Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 74

Presented to

St Vincent Girls' High School


on March 23rd, 2011 by TEST 1 I Fundamentals of Hardware & Software
1. Main memory is another name for 6. The prefix _______ Means
__________store. billion.

GUARDSMAN (A) giga

SVG LIMITED
(B) kilo
(C) (era
(D) exa

7. __________ refers to the number

(A) backing
(B) immediate access
(C) major
(D) disk

2. ______________is the most common


QUICK PAGE FINDER type of volatile memory. of bits that may be held in a word.

Multiple-Choice Practice Test (A) ROM (A) Clock speed


Fundamentals of Hardware & Software !
(B) Flash memory (B) Word size
Problem-solving & Program Design
(C) CMOS (C) Sequential access
Program Implementation
(D) RAM (D) Device interface
Applications and Implications of ICT 19
Information Processing 21
Word-processing, presentation and Web Page Design 24 ___________is a primary storage 8. The capacity of a DVD is typically
Spreadsheets 26 device that may be programmed once measured in______________.
Databases 28 by the user.
(A) kilobytes (KB or K)
Short-answer Practice Tests (A) RAM (B) megabytes (MB)
Fundamentals of Hardware & Software 32 (B) ROM (C) gigabytes (GB)
Problem-solving & Program Design 34
(C) PROM (D) terabytes (TB)
Program Implementation
(D) EPROM
Applications and Implications of ICT
Information Processing 39 9. A . is a sequentially
Word-processing, presentation and Web Page Design 41 4. A bit is a . digit. accessed medium.
Spreadsheets 42
Databases 44 (A) denary (A) disk drive
(B) analog (B) magnetic disk
Full-Length Practice Exams (C) binary (C) magnetic tape
Paper 1 45
(D) small (D) tape drive
Paper 2 53

Solutions 5. A . is the smallest 10.______________is a type of memory


Tests 1-13 & Full-Length Practice Exams - Paper 1 60 element in an electronic image. circuitry that holds the computer's
Tests 14-30 62 startup routine.
Full-Length Practice Exams - Paper 2 69 (A)byte
2010 Past Paper 73 (B) character (A)RIM (Read Initial Memory)
(C) pixel (B)RAM (Random Access Memory)
(D) point (C) ROM (Read-Only Memory)
(D) REM (Ready Ever Memory)
11. All of the following items are widely 15. Devices that capture data directly from 19. A home computer system is equipped 20. Arrange the following secondary storage
used input devices EXCEPT the a source document include all of the with a memory card reader, a floppy devices in order of increasing capacity
following items EXCEPT___________. disk drive, a DVD drive and an internal from smallest to largest: a 1 GB memory
hard disk. The LEAST and MOST card, CD-ROM, DVD and a 128 MB flash
(A) keyboard and mouse (A) optical scanners and optical readers portable media that can be used with drive.
(B) microphone and scanner (B) bar code readers this computer are_____________.
(A) flash drive, CD-ROM, memory
(C) digital camera and web camera (A) magnetic-ink character recognition
(A) hard disk and memory card card, DVD
(D) printer and monitor readers (B) flash drive, CD-ROM, DVD,
(B) DVD and memory card
(C) portable keyboards (C) DVD and floppy disk memory card
12. In data representation, a (D) hard disk and floppy disk (C) memory card, flash drive,
___________represents one 16. The speed of a dot-matrix printer is CD-ROM, DVD
character which may be a letter, measured by the number of (D) memory card, CD-ROM,
flash drive, DVD
number, or punctuation mark. __ that it can print.

(A) bit (A) characters per second TEST 2 Fundamentals of Hardware & Software
(B) bistable (B) characters per minute 21. All of the following are systems 24._____________is a temporary holding
(C) byte (C) pages per second programs EXCEPT__________ area for data, application program
(D) word (D) pages per minute instructions, and the operating system.
(A) utilities
(B) translators
13. Which of the following statements is 17. A(n). . printer is suitable (C) word-processors
(A)RAM
UNTRUE? for printing multi-part forms because they (D) operating systems
easily print through many layers of paper. (B)ROM

(A) CPU + peripherals = computer 22. A _ is the smallest (C) PROM


system (A) laser addressable unit on a disk. (D) EPROM
(B) All computers have input devices (B) thermal
(A) track
(C) All computers have input (C) InkJet (B) platter 25. A financial institution needs only to
I (D) dot matrix (C) cylinder
capabilities provide the caller with a limited amount
(D) sector
(D) All input devices are peripherals 18. Which of the following devices are of information. A_________
MOST LIKELY to be used at an airport for 23. The term . designates system is ideal to satisfy this need.
14. Which of the following device border control activities? equipment that might be added to a
interfaces integrates the device computer system to enhance its
(A) voice capture
controller into the disk or CD drive? (A) OMR, document scanner, web camera functionality.
(B) voice recognition
(B) XR, document scanner, digital camera
(A) SCSI (A) digital (C) voice response
(C) OMR, bar code reader, web camera (B) disk
(B) IDE (D) OCR, bar code reader, digital camera (D) sound capture
(C) peripheral
(C) SATA (D) system
(D) SICS
26. Large-scale applications sometimes 38. Which device has internal storage in
refer to a graphics tablet as a 31.A is a sub-division of a 36. ___________are used the form of a buffer?
in
track that stores data on a disk.
specialized fields such as engineering (A)speaker
(A) scanner (A)bistable and drafting for outputting large-format (B)laser printer
(B)buffer drawings. (C)visual display unit
(B) pointer
(C)cylinder (D) Computer Output Microfilm Recorder
(C) reader
(D) digitizer (D)sector (A) Digitizers
39. What unit of measurement is used to
(B) Plotters
32. Two commonly used types of impact express the speed of memory?
27. All of the following devices are commonly (C) Laser printers
used non-impact printers EXCEPT printers are_____________.
(D)Sheet feed scanners (A)seconds
(A) ink-jet printers and laser printers (B)milliseconds
(B)dot-matrix printers and line printers 37. John has developed a flowchart for a (C)microseconds
(A) ink-jet printers and photo printers (C)photo printers and large-format printers (D)nanoseconds
program that he will develop. Which
(B) laser printers and thermal printers (D) mobile printers and thermal printers type of programming error may be
(C) label and postage printers 40. All the following are special purpose
detected on the chart?
(D) line and dot-matrix printers 33. All the following are general purpose software EXCEPT
software EXCEPT___________ _ . (A)run time
28. _______is a type of chip from (A) media players
(B)syntax (B) photo-editing software
which data can be erased by exposure (A) databases
(C) logic (C) web browsers
to ultraviolet light. (B)spreadsheets
(D)semantic (D) word-processors
(C) web browsers
(D) word-processors
(A)RAM
(B)ROM TEST 3 Fundamentals of Hardware & Software
34. Which of the following acronyms
(C) PROM 43. The speed of an ink-jet printer is
represents a computer bus primarily
(D) EPROM measured by the number of
designed for the transfer of data 41. All the following software are examples
____________it can print.
between a computer system and a of operating systems EXCEPT
29. Eight bits are called a
mass storage device? (A) characters per second (CPS)
(A)Firefox
(A) word (B)Linux (B) characters per minute (CPM)
(A)SICS (C) pages per second (PPS)
(B) byte (C) Macintosh OS
(B)SATA (D) pages per minute (PPM)
(C) bistable (C) SCSI (D)Vista
(D) sector (D)IDE 44. The system used by mission control in
42. Which of the following items are not a
Houston, Texas to monitor the
30. __________refers to 35. ____________enables component of a graphical user operation of space exploration vehicles
the number users to interface? is an example of the______________
of bits that a microprocessor can convert the image from a fax modem to processing mode.
manipulate at one time. text and then edit it. (A)windows (A) batch
(B)icons (B) on-line
(A) Clock speed (A)Optical mark recognition (OMR) (C)menus (C) real-time
(B) Word size (B) Optical character recognition (OCR) (D)prompts (D) time-sharing
(C) Sequential access (C) Magnetic ink character recognition
(D) Device interface (MICR)
(D)Fax image recognition (FIR)
45. All the following are examples of 50. Banks and other financial institutions 58. Amazon, the US-based online retailer,
hardware interfaces EXCEPT utilize____________technology that 54.A(n). ____________ printer allows third-party companies to use
automatically verifies the identity of is usually faster than excess processing capacity on its
(A)sensors callers wishing to access their accounts. a(n)__________ computer system. This is an example
(B)touch screens Printer but sometimes
of the__________processing mode?
(A) voice capture slower than a___
(C) pop-up menus
____________printer.
(D) Braille keyboards (B)voice recognition (A)batch
(C) voice response (B)on-line
(A) dot-matrix, InkJet, laser
46. A _____________is a (D) sound capture (C) real-time
(B) dot-matrix, laser, inkjet
device that is (C)inkjet, dot-matrix, laser (D) time-sharing
externally connected to, and under the 51. In an airport, a system consisting of (D)ink-jet, laser, dot-matrix
control of the central processing unit. sensors, bar code readers and remote 59. .______________is a
controls is MOST LIKELY used for 55. The ability of a computer to execute character
(A)bistable two or more programs at the same representation scheme.
(B)peripheral time, using one CPU is called
(C) disk controller (A)aircraft boarding. (A) ASCII
(D) memory controller (A) multitasking
(B)baggage handling. (B)BCD
(B) multiprocessing
(C) border control. (C) microprocessing (C) Sign and magnitude
47._____________is a primary storage (D) passenger check-in. (D) Two's complement
(D) multiprogramming
device that may be programmed and
reprogrammed by the user. 52. Some __________printers spray 56. Which of the following activity is NOT a 60. The representation of
ink, while others use heat or lasers to function of an operating system? the base 10 value 23 is 0010 0011.
(A)RAM create images.
(B)ROM (A) file management
(A) ASCII
(C) PROM (B) print management
(A)non-impact (B)BCD
(D) EPROM (C) memory management
(B)line (C) sign and magnitude
(D) process management
(C)impact (D) two's complement
48. Automated directory assistance (D) hard-copy 57. A train station may use a___________
services utilize_____________ system to notify passengers of 62. In flowcharting, which basic operation
technology for accepting user input. 53. A monitor is measured in the same way schedule information or a train's status. is a rectangle used to represent?
as a television is measured, that is
(A) voice capture (A) voice capture (A)decision
(B) voice recognition (B)voice recognition (B)input/output
(C) voice response (A) vertically from the top corner to the (C) voice response (C) process/assignment
(D) sound capture bottom (D) sound capture (D) storage
(B) horizontally from the left corner to TEST 4 Problem-solving and
49. To which category of software does the right Program Design
Microsoft Works belong? (C)diagonally from one corner to the other
(D) in square units that indicate the 61. ALL the following are simple data
(A)custom-written area of the screen types EXCEPT_______________.
(B)customized
(C) integrated (A)character
(D) special purpose (B)integer
(C)real
(D)string
63. Which of the following is NOT a 68. Which of the following is an incorrect 73. Which condition will determine if n is of
significant part of a simple problem? variable name? a higher value than ten? 77. Pseudocode is a ________ . method of

(A) Istchoice representing algorithms.


