0% found this document useful (0 votes)
11 views5 pages

0595 CSC Ol P2 Soremex 2025

The document is a mock examination paper for the General Certificate of Education in Computer Science scheduled for March 27, 2025. It includes various sections with questions on Information Systems, programming concepts, networking, computer legislation, and project management. Students are instructed to answer five questions, with a focus on demonstrating good English and orderly presentation in their responses.

Uploaded by

Dioch Man
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views5 pages

0595 CSC Ol P2 Soremex 2025

The document is a mock examination paper for the General Certificate of Education in Computer Science scheduled for March 27, 2025. It includes various sections with questions on Information Systems, programming concepts, networking, computer legislation, and project management. Students are instructed to answer five questions, with a focus on demonstrating good English and orderly presentation in their responses.

Uploaded by

Dioch Man
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.

com

MARCH 2025 ORDINARY LEVEL


The Teachers’ Resource Unit in collaboration SUBJECT CODE
PAPER NUMBER
with the regional Inspectorate of Pedagogy NUMBER
2

)
0595

om
GENERAL CERTIFICATE OF EDUCATION REGIONAL SUBJECT TITLE
MOCK EXAMINATIONS COMPUTER SCIENCE
DATE: Thursday 27th March 2025 (AFTERNOON)

n .c
Time Allowed: TWO HOURS

io
is
INSTRUCTIONS TO CANDIDATES
ev
Mobile phones are NOT ALLOWED in the examination room.
r
ce
(g

Answer any FIVE questions.


All questions carry 20 marks each. For your guidance, the approximate mark for each part of a question is
LO

indicated in brackets.
You are reminded of the necessity for good English and orderly presentation in your answers.
W
KA

In calculations, you are advised to show all the steps in your working, giving your answer at each stage.

Calculators are NOT allowed.

Turn Over

02/0595/COMPUTER SCIENCE P2 O/L


©TRC/RPI/0595/2/SOREMEX/2025 Page 1

for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
1. (a) In a large secondary school in Cameroon, the school administration has decided to implement different
types of Information Systems (IS) to manage various aspects of the school's operations. The school has several
departments, including academics, finance, library, and student affairs. The administration wants to make sure
that all departments have the necessary systems to improve their daily operations and services to students.

o The academic department needs a system to track students’ grades and attendance.
o The finance department needs a system to manage student fees, payments, and financial
records.
o The library needs a system to keep track of books, issue and return dates, and overdue books.
o The student affairs department needs a system to manage student records, including personal
details, medical records, and disciplinary actions.
(i) Identify and explain TWO components of an Information System (IS). (2marks)

)
om
(ii) The library department wants to keep track of books and their status
(borrowed, available, overdue). Which type of Information System would be most
useful for this task? Justify your answer. (2marks)

.c
(iii) The student affairs department deals with managing student personal details
and records. Which Information System would help the department to easily

n
manage and retrieve student data efficiently? (2marks)

io
(b) (i) Explain the following giving an example in each case;
 Control system
 Simulation is (4marks)
ev
(ii) Define malware and give two examples. (2marks)
(iii) Describe TWO major types of maintenance that deals with computer malfunctioning. (4marks)
r
(c) State and explain FOUR (4) characteristics which make computers so useful to human life.
ce

(2marks)
(d) Explain the following computer related terms: (2marks)
(g

(i) Cloud storage


(ii) AI
LO

2. (a) (i) What is a system software? (2marks)


(ii) State four (4) types of system software, giving a function in each case. (4marks)
(iii) Differentiate between open source software and close source software. (2marks)
W

(b) (i) What is the function of the following networking hardware devices
 Gateway
KA

 Bridge (4marks)
(ii) Briefly explain how network can be classified according to;
 Layout
 How resources are manage or by functional relationship (4marks)
(iii) State four services offered by the internet. (2marks)
(c) Convert 2048KB to Terabytes (2marks)

02/0595/COMPUTER SCIENCE P2 O/L


©TRC/RPI/0595/2/SOREMEX/2025 Page 2

for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
3. (a) Construct are used in algorithms;
(i) Define construct (control structure). (2marks)
(ii) In which situation is the selection and repetition construct used. (2marks)
(b) What do you understand by the following in programming?
(i) Source code and object code. (2marks)
(ii) Compiler and interpreter. (2marks)
(iii) Imperative and declarative paradigm. (4marks)
(c) (i) Define an algorithm and state the characteristics of an algorithm. (2marks)
(ii) Give the pseudo code of the flow chart (4marks)

Start
start

)
om
Get Q , Get A

n .c
P=Q*A

io
NO
If P > is YES
ev
10000
00
r
ce

Pf =P – (P * 10%) Pf =P – (P*5%)
(g

Pf is:
LO

end
W

(iii) Give P and Pf when Q= 15 and A=1,200 (2marks)


KA

4. (a)
A
BOX
A BOX R
B BOX
C
C
BOX
B

02/0595/COMPUTER SCIENCE P2 O/L


©TRC/RPI/0595/2/SOREMEX/2025 Page 3

for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com

( i) Giving that the output R = give the logic gate with the correspond logic
Expression of Box A, Box B, Box C in terms of A and B (3marks)
(ii) From the logic expressions in (a)(i) draw the truth table (4marks)
(iii) State the De Morgan law and use it on the logic expression of R (3marks)
(b) Explain each of the following terms
(i) Green computing, one advantage and one way it can be implemented (3marks)
(ii) Dynamic and static IP address stating one advantage of each (3marks)
(iii) Network protocol (1mark)
c) Give the full meaning of SSD and HDD giving one difference between them. (3marks)
5. (a) (i) Give the full meaning of BCD, EBCDIC, ASCII (3marks)

)
(ii) Given that C is 67 in ASCII give the Binary Equivalent, BCD and

om
EBCDIC for C. (4marks)

.c
ASCII Decimal Binary Equivalent BCD EBCDIC
C 67

n
io
(iii) Convert 5478 to hexadecimal. (3marks)
(iv) Evaluate 11110001 – 10101111
(b) Define computer legislation and give two examplesis (2marks)
(2marks)
ev
(c) (i) What is an Information system (2marks)
(ii) State and explain the Information System used in the following instances such as;
r

 When interacting with the ATM


ce

 Top executive manager (4marks)


(g

6. (a) (i) Define file extension and give the meaning and use of the following file extension
.exe, .apk, .html, .mp3 (5marks)
(ii) In creating software using SDLC, there are various stages involve,
LO

name these stages. (2marks)


(b) Students in a certain school need to submit a project report, they will need to include images and
W

tables in the project report, the bursar of the school wishes to manage the budget, school fees, the
total expenses and also a chart to visualize the school’s spending, the librarian needs to keep
KA

track of books title, ISBN number, borrowers and borrower’s address.


(i) State the type of generic software that will be require in each case (Students, the bursar and
the Liberian) with an example, giving the instances where they are used according to the
situation above. (3marks)
Type of generic software Example Instance
Student
Bursar
Liberian

02/0595/COMPUTER SCIENCE P2 O/L


©TRC/RPI/0595/2/SOREMEX/2025 Page 4

for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com
(c) The table below indicates the activities carried out during a FENASCO game.
TASK DESCRIPTION HOURS DEPENDENCY
A Lawn tennis match ⁄
B Basketball match 1 A
C Wrestling match 2 B
D Football match 2 A,B
E Handball match 1 D
F Futsal Match 1/2 E
G Table tennis match 1/2 F
H High jump 1 G
I Long jump 1/2 H

)
om
(i) Consider this to be a project. What do you understand by a project?
State THREE qualities of a good project. (4marks)
(ii) State TWO project management tools (1mark)

.c
(iii) What is a critical path? (1mark)
(iv) Represent the above activities on the table above on a Gantt chart.

n
Determine the critical path and project duration. (4marks)

io
7. (a) Keys play an important role in DBMS
is
i) Give the full meaning of DBMS and state TWO examples of DBMS. (2marks)
ev
ii) Primary and foreign keys are two examples of keys used in databases.
Briefly explain these keys. (2marks)
iii) What do you understand by data redundancy and how can it be resolve. (2marks)
r
ce

(b) Explain the terms data validation and data verification, state TWO examples in each case. (4marks)
(c) (i) Explain the following computer crime
 Masquerading
(g

 Phishing (2marks)
(ii) State and explain TWO (2) techniques that can be used to prevent computer crimes. (4marks)
LO

(d) Using the computer for long can result to certain health related issues, such as RSI and
CVS. Give the full meaning of the above abbreviations and state TWO ways in each case
through which they can be prevented. (4marks)
W
KA

END!!!

STOP!
GO BACK AND CHECK YOUR WORK.

02/0595/COMPUTER SCIENCE P2 O/L


©TRC/RPI/0595/2/SOREMEX/2025 Page 5

for more past questions and solutions download kawlo kawlo app or visit http://www.gcerevision.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy