Académique Documents
Professionnel Documents
Culture Documents
1. (a) Discrete data represents data that is not divisible. Example: 5 boys. This is not divisible, you cannot have 2.5 boys. . Continuous data is analog type data, it represents, measurement of physical properties Example: 5.5 pounds or 35.50 c. (b) 2. (a) Hard copy - tangible output, example, output printed on paper Soft copy - intangible, example, information displayed on a screen (monitor) An operating system does any of the following: (i) Controls program execution (ii) Controls input & output operations (iii) Manages data and file storage (iv) Assigns different tasks to the CPU (v) Provides security and control (i) (ii) Custom- written software meets the specific need(s) of the user General-purpose software can be used by many different users
(b) (c)
MICR - Magnetic Ink Character Recognition USE reads data prerecorded on checks and deposits slips with a OMR USE Optical Mark Reader It is used in educational institutions for scoring examination
3.
Water Heater Heat to digital converter Computer
4.
(a)
(I)
Car Manufacturing industry Cars are being assembled by computer controlled robots instead of manual labour producing better quality output
(ii)
Chemical Industry
Computers are used in the preparation of dangerous gases replacing the human factor (b) The computer industry has created: (i) (iii) 5. (a) (I) (ii) (iii) (b) (i) (ii) Programmers (ii) Computer Operators (iv) Software Engineers Data Entry Operators
Voice band has a band-width of 3,000 and can transmit data at speeds in the range of 600 to 10,000 bits per second. Simplex are lines that permit data flow in only one direction Duplex are lines that permit data traffic in both directions but only in one direction at a time. Data integrity are techniques to protect a database against invalid alteration or destruction a. b. Altering a person age, instead of a age value of 19 an age value of 39 is entered Input wrong information about a person in a medical history file, example saying the person has cancer instead of saying the common cold.
6.
(a) (b)
A Videotext system is a form of electronic publishing Videotext systems are used for: (i) (ii) Advertising a product Sending warning messages to users about dangerous weather
(c)
Videotext systems (i) (iii) Reduce the number of persons using the postal system Reduce the paper flood cause by the traditional postal system
7.
(a)
G is five (5) spaces to the right of B The binary value for 5 is 101 The binary representation of G 1000010 = + 101 1000111
(b)
8.
numcount=0 sum = 0 largest =0 input number while number does not equal 0 do sum = sum + number numcount = numcount + 1 if number > largest largest = number endif input number endwhile average = sum divided by numcount
9.
print "MILES print "====== initial = 5 while initial <= 1050 do print initial initial = initial + 5 endwhile
KILOMILES" ======="
initial * 1.61
10.
ZEROCOUNT = ZEROCOUNT + 0 ENDIF IF NUMBER NOT EQUAL TO 0 NONCOUNT = NONCOUNT + 1 ENDIF COUNT = COUNT + 1 UNTIL COUNT = N PRINT ZEROCOUNT PRINT NONCOUNT
Magnetic tape is cheaper than magnetic hard disk. Magnetic tape has a larger capacity than magnetic hard disk Disadvantage- Slower access to data/records records cannot be accessed directly records cannot be updated in place AdvantageOptical disk has a larger capacity than magnetic hard disk Optical disk can retain data longer than magnetic hard disk Optical disk is read only therefore information cannot be tampered with Optical disk is slower, more expensive than magnetic hard disk Optical disk is read only
d.
Bistable device exists in one of two possible states Gigabyte is 1,000,000,000 bytes or 109 bytes Operating system is a set of programs used for controlling the operations of a computer system. Bar Code is a series of parallel light and dark lines representing a code placed on a product for identifying that product.
b.
(I) (ii)
A 'expert system' is a program that reproduces the knowledge and thought processes of human experts in certain well defined fields. areas of application-any ONE of the following: medicine: diagnosis of infections blood diseases prescription of medicine geology; search for mineral deposits chemistry; identifying molecular structure of compounds advantage -
(ii)
4. 5.
(I) (ii)
does not display biased judgments - does not jump to conclusions on the face of contrary evidence - systematically considers all possible alternatives disadvantages- not good at judgments requiring common sense - cannot adapt easily to new rules and concepts - cannot reason across disciplines Local Area Network (ii) Protocol Bulletin Board or Electronic Mail (iv) Modem
a. (I) A System Analysts does any of the following: perform feasibility studies Derive information system requirements/specifications perform system reviews (ii) A Computer Operator does any of the following: prepare equipments to run jobs mount and remove tapes, disks, and diskettes monitor operations during the running of job. (iii) A Database Administrator does any of the following design a database create a database maintain a database coordinate discussion between user groups
b. A teacher can use the computer to do any of the following: (i) (ii) (iii) (iv) (v) to develop coursework to store student's records to use 'Computer Aided instruction software' to teach students to use the computer to mark scripts
(i) (ii) (iii) (iv) 6. a. OMR OCRMICRb. (I) (ii) (iii) (iv) (v) 7. a. H M H
to provide management with the useful information for running the bank to keep records of transactions by customers to provide electronic funds transfer to provide automated teller services reading of answers to multiple choice questions converts a printed document to machine readable form so that it could be edited on a computer used by banks for reading information on cheques use fire proof cabinets for storing tapes and disks perform backup and recovery procedures properly implement a password system to prevent unathourised access use anti virus software use software features to restrict access to certain records = M - 5 {H is 5 consecutive spaces to the left of M} = 1010001 = 81{Decimal value} = 81 - 5 = 76 = 1001100 {Binary Value} = = 111112 51 - 31 = 31 {Decimal Value} = 21 = 10101 {Binary Value}
b. 8.
5210 - X2 X2
a. One formats diskette to place electronic marks on the surface of the diskette so that data can be written to and read from their specific "addresses". b. (I) The keyboard is the major interfacing device for a command language interface (ii) The mouse is the major interfacing device for a graphical user interface. c Using a command language interface (CLI), the user 'points' to a picture (or icon) of a data file or program or a selection from a menu and activates the program or selection by clicking the pointing device (usually a mouse).
9.
a. C = A A=B B=C b. OLDAGE = 0 for j = 1 to 10 read NAME, AGE if AGE > OLDAGE then OLDPERSON = NAME endif endfor print "The oldest person is", OLDPERSON
10.
a. read SCORE if SCORE >= 80 then print "A" else if SCORE >=65 then print "B" else if SCORE >=50 then print "C" else print "F" b. The following is printed by the algorithm when n= 5 2 3 5 3
b.
c. Copy file to backup device on a regular basis and in event of a hard disk failure recovery is accompained by replacing the damaged and lost files on the hard disk by the last copy of the files from the backup device d. Software piracy is the illegal coping of proegram(s)
2.
INPUT DEVICE
CPU
OUTPUT DEVICE
BACKING STORE
3.
a.
2 2 2 2 2 2 2
55 1 27 1 13 1 6 0 3 1 1 1 0 5510 = 1101112
b.
1 26
0 25
1 24
1 23
0 22
1 21
0 20
1011010 = 26+ 24+ 23 +21 =90 c. 11010 + 10011 101101 P= 72 + 8 = 80 = 1010000 {Binary equivalent} (ii) track (iii) sector (iii) Buffer
d. 4. 5.
One can secure data by: (i) encryption (iii) passwords adv: Disadv: (I) (ii) (I) (ii)
(ii) (iv)
b.
parcel can be sent sent on more people (people without computer) mail could be lost. mail takes a longer time
6.
a.
Medical personnel may use information technology for: (i) storing patient records (ii) expert system (iii) health education (iv) monitoring patients (I) A Network Manager does any of the following: starts up and shuts down the network grants access privileges monitors use of the network and other shareable resources lliaise with other network managers re. Connectivity. A database administrator: Grants access to data Makes modification to database structure system software menus custom-written software (ii) (iv) (v) application software ICONS customization
b.
(ii)
7.
(a)
(b)
Two function of an Operating system are: (i) input/output control (ii) file and disk management
8.
SUM 20 43 69 98 Source code is a program written in a programming language Object code machine language, program produced by a computer A compiler is a computer program which converts a program written in a high level programming language to machine code.
9.
(b)
SOURCE CODE
(C) read A, B, C if A > B then LARGEST = A SMALLEST = B else LARGEST = b SMALLEST = A endif
COMPLIER
OBJECT CODE
10
if C > LARGEST then LARGEST = C if C<SMALLEST then WSMALLEST = C print LARGEST print SMALLEST 10 ZEROCOUNT = 0 TENCOUNT = 0 input NUMBER while NUMBER not equal 999 do If NUMBER = 0 then ZEROCOUNT + 1 If NUMBER = 10 then TENCOUNT + 1 read NUMBER ENDWHILE print NUMBER OF STUDENTS SCORING 0, ZEROCOUNT print NUMBER OF STUDENTS SCORING 10, TENCOUNT
11
2.
a. 2 2 2 2 2 2 57 28 14 7 3 1 0 1 0 0 1 1 1
5710 = 1110012 b. 1 27 1 26 0 25 1 24 1 23 1 22 0 21 1 20
110111012= 27+26+24+23+22+20 = 22110 c. Parity bit is used as a checking system or dummy value within the coding of character. It is used to detect whether the transmission or coding of data is complete or accurate.
d. +
3.
a. b. c. d. e. f. g. a. b. c. d.
RAM (Random Access Memory) ALU (Arithmetic Logic Unit) Secondary Storage (e.g diskettes, magnetic tape etc.) MODEM Read/Write Head CU(Control Unit) Input Device(Keyboard, mouse etc.) Password protection Password protection Data encryption Virus infection Store archived data in fireproof cabinets Store backup copies of archive data Store archive data away from the elements9wind, rain, etc)
4.
12
5.
a.
(I)
Modem Telephone Fax Machine * * Reduction in travel expenses/fuel consumption Working men & women would be able to spend more time with their families
(ii) v (iii) b. (I) (ii) (iii) 6. a. (I) (ii) (iii) (iv) (v) b. c. (I) (ii)
The worker might miss out on promotion opportunities at central headquarters. Home delivery of items purchased Subscription of magazines advertising products to customers Use of electronic fund transfer instead of cash payment for goods bought To examine products bought Record-keeping, payroll, billing and ordering of drugs and supplies Automating the recording of patients histories Monitoring critically ill patients in surgery and intensive care units Recording and analyzing the results of health screening examinations to help detect diseases that might otherwise go unnoticed Recording and interpreting the results of electrocardiograms (ECGs) Programmers Database administrators
EFT (Electronic Fund Transfer) ATM (Automated Teller Machines) (I) Computer could be used to simulate experiments eliminating the use of dangerous chemicals Slow student could learn at their own pace (ii) Teacher not computer literate Large class size Cost of computer hardware and software
7.
a.
8.
a. X 4 4 4 4 M 1 2 3 4 Y 3 2 1 0 Z 14 8 2 -4
13
b. 9. a.
14, 8, 2, -4 Input PRICE NEWPRICE = PRICE + (PRICE * 0.12) Print NEWPRICE Input A Input B C=B If A > B B=A A=C Endif Print A, B
b.
10.
SUM= 0 SIXCOUNT = 0 for COUNT = 1 to 11 do Input NUMBER SUM = SUM + NUMBER If NUMBER = 6 SIXCOUNT = SIXCOUNT + 1 endif enddo AVERAGE = SUM divide by 11 Print AVERAGE, SIXCOUNT
14