Sie sind auf Seite 1von 3

CXC IT 2001 Theory Exams (1 Hrs).

75 Marks
1. a) Fortran was the fisrt 3rd generation language. What are the features distinguishing the third generation language from the first and second generations? (3 marks) b) Give meanings of each of the following: i) Logic error ii) Test Data iii) Source code iv) Variable c) What are the responsibilities of the Chief Programmer?

(4) (2)

2. What does EACH of the following abbreviations stand for, and what is the purpose of each of the components listed? a. b. c. d. PROM CPU ALU RAM

(4) (2) (4)

3. a) Explain the difference between data and information b) Explain the terms i) UPLOAD ii) WAN

c) Which of the following are serial access type? Microfilm, microfiche, reel to reel tape, cartridge tape 4. a) Outline 3 main functions of a computers operating system b) How does a pull-down menu help you in completing your task more easily c) Give the most important advantage of primary storage over secondary storage. d) Give the most important advantage of disk storage over tape storage. e) In using diskettes, one precaution is: Keep diskettes away from magnetic fields. Give 3 further precautions in the use of diskettes to store files. 5. a) Which print output device is best suited for printing an architectural drawing of the front view of a new building, and why? b) A dot matrix printer is producing very faded output. Give one likely reason for this problem and explain what must be done to remedy it. c) Explain the operations of a light pen. d) Give 1 similarity and 1 difference between OCR and MICR operation . 6. a)

(4) (3) (1) (1) (1) (3)

(2) (2) (3) (2)

A certain computer uses an unsigned binary floating point representation for positive real

numbers. The mantissa is an 8 bit normalized fraction and the exponent is an 8 bit twos complement integer. In a particular case, the mantissa is 10010011 and the exponent is 00110011. What is the number being represented? (3) b) Convert the binary number 01010101 to decimal. (1) (1) c) Convert the decimal number 7 (seven) to a binary number

. 7. a) The use of information for strategic purposes can sometimes involve a violation of ethics. Give 2 ways in which this statement is true. b) In dealing with computer security, explain ONE advantage of software restrictions compared with physical restrictions. c) What is telecommuting ? What major developments have contributed to make telecommuting a feasible option? (2) (2) (2)

8. The following terms relate to memory and data storage. Give the meaning and purpose of EACH. a) Backing up c) Address b) Read/Write Head d) Access time (8) 8. Consider the following: INPUT Y = X +Y X=XY Y=X+Y IF X > Y THEN Z=X-Y-Z ELSE Z = X +Y + Z ENDIF PRINT X, Y, Z What is printed by the algorithm if the input is a) 1, 1, 1 ? b) 1, 2, 3 ? 9.

(6)

A certain account at a bank earns compound interest on a yearly basis, and has no deposits or withdrawals. The balance after ayear has passed is given by the formula: This Years Balance = Last Years Balance * (1 + Interest rate), where Interest Rate is given as a decimal fraction. For example , 25% must be entered as 0.25) Write a structured algorithm to do the following: a) Request the user to provide the interest rate as a decimal, the number of years to compute interest for and the starting balance.

b) Read in the Interest Rate R and the value of N which is the number of years to compute interest for. c) Read in the starting balance d) Compute and display the balance including the interest, after N years have passed. (5)

Das könnte Ihnen auch gefallen