(A)input
(B) Firstchoice (A) n>=10
(B)processing (C) firstChoice (B) n>10 (A)graphical
(C) output (D) FIRSTCHOICE (C)n >= 10 (B)textual
(D) solution
69. A ________is a named (D)n < 1 0 (C) verbal
64. During problem decomposition, expected location in (D) visual
results are documented in the________ memory, the value of which may remain 74. Consider the following: Five numbers
fixed. are to be input (under the control of a QUESTIONS 78 - 80 ARE BASED ON THE
column in the defining diagram.
(A)constant loop). The biggest number must be de FOLLOWING NARRATIVE:
(A)input (B)literal termined and output. How many
(B)processing (C)half-constant columns are necessary for the required Five numbers are input using a for loop. As
(C) output (D)variable trace table? each is entered, it is doubled. The results
(D) storage are stored separately.
70. Which data type is MOST appropriate
for storing a value representing the (A) 6
65. Developing and representing algorithms
weight of a newborn child? • (B) 5 78. How many columns are required for a
are included in the________step in the
(C) 3 trace table for the algorithm?
problem solving process. (A)character
(B)integer
(D) 2
(A) first (C)real (A) 2
(B)third (D) string 75. The number of _______ . in an algorithm (B) 3
(C) fourth determines the number of rows in a (C) 4
(D) last 71. Which statement represents a
trace table? (D) 5
characteristic of an algorithm?
66. In which one of the following processes is (A) Has a precise number of steps. 79. How many values should be in the first
(A) constants
a defining diagram used? (B)Always represent a part of a solution. (B) calculations row of the trace table?
(C) Is always structured.
(A)Problem diagramming (D) Relates to programming, only. (C) passes
(B)Problem partitioning (D) variables (A) 2
(C) Program definition 72. A value has been input. It must be (B) 3
(D) Stepwise refinement doubled and the result stored. The 76. The "AND" in the program statement "X (C) 4
initial value and the result must be
= 5 AND Y < 7" is an example of a(n) (D) 5
67. All the following are true about variables displayed. Which algorithm segment is
correct? ____________operator.
and constants EXCEPT that__________.
80. How many values should be in the
(A) they have names called identifiers. (A) double value, print value (A) arithmetic second column of the trace table?
(B) double value, print value
(B) their names refer to an area of (B) boolean
print result
memory. (C) double value, store result (C) comparison (A) 2
(C) their names are created by the pro print product (D) logical (B) 3
grammer. (D) double value, store result (C) 4
(D) they can be used interchangeably. print value, print result
(D) 5
TEST 5 Problem-solving and Program Design
90. Which of the following descriptions are (D) readn1,n2
A. determine the most efficient solution. sum = n1 + n2/2
characteristics of an algorithm?
81. Problem partitioning is a technique used to Stepwise refinement is a technique used in i. precise avg = sum/2
ii. ambiguous write avg
B. refine a problem that has two or (A) flowcharting
ill. terminable
more parts. (B) top-down design iv. unambiguous 94. The number of______
C. identify which part of a problem can (C) problem partitioning algorithm determines the number of
(D) trace table construction (A) i and ii rows in a trace table?
be solved.
(B) i, ii and ill
D. decompose a problem into its (C) i, ii and iv (A) constants
component parts. 86. A (D) i, ill and iv (B)calculations
_______is a named
(C) passes
location in (D) variables
91. An algorithm specifies the flow of
82. A defining diagram usually has memory, the value of which changes control from one_________to another.
_______columns. during program execution. 95. Which statement is used to determine
(A) structure and output the bigger of two unequal
(A) constant (B) value numbers?
(A) 2 (B) literal (C) process
(B) 3 (C) sentinel (D) variable (A) IFn1>n2THEN
(C) 4 Writen2
(D) variable ELSE
92. A program is to be developed to accept
(D) 5 TWO numbers and calculate the sum Write n1
87. Which of the following is NOT an and average. Each input value and (B) IF n1 < n2 THEN
83. The third column in a defining diagram activity undertaken during the initial each result should be accessible after Write n2
step of the problem solving process? the calculations. How many variables (C) IFn1>n2THEN
lists are needed? write n2
(A)problem partitioning (D) IF n1>n2THEN
(A)inputs. (A) 5 write n1
(B) algorithm development (B) 4
(B)processes. ELSE
(C) problem decomposition (C) 3 write n2
(C) outputs. (D) construct defining diagram (D) 2
(D) storage. 96. Which of the following statements
88. Which data type is MOST appropriate 93. Which algorithm will accept, add, then about flowcharts is UNTRUE?
for storing a value representing a calculate and output the mean of TWO
84. Which statement is used to determine numbers?
cardinal point on a compass? (A) More concise than pseudocode.
if the value of x is the same or less (A). sum = n1 + n2 (B) Gives a good view of the structure
than the value of y? read n1, n2 of the logic.
(A) character write sum (C) Logic easier to follow than that of
(B) integer write avg pseudocode.
(A) lfx<y (C) real (B). sum = n1 + n2 (D) Easier to visualize connections
(B) l f x< = y (D) string read n1, n2 between statements.
sum = n1 + n2
( C) lfx> y write avg
89. Which statement is true of algorithms? 97. In flowcharting, which basic operation
(D) lfx>=y (C). read n1, n2 is a diamond used to represent?
sum = n1 + n2
(A) Are always simple. avg = sum/2 (A) decision
(B) Must be documented. write avg (B) input/output
(C) May be expressed in various ways. (C) process/assignment
(D) Must be represented by pseudocode. (D) storage
98. Which of the following statements (C) Whatever operation is performed to 105. Which generation language presents 109. If the inputs and total are valid, what
about decisions is UNTRUE? the left of the equals sign results in natural language-like specifications of would be a likely source of error in
a value that is placed in a memory the problems to be solved and the
(A) Testing a value is also called the program if the average is incorrect?
location to the right of the equals sign. conditions to be met?
making a decision. (D) Assignment replaces whatever value
(B) In flowcharting, a diamond containing was originally in the memory location. (A) fifth (A) terminator
a question represents a decision. (B) fourth
(C) Some decisions evaluate to both (B) loop
(C) third (C) counter
yes and no.
(D) A decision may include a simple or (D) second
100. A trace table consists of (D) control variable
a compound condition. ________ as column
headings and________in 106. A program's output contained
99. Programs accept data as input, produce negative, instead of positive numbers. 110. If the inputs are valid and the total is
the cells, one row for each
output, and sometimes carry out pass. Which error caused this situation? ZERO, what would be a likely source
numerous assignment operations. Which of error?
of the following statements is UNTRUE? (A) syntax and run-time
(A) variables, identifiers
(B) identifiers, values (B) syntax
(A) Some programs use the equal (C) values, identifiers (C) logic (A) 'total' was not initialized
sign as a shorthand expression for (D) identifiers, variables (D) logic and run-time (B) the loop was not properly controlled
assignment statements. (C) the counter was not initialized
(B) Whatever operation is performed to 107. Which of the following items indicates a
the right of the equals sign results (D) control variable not at the right place
dry run?
in a value that is placed in a
memory location to the left of the (A) trace table 111. Which of the following statements
equals sign. (B) source code about instructions written in machine
(C) compilation report languages is UNTRUE?
(D) program flowchart
Program Implementation
(A) Each instruction defines a
108. Paul goes through his program and
TEST 6 particular machine operation.
uses print statements to output
values of all data variables because (B) Each instruction can be recognized
101. Which language is a high level language? he wants to know if the values are and executed without any
what they are supposed to be at intermediate translation.
(A) Machine code particular points in the program. (C) They make inefficient use of the CPU.
(B) Assembly (A) Machine code, Assembly What is this process called?
(D) They are difficult to read, write and
(C) C Language
(B) Pascal, Basic (A) stepping understand.
(D) Machine Language
(C) C.Pascal (B) tracing
102. Which language is a low level language? (D) Assembly, C (C) parsing 112. Which of the following statements
(D) compiling about high-level languages is UNTRUE?
104. Consider the programming statements:
(A) Machine code
i. Readln (n)
(B) Pascal QUESTIONS 109 -110 ARE BASED ON THE
ii. IDA Tot (A) Programs reflect the type of
(C) C FOLLOWING NARRATIVE:
iii. 00010000 0001. problems that are solved.
(D) BASIC
Which languages are represented? (B) Programs are machine specific.
Awhile loop is to be used to control the input
103. Which pair of languages represents of a series of numbers. The numbers are to (C) Source code requires translation.
(A) Assembly, Machine Code, C
ONE low-level language and ONE high- be added, then the average calculated. (D) Statements closely resemble English.
(B) Pascal, Assembly, Machine Code
level language?
(C) Pascal, C, Machine Code
(D) Machine Code, Pascal, BASIC
113. Consider the following Pascal code Program Implementation
segment. 117. A series of numbers must be input with
-999 as the terminator. Which condition 125. A program should be ----------- to
Line 1 var num1, num2, num3 :_________; in the while statement is correct? TEST 7 determine if it works properly.
Line 2 average:________;
(A) documented
Line 3 begin (A) <-999
121. Of which generation language is the (B) compiled
Line 4 average := (num1 + num2 + num3) /3 (B) >=-999 (C) encoded
(C) <=-999 given programming statement typical? (D) tested
What will the result of the compilation (D) <>-999
process be if all variables on line 1 are
List employee-name If Dept = "Sales" 126. Which statement will write a value
declared as integers. 118. A program must accept TWO numbers
(A) first from the keyboard into x, then
(0 through 10, inclusive). The sum and generate a value within the program
(A) The program will compile without error. average must be calculated and output. (B) second
and write it to y?
(B) The program will compile with an (C) fourth
What type of check is indicated by the
error at line 1. (D) fifth (A) readln(x);
(C) The program will compile with an test data (-2,12)?
readln(y);
error at line 2. (B) readln(x);
(D) The program will compile with an (A) type 122. Which are the first and second steps y := 34;
error at line 2. (B) range associated with implementing a program? (C) x:=34;
(C) inconsistency i. compile y := 43;
114. Which statements would result in a (D) reasonableness ii. execute (D) x:=34;
value being duplicated then doubled? readln(y);
iii. link
119. A program must accept TWO integers
(A) X := y (1 through 10, inclusive). Which sets 127. Which expression will accomplish the
z :=-x + y (A) i and ii following instructions? Accept
of test data will adequately test if
(B) X := y (B) i and iii THREE integers. Multiply the FIRST
appropriate range checks are in
z := z + y; place? (C) ii and iii by the SECOND to get the product.
(C X :=
y (D) iii and ii Find the sum of the SECOND and
) X := x*2; THIRD and subtract it from the
(D X := y; (A) 5,-8 0,14 -9,7 1,11 product. Store the result in 'answer'.
) z := x*y; (B) -5,8 0,4 -9,7 4,-2 123. Which are the last TWO steps
(C) 5,-8 0,1 -9,5 1,11 associated with implementing a program? (A) answer := n1 * n2 + n2 - n3
115. TEN scores are to input and printed. (D) 5,-8 -2,14 9,7 0,11 (B) answer := (n1 * n2 ) + (n2 - n3)
i. maintain
Which range in the for loop header is (C) answer ;= n1 * n2 -n2 - n3
ii. compile (D) answer := (n1 * n2 ) - (n2 + n3)
correct? 120. Consider the following: iii. link iv.
(A) 0 to 10 execute 128. A score is to be input and the grade
(B) O to 9 For count := 0 to 19 do determined. There are FIVE grade
(C) 1 to 11 <statement>; categories (A through E, inclusive).
(A) ii, iii
(D) -1 to 9 Which TWO structures may be used?
(B) III.! i. if-then
Which statement is needed in the loop to
116. Which is the correct condition for the search char jrray to locate and print 'A'? (C) ii, iv ii. if-then-else
if-then statement, if a mark must be (D) i, iv iii. while loop
tested for a 'pass', given that the pass iv. for loop
(A) lf char_array[0-19] = 'A'then
mark is 50? writeln(found); 124. WHILE, REPAEAT and FOR are all
(A) ii, iv
(B) If char_array[1-20] = 'A then examples of_________constructs.
(A) >=50
writeln(found); (B) I,ii
(B) <>50
(C) =50 (C) If char_array[count] = 'A then (A) array
(D) >50 writeln(found); (C) iii,iv
(B) conditional
(D) If char_array[count+1] = 'A then
(C) loop
writeln(found); (D) ii,iii
(D) sequential
129. Which set of loops may be used to 137. A range check is to be performed on an (A) i and ii
control the input of a list of scores by 133. Which statement will cause an array
integer (1 through 50, inclusive). Out- (B) iiand iii
using a terminator? to be declared to hold all the letters of of-range values must be rejected and (C) ivand v
i. for ii. the English alphabet, beginning at the the program loops until a valid value is (D) iii and vi
repeat iii. first index? entered. Which condition would
while accomplish the task? 139. Assume that n is an integer. If the
(A) AlphaArr: Array[1. .25] of integer; user were to enter: 60, -1,10 how
(A) i,ii (A) (n<1)AND(n>50) many times would the loop be
(B) i, iii (B) AlphaArr :Array[1..26] of char; executed?
(B) (n<1)OR(n>50)
(C) ii, iii (C) AlphaArr: Array[0..25] of char; (C) (n<=1)AND(n>=50)
(D) i, ii, iii (D) AlphaArr: Array[0. .25] of integer; (D) (n<=1)OR(n>(50) (A) 1
(B) 2
130. Consider the following: (C) 3
134. Which statement is needed to write
vowels to an array named vowels? QUESTIONS 138 -140 ARE BASED ON THE (D) 4
For count := 0 to 9 do FOLLOWING NARRATIVE:
Readln(int_array[<subscriptvalue>]); 140. Which set of test data will test the
for count := 0 to 4 do i. readln(n); entire code segment?
Which item is to be used as a subscript (A) Read(Vowels,count); ii. while(n<1)OR(n>50)do
in reading the TEN integers into (B) Read(Vowels[count]); iii. begin (A) 0,51,-12
int_array? iv. readln(n) (B) 19,51,2
(C) Read(Vowels);
(D) Read(Vowels{count});
v. end; (C) 0,51,14
(A) 0 (numbers are for references) (D) 0,51,62
(B) 10
(C) integers 135. Which code segment suggests that 138. Between which lines should a suitable
(D) count an array with all the letters of the message be placed to alert the user
alphabet will be traversed? that the input is rejected and should be
131. Consider the following: re-entered?
For count := 10 to 19 do (A) AlphaArr[0]:='A'
Readln(int_array[<subscriptvalue>]); AlphaArr[6]:='F
Program Implementation
AlphaArr[25]:='Z'
Which item is to be used as a subscript TEST 8 143. Which of the following languages are
(B) for count:= 1 to 25 do
in displaying the first element of classified as high-level languages?
int_array? Write(AlphaArr[count]);
(C) for count:= 0 to 25 do (A) PASCAL and C
141. Which are features of internal
(A) 1 Write(AlphaArr[count]); (B) Assembly Language and C
documentation?
(B) 0 (D) AlphaArr[6]:='G' (C) Machine and Assembly Languages
(C) 10 AlphaArr[7]:='H' (A) hardware and software specifications
(D) Machine Language and C
(D) count (B) loading instructions
AlphaArr[8]:=T 144. Which of the following activity is NOT a
(C) user requirements
132. Which condition will cause an array computer-based activity associated
(D) mnemonic names and comments
having TEN integers to be traversed 136. Which statement would locate 'M' in with program implementation?
from the highest to the lowest index? the array (AlphaArr), if present, during 142. What is the need for internal
a sequential search? (A) compilation
documentation after a program has
(A) 10 to1 (B) dry-running
been installed?
(B) 9 downto 0 (C) linking
(C) 10 downto 1 (A) if AlphaAnfcount] = 'M' (D) source code creation
(B) if AlphaArr[count] >W (A) linking
(D) 9 to 0 (B) testing
(C) ifAlphaArr[count] <> 'M' (C) maintenance
(D) if AlphaArr[count] >= 'M' (D) evaluation
145. Which of the following programming 151. Which data type should be used to (A) by outputting total immediately
156. Which is not a correct terminator for
related activity is manual? represent the number of iPods in below the formula statement
inputting numbers in the range 0-
stock? (B) by placing the total formula below
(A) compilation 1000
the loop
(B) dry-running (A) real
(A) -9 (C) by outputting total immediately
(C) linking (B) integer
(B) -99 above the formula statement
(D) source code creation (C) char
(C) -999 (D) by placing the total formula above
(D) literal
(D) 999 the loop
146. Which word indicates the declaration 152. Which values may be represented by
159. Consider the following: A program
of an alphabetic data type? the integer data type?
QUESTIONS 157 & 158 ARE BASED ON added THREE scores (expected
i. 2
THE FOLLOWING CODE SEGMENT: range, 1 through 10, inclusive) but
(A) integer ii. 45,000
returned an average which was higher
(B) character iii. -756
total :=1; than the range of the expected inputs.
(C) int iv. -43,0000
(D) char FOR c := 1 TO 5 DO
BEGIN Which condition would test if any
(A) ii, iii
READ(N); total := total + n; score(s) were too big?
147. Which value is to be represented by (B) i,iv
an integer variable? (C) ii, iv END; (numbers are for
references) (A) (mk1+mk2+m3)<>3
(D) i, iii
(B) (mk1+mk2+m3)<=30
(A) 0 (C) (mk1+mk2+m3) = 31
153. Which constant is most meaningful 157. Why will the total be inaccurate?
(B) 0.0
(D) (mk1+mk2+m3)>=3
(C) 1.0 for a program that accepts one mark
(A) the condition in the loop is flawed
(D) 2.0 each, for a class of FORTY students?
(B) total is incorrectly initialized 160. Which statement will check if inputs are
(A) ClassMark (C) total formula is incorrect NOT in the range of 1 through 10,
148. Which operator is used when
(B) StudentMark (D) there are syntax errors inclusive?
initializing a variable?
(C) ClassSize
158. How could it be detected during the (A) lf(n <1 )and(n>10 )
(A) : (D) StudentSize
1st cycle that total would be incorrect? (B) lf(n<=1)and(n>=10)
(B) -> (C) lf(n<=1)or(n>=10)
(C) = 154. Which set of variables is most
meaningful for a program that accepts (D ) l f(n<1)or (n >10)
(D) :=
scores for ONE student and outputs the
149. Which statement would accept TWO total and average of the scores?
values from the keyboard? Applications and Implications of ICT
(A) write (x,y); TEST 9 (A) firewall
(B) readln (x,y); (B) passwords
(A) TotalScore, AverageScore (C) encryption
(C) write (x&y); (B) Tot_Score, Avg_Score
(D) readln (x&y); 161. Which of the following measures is (D) biometric systems
(C) T_Score, A_Score NOT a physical access restriction?
(D) TotaISc, AverageScore
150. Which statement would display TWO
values on the monitor? (A) encryption 163. FTP, HTTP and VoIP are all.
155. Which range is needed in a statement (B) biometric systems
that declares a one-dimensional array (C) security guards (A) products
(A) writeln (x & y); to hold 10 integers?
(B) read (x&y); (D) virus protection (B) protocols
(C) readln (x,y); (C) processes
(A) [0..9] 162. Which of the following measures is a (D) proprietary data
(D) writeln (x,y); (B) [0..10] commonly used software access
(C) [1..9] restriction for a computer system
(D) [10..10] connected to a wide area network
such as the Internet?
164. A commercial bank based in Trinidad 173. Broadcast is to wireless as
has a network of automated banking 168.___________is the transmission and point-to-point is to_________.
machines (ABM) throughout the reception of data between locations.
Caribbean. Which pair of measures (A) broadband
will MOST LIKELY be used to secure (A) Broadcast (B) microwave
data as it travels between a local ABM (B) Data communications (C) satellite
and the host computer? (C) Uploading (D) wired media
(D) Downloading
(A) firewall and passwords 174. Akeem is the technical services
(B) encryption and firewall supervisor at a large educational
169. A computer network within a school institution and communicates with
(C) encryption and passwords campus that links all communications his technicians using two-way radios.
(D) virus protection and passwords devices may be BEST described as a What transmission mode does these
devices use?
165. A company's online payroll system was
hacked into and the pay level of a certain (A) campus area network (A) complex
employee changed from 3 to 4. Which of (B) local area network (B) duplex
the following statements is UNTRUE? (C) school area network (C) half-duplex
(D) wide area network (D) simplex
(A) If a firewall was installed the attack
could have been prevented. 170. Coaxial, fibre-optic and twisted-pair 175. The acronym URL stands for
(B) A password would protect the data .
are all types of_________.
better than a firewall could. (A) Uniform Resource Locator
(C) Physical access restrictions would (B) Universal Resource Locator
(A) transmission protocols
not have prevented the attack. (C) Unlimited Resources Linkage
(B) transmission media
(D) The integrity of the data has been (D) Uniform Resources Linkage
(C) communication modes
breached.
(D) networks 176. A school has employed a medical
166. All the following relate mainly to the doctor on a part-time basis and has
transmission of voice data EXCEPT 171. Which of the following items does given him a pager. A pager is an ex
NOT belong in the list below? ample of___________transmission.

(A) IRC (A) coaxial (A) complex


(B) podcasting (B) duplex
(C) telnet (C) half-duplex
(D) VoiP (D) simplex
177. Satellite, microwave and infra-red are
(B) duplex
167. The integrity of data can be all types of
(C) fibre-optic
compromised by_________.
(i) human error (D) twisted-pair (A) transmission protocols
(ii) natural disaster 172. Which of the following measures are (B) transmission media
TEST 10 Information Processing (C) communication modes
(ii) hardware failure unlikely to ensure business continuity
(iv) viruses, worms and Trojan horses after the passage of a natural disaster? (D) media types
(i) archiving (ii) firewall
(A) (i) and (ii) only 178. Which technology is utilized by Inter
(iii) back and recovery procedures (iv)
(B) (i) and (ii) only net hotspots?
fire/water proof cabinets
(C) (i) (ii) and (IN)
(A) Bluetooth
(D) All of the above (A) (i)only (B) satellite
(B) (ii) only (C) point-to-point
(C) (i)and(ii) (D) Wi-Fi
(D) (iv) only
179. Chantal maintains an online diary
s T Bank operates an electronic
. banking platform called NetBank.
C NetBank is an example of
h
a (A) an intranet
n (B) an extranet
t (C) a web server
a (D) a bulletin board
l
o
p
e
r
a
t
e
s
a
(C) Using computers to control
(A) sequences of operations without
blog human intervention.
(B) (D) Computers are not needed to
bulletin initiate or control any sequence of
board operations of a task.
(C)
181. Which is a tru statement about automation?
newsgroup
(D)
web site (A) Human intervention is needed to
control all sequences of operations
180. of a task.
R (B) Human intervention is not needed
B at any time in initiating or
T controlling sequences of operations.
182. What is process control? 186. Data is checked visually before being 190. What is the BEST description for the 194. Which statement about
stored at times. This is done in order process engaged in by two data entry a turnaround
(A) Using computers to control the to identify and correct typographical clerks entering the same data inde document is true?
operation of other devices. and transposition errors. What is the pendently to ensure correct data
(B) To monitor the operations of the name of this error checking method? entry? (A) Contains data that is to be
CPU while doing arithmetic used as
calculations. (A) validation (A) Range checking a source document for similar
(C) To control the processes of any (B) verification (B) Visual verification systems.
task that is given to the computer.
(C) typographical check (C) Reasonableness checking (B).An original source
(D) To schedule and load programs in
providing a continuous job sequence. (D) preliminary process check (D) Double entry verification document which
has to be adjusted then
183. What is information management? 187. Which of the following statements replicated
about information processing 191. Which of the following error refers to for other systems.
(A) To exercise control over the systems (IPS) is UNTRUE? typing a word with two letters switched? (C).Contains information from
operations of input and output one sys
devices in such a way that causes (A) All IPS automate existing manual (A) Syntax tern to be used be used as the
the user to see input/output as (B) Typographical source document for another
systems.
device independent. (C) Semantic system.
(B) An information retrieval and
(B) The responsibility of studying, (D) Transposition (D).Specially designed to
analyzing, and documenting the management system is a common accommodate
various functions of a data form of IPS. both source data and associated
192. TWO numbers were entered into the
processing department. (C) Libraries, banks and airlines rely on information.
computer and the total calculated and
(C) To organize the interrelated information retrieval and management displayed on the monitor. Which of
software and hardware systems for their day to day operations. the following statements is true? 195. Consider the following:
components that collect, process, (D) Information processing systems The code,
store and disseminate information. can take many forms depending on '34567890' was to be
(A) The displayed total is data and the
(D) The responsibility of monitoring, the environment in which they are input, but
controlling and coordinating the numbers are information.
deployed. (B) The displayed total is information '34657890' was input
various functions of a data instead.
processing department. and the numbers are also information.
188. What type of check is being employed (C) The displayed total is information Identify the error.
184. An input value has to be greater than by a utility company that compares the and the numbers are data.
18 and less than 65 if a driving license amount of electricity consumed by a (D) The displayed total is data and the (A) ommision
is to be approved for issue. What type customer during the current month numbers are also data. (B) adjacent
of input checking is appropriate? against their previous month's (C) insertion
consumption ? 193. A sorted list of names was entered (D) transposition
(A) Reasonableness check into the computer. Lists of the same
(B) Range check (A) range names (unchanged) were later printed 196. Which of the following
(C) Inconsistency check out for various individuals. Which of statements
(B) data type
(D) Data type check the following statements is true? is UNTRUE?
(C) reasonableness
185. What is data validation? (D) inconsistency A. The input value of 119 may
(A) The distributed lists are data
because no change was made to be
(A) Checking input data for errors 189. Typing 'two' instead of the numeral considered as both data and
'2' would be detected as an error by the names.
before processing. information.
(B) To check data on source document a(n)___________check. (B) The distributed lists are information
because they were output. B. Data must be processed in
before inputting. order to
(C) Checking outputs for errors before (C) The input lists are information be
(A) Inconsistency checks get information.
distributing. cause the names were sorted.
(B) Reasonableness checks (D) Both lists are information because C.Information must be
(D) To check that data is sorted before (C) Range checks meaningful.
processing. they are both understandable.
(D) Data type checks D.Data is always meaningful.

