L6 Paper 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Engineer Nyamz +265994961051

ENGINEER NYAMZ HIGH SCHOOL


MID OF TERM EXAMINATIONS 2021
Advanced Level

LOWER 6
COMPUTER SCIENCE 6023/1
Paper 1 3 hours

Mid Term Paper


TIME 2 hours
Additional materials: 30 minutes
answer paper

TIME 3 hours

INSTRUCTIONS TO CANDIDATES
Write your name, Centre number and candidate number in the spaces provided on the answer
paper/answer booklet.
Answer all questions.
Write your answers on the separate answer paper provided.
If you use more than one sheet of paper, fasten the sheets together.
INFORMATION FOR CANDIDATES
The number of marks is given in brackets [ ] at the end of each question or part question.
You are reminded of the need for good English and clear presentation in your answers.
________________________________________________________________________
This question paper consists of 4 printed pages.
Copyright: Engineer Nyamz Computer Science Department 2021
©Engineer Nyamz
[Turn over

1
Engineer Nyamz +265994961051

1. (a) Show how the denary(decimal) numbers 13 and 32 would be represented as 8-bit

binary integers [2]

(b) Given that the ASCII code for the character ‘1’ is 00110001, show how the text string

‘1332’ would be held in a 4-byte word in a computer memory. [4]

(c) Translate the BCD number 0110 0111 1001 0101 to decimal [2]

(d) Subtract 23 from 123 in binary [3]

(e) Nomrmalise – 12.1875 using a 12 bit mantissa and 6 bit exponent [4]

2. Explain the term:

(a) IP address [2]

(b) Domain Name System (DNS) [2]

(c) NetID and HostID [2]

(d) File Transfer Protocol [2]

3. (a) Define Cloud Computing [2]

(b) State any four benefits of Cloud Computing? [8]

(c) Give any two disadvantage of Cloud Computing [2]

4. (a)Explain the principle of operation of passive and active electronic components [4]

(b) Describe the functions of processor components [6]

(c) Identify any two factors affecting processor speeds [4]

(d) Explain the importance of pipelining [2]

2
Engineer Nyamz +265994961051

5. The following is a logic circuit

X
C

(a) Write a Boolean expression that describes the above logic circuit. [2]

(b) Write a logic statement that describes the above logic circuit. [2]

(c) Draw the truth table for the above logic circuit [5]

6. (a) Given the following tree, construct a binary tree

14, 25, 31, 45, 19, 4, 16, 2, 8, 26 [5]

(b) Write the result of the binary tree above(a)

(i) In-order traversal [1]

(ii) Post-order traversal [2]

(iii)Pre-order traversal [2]

7. (a) Give five possible threats to a computer system. [5]

(b) Give solutions to threats identified in (a). [5]

8. A database may be considered from several different levels of views known as schemas.

(a) Explain the terms

(i) external schema, [1]

(ii) conceptual/logical schema, [2]

3
Engineer Nyamz +265994961051

(iii) internal/storage schema. [2]

(b) Data integrity is very important when processing data using computer systems.

(i) Define the term data integrity. [1]

(ii) Outline any two ways in which data integrity may be compromised. [2]

(iii)Name any two methods for ensuring the integrity of data. [2]

9. (a) Describe how e-commerce works. [2]

(b) Explain how the use of e-commerce could be beneficial to an organisation. [4]

(c) Discuss the effects of computerisation of a bank from the user’s point of view [4]

You might also like