0% found this document useful (0 votes)
15 views12 pages

CSEC Mock Exam Paper 2 Solutions

The document contains a series of questions and answers related to computer applications, telecommunications, data storage, and programming concepts. It includes scenarios requiring identification of software, advantages and disadvantages of devices, data input methods, and programming corrections. Additionally, it covers spreadsheet functions, database structures, and flowchart creation, all aimed at assessing knowledge in information technology and programming.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views12 pages

CSEC Mock Exam Paper 2 Solutions

The document contains a series of questions and answers related to computer applications, telecommunications, data storage, and programming concepts. It includes scenarios requiring identification of software, advantages and disadvantages of devices, data input methods, and programming corrections. Additionally, it covers spreadsheet functions, database structures, and flowchart creation, all aimed at assessing knowledge in information technology and programming.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

SECTION I

THEORY – 60 marks

Answer ALL questions

1. Akia regularly needs to access many documents that are sent to her. She uses one or more

applications to receive and send notes and information to her colleagues. Sometimes she needs to

access her company’s website for information when working with a client.

(a) Based on the scenario above, identify TWO examples of software applications that Akia would

use.

Word processor /Spreadsheet/ Adobe/ DBMS

Telnet program (to login to a remote computer)

Web browser such as internet explorer

An email application such as gmail, yahoo mail, Microsoft outlook (2 marks)

(b) Define the term ‘telecommunication’.

Telecommunications refers to the interchange of information by electronic and electrical

means over a significant distance.

(2 marks)

(c) Complete the following table by writing ONE advantage and ONE disadvantage of using (i) a

laptop computer and (ii) a mobile device for conducting business while travelling.

Advantage Disadvantage
Portable Expensive
Lower power Consumption Sensitivity-Easier to damage
(i) Laptop
Mobility(light weight, compact
Computer
size) Battery Life?
WiFi Access
Portable Carry risk of privacy and security
Lower power Consumption breaches( Accessing delicate
Mobility(light weight, compact information where other people are
size) present may cause security problems)
(ii) Mobile device
Wi-Fi Access Can be easily stolen or misplaced due
Constant interactions with to their small size.
family and friends and
business partners

(4 marks)

2. Akia needs to print a document that is located on a mobile device. Outline TWO ways in which

the document can be printed.

1
The document can be sent to her email and then she can print the document from her email

using a desktop or laptop.

A mobile printing app can also be used to send the data to the printer wirelessly

Transfer document using portable storage eg. USB

(2 marks)

Total 10 marks

3. (a) State TWO examples of a hardware interface.

Touchscreen

Keyboard, Monitor, Mouse, Printer, etc

Can SCSI, ATA , IDE, SATA be considered as answers?

(2 marks)

(b) The following list includes various specifications of computer devices.

Specifications:

Display size, Hard drive size, Memory size, Processor speed, Resolution

For EACH of the following scenarios, (i) to (iv), recommend TWO relevant computer

specifications from the list above. Specifications can be used more than once.

Scenario Computer Specifications

(i) Mia needs to see the fine details of Display size, Resolution

graphics on the screen.

(ii) Joe’s computer performs highly Processor Speed, Memory size

complex calculations and quickly

produces results.

(iii) A presentation needs to be seen by Display size, Resolution

viewers from a distance.

(iv) Shirlet stores and retrieves data for her Hard drive size, Memory size

2000 clients, and needs to add client

information for the remaining 5000.

(8 marks)

Total 10 marks

4. (a) The table below illustrates sources that are used for the input of data. For EACH source,

identify the device that is used to capture data from it, and describe ONE example of data

that is captured.

2
Illustration of Source Device Used Example of Data that is

Captured

Barcode Reader Captures and read


information contained in
a bar code SUCH AS
● Type of product
(i)
● Manufacturer

● Product Code
NOT PRICE
OMR Answers to a survey or
MCQ paper
(ii)
Lotto ticket numbers,

Student id from MCQ paper

MICR customers account number,


bank’s routing number,
(iii) cheque number

(6 marks)

(b) State, with reasons, which of the sources illustrated

(i) is the LEAST popular

The MICR is the least popular used because it is used mainly by only banks or

financial organizations

(2 marks)

(ii) is MOSTLY associated with point-of-sale systems.

