BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT SOFTWARE DEVELOPMENT

Similar documents
THE BCS PROFESSIONAL EXAMINATION. Level 4 Certificate in IT. March 2015 EXAMINERS' REPORT SOFTWARE DEVELOPMENT

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT SOFTWARE DEVELOPMENT

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT SOFTWARE DEVELOPMENT

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT SOFTWARE DEVELOPMENT.

BCS HIGHER EDUCATION QUALIFICATIONS Level 4 Certificate in IT. April 2013 EXAMINERS REPORT. Software Development

BCS Level 4 Certificate in IT. September 2018 SOFTWARE DEVELOPMENT

REVIEW. The C++ Programming Language. CS 151 Review #2

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL, KUMBAKONAM CHAPTER 9 C++

October/November 2005 READ THESE INSTRUCTIONS FIRST

Outline. Parts 1 to 3 introduce and sketch out the ideas of OOP. Part 5 deals with these ideas in closer detail.

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Subsidiary Level and Advanced Level COMPUTING

Unit 3. Operators. School of Science and Technology INTRODUCTION

CSE 373 Spring 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)

CSE 373 Autumn 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)

COE318 Lecture Notes Week 3 (Week of Sept 17, 2012)

UNIT- 3 Introduction to C++

Program Planning, Data Comparisons, Strings

Appendix A: Objectives and Courseware Locations

1. What is the minimum number of bits needed to store a single piece of data representing: a. An integer between 0 and 100?

CONTENTS. PART 1 Structured Programming 1. 1 Getting started 3. 2 Basic programming elements 17

Number Systems CHAPTER Positional Number Systems

CS1004: Intro to CS in Java, Spring 2005

COMP 202 Java in one week

Presented By : Gaurav Juneja

COP 1220 Introduction to Programming in C++ Course Justification

Computer Components. Software{ User Programs. Operating System. Hardware

Full file at

Review Chapter 6 in Bravaco. Short Answers 1. This type of method does not return a value. a. null b. void c. empty d. anonymous

C Functions. 5.2 Program Modules in C

Course Outline. Introduction to java

Lecture 05 I/O statements Printf, Scanf Simple statements, Compound statements

Introduction to the C++ Programming Language

Control Structures. A program can proceed: Sequentially Selectively (branch) - making a choice Repetitively (iteratively) - looping

Introduction to C Final Review Chapters 1-6 & 13

Memory Addressing, Binary, and Hexadecimal Review

Name :. Roll No. :... Invigilator s Signature :.. CS/B.TECH (NEW)/SEM-2/CS-201/ BASIC COMPUTATION & PRINCIPLES OF COMPUTER PROGRAMMING

Darrell Bethea May 25, 2011

Lesson 3: Basic Programming Concepts

PROGRAMMING FUNDAMENTALS

Chapter 1 Preliminaries

We cover recursion in 150. Why do it again in 151?

Chapter 2 Using Data. Instructor s Manual Table of Contents. At a Glance. A Guide to this Instructor s Manual:

ECE 122. Engineering Problem Solving with Java

ECE 122. Engineering Problem Solving with Java

Java Review Outline. basics exceptions variables arrays modulo operator if statements, booleans, comparisons loops: while and for

C How to Program, 6/e by Pearson Education, Inc. All Rights Reserved.

Chapter 5. Repetition. Contents. Introduction. Three Types of Program Control. Two Types of Repetition. Three Syntax Structures for Looping in C++

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT. Object Oriented Programming

CSC 1351: Quiz 6: Sort and Search

CPT1. Unit 1 Computer Systems, Programming and Networking Concepts. General Certificate of Education January 2004 Advanced Subsidiary Examination

CAMBRIDGE SCHOOL, NOIDA ASSIGNMENT 1, TOPIC: C++ PROGRAMMING CLASS VIII, COMPUTER SCIENCE

DEPARTMENT OF MATHS, MJ COLLEGE

Topic 1: Introduction

Petros: A Multi-purpose Text File Manipulation Language

IT 4043 Data Structures and Algorithms. Budditha Hettige Department of Computer Science

In Java, data type boolean is used to represent Boolean data. Each boolean constant or variable can contain one of two values: true or false.

Procedural Programming

Software Development Techniques. 26 November Marking Scheme

BTE2313. Chapter 2: Introduction to C++ Programming

Introduction to Programming Using Java (98-388)

BEng (Hons) Electronic Engineering. BEng (Hons) Telecommunications. Examinations for / Semester 2

MATVEC: MATRIX-VECTOR COMPUTATION LANGUAGE REFERENCE MANUAL. John C. Murphy jcm2105 Programming Languages and Translators Professor Stephen Edwards

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT OBJECT ORIENTED PROGRAMMING

MATLIP: MATLAB-Like Language for Image Processing

Code No: R Set No. 1

SAMPLE QUESTIONS FOR DIPLOMA IN INFORMATION TECHNOLOGY; YEAR 1

UNIT - I. Introduction to C Programming. BY A. Vijay Bharath

IT 374 C# and Applications/ IT695 C# Data Structures

Java How to Program, 10/e. Copyright by Pearson Education, Inc. All Rights Reserved.

