0% found this document useful (0 votes)
53 views3 pages

Mark Scheme For Progressive 2 Yr 11

The document covers various topics related to computer systems, including the use of hexadecimal numbers, binary arithmetic, digital technology, intranet vs. extranet, databases, data entry devices, Ubuntu OS functions, query views, data types, and referential integrity. It provides explanations, examples, and evaluations for each topic, emphasizing the importance of understanding these concepts in computing. Additionally, it discusses storage solutions for businesses, highlighting the advantages of cloud storage over local storage.

Uploaded by

12310-066
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views3 pages

Mark Scheme For Progressive 2 Yr 11

The document covers various topics related to computer systems, including the use of hexadecimal numbers, binary arithmetic, digital technology, intranet vs. extranet, databases, data entry devices, Ubuntu OS functions, query views, data types, and referential integrity. It provides explanations, examples, and evaluations for each topic, emphasizing the importance of understanding these concepts in computing. Additionally, it discusses storage solutions for businesses, highlighting the advantages of cloud storage over local storage.

Uploaded by

12310-066
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Question 1

a. State one reason for the use of hexadecimal numbers in computer systems.[1 marks] 1.
Compact Representation of Binary - Easier to read/write than long binary strings (e.g., 0xC0DE
vs. 1100000011011110).
2. Memory Addressing - Hex simplifies memory location labels (e.g., 0xFFFF for 64KB limit in old
systems).
3. Debugging & Low-Level Programming - Hex dumps show raw binary data in a human-readable
format (e.g., inspecting RAM/disk content).
4. Color Codes in Design - Web/GPU colors use hex (e.g., FF5733 for RGB values). 5.
Alignment with Byte Boundaries - 1 byte = 8 bits = 2 hex digits (e.g., 0xFF = 255 in decimal). 6.
Simplified Bitwise Operations - Hex maps cleanly to binary for AND/OR/XOR operations (e.g.,
0x0F & 0x3C = 0x0C).
7. Legacy System Compatibility - Early computers (e.g., IBM mainframes) used hex for instruction
sets.

b. Evaluate 01010011 + 01110110 in binary [2 marks] 01010011

+01110110
110010012
c. Explain the term digital technology as used in computing [1 mark] Digital technology
refers to systems, devices, and processes that use binary data (0s and 1s) to store, process,
and transmit information. Unlike analogue technology (which represents data as continuous
signals), digital technology breaks information into discrete values, enabling precise
manipulation by computers and electronic devices.

d. Differentiate between intranet and extranet, with practical examples. [3 marks] Intranet is a
private network accessible only to an organization’s members (employees). It uses internet
technologies but is isolated from the public internet while extranet is a controlled extension of an
intranet that allows limited access to external users (e.g., clients, vendors, or partners).

e. What is a Database? [1 mark] A database is an organized collection of structured data


stored electronically in a computer system. It allows for efficient storage, retrieval,
modification, and deletion of data through specialized software called a Database
Management System (DBMS).

f. Differentiate between a flat file and a relational database. [2 marks]


A flat file stores data in a single table (often as plain text, CSV, or Excel files) with no relationships
between entries whilst a relational database organizes data into multiple tables with defined
relationships (using keys) and is managed by a DBMS.
g. Explain with an example in QBASIC code, the following programming technologies:
a. Syntax error [2 marks] A syntax error occurs when code violates the language's grammar rules
(e.g., missing punctuation,
typos). QBASIC catches these errors during compilation/interpretation and refuses to run the
program until fixed. Example
PRINT "Hello, World!" ' Correct syntax
PRINT "Hello, World! ' Syntax error: Missing closing quote

b. Logic error [2 marks] A logic error occurs when code runs without crashing but produces
incorrect results due to flawed
reasoning (e.g., wrong formula, infinite loop). QBASIC won’t flag these—you must debug
manually. INPUT "Enter three numbers: “a, b, c”
sum = a + b + c
average = sum / 2 ' Logic error: Should divide by 3!
PRINT "Average: "; average

Question 2
a. As an IT Manager of Bank of GCIHS, what advice will you give to your company on the
storage needs, whether to deploy a cloud storage or a local storage drive. Give 4
reasons for your choice over the other [4 marks]

1. No Upfront Costs – Pay only for what you use (OpEx), no expensive hardware purchases.
2. Unlimited Scalability – Instantly add more storage when needed.
3. Access Anywhere – Securely access files from any device, anywhere.
4. Automatic Backups – Data is replicated across multiple locations for safety. 5. Disaster
Recovery – Faster recovery from ransomware, floods, or hardware failures. 6. No Maintenance –
Cloud providers handle updates, security, and hardware. 7. Better Security – Enterprise-grade
encryption, compliance certifications, and AI threat detection. 8. Easy Collaboration – Multiple
users can work on files in real time.
9. Always Up-to-Date – Latest features and security patches without manual work.
10. Greener Option – Reduces energy use vs. running on-site servers.

b. Mention two direct data entry devices. [2 marks] 1. Barcode Reader - Scans
barcodes/UPC labels (e.g., retail checkout, inventory tracking). 2. Optical Mark Reader
(OMR) - Reads pencil/pen marks (e.g., MCQ exam sheets, lottery tickets).
3. Optical Character Reader (OCR) - Scans printed text and converts it to editable digital text
(e.g., digitizing documents).
4. Magnetic Ink Character Reader (MICR) - Reads special ink (e.g., bank cheques for
account/routing numbers).
5. Biometric Scanner - Inputs fingerprint, iris, or facial data (e.g., attendance systems, phone
unlocking).
6. Touch Screen - Direct finger/stylus input (e.g., ATMs, smartphones, kiosks). 7. Digital
Camera - Captures images/videos directly into a system (e.g., ID verification, medical
imaging).
8. Smart Card Reader - Reads embedded chip/RFID data (e.g., credit cards, access control
badges).
9. Voice Recognition Systems - Converts speech to text/commands (e.g., Siri, Alexa,
transcription software).
10. Sensors (IoT Devices) - Auto-captures data (e.g., temperature sensors, GPS trackers).

c. State three functions of the Ubuntu OS. [3 marks] 1. Process Management - Runs,
pauses, and switches between programs (e.g., letting you browse while music plays).
2. Memory Management - Allocates RAM to apps and prevents crashes (e.g., closing unused
apps to free space).
3. File Management - Organizes files/folders (e.g., creating, deleting, or searching documents).
4. Device Management - Controls printers, keyboards, etc. (e.g., installing drivers for a new
mouse).
5. User Interface (UI) - Provides GUI (icons/windows) or CLI (command lines) to interact with
the computer.
6. Security & Access Control - Blocks unauthorized access (e.g., passwords, encryption). 7.
Networking - Manages internet/Wi-Fi connections (e.g., sharing files over a network). 8.
Error Handling - Detects crashes and recovers (e.g., "This program stopped responding").
9. Multitasking - Runs multiple apps at once (e.g., editing a doc while downloading a file).
10. Resource Allocation - Shares CPU, storage, and peripherals fairly among users/apps.

d. Mention the views you can access when creating a query [3 marks] SQL View,
Datasheet View, Design View.

e. What are data types? Mention about 4 examples [3 marks] In Microsoft Access, data
types define the kind of data stored in a field (column) of a table.

f. What is referential integrity [1 mark] Referential Integrity is a database rule that ensures
consistent relationships between tables by enforcing valid foreign key references. It prevents
orphaned records and maintains data accuracy.

You might also like