Anda di halaman 1dari 14

COMPUTER TECHNOLOGY 29TH NOVEMBER 2009

MARKING SCHEME
This Marking Scheme has been prepared as a guide only to markers. This is not a set of model answers; nor is the Marking Scheme exclusive, for there will frequently be alternative responses which will provide a valid answer. Unless a question specifies that an answer be produced in a particular form, then an answer that is correct, factually or in practical terms, must be given the available marks. If there is doubt as to the correctness of an answer the relevant NCC Education materials and associated module textbook should be the first authority.

Throughout the question, please credit any valid alternative point.

Notice to Markers Where markers award half marks in any part of a question they should ensure that the total mark awarded for a task is rounded up to a whole mark.

SECTION A - 1 ANSWER ALL QUESTIONS FROM THIS SECTION EACH QUESTION REQUIRES ONE ANSWER ONLY
For each question enter ONE capital letter ONLY in your answer booklet. Marks

QUESTION 1
A company sells books online. It has no physical retail outlets. Its information systems which drive this activity can therefore be described as: A) strategic C) mission critical B) managerial D) knowledge based

Answer C QUESTION 2 Software that solves real-world problems for users is: A) systems software C) translators B) applications D) loaders Answer B QUESTION 3 A program that is as the programmer has written it is known as: A) object code C) low level code B) machine code D) source code Answer D QUESTION 4 A program and its data which are ready to run is called a: A) process C) system B) job D) stream Answer B QUESTION 5 When multiple computers cooperate to share resources, this is known as: A) multiprocessing C) a distributed system D) time sharing B) multiprogramming Answer C QUESTION 6 In some devices, a method is used for storing numbers in binary format, where groups of 4 bits represent the decimal numbers 0-9 only. This method is known as: A) hexadecimal C) EBCDIC B) octal D) binary coded decimal Answer D

QUESTIONS CONTINUE ON NEXT PAGE Page 2 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

Marks QUESTION 7 A web browser uses an MP3 plug-in to play a music file downloaded from a web site. The plug-in 1 interacts with the web site via the: A) application layer C) network layer B) physical layer D) transport layer Answer A QUESTION 8 Which of the following will typically make use of public communication links? A) SAN C) WAN B) LAN D) WLAN Answer C QUESTION 9 Which of the following is a compression standard for video and audio? A) MPEG C) MP3 B) JPEG D) GIF Answer A QUESTION 10 Which of the following is a long distance wireless method of connecting to a network? A) ADSL C) WiFi B) Bluetooth D) WiMax Answer D

Total 10 Marks

QUESTIONS CONTINUE ON NEXT PAGE Page 3 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

SECTION A 2 ANSWER ALL QUESTIONS FROM THIS SECTION EACH QUESTION REQUIRES MORE THAN ONE ANSWER Marks QUESTION 11 Which THREE (3) of the following are PRIMARY business activities? A) inbound logistics B) operations C) marketing and sales D) procurement E) technological development F) human resource management Answer A), B), C) 3 points, 1 mark each QUESTION 12 Which THREE (3) of the following examples of software might be used directly by a programmer in developing a new program? A) a linker B) a scheduler C) an editor D) an interpreter E) a loader F) a memory manager Answer A), C), D) 3 points, 1 mark each QUESTION 13 Systems software tends to become larger with each release. Which THREE of the following are disadvantages that result from this trend? A) more errors are introduced B) it becomes more difficult to use C) it poses compatibility problems D) it uses more CPU time E) it is not appropriate for some small devices F) it requires the purchase of new peripherals Answer A), D), E) 1 mark each, max 3 QUESTION 14 Which THREE (3) of the following activities are suitable for batch processing? A) keeping track of a heart monitor B) running an autopilot C) processing a payroll D) printing examination certificates E) controlling traffic lights F) processing electricity bills Answer C), D), F) 1 mark each, max 3
QUESTIONS CONTINUE ON NEXT PAGE Page 4 of 14
Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

