Professional Documents
Culture Documents
500 Practice Questins For CSEC Exam in Ifrormation Technology
500 Practice Questins For CSEC Exam in Ifrormation Technology
SVG LIMITED
(B) kilo
(C) (era
(D) exa
(A) backing
(B) immediate access
(C) major
(D) disk
(A) bit (A) characters per second TEST 2 Fundamentals of Hardware & Software
(B) bistable (B) characters per minute 21. All of the following are systems 24._____________is a temporary holding
(C) byte (C) pages per second programs EXCEPT__________ area for data, application program
(D) word (D) pages per minute instructions, and the operating system.
(A) utilities
(B) translators
13. Which of the following statements is 17. A(n). . printer is suitable (C) word-processors
(A)RAM
UNTRUE? for printing multi-part forms because they (D) operating systems
easily print through many layers of paper. (B)ROM
riod in which they were developed.' 349. Differentiate between internal and useful in EACH of the following areas:
external documentation. [2] 362. Differentiate between web page and
346. Explain a major difference between (a) Managing the inventory in a store [1] website. [1]
third generation languages (3GL) and 350. State TWO reasons for documenting (b) Editing scanned pictures [1]
fifth generation languages (5GL). [2] programs. [2] (c) Watching movies [1] 360. State the purpose of the browser. [1]
347. State TWO reasons for the popular 351. State THREE elements of internal 361. What is an URL? [1]
use of fourth generation languages documentation. [3] QUESTIONS 360 - 364 ARE BASED ON THE
(4GL) in developing business FOLLOWING NARRATIVE: 363. State the meaning of EACH of the
systems. [2] following terms:
QUESTIONS 352 - 353 ARE BASED ON THE
348. State ONE difference and ONE FOLLOWING NARRATIVE: Modern Bankers, a commercial banking (a) IRC[1]
similarity between fourth generation organization, has 20 branches across the (b) HTTP[1]
languages (4GL) and FIFTH island. The computers are all connected to (c) WWW[1]
generation languages (5GL). [2] the Internet and they also have an intranet. (d) FTP[1]
366. State ONE use each of the following
items associated with the Internet and
374. Networks are popular in private and
public organizations. They enhance
Information Processing
computer networks. the data processing tasks in these
organization to a great extent. 367. State ONE difference and ONE TEST 24
similarity between IRC and instant
Describe EACH of the following networks: messaging. [2]
Application and Implications of ICT 378. Which word in the narrative implied
375. Networks utilize various types of that data was given? [1]
wired and wireless transmission
(a) HTML[1] 379. Who used the information that was
media including fiber-optic, twisted
(b) IRC[1] derived from the data? [1]
pair, satellite and infrared.
(c) E-mail [1]
Describe EACH of the media stated above, 380. Explain how a turnaround document
saying whether the media is wired or wire- could emerge. [2]
QUESTIONS 367 - 369 ARE BASED ON THE
less. [4 x 2]
FOLLOWING NARRATIVE:
376. Define the following terms which are QUESTIONS 381 - 384 ARE BASED ON THE
Many students spend a lot of time FOLLOWING NARRATIVE:
related to network technology and
engaging in IRC, instant messaging and
communication modes:
multimedia chat. Information systems have brought about
(a) Bluetooth [1] major changes in organizing and managing
(b) hotspot[1] business enterprises. These involve
(c) voiceband [1] automation, process control, scientific and
TEST 23 (d) duplex [1] commercial data processing.
377. Define the following terms which are 381. Describe'automation'. [2]
QUESTIONS 371 - 373 ARE BASED ON THE related to data security and
FOLLOWING NARRATIVE. information misuse: 382. Describe ONE service that is offered
through commercial systems. [2]
Many companies now communicate and (a) encryption [1]
transact business using e-mail, FTP and (b) firewall [1] 383. State ONE characteristic of process
e-commerce. (c) propriety data [1] control systems. [1]
(d) propaganda [1]
371. State ONE difference and ONE (e) electronic eavesdropping [1] 384. State one characteristic of scientific
similarity between e-mail and data processing. [1]
e-commerce. [2]
372. State TWO advantages of e-mail over QUESTIONS 385 - 388 ARE BASED ON
traditional mail. [2] THE FOLLOWING NARRATIVE:
INSTRUCTIONS TO CANDIDATES
This paper consists of THREE sections and a total of TWELVE questions.
Candidates MUST answer ALL questions in all THREE sections.
Number EACH question correctly on your answer sheet.
Code is to be written in the programming language, Pascal.