197. A bar-coded electricity bill


generated
by a light and power
company and
sent to a customer may be
regarded 198. d205. Y. h t n m M a i t w
as a document. (C) a (D) W h u b i com p n w (i) ip
(A) (A)
Valid or o e si (A) (A) bina a t o Sing a
(B)
(i) human-readable (ii) data d- f n note P tion g e li le- r
machine-readable (Hi) type w p g s s e. d n click a
source (iv) turnaround (B) (B) ra t r M (B) will (B)
A e ing g
rang m(C) p h e ic mast chan fo o s posi r
(A) (i)only e p(D) a e p r er ge ot n of tion a
(B) (ii)and(iii) (C) ut a o (C) the n e g s p
t
(C) (iii)only reas o f r s norm text ot - r the h
(D) All the above 202.
onab e insertion
m o a o al 'Shu h a s
lenes (A)
(B) at l t ft (D) ttle't in a p pointelat
s a(C) ic l i P o'SH cl l hi the e
slide
(D) F al o o o UTT u f c location
c
(D) show
incon ly w n w LE'? d s. of t
siste a
fl i e
208. e i s
203.
ncy he t
o n o r (A) s n 213.
g f P F3 a c curs h
w
199.
(A) (B) n W or, e
s o h
alidat (B) te i a i Alt + ot hi (ii) w
ion FS e Dou o
xt s n f c
chec (C) re ble- r
to d t, r h
ks Ctrl click d
th N o i fe o o
ensu + F3 ing c
e O c n re m f
re n T u w (D) n t l
h Shift c t h
TEST 11 I Word-processing, Presentation and Web Page Design a + F3 e h e
that e a m t m e f
211. ar ol
poor xt n e vi
e (A) k t lo
qualit li n
y w char a o w
n e t
data m acter n p in
e d ?
is not u (B) d g
w i
used h t s page n o st
(A)
to e i rag- t (C) ot f at
prod n n and- a para e e
uce th g drop p grap te e m
infor (C)D e (B) la h xt v e
matio c f ordwr c (D) . e n
n but ur e ap e word(C) B r ts
verific re a (C) h y y a
ation nt t ype- o 212. d b
does li u over l (A)A ef p o
not. n r mode d n a a u
(B) e e e endn ul g t
(D)
erific r ote t, e bl
is ext
ation f may h . o
fu u align
ensu o corre e (D) H c
ll. s ment
res r ctly a e k
that e
206. d 207. p appe d a o
data a ar er d p
enter g in te e e
ed W i W
hi n e the xt r r
into h
c n midd is s at
a e
u le of pr io
214. During the preparation of a document, (A) animation 224. Why is a spreadsheet seen as a table?
pressing Alt+5 (on the numeric (B) sound 229. . are pre-existing forms
keypad will_________. (C) timing (A) It processes lots of data.
that are pre-formatted and include
(D) transition (B) It captures and display data. standard text and formula.
(A) select a table. (C) It has cells (rows and columns).
(B) increase font size. 218. Which of the following is NOT a (D) It has space to handle calculations. (A)
(C) increase line spacing. consideration when planning a (B) Charts
(C Functions
(D) toggle sentence case. website? 225. A cell is a .that can hold Templates
)
or display data. Worksheets
215. In word-processing, Ctrl + J is the (A) which web browser is available
keyboard shortcut used to________ (B) layout of the web pages 230. Which definition of Value' is correct?
(A) combination of a column and a row
selected text. (C) reasons for the website (B) a rectangular area in the table (A) An entry in a cell.
(D) the intended audience where a column and a row intersect (B) The result of a calculation.
(A) align (C) a horizontal area in a table (C) An item on the formula bar.
(B) bold 219. A hyperlink may be created to (D) a vertical area in the table (D) An item of data that can be
(C) copy (i) another web page processed.
(D) delete (ii) a location within a web page 226. What is a worksheet?
(iii) an email address QUESTIONS 231 - 4 ARE BASED ON THE
216. In word-processing, primary document, (A) A line of cells (normally horizontal) FOLLOWING SPREADSHEET:
data files and field names are all terms (A) (i) and (ii) only with numerical related data.
used in carrying out_________. (B) (i) and (iii) only (B) The upper half of the rectangular area A
(C) (ii) and (iii) only B C D
in the table in which data is placed. 1 1 5
(A) a table sort (D) All the above (C) A range of vertical cells in the table in
2 2 9
(B) a mail merge which non-numeric data is placed.
3 4 7
(C) a default setting 220. All the following are useful actions that (D) The grid of rows and columns used
(D) an automatic backup will test a website EXCEPT_________. by a spreadsheet program. 4 6 8
5
217. Flying, drive-in and flash-once are all (A) use of a web browser 227. What is a function?
types of___________effects used in (B) verifying that all the hyperlinks 231. Which expression will determine the
the preparation of a slide using work correctly (A) A formula created by the user to number of numeric values in the
Microsoft PowerPoint. (C) make some last minute changes handle complex operations but has to range, B1:B4?
(D) use a test audience be used in absolute referencing, only. (A) =COUNTA(B1:B4)
(B) A predefined formula in the spread (B) =COUNTN(B1:F4)
sheet package that can
TEST 12 Spreadsheets automatically calculate results.
(C) =COUNTIF(B1:B4)
(D) =COUNT(B1:B4)
(C) An instruction to perform
221. Which of the following function is (iii) stock-keeping (iv) operations on numeric values 232. Which expression will compute the
NOT a feature of a spreadsheet? process control which are in given horizontal total of the values in cells B1, B2, B3
ranges, only. &B4?
(A) hold financial or accounting data (A) (i)and(ii) (D) A formula created by the user to
hanldle complex operations but has (A) =SUM(B1:B4)
(B) simulate a traditional physical B) (i) and (iii) (B) =SUM(B1+B4)
spreadsheet (C) (i),(ii)and(iii) to be used in relative referencing, (C) =SUM(B1_B4)
(C) capture, manipulate and display data (D) All the above only. (D) =SUM(B1-B4)
(D) perform advanced text processing
223. Which statement is true of a 228. D1:G6 is best described as a________ 233. What would the function,
spreadsheet package? =RANK(C3,C1:C4,1), return based on
222. For which of the following applications
is a spreadsheet ideally suited? (A) label the given list?
(A) Can be used a modelling tool.
(B) Cannot handle graphics. (B) formula
(i) loan calculations (ii) (C) range (A) 1
(C) Cannot handle data records. (B) 2
document processing (D) Does not have statistical functions. (D) value
(C) 3
(D) 4
234. What would the function, 250. Which statement correctly describes
237. The text 'Quarterly Sales' at the top of a
=VLOOKUP(2,B1 :C3,2,TRUE), return? 245. A student is an. in a secondary key?
column is best described as a _
(A) 5 relation to a school database. (A) Any key except the primary key
(B) 7 (A) label used in accessing a tuple in a table.
(B) formula (A) entity
(C) 8 (B) A key in a table that is duplicated to
(C) range (B) alternate key
(D) 9 (D) value identify a tuple in another table.
(C) individual (C) The key that is adjacent to the
235. What is meant by locking a column? 238. In the formula, =A5 + D$26, D$26 is (D) attribute primary key in a table.
best described as a________. (D) The duplicate of a primary key in
(A) To hide most of the contents of the 246. Which are entities of a patient data a table.
column. (A) function base in a doctor's office which has
(B) To protect the column by denying (B) absolute value one doctor? 251. Which item should be used as a
(C) mixed reference
access to it.
(D) relative reference (A) patient, doctor primary key in a student database?
(C) To prevent the column from (B) patient, visit
scrolling downwards. (A) first name
239. In the formula, =A5 + D$26, A5 is best (C) doctor, sickness
(B) identification number
(D) To keep the column stationary described as a________. (D) patient, office
while other sections may scroll. (C) last name
(A) function (D) age
247. Which statement correctly describes
236. If the actions in the scenario are (B) absolute value
'candidate key'?
successfully carried out, which (C) mixed reference 252. Which is ONE difference between a
expression would you see on the (D) relative reference (A) It uniquely identifies attributes in a table. tuple and an attribute?
formula bar if C6 is selected? (B) It is a combined key.
240. ###### is displayed in a cell when (A) A tuple is represented by data in
(C) It uniquely identifies rows in a table.
(A) =B$6*$A1 columns while the attribute is
(A) a negative date is entered in the cell (D) It can always be used as a
(B) =B6*$A1 represented by data in rows.
(B) a negative time is entered in the cell secondary key.
(C) =B6*A1 (B) A tuple is represented by data in
(C) the column is not wide enough rows while the attribute is
(D) =B6*$A$1
(D) all the above 248. Which statement correctly describes represented by data in columns.
an alternate key? (C) The tuple represents one item of
(A) Any key that may be joined to data on an entity while the attribute
Database Management another key in identifying a tuple in represents all items of data on an
entity.
TEST 13 (A) A collection of related data that
supports shared access.
a table.
(D) The tuple contains the secondary key
(B) Any of the set of attributes that may
(B) Supports shared access by be used as a key. while the attribute contains the
241. Which statement best describes a multiple users and programs. (C) Any key that uniquely identifies a primary key.
database? (C) Can be used to store data on any \
tuple in a table. 253. Which is ONE difference between the
related group of entities.
(D) Any of the set of keys that may be
(A) A collection of tables. (D) Cannot accommodate duplicated alphanumeric and numeric data types?
data items. used as a secondary key.
(B) Tables that are in sequence. (A) Alphanumeric represents
(C) Tables of related information.
244. Possibility High School maintains a 249. Which statement correctly describes quantities
(D) A collection of related tables.
database containing tables related to its a foreign key? unlike numeric, which represents
242. A database may be correctly students and the subjects offered. labels, only.
Which of the following represents a (A) A key for which a matching primary (B) Alphanumeric represents labels
described as a
table within the database? key column is found in all other and quantities unlike numeric,
(A) collection of related data on an entity. tables of the database. which represents labels, only.
(B) flexible data file. (A) a student's name (B) A key in a table that is duplicated to (C) Alphanumeric does not
(C) repository of information. (B) a student's record identify a tuple in another table. represent
(D) collection of entities. (C) all the personal data on students (C) A field in a relational table that quantities unlike numeric,
(D) the age of a student matches the primary key column of which
243. Which statement about 'database' is another table. represents quantities.
INCORRECT? (D) A key that is replicated throughout (D) Alphanumeric represents labels
all tables in a database. un
like numeric, which represents
quantities, only
254. Which statement indicates a limitation
of databases? 257. CCB will now be able to.
TEST 14 I Fundamentals of Hardware and Software
the data. 261.The following are typical components of 264.State ONE similarity and ONE
(A) Multiple views of data are not a typical microcomputer: difference between EACH of the
allowed. (A) enter following pairs of memory devices:
(B) High volumes of data cannot be (A) Central Processing Unit [1]
handled. (B) process
(C) There are security concerns. (C) query (B) Random Access Memory (RAM) [1] (a)ROM and RAM [1]
(D) Queries are not allowed. (D) standardize (C) Hard Disk [1] (b) ROM and EPROM[1]
(D) CD-ROM Drive [1] (c)PROM and EPROM[1]
258. CCB will now be able to (E) Modem [1]
QUESTIONS 255-258 ARE BASED ON THE
FOLLOWING NARRATIVE: (A) enter data much faster. State the function of EACH of the items QUESTIONS 265 - 267 ARE BASED ON THE
(B) prepare reports more efficiently. above. NARRATIVE BELOW.
Caribbean Commercial Bank (CC(B) (C) store an unlimited amount of data.
stopped using tables to store data for each (D) prevent data entry errors. 262.Name the hardware component of a You recently purchased a computer that
department and started using a database to 259. If a record has FOUR fields, how computer system that performs EACH came with 2 GB of non-ECC single channel
serve the entire organization. many are potential secondary keys? of the following functions: 800MHz DDR2 SDRAM.
255. Which statement is true? (A) Performs the logical operations
(A) 1 265.Name the component described in the
(A) Data entry should be more tedious. (B) 2 within the CPU [1] narrative above. [1]
(B) Information will be more efficiently (C) 3 (B) Stores program and data that are
retrieved. (D) 4 not currently being used by the 266.What is the capacity of the device de
(C) Information retrieval will be more CPU[1] scribed in the narrative above? [1]
tedious. 260. A composite key is used when (C) Stores programs and data that are
(D) There will be no errors in the data currently being used by the CPU [1] 267.What is the speed of the device
store. (D) Stores instructions that are used described in the narrative above? [1]
(A) more than one key is needed to during the boot-up process [1]
256. Which statement is false? identify a record. (E) Directs internal operation within the
(B) it is difficult to identify a primary key. CPU [1] QUESTIONS 268 - 271 ARE BASED ON THE
(A) Less queries will be allowed.
(B) Queries will be more efficient. (C) more than two keys are needed to NARRATIVE BELOW.
identify a record. 263.A computer system consists of several
(C) There will be more security
(D) it is difficult to identify a secondary hardware devices and software Secondary storage media store data using
concerns.
(D) There will be less data redundancy. key. components. The keyboard, mouse and magnetic, optical or flash memory
printer are all peripheral devices technology.
connected to the systems unit. The
system unit comprises a central 268.Name ONE secondary storage device
processing unit (CPU) and a that stores data using optical
component, (A), that holds the data and technology. [1]
programs that are currently being used.
The CPU in turn, consists of two 269.Name ONE secondary storage device
components. One component, (B), that stores data using magnetic
directs the internal operations within technology. [1]
the CPU; and the other component (C)
is responsible for the manipulation of 270.Name ONE secondary storage device
the data. In addition, there is another that stores data using flash memory
storage component, (D), which stores technology. [1]
data and programs that are not
currently being used by the CPU. 271.State ONE difference between an
optical medium and a magnetic
Name the components (A- D) referred medium. [1]
to in the passage above. [4]
TEST 15 Fundamentals of Hardware and Software
286. Suggest ONE application of a voice An increasing number of educational
QUESTIONS 272-274 ARE BASED ON THE
QUESTIONS 276 - 278 ARE BASED ON THE response unit. [1] institutions have adopted OMR technology
FOLLOWING NARRATIVE.
FOLLOWING NARRATIVE: to accelerate the processing of registration
forms for examinations, college
Most new desktop computers being sold QUESTIONS 287-9 ARE BASED ON THE applications and other similar situations.
Optical discs are commonly used as a
today are equipped with a DVD-burner. medium for the distribution of software. NARRATIVE BELOW.
290. What is meant by the abbreviation
272. Expand the acronym DVD. [1] 276. Suggest TWO reasons for their A bar code reader is a type of device that OMR? [1]
popularity. [2] accepts data in machine-readable form.
273. State ONE similarity and ONE 291. State TWO OTHER applications of
difference between a CD and a DVD. [2] 277. Name TWO types of optical discs that 287. What is a bar code? [1] OMR technology. [2]
may be used in the manner
described. [2] 287. What technology is utilised by bar 292. How does the application of OMR
274. Suggest ONE use for which a
code readers to sense their input? [1] technology impact in the manner
DVD-ROM is more suitable than a
278. List TWO advantages of optical discs mentioned above? [1]
CD-ROM. [1] for long-term storage of data as 288. State TWO ways in which a bar code
compared to using the computer's can be used in a warehouse. [2]
275. State ONE similarity and ONE main memory. [2]
difference between EACH of the
following pairs of secondary storage 279. Tape storage involves 'serial access'. TEST 17 Fundamentals of Hardware and Software
media: Briefly explain the meaning of the
term 'serial access', highlighting any QUESTIONS 293 - 294 ARE BASED ON THE Printers, plotters and speakers are all
disadvantage that this kind of access FOLLOWING NARRATIVE. types of output devices.
(a) magnetic tape and magnetic hard
may have. [2]
disk [2] A computer system is advertised as having 295. Name ONE type of output device not
(b) optical disc and magnetic disk [2] 280. With reference to a hard disk, explain the following software installed: mentioned in the narrative above. [1]
(c) hard disk and floppy disk [2] how a fixed-head system can reduce
(i) Microsoft Word 296. Name TWO types of non-impact
the access time for the device. [2]
(ii) Microsoft Internet Explorer printers.[2]
281. A hard disk system has six disk (iii) Microsoft Works
surfaces, with one moving head for (iv) Windows Vista. 297. State the type of printer most suited
determine the total amount of storage
to printing multiple copies of a
document on carbonised forms. [2]
TEST 16 Fundamentals of Hardware and Software 293. Which of the software advertised may
be referred to as:
each surface. A certain track has ten on the disk expressed in megabytes. 298. Exactly how many megabytes bytes
sectors forming a ring, each sector Show all working. [2] of data can be held on a DVD if it has
(a) an operating system [1]
carrying 1/2 K-byte. How many a capacity of 4.7GB? [2]
(b) special-purpose software [1]
283. Light pens are increasingly used as
(c) integrated software [1] 299. Express the following base ten values
(a) bytes are there in each % K-byte an input device in a variety of
sector? [2] application areas. State TWO as Binary Coded Decimals:
(b) K-bytes are there in the entire similarities between the use of a light 294. Suggest with reasons whether
cylinder? [2] pen and a mouse. [2] Microsoft Word is a custom-written, (a) 135 [1]
customised or general-purpose (b) NEGATIVE 68 [1]
282. A certain secondary storage media 284. Explain the operation of a voice software. [2]
has two sides, each with 80 rings or response unit. [2] 300. Represent the base 10 value
tracks. Each sector has 512 bytes of NEGATIVE 27 as
storage and there are 18 sectors in a 285. Suggest ONE reason why a light pen QUESTIONS 295 - 297 ARE BASED ON THE
track. Perform computations to may be preferred over a mouse by FOLLOWING NARRATIVE. (a) a two's complement value. [2]
many users. [1] (b) a sign and magnitude value. [2]
(c) a binary coded decimal. [2]
TEST 18 Problem-solving and Program Design
318. Identify the values that are to be total =0
QUESTIONS 307 - 309 ARE BASED ON THE represented by literals. [2] For c = 1 to 5
FOLLOWING NARRATIVE: readx
QUESTIONS 301 - 303 ARE BASED ON THE total = total + x
319. If a single-digit code is to be used to
FOLLOWING NARRATIVE: Consider the following: A program is supposed EndFor
indicate that the item is imported,
to calculate the simple interest on a loan which data type is required? [1]
The computer is to be used to create an principal, given the principal and the interest Test Data: 12,4,3,2, 5
individual report for a student. The rate. The output must show the principal, interest 320. At which level of details will the
student's name, the name and final mark rate and interest. 324. How many different totals are
report items be spelt out? [1]
for each of the four subjects must be generated? [1]
entered and the average mark is to be 307. What is the top level in the required
calculated. The student's name, the names program design for this problem? [1] 325. What is supposed to be the new total
QUESTIONS 321 - 323 ARE BASED ON THE
of the subjects and the marks, along with after 'C' becomes 3? [1]
FOLLOWING NARRATIVE:
the average must be output. 308. How many tasks are at the first level
of details? [1] A program is needed to convert minutes to 326. Construct a trace table for the
301. Identify the inputs. [3] algorithm. [5]
hours and minutes.
309. Identify Any TWO tasks at the first
302. Identify any TWO values that must be level of details. [2] QUESTIONS 327- 328 ARE BASED ON THE
321. Identify the necessary input(s). [1]
stored. [2] FOLLOWING NARRATIVE:
322. Identify the process. [1]
303. State the purposes of the required QUESTIONS 310- 312 ARE BASED ON THE A teacher gave two assignments: First,
processing operations. [2] FOLLOWING NARRATIVE: input a number and calculate its square.
323. What will be the contents of the
output? [2] Second, find the bigger of two numbers,
The computer is to be used to create an in- assuming that they are unequal.
QUESTIONS 304- 306 ARE BASED ON THE dividual report for a student. The final mark
FOLLOWING NARRATIVE: (0 through 100, inclusive) of each of the 327. Write the pseudocode algorithm for
QUESTIONS 324 - 326 ARE BASED ON THE
FOUR subjects and the average must be FOLLOWING NARRATIVE: the second assignment. [4]
Programmers perform more effectively and displayed.
efficiently when they follow the steps that 328. Write the pseudocode algorithm for
Consider the following algorithm, which is
are associated with problem solving. 310. Identify THREE tasks at the first level the first assignment. [2]
supposed to accept and sum five values:
of details. [3]
304. Outline the activities of the problem
definition step. [2] 311. State the purposes of TWO basic
modules. [2] Program Implementation
305. Describe the step, 'propose and
evaluate solutions'. [2]
V. TEST 20 332. Identify the references that are made
312. State THREE items of output that may to high-level languages? [2]
be generated. [3]
306. Outline the activities involved in 333. Identify the language that uses binary
developing and representing QUESTIONS 331 - 335 ARE BASED ON THE code to express the instructions. [1]
algorithms. [2] 316. Identify the values that are to be FOLLOWING NARRATIVE:
represented by the integer data type. [2] 334. Identify the language that uses
Consider the following extract from a lec- mnemonics to express the
Problem-solving and Program Design ture: For a certain language, the instruc- instructions. [1]
tions are written using binary codes and
TEST 19 317. Identify the values that are to be
for another, the instructions are written 335. Name TWO languages that use
represented by the real data type. [2]
using mnemonics. These are not as popu- English-like statements to express
QUESTIONS 316 - 320 ARE BASED ON THE lar as they are rather difficult to learn and the instructions. [2]
FOLLOWING NARRATIVE: use. For the popular ones, the instructions
are written using English-like statements.
A program is to accept data on a particular
product for sale: description, code, 331. Identify the references that are made
quantity in stock, unit price, current stock to low-level languages? [2]
value and re-order level.
QUESTIONS 336 - 338 ARE BASED ON THE 339. Explain testing in relation to Consider the problem statement: Accept
FOLLOWING NARRATIVE: programming. [2] and sum the English, Math and IT marks (0 Three scores (0 through 10, inclusive) must
through 100, inclusive) of a student. Output be input. The total and average must be
There is a sequence of steps that are 340. Explain 'syntax errors'. [1] the subject marks and the total mark calculated separately and then displayed.
associated with the implementation of a followed by the average mark. The average must be rounded. (E.g. 6.4
program. 341. Explain 'debugging'. [1] becomes 6, and 6.5 becomes 7). If the
352. Suggest names for TWO variables average is over seven, a congratulatory
336. List the first TWO steps. [2] 342. Explain 'logic' errors. [2] that would enhance internal message must be displayed.
documentation. [2]
337. List the last TWO steps. [2] 354. Identify TWO sets of test data to
QUESTIONS 343 - 344 ARE BASED ON THE 353. Suggest TWO comments that would determine if the program would
336. List the step(s) between the first two FOLLOWING NARRATIVE: enhance internal documentation of accept out of range numbers. [2]
and the last two. [1] the program. [2]
Computer languages may be classified in 355. Identify TWO sets of test data to
different ways. One such classification is determine if the rounding function
Questions 339 - 342 are based on by generations. This has to do with the QUESTIONS 354 - 356 ARE BASED ON THE works correctly. [2]
the following narrative: period in which they were developed. FOLLOWING NARRATIVE:
356. Describe alternative checks that
There are various terms and concepts that 343. Describe TWO major characteristics could be used to prevent a total of
are commonly used in programming. A of first generation language (1GL), [4] ZERO from being divided. [4]
knowledge and understanding of these are
essential to programmers. 344. State TWO major characteristics of Application and Implications of ICT
second-generation language (2GL). [2]
TEST 22
TEST 21 357. State an information technology The company maintains a web site and
members of staff use a web browser to
Program Implementation application that would be best suited
for making a bank deposit without access web pages and other Internet-
QUESTIONS 349 - 351 ARE BASED ON THE handling cash or cheques. [1] based resources. The staff also maintains
FOLLOWING NARRATIVE: a list of all URL's that are frequently used.
QUESTIONS 346 - 348 ARE BASED ON THE 358. State an information technology
Documentation of programs is seen as application that would enable you to 360. State ONE way in which an intranet
FOLLOWING NARRATIVE:
being so important, that systems, which are pay for goods or services from a could be used in the organization. [1]
not properly documented, are no longer remote location. [1]
Computer languages may be classified in
appreciated in the business world. 361. State TWO ways in which the Internet
different ways. One such classification is
359. State an IT application that would be could be beneficial to the organization. [2]
by generations. This has to do with the pe- <i

riod in which they were developed.' 349. Differentiate between internal and useful in EACH of the following areas:
external documentation. [2] 362. Differentiate between web page and
346. Explain a major difference between (a) Managing the inventory in a store [1] website. [1]
third generation languages (3GL) and 350. State TWO reasons for documenting (b) Editing scanned pictures [1]
fifth generation languages (5GL). [2] programs. [2] (c) Watching movies [1] 360. State the purpose of the browser. [1]

347. State TWO reasons for the popular 351. State THREE elements of internal 361. What is an URL? [1]
use of fourth generation languages documentation. [3] QUESTIONS 360 - 364 ARE BASED ON THE
(4GL) in developing business FOLLOWING NARRATIVE: 363. State the meaning of EACH of the
systems. [2] following terms:
QUESTIONS 352 - 353 ARE BASED ON THE
348. State ONE difference and ONE FOLLOWING NARRATIVE: Modern Bankers, a commercial banking (a) IRC[1]
similarity between fourth generation organization, has 20 branches across the (b) HTTP[1]
languages (4GL) and FIFTH island. The computers are all connected to (c) WWW[1]
generation languages (5GL). [2] the Internet and they also have an intranet. (d) FTP[1]
366. State ONE use each of the following
items associated with the Internet and
374. Networks are popular in private and
public organizations. They enhance
Information Processing
computer networks. the data processing tasks in these
organization to a great extent. 367. State ONE difference and ONE TEST 24
similarity between IRC and instant
Describe EACH of the following networks: messaging. [2]

(a) LAN [2] QUESTIONS 378 - 380 ARE BASED ON THE


368. State TWO advantages of multimedia
(b) WAN [2] FOLLOWING NARRATIVE:
chat over IRC. [2]
(c) Internet [2]
Four persons went into a newly occupied
369. State TWO pieces of equipment necessary
housing scheme. They asked the residents
to facilitate multimedia chat. [2]
many questions about fruit drinks. The
responses were written down and
370. Many jobs are now available in the
forwarded to the fruit juice company which
field of computing. Included are
had contracted them. Three weeks later the
systems analysts, programmers,
juice company began selling some of the
network administrators and
same juices the residents spoke about in
webmasters. State ONE major
the community.
function of each of these personnel. [4]

Application and Implications of ICT 378. Which word in the narrative implied
375. Networks utilize various types of that data was given? [1]
wired and wireless transmission
(a) HTML[1] 379. Who used the information that was
media including fiber-optic, twisted
(b) IRC[1] derived from the data? [1]
pair, satellite and infrared.
(c) E-mail [1]
Describe EACH of the media stated above, 380. Explain how a turnaround document
saying whether the media is wired or wire- could emerge. [2]
QUESTIONS 367 - 369 ARE BASED ON THE
less. [4 x 2]
FOLLOWING NARRATIVE:
376. Define the following terms which are QUESTIONS 381 - 384 ARE BASED ON THE
Many students spend a lot of time FOLLOWING NARRATIVE:
related to network technology and
engaging in IRC, instant messaging and
communication modes:
multimedia chat. Information systems have brought about
(a) Bluetooth [1] major changes in organizing and managing
(b) hotspot[1] business enterprises. These involve
(c) voiceband [1] automation, process control, scientific and
TEST 23 (d) duplex [1] commercial data processing.

377. Define the following terms which are 381. Describe'automation'. [2]
QUESTIONS 371 - 373 ARE BASED ON THE related to data security and
FOLLOWING NARRATIVE. information misuse: 382. Describe ONE service that is offered
through commercial systems. [2]
Many companies now communicate and (a) encryption [1]
transact business using e-mail, FTP and (b) firewall [1] 383. State ONE characteristic of process
e-commerce. (c) propriety data [1] control systems. [1]
(d) propaganda [1]
371. State ONE difference and ONE (e) electronic eavesdropping [1] 384. State one characteristic of scientific
similarity between e-mail and data processing. [1]
e-commerce. [2]