The barcode reader is most associated with point-of-sale systems because it is one of the

most used input devices that can be found in supermarkets and stores everywhere.

(2 marks)

Total 10 marks

5. (a) The diagram below shows the decimal binary or hexadecimal representation of the

characters H, I, M. Complete the diagram by writing the correct representation in the spaces

(i), (ii), (iii), and (iv).

3
i-4816 ii-1001001 iii- 3 iv-77 Note that the decimal equivalent for the binary is 78 therefore

students should be given the mark for 78 as well

(2 marks)

(b) Daniel wants to represent 12:35:47 p.m. using a clock where each column shows the binary-

coded decimal number.

In EACH of the three unshaded columns below, shade the appropriate circles that correspond

to the decimal digit, indicated below it. Three columns have been completed for you.

(6 marks)

Total 10 marks

6. Jarad is playing an online game where the user needs to move the STAR over different

TARGETS in order to gain points. Use this gaming example to answer the questions that follow.

4
(a) State

(i) TWO examples of input devices that can be used to move the star to the target.

Mouse, Joystick, Keyboard (Arrow Keys), Trackball, trackpad, touch screen

(2 marks)

(ii) ONE output device AND ONE hardware interface that notifies the user that the star is over

the target. Monitor, speaker, earphone

(2 marks)

(b) Describe TWO ways in which the gaming application can indicate to Jarad that the star is over

the target.

A message could be displayed on the screen telling Jarad that the star is over the target.

The star could be highlighted when it is over the target

Sound notification can be used to inform Jarad that the star is over the target.

(2 marks)

c. Complete EACH of the following statements by writing in the MOST suitable expression

associated with the term in brackets.

(i) Jarad is able to play the game interactively with other users in different countries in Real

Time(Processing mode)

(ii) He is also able to talk with the other users over the Internet while playing the game using

VOIP (Internet protocol)

(iii) Since he has so many games on the computer, he should Backup his files to safeguard

them in the event his computer and data are corrupted. (Data security)

5
(iv) Sometime he can play his game using WI-FI Or Hotspot where he does not us cables to

connect to the internet. (Wireless network)

(4 marks)

Total 10 marks

7. (a) The DIGITS company collects personal data from customers which it stores in filing

cabinets or on computers.

i. State TWO possible effects of improper storage of data.

Files could be misplaced

Files can be tampered with if proper physical security measures are not put in place

(2 marks)

ii. For EACH of the following storage locations, state TWO measures that can be used to

protect the data:

Filing cabinets

Locks

Fireproof Cabinets

Biometric system that only authorized person can bypass to gain access to the

room

Computer systems

Passwords

Firewall

Encryption

Locks, Alarm systems ,

(4 marks)

8. Outline when EACH of the following procedures would MOST likely be applied to the

company’s data:

i. Recovery When data has been lost or corrupted (2 marks)

ii. Archiving When there is data that is no longer actively used which is moved to a

separate storage device for long-term retention. (1 mark)

iii. Backing up This is created in order to recover data should it be erased or corrupted

accidentally or stolen during a data breach. (1 mark)

Total 10 marks

6
Section II

Productivity Tools – 15 Marks

Answer ALL questions

9. Study the spreadsheet below and answer the questions that follow.

a) State the names of the function that produced the results in cell D9 and D10.

I. FUNC-X SUM

II. FUNC-Y AVERAGE

(2marks)

b) Write a function for cell E5 that would place the comment “Yes” in that cell, if a passenger has

more than TWO pieces of luggage otherwise the comment should be “No”.

=IF(E5>2, “Yes”, “No”)

(3 marks)

c) State the range of cells that would be selected to create a chart that compares the number of trips

AND pieces of luggage for each passenger.

A2:B7 and D2:D7 (2 Marks) B2: B7 and D2:D7 (1 Mark)

Total 7 marks

10. Study the following table which contains the schedules for four flights.

SCHEDULES

7
FLIGHT DEPARTURE ON TIME

BELL 111 6:50 a.m. Yes

CBB123 8:25 a.m. No

BBA556 4:30 p.m. Yes

NAB900 5:00 p.m. No

a) Complete the database structure for the table.

