2017 Year 12 Computer Studies QP - 29.08

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

MINISTRY OF EDUCATION

FIJI YEAR 12 CERTIFICATE EXAMINATION 2017

COMPUTER STUDIES

Time Allowed: 3 hours


(An extra 10 minutes is allowed for reading this paper)

INSTRUCTIONS

1. Write you Index Number on the front page and inside the back flap of the Answer Booklet.

2. Write all your answers in the Answer Booklet provided.

3. If you use extra sheets of paper, be sure to show clearly the question number(s) being answered
and to tie each sheet in your Answer Booklet at the appropriate places. Ensure that your Index
Number is written on the extra sheets.

4. Answer all the questions with a blue or black ballpoint pen or ink pen. Do not use red ink pen.
You may use a pencil only for drawing.

5. You may use a calculator, provided it is silent, battery-operated and non-programmable.

6. There are three sections in this paper. Sections A and B are compulsory. Note the options in
Section C.

SUMMARY OF QUESTIONS

SECTION GUIDELINES MARK SUGGESTED


TIME
There are twenty multiple-choice questions.
A 20 36 minutes
All the questions are compulsory.

There are six short answer questions.


B 60 108 minutes
All the questions are compulsory.

There are four essay questions.


C 20 36 minutes
Answer any two questions.

TOTAL 100 180 minutes

COPYRIGHT: MINISTRY OF EDUCATION, FIJI, 2017.


2.

SECTION A [20 marks]


The multiple-choice questions are all compulsory. Each question is worth 1 mark.

INSTRUCTIONS FOR MULTIPLE-CHOICE QUESTIONS

1. In your Answer Booklet, circle the letter which represents the best answer. If you
change your mind, put a line through your first choice and circle the letter of
your next choice.

For example: 8 A B C D

2. If you change your mind again and like your first answer better, put a line through
your second circle and tick () your first answer.

For example: 8 A B C D

3. No mark will be given if you circle more than one letter for a question.

1. An e-mail program allows


A. users to access and view web pages on the internet.
B. geographically separated people to transfer audio and video.
C. real-time exchange of messages or files with another online user.
D. transmission of messages and files via a network such as the internet.

2. A type of program that allows parents as well as organizations to block out selected sites and set
time limits on internet access are called
A. filters.
B. plug-ins.
C. web utilities.
D. file transfer protocol.

3. Which of the following Information Technology (IT) professionals installs, maintains and
support IT systems such as T1 lines, routers and firewalls?
A. Web Engineers
B. Network Engineers
C. Database Administrators
D. Computer Programmers

© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.


3.

4. A contract to buy software and make copies for use in an organisation, at a reduced price per
copy, is called
A. freeware.
B. shareware.
C. site license.
D. public domain.

5. An attempt to slow down or stop a computer system or network by flooding the system with
requests for information is called a
A. worm.
B. zombies.
C. trojan horse.
D. denial-of-service attack.

6. Which of the following is a negative impact of computerization of society?


A. New jobs and job efficiency
B. Increase in quality of products
C. Exposure to unwanted activities
D. Overall increase in quality of living

7. What is the key difference between Bluetooth, Wi-Fi and WiMax channels which forms
wireless communication?
A. Cost
B. Size
C. Distance
D. Technology

8. Which process do modems use to convert a computer’s digital signal into analog signals?
A. Digitisation
B. Modulation
C. Demodulation
D. Synchronisation

9. The process where received packets through network are rearranged in the original order is
called
A. Protocol.
B. Specification.
C. Packetisation.
D. Identification.

Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
4.

10. The networking strategy, where nodes have equal processing capabilities and can act as both the
client and a server is known as

A. terminal.
B. peer to peer.
C. client/server.
D. distributed processing.

11. Which of the following is a private network that connects more than one organisation?

A. Extranet
B. Internet
C. Intranet
D. Ethernet

12. The acronym IDS stands for

A. Internet Denial Service.


B. Intrusion Directive System.
C. Intrusion Detection System.
D. Internet Development Software.

13. Which of the following is considered a line of sight communication medium?

A. Infrared
B. Bluetooth
C. Broadcast radio
D. Satellite communication

14. Which of the following type of variables are accessible to all procedures of a form in VB.Net
program?

A. Local
B. Global
C. Block level
D. Module-level

15. Which of the following Loop structure is not supported by VB.Net program?

A. For................Next
B. Do................Until
C. Do................While
D. For Each.......While

© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.


