You are on page 1of 32

Information Technology Theory (1994)

1. Describe TWO functions of EACH of the following components of a computer.

(i) Control Unit (ii) Arithmetic/Logic Unit


(iii) Main Memory

2. State ONE advantage and ONE disadvantage of the first items over the second items in EACH
Of the following pairs:

(a) (i) Character printer (ii) Line printer


(b) (i) Microfilm output (ii) Printed output
(c) (i) Magnetic Tape (ii) Magnetic hard disk
(d) (i) Optical disk (ii) Magnetic hard disk

3. (a) Explain briefly EACH of the following terms:

(i) Bitable device (ii) Gigabyte


(Iii) Operating system (IV) Bar code

(b) (i) What is an ‘expert system’


(ii) Name ONE area in which expert systems are used
(iii) Give ONE advantage and ONE disadvantage of using an expert system
In the area named at (ii) above

4. Each regional office of the Jamaica Food Crop Marketing Agency uses a system of hardware,
Software and communication channels that connects hardware devices to provide its computing
services. Information is collected at the regional offices and at the end of the day it is transferred
to a main-frame computer at the head office in Kingston. At nights, this main-frame at head office
collates the information and transfers it to the regional offices. The communication system is
complex since each network at the regional offices uses different rules establish to govern the way
data is transmitted in the particular network. Apart from providing up-to-date information to users
through its regional offices, the system allows users access to the information at their own homes.
However, to utilize this facility user must subscribe to its special service which allows them to
send and receive massages to/from other users. The cost of this facility is affordable to the average
home-users since subscription fee is small and the only other capital cost is the prices of a device
which converts digital signals into analogue signals and vice versa.

State the proper technical terms for EACH of the FOUR underline phrases in the above passage.

5. A. Describe TWO jobs of EACH of the following:

(i) System Analyst


(ii) Computer Operator
(iv) Database Administrator

b. State TWO ways in which a computer can be used by a teacher in his/her job.

c. State TWO ways in which the computer is beneficial to banking industry.

6. a. For EACH of OMR, OCR and MICR, give an application in which that technology is
frequently used.
b. ‘Data security’ refers to the protection of data from destruction or corruption.
State THREE measures which can be employed to ensure data security

7. a. In a certain character coding system, each character occupies 7 bits and the letters of the
Alphabet is assigned consecutive codes. If ‘M’ is represented by 1010001, what it is
representation of ‘H’?

b. What is the value of X in the following equations?

5210 – X2 = 111112

8. a. What is the purpose of formatting or initializing a diskette?

b. What is major interfacing device for

(i) a command language interface?


(ii) A graphical user interface

c. Explain briefly ONE distinguishing feature of EACH interface mentioned in part ii

9. a. Write an algorithm to interchange the values in 2 variable A & B

b. Write an algorithm to read the names and ages of 10 people and print the name of the
oldest person. Assume that there is no person of the same age. Data is supplied in the
following form: name, age, name, age etc.

10. a. Write an algorithm to read an integer value for SCORE and print the appropriate grade
based on the following:

SCORE GRADE

80 or more A

Less than 80 but


65 or more B

Less than 65 but


50 or more C

Less than 50 F

b. What is printed by the following algorithm when n =5?

If (n = 1) or (n = 2) then
h=1
Else
f=1
g=1
For j = 1 to n – 2 do

h=f+g
f=g
g=h
Print h
End for
End if
Print f, g
Stop
Information Technology – Theory (1994)

1. (i) The control unit does any of the following:

Reads and interpret program instruction


Directs the operation of the internal processor component
Controls the flow of programs and data in and out of primary
memory
Controls the flow of information to and from I/O devices.

(ii) The Arithmetic Logic Unit:

Performs all arithmetic operations


Performs logical operations
Stores the data which can be immediately processed by the
program
Instructions.

(iii) The Main Memory:

Stores programs instructions prior to execution


Stores the data which can be immediately processed by the
program instructions
Store information temporarily after processing is complete.

