2017 Year 12 Computer Studies QP - 29.08
2017 Year 12 Computer Studies QP - 29.08
2017 Year 12 Computer Studies QP - 29.08
COMPUTER STUDIES
INSTRUCTIONS
1. Write you Index Number on the front page and inside the back flap of the Answer Booklet.
3. If you use extra sheets of paper, be sure to show clearly the question number(s) being answered
and to tie each sheet in your Answer Booklet at the appropriate places. Ensure that your Index
Number is written on the extra sheets.
4. Answer all the questions with a blue or black ballpoint pen or ink pen. Do not use red ink pen.
You may use a pencil only for drawing.
6. There are three sections in this paper. Sections A and B are compulsory. Note the options in
Section C.
SUMMARY OF QUESTIONS
1. In your Answer Booklet, circle the letter which represents the best answer. If you
change your mind, put a line through your first choice and circle the letter of
your next choice.
For example: 8 A B C D
2. If you change your mind again and like your first answer better, put a line through
your second circle and tick () your first answer.
For example: 8 A B C D
3. No mark will be given if you circle more than one letter for a question.
2. A type of program that allows parents as well as organizations to block out selected sites and set
time limits on internet access are called
A. filters.
B. plug-ins.
C. web utilities.
D. file transfer protocol.
3. Which of the following Information Technology (IT) professionals installs, maintains and
support IT systems such as T1 lines, routers and firewalls?
A. Web Engineers
B. Network Engineers
C. Database Administrators
D. Computer Programmers
4. A contract to buy software and make copies for use in an organisation, at a reduced price per
copy, is called
A. freeware.
B. shareware.
C. site license.
D. public domain.
5. An attempt to slow down or stop a computer system or network by flooding the system with
requests for information is called a
A. worm.
B. zombies.
C. trojan horse.
D. denial-of-service attack.
7. What is the key difference between Bluetooth, Wi-Fi and WiMax channels which forms
wireless communication?
A. Cost
B. Size
C. Distance
D. Technology
8. Which process do modems use to convert a computer’s digital signal into analog signals?
A. Digitisation
B. Modulation
C. Demodulation
D. Synchronisation
9. The process where received packets through network are rearranged in the original order is
called
A. Protocol.
B. Specification.
C. Packetisation.
D. Identification.
Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
4.
10. The networking strategy, where nodes have equal processing capabilities and can act as both the
client and a server is known as
A. terminal.
B. peer to peer.
C. client/server.
D. distributed processing.
11. Which of the following is a private network that connects more than one organisation?
A. Extranet
B. Internet
C. Intranet
D. Ethernet
A. Infrared
B. Bluetooth
C. Broadcast radio
D. Satellite communication
14. Which of the following type of variables are accessible to all procedures of a form in VB.Net
program?
A. Local
B. Global
C. Block level
D. Module-level
15. Which of the following Loop structure is not supported by VB.Net program?
A. For................Next
B. Do................Until
C. Do................While
D. For Each.......While
16. Which of the following are standard prefixes for the Button and Combo box controls
respectively?
A. btn and chb
B. btn and cbo
C. bto and cbo
D. cmd and cbo
17. A student is coding a program in VB.Net and wants to add a comment within the code to show
constant declaration. Which of the following is the best way for the student to comment?
A. “Constants are declared”
B. {Constants are declared}
C. Rem Constants are declared
D. Comment: “Constants are declared”
18. What would be the output if Sam enters 310 and 62?
A. Scholarship Granted
B. Sorry you do not qualify for scholarship
C. lblMessage.Text = “Scholarship Granted”
D. lblMessage.Text = “Sorry you do not qualify for scholarship”
19. Which of the following cloud computing service models provide access to application software
often referred to as on-demand software?
A. SaaS
B. PaaS
C. IaaS
D. HaaS
20. What is the term for restricting users so that they can only access the features they are assigned?
A. Allocation
B. Authorisation
C. Authentication
D. Administration
Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
6.
QUESTION 1 THE INTERNET AND THE WORLD WIDE WEB/ (10 marks)
CAREERS FOR COMPUTING PROFESSIONALS
(a) Identify one search tool commonly used today to acquire information online. (1 mark)
(b) Differentiate between World Wide Web and internet in relation to resources. (2 marks)
(c) Study the diagram below to answer the questions that follow.
(i) Identify the browser which is open in the above diagram. (1 mark)
(ii) State one reason why the requested page cannot open. (1 mark)
(iv) Identify the domain name from the URL in part (iii). (1 mark)
(b) Explain one reason why software piracy is a continuing trend in most countries. (2 marks)
(c) Explain how computers are used in Law Enforcement agencies. (2 marks)
(f) Explain why employees make up the largest category of computer criminals in
any organisation. (2 marks)
Ring (ii)
(1 mark)
Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
8.
SECTION B (continued)
(d) Differentiate between a bridge and a router in relation to network connectivity. (2 marks)
(b) Visual Basic is event driven. What does this mean? (1 mark)
(c) The first step to writing a good visual application is to have a good design of
the user interface. List the other two steps. (2 marks)
(d) Explain one difference between a Do/Loop and a For/Next loop. (2 marks)
(e) Describe when radio buttons are to be used instead of check boxes in a group
box. (2 marks)
(f) When a programmer starts executing a program, the first step is called compiling.
Define clean compile. (1 mark)
(b) Study the VB.Net programming code for btnArea and answer the questions
below.
End Sub
SECTION B (continued)
(b) Explain one benefit of cloud services for a telecommunication company. (2 marks)
(c) Describe how data ownership is one of the disadvantages for cloud storage
services. (2 marks)
(d) Explain the type of cloud computing distribution model used by Amazon Web
Services. (2 marks)
(e) Differentiate between iCloud and Google Drive services in terms of method of
data storage. (2 marks)
With the creation of the internet, the lifestyles of people around the globe have shown a
rapid and significant change.
what is social networking and give one example of social networking sites (2 marks)
LAN, WLAN, MAN, WAN and PAN are the five types of networks.
Turn Over
© MINISTRY OF EDUCATION, FY12CE 2017: COMPUTER STUDIES.
12.
SECTION C (continued)
In a digital world where internet users are increasing day by day, the security of database
has become a vital issue.
what computer ethics are and why they are important (2 marks)
two ways in which a database owner can protect a database against unauthorised
access; and (2 marks)
how copyright and copy protection can be used to address ethical issues (2 marks)
More businesses are shifting to adopt the cloud computing after recognizing the benefits
it can potentially offer.
With reference to the above statement, discuss each cloud services below, including one
advantage and one disadvantage:
Public (3 marks)
Private (3 marks)
Hybrid (3 marks)
THE END
____________________________________
COPYRIGHT: MINISTRY OF EDUCATION, FIJI, 2017.