100% found this document useful (2 votes)
527 views5 pages

ZIMSEC Computer Science 2022 Answers Full

The document contains answers to ZIMSEC A-Level Computer Science 2022 questions covering topics such as character encoding (ASCII, Unicode, EBCDIC), binary operations, IP addresses, protocols, interrupts, logic networks, e-waste, and data privacy. Key concepts include the differences between public and private IP addresses, the functions of the data link layer, and the implications of e-waste on society and the economy. Additionally, it discusses the importance of data privacy and business ethics in handling user data.

Uploaded by

anesumutangi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
527 views5 pages

ZIMSEC Computer Science 2022 Answers Full

The document contains answers to ZIMSEC A-Level Computer Science 2022 questions covering topics such as character encoding (ASCII, Unicode, EBCDIC), binary operations, IP addresses, protocols, interrupts, logic networks, e-waste, and data privacy. Key concepts include the differences between public and private IP addresses, the functions of the data link layer, and the implications of e-waste on society and the economy. Additionally, it discusses the importance of data privacy and business ethics in handling user data.

Uploaded by

anesumutangi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ZIMSEC A-Level Computer Science 2022 Answers

1 (a) (i) State any one difference and any one similarity between ASCII and Unicode.

Answer:

Difference: ASCII uses 7 or 8 bits while Unicode uses up to 32 bits to represent characters.

Similarity: Both are used to represent text in computers.

1 (a) (ii) State the number of bits used by an EBCDIC character.

Answer:

EBCDIC uses 8 bits.

1 (b) (i) Perform the binary addition 01001001 + 00101111 in 8-bit system.

Answer:

01001001

+ 00101111

= 01111000

1 (b) (ii) Perform the binary addition 01101001 + 00000101 in 8-bit system.

Answer:

01101001

+ 00000101

= 01101110

1 (c) (i) Perform the binary multiplication 01100100 x 00000011 in 8-bit system.

Answer:

01100100 = 100 (decimal), 00000011 = 3 (decimal), Result = 300 = 100101100


ZIMSEC A-Level Computer Science 2022 Answers

In 8-bits: 00101100 (truncated)

1 (c) (ii) State the type of error in the result.

Answer:

Overflow error.

1 (d) Copy and complete the binary pattern for:

(i) the smallest positive value

(ii) the highest magnitude negative value.

Answer:

(i) Smallest positive: 0000000000000001

(ii) Highest negative: 1000000000000000

2 (a) Define the term IP address.

Answer:

A numerical label assigned to each device connected to a computer network that uses the Internet

Protocol for communication.

2 (b) Explain the purpose of an IP address.

Answer:

It identifies the host or network interface and provides the location of the host in the network.

2 (c) Distinguish between public and private IP addresses.

Answer:
ZIMSEC A-Level Computer Science 2022 Answers

Public IP addresses are accessible over the Internet, while private IP addresses are used within a

private network and are not routable on the Internet.

2 (d) Describe the two components that make up the IP address.

Answer:

Network part and host part.

3 (a) Define the term protocol.

Answer:

A set of rules that determine how data is transmitted and received over a network.

3 (b) Describe the SMTP.

Answer:

SMTP (Simple Mail Transfer Protocol) is used to send emails from client to server or between

servers.

3 (c) State any two functions of the data link layer.

Answer:

1. Framing: dividing data into frames

2. Error detection and correction

4 (a) Explain any two types of interrupts and give examples.

Answer:

1. Hardware interrupt: Triggered by external hardware (e.g., keyboard input)


ZIMSEC A-Level Computer Science 2022 Answers

2. Software interrupt: Triggered by a program (e.g., system call)

4 (b) Draw and explain Von Neumann architecture vs Harvard architecture.

Answer:

Von Neumann: Uses a single bus for instructions and data.

Harvard: Uses separate buses for data and instructions, allowing parallelism.

5. Logic network for power station warning system.

Answer:

The network combines logic gates (AND, OR, NOT) to evaluate temperature, pressure, and water

flow based on specified conditions.

Truth table and diagram required.

6 (a) Define the term e-waste.

Answer:

Electronic waste or discarded electrical or electronic devices.

6 (b) Discuss the social and economic impact of e-waste.

Answer:

Social: Health risks, pollution; Economic: Job creation, recycling industry growth.

6 (c) (i) Define the term data privacy.

Answer:

Data privacy refers to the proper handling, processing, storage, and usage of personal data.
ZIMSEC A-Level Computer Science 2022 Answers

6 (c) (ii) State any two business ethics the company should follow.

Answer:

1. Protect user data

2. Ensure honest and transparent operations

You might also like