COMPUTER STUDIES QUESTIONS WITH ANSWERS
Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.
0 Comments
A water company sends out clerks to read water meters. The data collected by the clerks is then fed into the computer and then all the bills are printed at the same time.(a) State two advantages of this approach.
Advantages:
(b) Name this type of data processing.
Using ones complement, convert the decimal number -9 into a 6-bit binary number.
(b) (i) State three standard coding schemes used in data representation.
(ii) In a certain coding scheme, each character occupies 7 bits. Letters of the alphabet are assigned consecutive codes. If letter N is represented by 1010010. What is the representation of letter A in this coding scheme? (c) Using twos complement. show how the arithmetic below would be carried out on a 8-bit computer system. (+54)- (+29) The following are some of the phases in the systems development life cycle (SDLC): system analysis, system design, system implementation, system review and maintenance. State four activities that are carried out during the system implementation phase.
(b) Give three reasons why system maintenance phase is necessary in SDLC.
(c) State two instances where observation is not a viable method of gathering information during system analysis stage. (d) Various considerations should be made during input design and output design.
State two considerations for each case.
RESPONSES
(a)(i) Activities (system implementation)
Machine language programs are more difficult to write than high-level language programs. State two reasons for this.
(b) In order to process examination results of students in a school, their names, index numbers and scores in 11 subjects are required. The average score for each student is then determined and a grade assigned. This process is repeated for all 40 students in a class,
Draw a flowchart to: . Read a student’s name, index number and the scores in all the subjects. . Determine the student’s average score. ‘ Assign a grade to the student depending on the average score as follows:
• Repeat the above steps for all the students in the class. (e) Below ¡s a list of program segments in different generations of programming languages. Identify the language for each.
(a) Disadvantages of machine level language It is time consuming to develop
Study the pseudocode below and determine its output.
1. (a) T = O
(b) M = O (c) K = I 2. (a) M M±T (b) T = T+5 (c) K = K+1 3. Repeat step 2 while K < 3 4. Write M,T 5. Exit Define data communication.
(b) State two characteristics of an effective data communication system.
Characteristics of an effective data communication system
List four activities carried out by a data processing system.
Distinguish between Real, Integer and Character data types as used in programming ( 3mks)
Related SearchesPerform the following binary arithmetic and give your answers in decimal notation:
(i)1010.101 + 11.011
(ii)1010.011 – 11.011 (b) Covert the following numbers into their binary equivalents (i)0.562510 (ii)0.312510 (c) Using four – bit twos compliment, perform the following arithmetic 1012- 1112 Study the flowchart below and answer the questions that follow
(a) What would the flowchart generate as output if the value of N at input was:
(i) 6? (ii)1? (b) Write a pseudocode that does the same thing as the flowchart above (c) Modify the flowchart so as to reject an input below and to avoid the looping when the input is 0
RESPONSES
(a) Subtract 01112 from 10012 (2 mks)00102 (b) Using twoâs compliment, subtract 7 from 4 and give the answer in decimal notation (4mks)7 = 1112 4 = 1002 -4 in twoâs compliment is 100 111 100 + (1)011 The resulting answer is 011 since the overflow is ignored. In decimal notation this is 310 (c) Convert(i) 91B16 to octal(a) State the stage of program development in which:
(i) A flowchart would be drawn
(b) State the output of the following flowchart segmentArrange the following data units in ascending order of size (2mks)BYTE, FILE, BIT, NIBBLE
BIT, NIBBLE, BYTE, FILE (a) explain Binary Coded Decimal code of data representation (1mk)
(b) Write the number 45110 in BCD notation (1mk)
Consider the linear arrays:
(a) Name the control structure depicted by the flowchart below
(b) Explain the following terms as used in program implementation (2mks)
(a) A serial file comprises of records placed in positions 1 to 10. State the position of the end of file marker (1 mk)
(b) State the purpose of each of the following (2mks)(i) File server software
The cells K3 to K10 of a worksheet contain remarks on student’s performance such as very good, good, fair and fail depending on the average mark. Write a formula that can be used to count all students who have the remark “very good” (3mks)
Describe third generation languages and name two examples
A computer user typed the name Kajiado as Kajiado and 8726 as 8126(a)State the type of each error
(b)Explain how such errors can be controlled
(a) Explain three ways by which computer users can protect their eyes from harmful emissions from the computer screen
(b) List three factors be considered when deciding on the choice of an electronic data processing method
Bidii wholesalers have two categories of customers for order processing. Category ‘A’ obtains 10% discount on all orders upto Kshs 10,000 otherwise the discount is 20% on the entire order. Category ‘B’ obtains 30% discount on all orders if the debt repayments is ‘good’ otherwise the discount is 15%. Draw a flowchart for the order processing.
List three parts that constitute an array definition statement
Array = MyArray {1...n} of
Integer; Differentiate between source program and object program
|
Categories
All
Archives
December 2024
|
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|