Info Tech Resit 2012 With Ans Guide
Info Tech Resit 2012 With Ans Guide
Info Tech Resit 2012 With Ans Guide
2
2
2
2
2
25
12
6
3
1
0
1
0
0
1
1
(ii) . Octal
Ans
8
8
2
5
3
0
1
3
25=31
(iii) Hexadecimal
Ans
16
16
25
1
0
9
1
25=19
1
1
+
0
1
1
0
1
0
1
0
1
1 1
0 1
0 0
1 1 20 1 1
1
01 01
1 011 0
3. (a) Write the numbers 1-7.` n separate lines in your answer booklet. Using the information in
Table 1; match the number of the device with the letter for the person who uses the device,
by writing the letter next to the correct number in your answer booklet.
Answer:
Joystick-b
Digital Camera-F
Barcode Reader A
OMR - E
(b) Describe the use of biometric systems, stating clearly
(iii) WWW
Hypertext (3 marks)
(b) Write the letters A - G in your answer booklet and state against EACH letter, the correct
technical term which is required to complete the sentences in the paragraph below.
David's father wishes to advertise his used car business on the Internet. David advises him
that he can create a website that consists of several interconnected (A) The website
must be placed on a _ (B) computer. Persons wishing to access the information on
the Internet must use an Internet (C on their computers to navigate to the particular
website. They must either know the address of the website called a (D) _ (E)
locator or must use a search _ (F) to find the website. When they find a car that
they are interested in purchasing they can then _ (G the relevant information to their
computer.
Answer:
A webpage
B- Host/Server
F-Engine G- Download
C-Modem D-Uniform
E-Resource
5. (a) Preventing unauthorized access to computer facilities can be achieved by locking doors to
computer rooms. State THREE other methods that can be used to prevent unauthorized
access to computer facilities. (3 marks)
Answer:
Using Code, Biometric, Swipe card, and security guard
(b) Distinguish between data integrity and data security, badges, cards (ID), smart cards and keys
Answer:
Definition of data integrity: The accuracy and consistency of stored data, indicated by an
absence of any alteration in data between two updates of a data record
In computing, data integrity refers to maintaining and assuring the accuracy and
consistency of data over its entire life-cycle,[1] and is an important feature of a
database or RDBMS system. Data integrity means that the data contained in the
database is accurate and reliablewhile data security is measures to ensure data is kept safe, nt
intentionally or accidentally altered, disclose or distributed?
(c) (i) Define firewall.
Answer:
A firewall is a security system consisting of hardware and or software that prevent unauthorized access to data,
information and storage media on a network.
(2 marks)
(1 mark )
(ii) Identify and describe TWO unwanted incidents that a firewall can prevent.
Answer:
Companies use firewalls:
- to deny network access to outsiders, block hackers -to restrict employees access to sensitive data -block unwanted
pops
(4 marks)
6) Consider the following forms and documents that are used in ordering parts for a car
Step 1: The mechanic in an auto repair shop submits requests for parts on a parts-request form
(A) to the owner of the shop.
Step 2: The owner of the auto repair shop collates the requests and creates a document called a
pro forma (B) on a flash drive.
Step 3: This flash drive is sent to a car parts dealer who creates a record in a file on the hard drive for the auto repair
shop owner and using data from the file prints a document called Invoice_Order ( C ).
Step 4: This Invoice Order is sent to the owner of the shop.
Step 5: The owner of the shop then review the invoice order and return the confirmed invoice order (D) to the
automobile parts dealer.
(a) State the range of data containing the percentage of the population with Internet access for
the four countries. (I mark)
Ans: C2:C5
(b) Write the function to find the average population of the four countries. (2 marks)
ANS: =average(B2:B5)
(c) What formatting feature has been applied to the population data of the four countries?
(I mark )
(d) The data in the spreadsheet has been sorted. State the column heading used for the sorting.
Ans
Column B - Population
(I marl{ )
e) The text "Good Access" is to be inserted in the Action Needed column if the % of
population with Internet access is greater than, 40%, otherwise the text "Poor Access" is
inserted. Write the function that will be inserted in cell D2 to do this. (3 marks)
=IF(c2>40%, Good Access, Poor Access)
Ans:Date/Time
b) State the name of the primary key in the VEHICLE table
Ans:Reg_no
c) What is the Engine CC of the vehicle owned by the individual/organization with Tax-No=G300
Ans: 2000
(d) Write a query to show all Toyota vehicles registered in 2008 or later.
