Professional Documents
Culture Documents
Students Name:........................................................................................................................................
URL Firewall
Microphone headphones
Voice Over Internet Hot spots
Keystrokes Email
Protocol MAC Address
Dial up Modem
SSL Certificate ISP
Wi-Fi Electronic
IP address
recipients. A …....is used between the users computer and the network toexamine
the data traffic to make sure it meets certain criteria. Internet telephony
So a device called a….…is needed to change the digital data into analogue signal.
[12]
2. State six functions of an operating system
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
......……………………………………………………………………………………………... [6]
3. Give two examples , other than utility bills (water ,electricity) and payroll , where batch
processing would be used
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
......……………………………………………………………………………………………... [2]
4.
………………………………………………………………………………………………….
……………………………………………………………………………………………….[2]
5. Explain, with an example of each, the difference between a multi-tasking operating
system and a multi access operating system.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
......……………………………………………………………………………………………... [4]
6. Suppose that a micro controller based engine control unit, coded Computer X, stores
several hundred megabytes of input and output data during each test run of a prototype
car. The data is supplied by 20 sensors.
After each test run, the data are downloaded to a powerful, Computer Y, at the
manufacturers design center. Computer Y runs a program that performs very detailed
analysis of the test data and produces graphs and statistics for design engineers
without any user input. Computer Y is kept busy by a stream of requests for data
processing from different teams of engineers, so it needs to run very efficiently.
What types of operating system would be needed for computer X and Computer Y, give
a reason for your answer
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
......……………………………………………………………………………………………... [4]
7. Explain, with an example of each, four common features of a graphical user interface.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
......……………………………………………………………………………………………... [4]
8.Explain , with examples of each, three common commands used in command line
interface.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
......……………………………………………………………………………………………... [3]
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[3]
Polling ……………………………………………………………………………………………..
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………[3]
interrupt……………………………………………………………………………………………
……………………………………………………………………………………………………….
………………………………………………………………………………………………………
..………………………………………………………………………………………………… [3]
Handshaking………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………………………………………….[3]
10. A car manufacturing company decides to design a Robotic arm fitted with a type of
processor in which a single task of a particular action is called. In designing the system
it takes into consideration the hardware, communications and operating system. For the
robot to function well control and monitoring are carried out continuously.
What type of Operating System would be needed, give a reason for your answer
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [3]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………………………………………..[3]
(a) Draw and name two diagrams showing any of the three networks above [2]
(b) Give one advantage of each chosen network
………………………………………………………………………………………………………
…………………………………………………………………………………………………. [2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
…………………………………………………………………………………………………………. [2]
(b) using your example, give one advantage to the user of the interactive application
software.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………………………………………..[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………….[2]
14. A very large city library is changing over to a fully computerized system to control all their
operations. The training department has been asked to develop a presentation to explain
to the library staff how their new system will affect them.
(a) What human user interface should the computerized system have? What features make
it ideal? Give a reason.
………………………………………………………………………………………………………………
……………………………………………………………………………………………………….. [2]
(b) The technician should be able to make changes and maintain the system. What interface
would be ideal for doing this task.
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
……………………………………………………………………………………………………….. [2]
15. A burglar alarm system is set up with a number of sensors around a large factory complex.
Explain two advantages of using a polling system and one disadvantage for an interrupt
system for computer control of the sensors and burglar alarm.
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
…………………………………………………………………………………………………………. [3]