You are on page 1of 8

Information Technology

January 2012
Answer Sheet
Section I (Theory) 60 MARKS
Question 1 Main components in a computer system
(a) Devices A F in Figure 1 are as follows:
A. Input device
B. Output device
C. Control Unit (CU)
D. Arithmetic Logic Unit (ALU)
E. Primary storage/Main memory
F. Secondary Storage
(6 marks)
(b) Hardware Specifications:
(i). Optical Drive LINE 3
(ii).Processor LINE 1
(2 marks)
(c) The ACCESS TIME for a MOVING HEAD DISC drive is GREATER than the ACCESS
TIME for a FIXED HEAD disc drive because the moving HEAD DISC has only one
read/write head for the multiple tracks on the disc which has to move back and forth in
turn increasing the SEEK TIME (recall: ACCESS TIME = SEEK TIME +
ROTATIONAL DELAY), while the FIXED HEAD DISC drive has one read/write head
for each track on the DISC. Therefore the FIXED HEAD DISC drive has minimal to no
SEEKTIME (no a factor).
(2 marks)
TOTAL 10 MARKS

Question 2 Conversion Systems


(a) Convert 2510 to:
(i). BINARY (BASE 2)
2
2
2
2
2
2

25
12
6
3
1
0

R1
R0
R0
R1
R1

2510 = 110012
(2 marks)
(ii).OCTAL (BASE 8)
8
8
8

25
3
0

R1
R3

2510 = 318
(2marks)
(iii).

HEXADECIMAL (BASE 16)

16
16
16

25
1
0

R9
R1

2510 = 1916
(2marks)

(b) BINARY ADDITION


1

0
1

1
0

1
1
2

Ans. = 1000002
(2marks)
(c) BINARY SUBTRACTION
1

0
1
1

1
0
1

1
1
0

Ans. = 101102
(2marks)
TOTAL 10 MARKS

Question 3 Fundamentals of Hardware and Software


(a) Devices and Usage
1. B
2. D
3. G
4. C
5. F
6. A
7. E
(7 marks)

(b) Biometric Systems


i. They are used as a method of DATA SECURITY. It is a type of
PHYSICAL RESTRICTION ACCESS that prevents unauthorized

persons from accessing restricted areas or confidential information such


as: RESEARCH or MILITARY or GOVERNMENT faculties where TOP
SECRET or SENSITIVE information is stored.
(1 mark)
ii. ONE TYPE of DATA THAT is collected : Retina scan/ Finger print/ Facial
scan/ Palm print/ Voice recognition
(1 mark)
iii. ONE benefit of a Biometric System over the traditional methods of collecting
is that: (1). only persons who are authorized to access will be the ONLY
ones who have access. OR (2). Biometric systems are able to give detail
account of usage such when, what and who.
(1 mark)
TOTAL 10 MARKS

Question 4 Data Communications


(a) Which Applications are associated to: Text, Hypertext, Audio or Visual.
i. VoIP Voice over Internet Protocol - AUDIO
ii. IRC Instant Relay Chat - TEXT
iii. WWW World Wide Wed HYPERTEXT
(3 marks)
(b) TECHNIAL TERMS
A. WEB PAGES/ HYPERLINKS
B. HOST/ WEB SERVER
C. BROWSER
D. UNISERVAL/ UNIFORM
E. RESOURCE
F. ENGINE
G. - DOWNLOAD

(7 marks)
TOTAL 10 MARKS

Question 5 Data Security, Data & Information


(a) THREE other methods that can be used to prevent unauthorized access to computer
facilities:
i. BIOMETRIC system
ii. PASSWORD
iii. FIREWALL
iv. GUARDS
(3 marks) ANY THREE OF THE ABOVE RESPONSES
(b) DATA INTEGRITY refers to the accuracy and consistency of data entered. While
DATA SECURITY refers to the methods used to protect data and information from
unauthorized accessed OR measures are therefore put in place to keep data safe and
accurate and also to limit access to users of said information.
(1 marks)
(c) FIREWALL
i. A FIREWALL is a software restriction method which is used to block
unauthorized individuals from a public network (internet) from gaining
access to a private network (intranet) of an organization. OR devices
controlled by software programs that check all the data communications
that come into and go out of the network. It blocks any communications
that do not match its rules.
(2 marks)
ii. TWO unwanted incidents that a FIREWALL can prevent:
a. HACKING means finding out weaknesses in a computer or
computer network and exploiting them. Hackers may be motivated by
a multitude of reasons, such as profit, protest, or challenge. A good

firewall will prevent hackers from accessing a computer.


