Computer science A level GCE revision questions.

A LEVEL COMPUTER
SCIENCE PAST
QUESTIONS
CAMEROON GCE JUNE 2016 ICT Paper 2

1. (i)Explain the following computer
terms giving examples where necessary:
(a) Video conferencing
(b) Stock control system
(c) E-Learning

(ii) (a) Explain one stage of the machine
instruction cycle that takes place inthe
ALU of the CPU.

(b) Sketch the logic circuit for the logic
expression (P AND Q )OR(P AND Q ).

(a) What is software reuse with respect
to system development?

(b) State two criteria used to select
existing software for reuse.

(c)Explain two situations that may
cause organizations to engage in
externally
.
2) ) (a) Explain the main difference
between the peer-to-peer and the client/
server networks.

(b) Give two disadvantages of the
client/server network.

ii) (a) What is an Information System?

(b) Explain the term "/procedure"/ as a
component of an information system.

(c) ln terms of information system
describe GIS and LIS.

(i)(a)What is the main difference
between a high level language (HLL)
and a low level language (LLL)?

(b) Explain what is meant by machine
dependent.

Which of these languages is machine
dependent: HLL or LLL?

(c)Give one example of HLL.

3. (i) (a) What is SDLC?

(a) Automatic Speech recognition (ASR)

(b) HTML

(c) Artificial Intelligence (AI)

(d) Extranet

(e) MIS

(ii) (a) Explain the meaning of the form
"/Data Security"/.

(b)Describe how encryption will help to
protect information or a message which
is sent across a network.

9. ()Detine the following terms of
online Internet services giving TWO
advantages and ONE disadvantage of
each;

(a) E-Commerce

(b) E-Banking

(c)E-Health

ii) (a) What is a social network?

(b) Outline TWO advantages and ONE
limitation of social networking.

(iii)Explain the following errors that
can arise during programming:

(a)syntax errors

(b) run-time errothe

(c)State three activities involved in the
design stage of SDLC.

(ii) (a) What is the role of a system
analyst in an organization?

(b)Describe two ways by which a
system analyst can get information
about a system to be developed

(ii) Discuss with examples three
changes in the workplace due to the
increased use of ICT. Your answer
should refer to the changes for the
employees;

4. i) (a) What is an operating system?

(b) Explain the role played by the
operating system in the given instances
integrating additional hardware toa
computer system and Managing RAM
usage during processing.

ii) (a) What is a computer interface?

(b) Give the characteristic of the
Graphical User Interface.

(c) State two advantages of GUT over
Command Line.

(i) Explain the effect and the
consequences on computer system in
the absence of each of the following:
(a) RAM
(b)Buffers
(c) NJC
Váv) (a) What is memory?
(b) Describe the purpose of ROM in the
computer system.

5. i)Structured programming refers to
a general methodology of writing good
programs.
(a)What is programming?
(b) Give 4 properties of a good
program.

(ii)Describe briefly the following:
(a) Application software

(bVirtual reality

(c)Biometrics

ii) Give three advantages of
simulation.

iv)Write the full meaning of each of
the following abbreviations?
(a)ASCII

(b) PAN network

(c)EPROM

6. (i)It is usually necessary to compare
different implementations of an
algorithm to choose an optimal one.
This can be done by considering their
relative efficiencies.
(a) What is efficiency with regards to
algorithm performance
(b) Which two basic resources of a
computer can be used to measure the
efficiency of an algorithm?

(1i) (a)Describe simulation and a
situation that can be simulated.

(b) Give three advantages of simulation
to architects.

(ii)Work generally could be classified
into operations or project. Although in
some cases, they do overlap.

(a) Give any two characteristics
common to operations and project.

(b) Make a difference between
operations and project.

(iv)In a multiprogramming and time-
sharing environment, several users
share the same system simultaneously.
This situation can result to various
security problems.

(a) What are two such security
problems?

(b)Is it possible to ensure the same
degree of security in a time-shared
machine as in a dedicated machine?
Explain your answer.

7.i) During the late 1960s and
1970s, there had been an outcry over
impending "/software crises"|. The
symptoms of such software crises stil
exist in present day. List 4 symptoms of
software crises

(ii)Explain the following terms:
(a) Parity bit

(b) ARPNET

(c) Internet standard

(iii) (a) What is prototyping?

(b) List three benefits of prototyping

(iv)Given that a disk has 18 sectors,
80 tracks and a sector capacity of 512
bytes. Prove that the storage capacity of
the disk is 1.44MB.

8. (i) Explain briefly the meaning of
each of the following terms giving
examples where necessary.

(a) Automatic Speech recognition (ASR)

(b) HTML
(c) Artificial Intelligence (AI)
(d) Extranet
(e) MIS
(ii) (a) Explain the meaning of the form
"/Data Security"/.

(b)Describe how encryption will help to
protect information or a message which
is sent across a network.

9. ()Detine the following terms of
online Internet services giving TWO
advantages and ONE disadvantage of
each;
(a) E-Commerce
(b) E-Banking
(c)E-Health
ii) (a) What is a social network?

(b) Outline TWO advantages and ONE
limitation of social networking.

(iii)Explain the following errors that
can arise during programming:
(a)syntax errors
(b) run-time errors

Comments