You are on page 1of 6
St Augustine High Schoo (@) Explain the term: data integrity, (i) data privacy, (ii) data security, (iv) biometric system. () Discuss any three biometric techniques: Explain the (a) character set, @) ASCII, (© EBCDIC. (a) The following is a logic circuit a—_Do— c Pea Write a logic statement tbat describes the above logic circuit. (b) Use a diagram to represent the XOR gate. GI Bl ita} O) a) [6] High School 3 Marange ‘The following is a pseudo code of a program that was designed to add 10 positive numbers. Counter = 1 For counter = Ito 10 Repeat Print “Enter a positive whole number” Input number Until number <0 Total = Total + counter Counter = counter +1 Output Total Next (The pseudo code contains several errors. Identify and write down all the errors. m (ii) Rewrite the algorithm so that itis effective and error free. (5) ‘Write a program that accepts names of 30 students and the marks they obtain ina test, The program then displays the name, mark and grade in one line, Grades are obtained using the following grading scale: 70-100 60-69 50-59 45~49 40-44 0-39 maga w > Nyatate High School 4 “The following is an un-normalised table named Delivery Note. Delivery Note [Gust cat [ory _| Conta [Pvt Prod Description [Numb __| Name 209) Hamme re] Zim (19,20, 21,22 | Bag, shoes, socks, \ Umbrella oe Base [Gente [Bm [PH ‘Shoes, socks (2) @_Drawthe INF of the above table, Underline Primary Key field(s). [5] Gi) Come up with the 2NF of the table you created, indicating Primary Key field(s). nl (b) A sshop sells drinks. The shop bas name, address and licenceno fields. Drinks ® Fave name and manufacturer fields. Customers like drinks. Customers have name and address. Draw an ER Diagram to illustrate the above relationship. oy (a) Draw the diagram for the OSI Model. 7 @) Describe the following protocols as they are related to TCP/IP suite: @ TCP Ql (i) oP {2] (ii) | HTTP. : 2) (©) State which layer each of the protocols in (b) belong to. GB] (@) _ Explain the term Domain Name System (DNS). 21 () _ Distinguish between private IP and public IP. QR b) Q a) b) Kriste Mambo High School 4.) State what is meant by each of the following computing term: 1) Alocal variable i) Aglobal variable iil) Aparameter passed by value Ww) Aparameter passed by address [4] A software house uses the following items of software when writing programs for its clients Compiler, linker, editor, subroutine library, debugger. Explain briefiy the function of each term. {s] Explain how the use of procedures and functions contribute to the production of quality software. [4] Acomputer system controls an automated teller machine (ATM). For each of the following, state one device that could be used in the ATM and explain its function: i) Input ii) Output i) Storage ‘The OS used by the computer controlling the ATM must work In both batch and real-time mode. -transau High School] : ‘At ABC High School, @ teacher teaches many subjects. A student enrols in many subjects ‘and attends four ‘lessons per ‘week for each subject. Each subject is taught bY ‘several teachers. Draw an entity-relation diagram (0, show selationships between the entities. On the diagram, show the primary Key and at east OBE attribute for each entity. us () —_Drawaelltabelled dear showing the different views of the Petsbase Management System Structs 81 i) Using examples, deserbe the different views of the Database ‘Management System. a a) Deseribe an appropriate method of data security for the following applications and In each case, explain how data will be Necovered inthe event of data lOSS* i) Abatch payroll system iy Areabtime airline seat reservation. (6) bb) Deseribe any two features ‘or a multi-tasking opereting SYM i) a) When caleulating the address of a record ina random file system using 2 hashing algorithm, synonymous addresses af ‘pound to occur where SHO ecards generate the same address ak i) Giveany2 properties cf a good hashing algorithm a iy Explain any two wav inwhich synonymous 2ddress$ can be resolved. (2) i) Give any 3 tasks for which ‘human medical staff are more suitable than computers: (2) c} Outline 3 benefits gained by both hospital staff and patients in having ‘medical records held im @ computer fle: (2) aie ‘ St Columbas High School 12 (@) Describe the purpose of each of the following parts of a DBMS. @ Data dictionary, 2] (i) Data Manipulation Language (DML). 2 (b) Every student in a school belongs to a Form. Every Form has a FormTutor. All 7 the form tutors are teachers and some teachers are part-time. Some forms have more than one FormTutor although no FormTutor can teach more than one form, Students are identified by a student-ID and each form has a unique form name. Draw an ERD to show the relationship between the entities student, form and Form Tutor. i] (@) @_—_Drawa diagram to represent the Von Newmann Architecture. [4] (i) Explain the role of an accumulator in the Fetch Execute Cycle. 2 (iit) With the aid of a diagram, illustrate the Fetch Execute Cycle. (4) (>) Compare features of the Von Newmann Architecture and the Havard Architecture, 4]

You might also like