Marks QUESTION 15 Which THREE (3) of the following are components of a three tier application? A) the presentation interface B) the business logic C) the operating system D) a compiler E) a business strategy F) the database Answer A), B), F) 1 mark each, max 3 QUESTION 16 Which THREE (3) of the following are phases of connection-mode communications? A) error checking B) connection establishment C) connection release D) data transfer E) packet creation F) route determination Answer B), C), D) 1 mark each, max 3 QUESTION 17 Which THREE (3) of the following are acceptable IP addresses? A) 257.88.78.123 B) 0.8.78.67 C) 45.65.78.34.56 D) 23.67.134.250 E) 255.255.255.255 F) 1.34.234 Answer B), D), E) 1 mark each, max 3 QUESTION 18 Which THREE (3) of the following are web browsers? A) Acrobat B) Power Point C) Internet Explorer D) Opera E) FTP F) Firefox Answer C), D), F) 1 mark each, max 3 3

QUESTIONS CONTINUE ON NEXT PAGE Page 5 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

Marks QUESTION 19 The following is an entity relation diagram: 3

Which THREE (3) of the following statements about this diagram are true? A) it shows three entities B) it relates to a fully normalised relational database C) a student can have many teachers D) a teacher can have many students E) a course is taught by only one teacher F) a student may take more than one course Answer A) ,D), F) 1 mark each, max 3 QUESTION 20 Which THREE (3) of the following activities are part of data mining? A) error correction B) data classification C) validation D) cluster analysis E) verification F) regression analysis Answer B), D), F) 1 mark each, max 3

Total 30 Marks

QUESTIONS CONTINUE ON NEXT PAGE Page 6 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

SECTION B ANSWER ANY THREE QUESTIONS FROM THIS SECTION QUESTION 21 Throughout the question, please credit any valid alternative point. a) i) State the TWO (2) components of a signed integer as stored in a computer system. sign magnitude 2 points, 1 mark each, max 2. Marks

ii) Describe the steps taken to convert a negative decimal (denary) number to a twos complement binary number. convert the denary number to binary change all the 0s to 1 and the 1s to 0 add 1 Any 3 points, 1 mark each, max 3. iii) Explain why the hexadecimal system is often used to represent the contents of memory locations to human readers. binary is awkward binary uses many digits / hexadecimal uses fewer digits hexadecimal easily translates to binary / or vice versa Any 2 points, 1 mark each, max 2. iv) Explain how to convert a binary word into a hexadecimal value. start at the right hand end convert each block of 4 binary digits into a hex value between 0 - 15 0-9, A-F 4 points, 1 mark each, max 4. v) Explain how a number is stored in floating point format. stored in three parts exponent - stores the power to which the number is raised mantissa the fractional part sign positive or negative 1 mark each, max 4.

vi) State THREE (3) potential problems associated with storing numbers in floating point form. they may not be exact / may be rounded they take up more storage space than integers they require more processing 3 points, 1 mark each, max 3.

QUESTIONS CONTINUE ON NEXT PAGE Page 7 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

Marks b)

Explain how ASCII code is used to store characters. stored as an integer 7 bit code each code represents a character Any 2 points, 1 mark each, max 2.

Total 20 Marks

QUESTIONS CONTINUE ON NEXT PAGE Page 8 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

QUESTION 22 Throughout the question, please credit any valid alternative point. a) i) State FOUR (4) main functions of the file management part of an operating system. keeps track of all files controls sharing / enforces protection of files manages / allocates disk space maps logical file addresses to physical disk addresses 4 points, 1 mark each max 4.

