsoft Windows Operating System, while others
only want to know about using machines running the Linux operating system. John decides to set up two
personal computer laboratories: Lab A with Microsoft Windows and Lab B with Linux computers

Answer the following questions in relation to the scenario presented above.


(a) (i) What do you understand by the terms computer literacy? (2 marks)
(ii) State FOUR functions of an operating system. (4 marks)
(b) Answer the questions in this section to explain the types of training that john should provide
his trainees
(I) List five hardware components that the trainees need to know about so that they
can understand what happens from the time they type in a document to the time a
hardcopy is produced (2 marks)
(II) Name one hardware device, and the most relevant kind of application software that
can be used to improve the typing skills of the trainees (2 marks)

13 [Link]
[Link]
June 2017 Code: 0595

(III) State the category of network application software that must be installed on each
computer to enable easy access to the Web? Give two examples of his category of
software (4 marks)
(IV) List four important categories of application software that should include inn the
training. For each of them, state what it is used for. Your list should NOT include
your answer in (iii) above (6 marks)

7. (a) Implementation is one of the stages of SDLC, explain the following four conversation methods that
can be used during the implementation:
(i) Parallel conversion (2 marks)
(ii) Plunge conversion (2 marks)
(iii) Pilot conversion (2 marks)
(iv) Piecemeal conversion (2 marks)

(b) Explain the following in relation to programming languages

(i) Machine Language (3 marks)

(ii) Assembly language (3 marks)

(iii) High level language (3 marks)

(c) State two disadvantages and one advantage of a machine language (3 marks)

14 [Link]

Common questions

Powered by AI

A router is a device that directs data packets between computers on a local network and other networks, using IP addresses to determine the most efficient path for data transmission . In contrast, a modem modulates and demodulates signals for facilitating data transmission over telephone lines or cable systems, connecting a local network to the broader internet . Routers focus on directing traffic within networks, while modems handle signal conversions for external connectivity.

Binary arithmetic is crucial in computing as it underpins all digital operations, using base-2 number systems for calculations. An example is the subtraction operation of binary numbers 1100101 (binary for 101 in decimal) - 1010 (binary for 10 in decimal), yielding 101011 (binary for 91 in decimal). Similarly, binary addition of 1101011 (107 in decimal) + 1101 (13 in decimal) results in 1111000 (120 in decimal). These operations exemplify how computing handles data processing at the most fundamental level of machine language.

Synchronous data transmission refers to data being sent at regular intervals timed by a clock signal, ensuring that the sender and receiver are coordinated in time, leading to synchronized delivery and reception of data . Asynchronous data transmission involves data being sent without a continuous clock signal, relying on start and stop bits to signify the beginning and end of each byte, which can lead to delays and requires additional processing to resynchronize data at the receiver's end .

Data verification involves checking that the data entered into a system matches the original source from which it was derived, ensuring accuracy and consistency . Data validation, on the other hand, is the process of ensuring that the data entered into the system meets predefined rules or criteria, ensuring that it is reasonable and falls within the expected range of values . This difference highlights the focus of verification on correctness and validation on logical consistency.

Drawing a labeled diagram of a CPU requires an advanced reasoning level involving the cognitive processes of analysis and creativity. It requires understanding the abstract architecture of the CPU, identifying and organizing components such as the Arithmetic Logic Unit (ALU), Control Unit, and registers, and creatively arranging these components logically to depict their interaction and connectivity. This task also involves synthesis of knowledge about the data flow and equilibrium between different CPU operations and depiction of these processes visually in an understandable manner .

Adding an employee with a SALCODE not present in the existing database would lead to a referential integrity issue, since the foreign key (SALCODE) in the Employee table would not match any primary key in the Salary table . To resolve this problem, the database administrator must first add the new SALCODE and its corresponding salary value into the Salary table, ensuring that all referenced data remains consistent and referentially intact .

Given a logic circuit with inputs A, B, C, and D, one can derive logical expressions for outputs F and G using standard operations like AND, OR, and NOT . For example, if the circuit is set up such that F = A AND B, and G = C OR D, one can substitute specific input values to transform these expressions. For inputs A = TRUE, B = FALSE, C = FALSE, and D = TRUE, the values of F and G would be FALSE and TRUE respectively, combining to provide final outputs based on the logical layout of the circuit .

Two advantages of computer simulation are that it allows for testing and analyzing complex systems without the need for physical prototypes, saving cost and time, and it provides insights and predictions that may not be easily observable in real-world environments . Two disadvantages are the potential for inaccurate results if the simulation model is flawed or based on incorrect assumptions, and the significant computational resources and technical expertise required to perform and interpret simulations accurately .

John should consider the compatibility of hardware components with the respective operating systems, ensuring that all necessary drivers and support software are available for Windows in Lab A and Linux in Lab B . He should also provide training on differences in user interfaces—like command-line interactions for Linux and more GUI-centered interactions for Windows—adjust course content to align with the distinct functionalities and use-cases of each OS, and equip labs with applications that support the key tasks users are training for. Additionally, each lab should offer access to resources like online documentation or community forums specifically tailored to the operating system in use.

The four conversion methods used in systems implementation are: Parallel conversion, where the old and new systems run simultaneously to ensure reliability; Plunge conversion, where the old system is immediately and entirely replaced by the new system, which is fast but risky; Pilot conversion, which involves implementing the new system in a small part of the organization to test before full deployment, reducing risk; and Piecemeal conversion, which implements segments of the system over time, allowing for gradual transition and testing . Each method offers its own balance of reliability, speed, and risk management.

You might also like