COMPUTER STUDIES QUESTIONS WITH ANSWERS
Describe three types of validation checks as used in data processing.
(b) A company has opted to store its employees’ personal details in a computer system.
Describe two software methods that may be used to prevent unauthorized access to these details. (c) (i) Describe each of the following data processing modes: I. real-time; II. interactive. (ii) State an application area where real-time data processing mode is applied.
RESPONSES
(a) Validation checks
0 Comments
Figure 3 shows a flowchart. Use it to answer the questions that follow.
(i) Determine the output from the flowchart if:
I. X=5; II. X=7. (ii) Write a Pseudocode for the flowchart in figure 3. (iii) Modify the flowchart so that it can be used to get the sum of integers between 50 and 100. (b) List two programming language translators.
RESPONSES
Identify the appropriate output device for the production of each of the following:(a) receipts where carbon copies are required;
(b) an architectural drawing where precision is required;
(c) output where the user is visually impaired.
Describe compatibility as a factor to consider when purchasing a computer.
A computer is idle but the hard disk light is blinking, indicating some activity. State two possible causes of this.
Explain why a DTP application would be preferred to a word processing application when designing a publication.
The 21st century has had many forms of ICT technologies improving the various means of communication. However, these changes have brought many challenges.State three negative social impacts of these technologies.
Explain the importance of disk partitioning.
Importance of disk partitioning.
Differentiate between pull-down menu and pop-up menu as used in Graphical User Interface (GUI) operating systems.
Difference between pull-down and pop-up menus
An organisation intends to replace an existing system by carrying out the process in stages.6/1/2021 An organisation intends to replace an existing system by carrying out the process in stages.(a) Name this implementation strategy.
The implementation strategy is:
(b) Give two reasons why the organisation is opting to use the implementation strategy in (a) above.
Reasons for partial approach.
The topology below is formed by combining two types of topologies.(a) Give one name for the combined topology in figure 2.
(b) Name the two topologies forming the combined topology in figure 2.
State three reasons why an organisation may opt to develop its own software in-house rather than buy off-the-shelf software.
A retailer uses a spreadsheet program to calculate profits. Figure 1 shows the spreadsheet.6/1/2021 A retailer uses a spreadsheet program to calculate profits. Figure 1 shows the spreadsheet.
(a) Which row contains labels only?
(b) Write the formula that has been entered in cell F2.
List two career opportunities directly associated with computer networking.
List two career opportunities associated with computer networking.
State three risks posed by improper cabling in a computer laboratory.
Differentiate between Bcc and cc in an email.
A school keeps student records in a database. The data is coded before entry.State three reasons why the coding is necessary.
Write each of the following acronyms in full as used in computing.
Some computer companies have opted to use the Internet to provide shared processing resources and online application services to users. State three advantages that this approach will have on their customers. (3 marks)
Advantages of online application services and shared processing resources.
With the aid of a diagram, describe the Hierarchical Database Model.
(b) List three factors that should be considered when developing a database application and give reasons why each should be considered.
(c) (i) Name three types of validation checks during data entry. (ii) Differentiate between primary key and index key RESPONSES
Data items are arranged in a tree like format.
Access is through a single path and all from one single item called the root component. (b) Factors .
What is an information system?
(a) (i) What is an information system?
(ii) State two roles of an information system. (b) Describe the following file organisation methods: (i) random file organisation; (ii) sequential file organisation. (c)The following records were extracted from two files that contained student data.
(i) Which of the two files above represents a Transaction file?
(ii) Give a reason for your answer in c(i) above. (iii) Name the other type of file represented above. (d)An airline uses an information system whereby if a passenger at station A books a plane seat,this transaction is immediately shown at stations A and B such that no other passenger can book the same seat. (i) Identify this data processing mode. (ii) State two advantages and two disadvantages of this data processing mode. RESPONSES
(a)(i) Information system is an arrangement of people, data, processes, communication and IT that interact to support problem solving.
(ii) Improve day-to-day operation
(ii) Method of storing or retrieving information that requires the program to start reading at the beginning and continue until it finds the desired data. (c) (i) File B. (ii) Transaction file: It contains data which is regularly added. Has data/fee payment . (iii) Master File: It contains records that do not change regularly like in file A.
(d) (i) Real time processing.
(ii) Advantages
State three techniques used by a network administrator to detect and prevent computer crimes.5/1/2021 State three techniques used by a network administrator to detect and prevent computer crimes.
(b) A company in town wishes to link its offices together. The linking may be through wireless or fibre optic network media.
(i) State two benefits that the company would gain from the use of metropolitan area network (MAN). (ii) State three advantages of using wireless over fibre optic network media. (iii) State two limitations of wireless communication. (iv) State two transmission media used in wireless transmission. (c) State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media. RESPONSES
(a) Audit trail
State the use of each of the following flowchart symbols.
(a) Convert each of the following binary numbers to decimal equivalent given that the left most digit is a sign bit.
(î) 0 0 1 0 1 1 0 1 (ii) 1 1 0 0 1 0 0 1 (b) Convert the decimal number 0.42 to 6 bit binary notation. (c) Using two’s complement, subtract 1110 from 810 leaving your answer in binary notation. (d) Perform the following binary operation. 11001 + 1101-101 RESPONSESState the use of each of the following flowchart symbols.
(b)Below is an algorithm that is used to compute the values of R, S and T.
From the algorithm, determine the output if the input value of N is:
(i) 7; (ii) 10. (c) Draw a flowchart for the algorithm in Question 16 (b). RESPONSES
(a) (i) An entry from, or an exit to another part of the program flowchart that is within the same page.
It is an on page connector. (ii) A connector used instead of the connector symbol to designate entry to or exit from a page. It is an off page connector (iii) The beginning and/or end in a program. To start and/or stop/terminate in a program. What is meant by disk defragmentation?
(b) State the purpose of disk defragmentation.
State two roles of a programmer in system development life cycle.
|
Categories
All
Archives
December 2024
|
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|