Marks

ii) Files can be stored on disks as a contiguous sequence of bytes. Explain why this method is not usually used. inflexible as file grows, it may need to be moved moving may not be possible large parts of the disk may not be usable processing may take longer Any 3 points, 1 mark each max 3. iii) Explain why viruses which damage files are more of a problem with Windows based computers than with Unix based computers. to damage files, the virus must have suitable privileges UNIX offers stronger file protection / gives more control over privileges Windows is the largest O/S on the market, most viruses are designed for the most common platform. Any 2 points, 1 mark each max 2. b) i) Describe what a device driver is. software concerned with input/output works with operating system acts as bridge between a device and the capabilities of the OS releases programmers from the need to understand electronics of new devices Any 3 points, 1 mark each, max 3.

ii) Describe the two main categories of I/O devices, and briefly discuss how they function. block devices block devices can be addressed in blocks in random order character devices character devices deliver or accept stream of characters with no structure 4 points, 1 mark each, max 4.

QUESTIONS CONTINUE ON NEXT PAGE Page 9 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

iii) In terms of operating systems, explain what is meant by deadlock. a group of processes have been granted exclusive access to resources each process wants another resource the other resource is held by another process it is therefore unavailable the processes will not run again Any 4 points, 1 mark each, max 4.

Marks 4

Total 20 Marks

QUESTIONS CONTINUE ON NEXT PAGE Page 10 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

QUESTION 23 Throughout the question, please credit any valid alternative point. a) i) Explain what is meant by the term software engineering. the creation of software in a controlled / disciplined manner keeps standards Any 2 points, 1 mark each, max 2.

Marks

ii) State the primary objectives of the software design process. produce models analyse / evaluate models examine alternatives / trade offs plan the development activities Any 3 points, 1 mark each, max 3. iii) Identify FOUR (4) software tools that are used in the construction of new software. editor version control software debugger code generator compiler tools for path and coverage analysis test scaffolding documentation tools Any 4 points, 1 mark each, max 4.

QUESTIONS CONTINUE ON NEXT PAGE Page 11 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

b) i)

Identify and describe THREE (3) types of program maintenance. corrective fix faults adaptive modify for new needs perfective improve performance / usability preventive modification to detect and correct hidden faults

Marks 6

3 methods, 1 mark each, max 3 3 comments, 1 mark each, max 3 Question total 6. ii) Describe the role of the business analyst in the development of computer systems. 5 needs to understand the business propose better solutions propose new applications propose new policies propose new solutions reduce waste improve efficiency document requirements arrange for projects to be completed on time Any 5 points, 1 mark each, max 5. Total 20 Marks

QUESTIONS CONTINUE ON NEXT PAGE Page 12 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

QUESTION 24 Throughout the question, please credit any valid alternative point. a) i) Explain what is meant by data compression. reduction in the space taken by data 1 mark.

Marks

ii) Identify TWO (2) reasons why data may need to be compressed. to reduce storage requirements to reduce transmission times 2 points, 1 mark each, max 2. iii) Identify THREE (3) ways by which a compression method can be evaluated. the degree of reduction in file size the quality of the compressed file / whether it is good enough for purpose the speed of compression 3 points, 1 mark each, max 3. iv) Explain the difference between lossy and lossless compression. lossy involves the removal of some data the original cannot be restored lossless keeps all the data (but encodes it in some way) the original can be restored 4 points, 1 mark each, max 4.

2 b) i) In terms of networking, explain what is meant by a protocol. rules / standards affect the communications between devices 2 points, 1 mark each, max 2. 2

ii) Briefly discuss the purpose of FTP. used for copying of files between two computers suitable for large files which cant be sent as email attachments (>10Mb) works over any geographical distance - transfer over Internet or IP network Any 2 points, 1 mark each, max 2.

QUESTIONS CONTINUE ON NEXT PAGE Page 13 of 14


Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

iii) Explain the purpose of the Domain Name System (DNS). allows the allocation of host names used in place of numerical IP address 2 points, 1 mark each, max 2. iv) Identify any FOUR (4) components of an email message. senders address recipients address subject date / time message attachment Any 4 points, 1 mark each, max 4.

Total 20 Marks

END OF PAPER

Page 14 of 14
Computer Technology Marking Scheme NJ December 2009 16/10/2009 Final NCC Education Ltd 2009

Anda mungkin juga menyukai