You are on page 1of 8

PRINCESS CINDERELLA HIGH SCHOOL

Maputo City, Mozambique


2nd TERM - LONG TEST
COMPUTER SCIENCE - GRADE 9 C & Sc.

Duration : 1:30 HR Date : ___/06/16

Students Name:........................................................................................................................................

ANSWER ALL QUESTIONS


TOTAL MARKS : 70

Prepared by: Checked and Verified by:


FABIAN KAMERA RINDIRAYI MAPANZURE
1. Choose Twelve (12) correct terms from the following list to complete the spaces in the
paragraphs below

URL Firewall
Microphone headphones
Voice Over Internet Hot spots
Keystrokes Email
Protocol MAC Address
Dial up Modem
SSL Certificate ISP
Wi-Fi Electronic
IP address

The sender of an........ composes a message and sends it to one or more

recipients. A …....is used between the users computer and the network toexamine

the data traffic to make sure it meets certain criteria. Internet telephony

requires….…. software, as well as broadband internet connection and a…..…. and

……….With some instant messaging systems it is possible to see your partners

……… as they type a message. An Internet address is known as its ………………….

Video Conferencing participants can hold a meeting in a short notice,

also an…….… record can be kept of the meeting.The earliest

Method of accessing the internet was through ……..Over an ordinary telephone.

So a device called a….…is needed to change the digital data into analogue signal.

WLAN products confirming with certain international standards may be

trademarked …….Organizations may provide public access to WLANaccess points in

areas known as………….

[12]
2. State six functions of an operating system

………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

......……………………………………………………………………………………………... [6]

3. Give two examples , other than utility bills (water ,electricity) and payroll , where batch
processing would be used
………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

......……………………………………………………………………………………………... [2]

4.

User supplies data to Program running on the Outputs


the computer program computer

Outputs from the program may be used by the


user in order to decide what data to input

This diagram illustrates what type of a system.

………………………………………………………………………………………………….

……………………………………………………………………………………………….[2]
5. Explain, with an example of each, the difference between a multi-tasking operating
system and a multi access operating system.

………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

......……………………………………………………………………………………………... [4]

6. Suppose that a micro controller based engine control unit, coded Computer X, stores
several hundred megabytes of input and output data during each test run of a prototype
car. The data is supplied by 20 sensors.

After each test run, the data are downloaded to a powerful, Computer Y, at the
manufacturers design center. Computer Y runs a program that performs very detailed
analysis of the test data and produces graphs and statistics for design engineers
without any user input. Computer Y is kept busy by a stream of requests for data
processing from different teams of engineers, so it needs to run very efficiently.

What types of operating system would be needed for computer X and Computer Y, give
a reason for your answer
………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

......……………………………………………………………………………………………... [4]

7. Explain, with an example of each, four common features of a graphical user interface.
………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………
......……………………………………………………………………………………………... [4]
8.Explain , with examples of each, three common commands used in command line
interface.
………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

......……………………………………………………………………………………………... [3]

9. Describe the following Peripheral device controls and their purpose:


Buffer? …………………………………………………………………………………………….

………………………………………………………………………………………………………

……………………………………………………………………………………………………..
……………………………………………………………………………………………………[3]
Polling ……………………………………………………………………………………………..

………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………[3]

interrupt……………………………………………………………………………………………

……………………………………………………………………………………………………….
………………………………………………………………………………………………………
..………………………………………………………………………………………………… [3]
Handshaking………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………

…………………………………………………………………………………………………….[3]

10. A car manufacturing company decides to design a Robotic arm fitted with a type of
processor in which a single task of a particular action is called. In designing the system
it takes into consideration the hardware, communications and operating system. For the

robot to function well control and monitoring are carried out continuously.

What type of Operating System would be needed, give a reason for your answer

............................................................................................................................................

............................................................................................................................................

....................................................................................................................................... [3]

11. State three basic network topologies

………………………………………………………………………………………………………

………………………………………………………………………………………………………

…………………………………………………………………………………………………..[3]

(a) Draw and name two diagrams showing any of the three networks above [2]
(b) Give one advantage of each chosen network

………………………………………………………………………………………………………

…………………………………………………………………………………………………. [2]

12. Many computer systems are interactive.

(a) Name one example of application software that is interactive

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

…………………………………………………………………………………………………………. [2]

(b) using your example, give one advantage to the user of the interactive application
software.

………………………………………………………………………………………………………

………………………………………………………………………………………………………

…………………………………………………………………………………………………..[2]

13. Explain what is LAN


…………………………………………………………………………………………………………….

………………………………………………………………………………………………………………

………………………………………………………………………………………………………….[2]
14. A very large city library is changing over to a fully computerized system to control all their
operations. The training department has been asked to develop a presentation to explain
to the library staff how their new system will affect them.

(a) What human user interface should the computerized system have? What features make
it ideal? Give a reason.

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….. [2]

(b) The technician should be able to make changes and maintain the system. What interface
would be ideal for doing this task.

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

……………………………………………………………………………………………………….. [2]

15. A burglar alarm system is set up with a number of sensors around a large factory complex.
Explain two advantages of using a polling system and one disadvantage for an interrupt
system for computer control of the sensors and burglar alarm.

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

…………………………………………………………………………………………………………. [3]

You might also like