Past Paper Questions

Systems in organization

Short questions

  1. Identify features of the documentations
    • user documentation
      • description of the overall purpose of the system
      • instructions on how to perform specific tasks when running various programs
      • how to execute the program
      • describe how the input data is to be entered
    • system documentation
      • file security measures
      • data flow diagrams/structure diagrams
      • list of files and record structures and the database design
  2. A manual system is being replaced by a computerized system, state how staff will be affected
    • staff must be trained to new hardware and software
    • some staff may no longer be needed
    • working patterns change
  3. Outline the need for periodic reviews in a system life cycle
    • a caparison of the system’s actual and original performance can be made, and errors made during design can be detected
    • can highlight any unexpected problems/benefits the system has yielded can necessary adjustments/enhancements/additions can be made
  4. State examples of utility software [2]
    • File manager
    • Data compressor
    • Antivirus software
    • Defragmentation software
  5. Outline how validation and verification can be used to ensure data is as accurate as possible [4]
    • Verification is method of checking/ensuring that data at source is the same as inputted data
    • Usually the user is involved, for example, asked to retype data
    • Validation is performed by the software
    • Checking the range, whether the type of data is correct
  6. Explain, in terms of resources, how Voice over IP provides a collaborative working environment for a company with multiple locations nationwide
    • VoiP is audio and video stream transmitted over the internet, for which broadband internet connection is needed
    • That can be integrated in an office desktop computer
    • With collaboration desk endpoints/webcams/desktop computer/widgets
  7. Discuss the issues that should be considered before making decisions on access to the data stored on this system, and storing the data locally or through the use of a cloud service [6]
    • Official access to the data
      • Sensitive data access must be restricted through user authentication
      • Only those directly concerned can be able to access
      • Less people should be able to edit
      • Access levels should be set up with strong authentication
      • Physical access to servers should be controlled if a local system is used
    • Data security
      • Cloud service providers are professionals and usually have stronger security
      • If patient data is sold, patient and hospital could suffer serious consequences
      • Is cloud governed by appropriate privacy laws?
      • Is it located internationally or is it governed by laws of country?
      • Data could be intercepted in transmission so it must be protected with encryption
  8. Explain problems that occur when transferring data from the old system to the new system [4]
    • Data records in DBs would have different structures
    • Files could be incompatible from different hardware systems
    • Customer records could have the same keys/IDs so cannot be uniquely identified
  9. Explain how cache memory can speed up the processing within a computer [3]
    • It is accessed faster than RAM
    • Used to hold common/frequently used data
    • Closer to CPU than RAM with faster read/write speeds
    • Cache memory is static RAM, doesn’t need to be constantly refreshed