b. COMPUTER FRAUD - Describes premeditated or conscious effort to
gain money/goods from computer systems.
c. ELECTRONIC EAVES DROPPING Describes the intentional
interception of information intended for use of others within a
computer system.
d. COMPUTER/INDUSTRIAL ESPIONAGE When a business spies
on its competitor in order to find out their product secret or business
plans.
e. DATA LOSS refers to unauthorized individual or disgruntled
employees who gain access to companys network and corrupt data
via a malicious data (i.e. virus, worm, Trojan house) which in turn
cause data loss.
f. THEFT refers to unauthorized individuals gaining access to data or
information on a companys network and steals it for financial gains.
(4 marks) any TWO of the above RESPONSES
TOTAL 10 MARKS

Question 6 Information Processing


A. Using the letters A,B, C or D:(i). Forms or documents that is an example of HARD COPIES: A, C & D (3 marks)
(ii).ONE form or document that is MACHINE READER: B (1 mark)
B. Using the letters A, B, C, or D identify ONE form or document that is an example of a :
(iii).

SOFT COPY B (1 mark)

(iv).

SOURCE DOCUMENT A or C (1 mark)

(v).TURNAROUND DOCUMENT D (1 mark)


C. Give ONE example of a piece of data found in:

(vi).

FORM A (PARTS REQUEST FORM) but not in FORM C (INVOICE

ORDER) : Parts Requisition Number or Make or Model or VIN number (1


mark)
(vii).

FORM A(PARTS REQUEST FORM), FORM B (PRO FORMA) and

FORM C(INVOICE ORDER) : Item Description or Quantity or Name of


Client or Name of Supplier (1 mark)
(viii).

FORM D (Confirmed INVOICE ORDER) but NOT in FORM B (PRO

FORMA):The Signature/Conformation of the Client (1 mark)


TOTAL 10 MARKS

SECTION II (PRODUCTIVITY TOOLS) 15 MARKS

Question 7 - Spreadsheet
A. RANGE - C2:C5 (1 mark)
B. = AVERAGE(B2:B5) or =AVERAGE(B2,B3, B4, B5) or =(B2+B3+B4+B5)/4 or
=SUM(B2:B5)/5 or =SUM(B2,B3, B4, B5)/5 (2 marks)
C. COMMA Formatting ( 1 mark)
D. COLUMN HEADING: POPULATION ( 1 mark)
E. = IF ( C2 > 40%, Good Access, Poor Access) OR
= IF (C2 <= 40%, Poor Access, Good Access) (3 marks)
TOTAL 8 MARKS
7

Question 8 DBMS
A. Data type for REG_DATE field DATE/TIME ( 1 mark)
B. PRIMARY KEY in VEHICLE table REG_NO (1 mark)
C. TAX_NO = G300 has a ENGINE_CC of 2000 (1 mark)
D. Query(2 marks)
Field:
Table:
Show:
Criteria:
OR:

MANUFACTURER
VEHICLE
YES
Toyota

REG_DATE
VEHICLE
YES
>#31/12/2008#

OR
Field:
Table:
Show:
Criteria:
OR:

MANUFACTURER
VEHICLE
YES
Toyota

REG_DATE
VEHICLE
YES
>2008

E. MANUFACTURER ( 1 mark)
F.

ENGINE_CC of the vehicle at the top of the top of sorted list : 125 (1 mark)

TOTAL 7 MARKS

You might also like