Ans:
REG_NO
TYPE
ENGINE_CC
MANUFACTURER
REG_DATE
MANUFACTUR
ER
criteria
Toyota
REG_DATE
>=#1/1/2
008
e) A report was generated for the vehicle table and the records were grouped by the type field. State the name of
ANOTHER field that could be used to group the records.
Ans: MANUFACTURER
f) If the Vehicle table is sorted on the REG_NO field in ascending order, what is the Engine_CC of the vehicle at the
top of the sorted list?
ANS: Engine_CC - 2000
SECTION 3
PROBLEM SOLVING AND PROGRAMMING - 45 marks
Answer ALL questions.
9. (a) Use the algorithm below to answer the questions that follow.
Line 1 A:= 2
Line 2 B:=10
Line 3 WHILE A< B DO
Line 4 PRINT A, B
Line 5 B := B DIV A
Line 6 ENDWHILE
Line 7 PRINT A, B
(i) Copy and complete the trace table below:
A
2
B
10
Answer
A B
2 10
2
5
2.
2
5
1.
2 25
The Workout can be found at the end of the page
(ii) Write an alternative operator for DIV if real numbers were used, Ans: /
(b) Using any two of the numbers 10, 12, 14, 16 and 22, write ONE example for EACH of the
following logic operator symbols and state whether the result of the example is TRUE or
FALSE.
Answer
i. semicolon
Ans
syntax error
Answer
Program sumPosnum;
Var sum, num:integer;
Begin
Sum:=0; num:=0;
Wrieln(Enter any number or -999 to end);
Readln(num);
While num <> -999 do
Begin
If num > 0 then
Sum:=sum + num;
Writeln(Enter any number or -999 to end);
Readln(num);
End;
Write(The sum of positive numbers,sum);
End.
11. Answer the questions below based on the following array called WORDS.
(b) Write the order of index numbers that would output the letters CAT. (3 marks)
(c) Write the statement that would output the contents of the array at index number 4.
(2 marks)
(d) Write a fragment of code to search the array for the letter `C', and return the index
location. (5 marks)
(e) Write a fragment of code to write the letter `Z' into EACH cell of the array. (4 marks)
ANSWER
A) 4 B) 3,2 and 4
12. Write an algorithm to perform the following tasks:
(a) Prompt for a letter
(b) Read the letter into a variable called CHECK
(c) If the letter is equal to `A', then output the word `Good'
ANSWER
Start
Print Enter a letter
Read CHECK[letter]
While CHECK[letter] <> do
If CHECK[letter] = A Then
Print Good
Endif
Print Enter a letter
Read CHECK[letter]
Stop
Total 5 marks
END OF TEST
Source document- When an employee takes a document and enters the data into a computer system, the document is
referred to as a source document.
Human-readable- Many forms are filled in by hand and the employee has to read them before entering the data on a
keyboard, these are called human-readable documents.
Machine-readable documents Instead of writing the data the form is marked in some way, (MC paper, barcodes
etc), the document is then passed through a reader or scanner, which can identify where the marks are, for a
barcode, it is passed over a scanner, which converts the pattern of lines into a binary code.
Turnaround documents This is printed by a computer system but is later used to input new data into the same
system. Search a system for info, generate a report, send to customer, customer add extra info and return it.
Book - Heinemann info tech for csec
From next bookData can be captured using machine readable or human readable documents. Machine readable documents are
documents that a computer can read. Human readable documents are documents that a human can read.
Source doc this is a doc used to capture information by writing it down. Source documents are human readable
which means that a person will read and enter information into that document.
Turnaround document this is a human readable and machine readable, a machine creates it and a human adds more
data or uses it as input for something else. The document is then read by a computer, which updates or processes
records with the new data.
Book info tech for csec by leo cato, jan
Next bk
Turnaround doc doc that a user returns to the company that has created and send it
Source doc doc that contains the original form of the data to be processed
Next book, oxford info tech- in a form that only a computer can process
Hard or softcopy that can be read and interpreted by humans
Type of Errors
1
2
3
WHILE
A< B
2
1
0
T
2,1
0
4
,
D3/
C2
,
D6/
2
5
3
4
T(2<5)
2,5
T(2<2.
5)
2,2.
5
4
,
2.5/
2
5
3
7
Prin
t
1
F(2<1.
5)
2,1.
25