372. State TWO advantages of e-mail over QUESTIONS 385 - 388 ARE BASED ON
traditional mail. [2] THE FOLLOWING NARRATIVE:

373. State TWO ways in which e-mail can


facilitate e-commerce. [2]
A personal database is to be established check could be applied. [4] A program was written to generate a test 389. What information is needed in the
for first form students in a Caribbean high report. The report showed: problem statement to allow for a
school. Data to be stored include name, 387. Suggest at least TWO range check on marks? [1]
gender, date of birth, year of entry to inconsistencies number of students student
school, age upon entering the school and that could be present. [2] identification numbers 390. A score for a particular student was
height. individual student scores seen as reasonable but was incorrect.
388. Differentiate between validation and the mean score Describe TWO possible causes of
385. Select ONE data item to which a verification. [2] such a situation. [2]
range check could be applied and The scores were copied from the teacher's
state ONE reason for your choice. [2] register and entered at the keyboard 391. State TWO possible reasons for an
QUESTIONS 389 - 391 ARE BASED ON interactively. out-of-range mean. [2]
386. Select TWO data items, stating THE FOLLOWING NARRATIVE:
reasons, to which reasonableness
TEST 25 Information Processing TEST 26 Word Processing
QUESTIONS 393 - 396 ARE BASED ON THE which TWO file organizations
FOLLOWING NARRATIVE: methods may be used. Give ONE 405. The third line of your document 411. Before printing, how could you
contains the word 'Kingston'. List ensure that the printed page will be
valid reason for EACH file
TWO ways to replace 'Kingston' with properly formatted? [1]
There are various methods of file organization chosen. [4] 'Portland'. [2]
organization which include sequential, 412. How would you make your document
indexed-sequential, and random and also 400. The secretary wants to find out if a 406. How would you interchange the have 2 columns on each page? [1]
various access methods. specific member had paid, without second and fifth paragraphs in your
having to view all records. State document of seven paragraphs? [2] 413. List the TWO settings that are
393. Explain 'sequential field ordering' in which file organization method is associated if TWO columns are to be
407. What is the difference between fully used in your document. [2]
relation to data files. [2] most inappropriate. Give ONE valid
justified text and right justified text? [1]
reason for the file organization
414. List any TWO options that are avail
393. What is a random file? [1] specified. [2] 408. A document has 12 paragraphs on able under PRINT RANGE when
page 3. What is the most efficient way printing your document? [2]
394. Briefly describe an index-sequential 401. If a decision had been made that to make paragraphs 7 -12 as page 4
file. [2] whenever the file was opened, all of your document? [1] 415. List any TWO options within the
records were to be viewed, state SPELLING AND GRAMMAR function
394. What is a direct access file? [1] 409. How would you set the left margin as that will enable you to efficiently
which file organization(s) would be
1.5" and the right margin as 0.5"? [1] make spelling corrections. [2]
most appropriate. Give ONE valid
reason for EACH organization(s) 410. How would you insert the page
QUESTIONS 397 - 402 ARE BASED ON THE specified. [2] number automatically at the top right
FOLLOWING NARRATIVE: of EACH page of the document? [1]
402. If a decision had been made that
The science club is planning an excursion. whenever the file was opened, all
The secretary wants each member of the records were to be viewed, state TEST 27 Word Processing
club to register early for the excursion and which file organization(s) would be
pay the associated costs in full (one most inappropriate. Give ONE valid 420. The word 'CRISIS is to have a
payment only). The computer will be used reason for EACH organization(s) QUESTIONS 416 - 423 ARE BASED ON THE blinking background for emphasis.
to create and maintain a file for the specified. [4] FOLLOWING NARRATIVE: How would you make this happen? [1]
registration process.
403. From a programming perspective, 421. The word 'ECONOMIC' is to be
397. If the order in which the payments state which of the file organizations The heading of your document is altered
were made is important, state which THE ECONOMIC CRISIS to appear as 'E C 0 N 0 MIC S'. The
that have been specified is the
TWO file organizations may be used. [2] adjustment must be done efficiently.
simplest to implement. State ONE State the menu(s), option(s) and likely
416. How would you remove the
valid reason for your response. [2] setting(s) that are required. [3]
underline? [1]
398. If the order of payment is important,
state ONE file organization method 404. Which of the file organizations that 422. A relevant picture is required to be
417. How can you determine the font size
that would be inappropriate. Give have been specified uses up most of the heading? [1] pasted immediately beneath the
ONE valid reason to your answer. [2] memory on the storage medium that heading. Explain how this could be
418. List TWO formatting features used done. [2]
is used. [1]
399. The secretary wants to find out if a beside underlining and bolding. [1]
423. State any TWO likely sources of the
specific member had paid, without
419. How would you colour the second picture. [1]
having to view all records. State
word?[1]
Spreadsheet TEST 29 Spreadsheet
s s
TEST 28
QUESTIONS 424 - 434 ARE BASED ON THE 439. A blank row is needed between the
following criterion: If total price is 51 to 61? [1]
FOLLOWING SPREADSHEET:
A B C D E
>= 2000 the discount rate is 10 %, column headers and the first line of
1 B Sales Invoice
2 data. How may this be efficiently
3 Quantity Item Unit cost
Price
Total Cost Price 10 % discount
otherwise it is 5%. What is the 444. State the formula to be used to
4
5
12
50
Pencil Case
Pen
145
20
done? [2]
6 10 White board eraser 50 required formula for cell E4? [2] compute the number of campers
7 10 CD pack 250
8 25 Flash drive 850
from St. Andrew for the period, 2005 -
9 6 Cleaning kit 1500 440. The empty row between total sales
10 5 Printer paper pack 200
11
432. Write formulae which are needed in and the last record must be removed. 2009. [1]
12 Total Sales:
13
14
Total Discount:
Total Payment: cells E12.E13 and E14. [3] How is this done? [1]
15
445. How would you left align the data in
D1:D6? [1]
433. Which function may be used to
QUESTIONS 440 - 449 ARE BASED ON THE
424. All of the numeric values in column determine the number of values in
FOLLOWING NARRATIVE:
A must be centred. How can this be column C? [1]
446. Explain how you would format the
efficiently done? [2]
The number of campers from the value in F7 so that thousands are
434. Which function may be used to
participating parishes in the national summer separated by commas and ensure
425. How many records are displayed on
determine which total cost price is that there are no decimal places. [2]
the spreadsheet? [1] camp are shown in the spreadsheet.
associated with the unit cost price
A B C D E F G
426. How many labels are displayed in of 145? [1] 447. The formula "=C3/$C$8" was
1 Parish 2005 2006 2007 2008 2009
2 Portland 40 38 52 50 200
row 3? [1] 3 Kingston 80 75 85 90 350 inserted in a cell. What is the
4 St. Andrew 120 125 104 130 300
435. Which function may be used to 5 St. Catherine 65 78 55 59 150 purpose of $C$8 in the formula? [1]
6 Clarendon 43 51 44 48 100
427. What is the range address of determine the average unit quantity? 7
8 Total:
the items listed? [1] [1] 448. The formula in cell C7 was copied
440. State the range that contains the to the range D7:F7. The values in
428. '10'and '%'must be removed from
436. Which function may be used to name of the various parishes which the range D7:F7 were checked and
the label in E3. How may this be
determine the highest unit cost are represented by the campers. [1] found to be correct. Why did this
done? [2]
price? [1] occur? [1]
441. Suggest a suitable heading for
429. A formula is needed in cell D4 to
437.The '$' sign is to be affixed to the column G. [1] 449. The function "=SUM(C1:C6) was
derive the Total Cost Price. Write
entered in cell B7. The value in C4
the value that represents total
formula. [1] 442. What may be done to have a title at was changed and it was observed
payment along with 2 decimal
the top of the spreadsheet and a blank that the value in C7 changed. Why
places. How may this be done? [2]
430. Copy the formula in D4 and derive row above the records? [1] did this occur? [1]
the results for D5-D10. [2]
438. What expression should appear in
431. The discount for each cell, E4 -E10 443. How would you change the number of
the formula bar if cell D5 is
must be worked out based on the campers from Clarendon in 2006 from
highlighted? [2]
TEST 30 DATABASE MANAGEMENT 453. State one reason for using a form to
A church is concerned about its inability to input data into your table. [1]
provide statistics on its members. It would like to
have ready information on the date of birth and 454.Name ONE other method that may be
address of each member, the number of males and
used to populate a table with data. [1]
females and the number of adults (18 years and
over). A database was created and an input form
generated.
455.The database designer is reconsidering the
design of the database. He is now looking at
issues involving candidate and primary keys.

(A) How many of the fields in the table


may be classified as candidatekeys? [1]
(B) What is a primary key? [1]
(C) Suggest a primary key. [1]

456. Write a query to show the names of all males. [1]


450.State TWO methods by which the form pictured
above could have been generated.[2]
457. Write a query to show the names of all members
who are adults. [1]
451.For ANY ONE of the methods stated
above, list the steps that must be 458. How would you print the records for
carried out to create the form shown. all those who are members of the Sunday School? [2]
[2]

452.State the data type of EACH field shown on the


form. [3]
SUGGESTED RESPONSES: TESTS 1 - 13
Test 9 Test 10 Test 11 Test 12 Test 13
Testl Test 2 Tests Test 4 Tests Test 6 Test7 Tests
161. D 181. C 201. A 221. D 241. D
1.B 21. C 41. A 61. D 81. D 101. C 121. C 141. D
162. A 182. A 202. B 222. B 242. C
2. D 22. D 42. D 62. C 82. B 102. D 122. A 142. C
163. B 183. D 203. D 223. A 243. D
3.C 23. C 43. D 63. D 83. C 103. D 123. D 143. A
164. B 184. B 204. D 224. C 244. C
4.C 24. A 44. C 64. C 84. B 104. B 124.C 144. B
165. B 185. A 205. D 225. B 245. A
5. C 25. C 45. C 65. C 85. A 105. A 125. D 145. B
166. A 186. B 206. D 226. D 246. B
6. A 26. D 46. B 66. B 86. D 106. C 126. B 146. D
167. D 187. A 207. B 227. B 247. C
7. B 27. D 47. D 67. D 87. B 107. A 127. D 147. A
168.B 188. C 208. B 228. C 248. D
8.C 28. D 48. A 68. A 88. A 108. B 128. B 148. D
169. B 189. D 209. D 229. C 249. C
9. C 29. B 49. C 69. A 89. C 109. C 129. C 149. B
170. B 190. D 210. D 230. D 250. A
10. C 30. B 50. B 70. C 90. D 110. A 130. D 150. D
171. B 191. D 211. B 231. D 251. B
11. D 31. D 51. B 71. A 91. C 111. C 131. C 151. B
172.C 192.C 212. D 232. A 252. B
12. C 32. B 52. A 72. D 92. B 112. B 132. B 152. D
173. D 193. B 213. D 233. C 253. C
13. B 33. C 53. C 73. B 93. C 113. C 133. C 153.C
174. C 194. C 214. B 234. D 254. C
14. B 34. B 54. (T 74. D 94. C 114. C 134. B 154. A
\ 175. A 195. D 215. A 235. D 255. B
15. D 35. B 55. D 75. C 95. D 115. B 135.C 155. A
176. D 196. A 216. B 236. D 256. A
16.A 36. B 56. B 76. B 96. A 116.A 136. A 156. D
177. C 197. D 217.A 237. A 257. D
17. D 37. C 57. C 77. B 97. C 117. D 137. B 157. B
178. D 198. B 218.A 238. C 258. B
18. B 38. B 58. D 78. B 98. C 118. B 138. B 158. A
179. A 199. D 219. D 239. D 259. C
19. A 39. D 59. A 79. B 99. C 119. D 139. D 159. B
180. B 200. D 220. C 240. D 260. A
20. A 40. D 60. B 80. D 100. B 120.C 140. C 160. D
PRACTICE EXAM - PAPER 2
INFORMATION TECHNOLOGY
Paper 02 - General Proficiency 2 hours 15 minutes
SPECIMEN EXAMINATION

INSTRUCTIONS TO CANDIDATES
This paper consists of THREE sections and a total of TWELVE questions.
Candidates MUST answer ALL questions in all THREE sections.
Number EACH question correctly on your answer sheet.
Code is to be written in the programming language, Pascal.

SECTION I
THEORY-60 marks
Answer ALL questions.

1) Figure 1 below shows a typical computer system. Study Figure 1 and answer the questions that follow.

a). Name the components identified by the letters A, B and C.


b). What is the function of the device labeled
i) A (1 mark)
ii) D (1 mark)
iii) E (1 mark)
c) Write the letters that identify ALL the peripheral devices. (3 marks)
d) State ONE similarity and ONE difference between the components labeled C & D. (2 marks)
e) What is the general name given to the collection of components in Figure 1 ? (1 mark)
Total 10 marks

2) The LITTLE BYTE computer system uses a one-byte word and stores data in a binary format using two's complement.
a). Differentiate between a 'bit', a 'byte' and a 'word'. (3 marks)
b). What is the wordsize of the LITTLE BYTE computer system? (1 mark)
c). What is binary? (1 mark)
d). Name ONE other format used to represent computer data. (1 mark}
e). Using two-complement arithmetic, perform the following computations:
i) 11001111 + 1110001 (2 Marks)
ii) 55 MINUS 17 (2 Marks)
Total 10 marks

3) A student recently purchased a 4 GB flash drive.


a). Is a flash drive primary or secondary storage? (1 mark)
b). Storage media utilize a range of technologies to store data.
i) What technology does a flash drive utilize? (1 mark)
ii) Name ONE other storage technology utilized by secondary storage media. (1 mark)
iii) Name TWO types of secondary storage media that utilize the storage technology named in part (c).
(2 marks)
c). Storage media may be compared based on capacity, portability and speed,
i) Which has a greater capacity - a 4 GB flash disk or a DVD? Justify your answer. (2 marks)
ii) Name ONE storage media that is MORE portable than a flash drive. (1 mark)
iii) Name ONE storage media that has a slower access time than a flash drive. (1 mark)
d). How many 51.2MB pictures can be stored on a 4 GB flash drive? (1 mark)
Total 10 marks

4). The Caribbean Central Bank is planning on installing a range of peripherals and computer-related devices to enhance
its operations.
a) Write the name of the component that it may use to
i) Automatically read data from cheques (1 mark)
ii) Turn off the lights when the last employee leaves the room (1 mark)
iii) Allow access to the vault based on a person features such as their fingerprint, retina or voice (1 mark)
iv) Provide automated response to telephone callers to indicate that "Our office is currently closed ..." (1 mark)
b) Write the name of a device or media it may use to
i) Print 800-page detailed reports on wide format continuous forms (1 mark)
ii) Backup 1 TB of data daily (1 mark)
iii) Capture image of cheques for electronic transmission to banks overseas (1 mark)
c) The bank hired a highly skilled programmer to write application software to suit its needs. The programmer had to
ensure that the new programs were Windows 7 compatible. (1 mark)
i) Is the application software 'custom' or 'customised'? (1 mark)
ii) What type of software is Windows 7? (1 mark)
Total 10 marks

5) The following questions refer to Figures 2,3 and 4 below:

Folder Options Fonts Game Controllers


Figure 2. Figure 3. Figure 4.

a)Each of the items above is an element of a GUI.


i) Expand the acronym GUI. (1 mark)
ii) Name EACH of the elements represented in EACH figure. (3 marks)
b) Name the input device MOST suitable for use with the interface represented. (1 mark)
c) Explain how you would :
i) copy a file stored on the Desktop to the My Documents folder. (2 marks)
ii) delete a folder and the files it contains. (1
d) Which type of user interface is MOST suitable for use in a busy restaurant? Justify your response. (2 marks)
Total 10 marks

6) FaceBook is a popular social-networking web site located at http://www.facebook.com/


a) i) What is a web site? (1 mark)
ii) Expand the abbreviations 'http' and 'www' (1 mark)
iii) What does ".com" mean? (1 mark)
iv) What is the technical name for addresses such as http://www.facebook.com/ and ftp://getmyfile.com?
(1 mark)
b) Name the type of software used to request, decode and display web pages. (1 mark)
c) A user's computer may be infected with malware when accessing web sites such as FaceBook. (1 mark)
i) Name TWO types of malware that may affect a computer. (1 mark)
ii) Describe how a computer may become infected. (1 mark)
iii) Name one specific type of system software that may be used to counteract malware. (1 mark)
Total 10 marks

SECTION II
Productivity Tools - 15 marks
Answer ALL questions.

