You are on page 1of 8
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Advanced Level MARKING SCHEME NOVEMBER 2014 SESSION COMPUTING 9195/2 2 @ @ label given toa string of characters that represents things like variable, constant and procedure names. 0 i) a-valuc that can not vary during the execution of a program fa] ii) a-value that can vary during program execution 0) o (®) —_adecision basediiwo state answer e.g. 1/0, Y/N, TIF QI iS Max 2 14 lines - declaration of variables a, b, sum and diff = declaration of variable a to reserve memory space for the first number being entered - same explanation for b, sum and diff (1 mark each) 5™ and 6" lines — assigning numbers to variable a and b reading value entered as first/second number and storing in a/b value in a and value in & (1 mark each) 7 line - are added together assigned to sum 8" line - variable bis subtract ®& from value a and result is assigned to diff 9" tine 5 PicResult cls —clears the screen of picture box PicResult | Cee aes 10" line - displays the value of variable sum to the picture box picResult 11" line displays the value of variable diff to the picbox pieResult (1 mark per line max 11) : 3 nanos 3 maar ned r F sndpely (ane cast Rate ee eters ey Cane 0Und WAESON GE Connpestrsy — \ S \ Gare wae $0 be APE | or ich be py bsepengenbi_ ctor hs aa Ss Code Private sub calculate — click ( ) ret] MM @@ @)- Dim p,1,t,FV Assingle Val(txtp.Text) q@ r = _—__-yal(txi.Text) a) t = —_val(txtT-Text) a) I = oo q@ Ve aes Qo picFVPrint “Future Values “FV (i) End sub (1) eNO YB reo kS 4 Tbe 8 mares) =a Tertbon Cor accepting °F Tery vex for resets — | Letpels — a \ oN era Col Cee TO Code Privatesub convert —_—click () a Dimc As single @ DimF As single Q F = val (tctF.Text) a 5(F -32) ec = 1 > a ttC.Text = — str$(C) @ End sub Q a C kay 10 rrerks) Unico VO nrarks @ — Selection = - allows one to make a choice out of two of more optionse.g:if mark > 50 thet pass else fail RI Gi) Sequence - -_instructions/statements follow each other step by stepone after another e.g. input mark 1; input mark 2, totagnark 1 + mark 2 2] (iii) Repetition - —_A group of statements will be executed a certain number of times or until a rogue value is entered e.g. while x<> “T” we count = count + 1 (@) Software projects require documentation to provide a specification for'programmer > to-assist the maintenance programmer at a later stage - toassist the users on how to use the software - _ toallow for further development of the system (1-mark each max 2) (b) documents asgociated with s projects Ree Ee - program specification to document the logic of a program - . file layout to specify the content and format of the records ~ input and output layouts to specify the user interface = setae) dou enhedu (1 mark each max 3) (pew, 3) (©) Method of system implementation - direct changeover - parallel - phased - pilot (Any 2-max 2) @ Cart) @ ewe &,, 3652 = Smo ES Secs Drench 2 proiesses — Qe a Teper Correct symbols (6) (Use of arrows 1, max 18) doumwrs —) © aos + pen @ wack @ 10 CPny P ve ra 3) @ A DBMS if 2 set of program that allows the creation of data files, the [1] creation of data in these files and extraction of data from the files, y SAD OOO | enoneAn rho (Max 2) (i) Used by the Database Administrator to model database schema + define logical structure of files - help to describe attributes such as record layouts - enables the DBA to maintain overall control of the system (any two max 2) (iii) Provides a comprehensivi€set of features to allow modification to the data contained within the database a - allow users to carry out common operations such as retrieving and () © @ © modification (1) - OO ree - record is a set of related information/fields (1 mark each max 2) - afield is a seveollection of related characters 1 cdturnnrs ee heats - character is a collection of 8 bits /bybe_ edna rENione (1 mark each max 3) Data integrity refers to validity and accuracy of data and its eomections gorreCTESS. ‘whereas data security refers to protection of data from corruption and G unauthorised access [1], i - wen beeen wat dedien Cl iwregr st) (Any given example;-2) prystad secur ty Croce and Gi) cneryption - —“Serambling of data with@ key to cipher text which can only be read after decrypting viene: execyenery access level - use of different levels so that different departments can access only the fields required. 2 EEA soe @ — ISBN™15 char] +2. I Gi) Title of book* 40 char 5-5O (ii) Publisher~25 char 3~ 25 , (iv) Year published * 4 char 1 (¥) — author(s)= 40 char ¢0 ~“*S" 7 (vi) Page in catalogue 5 char 1~ 5 1 record size 129 bytes per book File size for 10 000 books ~ 122 bytes x 10 000 1.220 000 bytes ‘ 1004 O] = 1191.406 kb Oo a (Y) masytemmy ort KO Hoe, (vi) illustrations inrdiagrams rou) Ho Cea @ @ — abyteis8 bits (binary digit) os Gii) a bitis binary digit and represents 09 S3d-19 (iv) half of a byte/four bits (collection of) a3 Le) it bif ‘ L Egan goes olen Os eee er O1 ie) (¥) American standard code for information interchangg an 8 bit (byte) used for representing characters (1 mark for acronym $4 1 for explanation) [max 5] © — @)_—_ Write down the binary number - starting at the right hand side, group the binary number into 4s. [1] - for each group, write down the equivalent hex digit ti] eg. 101111011 is 11 im hex is B = 17B 6 (2 marks for explanation) 2 marks for example [Max 4] © @ 2, 301 52 ont eee Ol athe Answer 100111 a [1 mark correct answer} max 1 @ = 2BC B=ll 1 mark carry | mark Answer 37016 5 w*aon x 39 —SA63_ 1E210 23073 B463 1 mark Max 3 1 mark formula _-— 1 mark for correct answer z& BES) etic aes wy % ANJTCLIS 2553.69 => 9F9.7,, sO = nD oa 922 ites 1E5 aaa 1 mark formula 1 mark correct answer a

You might also like