GIRLS SECONDARY, L-IMRIEĦEL HALF YEARLY EXAMINATIONS 2015/2016 FORM: 3 Computing Time: 1½ Hr. Name: Class: Instructions: 1. Answer all the questions in the space provided on this paper. 2. Calculators cannot be used for this exam. 3. Write neatly and clearly using a blue or black pen. Avoid the excessive use of correcting fluid. 4. You have 1½ hours to finish off this examination paper; use your time well allowing time for revision. 5. Do not staple the papers together. Good luck! Page 1 of 9
SECTION A Answer all questions. 1. Answer TRUE or FALSE. a. A microprocessor in a computer system has no moving parts. b. Computers are less efficient than humans at repetitive jobs. c. The computer changes incorrect data to give the correct results. d. Computer speed is measured in Gigabytes. e. General-purpose computers can perform only few tasks. (5 marks) 2. a. Three basic functions of a Computer System are Input, Process and Output. Name four other functions that a computer performs. i. ii. iii. iv. b. Give one advantage of using a Computer System. c. Give one disadvantage of using a Computer System. 3. a. Give an example of hardware and software. Hardware: Software: b. What is the difference between System software and Application software? c. Give an example of System software. (1 mark) Page 2 of 9
4. The type of interface used in System software is very important. Two types of interfaces are GUI and CLI. a. What do GUI and CLI stand for? GUI - CLI - b. Why does a GUI provides a better experience than a CLI? 5. Draw a block diagram to show how a simple computer system is organized. The diagram should include the following: INPUT DEVICES OUTPUT DEVICES SECONDARY STORAGE MEMORY UNIT CONTROL UNIT ALU CPU FLOW OF DATA (8 marks) Page 3 of 9
6. a. What is the difference between Analogue data and Digital data? Give an example of each. Difference: Example of Analogue Data: Example of Digital Data: b. Which device is used by the computer to send and receive data over telephone lines? (1 mark) c. Why is the above mentioned device required? 7. Which type of Utility program best describes its definition? Choose from the following list: defragmentation scan disk file compression format antivirus a. It checks all disk surfaces, files and folders for errors. b. This utility unites the file in contiguous sectors, that its, sectors which are next to each other. c. It prepares a disk to save new data by dividing it into tracks and sectors. d. It reduces the size of a file so that more space is left on disk. e. This utility checks and then eliminates viruses. Utility Program (5 marks) Page 4 of 9
8. This question is about Number Systems. a. How many different values does Hexadecimal number system have? (1 mark) b. Why Hexadecimal number system is important? c. The following numbers are represented in different number bases. Represent these numbers in the other number systems. Decimal Binary Hexadecimal 125 = = = 1 1 0 0 1 0 1 1 = = = 4A Space for Working 9. State whether the following statements are TRUE or FALSE. (6 marks) a. A light bulb is an example of a two-state device. b. The largest unit of storage capacity is the MB. c. 1 GB is equivalent to 1024MB. d. A bit can represent 3 different numbers. Page 5 of 9
10. This question is about Logic and Truth Tables. a. Draw the symbol of each logic gate. AND GATE OR GATE NOT GATE (3 marks) b. For each gate mentioned above, write down its Boolean expression in the space provided. (3 marks) c. Which gate will give OUTPUT 1 when all INPUTS are 1? (1 mark) d. Using the logic circuit and the incomplete truth table below: A D B C E G1 X A B C D E X 0 0 0 0 1 1 0 0 1 0 1 0 0 1 1 0 1 1 1 0 0 1 0 1 1 1 0 1 0 1 i. What type of logic gate is represented by the circle labelled G1? ii. Fill in the incomplete truth table above. (3 marks) Page 6 of 9
11. Two types of memories are the RAM and ROM. a. What is the difference between these two types of memory? RAM: ROM: b. Give an example how RAM and ROM are used in a computer system. RAM: ROM: c. What is Cache memory? 12. This question is about Character code. Complete the passage below by using the words from the below list. UNICODE ASCII information compatibility data transmission The character code table, stands for American Standard Code for Information Interchange. It is the commonest code and is popularly used for and microcomputer storage. The ASCII code is widely used to send to and from microcomputers. It was established to achieve between various types of data processing equipment. Nowadays, the is used to cover letters that are used in nearly all languages, not only in English. 13. Briefly explain the difference between these terms: (5 marks) a. Data and Information b. Hardcopy and Softcopy Page 7 of 9
SECTION B Answer all questions. 1. Word-processing is commonly used to type documents. a. Name and briefly explain two examples where a word processor program helps a clerk in an office. i. Name: Explanation: ii. Name: Explanation: 2. The screen shot below shows part of a spreadsheet. It displays the marks obtained by students in some subjects. a. Give one reason why a spreadsheet program is more appropriate to analyse numerical data than using a table in a word processing program. b. Give one other example where a spreadsheet program can be used for. (1 mark) c. From the screen shot above, write down the function: i. you would type in cell F3: ii. you would type in cell B8: iii. you would type in cell B10: (3 marks) Page 8 of 9
3. This question is about the Internet. Which statement best describes its definition? Choose from the below list. HTTP Bookmark URL Firewall Internet Home page www Search Engine a. The first page which is displayed when opening the web browser. b. Is a vast system of Internet servers, which store multimedia information and connections to related information on other computers over the Internet. c. It defines how messages are formatted and transmitted and what actions should take in response to various commands. d. It is a worldwide network connecting millions of computers all over the world. e. Is a program that limits access in and access out of a computer or network according to the restrictions you impose. f. Is a program that enables the user to find the information he wants by entering a keyword and accessing large databases of URLs. g. Most visited URLs are saved into this special folder. h. This is the address of a webpage. (8 marks) END OF EXAM PAPER Page 9 of 9