Professional Documents
Culture Documents
(CCCMANKON)
PRE-MOCK EXAMINATION
DECEMBER ADVANCED LEVEL
CANDIDATE NAME
SUBJECT NAME Computer science
PAPER NUMBER 2
SUBJECT CODE 0795
TWO HOURS
3. (i)
a) With the aid of a diagram, showing all the components, describe the machine cycle. (2marks)
1
b) Explain the influence of RAM on machine performance. ( 2marks)
c) State one other component that can enhance machine performance. (2marks)
(ii) Give the functions of the following memory units, stating whether they are volatile or not:
a) EPROM
b) Cache memory
c) Registers (6marks)
(iii)
a) What is computer ethics? ( 2marks)
b) State one way to foster computer ethics in an institute. (2marks)
c) Discus two ethical obligations of users of an information system. (2marks)
d) Describe two computer crimes that are common in Cameroon. ( 2marks)
5. (i) Describe each of the following security measures and and state a situation in which they can be used.
a) Encryption
b) Firewall
c) Backup ( 6marks)
(ii) Explain each of the following approaches used during conversion to a new system.
a) Phased conversion
b) Direct conversion
c) Parallel conversion.
d) Pilot (8marks)
(iii)
a) Define an expert system. (2marks)
b) Describe the use of Expert System in a named domain. (2marks)
2
c) State and describe ONE other system that can be helpful to decision makers of an organization. (2marks).
6. (i)
a) Briefly explain what is meant by Integrated Development Environment (IDE). Give one example of an IDE.
(2marks)
b) Explain the difference between coding and encryption as used in computing. (2marks)
(ii) Mary and Paul went to the Botanic garden and Paul took some pictures with his phone. Paul decides to share
the pictures with Mary using the Bluetooth. This scenario describes a data communication system.
a) List the 5 components that make up a data communication system. ( 5marks)
b) Copy and make a match of the list below with the corresponding four of the components of data
communication identified in a) above.
Pictures
Paul’s mobile phone
Mary’s mobile phone
Bluetooth. ( 4marks)
(iii)
a) Explain the difference between data validation and data verification. Give two examples of each of the data
checks. ( 4marks)
b) Briefly explain the waterfall model in SDLC. Give one advantage and one disadvantage of the waterfall
model. ( 3marks)
A P
3
(iii)
a) Copy and complete the table below by stating either the software type or example. (4marks)