ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER



Similar documents
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 May/June hours



0418/01 Paper 1 Specimen Paper 2007

1 PERSONAL COMPUTERS

Cambridge International Examinations Cambridge International General Certificate of Secondary Education

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Paper 1 May/June hours

MULTIPLE CHOICE FREE RESPONSE QUESTIONS

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 October/November hours

E-Booking at London International Airport

0417 INFORMATION AND COMMUNICATION TECHNOLOGY

INFORMATION SYSTEMS. Written examination. Friday 12 November 2004

Cambridge International Examinations Cambridge International General Certificate of Secondary Education

Information and Communication Technology

GCSE BITESIZE Examinations. General Certificate of Secondary Education ICT FOUNDATION TIER. Time allowed 1 hour 30 minutes Total marks: 90

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

GCSE BITESIZE Examinations. General Certificate of Secondary Education ICT HIGHER TIER. Time allowed 1 hour 30 minutes

Parts of a Computer. Preparation. Objectives. Standards. Materials Micron Technology Foundation, Inc. All Rights Reserved

THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals

Chap-02, Hardware and Software. Hardware Model

Graphic Communication

ICT THEORY 4 MAIN AREAS

Software Engineering. Data Capture. Copyright BCA Notes All Rights Reserved.

Alternative Methods Of Input. Kafui A. Prebbie 82

0417 INFORMATION AND COMMUNICATION TECHNOLOGY 0417/01 Paper 1 (Written), maximum raw mark 120

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

Prof. Dr. M. H. Assal

CHAPTER 3: HARDWARE BASICS: PERIPHERALS

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level. Paper 1 May/June hour 15 minutes

Chapter 5 Objectives. Chapter 5 Input

Basics of Computer 1.1 INTRODUCTION 1.2 OBJECTIVES

Remote Deposit Terms of Use and Procedures

TH2. Input devices, processing and output devices


The Keyboard One of the first peripherals to be used with a computer and is still the primary input device for text and numbers.

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:

WHAT You SHOULD KNOW ABOUT SCANNING

Module 1 Concepts of Infor mation Technology (IT) Module Goals

Discovering Computers. Technology in a World of Computers, Mobile Devices, and the Internet. Chapter 7. Input and Output

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

Chapter 3: Computer Hardware Components: CPU, Memory, and I/O

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

Overview of MIS Professor Merrill Warkentin

Chapter 3 Input Devices

SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers.

THE SOCIETY OF BUSINESS PRACTITIONERS

Desktop Publishing 5N0785 Learning Outcome 2 Monaghan Institute Level 5 Module

ELECTRONIC DOCUMENT IMAGING

Tomorrow s Technology and You

The Keyboard One of the first peripherals to be used with a computer and is still the primary input device for text and numbers.

SPECIMEN A451 GENERAL CERTIFICATE OF SECONDARY EDUCATION COMPUTING. Duration: 1 hour 30 minutes. Unit A451: Computer systems and programming

Internet and Computing Core Certification Guide Module A Computing Fundamentals

Chapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard

Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives

Input and Output. Chapter 6

Information and Communication Technology

Cambridge International Examinations Cambridge International General Certificate of Secondary Education

Machine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory.

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

THE BUSINESS VALUE OF AN ERP SYSTEM

S7 for Windows S7-300/400

W.A.R.N. Passive Biometric ID Card Solution

COMPUTER - INPUT DEVICES

SYLLABUS. Cambridge O Level Computer Science. Cambridge Secondary 2

Introduction to Computers, Anatomy of Computers, Input and Output Devices

ERA6 OBJECTIVE QUSESTION

2015 HSC Information and Digital Technology Web and software applications Marking Guidelines

0417 INFORMATION AND COMMUNICATION TECHNOLOGY

0417 INFORMATION AND COMMUNICATION TECHNOLOGY

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system

Programming Logic controllers

10.1 FUNCTIONS OF INPUT AND OUTPUT DEVICES

Viruses, Worms, and Trojan Horses

CIS Mid Semester Examinations

Leonardo Hotels Group Page 1

HC Emission Protected Security Workstation

Information and communication technology (ICT) skills audit for returning teachers

SYLLABUS. Cambridge IGCSE Computer Science. Cambridge Secondary 2

Cathay Business Online Banking Quick Guide

SYLLABUS. Cambridge O Level Computer Science. Cambridge Secondary 2

State of Michigan Document Imaging Guidelines

COMPUTER SCIENCE (5651) Test at a Glance

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation

The Open University of Tanzania Faculty of Business Management Master of Business Administration (MBA) OLG 612 ICT in Business Management

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?