AP Computer Science A Syllabus

c. Typically results in an intractably large set of test cases even for small programs

BASIC ELEMENTS OF A COMPUTER PROGRAM

BoredGames Language Reference Manual A Language for Board Games. Brandon Kessler (bpk2107) and Kristen Wise (kew2132)

age = 23 age = age + 1 data types Integers Floating-point numbers Strings Booleans loosely typed age = In my 20s

ADARSH VIDYA KENDRA NAGERCOIL COMPUTER SCIENCE. Grade: IX C++ PROGRAMMING. Department of Computer Science 1

15-110: Principles of Computing, Spring 2018

NOTE: Answer ANY FOUR of the following 6 sections:

Java Software Solutions for AP Computer Science 3rd Edition, Lewis et al. 2011

DECLARATIONS. Character Set, Keywords, Identifiers, Constants, Variables. Designed by Parul Khurana, LIECA.

VARIABLES AND CONSTANTS

COMPUTER APPLICATIONS

EDIABAS BEST/2 LANGUAGE DESCRIPTION. VERSION 6b. Electronic Diagnostic Basic System EDIABAS - BEST/2 LANGUAGE DESCRIPTION

Recursion. General Algorithm for Recursion. When to use and not use Recursion. Recursion Removal. Examples

UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. M.Sc. in Computational Science & Engineering

Points off Total off Net Score. CS 314 Final Exam Spring 2016

Mobile Computing Professor Pushpendra Singh Indraprastha Institute of Information Technology Delhi Java Basics Lecture 02

Lecture Notes on Tries

CSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators)

The while Loop 4/6/16 4

C Programming Language. Microcomputer Architecture and Interfacing Colorado School of Mines Professor William Hoff

Introduction to Computer Science Midterm 3 Fall, Points

Chapter 2 THE STRUCTURE OF C LANGUAGE

Assoc. Prof. Dr. Marenglen Biba. (C) 2010 Pearson Education, Inc. All rights reserved.

Tokens, Expressions and Control Structures

The sequence of steps to be performed in order to solve a problem by the computer is known as an algorithm.

Connecting with Computer Science, 2e. Chapter 15 Programming II

Lecture 2 Arrays, Searching and Sorting (Arrays, multi-dimensional Arrays)

GCE A level 1103/01 COMPUTING CG3

Variables, Constants, and Data Types

SNS COLLEGE OF ENGINEERING,

Transcription:

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT SOFTWARE DEVELOPMENT Wednesday 25th March 2015 - Afternoon Time: TWO hours Section A and Section B each carry 50% of the marks. You are advised to spend about 1 hour on Section A (30 minutes per question) and 1 hour on Section B (12 minutes per question). Answer the Section A questions you attempt in Answer Book A Answer the Section B questions you attempt in Answer Book B The marks given in brackets are indicative of the weight given to each part of the question. Calculators are NOT allowed in this examination. SECTION A Answer 2 questions (out of 4). Each question carries 30 marks. A1 a) Given an array A containing 100 different numbers and a variable S containing a single number, write a program to find out if the number in S appears anywhere in A. (8 marks) b) Using your ideas from a), write a function called MEMBER which takes A, S, LOW, HIGH as parameters and returns TRUE if S is in array A, at any index from LOW to HIGH, and FALSE otherwise. (8 marks) c) Now consider the situation where there are two arrays one with 100 elements called AVAILABLE and one with 10 elements called SELECTED. Write a program which checks that all the elements of SELECTED are different and also that all the elements of SELECTED also appear in AVAILABLE. (14 marks) [Turn Over]

A2 In a game of dice called Yahtze a player rolls 5 dice and then is given a score depending on the pattern of numbers on the tops of the dice. Each dice has six sides bearing the numbers 1 to 6. So the result of a throw of the 5 dice can be represented by 5 numbers in the range 1 to 6 and the 5 numbers can be stored in an array. So for example the THROW 2,6,3,6,2 can be stored like this: 0 1 2 3 4 THROW 2 6 3 6 2 A program is required to calculate the score from the THROW as follows 50 points for "all-the-same" (5 of a kind) e.g. 4,4,4,4,4 30 points for "4-the-same" (4 of a kind) e.g. 3,4,3,3,3 25 points for "3-the-same and 2-the-same (3 of a kind and a pair) e.g. 5,1,5,5,1 otherwise the score is the sum of the numbers It may be useful to compute another array of numbers being the count of the times each number occurs in THROW. 1's 2's 3's 4's 5's 6's COUNT 0 2 1 0 0 2 By computing this auxiliary array COUNT (or otherwise) write a program to calculate the Yahtze score. (30 marks) A3 Consider the following program void F(int G,int H){ int J; for(j=0;j<=5;j++){ if(g<v[j] V[J]<H) V[J]='Y'; else V[J]='N'; 0 1 2 3 4 5 V 7 6 5 4 3 2 a) With the array V having values as shown in the diagram, trace the call of F(3,5) (14 marks) b) If the intention had been to turn elements that lie strictly between G & H into 'Y' and all others into 'N', how would you change the code? c) Write a function capable of classifying an array of characters (S) so that any Uppercase letter is changed to U, any Lowercase letter to L, any Digit to D and anything else to O as in the example below: 0 1 2 3 4 5 6 7 8 9 S(initial) T i m e 3 p. m. S(final) U L L L O D L O L O (12 marks)

