Sie sind auf Seite 1von 3

CXC IT THEORY 2000 1.

Give ONE similarity and ONE difference between EACH of the following pairs: (a) (b) (c) (d) (e) 2. (a) ROM and RAM ROM and EPROM Hard disk and floppy disk Primary storage and secondary storage Systems software and applications software (2 marks) (2 marks) (2 marks) (2 marks) (2 marks) Total marks 10

Give BRIEF explanations for EACH of the following terms: (i) Word size (1 mark) (ii) Buffer (1 mark) (iii) Microfilm (1 mark) (iv) Bandwidth (1 mark) (v) Wide area network (1 mark) (i) (ii) (iii) What is electronic eavesdropping? (1 mark) What is software piracy? (1 mark) State TWO ways in which software piracy may be controlled. (2 marks) Total marks 9

(b)

3. This question is based on the following extract: Writing a program to solve a problem Before writing a program in a high level language, it is advisable to write an algorithm A that solves the problem. This algorithm can be written in pseudocode and tested B thoroughly for logic errors. First, you perform a dry-run of the algorithm using a wide C D variety of test data to ensure that your algorithm works for all possible cases. Next, convert your algorithm to the high-level language. Compile your program to correct any E syntax errors, which you may have. Run your program and use the same set of test data F you used for the dry-run. If you get the same results, your program is working correctly. Explain the meaning of EACH of the underlined phrases labeled A to F. (6 marks)

Total marks 6

4. The InsureNow Insurance Company has its head office in Bridgetown, Barbados. The company has one computer, on which it stores all company data. The company handles a lot of confidential client information about other agents clients. (a) (b) (c) (d) How can you prevent agents from viewing one anothers confidential files? (1 mark) State TWO precautionary measures that can be taken to ensure that, in the case of a fire, all client data is preserved. (2 marks) What can be done to ensure that the client data files are protected in the event that the computer hard disk fails? (1mark) It is sometimes necessary to send confidential data acr oss the telephone line (using a modem) to another branch of the company 25 miles away. How can the company ensure that no on e can eavesdrop on the data while it is being transmitted? (1 mark) Total marks 5 What is teleconferencing? State TWO advantages of teleconferencing. State FOUR hardware requirements for teleconferencing. (1 mark) (2 marks) (2 marks)

5.

(a) (b) (c)

6.

(a)

(i) State ONE advantage of a machine language over a high-level languages (1 mark ) (ii)State TWO advantages of high-level language over a machine languages (2 marks) State THREE advantages of computer networks. (3 marks) Total marks 6

(b)

7.

(a) (b) (c) (d)

Convert 9910 to its binary equivalent.

(2 marks)

Add the two binary numbers1101012 and 110112, giving your answer in decimal form. (3 marks) Explain how an integer can be represented using BCD. Give the BCD representation of - 6510. (2 marks) (2 marks) Total marks 9

8. (a) (b)

Write an algorithm which reads three values, a, b and c and prints the largest of the three. (4 marks) This part is based on the algorithm given below: Set A to 3 Set B to 5 Set SUM to 1 While A < = 50 do A=A+B B=B+A SUM = SUM + B EndWhile Print SUM Stop Using the algorithm above: (i) Copy and complete the trace table which follows. A 3 B 5 SUM 1 (5 marks)

(ii)

State what is printed by the algorithm.

(1 mark) Total marks 10

9.

Write an algorithm to read a positive integer N and find the average of all even numbers between 1 and N inclusive. Perform any necessary validation. (8 marks) Total marks 8

10.

Write an algorithm to read the names of 10 items and their prices, and print the name of the item with the highest price. Assume that no items have the same price. Data is supplied in the form: item1, price1, item2, price2, etc. (7 marks) Total marks 7

Das könnte Ihnen auch gefallen