Introduction to Information System

Chapter One Introduction to Computer

=

Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP

COURSE OUTLINE COMPUTER INFORMATION SYSTEMS 1A. PREREQUISITE: None. Concurrent enrollment in CIS-96 or CIS-97 is recommended.

Patrol Master Software

SAMPLE ELECTRONIC DISCOVERY INTERROGATORIES AND REQUESTS FOR PRODUCTION

Retail POS User s Guide. Microsoft Dynamics AX for Retail

Transcription:

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials: Multiple choice answer sheet Soft clean eraser Soft pencil (type B or HB is recommended) Time: 1 hour INSTRUCTIONS TO CANDIDATES Do not open this booklet until you are told to do so. Write your name, Centre number and candidate number on the answer sheets in the spaces provided unless this has already been done for you. There are forty questions in this paper. Answer all questions. For each question there are four possible answers, A, B, C and D. Choose the one you consider correct and records choice in soft pencil on the separate answer sheet provided. Read very carefully the instructions on the answer sheet. INFORMATION FOR CANDIDATES Each correct answer will score one mark. A mark will not be deducted for a wrong answer. Any rough working should be done in this booklet. ZIMSEC This question paper consists of 10 printed pages and 1 blank page. Copyright: Zimbabwe School Examinations Council [Turn over

2 1. Which two input devices can be used to transfer images into the computer? A. Touchpad and keyboard B. Microphone and scanner C. Scanner and digital camera D. Digital camera and touchpad 2. Which input device is most convenient for a visually impaired person to enter data into a computer? A. Standard keyboard B. Microphone C. Magnetic Ink Character Reader D. Optical character reader 3. Which of the following items is used to store personal data? A. Graphics tablet B. ROM chip C. Product bar code D. Magnetic strip on a credit card 4. Which of the following truth tables is derived from an AND logic gate which receives two inputs A and B? A. INPUTS OUTPUTS B. INPUTS OUTPUTS A B A B 1 1 1 1 1 0 1 0 1 1 0 1 0 1 1 0 1 1 0 0 0 0 0 1 C. INPUTS OUTPUTS D. INPUTS OUTPUTS A B A B 1 1 1 1 1 0 1 0 0 1 0 0 0 1 0 0 1 0 0 0 0 0 0 1

3 5. From the symbols listed below, identify an OR logic gate. 6. Choose a printer that is most suitable for producing monthly electricity bills by an electricity company with thousands of customers. A. Line printer B. Laser printer C. Dot matrix printer D. Inkjet printer 7. Which arrangement best represents storage devices when sorted in order of increasing access speed? A. Compact disk, Random Access Memory, Magnetic Tape, Hard disk. B. Random Access Memory, Hard disk, Compact disk, Magnetic tape C. Hard disk, Compact disk, Random Access Memory, Magnetic tape D. Magnetic tape, Compact disk, Hard disk, Random Access Memory. 8. When the denary number 19 is converted to its binary form and represented in 8- bit format it becomes A. 01010011 B. 10011011 C. 00010011 D. 10010011

4 9. Which of these tasks is NOT suited to run under a real- time operating system? A. Monitoring a patient s vital signs e.g. breathing rate B. Guiding an aircraft C. Producing electricity bills D. Arranging airline bookings 10. Select one statement which is true about a Graphical User Interface. A. it is harder to use than command- line interface. B. it does not allow many programs to be held in RAM at the same time. C. It is easy to set up batch files to configure them. D. It needs more RAM than command- line interface. 11. Which of the following tasks CANNOT be performed by a hospital patient monitoring system? A. Monitoring the heartbeat. B. Monitoring breathing rate. C. Control vital signs to stabilize conditions D. Monitoring temperature. 12. Flight simulators are used to train pilots. Choose the most appropriate reason why flight simulators are used. A. Flight simulators are more realistic than flying an actual plane. B. Situations can be modeled that are rare in real life. C. The modeled plane behaves more unpredictably. D. It is easier to fly a virtual plane. 13. A data logging system is different from a process control system in that: A. It uses sensors to collect data from the environment. B. It provides accurate measurement of physical quantities. C. It does not analyze collected data D. Data can be collected in the absence of humans. 14. In an expert system, searches, comparisons and deductions are performed by the A. Knowledge base B. Knowledge Acquisition Program C. User Interface D. Inference engine

5 15. Why is it a mistake to use a text data type to store money values? A. The dollar sign cannot be displayed. B. The decimal place cannot be displayed. C. The calculations cannot be performed. D. The data cannot be sorted. 16. Which of the following computer crimes is NOT directly linked to hacking? A. Industrial espionage B. Introduction of viruses C. Computer fraud D Software piracy 17. Verification differs from validation in that it ensures that input data is A. without transcription errors B. reasonable C. transmitted without errors. D. processed by the system. 18. The most recent application developments that have allowed the disabled to have easy access to computer systems are: A. speech recognition and speech output software. B. Braille keyboard software and graphical user interface. C. Braille software and image processing D. word processing and spreadsheet software. 19. A school has sought your advice on the best ways to guard its computers against computer viruses. Which of the following recommendations would you NOT consider? A. Installing anti- virus programs B. Scanning external storage devices for viruses before use. C. Backing up data. D. Installing firewalls.