A4 a) Consider the code below and write it out in a more familiar human readable form. int a(int b){int c,d;d=0;for(c=10;c>b;c--)d=d+1;return(d); b) The identifiers in the program above are particularly short. i) What rules do modern programming languages require a programmer to follow in choosing the characters that make up a valid identifier? ii) Out of all the possible valid identifiers that a programmer can use, how does the programmer normally go about choosing a 'good' identifier? (2 x 4 marks) c) Referring to the code in part a), find and write out the following: i) all the different identifiers ii) all the different constants iii) a conditional (logical, boolean) expression iv) an iterative (repetitive, loop) statement v) the statement that is repeated by the loop (5 x 2 marks) d) Write out the code from a) again, this time replacing the loop with a while loop. SECTION B Answer 5 questions (out of 8). Each question carries 12 marks. B5 Conversion of a decimal number to its binary equivalent is carried out using the following technique: The decimal number is successively divided by 2 and the remainders are stored. The remainders in reverse order form the binary number; the last remainder being the most significant digit. In the example below 19 (decimal) = 10011 (binary) Process Quotient Remainder 2 19 1 (least significant bit) 2 9 1 2 4 0 2 2 0 2 1 1 (most significant bit) 0 Write pseudocode or a program in a language of your choice in which a decimal number is input and its binary equivalent is output. Only positive integer decimal numbers are to be considered. (12 marks) [Turn Over]

B6 Testing strategies are an important part of software development. a) Describe the term dry run testing. (2 marks) b) Describe the concept white box testing and discuss the limitations of using this technique. c) Discuss the skills that will be needed to implement white box testing successfully. B7 a) Explain the term Random Access. b) Give two examples of commonly used Random Access computer devices. c) Give details of a situation in which a Random Access file would ideally be used. B8 a) Name two algorithms that can be used for sorting an array. (2 marks) b) Choose ONE of the algorithms named in a) and describe how it works. (10 marks) (Note: code is not required) B9 Supply the words to complete the following sentences: a) The binary system operates in base 2 and uses digits the 0 to 1, whereas the octal system operates in and uses the digits. b) Two popular methods of are Binary Chop and. c) Microsoft Windows 8 is an example of software and Visual C++ IDE is an example of tools. d) Two phases of the software development life cycle that follow design are and e) The acronym OOP stands for. f) A compiler is a program that translates code into code. g) In a program are included for the human reader, to help them the code operation. h) The basic control structures used in computer programs are, selection and. i) is an important part of programing and is used to detect the errors that cannot be detected by the compiler. j) Two popular methods of testing programs are and. k) An example of a procedural language is and an example of an objectoriented language is. l) Two kinds of buttons that tend to occur in groups on web-based forms are and. (12 x 1 mark)

B10 Compare the following pairs of terms. a) Stacks and queues b) Sequential and parallel programming c) System software and application software Note: You are advised that three well-chosen sentences per pair will be sufficient one sentence describing the first term, one sentence describing the second term and one sentence highlighting the difference between the terms. B11 Use the program code below to find occurrences of the following SIX errors listed below. For each error, you should give the line number and an explanation of the error. In addition, you should state whether each error will be discovered at compile time or runtime. a) identifier not declared (2 marks) b) type error - index not allowed (2 marks) c) array index out of bounds (2 marks) d) syntax error (2 marks) e) variable required (2 marks) f) type error - invalid type (2 marks) Line 1 2 3 4 5 6 7 8 9 10 11 12 13 14 C Program void main(); { int i,j; float v[10]; i=1; j=i[2]; k=i+j; if(i>1 i=i-1; v[0]=i; if(v[0])j=1; for(i=0;i<=9;i++) v[i+1]=i; 5=i; B12 A web designer for an online sales company has to create a web page for a new user to register for the organisation; the page should contain the following interface elements: i) a method for the new user to enter their name ii) a technique to enter the age of the user, for example: 0-15, 16-35, 36-55 etc. iii) a method to enter the gender of the user iv) a method for the user to show a combination of methods by which they are willing to be contacted (for example: phone, email, letter) v) a method to enter the completed registration form details onto the system Sketch a form to illustrate your ideas for this interface. The page should contain a form with appropriate elements to handle the various types on information. (12 marks)