SECTION I
THEORY-60 marks
Answer ALL questions.
1) Figure 1 below shows a typical computer system. Study Figure 1 and answer the questions that follow.
2) The LITTLE BYTE computer system uses a one-byte word and stores data in a binary format using two's complement.
a). Differentiate between a 'bit', a 'byte' and a 'word'. (3 marks)
b). What is the wordsize of the LITTLE BYTE computer system? (1 mark)
c). What is binary? (1 mark)
d). Name ONE other format used to represent computer data. (1 mark}
e). Using two-complement arithmetic, perform the following computations:
i) 11001111 + 1110001 (2 Marks)
ii) 55 MINUS 17 (2 Marks)
Total 10 marks
4). The Caribbean Central Bank is planning on installing a range of peripherals and computer-related devices to enhance
its operations.
a) Write the name of the component that it may use to
i) Automatically read data from cheques (1 mark)
ii) Turn off the lights when the last employee leaves the room (1 mark)
iii) Allow access to the vault based on a person features such as their fingerprint, retina or voice (1 mark)
iv) Provide automated response to telephone callers to indicate that "Our office is currently closed ..." (1 mark)
b) Write the name of a device or media it may use to
i) Print 800-page detailed reports on wide format continuous forms (1 mark)
ii) Backup 1 TB of data daily (1 mark)
iii) Capture image of cheques for electronic transmission to banks overseas (1 mark)
c) The bank hired a highly skilled programmer to write application software to suit its needs. The programmer had to
ensure that the new programs were Windows 7 compatible. (1 mark)
i) Is the application software 'custom' or 'customised'? (1 mark)
ii) What type of software is Windows 7? (1 mark)
Total 10 marks
SECTION II
Productivity Tools - 15 marks
Answer ALL questions.
7) Nutcracker Gadget store is having a sale and is offering a discount on its more expensive handsets. It has
prepared a worksheet showing the list of phones and their prices, which are given in the
spreadsheet below:
A B C D
8 Nokia E3 56000.00
13
Type
P1 Prepaid
P2 Postpaid
TABLE2: CUSTOMER_DETAILS
a) Name the MOST suitable data types for storing data in EACH of the following fields:
i) PhoneNum (1 mark)
ii) Balance (1 mark)
b) Name TWO candidate keys in the CUSTOMERJDETAILS table. (2 marks)
c) Give the name of the primary key in the CUSTOMER_DETAILS table. (1 mark)
d) What kind of relationship exists between the CUSTOMERJTYPE and CUSTOMER.DETAILS tables? (1 mark)
e) Write a query to list all Postpaid customers with balances < 50,000. (1 mark)
Total 7 Marks
SECTION III
Problem-SOLVING and PROGRAMMING -45 marks
Answer ALL questions.
12) Consider the following program in Pascal, and answer the questions that follow.
Program Doubles (input,output);
Const max = 8;
VAR numStore : array[1..max] of integer;
currPos : integer;
Begin
FOR currPos := 1 to max DO
numStore[currPos] := currPos * 2;
End.
END OF TEST
SUGGESTED RESPONSES: TESTS 14-30
299. (a) 000100110101
(b) 1011 0110 1000
263. A. random access memory 304. The problem is stated concisely and unambiguously. The problem is identified in terms
264. B. control unit of its major components.
265. C. arithmetic logic unit 305. The programmers present design specifications of programs which may address the
266. D. backing store problem. These designs are examined for suitability and effectiveness in relation to the
267. 2 GB problem.
268. CD or DVD 306. The solution to the problem, in terms of intended instructions to the computer, is worked
271. optical media stores data in a manner that can be read using laser light whereas out in details and is expressed in pseudocode, flowchart or some other form, known as the
magnetic media stores data on media and relies on a magnetic field for reading and algorithm.
writing data. 311. Input Marks: Controls the activities relating to the input of marks.
272. digital versatile/video disc Output Report: Controls the activities relating to the display of marks and average.
273. both are optical storage media, CD has a much lower capacity than DVD and 316. quantity in stock
is the data is encoded in a different format. re-order level
274. storing full-length movies with high video and sound quality 322. The calculation that converts minutes to minutes and hours.
275. - both magnetic disk and magnetic tape stores data on magnetized media, magnetic
tape is a serial access medium whereas magnetic disk is direct access
326.
