You are on page 1of 4

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL

General Certificate of Education Advanced Level

COMPUTING 9195/1
PAPER!

NOVEMBER 2014 SESSION 3 hours


Additional materials:
Answer paper
Unprogrammable electronic calculator

1 AE 3 hours

INSTRUCTIONS TO CANDIDATES

Write your name, Centre number and candidate number in the spaces provided on the answer
paper/answer booklet.

Answer all questions.

Write your answers on the separate answer paper provided.

If you use more than one sheet of paper, fasten the sheets together.

INFORMATION FOR CANDIDATES

The number of marks is given in brackets [ ] at the end of each question or part question.

You are reminded of the need for good English and clear presentation in your answers.

This question paper consists of 5 printed pages and 3 blank pages.

Copyright: Zimbabwe School Examinations Council, N2014.


CZIMSEC N2014
2
1 Transmission of data over a wide area network may be carried out by circuit or
packet switching.

(a) Explain the difference between circuit switching and packet switching. [2]
Give any three advantages of packet switching compared over circuit
/
switching. [3]

t/c) State any three items that will be transmitted with a data packet in
addition to the data itself. [3]

2 (a) State any one "function of a modem. [1]

~) State one reason why the use ofISDN telephone system eliminates the use of a
modem when a computer is connected to a wide Area Network. [1']

3 (a) Explain the difference between serial and parallel transmission. [2]
(b) Outline the circumstances under which it would be appropriate to use parallel
transmission. [2]
4 Describe what happens when a processor which is currently working on a job
receives an interrupt from an external source. [3]

5 The CPU is connected to main memory by three separate buses.

Explain the term

(a) control bus,

(b) data bus,

(c) address bus. [3]


I

6 The Database Management System (DBMS) provides an interface between the


operating system and the user in order to make access to the data as simply as
possible.

(a) Identify any other three functions of a DBMS. [3]

(b) A database may be considered from several different levels of views


known as schemas. Explain the terms

(i) external schema, [1]


(ii) conceptual/logical schema, [1]
(iii) internal/storage schema. [1]

9195/1 N2014
3
(c) Data integrity is very important when processing data using computer systems.

(i) Define the term data integrity. [1]

(ii) Outline any two ways in which data integrity may be compromised. [2]

(ill) Name any two methods for ensuring the integrity of data. [2]

0( If multiple users attempt to update a database table simultaneously one or


more of the updates may be lost unless measures are taken to prevent this.

Outline any three measures which can be used to prevent loss of data due
to simultaneous updating of records. [3]

Deadlock or deadly embrace occurs when two users are attempting


to update two related records in the same table. Neither of the two
users proceeds as each will wait for a resource which is locked
by another user.

Give any two ways of avoiding deadlock in a database management


system. [2]

The choice of file organisation is considered vital by a designer. A number of


questions need to be asked.

(a) Explain any two important questions to be considered by the designer. [4]

(b) (i) .Give an example of an application where it is sensible to use the


following file systems:

1. serial

2. sequential

3. random

(ii) Explain why each file system in (i) is appropriate.


[6]

(c) When calculating the address of a record in a random file system using a
hashing algorithm, synonymous addresses are bound to occur where two records
generate the same address.

(i) Give any two properties of a good hashing algorithm. [2]

fell) Explain any two ways in which synonymous addresses can be resolved. ·[2]

9195/1 N2014
[Turn over
5
,'"

10 . Third generation programming languages may be compiled or interpreted before they


can run on a computer.

(a) Explain the functions performed by

(i) ,,_a compiler, [2]


(ii) an interpreter. [2]

f
(c)
Give any three advantages of using a compiler.

Outline the stages involved in compilation.


[3]
[3]
11 (a) Explain the following database structures giving examples.

(i) dynamic, [2]


(ii) static. [2]
(b) Explain the steps which are followed When creating a binary tree. [4]

(c) Convert the following numbers to decimal:

(i) 0110100000 000011 [2]


(ii) 0100000000 111 110 [2]
Show your working.

(d) Give any two advantages of normalising in floating point binary. [2]

12 (a) Describe how e-commerce works. [2]


(. Explain how the use of e-commerce could be beneficial to an organisation. [3]

You might also like