100%(3)100% found this document useful (3 votes) 2K views12 pagesA-Levels Computer Science 2020
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
X
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL
General Certificate of Education Advanced Level
COMPUTER SCIENCE 6023/1
PAPER L
NOVEMBER 2020 SESSION 3 hours
Additional materials:
“Answer paper
Calculators must not be used
TIME 3 hours
INSTRUCTIONS TO CANDIDATES
Write your name, Centre number and candidate number in the spaces provided on the answer
paper/answer booklet.
Answer all questions.
Write your answers on the separate answer paper provided.
Lf you use more than one sheet of paper, fasten the sheets together.
INFORMATION FOR CANDIDATES
‘The number of marks is given in brackets [ | at the end of each question or part question.
‘You are reminded of the need for good English and clear presentation in your answers.
This question paper consists of 4 printed pages.
Copyright. Zimbabwe Schoo! Examinations Council, N2020.
‘8ZIMSEC N2020 [Turn over]()
o)
@
)
©
@)
b)
©
@
Zz
Distinguish between overflow and underflow.
Explain how accuracy can be improved in a floating point representation
and state an effect it has on the number represented.
Express the denary value 208 as a
@® binary number using an 8-bits,
(i) hexadecimal numbes,
(ii) number in BCD.
Show as 8 bit number in two's complement
@ +8,
@ -119.
Find the product of the binary numbers 101010 and 110000.
State any three properties of a variable.
Sort the following list using the quick sort algorithm,
426 931777 BLO SSO
Distinguish between binary search and linear search.
Give one example and one advantage of the following data structures
@ static,
(i) dynamic.
‘The next instruction to be carried out is LAD#35 which loads the number 35
into the accumulator.
‘With reference to the registers in a processor, use a diagram, to illustrate
the stages of the fetch-execute cycle when dealing with this instruction.
02v) Nao
2
QI
1a}
[2]
[21
(21
[2]
fe]
GB]
2]
1
[0]a
ms monitored using ennora, ‘the wenworn output binary values corresponding
to physical conditions ax shown In the table,
parameter | description | bluwry
of paramotor | value
oll prowmure (| prenmure » = 3 bur
fo [07 prenintte «9 bur
temperature A | temperature: - = 200°C
temperature = 200%:
rolation ) Revs Per Min (rpm)
‘The outputs of the sensors form the outputs to a logic circuit, ‘The output from the
cirouit X is 1, ifthe following three conditions occur:
Either oil pressure » = 3 bur and temperature » = 200°C
Or oil pressure «3 bar and rotation > 1 000 spm
Or temperature » = 200°C and rotation > 1000 rpm
(u) Draw a Logie circuit to represent the above system, [6]
(b) Complete the truth tuble below for the system.
a
(a) Define the term protocol, giving an example. (2)
(>) (Convert the following IP address to binary.
94 (9% ISS 16 (4)
(i) State the type of network the LP address in (I) is suitable for. a
(il) Name the two parts which make up the IP address. (21
023 Nam00A school purchases computers and decides that the head's office, the matron’s
office and Accounts office, cach have a computer. ‘The rest of the computers
are to be put in the computer laboratory.
‘The computers are to be connected through a network.
(@) Name the three types of cabling that may be considered and explain
the use of cach. (61
(>) Outline any three factors other than cost that they need to consider when
choosing suitable cable. (3)
(©) Compare wireless and physical network connections. (2)
(@) Each league has a number of teams, cach team is in only one league,
each team plays in a number of grounds during the season and each
ground will host a number of teams during the season.
Draw an entity relationship diagram to illustrate this scenario. (5]
(b) Outline any five principal duties of a database administrator in a
company. (51
(a) Explain any one difference between hacking and cracking. f)
(b) Security of data is an important concern for a system administrator.
Describe any one feature of a policy for ensuring data security. (21
© © __ Define the term social media. (1)
Gi) Outline any three benefits and any three side effects of social
media in society. (6
(2) An organisation intends to protect its innovation against competitors on
how to manufacture, use and distribute the innovation.
Describe any two measures that the organisation can undertake to protect
the innovation against its competitors. (41
(b) A High Schoo! has decided to introduce e-learning facilities for the
benefit of leamers at the school.