C X total
media
- both optical discs and magnetic hard disks are direct access media whereas they 1 12 12
differ in that they each use different technologies to read/write data 2 4 16
- both hard disks and floppy disks store data on magnetized media whereas they 3 3 19
differ in that hard disks are non-removable whilst floppies are removable media. 4 2 21
280. on a fixed-head system, there is a read/write head for each track, consequently, 5 5 26
there is no need for the read/write arm to "seek" for a track and as such the seek time 327. BEGIN
component of access time is eliminated INPUT n1,n2 [1]
282. = capacity of each sector * # sectors/track * # tracks * # surfaces IFn1>n2then [1]
= 512* 18*80* 2 [1
= 1,474,560 bytes ]
= 1,474,560 bytes/(1,024* 1024)
= 1.44 MB bigger = n1
284 . Speech is synthesised by concatenating pre-recorded words from a database ELSE
containing a limited yocabulary, the sentences and/or phrases that are formed bigger = n2
follow a END
strict predetermined pattern
340. Syntax errors: Violation of the grammatical/syntactical rules of the language. Eg. To
285. the light pen does not require a pad and thus occupies less space on a desk spell a reserved word wrongly or use a reserved word as an identifier.
the use of a light pen for drawing is more comfortable as it is closely aligned with the
method by which most people learn to draw, that is, with a pen, pencil, or brush. 341. The process of detecting and eliminating errors, both syntax and logic, or other defects
within a computer program.
289. for uniquely labelling assets for identification purposes, for labelling stock
items to facilitate inventory control 342. Errors in the sequencing of, or omission of necessary steps in an algorithm. Also, flaws
within control structures. Example of logic error - a value that should be accumulated was
291. Customer surveys, lottery tickets, school registers not initialized.
293. (A) Windows Vista
(B) Microsoft Internet Explorer 343. All instructions are written in machine code - binary format. As a result programming is
(C) Microsoft Works complex and excessively tedious.
- Programs cannot be transferred from one system to another since a program has to be
written to suit the unique architecture of the computer which will execute the program.
(a) Secondary
(b) (i) Flash memory
(B) A key which is used to uniquely identify a record.
(ii) magnetic OR optical
(C) Member ID
(iii) Magnetic: floppy disks, hard disks, tapes; Optical: CD, DVD, BluRay
456. List LName.FName for GENDER = 'M'
(c) (i) DVD - its has a capacity of 4.7 GB
457. List LName.FName for DOB <= [date exactly 18 years ago, to date]
(ii) Flash memory card
458. Do a query to determine the members of the Sunday School then print the query.
(iii) Floppy disk
(d) 80 - (1 GB = 1,024 MB; each of the 4 Gigabytes can hold 20 pictures since
51.2x10x2=1,024)
Question 4
i.
MIC
R
ii.Se
nsor
(b) s
iii.
Biometric
devices
iv.Voice
synthesis
v.
Webcam
line
i. printer
ii.
Magnetic
tape
(iii) Scanner
BEGI
(c) (i) custom(built) N
(c) (i) Select the file; right-click then select copy from the menu; open the
Total Fees <-- (numSubjects * subCost)
MyDocuments folders then right click and select 'Paste'. + (numOrals *oralCost)+ (numPrac *
(ii) Select the folder; right-click then select 'Delete'; confirm that it is ok to delete pracCost}
(d) A menu-driven interface : it is easily manipulated with a single finger and the and the
options are easily accessed; waiters usually have items in their hands and are
always on the move. Print
(TotalFees)
Question 6
(iii) ".com" is a means of identifying that the web site being accessed is a
Commercially operated one. Figure 1.
Num:=1; Question 2
REPEAT (a) Figure 2 - command driven; Figure 3 - graphic user
Begin (b) (i) 3
Write(num); (ii) 2
Num :=Num + (c) menu-driven
1; (D) operating system
End; (E) (i) At the command prompt type ren original_filename new_filename then press
UNTIL Num > 50 enter(NOTE: that there is a space between the filenames)
(ii) Right-click on the file, select rename from the context menu, type the new
name,press enter
(c) IF day = "Tuesday" AND time = "5 PM" THEN Admission := admission * (1 - 20%)
Question 3
ELSE
Admission := admission * (1 - 20%)
(a) 1. D
2. E
(d) ANY THREE of the following: 3. A
4. C
5. B
Mnemonic variable names
(b) OMR - an academic institution such as a secondary school
Effective use of white space
Sensor - a factory or restaurant (exhaust fan in the kitchen)
Internal comments
MICR - a commercial bank
Indentation
Scanner - a government records office or national archives
Barcode reader - a hospital (read bar codes on patient's wristband and medication bottle)
Question 12
Question 4
(a) numStore
(a) Flood
(b) 8
(b) (i) Deliberate theft: "manager noticed that a number of computers were damaged"
(c) 10
and "two hard drives were missing from computers in the accountant's office"
(a) Each element stores a value twice that of its position in the array. For example, the
(ii) accidental damage to computers and files: "there was water damage to the files left
first
on employees' desks" and "power surges caused damage to computer hardware"
element stores 2, the second element 4, and so on.
