ZIMSEC A-Level Computer Science 2022 Answers
1 (a) (i) State any one difference and any one similarity between ASCII and Unicode.
Answer:
Difference: ASCII uses 7 or 8 bits while Unicode uses up to 32 bits to represent characters.
Similarity: Both are used to represent text in computers.
1 (a) (ii) State the number of bits used by an EBCDIC character.
Answer:
EBCDIC uses 8 bits.
1 (b) (i) Perform the binary addition 01001001 + 00101111 in 8-bit system.
Answer:
01001001
+ 00101111
= 01111000
1 (b) (ii) Perform the binary addition 01101001 + 00000101 in 8-bit system.
Answer:
01101001
+ 00000101
= 01101110
1 (c) (i) Perform the binary multiplication 01100100 x 00000011 in 8-bit system.
Answer:
01100100 = 100 (decimal), 00000011 = 3 (decimal), Result = 300 = 100101100
ZIMSEC A-Level Computer Science 2022 Answers
In 8-bits: 00101100 (truncated)
1 (c) (ii) State the type of error in the result.
Answer:
Overflow error.
1 (d) Copy and complete the binary pattern for:
(i) the smallest positive value
(ii) the highest magnitude negative value.
Answer:
(i) Smallest positive: 0000000000000001
(ii) Highest negative: 1000000000000000
2 (a) Define the term IP address.
Answer:
A numerical label assigned to each device connected to a computer network that uses the Internet
Protocol for communication.
2 (b) Explain the purpose of an IP address.
Answer:
It identifies the host or network interface and provides the location of the host in the network.
2 (c) Distinguish between public and private IP addresses.
Answer:
ZIMSEC A-Level Computer Science 2022 Answers
Public IP addresses are accessible over the Internet, while private IP addresses are used within a
private network and are not routable on the Internet.
2 (d) Describe the two components that make up the IP address.
Answer:
Network part and host part.
3 (a) Define the term protocol.
Answer:
A set of rules that determine how data is transmitted and received over a network.
3 (b) Describe the SMTP.
Answer:
SMTP (Simple Mail Transfer Protocol) is used to send emails from client to server or between
servers.
3 (c) State any two functions of the data link layer.
Answer:
1. Framing: dividing data into frames
2. Error detection and correction
4 (a) Explain any two types of interrupts and give examples.
Answer:
1. Hardware interrupt: Triggered by external hardware (e.g., keyboard input)
ZIMSEC A-Level Computer Science 2022 Answers
2. Software interrupt: Triggered by a program (e.g., system call)
4 (b) Draw and explain Von Neumann architecture vs Harvard architecture.
Answer:
Von Neumann: Uses a single bus for instructions and data.
Harvard: Uses separate buses for data and instructions, allowing parallelism.
5. Logic network for power station warning system.
Answer:
The network combines logic gates (AND, OR, NOT) to evaluate temperature, pressure, and water
flow based on specified conditions.
Truth table and diagram required.
6 (a) Define the term e-waste.
Answer:
Electronic waste or discarded electrical or electronic devices.
6 (b) Discuss the social and economic impact of e-waste.
Answer:
Social: Health risks, pollution; Economic: Job creation, recycling industry growth.
6 (c) (i) Define the term data privacy.
Answer:
Data privacy refers to the proper handling, processing, storage, and usage of personal data.
ZIMSEC A-Level Computer Science 2022 Answers
6 (c) (ii) State any two business ethics the company should follow.
Answer:
1. Protect user data
2. Ensure honest and transparent operations