6 20. A student wishes to calculate a check digit on a code number 1085 using Modulus 11. He assigns weights 2, 3, 4 and 5 to the code digits from the left most digit with their corresponding weights. He then divides the sum by 11 and takes the remainder as the check digit. The check digit obtained and assigned to the code is: A. 4 B. 1 C. 45 D. 5 21. System input screen layouts are usually drawn during A. analysis B. design C. implementation D. investigation 22. Which of the system development activities is likely to take place during the investigation stage? A. design of program flowcharts B. writing of code. C. record inspection D. training of staff 23. When a new system is run side- by- side with the old system, this is called A. pilot running B. module testing C. direct changeover D. parallel running 24. During the running of developed programs, it was discovered that the programs did not produce expected output. To correct the problem, the programmers needed to A. check the programs for syntax errors B. change program translators C. check hardware for errors D. test programs for logical errors with test data and compare outputs with expected results

7 25. A diagram that represents an algorithm is called A. a program flow chart B. a system flow chart C. a sequence flow diagram. D. an entity relation diagram 26. In an algorithm, some statements may need to be executed repeatedly until a set of conditions is met. Which of the following program constructs does NOT require repeated execution of statements? A. While... End While B. Repeat... Until C. If... Then... End If D. For... Next 27. A company provided its users with a network that can be accessed from all its offices worldwide. This network is A. a local area network B. a metropolitan area network C. a wide area network D. an intranet 28. Why is it a good idea NOT to open email from unknown sources? A. Opening them will lead to more junk e- mail. B. Opening them will waste space on the hard disk. C. Opening them may reveal passwords. D. The e-mails may carry viruses 29. Which item information is NOT represented on barcodes found on supermarket products? A. Check digit B. Company code C. Product code D. Product price

8 30. A school is faced with increasing costs of internet access. Which of the following aspects would you NOT recommend to reduce costs of internet access? A. Download files and read off-line. B. Compress files and use broadband technology during transmission. C. Access graphics and music files on-line. D. Use the internet during slack periods eg at night or weekends 31. Broadband network connections means A. more bits of data are transmitted per second B. thicker cables are used C. more cables are used. D. fibre- optic cables are used 32 Mobile phones are now widely used in Communication Technology. Which of the following mobile phone applications is NOT linked to Communication Technology? A. graphics transmission B. Sending text messages C. Internet access and information browsing D. taking photographic pictures 33. Choose the most appropriate advantage of using the Internet for research from the ones given below: A. the data is always up to date. B. it is possible to see the latest research. C. the data is always reliable. D. the data has been written by experts. 34. An internet user is worried that his files sent over the internet are being intercepted by hackers or investigators. What would you recommend to reduce the risk of this invasion to privacy? A. to use encryption techniques during transmission. B. to change his ISP regularly C. to set the browser to disallow cookies D. to increase the level of security settings on the browser.

9 35. User documentation is designed to help users to learn how to use the software or system. Which one of the following is not part of user documentation? A. How to log in/ log out. B. How to load/ run the software. C. Program listing / coding. D. How to sort data. 36. Select a combination of software that could be used in the creation of mailmerged letters. A. Database and Spreadsheet B. Graphics package and word processing C. Presentation package and word processing D. Word processing and database. 37. Which field would be the best choice as the key field of a students performance record system in a school? A. Student surname B. Student admission number C. Date of birth D. Birth- entry number 38. In a spreadsheet, cell C12 contain the value 6, D12 contains the value 12 and E12 contains the value 10. Cell F12 contains the expression = C12 * D12 E12. What is the value displayed in cell F12? A. 62 B. 12 C. -12 D. 8 39. Choose the correct order of the stages involved in systems analysis. A. Fact finding, Feasibility study, Analysis phase, System design. B. System design, Analysis phase, Feasibility study, Fact finding C. Analysis phase, Feasibility study, System design, Fact finding. D. Feasibility study, System design, Fact finding, Analysis phase

10 40. Which of the following activities is NOT done under the design stage. A. Data Preparation B. Parallel running C. Code design D. File design

11 BLANK PAGE