Ict Al
Ict Al
Ict Al
(CCCMANKON)
PRE-MOCK EXAMINATION
DECEMBER ADVANCED LEVEL
CANDIDATE NAME
SUBJECT NAME ICT
PAPER NUMBER 2
SUBJECT CODE 0796
TWO HOURS
4. (i)
a) What is E-commerce? (2marks)
b) Outline any two e-banking systems provided to customers by banks in Cameroon. (2marks)
c) Explain the effect of digital divide in e-banking services in Cameroon. (2marks)
(ii) Describe the following job scheduling techniques used by the operating system, stating whether they are pre-
emptive or non-pre-emptive:
a) First come first serve
b) Round robin
c) Shortest job first. (6marks)
(iii)
a) Convert the binary number 1001111001 to octal(base 8). ( 2marks)
b) Convert the octal number 564 to hexadecimal(base 16). (2marks)
c) Evaluate the binary expression 1110100 + 110111. (2marks)
d) State De morgan’s laws. (2marks)
5. (i) Describe each of the following security measures and and state a situation in which they can be used.
a) Encryption
b) Firewall
c) Backup (6marks)
(ii) Explain each of the following approaches used during conversion to a new system.
a) Phased conversion
b) Direct conversion
c) Parallel conversion.
d) Pilot (8marks)
(iii)
a) Define an expert system. (2marks)
b) Describe the use of Expert System in a named domain. (2marks)
c) State and describe ONE other system that can be helpful to decision makers of an organization. (2marks).
6. (i)
a) Briefly explain what is meant by Integrated Development Environment (IDE). Give one example of an IDE.
(2marks)
b) Explain the difference between coding and encryption as used in computing. (2marks)
(ii) Mary and Paul went to the Botanic garden and Paul took some pictures with his phone. Paul decides to share
the pictures with Mary using the Bluetooth. This scenario describes a data communication system.
a) List the 5 components that make up a data communication system. (5marks)
b) Copy and make a match of the list below with the corresponding four of the components of data
communication identified in a) above.
Pictures
Paul’s mobile phone
Mary’s mobile phone
Bluetooth. (4marks)
(iii)
a) Explain the difference between data validation and data verification. Give two examples of each of the data
checks. ( 4marks)
b) Briefly explain the waterfall model in SDLC. Give one advantage and one disadvantage of the waterfall
model. (3marks)
A P
8. (i)
a) What is deadlock as an operating system concept? ( 2marks)
b) Concurrent processes are executed in an operating system where they share the resources
A,B,C,D,E,F,G,H,R,S,T,U,W and X. The resource allocation is as follows:
Process A holds resource R and wants S.
B holds nothing and wants S
C holds X wants S
D holds U and wants S and T
E holds T and wants V
F holds W and wants S
G holds V and wants U
H holds nothing and wants W and X.
Draw a resource allocation graph following the description above. (10marks)
c) According to this graph, is there a possibility of deadlock, if yes, give deadlock cycle. If no, explain your
answer. (4marks)
d) State the conditions necessary for deadlock to occur. ( 4marks)