(c) (i) Physical files may be protected by storing them in locked cabinets, safes or
vaults
(ii) Computer equipment should be protected from electrical damage by plugging SECTION II - Productivity Tools
the power cord into a surge protector. It can be protected from damage by
ensuring that it is covered with a waterproof cover when not in use. It may be Question 7
protected from theft by ensuring it is kept in a secure room and that the chasis (a) ANY TWO of the following: field size, format, caption, default value or input mask
and peripherals are using speccialized locking devices.
(iii) Software and data may be protected from damage by safeguarding the (a) Open the table in design view; click the row selector (the blank square) next to the
computer system from power problems (as discussed in part ii); by keeping Text
computer systems in safe locations and by storing removable media field, and then press DELETE.
containing data in safe locations as well. (b) CNO
(c) SELECT CUSTOMER.* WHERE Type = "D" AND YTD SALES > 50000
Question 5
(a) Electronic Question 8
(b) Internet
(a) ANY TWO of the following: labels, values, foumula
c) ANY ONE row from the table below:
(b) =SUM(B2:B6)
Advantage Disadvantage (c) Comma style
e-tearning Facilitates access to more Technical problems such as (d) =IF(B2 < 100000, 'POOR'.'GOOD')
interactive learning power outages and
materials such as equipment breakdown may
audiovisual, games and have a greater negative SECTION III - Programming
video-conferencing^ impact than disruptions in a Question 9
face-to-face setting (a) S3-» S5 -» S1 -»S4 -» S2
e-commerce Facilitate "round-the-dock' Provides an easier (b) (i) a) 3
trading of goods and mechanism for rouge b) 10
services vendors to commit fraud
c) 8
e-mail Lower cost per Physical attachments, for
d) 12
transmission than example, a cheque, cannot be
traditional snail mail sent e) 0
(ii) 10
(d) (i) e-commerce (ii) e-learning (iii) e-mail
(iii) INPUT year1,year2, year3
(e) The difference is in the subject of the activity: 'e-learning' has as its focus, a student
or learner gaining new knowledge about a particular subject whereas 'e-commerce' Average = (yearl + year2 + yearS) / 3
involves the exchange of goods/services for money. PRINT average
Question 6 Question 10
(a) Data may be captured for processing more efficiently than when using a manual (a) (i) IF (X = 3) THEN Y:= 8
system (ii) WHILE(X = 3)DOY:=Y =1;
The output of an information system is likely to be produced more reliably than
when using a manual system. (iii)FORX:=1T010DOWritelnX;
(b) Batch and online (b) (i) A variable identifies a memory location that holds a value that may change as the
(c) Detailed and summary program executes whereas a constant identifies a memory location who value
(d) Master files contain reference data that does not change regularly such as an remains unchanged for the life of the program.
employees name and rate of pay. A transaction file contains data collected regularly (ii) const pi = 3.142;
(such as daily) in relation to transactions that occur such as the time an employee (c) (i) ANY ONE of the following: 0, 320, -1, -65530, 65000
arrives at work and the time the employee leaves daily.
(ii) ANY ONE of the following 3.14,0.007,2340
(e) Serial files allow records to be read from the file in the order it was written to the file
whereas, in sequential files the records are organized in the order the transactions (iii) ANY ONE of the following: A, a, 1, @ or X
occurred naturally. (iv)
(v)
(vi) ANY ONE of the following: Anna, Rhianna, Christmas, Campion, Jerusalem
Question 11 (d) 'System documentation' is usually written using technical jargon and its intended
(a) (i) FOR mark := 1 TO 40 DO audience is computer professionals whereas 'user documentation' is written in
Writeln(mark); (ii) easy to
Mark :=0; REPEAT begin understand language and its intended audience is the end-user.
Mark := Mark =1; Writeln(Mark); End;
UNTIL mark = 40; Question 12
(b) A-compiler (a) HUM
B - errors (b) CSEC
C - logic (c) 8
D - debug (d) The array stores a set of integer values, each of which may be accessed or
(c) To improve the-readability of the source code during program development; To manipulated
facilitate maintenance activities after implementation directly by the use of the array subscript.