0595 CSC Ol P2 Soremex 2025
0595 CSC Ol P2 Soremex 2025
com
)
0595
om
GENERAL CERTIFICATE OF EDUCATION REGIONAL SUBJECT TITLE
MOCK EXAMINATIONS COMPUTER SCIENCE
DATE: Thursday 27th March 2025 (AFTERNOON)
n .c
Time Allowed: TWO HOURS
io
is
INSTRUCTIONS TO CANDIDATES
ev
Mobile phones are NOT ALLOWED in the examination room.
r
ce
(g
indicated in brackets.
You are reminded of the necessity for good English and orderly presentation in your answers.
W
KA
In calculations, you are advised to show all the steps in your working, giving your answer at each stage.
Turn Over
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
1. (a) In a large secondary school in Cameroon, the school administration has decided to implement different
types of Information Systems (IS) to manage various aspects of the school's operations. The school has several
departments, including academics, finance, library, and student affairs. The administration wants to make sure
that all departments have the necessary systems to improve their daily operations and services to students.
o The academic department needs a system to track students’ grades and attendance.
o The finance department needs a system to manage student fees, payments, and financial
records.
o The library needs a system to keep track of books, issue and return dates, and overdue books.
o The student affairs department needs a system to manage student records, including personal
details, medical records, and disciplinary actions.
(i) Identify and explain TWO components of an Information System (IS). (2marks)
)
om
(ii) The library department wants to keep track of books and their status
(borrowed, available, overdue). Which type of Information System would be most
useful for this task? Justify your answer. (2marks)
.c
(iii) The student affairs department deals with managing student personal details
and records. Which Information System would help the department to easily
n
manage and retrieve student data efficiently? (2marks)
io
(b) (i) Explain the following giving an example in each case;
Control system
Simulation is (4marks)
ev
(ii) Define malware and give two examples. (2marks)
(iii) Describe TWO major types of maintenance that deals with computer malfunctioning. (4marks)
r
(c) State and explain FOUR (4) characteristics which make computers so useful to human life.
ce
(2marks)
(d) Explain the following computer related terms: (2marks)
(g
(b) (i) What is the function of the following networking hardware devices
Gateway
KA
Bridge (4marks)
(ii) Briefly explain how network can be classified according to;
Layout
How resources are manage or by functional relationship (4marks)
(iii) State four services offered by the internet. (2marks)
(c) Convert 2048KB to Terabytes (2marks)
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
3. (a) Construct are used in algorithms;
(i) Define construct (control structure). (2marks)
(ii) In which situation is the selection and repetition construct used. (2marks)
(b) What do you understand by the following in programming?
(i) Source code and object code. (2marks)
(ii) Compiler and interpreter. (2marks)
(iii) Imperative and declarative paradigm. (4marks)
(c) (i) Define an algorithm and state the characteristics of an algorithm. (2marks)
(ii) Give the pseudo code of the flow chart (4marks)
Start
start
)
om
Get Q , Get A
n .c
P=Q*A
io
NO
If P > is YES
ev
10000
00
r
ce
Pf =P – (P * 10%) Pf =P – (P*5%)
(g
Pf is:
LO
end
W
4. (a)
A
BOX
A BOX R
B BOX
C
C
BOX
B
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
( i) Giving that the output R = give the logic gate with the correspond logic
Expression of Box A, Box B, Box C in terms of A and B (3marks)
(ii) From the logic expressions in (a)(i) draw the truth table (4marks)
(iii) State the De Morgan law and use it on the logic expression of R (3marks)
(b) Explain each of the following terms
(i) Green computing, one advantage and one way it can be implemented (3marks)
(ii) Dynamic and static IP address stating one advantage of each (3marks)
(iii) Network protocol (1mark)
c) Give the full meaning of SSD and HDD giving one difference between them. (3marks)
5. (a) (i) Give the full meaning of BCD, EBCDIC, ASCII (3marks)
)
(ii) Given that C is 67 in ASCII give the Binary Equivalent, BCD and
om
EBCDIC for C. (4marks)
.c
ASCII Decimal Binary Equivalent BCD EBCDIC
C 67
n
io
(iii) Convert 5478 to hexadecimal. (3marks)
(iv) Evaluate 11110001 – 10101111
(b) Define computer legislation and give two examplesis (2marks)
(2marks)
ev
(c) (i) What is an Information system (2marks)
(ii) State and explain the Information System used in the following instances such as;
r
6. (a) (i) Define file extension and give the meaning and use of the following file extension
.exe, .apk, .html, .mp3 (5marks)
(ii) In creating software using SDLC, there are various stages involve,
LO
tables in the project report, the bursar of the school wishes to manage the budget, school fees, the
total expenses and also a chart to visualize the school’s spending, the librarian needs to keep
KA
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
(c) The table below indicates the activities carried out during a FENASCO game.
TASK DESCRIPTION HOURS DEPENDENCY
A Lawn tennis match ⁄
B Basketball match 1 A
C Wrestling match 2 B
D Football match 2 A,B
E Handball match 1 D
F Futsal Match 1/2 E
G Table tennis match 1/2 F
H High jump 1 G
I Long jump 1/2 H
)
om
(i) Consider this to be a project. What do you understand by a project?
State THREE qualities of a good project. (4marks)
(ii) State TWO project management tools (1mark)
.c
(iii) What is a critical path? (1mark)
(iv) Represent the above activities on the table above on a Gantt chart.
n
Determine the critical path and project duration. (4marks)
io
7. (a) Keys play an important role in DBMS
is
i) Give the full meaning of DBMS and state TWO examples of DBMS. (2marks)
ev
ii) Primary and foreign keys are two examples of keys used in databases.
Briefly explain these keys. (2marks)
iii) What do you understand by data redundancy and how can it be resolve. (2marks)
r
ce
(b) Explain the terms data validation and data verification, state TWO examples in each case. (4marks)
(c) (i) Explain the following computer crime
Masquerading
(g
Phishing (2marks)
(ii) State and explain TWO (2) techniques that can be used to prevent computer crimes. (4marks)
LO
(d) Using the computer for long can result to certain health related issues, such as RSI and
CVS. Give the full meaning of the above abbreviations and state TWO ways in each case
through which they can be prevented. (4marks)
W
KA
END!!!
STOP!
GO BACK AND CHECK YOUR WORK.
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com