Computer Studies, Paper 2, June 2008

Copyright@2008

No part of this document can be reproduced in any form without the written permission of the author.

Computer Studies
O-Level June 2008, Paper 2
1(a) Collecting many transactions over a period of time and processing them at the same time e.g. payroll, billing. (b) A signal which is usually generated by a hardware device and which stops the current job being performed e.g. when the printer is out of paper. (c) Breaking a big task into smaller tasks so that they can be solved more easily. For e.g., big programs are usually broken down into many smaller procedures to make programming easier. (d) A portable computer that can be used anywhere as it has its own battery, it usually weights only a few kilos and are usually more expensive than desktop computers. (e) A kind of upside-down mouse where the user must use his finger to rotate a ball so that the pointer moves on the screen.

2(i) File management e.g. copy, rename, delete. (ii) Security management e.g. password, firewall, anti-virus. (iii) Memory management e.g. allocates memory when a program is loaded. (iv) CPU management e.g. divides the processor time amongst several tasks/users.

3(a) Many call centres have set up a Mauritian branch mainly because of cheaper labour compared to Europe. (b) Sometimes, it is difficult for recruiting companies to have appropriate staff with the right language skills to fit the job. (c) No travelling and accommodation costs. (d) Needs high bandwidth network otherwise the audio/video received can be of poor quality. (e) Give them a CD/DVD where they have all the learning materials. Normally, this will include multimedia content which can make learning interesting.

4. Temperature sensor – to capture temperature data which can be used in weather forecasting Optical mark recognition – sense marks on specially prepared forms e.g. football pools Bar core readers – stores bar codes which are used to obtain prices from a database Magnetic Ink Character Reader – to detect fraudulent cheques Copyright@2008 -1Prepared by: NVJ

No part of this document can be reproduced in any form without the written permission of the author.

Computer Studies, Paper 2, June 2008

Copyright@2008

No part of this document can be reproduced in any form without the written permission of the author.

5(a) A computer program which can prevent other software from functioning correctly. It usually replicates itself by attaching to other files. (b) Deleting users’ file Spreading across a network Filling up the hard disk by duplicating itself continuously Annoying the user by doing some stupid things on the screen Shutting down the user’s PC (c) Install a good anti-virus program and update it everyday Use an internet connection firewall Scan all emails before downloading Do not share floppy disks and/or flash disks. Scan them before use. (d) Backing up means making a copy of the actual data on a computer. This by itself will not prevent viruses from entering the computer system. Also, if the backup files are infected and we need to install all data again after a system crash, the new system will contain the viruses.

6(a)(i) random access or direct access (ii) hard disk (b) Change in address Change in class/form Student no longer in school (c ) use passwords use encryption electronic door/security guard (d) range check type check

7. FORWARD 40 RIGHT 90 FORWARD 70 RIGHT 90 FORWARD 50 RIGHT 90 FORWARD 50 LEFT 90 FORWARD 20 RIGHT 90 FORWARD 20 RIGHT 90 FORWARD 20 PEN UP

Copyright@2008

-2-

Prepared by: NVJ

No part of this document can be reproduced in any form without the written permission of the author.

Computer Studies, Paper 2, June 2008 8(a) Add the words America, south and/or coffee (b) Information is more up-to-date. Huge amount of information available very quickly Can cross-check from various websites to see if the information is correct

Copyright@2008

No part of this document can be reproduced in any form without the written permission of the author.

(c)(i)Currently there is no mechanism to validate the authenticity of information on most websites. *Fortunately, the World Wide Web Organisation is going ahead with a project in which they will view, audit and allocate a certificate to websites which can be trusted. (ii) It is very easy to catch all sorts of viruses on the Internet which can be very harmful to the data and programs on their computer. (iii) Once a user is connected to the Internet, if he is not using a firewall, it is very easy for hackers to enter into their computer and do all sorts of nasty things with their files. (iv) Sometimes too much information is available and the user is then confused about how to print and read so much material. (d)(i) Store the file as an attachment in her email account. She would then use the Internet to access her files by logging into her inbox. (ii) Use a floppy disk, CD, DVD, flash disk or portable hard disk to store the files. (iii) A more advanced scenario is where she would have access to a server running a Course Management System like on www.3education.mu and where she can upload her files freely if she request an account from the administrator of the website.

