CSEC Mock Exam Paper 2 Solutions
CSEC Mock Exam Paper 2 Solutions
THEORY – 60 marks
1. Akia regularly needs to access many documents that are sent to her. She uses one or more
applications to receive and send notes and information to her colleagues. Sometimes she needs to
access her company’s website for information when working with a client.
(a) Based on the scenario above, identify TWO examples of software applications that Akia would
use.
(2 marks)
(c) Complete the following table by writing ONE advantage and ONE disadvantage of using (i) a
laptop computer and (ii) a mobile device for conducting business while travelling.
Advantage Disadvantage
Portable Expensive
Lower power Consumption Sensitivity-Easier to damage
(i) Laptop
Mobility(light weight, compact
Computer
size) Battery Life?
WiFi Access
Portable Carry risk of privacy and security
Lower power Consumption breaches( Accessing delicate
Mobility(light weight, compact information where other people are
size) present may cause security problems)
(ii) Mobile device
Wi-Fi Access Can be easily stolen or misplaced due
Constant interactions with to their small size.
family and friends and
business partners
(4 marks)
2. Akia needs to print a document that is located on a mobile device. Outline TWO ways in which
1
The document can be sent to her email and then she can print the document from her email
A mobile printing app can also be used to send the data to the printer wirelessly
(2 marks)
Total 10 marks
Touchscreen
(2 marks)
Specifications:
Display size, Hard drive size, Memory size, Processor speed, Resolution
For EACH of the following scenarios, (i) to (iv), recommend TWO relevant computer
specifications from the list above. Specifications can be used more than once.
(i) Mia needs to see the fine details of Display size, Resolution
produces results.
(iv) Shirlet stores and retrieves data for her Hard drive size, Memory size
(8 marks)
Total 10 marks
4. (a) The table below illustrates sources that are used for the input of data. For EACH source,
identify the device that is used to capture data from it, and describe ONE example of data
that is captured.
2
Illustration of Source Device Used Example of Data that is
Captured
● Product Code
NOT PRICE
OMR Answers to a survey or
MCQ paper
(ii)
Lotto ticket numbers,
(6 marks)
The MICR is the least popular used because it is used mainly by only banks or
financial organizations
(2 marks)
The barcode reader is most associated with point-of-sale systems because it is one of the
most used input devices that can be found in supermarkets and stores everywhere.
(2 marks)
Total 10 marks
5. (a) The diagram below shows the decimal binary or hexadecimal representation of the
characters H, I, M. Complete the diagram by writing the correct representation in the spaces
3
i-4816 ii-1001001 iii- 3 iv-77 Note that the decimal equivalent for the binary is 78 therefore
(2 marks)
(b) Daniel wants to represent 12:35:47 p.m. using a clock where each column shows the binary-
In EACH of the three unshaded columns below, shade the appropriate circles that correspond
to the decimal digit, indicated below it. Three columns have been completed for you.
(6 marks)
Total 10 marks
6. Jarad is playing an online game where the user needs to move the STAR over different
TARGETS in order to gain points. Use this gaming example to answer the questions that follow.
4
(a) State
(i) TWO examples of input devices that can be used to move the star to the target.
(2 marks)
(ii) ONE output device AND ONE hardware interface that notifies the user that the star is over
(2 marks)
(b) Describe TWO ways in which the gaming application can indicate to Jarad that the star is over
the target.
A message could be displayed on the screen telling Jarad that the star is over the target.
Sound notification can be used to inform Jarad that the star is over the target.
(2 marks)
c. Complete EACH of the following statements by writing in the MOST suitable expression
(i) Jarad is able to play the game interactively with other users in different countries in Real
Time(Processing mode)
(ii) He is also able to talk with the other users over the Internet while playing the game using
(iii) Since he has so many games on the computer, he should Backup his files to safeguard
them in the event his computer and data are corrupted. (Data security)
5
(iv) Sometime he can play his game using WI-FI Or Hotspot where he does not us cables to
(4 marks)
Total 10 marks
7. (a) The DIGITS company collects personal data from customers which it stores in filing
cabinets or on computers.
Files can be tampered with if proper physical security measures are not put in place
(2 marks)
ii. For EACH of the following storage locations, state TWO measures that can be used to
Filing cabinets
Locks
Fireproof Cabinets
Biometric system that only authorized person can bypass to gain access to the
room
Computer systems
Passwords
Firewall
Encryption
(4 marks)
8. Outline when EACH of the following procedures would MOST likely be applied to the
company’s data:
ii. Archiving When there is data that is no longer actively used which is moved to a
iii. Backing up This is created in order to recover data should it be erased or corrupted
Total 10 marks
6
Section II
9. Study the spreadsheet below and answer the questions that follow.
a) State the names of the function that produced the results in cell D9 and D10.
I. FUNC-X SUM
(2marks)
b) Write a function for cell E5 that would place the comment “Yes” in that cell, if a passenger has
more than TWO pieces of luggage otherwise the comment should be “No”.
(3 marks)
c) State the range of cells that would be selected to create a chart that compares the number of trips
Total 7 marks
10. Study the following table which contains the schedules for four flights.
SCHEDULES
7
FLIGHT DEPARTURE ON TIME
FLIGHT TEXT
DEPARTURE DATE/TIME
(3 marks)
b. State the field that can be used as a primary key FLIGHT (1mark)
d. Write the result of a query that finds all flights that are delayed
(1mark)
e. State the field name AND the order of the records which are sorted in the table
Total 8 marks
8
SECTION III
11. Each of the following programming statements contains ONE error. Rewrite the statement,
Var sum:integer;
(3 marks)
(2 marks)
Const Pi=3.14;
(1 mark)
(c) Write an example of a value that can be stored in EACH of the following types of
variables:
(i) Integer 4
(iii) Character K
(4 marks)
Total 10 Marks
12. Aaron is playing a new online car game. He can gain or lose points in the game as follows:
9
● Crash and lose all points.
● Knock a sidewalk
a) Complete the following table to show Aaron’s updated points while completing the moves
indicated.
(10-10)=0
(10-10)=0
(6 marks)
b) Using pseudocode, write an IF statement for move 1 (Gains distance) in (a) that updates
IF Move=Gains_Distance Then
Points:=Points+10;
END IF
(4 marks)
Total 10 marks
10
13. State whether EACH of the following operations is described as input, output, processing or
storage.
(5marks)
Then
Else
endif
START
IF money_collected>=1000
Y N
STOP
(5 marks)
Total 10 marks
11
14. Study the following outline of an office where a thick line denotes a wall and the numbers
represent blocks
11 12 13
21 22 23
31 32 33
41 42 43
a. Using the terms START, DOWN, UP, LEFT, RIGHT and stop, write the sequence of
Start>Down>Down>Right>Up>Up>Right>Stop
(5 marks)
15. Each Play Station III game has a tax of 10% added to its cost to calculate the final price. Write
Pascal code to
Var
(4 marks)
Read Cost;
(2 marks)
Tax: = 0.10*cost;
Finalprice:=Tax+cost;
OR
Finalprice := Cost
(4 marks)
Total 10 Marks
12