2. a. Advantage - Character printer is cheaper than a line


printer
Disadvantage - Character printer is slower than a line
printer

b. Advantage - Microfilm output can store much more


information in a small space than printed
output.
Disadvantage - Microfilm is more expensive than
printed output
Microfilm needs special equipment to read
the
Information.

c. Advantage - Magnetic tape is cheaper than magnetic hard


disk
Magnetic tape has a larger capacity than
magnetic hard disk
Disadvantage - slower access to data/records
Records cannot be accessed directly
Records cannot be updated in place
d. Advantage - Optical disk has a larger capacity than
magnetic
hard disk
Optical disk can retain data longer than
magnetic hard disk
Optical disk is read only therefore
information
cannot be tampered with
Disadvantage - Optical disk is slower, more expenses
than
magnetic hard disk
Optical disk is read only

3. a. (i) Bistable device exists in one of two possible state


(ii) Gigabyte is 1,000,000,000 bytes or 109 bytes
(iii) Operating system is a set of programs used for controlling
the operations of a computer system
(iv) Bar Code is a series of parallel light and dark lines
representing a code place on a product for identifying that
product.

b. (i) An ‘expert system’ is a program that reproduces the


knowledge
and thought processes of human experts in certain well
defined
fields.
(ii) areas of application-any ONE of the following:

• medicine
• diagnosis of infections blood diseases
• prescription of medicine
• geology: search for mineral deposits
• chemistry: identifying molecular structure of
compounds

(iii) Advantages - does not display biased judgements


- does not jump to conclusions face of
contrary evidence
- systematically considers all possible
alternatives
Disadvantages - not good at judgement requiring
common sense
- cannot adapted easily to new rules
and
concepts
- cannot reason across disciplines

4. (i) Local Area Network (ii) Protocol


(iii) Bulletin Board or Electronic Mail (IV) Modem
5. a. (i) A system Analyst does any of the following:

Perform feasibility studies


Derive information system requirements/specifications
Design information systems
Perform system reviews

(ii) A Computer Operator does any of the following:

Prepare equipment’s to run jobs


Mount and remove tapes, disks, and diskettes
Monitor operations during the running of job

(iii) A Database Administrator does any of the


following:

Design a database
Create a database
Maintain a database
Coordinate discussion between user groups

b. A teacher can use the computer to do any of the


following:

(i) To develop courseware


(ii) to store students records
(iii) to use ‘Computer Aided Instruction’ software
(iv) to teach students to use the computer
(v) to mark scripts

c. The computer is beneficial to the banking industry:

(i) to provide management with useful information for


running the
bank
(ii) to keep records of transactions by customers
(iii) to provide electronic funds transfer
(iv) to provide automated teller services

6. a. OMR - reading of answers to multiple-choice question.


OCR - converts a printed document to machine-readable
form
so that it could be edited on a computer
MICR - used by banks for reading information on cheques

b. To ensure data security one may:


(i) use fire-proof cabinets are storing tapes and disks
(ii) perform backup and recovery procedures properly
(iii) implement a password system to prevent unauthorized
access
(iv) use anti-virus software
(v) use software features to restrict access to certain records

7. a. H = M – 5 {H is 5 consecutive spaces to the left of M}


M = 1010001 = 81 {decimal value}
H = 81 – 5 = 76 1001100{binary
value}

b. 5210-x2 = 111112 = 31{decimal


value}
X2 = 52 - 31 = 21 =
10101{binary}

8. a. One format a diskette to place electronic marks on the surface


of the
diskette so that data can be written to and read from their
specific
‘addresses’,

b. (i) The keyboard is the major interfacing device for a


command
language interface
(ii) The mouse is the major interfacing device for a graphical
user
Interface

c. Using a command language interface (CLI), the user ‘points’ (or


icon)
of a data file or programs or a selection from a menu and
activates the
program or selection by clicking the pointing devices (usually
mouse)

9. a. C=A
A=B
B=C

b. OLDAGE = 0

For j = 1-10

Read NAME, AGE

If AGE > OLDAGE then


OLDAGE = AGE
OLDPERSON = NAME
EndIf

End for
Print “The oldest person is”, OLDPERSON

10. a. Read SCORE

If SCORE>= 80 then
Print ‘A’
Else if SCORE>65 then
Print ‘B’
Else if SCORE>=50 then
Print ‘C’
Else
Print ‘F’
EndIf

b. The following is printed by the algorithm when n = 5:

2
3
5
3 5
Information Technology (1995)

1. (a) List TWO benefits of Computer Aided Design and Draughting.

(b) Name THREE peripheral devices which are used in Computer Aided Manufacturing but
Which are not commonly used in an office.