9. (a) 5*5/(5 + 5) = 2.5 6 + -6 = 0, so output is “Error” 12*4/(12 + 4) = 3 (b) The algorithm can then be used as a procedure/function in other programs. There is no need to write the instructions again. Procedures which are written by other people has already been tested and thus can be used in a plug and play fashion.

10(a) The DVD has a storage capacity of 4.5 Gb. So it is ideal to store movies. Hard disk is used to store all programs (system software and applications software) and data on a computer permanently. RAM is used to store only the programs and data that the user is currently working on. The contents are stored there only temporarily. (b) Flash disk/Pen drive It is very small and light and therefore highly portable. It has a USB interface which allows fast transfer of data. It is cheaper compared to buying hundreds of floppy disks. Copyright@2008 -3Prepared by: NVJ

No part of this document can be reproduced in any form without the written permission of the author.

Computer Studies, Paper 2, June 2008 11. Principles: Data collected must be used for registered purposes only. Data collected must be kept up-to-data. Data collected must be accurate. Data collected must not be kept longer than necessary. Data collected must be kept secure.

Copyright@2008

No part of this document can be reproduced in any form without the written permission of the author.

12. (a)(i) count = 1 repeat input x count = count + 1 until count <= 20 (ii) for count = 1 to 20 step 1 input x next count (b) while do endwhile

13(a) 1. images of products, their price, product description, stock levels, etc 2. a facility to pay using credit cards securely 3. promotional offers 4. a facility to convert between different currencies 5. shipping rates 6. help facililty

13(b) 1. can purchase at any time (24/7) 2. a much wider choice of products 3. sometimes other people are selling their products at very competitive prices 4. no need to leave the comfort of their home

14. (a) 1. safer than risking human lives 2. cheaper than doing the same experiments with real cars 3. takes less time to see results 4. can repeat the experiments many times and it is also very easy to change the parameters like speed, weight of car, etc.

Copyright@2008

-4-

Prepared by: NVJ

No part of this document can be reproduced in any form without the written permission of the author.

Computer Studies, Paper 2, June 2008

Copyright@2008

No part of this document can be reproduced in any form without the written permission of the author.

(b) 1. Data gloves: they offer a simple means of gesturing commands to the computer. 2. Wands: wands operate with six degrees of freedom; that is, by pointing a wand at an object, you can change its position and orientation in any of six directions: forward or backward, up or down, or left or right. 3. Head-mounted displays e.g.goggles 4. Data suit Sensors are used to capture information from the user and/or environment.

15. (a) Direct Implementation/Direct Changeover/Big Bang Cheaper than parallel implementation which has to perform each task twice Parallel Implementation If there is a problem in the computerised system, the organisation can still rely on the manual system

(b) Normal: any value between $1 and $799 Most employees would have a salary within this range. Abnormal: any value above $800 or less than $0 An employee cannot get more than $800 or less than $0 dollars per month. Extreme: Either $0 or $800 The maximum pay can be $800 for a worker and the least can be $0 (if they are being paid on a piece rate basis or he did not come to work for one month!)

16. (a) The system can use pressure pads (or movement sensors) to determine whether there is someone in the bathroom. Data obtained from sensors must be converted to digital form using a digital to analog converter before being processed by a computer. (b) while (true) //this means that the system will work continuously, 24 hrs a day and everyday

input pressure_value obtained from sensor if(pressure_value >= set_value) switch on lights start timer else timer = timer + 1 second if timer = 10 minutes switch off lights endif endwhile Copyright@2008 -5Prepared by: NVJ
No part of this document can be reproduced in any form without the written permission of the author.

Computer Studies, Paper 2, June 2008
This algorithm is not perfect but it will earn you all the 3 marks or more!

Copyright@2008

No part of this document can be reproduced in any form without the written permission of the author.

(c )(i) Reduces wastage of electrical energy to a minimum. Customers do not care about switching off lights. (ii) It will have a positive impact on the customer as it is a safe system. The customer might come back again or recommend the hotel to his friends.

17(a) Gather information (facts and rules) from experts (e.g. car engineers, experience and qualified mechanic), car and spare parts manufacturers, the internet and from books. Analyse and validate these information by cross-checking the information obtained from the different sources. Organise and structure these information so that they can be stored in a database (knowledge base) and used by a computer program. Develop an inferencing engine that can use the facts and rules in the knowledge base to make conclusions. Develop a variety of methods which can be used to query the knowledge base. Implement a graphical user interface to make using the expert system a pleasant experience.