7) Nutcracker Gadget store is having a sale and is offering a discount on its more expensive handsets. It has
prepared a worksheet showing the list of phones and their prices, which are given in the
spreadsheet below:
A B C D

1 Nutcracker Gadget store


2 Tax Rate 17.5%
3
4 Price On Sale Tax
5 Nokia 1100 2500.00
6 Samsung B3000 4000.00

7 Blackberry 990 35000.00

8 Nokia E3 56000.00

10 Most Expensive 56000.00

11 Least Expensive 2500.00

12 Average Price 2500.00

13

a) State the formatting feature applied to the title. (1 mark)


b) Write the formula that was inserted in cells B10 and B12 to determine
i) the price of the MOST EXPENSIVE handset (1 mark)
ii) the AVERAGE PRICE of the handsets (1 mark)
c) All handsets with a price greater than the average price (shown in B12) is on sale and is indicated by a 'YES' while the
others are left blank. Write the formula that should be
entered in cell C7 to indicate whether the BlackBerry 9900 is on sale. (3 marks)
d) Write the formula that should be entered in cell D5 to compute the tax. The formula should be written in such a way
that correct results are obtained when it is copied to cells D6, D7
and D8. (2 marks)
Total 8 marks
8) Nutcracker Gadget Store records its customer data in a database, which contains two tables.
TABLE 1: CUSTOMERJTPE

Type
P1 Prepaid
P2 Postpaid

TABLE2: CUSTOMER_DETAILS

PhoneNum CustomerName Type Balance

999-0000 Kenrith Cole P1 2,000.00


456-7890 Beeyonce Knows P2 45,000.00
324-0989 Jays See Enterprises P2 17,000.00
330-3444 Rhianna's Fragrances P2 81,000.00
456-0098 Jack Sprat Cook Shop P1 45.00
232-0998 Handy Mann P1 990.00
446-4456 Jean Ni P1 84.00

a) Name the MOST suitable data types for storing data in EACH of the following fields:
i) PhoneNum (1 mark)
ii) Balance (1 mark)
b) Name TWO candidate keys in the CUSTOMERJDETAILS table. (2 marks)
c) Give the name of the primary key in the CUSTOMER_DETAILS table. (1 mark)
d) What kind of relationship exists between the CUSTOMERJTYPE and CUSTOMER.DETAILS tables? (1 mark)
e) Write a query to list all Postpaid customers with balances < 50,000. (1 mark)
Total 7 Marks

SECTION III
Problem-SOLVING and PROGRAMMING -45 marks
Answer ALL questions.

9) An algorithm is an important element in program design.


a) Explain the concept of an algorithm. (1 mark)
b) State THREE properties of algorithms. (3 marks)
c) Which steps in problem solving occur
i) Immediately before 'develop the algorithm'? (1 mark)
ii) Immediately after 'develop the algorithm'? (1 mark)
d) State TWO mechanisms that may be used to specify an algorithm. (2 marks)
e) You are using a program to calculate your total exam fees. This is calculated by multiplying the number of subjects by
$50, the number of orals by $10 and the number of practicals by $20 and then adding these three products. The screen
of the program looks like the one below.
EXAM FEE CALCULATOR
Enter the Number of Subjects (1 to 8)

Enter the number of orals

Enter the number of practicals

Total exam fees to be paid

i) Draw a flowchart to represent the logic described above. ( 6 marks )


ii) Determine the LEAST number of variables required to implement the program. ( 1 mark )
Total 15 marks

10) The program specified in Question 9(e) is to be written using Pascal.


a) Write a statement to declare the cost of 'orals' as a constants. (1 mark)
b) Write ONE statement to declare the number of subjects and the number of practicals.
c) The following statement produced BOTH syntax and logic errors.
TotalFees = numSubjects * 50 + numOrals * oralCost + numPracticals * 10;
i) Which error would be observed first and why? (2 marks)
ii) Rewrite the statement correcting ALL the errors. (4 marks)
iii) Name ONE other type of error that may be encountered during the execution of a program. (1 mark)
d) Write the statement that will output the totalFees. (1 mark)
Total 10 marks

11) Three different control structures are used in structured programming.


a) The FOR loop is one common control structure used to implement looping:
i) Name TWO OTHER control structures that may be used. ( 2 marks )
ii) Rewrite the following fragment of code using ANY ONE of the two structures named in part (i):
FOR num := 1 TO 50 DO
Writeln (num); (4 marks)
b) One of the control structures facilitate decision making.
i) Name the structure that may be used to implement a conditional branch where two options exist.
(1 mark)
ii) Write a code segment to implement the following scenario:
A movie cinema shows films 7 days per week with a 1:00 PM show (matinee) on Tuesdays and Saturdays.
Regular admission is $500 however it offers a 20% discount for persons attending Tuesday matinees and
10% on Saturdays. (5 marks)
c) State THREE features of a well-documented program. (3 marks)
Total 15 marks

12) Consider the following program in Pascal, and answer the questions that follow.
Program Doubles (input,output);
Const max = 8;
VAR numStore : array[1..max] of integer;
currPos : integer;

Begin
FOR currPos := 1 to max DO
numStore[currPos] := currPos * 2;
End.

a) State the name of the array. (1 mark)


b) State the size of the array. (1 mark)
c) What value will be stored in the array element when currPos has a value of 5? (1 mark)
d) Explain what is accomplished by the program. (2 marks)
Total 10 marks

END OF TEST
SUGGESTED RESPONSES: TESTS 14-30
299. (a) 000100110101
(b) 1011 0110 1000
263. A. random access memory 304. The problem is stated concisely and unambiguously. The problem is identified in terms
264. B. control unit of its major components.
265. C. arithmetic logic unit 305. The programmers present design specifications of programs which may address the
266. D. backing store problem. These designs are examined for suitability and effectiveness in relation to the
267. 2 GB problem.
268. CD or DVD 306. The solution to the problem, in terms of intended instructions to the computer, is worked
271. optical media stores data in a manner that can be read using laser light whereas out in details and is expressed in pseudocode, flowchart or some other form, known as the
magnetic media stores data on media and relies on a magnetic field for reading and algorithm.
writing data. 311. Input Marks: Controls the activities relating to the input of marks.
272. digital versatile/video disc Output Report: Controls the activities relating to the display of marks and average.
273. both are optical storage media, CD has a much lower capacity than DVD and 316. quantity in stock
is the data is encoded in a different format. re-order level
274. storing full-length movies with high video and sound quality 322. The calculation that converts minutes to minutes and hours.
275. - both magnetic disk and magnetic tape stores data on magnetized media, magnetic
tape is a serial access medium whereas magnetic disk is direct access
326.

C X total
media
- both optical discs and magnetic hard disks are direct access media whereas they 1 12 12
differ in that they each use different technologies to read/write data 2 4 16
- both hard disks and floppy disks store data on magnetized media whereas they 3 3 19
differ in that hard disks are non-removable whilst floppies are removable media. 4 2 21
280. on a fixed-head system, there is a read/write head for each track, consequently, 5 5 26
there is no need for the read/write arm to "seek" for a track and as such the seek time 327. BEGIN
component of access time is eliminated INPUT n1,n2 [1]
282. = capacity of each sector * # sectors/track * # tracks * # surfaces IFn1>n2then [1]
= 512* 18*80* 2 [1
= 1,474,560 bytes ]
= 1,474,560 bytes/(1,024* 1024)
= 1.44 MB bigger = n1
284 . Speech is synthesised by concatenating pre-recorded words from a database ELSE
containing a limited yocabulary, the sentences and/or phrases that are formed bigger = n2
follow a END
strict predetermined pattern
340. Syntax errors: Violation of the grammatical/syntactical rules of the language. Eg. To
285. the light pen does not require a pad and thus occupies less space on a desk spell a reserved word wrongly or use a reserved word as an identifier.
the use of a light pen for drawing is more comfortable as it is closely aligned with the
method by which most people learn to draw, that is, with a pen, pencil, or brush. 341. The process of detecting and eliminating errors, both syntax and logic, or other defects
within a computer program.
289. for uniquely labelling assets for identification purposes, for labelling stock
items to facilitate inventory control 342. Errors in the sequencing of, or omission of necessary steps in an algorithm. Also, flaws
within control structures. Example of logic error - a value that should be accumulated was
291. Customer surveys, lottery tickets, school registers not initialized.
293. (A) Windows Vista
(B) Microsoft Internet Explorer 343. All instructions are written in machine code - binary format. As a result programming is
(C) Microsoft Works complex and excessively tedious.
- Programs cannot be transferred from one system to another since a program has to be
written to suit the unique architecture of the computer which will execute the program.

348. Similarity: They were both designed to develop other programs.


Difference: Fourth are designed to build specific programs while fifth are designed to make the
computer solve the problem.
350. - To enhance readability and make the program readily understandable both iii) The volume of data that can be transmitted by a communication channel per
for the developer and someone who may need to review the code. second, iv) A transmission system in which data flow in two directions at the
- To facilitate maintenance of the program. same time.
354. 4,10,5 4,10,-5
356. - Check the 3 input marks before allowing the total operation to take place. If 377. i) A process of converting messages or data into a form that cannot be read
they are all O's, bypass the calculations and output 0 for both results. without being deciphered.
- Check the total before engaging the average operation. If total is 0, bypass average ii) A software security system to prevent outsiders from invading a private
operation and output O's for the results. network.
363. It allows one to find, retrieve, view and send documents over the web. iii) Data sold with the provision that the seller retains ownership and the buyer
366. HTML: Used to specify how a web page is structured and formatted. purchases only the licence to use the data.
IRC: Allows one to talk with many people, grouped in channels, using text-based iv) Distribution of ideas and information (frequently distorted) for the purpose of
chat. E-Mail: Used to transmit messages or mails electronically by computers via inducing bias or hostile reactions.
communication channels. v) Secret monitoring or recording of information transmission between/among
367. Difference: IRC is done in a public domain while instant messaging is done targeted parties using electronic devices.
privately. 378. responses
Similarity: They are both done in real time 379. The company
368. - Communication may be voice-based. 380. After inputting and processing the data that were collected in the scheme, the
- Users are able to see each other. information that was generated and printed was used as source documents by
371. Similarity: both are network services some other company.
Difference: e-mail transmits messages, e-commerce trades goods/services 381. Using computers/machines to perform certain tasks normally done by humans, and
372. E-mail transmission is faster than traditional mail to control sequences of operations without human intervention.
Transmission cost less than traditional mail 382. eBanking: Customers can now do a range of banking transactions from
373. E-mail may be used for direct marketing remote locations via computer connections. These include checking account
E-mail may be used to deliver transaction confirmation or receipts status and transferring funds among accounts.
374. i) Consists of a collection of microcomputers a building or a small area. They share 383. Computers physically control other devices.
pe 384. Large volumes of data are collected, stored and processed in
ripherals and information and communicate with each other on the network. Each establishing trends/patterns.
computer may act independently and as a workstation that accesses information 385. Age upon entering the school. Errors are often made while entering data of that
from nature, in entering figures out of range.
the network server. 386. date of birth: One does not expect a first former to be born before a certain time. If
ii) A connection of computers or a wide geographical area such as a city or a date seems unreasonable it must be checked, since it could have resulted from
country. Smaller networks may also make up WAN. typographical error.
iii) It is the largest computer network system in the world. It consists of many Height: For any age group the data value for height can raise suspicion. So a
smaller networks connected by a global public network using a large set of height of 8.5 ft may be a misrepresentation of 5.8ft.
communication links. 387. The date of birth, age upon entering school and year of entry could lead to many
375. i) These are specially treated fibres of glass that can transmit signals in the form inconsistencies. The date of birth of a student could appear as being a later date
of than the date of entry. Both could be input as the same date. The year of entry
pulsed beams of laser light. They can transmit several television channels or could be an earlier date than the date of birth.
thousands 388. Validation is the checking of input data by the computer for errors. This of course,
of telephone conversations at a time. is under the control of stored instructions. Verification normally involves the
ii) A transmission channel that consists of strands of copper wires twisted in entering of data twice and comparing both sets to detect differences. The check is
pairs, they by humans, unlike validation, and the focus is to avoid transcription errors.
are normally used by telephone companies and may be used to run local area net 389. The range of the marks.
works. 390. A transposition error was made. Eg.65 was entered as 56.
iii) An earth-orbiting object that provides communication over long distances by Another student's mark was inadvertently entered.
reflecting or relaying radio-frequency signals. 391. - The wrong value re the number of students was entered.
iv) A wave of light that is in the area beyond the visible part of colour and is - The formula for deriving the mean is incorrect.
invisible to
the human eye. It is used in various ways including short range wireless
communication
and remote temperature sensing.
376. i) A form of wireless technology that enables devices such as portable computers,
cell
phones and handheld devices to connect to one another and to the internet.
ii) A building or locale in which wireless internet users can access a wireless high-
speed connection.
393. The storage technique in which the records in a file are stored in order as columnar representation that indicates 2 columns.
determined by the value of the keyfield within each record. This order may be
done numerically or alphabetically.
394. A file in which the records are stored and accessed in no given order.
395. A file in which the records are stored in order of keyfield. However, the records
may be accessed in the order in which they are stored or directly, by the indexes of
the records. 413. width
396. A file in which the records are accessed by record indexes or by disk addresses. spacing
397. Sequential 414. current page, pages
Indexed-sequential 415. ignore rule
398. Random next sentence
One would not be able to retrieve the payments in the required sequence because 416. Highlight the heading then single click on 'U'
the recording would not be done in any specific order. 417. By highlighting the heading and taking note of the value that changes or appears to
399. - Indexed sequential: The record of that individual may be accessed by indicate font size.
the index (position of the record within the file). 418. font type
- Random: The record of that individual may be accessed by the disk font size
address (physical location of the record on the disk). 419. Highlighting the second word and select the arrow to the immediate right of the
400. Sequential font colour icon then select the colour from the palette.
The records have to be accessed in sequence, thus viewing each successive 420. Highlight 'CRISISS' then access the format menu, then select FONT then select TEXT
record until the required one is found. EFFECT then highlight BLINKING BACKGROUND.
401. Sequential 421. menus: format, font, character spacing
There is no need for direct access option: spacing,expanded
402. Indexed-Sequential: The setting up of the direct access mechanism would be setting: 1.5
unnecessary and costly in terms of time. 422. Access the insert menu and select PICTURE and indicate the source of the
Random: The setting up of the direct access mechanism would be unnecessary and picture.
more complex. 423. clip art
403. Sequential scanner/camera
The programmer does not have to be concerned about indexes and disk 424. Highlight the values and single click on centre icon.
addresses. 425. Seven
404. Random 426. five
404. Highlight 'Kingston' and press space bar then type 427. B4:B10
Portland' 428. Highlight cell E3 and hit the function key, F2 or click on the formula bar. Move
Highlight 'Kingston' then type 'Portland' in the highlighted the cursor within the cell or the bar and delete '10' and'%'.
spot. 429. +C4*A4
405. Cut and paste the second between the fifth and sixth. Cut the original fifth, which is 430. Highlight D4, access the edit menu and select copy. Highlight cells D5 - D10 and
now access
fourth and insert it between the existing first and second. the edit menu and select paste.
406. Fully justified: The text is spread from the left to the right margins (fully across the 431. lf(D4>=2000,D4*.1,D4*.05)
page) 432. =Sum(D4:D10)
with spaces between characters varying depending on the number of words on a =Sum(E4:E10)
iine. +E12-E13
Left justified: Text is aligned from the left and may not fill the line. 433. Count
407. Position cursor in a blank line immediately below paragraph 6 and access the 434. VLookup
insert 435. VLookup
menu then select BREAK the PAGE BREAK 436. VLookup
408. Select PAGE SETUP from the file menu and change the default values for left and 437. Access the format menu and select cell, then currency with 2 decimal places.
right 438. =+C5*A5 (Marks must be awarded, provided the answer is relative to the answer
columns with 1.5 and 0.5 respectively. given in question 4)
409. Access the insert menu then select PAGE NUMBER then select TOP OF PAGE for 439. - Highlight a cell in row 4.
position and RIGHT for alignment. Ensure that the SHOW NUMBER ON FIRST PAGE - Right click and select DELETE from menu.
box is checked then select the 1,2,3 format. - Select ENTIRE ROW then select OK.
410. By accessing the file menu then selecting PRINT PREVIEW or use the PRINT 440. Highlight row 11, then right click and select the delete function, then highlight and
PREVIEW icon. select entire rows.
411. Access the format menu then select COLUMNS then click on the 440. A1:A6
441. Total
442. Insert 2 blank rows from the top and type the title in row 8.
443. Highlight cell C6 and type 61.
444. =Sum(B1:F1)
445. By highlighting the range and clicking on the left align icon.
446. Access the format menu and select CELL then select NUMBER then set decimal SUGGESTED RESPONSES: PAPER 2
places to 0 then check use-one-thousand-separator box.
447. To prevent the reference to C8 from changing, wherever on the spreadsheet the
formula is used. Question 1
448. The formula in C7 was copied relative to the different ranges.
449. The spreadsheet automatically recalculated the total. (a) System unit, visual display unit/monitor, speaker
450. Any TWOP of the following: (b) (i) It houses hardware components such as the mother board, power supply,
(i) form wizard processor, memory and storage drives.
(ii) design view (ii) It accepts audible signals and converts them to machine readable data.
(iii) autoform (iii) It facilitates the movement of an on-screen pointer and also allows the user to
451. Responses will vary. select and drag objects displayed on a visual display unit.
452. All fields correct - 3 marks (c) B, C, D, E, F & G
3-5 fields correct - 2 marks (d) Similarity: both devices are peripherals. Difference: Component C is an output
1-2fields correct-1 mark device whereas component D is an input device.
(e) Computer system
name data type size
LName text 15 Question 2
Fname text 15
DOB date (a) A bit is the smallest unit of data representation whereas a 'byte' is the smallest
Gender Text 1 unit of data storage' and the 'word' is the smallest unit of data manipulation.
Address text 30 (b) 8
Sunday School Member Yes/no (c) A number system that utilizes 2 digits only - 0 and 1.
453. Efficiency (speed) (d) ANY ONE of the following: octal or hexadecimal
454. Any ONE of the following: (e) (i) 0011 1111 (make sure to discard the "1" carried out of the MSB position)
- datasheet view (ii) 55 MINUS 17 is equivalent to 110111 + 2's complement of 17 = 100110
- importing data from a spreadsheet file
455. (A) 5 Question 3