5.

16. Which of the following are standard prefixes for the Button and Combo box controls
respectively?
A. btn and chb
B. btn and cbo
C. bto and cbo
D. cmd and cbo

17. A student is coding a program in VB.Net and wants to add a comment within the code to show
constant declaration. Which of the following is the best way for the student to comment?
A. “Constants are declared”
B. {Constants are declared}
C. Rem Constants are declared
D. Comment: “Constants are declared”

Study the program given below and answer question 18.

If (intTotalMark>300) AND (intEnglishMark>=60) Then

lblMessage.Text = “Scholarship Granted”


Else
lblMessage.Text = “Sorry you do not qualify for scholarship”
Source: Personal Collection

18. What would be the output if Sam enters 310 and 62?
A. Scholarship Granted
B. Sorry you do not qualify for scholarship
C. lblMessage.Text = “Scholarship Granted”
D. lblMessage.Text = “Sorry you do not qualify for scholarship”

19. Which of the following cloud computing service models provide access to application software
often referred to as on-demand software?
A. SaaS
B. PaaS
C. IaaS
D. HaaS

20. What is the term for restricting users so that they can only access the features they are assigned?
A. Allocation
B. Authorisation
C. Authentication
D. Administration
Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
6.

SECTION B [60 marks]


The six questions in this section are all compulsory. Each question is worth 10 marks.

QUESTION 1 THE INTERNET AND THE WORLD WIDE WEB/ (10 marks)
CAREERS FOR COMPUTING PROFESSIONALS

(a) Identify one search tool commonly used today to acquire information online. (1 mark)

(b) Differentiate between World Wide Web and internet in relation to resources. (2 marks)

(c) Study the diagram below to answer the questions that follow.

Source: Personal Collection

(i) Identify the browser which is open in the above diagram. (1 mark)

(ii) State one reason why the requested page cannot open. (1 mark)

(iii) Name the URL, that user wants to access. (1 mark)

(iv) Identify the domain name from the URL in part (iii). (1 mark)

(d) Differentiate between a Software Designer and a Software Developer in


relation to the job performed. (2 marks)

(e) State one element needed in a communication system. (1 mark)

© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.


7.

QUESTION 2 COMPUTERS IN SOCIETY (10 marks)


(a) Define the term information society. (1 mark)

(b) Explain one reason why software piracy is a continuing trend in most countries. (2 marks)

(c) Explain how computers are used in Law Enforcement agencies. (2 marks)

(d) State the type of computer crime carder’s commit. (1 mark)

(e) Describe one way in which computer virus spreads. (2 marks)

(f) Explain why employees make up the largest category of computer criminals in
any organisation. (2 marks)

QUESTION 3 COMMUNICATION AND NETWORKS (10 marks)


(a) Complete the table in your answer booklet by describing the star topology and drawing the ring
topology.

Topologies Description Diagram


Star (i)
____________________
____________________
____________________
____________________
____________________
____________________
(2 marks)

Ring (ii)

Each device is connected


to other two devices

(1 mark)

Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
8.

SECTION B (continued)

(b) Define the following terms:

(i) Server (1 mark)

(ii) Switch (1 mark)

(iii) Bandwidth (1 mark)

(c) State two advantages of computers connected to network in an organisation. (2 marks)

(d) Differentiate between a bridge and a router in relation to network connectivity. (2 marks)

QUESTION 4 VISUAL BASIC.NET PROGRAMMING (10 marks)

(a) Explain how objects and properties are related. (2 marks)

(b) Visual Basic is event driven. What does this mean? (1 mark)

(c) The first step to writing a good visual application is to have a good design of
the user interface. List the other two steps. (2 marks)

(d) Explain one difference between a Do/Loop and a For/Next loop. (2 marks)

(e) Describe when radio buttons are to be used instead of check boxes in a group
box. (2 marks)

(f) When a programmer starts executing a program, the first step is called compiling.
Define clean compile. (1 mark)

© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.


9.

QUESTION 5 VISUAL BASIC.NET PROGRAMMING (10 marks)


(a) Study the VB.Net programming code for btnShow and answer the questions below.

Private Sub btnShow_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles btnShow.Click
Dim count As Integer
For count = 1 To 4
lblOutcome.Text = lblOutcome.Text & vbNewLine & “Education”
Next
End Sub

(i) What is the purpose of command vbNewLine? (1 mark)


(ii) What will the output of the program be when user presses btnShow? (2 marks)

(b) Study the VB.Net programming code for btnArea and answer the questions
below.

Private Sub btnArea_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles btnArea.Click
Line 1 Dim intlength,intwidth, intArea As Integer
Line 2 intlength = Integer.Parse(txtlength.Text)
Line 3 intwidth = Integer.Parse(txtwidth.Text)
Line 4 intArea = intlength + intwidth
Line 5 lblResult = intArea

End Sub

(i) Identify a line which shows


(a) logic error (1 mark)
(b) syntax error (1 mark)
(ii) After correcting the errors, 5 and 3 were fed in as length and width.
Display the output. (2 marks)

(c) Design a user interface that has following:

 two textboxes (txtNum1, txtNum2) to accept two numbers


 a display label (lblProduct) to display the product
 a button (btnProduct) to calculate the product
 an exit button
(3 marks)
Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
10.

SECTION B (continued)

QUESTION 6 MANAGING AND MAINTAINING DATA (10 marks)

(a) Define the terms:

(i) cloud computing (1 mark)

(ii) freemium model (1 mark)

(b) Explain one benefit of cloud services for a telecommunication company. (2 marks)

(c) Describe how data ownership is one of the disadvantages for cloud storage
services. (2 marks)

(d) Explain the type of cloud computing distribution model used by Amazon Web
Services. (2 marks)

(e) Differentiate between iCloud and Google Drive services in terms of method of
data storage. (2 marks)

© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.


11.

SECTION C [20 marks]


There are four questions in the section. Answer any two questions.
Each question is worth 10 marks. One mark is allotted for introduction and conclusion.
Write an essay of about 180-200 words to answer each question.

QUESTION 1 INTERNET AND THE WORLD WIDE WEB (10 marks)

With the creation of the internet, the lifestyles of people around the globe have shown a
rapid and significant change.

With reference to the above statement, discuss the following:

 what is social networking and give one example of social networking sites (2 marks)

 two advantages of social networking (2 marks)

 two disadvantages of social networking (2 marks)

 three effects of cyber-culture on people’s lifestyle (3 marks)

QUESTION 2 COMMUNICATIONS AND NETWORKS (10 marks)

LAN, WLAN, MAN, WAN and PAN are the five types of networks.

With reference to the above statement, discuss the following:

 any four types of networks (4 marks)

o use diagrams to support the discussion (2 marks)

 two advantages of LAN (2 marks)

 one disadvantage of WAN (1 mark)

Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
12.

SECTION C (continued)

QUESTION 3 COMPUTERS IN SOCIETY (10 marks)

In a digital world where internet users are increasing day by day, the security of database
has become a vital issue.

With reference to the above statement, discuss:

 what computer ethics are and why they are important (2 marks)

 two ways in which information from a database can be stolen (2 marks)

 one way in which data in a database can be misused (1 mark)

 two ways in which a database owner can protect a database against unauthorised
access; and (2 marks)

 how copyright and copy protection can be used to address ethical issues (2 marks)

QUESTION 4 MANAGING AND MAINTAINING DATA (10 marks)

More businesses are shifting to adopt the cloud computing after recognizing the benefits
it can potentially offer.

With reference to the above statement, discuss each cloud services below, including one
advantage and one disadvantage:

 Public (3 marks)

 Private (3 marks)

 Hybrid (3 marks)

THE END

____________________________________
COPYRIGHT: MINISTRY OF EDUCATION, FIJI, 2017.

You might also like