Field Name Data Type

FLIGHT TEXT

DEPARTURE DATE/TIME

ON TIME TEXT Yes/No

(3 marks)

b. State the field that can be used as a primary key FLIGHT (1mark)

c. Write a suitable size for the FLIGHT filed 7 (1 mark)

d. Write the result of a query that finds all flights that are delayed

Two Flights would be delayed

CBB123 8:25 a.m. No

NAB900 5:00 p.m. No

(1mark)

e. State the field name AND the order of the records which are sorted in the table

Departure - Ascending order (2 marks)

Total 8 marks

8
SECTION III

PROBLEM-SOLVING AND PROGRAMMING – 45 MARKS

Answer ALL questions.

11. Each of the following programming statements contains ONE error. Rewrite the statement,

correcting EACH error.

(i) IF (X = 3) TRY Y :=8;

IF (X=3) THEN y:=8;

(ii) Var sum=integer;

Var sum:integer;

(iii) Writeln (The sum is, sum);

Writeln (‘The sum is’, sum);

(3 marks)

(b) (i) Explain the difference between a ‘variable’ and a ‘constant’.

A constant remains fixed throughout the program while a variable changes.

(2 marks)

(i) Write an example of a constant using a Pascal statement.

Const Pi=3.14;

(1 mark)

(c) Write an example of a value that can be stored in EACH of the following types of

variables:

(i) Integer 4

(ii) Real 10.6

(iii) Character K

(iv) String TOM

(4 marks)

Total 10 Marks

12. Aaron is playing a new online car game. He can gain or lose points in the game as follows:

● Increase speed and gain 20 points.

● Get stopped by a police officer and lose 10 points.

● Gain distance on another vehicle and gain 10 points

9
● Crash and lose all points.

For no change in points, however, the car can do the following:

● Turn in the opposite direction

● Knock a sidewalk

a) Complete the following table to show Aaron’s updated points while completing the moves

indicated.

Move Aaron’s Car Updated Number of points

1 Gains distance (0+10)=10

2 Knocks a sidewalk and gets stopped 0 +10 =10

(10-10)=0

3 Gains distance and gets stopped (0+10)=10

(10-10)=0

4 Turns and crashes 0

5 Gains distance and increases speed (0+10+20)=30

6 Is stopped and knocks a sidewalk (30-10)=20

(6 marks)

b) Using pseudocode, write an IF statement for move 1 (Gains distance) in (a) that updates

the number of points.

IF Move=Gains_Distance Then

Points:=Points+10;

END IF

(4 marks)

Total 10 marks

10
13. State whether EACH of the following operations is described as input, output, processing or

storage.

i. Entering a player’s name in a competition INPUT

ii. Showing the number of points on a screen OUTPUT

iii. Calculating the number of points lost in a game PROCESSING

iv. Exiting a game PROCESSING

v. Saving the points for the last three games STORAGE

(5marks)

b) Sketch a flow chart for the following control structure

IF money_collected >= 1000

Then

Print “Wear Jeans”

Else

Print “No Grand No Jeans!!”

endif

START

IF money_collected>=1000

Y N

Print “No Grand No


Print “Wear Jeans” Jeans!!”

STOP

(5 marks)

Total 10 marks

11
14. Study the following outline of an office where a thick line denotes a wall and the numbers

represent blocks

11 12 13

21 22 23

31 32 33

41 42 43

a. Using the terms START, DOWN, UP, LEFT, RIGHT and stop, write the sequence of

steps required to walk from block 11 to block 13.

Start>Down>Down>Right>Up>Up>Right>Stop

(5 marks)

15. Each Play Station III game has a tax of 10% added to its cost to calculate the final price. Write

Pascal code to

(a) declare TWO variables

Var

Cost, Tax, Finalprice:Real;

(4 marks)

(b) Input the cost price

Read Cost;

(2 marks)

(c) calculate the final price of a game.

Tax: = 0.10*cost;

Finalprice:=Tax+cost;

OR

Finalprice := Cost

(4 marks)

Total 10 Marks

12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy