0 ratings0% found this document useful (0 votes) 91 views24 pages2022 Jan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
305
g
i a
CARIBBEAN EXAMINATIONS COUNCIL
(CARIBBEAN SECONDARY EDUCATION CERTIFICATE®
EXAMINATION
inn
FILL IN ALL THE INFORMATION REQUESTED CLEARLY IN CAPITAL LETTERS.
TEST CODE | 0 ‘Pee of 2] 0
SUBJECT ___ INFORMATION TECHNOLOGY — Paper 02
PROFICIENCY __ GENERAL
REGISTRATION NUMBER
SCHOOL/CENTRE NUMBER,
NAME OF SCHOOL/CENTRE
CANDIDATE’S FULL NAME (FIRST, MIDDLE, LAST)
DATE OF BIRTH
SIGNATURE&. rest cope 01229020 |
FORM TP 2022016
JANUARY 2022
CARIBBEAN EXAMINATIONS COUNCIL
CARIBBEAN SECONDARY EDUCATION CERTIFICATE”
EXAMINATION
INFORMATION TECHNOLOGY
Paper 02 — General Proficiency
2 hours
READ THE FOLLOWING INSTRUCTIONS CAREFULLY.
2. Write your answers in the spaces provided in this booklet.
3. Do NOT write in the margins.
4. Ifyou need to rewrite any answer and there is not enough space to do so on
the original page, you must use the extra lined page(s) provided at the back of
this booklet. Remember to draw a line through your original answer.
5. Ifyou use the extra page(s) you MUST write the question number clearly
in the box provided at the top of the extra page(s) and, where relevant,
|
|
1. This paper consists of FOUR questions. Answer ALL questions.
|
| include the question part beside the answer.
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO.
Copyright © 2019 Caribbean Examinations Council
All rights reserved.
TOE oI. {08 EEE ES A I01229020/1/CSEC 2022
NOTHING HAS BEEN OMITTED.
GO ON TO THE NEXT PAGE
UTC aAnswer ALL questions.
1. @)_ Define EACH of the following terms as it relates to data:
@ Verification
(2 marks)
Gi) Validation
“ @ marks)
(6) Outline the function of EACH of the following validation methods. Give ONE example
of EACH method.
@ Range check
Example .
(i) _ Inconsistency check
Example ..
marks)
GO ON TO THE NEXT PAGE,
01229020/J/CSEC 2022
1 NG ON |al
(©) The spreadsheet below shows the runs scored, balls faced and the strike rate of each player
‘who contributed to the total score of 199 runs for the Warriors Cricket Team in a T20 game.
The strike rate of each player is calculated as runs scored divided by balls faced multiplied
by 100.
‘The percentage of total runs scored for each player is calculated as the runs scored by that
player divided by the total runs scored.
A oe o D E
1 Warriors Scorecard
(2 | Player Runs Balls Strike| % Runs |
| |Name Scored Ee Rate| Scored
3. Alphonso 18 2 429 9.05
| 4 | Callender 58 26 | 23.08
Falter | > |
fave | |
[7 stLouis “| 8 | 17600
| 8 Kellar n | 1 210.00
= ere
9 Extras a | [_sorvar
10 | Total 199 120,168.83
A formula was inserted in Cell D3 to calculate the strike rate of the player, Alphonso, who
scored 18 runs and faced 28 balls. This formula was also copied to the range of Cells D4
to DIO.
@ Write the formita which was inserted in Cell D3.
Q marks)
(ii) Outline what accounted for the result displayed in Cell D9, after copying the
formula from Cell D3 to the range of Cells D4 to D10.
GO ON TO THE NEXT PAGE
01229020/9/CSBC 2022
=
=:
r 2 1
(@)__ State how EACH of the following types of data is displayed within a cell, in an electronic
spreadsheet:
@ Numeric data
(ii) Alphanumeric or text data
“(1 mark)
(©) Write the formula inserted in Cell E3 before it was copied to Cells E4 to E10.
(marks)
(© State the type of cell referencing used in the formula in EACH of the following cells:
@ Cells ....