(c) State a measure which can be adopted to minimize data and/or program corruption or loss
In the event of a hard disk failure.

(d) What is software piracy?

2. Draw a labeled diagram showing the main components of a computer system, indicating clearly
The direction in which data flow.

3. (a) Convert the decimal number 55 to its binary equivalent.


(b) Convert the binary number 1011010 to its decimal equivalent.
(c) Add the binary numbers 11010 and 10011
(d) The ASCII code for the letter H has a decimal equivalent of 72. What is the
ASCII code for the letter P.

4. When a program makes a read request to the hard disk, the device which reads data from the disk is
moved along a radius to the particular concentric circle on which the data is stored. When the
relevant part of the concentric circle of the disk arrives under the device which reads the data, the
data is read and stored in a special area of memory from which it could be accessed.

State the proper technical terms for EACH of the FOUR underline phrase in the passage above.

5. (a) Identify FOUR measures to secure data.


(b) State TWO advantages and TWO disadvantages of normal mail over electronic mail.

6. (a) List FOUR ways in which medical personnel may use information technology in there
Jobs.

(b) State TWO job functions of EACH of the following computer personnel:

(i) Network manager (ii) Database administrator

7. (a) John receive computer hardware from a friend who lives in the United States of America,
but the software was missing. He therefore decided to purchase the necessary software. In
order for his system to run he realized that he would have to purchase software to manage
the resources of the computer as well as software which could provide for his particular
needs. For both types of software he had a choice of two styles of interface; one which
was command driven or the other which provide screen listing with options from which
the user could select appropriate functions. Some software provides user interfaces which
display small graphic images that can be selected when the function they represented is
required. Since John intended to use the computer in his family business, he had a choice
of software. He noted, however, that if he purchased general-purpose software, that he
would have to do some modification to allow it to meet his specific need.

State the proper technical terms for EACH of the SIX underlined passages.
(b) State TWO functions of an operating system.

8. What is printed by the following algorithm?

SUM = 0
N = 20
WHILE N < 30 DO
SUM = SUM + N
PRINT N, SUM
N=N+3
ENDWHILE

9. (a) Define the following:

(i) Source code


(ii) Object code
(iii) Compiler

(b) Draw a labeled diagram to illustrate the relationship between source code, object code
And compiler.

(c) Write a pseudocode algorithm to read in THREE numbers and print the highest
and lowest number.

10. The following data represents some sample score obtained by students in a test:

5 4 7 10 0 6 0 1 0 9 8

999

999 is the dummy value which terminates the data. Write pseuodocode algorithm to read any data
in the above format, and print the number of students scoring 0 and the number scoring 10.
Information Technology Theory(1995)

1. (a) Computer Aided Design And Draughting Provides:


(i) Improve accuracy and legibility of engineering drawing
(ii) Ease of making alterations to designs leading to increased productivity
(iii) Decrease time for developing blue prints
(iv) Increased detail
(v) Simulation/cost estimation facilities

(b) (I) Sensors (ii) Robots (iii) Guided Pallsest

(c) Copy files unto backup devices on a regular basis and in the event of a hard disk failure
Failure recouvery is accomplished by replacing the damage and lost files on the hard disk
By the last copy of the files from the back-up device.

(d) Software piracy is the illegal copying of programs

2.
Input CPU Output
Device Device

Backing
Storage

3. (a) 2 55 1
2 27 1
2 13 1
2 6 0
2 3 1
2 1 1
2 0 5510 = 1101112

(b)
1 0 1 1 0 1 0
26 25 24 23 22 21 20

1011010 = 26 + 25 + 24 + 23 + 22+ 21 = 90

(c) 11010
10011
101101

(d) P = 72 + 8 = 80 = 1010000 {Binary Equivalent}

4. (I) read/write head (ii) track (iii) Sector (iv) Buffer

5. a. One Can Secure data by:


(i) Encryption (ii) Virus Protection (iii) Passwords Physical access Restriction

b. Adv: (I) Parcel Can be sent


(ii) Sent to more people (people without computer)

Disadv (I) Mail Could be lost


Mail takes a longer time

6. (a) Medical Personnel May use information technology for:

(i) Storing Patient Records (ii) Expert System


(iii) Health education (iv) Monitoring patients

b) (I) A Network Manager Does Any Of The Following:

Starts up and shuts down the network


Grants access and privilages
Monitors use of the network and other shareable resources
Liaise with other network managers re. Connectivity.

(ii) A Database Administrator Does:

Grants Access to data


Makes modification to database structure

7. (a) (I) System Software (ii) Application Software


(iii) Menus (iv) Icons
(v) Custom Written (vi) Customization

(b) Two functions of an operating system are:

(I) Input/output Control (ii) File and disk management

8. N SUM
20 20
23 43
26 69
29 98

9. (a) (i) Source code is program written in a programming language


(ii) Object code machine language, program produce by a computer
(iii) A compiler is a computer program which converts a program written in a high
level programming language to machine code.

(b)
SOURCE COMPILER OBJECT
CODE CODE
C
(c) read A, B, C
if A > B then

LARGEST = A
SMALLEST = B
Else
LARGEST = B
SMALLEST = A
EndIf

If C > LARGEST then LARGEST = C


If C > SMALLEST then SMALLEST = C

Print LARGEST
Print SMALLEST

10. ZEROCOUNT = 0
TENCOUNT = 0

Input NUMBER

While NUMBER not equal 999 do

If NUMBER = 0 then ZEROCOUNT + 1


If NUMBER = 10 then TENCOUNT + 1

Read NUMBER

ENDWHILE

Print NUMBER OF STUDENTS SCORING 0, ZEROCOUNT


Print NUMBER OF STUDENTS SCORING 10, TENCOUNT
Information Technology (1996)

1. State ONE difference between EACH of the following.

(a) Command-line interface and graphical user interface

(b) Impact printers and non-impact printers

(c) Character printers and line printers

(d) General purpose software package and specialized software package

(e) Simplex and Duplex transmission

2. (a) Convert the decimal number 5710 to a binary number.

(b) Convert the binary number 110111012 to a decimal number

(c) Explain the term ‘parity’, as it relates to the coding of characters.

(d) Add the binary numbers 1101012 and 1011102

3. Name the hardware component that performs EACH of the following functions:

(a) Store programs and data that are not currently being used by the CPU

(b) Performs the logical operations within the CPU

(c) Stores programs and data that are not currently being used by the CPU

(d) Modulates and demodulates signals

(e) Reads from disks

(f) Directs internal operations within the CPU

(g) Allows users to move cursor

4. The Statistic Department holds confidential information on the citizen of a country.


Since its database are online and are connected to the telephone company via a modem,
Any person with a computer and a modem can potentially access from the databases.
Outdated data are usually stored at other locations.

(a) State ONE method which can be used to prevent unauthorized user from accessing
Data stored in the databases

(b) State TWO methods which can be used to prevent users from accessing data from files
To which they do not have access.

(c) State ONE potential danger that may exist when legitimates user within the Statistic
Department import data into the department’s computer.

(d) State TWO strategies to protect the archiving data from physical damage.]
5. (a) The increase in the level of computerization in offices, together with the decrease in the
cost and the availability of data communication services have created new ways of
conducting business. Some employees now have an opportunity to perform their work from
home a process know as ‘telecommuting’

(i) State TWO items of hardware that an employee must have if he/she is telecommuting.

(ii) State ONE advantage to the employee of telecommuting


ii
(iii) State ONE disadvantage to the employee of telecommuting.

(b) The owner of a large department store in the city center is planning to offer telemarketing
Service to the general public. Currently, his retailing business customers are encouraged
To browse in the store. They are normally offered assistance by the sales clerk. If a customer
Is satisfied with a particular item, he/she takes the item to the cashier where the customer
must pay in cash. After the transaction is completed, the customer must take away the item(s)
Purchased.

(i) State TWO additional services that the owner should offer so that he could introduce
Telemarketing.

(ii) State ONE change that the owner must take in the operation of his business so that he could
Introduce telemarketing.

(iii) State ONE reason why a customer might still choose to visit the store to make a purchase
even though the customer might have to travel a long distance to get to the store.

6. (a) State THREE functions that are likely to be computerized when the Board of Directors of a
private hospital installs computer at the hospital.

(b) A local bank with several branches has decided to computerize its operations.

(i) State TWO new job positions that would be created in the bank.

(ii) State ONE additional service that the bank would now be able to provide.

7. (a) The Computer Science teacher in a secondary school is attempting to convince the Chemistry
teacher to use Computer Aided Learning (CAL) software in the teaching of Chemistry.

(i) State TWO benefits that the computer science teacher could cite to convince the
Chemistry teacher

(ii) State TWO obstacles that would prevent the Chemistry teacher from using the computer
in teaching.

8. (a) Copy the following trace table in your answer booklet.

X M Y Z
4 1
4 8
4

4
Complete the following trace table for the following algorithm, given that the number 4 are
the input value X.

Read X
For M = 1 to X do
Y = X-M
Z + 5*Y-M
End
Print Z

(b) What is printed by the algorithm?

9. (a) Write an algorithm, which promotes the user to enter the price of an item and which
calculates and prints the new price after a discount of 12%.

(b) Write an algorithm to read in TWO numbers into A and B. The algorithm should store
The smaller in A and the larger in B, and print A and B.

10. Write an algorithm to read ELEVEN numbers, find their average and print it. The algorithm should
also print the number of times the number 6 occurs in the data. For example, given the input data:

8 4 6 9 6 5 6 10 7 0 16

The algorithm should print 7 as the average and 3 as the number of times 6 occur.
Information Technology Theory (1996)

1. a. i. interfacing device for command-line driven interface is the keyboard


While that for graphical user interface is the mouse.

b. i. Impact printers can produce multiple carbon copies of a document while


Non-impact cannot.

ii. Impact printers are noisier than non-impact printers

c. i. Line printers are faster than character printer


ii. Line printers are more expensive than character printers

d. i. General purpose software packages can be used to perform a wide


Variety of tasks while specialized software packages cannot.

e. i. Duplex transmits data in both directions


Simplex transmit data in one direction only.

2 A.

2 57 1

2 28 0

2 14 0

2 7 1

2 3 1

2 1 1

5710 = 1110012

b.

1 1 0 1 1 1 0 1

27 26 25 24 23 22 21 20
7 6 4 3 2 0
110111012 = 2 + 2 + 2 + 2 + 2 + 2 = 22110
c. Parity is used as a checking system or dummy value within the coding of
Character. It is used to detect whether the transmission or coding of data is
complete or accurate.

d. 110101
+
101110

11000112

3. a. RAM (Random Access Memory)


b. ALU (Arithmetic Logic Unit)
c. Secondary Storage (eg. Diskettes, magnetic tape, etc)
d. MODEM
e. Read/Write Head
f. CU (Control Unit)
g. Input Device (keyboard, mouse, etc.)

4. a. Password protection

b. Password protection
Data encryption

c. Virus infection

d. Store archived data in fireproof cabinets


Store backup copies of archive data
Store archive data away from the element (wind, rain, etc)

5. a. i. Modem
Telephone
Fax machine

ii. * Reduction in travel expenses/fuel consumption


* Working men and women would be able to spend more time
with their families.

iii The worker might miss out on promotion opportunities at central


headquarters

b. i. Home delivery of items purchased.


Subscription of magazines advertising products to customer

ii. Use of electronic fund transfer instead of cash payment for goods bought

iii. To examine products being bought


6. a. i. Record-keeping, payroll, billing, and ordering of drugs and supplies
ii. Automating the recording of patients history
iii. Monitoring critically ill patients in surgery and intensive care unit
iv. Recording and analyzing the result of health screening examination to
help detect diseases that might otherwise go unnoticed.
v. Recording and interpreting the result of electrocardiograms (ECG S)

b. i. Progrsammers.
ii. Database administrator.

c. EFT (Electronic Fund Transfer)


ATM (Automated Teller Machines)

7. a. i. * Computer could be used to simulate experiments eliminating the


use of dangerous chemicals

• Slow students could learn at their own pace

ii. * Teacher not computer literate

• Large class size


• Cost of computer hardware and software

8. a.

X M Y Z

4 1 3 14

4 2 2 8

4 3 1 2

4 4 0 -4

b. -4
9. a. Input A
Input B
C=B
If A>B
B=A
A=C
EndIf
Print A, B

10. SUM = 0
SIXCOUNT = 0

For COUNT = 1 TO 11 do

Input NUMBER
SUM = SUM + NUMBER

If NUMBER = 6
SIXCOUNT = SIXCOUNT + 1
EndIf

End If

AVERAGE = SUM divide by 11


Print AVERAGE, SIXCOUNT
Information Technology – Theory (1997)

1. (a) Name a type of device, which produces a readable copy.

(b) Name a type of device, which produces a machine-readable copy.

(c) Name a type of device that accepts data in human readable form.

2. The wide variety of input devices and media is a major factor which adds to the flexibility and
versatility of computer systems. The use of a (i) device which allows users to move around images
on the monitor by the shifting of a level on the device have made computer games very popular. In
supermarkets, there are (ii) devices which allow a cashier to key in data on sales and this data is
automatically transmitted to a computer for processing. There are also (iii) devices that are capable
of reading pencil marks on an examination script thereby allowing the test to be stored
automatically. The use of (iv) the use of (iv) devices to read in images allows pictures and logos to
be incorporated in a document.

State the technical names for EACH of the devices numbered (i) – (iv) in the passage above. Please
use the numbering indicated in the passage to identify your answers.

3. (a) Convert the decimal number 83 to its binary equivalent.

(b) Convert the binary number 11001101 to its decimal equivalent.

(c) Add the two binary number 1101 and 100101.

(d) Explain the difference between discrete and continuous data.

4. (a) State THREE ways in which a teacher would use a computer in his or her job.

(b) State TWO ways in which a journalist would use a computer in his or her job.

(c) A large company has decided to computerize the functions of its Human Resources
(Personnel) department. The Computer Department has been given the responsibility for
completing this task.

Name FOUR categories of personnel from the Computer Department that the Computer
Department Manager must assign to the task, stating clearly ONE function for EACH
Category.

5. (a) Describe briefly an application in which a robot(or robotic arm) is used in industry, stating
clearly ONE function that the robot performs

(b) State TWO advantages of using the robot(robotic arm) over using a manual method in the
application described in part (a) above.

(c) State ONE advantage to a customer of telemarketing.

(d) State ONE disadvantage to a customer of Telemarketing.


(e) State ONE advantage and ONE disadvantage of teleconferencing.

6. (a) State ONE reason why copying a program is considered to be morally wrong.

(b) Within a large company, data on each employee is stored in a central location. One file store
The data on all employees. The data stored on a employee include his or her name, address,
next of kin, salary range, etc. This data is shared by several departments and an employee’s
record can be viewed and modified by many employees from several departments.

State TWO problems which would arise from the sharing of the data in the company.

(c) What is ‘data encryption’?

(d) State TWO methods, other than data encryption, used to secure data.

(e) Explain the difference between the role of an applications programmer and that of a systems
programmer in an organization.

7. (a) What is meant by the term ‘protocol’?

(b) Explain the difference between the following terms:

(i) Up-load and down-load


(ii) Half-duplex and duplex
(iii) Local area network and wide area network
(iv) Electronic mail and bulleting board

8. What is printed by the following algorithm?

COUNT = 1
X=2
WHILE COUNT < 26 DO
X=X+2
PRINT COUNT, X
COUNT = COUNT + 5
ENDWHILE

9. (a) Explain the difference between a high level programming language and a machine level
language.

(b) Explain the difference between an interpreter and a compiler.

(c) Write a pseudocode algorithm to read two numbers and print the lower value.

10. The following data represents some sample data of the number of children in several families:

1 3 5 0 4 6 7 3 5 2 4 0 2 999

999 is the dummy value which terminates the data. Write a pseudocode algorithm to read in any data
in the above format, and print

(a) The number of families with no children; and


(b) The largest number of children existing in any family.
Information Technology Theory (1997)

1. (a) Printer
Plotter

(b) Scanner

(c) Keyboard

2. (i) Joy stick (ii) Point of sale terminals


(iii) Optical Mark Readers (iv) Scanners

3. (a)
2 83 1
2 41 1
2 20 0
2 10 0
2 5 1
2 2 0
2 1 1
0

83 = 10100112

(b)

1 1 0 0 1 1 0 1

27 26 25 24 23 22 21 20

11001101 = 27 + 2 6 + 2 3 + 2 2 + 2 0
= 128 + 64 + 8 + 4 +1
= 205

(d) 1101
+1 0 0 1 0 1
110010

(e) 1993 Question 1 (a)

4. (a) i. To store students records


ii. to use ‘Computer Aided Instruction’ to aid in teaching
iii. to mark scripts

(b) i. To research a topic using the internet


ii. to create articles

(c) PERSONNEL FUNCTION


i. Programmers Writes program that solve specific
problems

ii. Data Entry Clerks Uses key-entry devices to enter raw data
into machine-readable format.

iii. Database Administrator Creates and controls the use of an


organization’s database.

iv. System Analysts The analyst interacts with various users


of a computer system, and with
programmers to help analyze, design,
and implement the new computer
system.

5. a.. Robotic arms are use in the manufacture of motor vehicle. One function that the
robotic arm serves is to spray the motor cars with uniform coat of paint.

b. 1. The robot doesn’t miss


ii. it wastes less than haft as mush paint as a human painter does.
iii. They are not effected by the dangerous fumes or heat, therefore they
don’t get sick

c. The customer doesn’t have to travel long distances to acquire a product.

d. The customer is unable to examine the product closely before purchase

e. Adv: the customer can see their friends or relatives anywhere on the
Globe while speaking to them.

Disadv: the cost of the equipment and service are high

6. (a) Because it is taking away from the creator of the program the right to earn from
is or her creation.
(b) 1. The integrity of the data is a risk seeing that anybody can modify it

ii. There is no secrecy

(c) Data encryption is the scrambling of data to render it unintelligible to an


Unauthorized recipient.

(d) 1. Password protection

ii. Lock away the disk and computers when they are not in use

(e) An APPLICATION PROGRAMMER writes programs for user. A SYSTEM


PROGRAMMER creates and maintains operating system, monitor data base
programs, and so forth.

7 (a) A “protocol” is a formal set of rules that govern how communication or


exchange of data takes place over a network

(b) I UP-LOAD is the process of reading data from a user’s computer storage
and send it to another computer via communication channel. DOWN-
LOAD is the process whereby programs or data are transferred via
Communication channels, from a computer and stored on a media
Location at the user site.

ii. HALF DUPLEX is a transmission system that allows data to be


transmitted in one direction at a time.That is, the system can transmit
and receive data but not at the same time. DUPLEX is a transmission
system that allows data to be transmitted in both direction at the same
time.This system is sometime call Full Duplex.

Iii A LOCAL AREA NETWORK is the linking of computer or terminal r


in the same building or site so that they can communicate. This
communication usually takes place along cables A WIDE AREA
NETWORK is the linking of computer or terminals over a wide
geographical area in order to facilitate communication. This
communication system uses the telephone line, satellite, microwave
transmissions or any other medium that facilitates long distance
communication.

iv. ELECTRONIC MAIL is mail or massages transmitted electronically by


computer via communication channels. It is usually for such massages to
be held in a central store for retrieval at the user’s convenience. A
BULLETIN BOARD is an electronic equivalent of a conventional
bulletin board. It is used as part of a communication network where users
can post massages, read massages posted by other users, communicate
with the system operator and upload or download programs.
8.
COUNT X PRINTED

1 2 1, 4

6 4 6, 6

11 6 11, 8

16 8 16, 10

21 10 21, 12

26 12

The following is printed:

1, 4, 6, 6, 11, 8, 16, 10, 21, 12

9. a. An HIGH LEVEL PROGRAMMING LANGUAGE is one that is more


intelligible to human beings and before it can be understood by the machine
it has to be converted to a form that the machine can understand, MACHINE
LANGUAGE consists of data and instruction as coded binary digits, 0s and 1s.
No translation is necessary for the computer to understand this language.

b. INTERPRETERS translate high-level language statements one at a time,


executing each step immediately after it has been translated. No permanent object
Program is generated: each time a source program statement is encountered, it is
re-interpreted. COMPILERS translate the entire source code ( all statements ) to
its object code before execution takes place. A permanent object program is
generated; Whenever changes are made to the source code the program has to be
re-compiled for the changes to take place.

c. READ A
READ B

IF A < B
PRINT A
ELSE
PRINT B
ENDIF

10. READ NUMB


0COUNT = 0
HIGHEST = NUMB
WHILE NUMB <> 999 DO

IF NUMB = 0 THEN
0COUNT = 0COUNT + 1
ENDIF

IF NUMB > HIGHEST THAN


HIGHEST = NUMB
ENDIF

READ NUMB
ENDWHILE

PRINT “number of families with no children =”, OCOUNT


PRINT “largest number children =”, HIGHEST
Information Technology Theory (1999)

1. A computer system consists of several hardware devices and software


components. The keyboard, mouse and printer are all peripheral devices
connected to the system unit. The system unit comprises a Central Processing
Unit (CPU) and a component, (A) that holds the data and programs that are
currently being used. The CPU in turn, consist of two component, One
component, (B), directs the internal operations within the CPU; and the other
component, (C), is responsible for the manipulation of the data. In addition,
there is another storage component, (D), which stores data and programs that
are not currently being used by the CPU.

