You are on page 1of 4

CXC IT Theory 1999

Attempt ALL questions. 1. A computer system consists of several hardware devices and software components. The keyboard, mouse and printer are all peripheral devices connected to the systems unit. The systems unit comprises a Central Processing Unit (CPU) and a component, (A) that holds the data and programs that are currently being used. The CPU in turn, consists of two components. One component (B), directs the internal operations within the CPU; and the other components, (C), is responsible for the manipulation of the data. In addition, there is another storage component, (D), which stores data and programs that are not currently being used by the CPU. State the components that perform EACH of the functions named A to D and underlined above. (4 marks) Total marks 4 2. Match EACH characteristic, listed A to H below with the MOST appropriate device. Write the letter (A,B,etc.) to represent the characteristic and next to EACH letter write the name of the device that matches it. CHARACTERISTIC A. B. C. D. E. F. G. H. Modulates and demodulates signals Accepts voice inputs Allow users to input architectural plans Reads in graphics data Used for printing architectural plans Used for entering text documents Retrieves pricing data from grocery items Used to move the cursor, especially in going DEVICE Plotter Keyboard Modem Graphic tablet Microphone Barcode reader Joystick Scanner (8 marks) Total marks 8 3. (a) (b) State THREE functions of an operating system. (3 marks)

Identify the types of processing mode that would be suited for the following applications: (i) Monthly payroll (1 mark) (ii) Transactions at an Automatic Teller Machine (1 mark) (iii) Processing electricity bills (1 mark) Total marks 6

4. (a) (b)

List THREE ways in which a teacher can use computers in the classroom. (3 marks) Suggest TWO reasons why computers may NOT be used in the classroom. (2 marks) 1

(c)

State TWO advantages of using computers in the classroom.

(2 marks) Total marks 7

5. (a) (b) (c) (d) 6. (a)

Convert the decimal number 9010 to a binary number. Convert the binary number 110112 to a decimal number.

(2 marks) (2 marks)

Add the two binary numbers 11012 and101012, giving your answer as a binary number. (2 marks) Determine the BCD representation of 8710. (2 marks) Total marks 8 (i) (ii) (iii) Identify ONE application of robots in industry. State TWO advantages of using robots in industry. State ONE disadvantage of using robots in industry. (1 mark) (2 marks) (1 mark)

(b) For EACH of the following devices, state ONE application in which the use of the device is essential: (i) (ii) Scanner Plotter (1 mark) (1 mark) (1 mark) (1 mark) Total marks 8

(iii) Modem (iv) Magnetic ink-character reader 7. (a)

In order to secure its data, a company uses the following method for encrypting text: A letter is replaced by the letter five letters later in alphabetical order. For example, the letter A is replaced by F, B is replaced by G, and so on. Note that the A is considered to follow the letter Z. (i) What would the word ESSAY be stored as? (2 marks) (ii) What is the meaning of the following text? N LTY NY What is the purpose of a password? What is meant by the term archiving? (2 marks)

(b)

(i) (ii)

(iii)

Within many organizations, data personnel are stored in a central location from which various departments can access relevant information. State THREE problems that may arise because of the sharing of this data. (3 marks) Total marks 9

8.

Programs are written with the general purpose of solving problems. However, it is unlikely that a program will run completely error-free on the first attempt. The process whereby a program is checked to ensure that it does what was designed for is important in the development of the (A) program. There are two main types of errors that can occur: one type of error occurs when the programmer fails to properly think through the solution to the problem, and the other occurs (B) when the programmer does not adequately know the rules of the programming language. It is (C) good practice to perform a manual trace on the program, using appropriately selected input (D) (E) values, which checks each segment of the program. State the proper technical term for EACH of the underlined phrases labeled A to E. (5 marks)

Total marks 5 9. (a) DIFFERENCE = 0 Input A, B If A < = B Then DIFFERENCE = A B Else DIFFERENCE = B A Endif Print DIFFERENCE What is printed by the algorithm above if the input values are the following? (i) 20 30 (1 mark) (ii) 100 100 (1 mark) (iii) 50 10 (1 mark) (b) Write a structure algorithm to prompt the user to input two values which are then stored in A and B. The algorithm must divide A by B and print the result. The algorithm must keep prompting for the second number as long as the user enters 0 (zero) for the second number. (7marks) Total marks 10 3

10.

(i)

Write a structure algorithm, which prompts a user to enter an integer value, which is then, stored in a variable N. The algorithm must then print each integer from 1 to N and it corresponding square. Each output line must show the integer and its square. You may assume that the user would enter an integer value. (5 marks) Modify the algorithm in (i) to determine the sum of all the squares. Print this sum if it is less than or equal to 1000. Otherwise, print the following message: THE SUM IS GREATER THAN ONE THOUSAND (5 marks) Total marks 10

(ii)

You might also like