Part - II
Part - II
Part – II A
Answer all questions
1.
(a)
(i) Explain one of the service of cloud computing “Software as a Service (SaaS)” briefly, and give
one suitable example for it.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2 marks]
(ii) Write down an advantage of cloud computing.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[1 marks]
(iii) Write down a disadvantage of cloud computing.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[1 marks]
(b)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2 marks]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2 marks]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2 marks]
2.
(a)
(i) Choose and write down volatile memories only in the list given below.
Lists: [Read only memory, Random access memory, Register, Cache memory, Harddisk]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2 marks]
(ii) Write any two advantages that users can get from open source software compared to proprietary
software.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2 marks]
(b) Write each of the following statements True or False in the spaces provided.
(i) The practice of using software without the legal permission of its owner is called open source
software ………………………….
(ii) The use of small and portable computing devices connected to a central host server over a
wireless network is called mobile computing …………………………..
(iii) The act of using one's work and ideas as one's own is called software
piracy…………………………….
www.beeon.org
(iv) Phishing is the attempt to capture information such as usernames, passwords and credit card
details for malicious activities by impersonating a legitimate/trustworthy entity in the Internet
communication . …………………………….
(ii) Cache memory ② Data and information are not lost even when the
computer is powered off
[3 marks]
3.
(a) Write in the box next to which layer of the OSI network reference model each of the following
www.beeon.org
(iii) IP
(iv) HTTP
(v) Router
(vii) POP
(viii) FTP
[4 marks]
(b) State each of the following statements about data communication and computer networks as
True if correct and False if incorrect.
(i) The transport layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
(ii) In amplitude modulation (AM), the amplitude and phase are changed so that the frequency
remains unchanged.
(iii) IP (Internet Protocol) is a connection-oriented protocol.
(iv) Flow control in a computer network works in the data link layer of the OSI network
reference model.
(v) The media access control (MAC) layer establishes a connection between the logical link
control (LLC) layer and the physical layer of the network. It is used to transfer data
packets over the network.
(vi) In circuit switching, when data is generated from a data source, it is divided into small
parts called packets. Each packet has a uniquely identifiable header. Also, each packet is
randomly sent via the different paths.
(ii)
(iii)
(iv)
www.beeon.org
(v)
(vi)
[3 marks]
The sending computer A sends the character G (1110001) while it uses the odd parity bit method
for error detection. What data will be sent by A? and briefly explain what the operation the
receiver will perform to detect any error that may occur during this process.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[1 marks]
(d) Draw the following diagram of the Manchester signal encoding while transmitting the data
11010001.
1 1 0 1 0 0 0 1
[2 marks]
4.
(a) Consider a computer that can use 16-bit virtual addresses ranging from 0 to 64K. Assume that
the size of the physical memory of this computer is 32 KB and the size of a page is 4 KB.
…………………………………………………………………………………………………
[1 marks]
…………………………………………………………………………………………………
[1 marks]
www.beeon.org
(iii) How many bits needed are to store virtual memory offset?
…………………………………………………………………………………………………
[1 marks]
Release ❹
❻
New Interrupt
❷ ❸
❶
❺
I/O or event
completion Waiting
Write down suitable terms for the labels ❶,❷,❸,❹,❺ and ❻ in the following spaces.
❶ ………………………………………….
❷ ………………………………………….
❸ ………………………………………….
❹ ………………………………………….
❺ ………………………………………….
❻ ………………………………………….
[3 marks]
(c) Write one advantage and one disadvantage of the continuous space allocation method used in an
operating system.
Advantage…………………………………………………………………………………………...
………………………………………………………………………………………………………
Disadvantage………………………………………………………………………………………..
………………………………………………………………………………………………………
[2 marks]
(d) Write one characteristics of the linked space allocation method used in an operating system.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
www.beeon.org
[2 marks]
*****
(a) Complete the following Karnaugh map to represent the Boolean expression given.
C
AB 0 1
00
01
11
10
[3 marks]
(b) Simplify the Boolean expression given above using Karnaugh map.
[2 marks]
(c) Construct truth table for the simplified Boolean expression.
[3 marks]
(d) Write down Boolean expression in standard POS (Product of sums) from the Karnaugh map or
other method.
[2 marks]
(6)
(a) Write down any two functions of network layer of OSI network reference model.
[1 marks]
(b) Give one reason why UDP may be used instead of TCP in an application for live
telecasting (webcasting).
[1 marks]
A medium sized company manufacturing soft drinks in capital city has four departments namely
Information Systems, Production, Accounting and Sales. All four departments use separate local
area networks (LANs).
Each department has the number of computers as given in the table below.
Production 8 1
Accounting 16 2
Sales 22 1
(i) Draw a network diagram for this situation. Clearlyy show all network cables, network
connectivity devices and servers.
[4 marks]
(ii) Assign IP addresses to all computers using the following table as a guide. For this, use
variable length subnet mask (VLSM) only.
[4 marks]
1. Information
Systems
2. Production
3. Accounting
4. Sales
*****
www.beeon.org