Gi) Ce ES
@ marks)
(ii) Explain why the type of cell referencing stated in (f) (ii) is used in Cell E3.
Q marks)
Total 20 marks
GO ON TO THE NEXT PAGE,
01229020//CSEC 2022| x |
2, (a) State TWO methods that can be used to prevent members of the public from having
physical access to stored information,
(@ marks)
(©) Suggest TWO software methods that can be used to prevent unauthorized staff from
accessing sensitive data on a network.
(©)
(marks)
GO ON TO THE NEXT PAGE
zl
01229020//CSEC 2022
LLae =]
(@) —_ Cyndra has created a web-enabled database application to allow her friends from the
university to enter their own data froma webpage. The database consists of the followin:
‘two tables, CONTACTS and DEGREES. Data entered in the Gender field must be “M’
for male and “F”
for female and all dates of birth entered must be prior to 30 June 2000.
TABLE 1: CONTACTS DATABASE.
(1004 [Dennis | DRAKES 17/04/1978,
ec
fichael_BAPTISE | 25/12/1999
CLARKE 12/01/1997
JOHNSON 2203/1982
M
F
LENNY _|23/03/1996 |M
M
M
‘Yes 456-7890 0s0
=e. Nes sere Se
No, 565-6676 030
TABLE 2: DEGREES DATABASE
(@ Identify the MOST appropriate field types for EACH of the following fields.
eee
Field Name | Dat
Type
BirthDate
Married
Degree
Gender
01229020/S/CSEC 2022
(marks)
GO ON TO THE NEXT PAGE
|(ii) State what is meant by the term ‘primary key’ in a database table.
E
E
= E
E
(iv) Outline the role of a “foreign key’ in a database table.
E
@ marks) E
(©) Identify the field(s) from the database tables mentioned on page 9 that can be E
used to establish EACH of the following foreign keys. E
A
E
TableName | Field(s) E
CONTACTS i
DEGREES
(2 marks) E
GO ON TO THE NEXT PAGE
za
01229020//CSEC 2022
L NA NER4 = are aa
(vi) Describe the relationship that is established between Table | and Table 2.on page
9.
(2 marks)
a
Total 20 marks
GO ON TO THE NEXT PAGE
01229020/J/CSEC 2022I ia |
3. (@)_ Roger, a new employee in the information technology department of a supermarket,
notices that discounts are being calculated manually. Roger asks for a pseudocode to be
‘generated that would handle 25% discounts on merchandise totals.
Write the pseudocode for the algorithm that will
initialize the variables
prompt the user to input the price and quantity of the items
calculate the discount amount at 25% of the total ifthe total is greater than $1800
output the discount amount.
E
E
ae
(10 marks)
GO ON TO THE NEXT PAGE,
=
01229020//CSEC 2022
LLo)
©)
mide oat
Roger has been tasked with reconfiguring the network system for the supermarket, which
is expanding.
(@ List THREE types of networks.
@ marks)
(ii) Describe ONE type of network that would be suitable for effectively managing
the functions of all departments of the supermarket from a central location.
(2 marks)
Roger is considering segregating the users of the network. Differentiate between an
intranet’ and an ‘extranet’.
GO ON TO THE NEXT PAGE
01229020/1/CSEC 2022| -14- | E
(@) Roger must produce a table showing the cost of the equipment he will need to purchase
in order to facilitate the expansion of the network. The table below illustrates a part of
the spreadsheet that was produced.
A B c D
1 New Network
2 Item ‘Number Cost Total
3 Router 2 400 800
4 System unit 5 200 _
5 Switch 10 250
6 Cabling 8 80
7 Storage 5 50
8 Firewall 5 65.
9 Dock 6 235
10
u Total cost
12 Average cost
@ Write the formula to be inserted in Cell D5 to calculate the total cost of the
switches.
(1 mark)
Gi) Write the function that would be placed in Cell D12 to calculate the average cost.
(2 marks)
GO ON TO THE NEXT PAGE
_
01229020/1/CSEC 2022_
:
|
_ ais |
(©) Roger’s employer wants to have the spreadsheet on page 14 sorted in alphabetical order.
List, in the correct order, the steps that would be required to do this.
G marks)
(© During a staff meeting, management decided that docks were an unnecessary cost. State,
in the correct order, the steps required to delete Row 9 from the spreadsheet on page 14.
(2 marks)
‘Total 25 marks
GO ON TO THE NEXT PAGE
01229020//CSEC 2022-16-
4. (a) __Keva has just graduated ftom college with a degree in computer science. She decides to
set up a home business offering programming services.
(List FOUR main computer hardware devices that Keva will need to facilitate her
business.
(marks)
Gi) Keva has to ensure that her devices are equipped with sufficient storage. Describe
the function of any TWO features of a hard drive/disk.
G@ marks)
(6) _Keva is aware of some of the threats to a computer system which may impact the opera-
tions of the business.
(@ State ONE reason for using passwords.
Give ONE example of an effective password,
@ marks)
GO ON TO THE NEXT PAGE
01229020//CSEC 2022
=
:
E
i;
|
:
|
:
r “P. a
(©) _Keva writes the pseudocode below for her first client. Study the pseudocode carefully
and answer the questions that follow.
Start
Line 1. Set MAX —0
Line 2. Write “Enter Integer”
Line 3. Read NUM
Line 4. WHILE NUM = 0D0
Line 5. IF NUM> MAX THEN
Line 6. Set MAX — NUM
Line 7. ENDIF
Line 8 Write “enter integer or 0 to stop”
Line 9. Read NUM
Line 10. ENDWHILE,
Line 11. Write “max” , MAX
Stop
(State the purpose of the pseudocode.
(ii) Name the constructs that are in the pseudocode,
(iv) State the purpose of the second output statement,
(mark)
GO ON TO THE NEXT PAGE
01229020/J/CSEC 2022| nail ete:
(v) State the names of the variables that are used in the pseudocode on page 17.
@marks)
(vi) Identify the TWO lines in the pseudocode on page 17 that demonstrate relational
operators.
(@ marks)
GO ON TO THE NEXT PAGE
01229020/J/CSEC 2022
= Se |[ -19- “|
(4) Keva, having written the pscudocode in (b) on page 17, wants to use flowcharting techniques
+o show the structure of the program.
Draw a flowchart depicting the WHILE loop.
(5 marks)
|
Total 25 marks
q END OF TEST
i IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
01229020/1/CSEC 2022-20- |
EXTRA SPACE
Ifyou use this extra page, you MUST write the question number clearly in the box provided.
Question No.
01229020/J/CSEC 2022
=|
i
:
'
E
E
E
E
LiE a 1
EXTRA SPACE
If you use this extra page, you MUST write the question number clearly in the box pro
Question No.
/
i
4 01229020/J/CSEC 2022
rine 0B) izEXTRA SPACE,
Ifyou use this extra page, you MUST write the question number clearly in the box provided.
Question No.
01229020//CSEC 2022
aPOU AEH EHCANDIDATE’S RECEIPT !
ee
INSTRUCTIONS TO CANDIDATE:
1. Fillin all the information requested clearly in capital letters.
TEST CODE: | 0 | 1 [2 0
SUBJECT: INFORMATION TECHNOLOGY — Paper 02
PROFICIENCY: GENERAL,
FULL NAME:
(BLOCK LETTERS)
Signature:
Date’
2. Ensure that this slip is detached by the Supervisor or Invigilator and given to you when you
[|
1
1
1
1
1
1
1
1
I
I
I
REGISTRATION NUMBER: 1
1
1
1
1
1
1
1
1
1
1
hand in this booklet. 1
3. Keep it ina safe place until you have received your results. {
a
INSTRUCTION TO SUPERVISOR/INVIGILATOR:
Sign the declaration below, detach this slip and hand it to the candidate as his/her receipt for this booklet
collected by you.
Thereby acknowledge receipt of the candidate's booklet for the examination stated above.
Signatuce:
‘Supervisor/Invigilator
Date: