question archive (a)(i) State and describe three types of error can occur in programming: (3 Marks) __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ (ii) When is a programming language considered structured? (2 marks) __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ ______________________________________________________________________________ (b)(i) The Global Science Museum is not large and can become over-crowded when more than 300 people are in the building
Subject:Computer SciencePrice: Bought3
(a)(i) State and describe three types of error can occur in programming: (3 Marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(ii) When is a programming language considered structured? (2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(b)(i) The Global Science Museum is not large and can become over-crowded when more than 300 people are in the building. They would like a program that will stop visitors from entering when more than 300 visitors are in the building.
Design a Pseodocode segment for this problem using a REPEAT loop. You do not have to worry about visitors who leave the building, just those who have entered. (3 Marks)
(ii)Indentify Three aspects of a good HCI? . (3 Marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
____________________________________________________________________________________________________________________________________________________________
(c)(i)Give one advantage of compliers over interpreters (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(ii)Give one advantage of interpreters over compliers (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(iii)Explain briefly why the source codes must be translated again if the programmer wants
to use the program on a computer with a different platform. (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(iv). Explain why a programmer may prefer to write code for device drivers using low level languages.
(1 Mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(a) (i) With the aid of examples, explain number complements in the Binary number systems
(2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(ii) Outline the benefits of using binary number complementation in computers. (2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(b) (i) Why is binary number system best suited for use in computers? (2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(ii) Convert the following base two number into base ten. (2 marks)
11.01
(iii)Convert the following base sixteen number into base two. (2 marks)
DEF=
(c) Carry out the following binary arithmetic:
(i) 11 + 10 (1 mark)
(ii) 101 X 11 (1 mark)
( iii) 101/11 (1 mark)
(iv) 101 11 (1 mark)
Describe briefly the three data processing modes (3 marks)
Batching Processing Mode
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
Real-time Processing Mode
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
Interactive Processing Mode
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(b)(i)Suggest two possible reasons for data preparation errors. (2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(ii) Suggest two possible reasons for data input errors. (2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(c) (i)Distinguish between data validation and data verification. (1 mark)
________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
(ii)Give two examples of data verification techniques. (2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(d) Describe briefly the following data validation techniques
Presence Check (1 mark)
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Type Check (1 mark)
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Range Check (1 mark)
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Control Total Check (1 mark)
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Parity Checks (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(a) (i) Explain the term search engine (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(ii) Peter and Mary use the same keyword to search for information. Suggest two reasons
why their search results are different. (2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(iii)State one disadvantage of using an e-mail account provided by the Internet service
provider (ISP). (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(b) (i) Explain the term URL (1 mark)
________________________________________________________________________________________________________________________________________________
(ii) For the URL http://www.csklsc.net/pe/calendar.htm,
http stands for (1 mark)
____________________________________________________________________________________________________________________________________________________________
The domain name is (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
The top-level domain (TLD) is (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
pe stands for (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
(c) (i) Explain the term communication protocol (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(ii)Explain the following types of communication protocol
Ethernet (1 mark)
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Token Ring (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
TCP/IP (1 mark)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(iii)Give Two examples of wireless-based communications channels. (2 marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(a).Describe the role of the systems analyst. (2 Marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(b).Describe Two techniques used by the systems analyst in requirements elicitation. (2 Marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(c)What is a requirements specification and what does it contain? (5 Marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
____________________________________________________________________________________________________________________________________________________________
(d) Software development is often said to be an iterative process.
Describe Two events that might spark an iterative process in software development. (2 Marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________ __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(e) (i) Describe briefly the three basic e-commerce models. (3 Marks)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
______________________________________________________________________________
(ii) Apart from parental control, state one other ways of Internet censorship.