Professional Documents
Culture Documents
2. State ONE advantage and ONE disadvantage of the first items over the second items in EACH
Of the following pairs:
4. Each regional office of the Jamaica Food Crop Marketing Agency uses a system of hardware,
Software and communication channels that connects hardware devices to provide its computing
services. Information is collected at the regional offices and at the end of the day it is transferred
to a main-frame computer at the head office in Kingston. At nights, this main-frame at head office
collates the information and transfers it to the regional offices. The communication system is
complex since each network at the regional offices uses different rules establish to govern the way
data is transmitted in the particular network. Apart from providing up-to-date information to users
through its regional offices, the system allows users access to the information at their own homes.
However, to utilize this facility user must subscribe to its special service which allows them to
send and receive massages to/from other users. The cost of this facility is affordable to the average
home-users since subscription fee is small and the only other capital cost is the prices of a device
which converts digital signals into analogue signals and vice versa.
State the proper technical terms for EACH of the FOUR underline phrases in the above passage.
b. State TWO ways in which a computer can be used by a teacher in his/her job.
6. a. For EACH of OMR, OCR and MICR, give an application in which that technology is
frequently used.
b. ‘Data security’ refers to the protection of data from destruction or corruption.
State THREE measures which can be employed to ensure data security
7. a. In a certain character coding system, each character occupies 7 bits and the letters of the
Alphabet is assigned consecutive codes. If ‘M’ is represented by 1010001, what it is
representation of ‘H’?
5210 – X2 = 111112
b. Write an algorithm to read the names and ages of 10 people and print the name of the
oldest person. Assume that there is no person of the same age. Data is supplied in the
following form: name, age, name, age etc.
10. a. Write an algorithm to read an integer value for SCORE and print the appropriate grade
based on the following:
SCORE GRADE
80 or more A
Less than 50 F
If (n = 1) or (n = 2) then
h=1
Else
f=1
g=1
For j = 1 to n – 2 do
h=f+g
f=g
g=h
Print h
End for
End if
Print f, g
Stop
Information Technology – Theory (1994)
• medicine
• diagnosis of infections blood diseases
• prescription of medicine
• geology: search for mineral deposits
• chemistry: identifying molecular structure of
compounds
Design a database
Create a database
Maintain a database
Coordinate discussion between user groups
9. a. C=A
A=B
B=C
b. OLDAGE = 0
For j = 1-10
End for
Print “The oldest person is”, OLDPERSON
If SCORE>= 80 then
Print ‘A’
Else if SCORE>65 then
Print ‘B’
Else if SCORE>=50 then
Print ‘C’
Else
Print ‘F’
EndIf
2
3
5
3 5
Information Technology (1995)
(b) Name THREE peripheral devices which are used in Computer Aided Manufacturing but
Which are not commonly used in an office.
(c) State a measure which can be adopted to minimize data and/or program corruption or loss
In the event of a hard disk failure.
2. Draw a labeled diagram showing the main components of a computer system, indicating clearly
The direction in which data flow.
4. When a program makes a read request to the hard disk, the device which reads data from the disk is
moved along a radius to the particular concentric circle on which the data is stored. When the
relevant part of the concentric circle of the disk arrives under the device which reads the data, the
data is read and stored in a special area of memory from which it could be accessed.
State the proper technical terms for EACH of the FOUR underline phrase in the passage above.
6. (a) List FOUR ways in which medical personnel may use information technology in there
Jobs.
(b) State TWO job functions of EACH of the following computer personnel:
7. (a) John receive computer hardware from a friend who lives in the United States of America,
but the software was missing. He therefore decided to purchase the necessary software. In
order for his system to run he realized that he would have to purchase software to manage
the resources of the computer as well as software which could provide for his particular
needs. For both types of software he had a choice of two styles of interface; one which
was command driven or the other which provide screen listing with options from which
the user could select appropriate functions. Some software provides user interfaces which
display small graphic images that can be selected when the function they represented is
required. Since John intended to use the computer in his family business, he had a choice
of software. He noted, however, that if he purchased general-purpose software, that he
would have to do some modification to allow it to meet his specific need.
State the proper technical terms for EACH of the SIX underlined passages.
(b) State TWO functions of an operating system.
SUM = 0
N = 20
WHILE N < 30 DO
SUM = SUM + N
PRINT N, SUM
N=N+3
ENDWHILE
(b) Draw a labeled diagram to illustrate the relationship between source code, object code
And compiler.
(c) Write a pseudocode algorithm to read in THREE numbers and print the highest
and lowest number.
10. The following data represents some sample score obtained by students in a test:
5 4 7 10 0 6 0 1 0 9 8
999
999 is the dummy value which terminates the data. Write pseuodocode algorithm to read any data
in the above format, and print the number of students scoring 0 and the number scoring 10.
Information Technology Theory(1995)
(c) Copy files unto backup devices on a regular basis and in the event of a hard disk failure
Failure recouvery is accomplished by replacing the damage and lost files on the hard disk
By the last copy of the files from the back-up device.
2.
Input CPU Output
Device Device
Backing
Storage
3. (a) 2 55 1
2 27 1
2 13 1
2 6 0
2 3 1
2 1 1
2 0 5510 = 1101112
(b)
1 0 1 1 0 1 0
26 25 24 23 22 21 20
1011010 = 26 + 25 + 24 + 23 + 22+ 21 = 90
(c) 11010
10011
101101
8. N SUM
20 20
23 43
26 69
29 98
(b)
SOURCE COMPILER OBJECT
CODE CODE
C
(c) read A, B, C
if A > B then
LARGEST = A
SMALLEST = B
Else
LARGEST = B
SMALLEST = A
EndIf
Print LARGEST
Print SMALLEST
10. ZEROCOUNT = 0
TENCOUNT = 0
Input NUMBER
Read NUMBER
ENDWHILE
3. Name the hardware component that performs EACH of the following functions:
(a) Store programs and data that are not currently being used by the CPU
(c) Stores programs and data that are not currently being used by the CPU
(a) State ONE method which can be used to prevent unauthorized user from accessing
Data stored in the databases
(b) State TWO methods which can be used to prevent users from accessing data from files
To which they do not have access.
(c) State ONE potential danger that may exist when legitimates user within the Statistic
Department import data into the department’s computer.
(d) State TWO strategies to protect the archiving data from physical damage.]
5. (a) The increase in the level of computerization in offices, together with the decrease in the
cost and the availability of data communication services have created new ways of
conducting business. Some employees now have an opportunity to perform their work from
home a process know as ‘telecommuting’
(i) State TWO items of hardware that an employee must have if he/she is telecommuting.
(b) The owner of a large department store in the city center is planning to offer telemarketing
Service to the general public. Currently, his retailing business customers are encouraged
To browse in the store. They are normally offered assistance by the sales clerk. If a customer
Is satisfied with a particular item, he/she takes the item to the cashier where the customer
must pay in cash. After the transaction is completed, the customer must take away the item(s)
Purchased.
(i) State TWO additional services that the owner should offer so that he could introduce
Telemarketing.
(ii) State ONE change that the owner must take in the operation of his business so that he could
Introduce telemarketing.
(iii) State ONE reason why a customer might still choose to visit the store to make a purchase
even though the customer might have to travel a long distance to get to the store.
6. (a) State THREE functions that are likely to be computerized when the Board of Directors of a
private hospital installs computer at the hospital.
(b) A local bank with several branches has decided to computerize its operations.
(i) State TWO new job positions that would be created in the bank.
(ii) State ONE additional service that the bank would now be able to provide.
7. (a) The Computer Science teacher in a secondary school is attempting to convince the Chemistry
teacher to use Computer Aided Learning (CAL) software in the teaching of Chemistry.
(i) State TWO benefits that the computer science teacher could cite to convince the
Chemistry teacher
(ii) State TWO obstacles that would prevent the Chemistry teacher from using the computer
in teaching.
X M Y Z
4 1
4 8
4
4
Complete the following trace table for the following algorithm, given that the number 4 are
the input value X.
Read X
For M = 1 to X do
Y = X-M
Z + 5*Y-M
End
Print Z
9. (a) Write an algorithm, which promotes the user to enter the price of an item and which
calculates and prints the new price after a discount of 12%.
(b) Write an algorithm to read in TWO numbers into A and B. The algorithm should store
The smaller in A and the larger in B, and print A and B.
10. Write an algorithm to read ELEVEN numbers, find their average and print it. The algorithm should
also print the number of times the number 6 occurs in the data. For example, given the input data:
8 4 6 9 6 5 6 10 7 0 16
The algorithm should print 7 as the average and 3 as the number of times 6 occur.
Information Technology Theory (1996)
2 A.
2 57 1
2 28 0
2 14 0
2 7 1
2 3 1
2 1 1
5710 = 1110012
b.
1 1 0 1 1 1 0 1
27 26 25 24 23 22 21 20
7 6 4 3 2 0
110111012 = 2 + 2 + 2 + 2 + 2 + 2 = 22110
c. Parity is used as a checking system or dummy value within the coding of
Character. It is used to detect whether the transmission or coding of data is
complete or accurate.
d. 110101
+
101110
11000112
4. a. Password protection
b. Password protection
Data encryption
c. Virus infection
5. a. i. Modem
Telephone
Fax machine
ii. Use of electronic fund transfer instead of cash payment for goods bought
b. i. Progrsammers.
ii. Database administrator.
8. a.
X M Y Z
4 1 3 14
4 2 2 8
4 3 1 2
4 4 0 -4
b. -4
9. a. Input A
Input B
C=B
If A>B
B=A
A=C
EndIf
Print A, B
10. SUM = 0
SIXCOUNT = 0
For COUNT = 1 TO 11 do
Input NUMBER
SUM = SUM + NUMBER
If NUMBER = 6
SIXCOUNT = SIXCOUNT + 1
EndIf
End If
(c) Name a type of device that accepts data in human readable form.
2. The wide variety of input devices and media is a major factor which adds to the flexibility and
versatility of computer systems. The use of a (i) device which allows users to move around images
on the monitor by the shifting of a level on the device have made computer games very popular. In
supermarkets, there are (ii) devices which allow a cashier to key in data on sales and this data is
automatically transmitted to a computer for processing. There are also (iii) devices that are capable
of reading pencil marks on an examination script thereby allowing the test to be stored
automatically. The use of (iv) the use of (iv) devices to read in images allows pictures and logos to
be incorporated in a document.
State the technical names for EACH of the devices numbered (i) – (iv) in the passage above. Please
use the numbering indicated in the passage to identify your answers.
4. (a) State THREE ways in which a teacher would use a computer in his or her job.
(b) State TWO ways in which a journalist would use a computer in his or her job.
(c) A large company has decided to computerize the functions of its Human Resources
(Personnel) department. The Computer Department has been given the responsibility for
completing this task.
Name FOUR categories of personnel from the Computer Department that the Computer
Department Manager must assign to the task, stating clearly ONE function for EACH
Category.
5. (a) Describe briefly an application in which a robot(or robotic arm) is used in industry, stating
clearly ONE function that the robot performs
(b) State TWO advantages of using the robot(robotic arm) over using a manual method in the
application described in part (a) above.
6. (a) State ONE reason why copying a program is considered to be morally wrong.
(b) Within a large company, data on each employee is stored in a central location. One file store
The data on all employees. The data stored on a employee include his or her name, address,
next of kin, salary range, etc. This data is shared by several departments and an employee’s
record can be viewed and modified by many employees from several departments.
State TWO problems which would arise from the sharing of the data in the company.
(d) State TWO methods, other than data encryption, used to secure data.
(e) Explain the difference between the role of an applications programmer and that of a systems
programmer in an organization.
COUNT = 1
X=2
WHILE COUNT < 26 DO
X=X+2
PRINT COUNT, X
COUNT = COUNT + 5
ENDWHILE
9. (a) Explain the difference between a high level programming language and a machine level
language.
(c) Write a pseudocode algorithm to read two numbers and print the lower value.
10. The following data represents some sample data of the number of children in several families:
1 3 5 0 4 6 7 3 5 2 4 0 2 999
999 is the dummy value which terminates the data. Write a pseudocode algorithm to read in any data
in the above format, and print
1. (a) Printer
Plotter
(b) Scanner
(c) Keyboard
3. (a)
2 83 1
2 41 1
2 20 0
2 10 0
2 5 1
2 2 0
2 1 1
0
83 = 10100112
(b)
1 1 0 0 1 1 0 1
27 26 25 24 23 22 21 20
11001101 = 27 + 2 6 + 2 3 + 2 2 + 2 0
= 128 + 64 + 8 + 4 +1
= 205
(d) 1101
+1 0 0 1 0 1
110010
ii. Data Entry Clerks Uses key-entry devices to enter raw data
into machine-readable format.
5. a.. Robotic arms are use in the manufacture of motor vehicle. One function that the
robotic arm serves is to spray the motor cars with uniform coat of paint.
e. Adv: the customer can see their friends or relatives anywhere on the
Globe while speaking to them.
6. (a) Because it is taking away from the creator of the program the right to earn from
is or her creation.
(b) 1. The integrity of the data is a risk seeing that anybody can modify it
ii. Lock away the disk and computers when they are not in use
(b) I UP-LOAD is the process of reading data from a user’s computer storage
and send it to another computer via communication channel. DOWN-
LOAD is the process whereby programs or data are transferred via
Communication channels, from a computer and stored on a media
Location at the user site.
1 2 1, 4
6 4 6, 6
11 6 11, 8
16 8 16, 10
21 10 21, 12
26 12
c. READ A
READ B
IF A < B
PRINT A
ELSE
PRINT B
ENDIF
IF NUMB = 0 THEN
0COUNT = 0COUNT + 1
ENDIF
READ NUMB
ENDWHILE
State the component that performs EACH of the functions named A to D and
underline above.
2. Match EACH characteristic, listed A to H below with the MOST appropriate device.
Write the letter (A,B etc.) to represent the characteristic and next to EACH letter write
the name of the device that matches it.
CHARACTERISTIC
DEVICE
(b) Identify the type of processing mode that would be suited for the following
applications:
4. (a) List THREE ways in which a teacher can use computers in classroom.
(b) Suggest TWO reasons why computer may NOT be used in the classroom.
(c) Add the two binary numbers 11012 and 101012, giving your answer as a binary
number.
(b) For EACH of the following devices, state ONE application in which the use of
the device is essential:
(i) Scanner
(ii) Plotter
(iii) Modem
(iv) Magnetic ink-character reader
7. (a) In order to secure its data, a company uses the following method for encrypting
text:
A letter is replaced by the letter five letters later in alphabetic order. For example,
the letter
“A” is replaced by “F”, “B” is replaced by “G”, and so on. Note that the letter
“A” is
considered to follow the letter “Z”.
8. Programs are written with the general purpose of solving problems. However, it is
unlikely that a program will run completely error-free on the first attempt. The process
whereby a program is checked to ensure that it does what it was designed for is
important in the development of the program. There are two main types of errors that can
occur: one type of error occurs when the programmer fails to properly think through the
solution to the problem, and the other occurs when the programmer does not adequately
know the rules of the programming language. It is good practice to perform a manual
trace on the program, appropriately selected input values, which checks each segment of
the program.
State the proper technical term for EACH of the underlined phrase labeled A to E.
9. (a) DIFFERENCE = 0
Input A,B
If A <= B Then
DIFFERENCE = A-B
Else
DIFFERENCE = B-A
Endif
Print DIFFERENCE
What is printed by the algorithm above if the input values are the following?
(i) 20 30
(iii) 50 10
(b) Write a structure algorithm to prompt the user to input two values which are then
stored in
A and B. The algorithm must divide A by B and print the result. The algorithm
must keep
Prompting for the second number as long as the user enters 0 (zero) for the
second number.
10. (i) Write a structured algorithm, which prompts a user to enter an integer value,
which is then
stored in a variable N. The algorithm must then print each integer from 1 to N
and its
corresponding square. Each output line must show the integer and its square. You
may
assume that the user would enter an integer value.
(iii) Modify the algorithm in (i) to determine the sum of all the squares. Print
this sum if it is less than or equal to 1000. Otherwise, print the following
message: