Ict Al

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

CITY COLLEGE OF COMMERCE EDUCATIONAL COMPLEX

(CCCMANKON)
PRE-MOCK EXAMINATION
DECEMBER ADVANCED LEVEL
CANDIDATE NAME
SUBJECT NAME ICT
PAPER NUMBER 2
SUBJECT CODE 0796

TWO HOURS

Answer any FIVE questions.


All questions carry equal marks

1. (i) Briefly explain the following terms:


a) MODEM
b) Firewall
c) Router
d) Gateway (8marks)
(ii)
a) Storage devices are either optical or magnetic. List two examples of each of optical and magnetic. (2marks)
b) Describe one use of OCR to a secretary. ( 2marks)
c) Give one limitation of OCR. ( 2marks)
(iii) Explain one application of computers in each of the following domains
a) Tourism
b) Banking
c) Marketing ( 6marks)

2. (i) Describe the following with respect to database management systems:


a) Attributes
b) Data redundancy
c) Database normalization
d) Primary key ( 8marks)
(iii)
a) What is a prototype? ( 2marks)
b) Give two advantages of protoyping. ( 2marks)
c) State the three types of prototypes ( 3marks)
d) At which stage of SDLC is prototyping done? ( 1mark)
(iv) Differentiate between the following and give one example each.
a) System software and application software. ( 4marks)
3. (i)
a) With the aid of a diagram, showing all the components, describe the machine cycle. (2marks)
b) Explain the influence of RAM on machine performance. ( 2marks)
c) State one other component that can enhance machine performance. ( 2marks)
(ii) Give the functions of the following memory units, stating whether they are volatile or not:
a) EPROM
b) Cache memory
c) Registers ( 6marks)
(iii)
a) What is computer ethics? ( 2marks)
b) State one way to foster computer ethics in an institute. (2marks)
c) Discus two ethical obligations of users of an information system. (2marks)
d) Describe two computer crimes that are common in Cameroon. (2marks)

4. (i)
a) What is E-commerce? (2marks)
b) Outline any two e-banking systems provided to customers by banks in Cameroon. (2marks)
c) Explain the effect of digital divide in e-banking services in Cameroon. (2marks)
(ii) Describe the following job scheduling techniques used by the operating system, stating whether they are pre-
emptive or non-pre-emptive:
a) First come first serve
b) Round robin
c) Shortest job first. (6marks)
(iii)
a) Convert the binary number 1001111001 to octal(base 8). ( 2marks)
b) Convert the octal number 564 to hexadecimal(base 16). (2marks)
c) Evaluate the binary expression 1110100 + 110111. (2marks)
d) State De morgan’s laws. (2marks)

5. (i) Describe each of the following security measures and and state a situation in which they can be used.
a) Encryption
b) Firewall
c) Backup (6marks)
(ii) Explain each of the following approaches used during conversion to a new system.
a) Phased conversion
b) Direct conversion
c) Parallel conversion.
d) Pilot (8marks)
(iii)
a) Define an expert system. (2marks)
b) Describe the use of Expert System in a named domain. (2marks)
c) State and describe ONE other system that can be helpful to decision makers of an organization. (2marks).

6. (i)
a) Briefly explain what is meant by Integrated Development Environment (IDE). Give one example of an IDE.
(2marks)
b) Explain the difference between coding and encryption as used in computing. (2marks)
(ii) Mary and Paul went to the Botanic garden and Paul took some pictures with his phone. Paul decides to share
the pictures with Mary using the Bluetooth. This scenario describes a data communication system.
a) List the 5 components that make up a data communication system. (5marks)
b) Copy and make a match of the list below with the corresponding four of the components of data
communication identified in a) above.
 Pictures
 Paul’s mobile phone
 Mary’s mobile phone
 Bluetooth. (4marks)
(iii)
a) Explain the difference between data validation and data verification. Give two examples of each of the data
checks. ( 4marks)
b) Briefly explain the waterfall model in SDLC. Give one advantage and one disadvantage of the waterfall
model. (3marks)

7. (i) Study the logic circuit diagram below:

A P

a) What is the value of P in term of A and B? (2marks)


b) Draw the truth table of the logic circuit above in a) above (2marks)
c) Draw the circuit diagram for a NOR gate. (2marks)
(ii) Differentiate between the following
a) interrupt and polling
b) GUI and CLI (4marks)
(iii)
a) Copy and complete the table below by stating either the software type or example. (4marks)

No Software type Example


1 chrome
2 General purpose
3 Smadav
4 Language translators
b) What is an OS? (2marks)
c) Explain TWO functions of OS. (4marks)

8. (i)
a) What is deadlock as an operating system concept? ( 2marks)
b) Concurrent processes are executed in an operating system where they share the resources
A,B,C,D,E,F,G,H,R,S,T,U,W and X. The resource allocation is as follows:
 Process A holds resource R and wants S.
 B holds nothing and wants S
 C holds X wants S
 D holds U and wants S and T
 E holds T and wants V
 F holds W and wants S
 G holds V and wants U
 H holds nothing and wants W and X.
Draw a resource allocation graph following the description above. (10marks)
c) According to this graph, is there a possibility of deadlock, if yes, give deadlock cycle. If no, explain your
answer. (4marks)
d) State the conditions necessary for deadlock to occur. ( 4marks)

You might also like