State the component that performs EACH of the functions named A to D and
underline above.

2. Match EACH characteristic, listed A to H below with the MOST appropriate device.
Write the letter (A,B etc.) to represent the characteristic and next to EACH letter write
the name of the device that matches it.

CHARACTERISTIC
DEVICE

A. Modulates and demodulates signals Plotter


B. Accepts voice inputs
Keyboard
C. Allow user to input architectural plans Modern
D. Reads in graphics data
Graphics tablet
E. Used for printing architectural plans
Microphone
F. Used for entering text documents
Barcode reader
G. Retrieves pricing data from grocery items
Joystick
H. Used to move the cursor
Scanner

3. (a) State THREE functions of an operating system.

(b) Identify the type of processing mode that would be suited for the following
applications:

(i) Monthly payroll


(ii) Transactions at an Automatic Teller Machine
(iii) Processing electricity bills

4. (a) List THREE ways in which a teacher can use computers in classroom.

(b) Suggest TWO reasons why computer may NOT be used in the classroom.

(c) State TWO advantages of using computer in the classroom.

5. (a) Convert the decimal number 9010 to binary number.

(b) Convert the binary number 110112 to a decimal number.

(c) Add the two binary numbers 11012 and 101012, giving your answer as a binary
number.

(d) Determine the BCD representation of 8710

6. (a) (i) Identify ONE application of robots in industry.

(ii) State TWO advantages of using robots in industry.

(iii) State ONE disadvantage of using robots in industry.

(b) For EACH of the following devices, state ONE application in which the use of
the device is essential:

(i) Scanner
(ii) Plotter
(iii) Modem
(iv) Magnetic ink-character reader

7. (a) In order to secure its data, a company uses the following method for encrypting
text:

A letter is replaced by the letter five letters later in alphabetic order. For example,
the letter
“A” is replaced by “F”, “B” is replaced by “G”, and so on. Note that the letter
“A” is
considered to follow the letter “Z”.

(i) What would be the word “ESSAY” be stored as?


(ii) What is the meaning of the following text?
N LTYNY

(b) (i) What is the purpose of a password?

(ii) What is meant by the term ‘archiving’?

(iii) Within many organizations, data on personnel are stored in a central


location from
which various departments can access relevant information. State
THREE
problems that may arise because of the sharing of this type of data.

8. Programs are written with the general purpose of solving problems. However, it is
unlikely that a program will run completely error-free on the first attempt. The process
whereby a program is checked to ensure that it does what it was designed for is
important in the development of the program. There are two main types of errors that can
occur: one type of error occurs when the programmer fails to properly think through the
solution to the problem, and the other occurs when the programmer does not adequately
know the rules of the programming language. It is good practice to perform a manual
trace on the program, appropriately selected input values, which checks each segment of
the program.

State the proper technical term for EACH of the underlined phrase labeled A to E.

9. (a) DIFFERENCE = 0
Input A,B
If A <= B Then
DIFFERENCE = A-B
Else
DIFFERENCE = B-A
Endif
Print DIFFERENCE

What is printed by the algorithm above if the input values are the following?

(i) 20 30

(ii) 100 100

(iii) 50 10
(b) Write a structure algorithm to prompt the user to input two values which are then
stored in
A and B. The algorithm must divide A by B and print the result. The algorithm
must keep
Prompting for the second number as long as the user enters 0 (zero) for the
second number.

10. (i) Write a structured algorithm, which prompts a user to enter an integer value,
which is then
stored in a variable N. The algorithm must then print each integer from 1 to N
and its
corresponding square. Each output line must show the integer and its square. You
may
assume that the user would enter an integer value.

(iii) Modify the algorithm in (i) to determine the sum of all the squares. Print
this sum if it is less than or equal to 1000. Otherwise, print the following
message:

THE SUM IS GREATER THAN ONE THOUSAND

You might also like