@ Explain the term e-learning. (2)
@)__Describe any one benefit and any one side effect of e-learning
facilities to the learners. (4]&
2
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL
General Certificate of Education Advanced Level
COMPUTER SCIENCE 6023/2
PAPER 2 Practical
NOVEMBER 2020 SESSION 3 hours
Additional materials:
LCD foreach candidate,
Printing facility,
Bond Paper,
TIME 3 hours
INFORMATION FOR CANDIDATES
This is a purely practical paper. All answers should be printed. Handwritten answers
will not be marked.
This paper consists of three sections.
Section A 20 marks
Section B 50 marks
Section © 30marks
Answer one question from each section.
Each answer sheet should include the following information in the header section:
© Candidate Name and Candidate Number
* Centre Name and Date
© Subject Code
When answering programming questions, indicate the language used.
All work should be backed up by a soft copy on a CD.
Ifa candidate prints on more than one sheet, fasten together with string.
All answers should be correctly and clearly numbered.
This question paper consists of 8 printed pages.
Copyright: Zimbabwe School Examinations Council, N2020.
ezmissc nem [Turn overSection A [20 marks]
Answer any ane question from this section.
Use a spreadsheet of your choice fo simulate the following logic of the worksheet.
() Use only the following formulae:
D>-“=D-~
=)>— XOR() —f>o—-0re
Simulate the circuit below on the spreadsheet and complete the truth table
that follows.
——~ 4
o>
Lp
=
[oui
(51
(b) Draw the Von Neuman and Harvard architecture explaining their
differences.
Justify your answer to which architecture is the best to adopt. m
cansa Nom0’
(©) Some of the components of a computer system ie:
Peripherals - Keyboard
Monitor
LA Ports . VDU controller
Keyboard Controller
Memory Main Memory
Secondary Storage
System buses - Data bus
= Address buss
Draw the diagram below and label the components using the list above.
Central Processing Unit
=] La
(8)
(a) Areal store in Mutare wants to buy an accounting application package
which will assist in carrying out daily store operations. ‘The operations
include taking product stock, capturing sold products and printing
reports for managerial staff.
Asa system developer, design a suitable software architecture for the
mentioned requirements using an appropriate design tool. 8]
ears. 2020
{Turn over() A power station hus a safety system based on three inputs to a logic
network. A warning signal (s = 1) is produced when certain conditions
‘oveur based on these three inputs described in the table below.
input binary value | plant status
T 1 temperature > 120°C
0 temperature < 120°C
7 pressure > 10 bar
0 pressure < 10 bar
1
0
P
~ | cooling water > 100/hr
| cooling water < 100/hr
Ww
A warning signal (s = 1) will be generated if either:
- ‘Temperature > 120°C and cooling water < 100/hr
OR
- Temperature < 120°C and Pressure > 10 bar or
cooling water < 100/hr
Draw a logic network and a truth table to show all the possible situations
when the warning signal could be received. [12]
eonsawm9@)
®)
©
@
@
(b)
5
Section B [50 marks]
Answer any one question from this section.
Write an algorithm in pseudo code to calculate the average of a set of
5 marks for 10 students entered through the keyboard. (8)
Design an interface and write a program to convert acres to hectares.
[1 acre = 0.404686 hectares.|
The program should accept input from the user and display the output.
‘The program should work for real numbers as well as whole numbers
(c.g. it should accept 7.2 acres, 0.5 acres ete). (8)
By using the bubble sort algorithm, write a code to sort an integer array
‘of 10 (ten) elements in ascending order. (25]
Using a programming language of your choice, write a program that
accepts distance of a journcy (in km) and time (in hours) to be spent
during the journey.
‘The program then calculates the speed; and determines whether the speed
is slow, normal or high. ‘The program then displays the speed and the
category in which the speed belongs to
‘The speed categories arc as follows:
Slow + 1-45 kiv/hr
Normal + 45 ~ 80 km/hr
High + > 80 km/hr 9]
Tickets arc sold for a concert at $30 each and a person is not allowed to
buy more than 50 tickets.
‘The details for the discounts are given in the table below.