(a) Secondary
(b) (i) Flash memory
(B) A key which is used to uniquely identify a record.
(ii) magnetic OR optical
(C) Member ID
(iii) Magnetic: floppy disks, hard disks, tapes; Optical: CD, DVD, BluRay
456. List LName.FName for GENDER = 'M'
(c) (i) DVD - its has a capacity of 4.7 GB
457. List LName.FName for DOB <= [date exactly 18 years ago, to date]
(ii) Flash memory card
458. Do a query to determine the members of the Sunday School then print the query.
(iii) Floppy disk
(d) 80 - (1 GB = 1,024 MB; each of the 4 Gigabytes can hold 20 pictures since
51.2x10x2=1,024)

Question 4
i.
MIC
R
ii.Se
nsor
(b) s
iii.
Biometric
devices
iv.Voice
synthesis
v.
Webcam
line
i. printer
ii.
Magnetic
tape
(iii) Scanner
BEGI
(c) (i) custom(built) N

(ii) operating system SET oral Cost TO


10 SET pracCost
to 20 SET subCost
Question 5 to 50
(a) (i) Graphic user
interface READ numSubjects
READ numOrals
(ii)Figure 1 - Icons; Figure 2 - Pointer; Figure 3 – Window READ numPrac
(b) mouse

(c) (i) Select the file; right-click then select copy from the menu; open the
Total Fees <-- (numSubjects * subCost)
MyDocuments folders then right click and select 'Paste'. + (numOrals *oralCost)+ (numPrac *
(ii) Select the folder; right-click then select 'Delete'; confirm that it is ok to delete pracCost}
(d) A menu-driven interface : it is easily manipulated with a single finger and the and the
options are easily accessed; waiters usually have items in their hands and are
always on the move. Print
(TotalFees)
Question 6

(a) (i) A web site is a group of related web pages,


(ii) Hyper text transport protocol; world wide web END

(iii) ".com" is a means of identifying that the web site being accessed is a
Commercially operated one. Figure 1.

(iv) Uniform Resource Locator (URL) Question 9


(b) Web browser
(c) (i) ANY TWO of the following: WORMS, viruses or Trojan Horses (a) An algorithm is a sequence of ordered steps that produce a solution to a given
(ii) A user may open a link or play a video or some other web content that problem.
contains the malware. (b) ANY THREE of the following: unambiguous, precise, must eventually terminate,
(iii) Antivirus software finite
number of steps, flow of control from one process to the next
Question 7 (c) (i) Select the most efficient solution
(ii) Test and validate the solution
(d) Pseudocode and flowchart
(a) Merge and centre (e) (i) See flowchart in Figure 1
(b) (i) =MAX(B5:B8) (ii) 3 - number of subjects, number of orals and number of practicals
(ii) =AVERAGE(B5:B8)
(c) =IF(B7>B12,"Yes","") Question 10
(d) =B5 * B$2
(a) Const oralCost= 10.00;
Question 8 (b) Var numSubjects, numerals, numPracticals : integer;

(a) (i) Text


(ii) Currency
(b) PhoneNum or CustomerName
(c) One to Many
(d) SELECT * FROM CUSTOMER_DETAILS WHERE type = "P2" AND Balance <
50000
(c) (i) Syntax error. Logic errors cannot be SUGGESTED RESPONSES: 2010 PAST PAPER 2
observed until the program compiles
without error asn is executed.
(ii) TotalFees := (numSubjects * 50) + (numOrals * Section I - Theory
oralCost) + (numPracticals * 20);
(iii) Run-time Question 1
(d) Write(totalFees); (a) (i) narithmetic and logic unit
(ii) main memory
Question 11 (iii) control unit
(iv) input device
(a WHILE ...DO and REPEAT...UNTIL
) Using WHILE Num :=1; (v) output device
(b WHILE num <=50 (vi) secondary storage
Begin (b) (i) CPU / processor / microprocessor
Write(num); Num := Num+ (ii) main memory
1; End; (iii) ANY ONE of the following: mouse, keyboard, hard disk drive, DVD drive or
printer
Using REPEAT (c) computer system

Num:=1; Question 2
REPEAT (a) Figure 2 - command driven; Figure 3 - graphic user
Begin (b) (i) 3
Write(num); (ii) 2
Num :=Num + (c) menu-driven
1; (D) operating system
End; (E) (i) At the command prompt type ren original_filename new_filename then press
UNTIL Num > 50 enter(NOTE: that there is a space between the filenames)
(ii) Right-click on the file, select rename from the context menu, type the new
name,press enter
(c) IF day = "Tuesday" AND time = "5 PM" THEN Admission := admission * (1 - 20%)
Question 3
ELSE
Admission := admission * (1 - 20%)
(a) 1. D
2. E
(d) ANY THREE of the following: 3. A
4. C
5. B
Mnemonic variable names
(b) OMR - an academic institution such as a secondary school
Effective use of white space
Sensor - a factory or restaurant (exhaust fan in the kitchen)
Internal comments
MICR - a commercial bank
Indentation
Scanner - a government records office or national archives
Barcode reader - a hospital (read bar codes on patient's wristband and medication bottle)
Question 12
Question 4
(a) numStore
(a) Flood
(b) 8
(b) (i) Deliberate theft: "manager noticed that a number of computers were damaged"
(c) 10
and "two hard drives were missing from computers in the accountant's office"
(a) Each element stores a value twice that of its position in the array. For example, the
(ii) accidental damage to computers and files: "there was water damage to the files left
first
on employees' desks" and "power surges caused damage to computer hardware"
element stores 2, the second element 4, and so on.
(c) (i) Physical files may be protected by storing them in locked cabinets, safes or
vaults
(ii) Computer equipment should be protected from electrical damage by plugging SECTION II - Productivity Tools
the power cord into a surge protector. It can be protected from damage by
ensuring that it is covered with a waterproof cover when not in use. It may be Question 7
protected from theft by ensuring it is kept in a secure room and that the chasis (a) ANY TWO of the following: field size, format, caption, default value or input mask
and peripherals are using speccialized locking devices.
(iii) Software and data may be protected from damage by safeguarding the (a) Open the table in design view; click the row selector (the blank square) next to the
computer system from power problems (as discussed in part ii); by keeping Text
computer systems in safe locations and by storing removable media field, and then press DELETE.
containing data in safe locations as well. (b) CNO
(c) SELECT CUSTOMER.* WHERE Type = "D" AND YTD SALES > 50000
Question 5
(a) Electronic Question 8
(b) Internet
(a) ANY TWO of the following: labels, values, foumula
c) ANY ONE row from the table below:
(b) =SUM(B2:B6)
Advantage Disadvantage (c) Comma style
e-tearning Facilitates access to more Technical problems such as (d) =IF(B2 < 100000, 'POOR'.'GOOD')
interactive learning power outages and
materials such as equipment breakdown may
audiovisual, games and have a greater negative SECTION III - Programming
video-conferencing^ impact than disruptions in a Question 9
face-to-face setting (a) S3-» S5 -» S1 -»S4 -» S2
e-commerce Facilitate "round-the-dock' Provides an easier (b) (i) a) 3
trading of goods and mechanism for rouge b) 10
services vendors to commit fraud
c) 8
e-mail Lower cost per Physical attachments, for
d) 12
transmission than example, a cheque, cannot be
traditional snail mail sent e) 0
(ii) 10
(d) (i) e-commerce (ii) e-learning (iii) e-mail
(iii) INPUT year1,year2, year3
(e) The difference is in the subject of the activity: 'e-learning' has as its focus, a student
or learner gaining new knowledge about a particular subject whereas 'e-commerce' Average = (yearl + year2 + yearS) / 3
involves the exchange of goods/services for money. PRINT average

Question 6 Question 10
(a) Data may be captured for processing more efficiently than when using a manual (a) (i) IF (X = 3) THEN Y:= 8
system (ii) WHILE(X = 3)DOY:=Y =1;
The output of an information system is likely to be produced more reliably than
when using a manual system. (iii)FORX:=1T010DOWritelnX;
(b) Batch and online (b) (i) A variable identifies a memory location that holds a value that may change as the
(c) Detailed and summary program executes whereas a constant identifies a memory location who value
(d) Master files contain reference data that does not change regularly such as an remains unchanged for the life of the program.
employees name and rate of pay. A transaction file contains data collected regularly (ii) const pi = 3.142;
(such as daily) in relation to transactions that occur such as the time an employee (c) (i) ANY ONE of the following: 0, 320, -1, -65530, 65000
arrives at work and the time the employee leaves daily.
(ii) ANY ONE of the following 3.14,0.007,2340
(e) Serial files allow records to be read from the file in the order it was written to the file
whereas, in sequential files the records are organized in the order the transactions (iii) ANY ONE of the following: A, a, 1, @ or X
occurred naturally. (iv)
(v)
(vi) ANY ONE of the following: Anna, Rhianna, Christmas, Campion, Jerusalem
Question 11 (d) 'System documentation' is usually written using technical jargon and its intended
(a) (i) FOR mark := 1 TO 40 DO audience is computer professionals whereas 'user documentation' is written in
Writeln(mark); (ii) easy to
Mark :=0; REPEAT begin understand language and its intended audience is the end-user.
Mark := Mark =1; Writeln(Mark); End;
UNTIL mark = 40; Question 12
(b) A-compiler (a) HUM
B - errors (b) CSEC
C - logic (c) 8
D - debug (d) The array stores a set of integer values, each of which may be accessed or
(c) To improve the-readability of the source code during program development; To manipulated
facilitate maintenance activities after implementation directly by the use of the array subscript.

You might also like