(b) Compare it with the one obtained from a book or the Internet or ask an expert. (c) less likely to make an error

18. (a)(i) = C2*D2 (ii) 90000, “Loss” (iii) = SUM(F2:F8) or = F2 + F3 + F4 + F5 + F6 + F7 (b) E7, G7, F9 (c) Draw a graph of Total money taken (y) against Number of seats sold (x) Draw the line Cost of Event as a straight line ( y = 85000 for The Bugs) The meeting point of these two lines gives the break even point, i.e. the point where there is neither profit nor loss. The break-even point can also be calculated using this formula: Number of seats sold = Cost of Event/Seat price Copyright@2008 -6-

Prepared by: NVJ

No part of this document can be reproduced in any form without the written permission of the author.

Computer Studies, Paper 2, June 2008 19.
balance = 20000; withdrawal = 0; dailyLimit = 10000; float charge = 0; input withdrawal if(withdrawal > balance) output message "We are sorry but you do not have sufficient funds."

Copyright@2008

No part of this document can be reproduced in any form without the written permission of the author.

[1] [1] [1] [1]

else if (withdrawal > dailyLimit) output message<<"We are sorry but you have exceeded the daily withdrawal limit." else balance = balance - withdrawal; if(balance < 100) charge = 0.02*balance; balance = balance - charge; display charge endif endif

[1] [1] [1] [1]

/*Comments*/ I know that this is the most dreaded question of the Computer Studies paper. But you will be amazed to know that this is one of the most scoring questions if you had practiced a few questions before. Look at this question, only 5 marks has been allocated but there are 8 potential marks that a student can score. However, if you get more than 5 marks, you will get only 5 marks! The point I want to make here is that it is very easy for any student to score 3 (60% of the mark) or 4 (80% of the mark) out of 5 marks on these type of questions. Look at the question and then at the answer, many things are remarkably similar. You just had to recopy them. Remember that all algorithms will a variables declaration section, a processing part where you can have loops (e.g. while endwhile) and if then else structures and finally it must produce some outputs.

Below, I have written the algorithm in an actual high level programming language. I have added a few other things, that’s y it has become a bit long. You can use either Turbo C++ or Visual C++ to execute (run or compile) the program. I have put the codes in a while loop so that the user can choose whether to continue the transaction or stop it. The count variable counts how many transactions this user has performed. If he exceed 5 transactions, he is not allowed to performed any other transactions. I have also added several messages to make things clear to the user. Anyway, as complex as it may seem, there are still many things which have not been taken into consideration. For example, the user must input a PIN and the ATM must validate it. The information is not stored permanently, every time the program is run, the user starts with a balance of 20000. Printing of receipts has also not been taken into consideration. Copyright@2008 -7Prepared by: NVJ

No part of this document can be reproduced in any form without the written permission of the author.

Computer Studies, Paper 2, June 2008
/*Author: NVJ Date: 17 September 2008 Language and Compiler: C++, Turbo C++ or Visual C++ Purpose: Program to simulate an ATM*/ #include<iostream.h> void main() { float balance = 20000; float withdrawal = 0; float dailyLimit = 10000; float totalDailyWithdrawal = 0; float charge = 0; int count = 1; char choice = 'Y'; cout<<"Your balance is: $"<<balance<<endl; while (count <= 4 && (choice != 'N' && choice != 'n')) { cout<<endl<<"How much do you want to withdraw:$ "; cin>>withdrawal; totalDailyWithdrawal = totalDailyWithdrawal + withdrawal;

Copyright@2008

No part of this document can be reproduced in any form without the written permission of the author.

if(withdrawal > balance) cout<<"We are sorry but you do not have sufficient funds."<<endl<<endl; else if (totalDailyWithdrawal > dailyLimit) cout<<"We are sorry but you have exceeded the daily withdrawal limit."<<endl; else { balance = balance - withdrawal; if(balance < 100) { cout<<"Your account has been charged at 2%"<<endl; charge = 0.02*balance; balance = balance - charge; cout<<"You have been charged $"<<charge<<"."<<endl<<endl; }//end if }//endif count = count + 1; cout<<"Your balance is: $"<<balance<<endl<<endl; cout<<"Do you want to continue [Y/N]: "; cin>>choice; }//endwhile if(count >= 4) cout<<"Sorry, you have exceeded the number of trials"<<endl; cout<<endl<<"Have a nice day!"<<endl; }//endmain

Copyright@2008

-8-

Prepared by: NVJ

No part of this document can be reproduced in any form without the written permission of the author.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.