Draw a flowchart of a program that accepts the number of tickets,
calculates discount and displays the total cost of the tickets. 12]
‘A program accepts total amount of daily sales transactions for three
salespersons, accumulates the total sales for each salesperson and the
grand total of all the sales. ‘The program then outputs salesperson number,
total sales per salesperson and the grand total.
() Draw a structure diagram to illustrate the program. (13)
(i) Write a program for the scenario described. [25]
msn N2000
[Turn over6
Section C [30 marks]
Answer any one question from this section.
(a) A.school has a policy that a leamer has to participate in at east one club.
Each club has at Jeast one patron who is a teacher. A teacher may only patron
‘one club.
@ Draw an ER-diagram for this system with clear labels on the
zelationships amongst the entities in the scenario, in second normal
form (2NF). (61
(if) Suggest attributes for each entity by drawing on the same diagram
or by typing in a separate table from the database model.
State the primary key for cach entity. (9)
(b) A shopkeeper uses a single file to record details of sales of goods.
‘Table 1 shows the record details.
Table 1: Stock Sales,
Date ‘Steode | deseripti mett| VAT [slip | all | eashier | invoice
12/04/17 | PSO01 | Pork | |
| ___| Roll | _|
TP10S | Tissue wi |
_| rose. | =
___] P8082 | Fruit Scone — _
TB6911 | Geisha while T
vitamin E, |
CBOL [30 = Micron] 1.00 [0.10
Plastic
1a041T [1239219 [4089 [or [$46 [0015
‘The shopkeeper also has a separate file where the records of till operators are kept.
‘The records are shown in Table 2.
‘Table 2: Till operators
__| surname _ name cellno: |
Mukango Plaxedes +26375260111 |
Nkomo Lizwelihie | +26389152346 |
Johns Melissa “#26375623592
Zhuwawo Panashe ‘| 426375885613 |
anv N207
@ Using a DBMS of your choice, write SQL statements for the
creation of database table for Table 1 in INF and for each field
specify the following:
A.) Name (Identifier)
B) Datatype
Cc) Field size
Specify the primary key for this relation.
*NB: No need for data entry into table. 0)
(i) Normalise Table 1 to second normal form. Type the
table listing in a text document.
Save and print all your work. (3)
An international restaurant has a buyer who purchases international beverages for
their exotic clients. The buyer has recorded details of the products as shown
in the table below.
‘Category Country ‘Code | Product ~_ [Stock |Special [Price
Coffee Salvado CFTM [264 | N 2.75
‘Tea Phuguri Super | 27 y 16
Tea Douyun Golden | 10 Y 20
Coffee ‘Ausie Skybury [424 [N 35
Coffee Voodoo CIM | 62 ¥ [8.75 |
Tea Jumpa Jaya 408 TN 35 |
Coffee Blue Pearl 473 | N 45
Tea | Peru “Treasure Org 178 |'N 95
Coffee | Colombia | 409 | IncaGoldIM__| 71 N 2.75
Coffee [Colombia [417 | IncaDarkIM__[402__[¥ 12.5
[Tea China 330_| Strawberry 128 | N 44
Tea i 138 | Jasmine YinH [352 [Y —*(| 1082
Tea 501_| Tanganda 12 N 35
(a) Asassystems analyst for a small software company called Soft-IT you want
to develop a database for the restaurant to incorporate into their system.
(i) Code SQL statements to create the database called HOTBEV and
create a table called PRODUCTS which will best store the data
shown in the table.
The code should be able to
© Specify data types
© Specify field size
© Specify the primary key
[10]
6023/2 N2020
{Turn over)
8
(i) Code an SQL Statement that displays the data below.
A
[code [stock | price _
[4387 [352 | 10.82
303__[10 [20
330 [128 [44
(51
B
country value of
|__| products:
India 432
China
China
Coffee | Haiti
Coffee | Colombia 35.025
[8]
The buyer deals with several suppliers to acquire these products. For
each country, one supplier is used. The system is expected to store
the following details about the supplier:
= Supplier ID
- Name
- Address
= Country Supplied
- ‘Contact Phone
- Email
Draw an ER diagram depicting relationships amongst the supplier, product
and country of origin of product in 2NF. fia]
@xxneomn