Longer questions

  1. This question is about the system life cycle model
    1. Outline its purpose [2]
      • The process of replacing the old computer system by the new one/creating the new computer system
    2. Identify the state in which a feasibility report is generated [1]
      • Analysis
    3. Explain why software production is normally cyclical
      • software will be used for several years and will require some modification
      • there will be obscure bugs that are not apparent until the program has come to use
      • modifications will be required due to changes in computer hardware and system software
      • program can be modified to improve performance, or add new features
      • system reviewed regularly to determine whether it meets user’s, and old programs can be modified and additional hardware can be added
  2. This question is about word processing and data migration
    1. State the advantages of autosave
      • if power goes off, only the text typed after the last (automatic) save is lost
    2. State additional features of a word processor
      • apply styles/effects
      • insert tables/pictures/formulae
      • mail merge
      • macros
      • Print documents
    3. Outline security measure that should be taken to prevent data loss
      • off site data storage
      • make backups regularly (hard copies)
      • Printed copies of transactions
      • Transaction log file: so that in case of loss, transactions can be restored
      • prevent physical damage to computers/protection from natural disasters
    4. Outline problems arising from installation of new hardware and software in office
      • data migration problems: different file formats so conversion must be performed
      • employee efficiency may drop as they learn to use the new system
      • issue of compatibility with legacy software/hardware
    5. Discuss possible problems that may occur during data migration [3]
      • Data loss/corruption: when moving data from one storage device to another (could be lost, or not useful because corrupted)
      • Incompatibility of data formats: necessary to translate from one format to another, to be able to use the data in the new system, which causes delays/performance issues
    6. Outline problems with maintaining legacy systems [2]
      • Database contains inconsistencies/redundancies
      • Typically large and complex systems/mainframes
      • Hard to understand/change/evolve because programs might be disorganized and documentation might be missing
      • Compatibility issues with old programming languages and database technologies
      • Maintaining outdated computer systems
    7. Outline the use of a failover system [2]
      • A standby/redundant system
      • Used to eliminate/reduce the impact on users/owners
      • By automatically taking over if the primary system suddenly becomes unavailable
  3. A computer system is being developed
    1. Outline two types of possible errors [4]
      • Syntax errors: mistyping, omitting symbols
      • Run-time errors: division by 0, out of bounds, attempts to read missing file
      • Logic errors: incorrect formula to calculate something
    2. Describe examples of software that assist in the development of computer programs [6]
      • Editor: enables programs to enter/modify source code
      • Translator (interpreter/compiler): software that translates source code to machine code
      • Linker: software that puts appropriate machine addresses in all external files, links all modules
      • Loader: software that takes appropriate machine code and loads instructions into their specific locations
      • Debugger: software that helps programmers find errors
  4. A criminal justice agency is being computerized
    1. Identify disadvantages of computerizing a large system
      • capital expenditure of a large computer system is enormous
      • more staff will have to be employed and trained to use the computer, which is time-consuming/costly
      • computer may be down when information is needed quickly
      • regular activities may be suspended/disrupted when a change is being made
    2. Explain advantages for the criminal agency if the system is computerized
      • common features of crimes can be quickly cross-referenced to find similarities
      • computer can search database of crime details and past convictions to draw a suspect list faster than manual
      • separate agencies can pool information, which cannot be done manually
    3. Discuss concerns the public might have
      • fear that civil liberties could be infringed in that a computer may store any data about people, not just crimes
      • which so much information, fear of of it being misused
      • more staff using computers, less police on streets, leading to lack of public confidence
  5. A business wants to computerize operations. First task is to clearly define the problem
    1. Outline the benefits of methods of data collection to help define the problem [4]
      • Observation: allows analyst to see exactly how processes are carried out
      • Questionnaires: can cover every aspect; can reach every employee
      • Research: allows analysts to see how other similar businesses solve the problem; relatively cheap to administer
      • Interviews: interaction allows all aspects to be thoroughly investigated
    2. Outline the documentation that would be presented to the business and design team
      • Business: feasibility report containing a brief description of the proposed system, estimated costs, technical and legal responsibility
      • Design team: requirements specification containing a definition of the problem, definition of inputs and outputs, and a list of tools, facilities, people available for developing solution
    3. Outline additional pieces of documentation that would be produced after the analysis stage
      • User guide: for personal to use the system
      • flowcharts/code: to aid programmers in future modifications
      • Technical documentation: help future teams to alter/improve the system
      • Interactive prototypes: consistency must be ensured in re-designing
    4. Discuss advantages and disadvantages of printed material vs online support for documentations [4]
      • Advantages:
        • Portability: the printed material is easily transportable
        • Availability: always available, no power cut or Internet problems
      • Disadvantages:
        • Readability: font size can only be changed online
        • Aging: online is more frequently updated than paper
        • Environmental: waste of paper vs energy consumption
  6. This question is about user testing
    1. Explaining what is user acceptance testing [2]
      • A system or a particularly functioning prototype
      • Given to users to test for functionality or to gain feedback on functions or the user interface
    2. Describe the purpose of a prototype [3]
      • Used to ensure all essential functions of the system meets needs of user
      • To speed up development process
      • User’s feedback helps in refining the acceptable prototype in order to develop the complete system, or a further prototype should be created in order to develop the satisfactory
  7. New computerized system is being planned in a library
    1. Describe a method in which system requirements can be obtained from stakeholders [2]
      • interviews could be held with the stakeholder
      • To establish the functions required by the site, direct observation could be made of the users of the current system
      • To gain an insight on how the library is being used
    2. Outline one reason for providing a prototype for this new execution cycle [2]
      • Allow stakeholders to gain an idea of how the system would work
      • So they can provide feedback and suggest improvements
  8. This question is about usability
    1. Define the term usability [1]
      • Making the computer systems more easy to use
      • Matching them more closely to user needs and requirements
    2. Identify methods of inputting data that can improve the accessibility [2]
      • text to speech
      • voice recognition
      • braille keyboards
      • touch screen
      • input from scanner
    3. State potential usability issues with cell phones [3]
      • Small screen
      • Uses batteries for power
      • No hard drive/small memory
      • Reliability/network coverage issues
      • Too many steps to access a particular feature
  9. This question is about a new system
    1. Explain the role of users in the process of developing a new computer system [3]
      • Role of users is important because inadequate user involvement leads to project failure
      • All users must participate and explain what how they use the system and what they think is wrong with the system
      • All users are involved in testing of the system and training
    2. Explain why it is important to produce more than one prototype of the new system
      • More than one allows the manager to choose that one that is the most suitable
      • Which give more flexibility and improves final system
  10. This is about accessing the computer system
    1. Explain how two or more customers are able to access the computer system at the same time [2]
      • Central computer is a multi-user environment
      • Which shares its time among customers
    2. Explain how each customer’s data is secure when two customers access the system at the same time [2]
      • OS protects user data in RAM
      • To prevent overwriting or accidental changes
  11. This question is about data migration
    1. Define data migration
      • The transfer of data from one system/storage device to another
    2. Identify problems that may arise [2]
      • Data loss, due to transmission faults/lack of adequate storage
      • Incompatible file formats, which could lead to incomplete or incorrect data transfer
      • Different file structures, which will result in a mismatch of data, for example in customer records
      • Validation rules differ between companies, which could lead to inconsistent/incorrect results
    3. Other than data migration, describe two aspects of change management that may arise from this takeover [4]
      • Workforce issues, such as redundancy/retraining
      • The time frame involved, in merging the two systems
      • Testing, of the combined systems/new data
      • Data entry, if migration not possible
      • Costs involved, in the aligning of the two systems
      • Changeover decisions, such as parallel running

Computer organization

Short questions

  1. Describe how checksum could ensure data integrity in the transmission of data
    • checksum is computed from the data
    • groups of bits are added before transmission and sum appended to the group
    • when the data is received the actual sum is compared with the checksum
    • if the two are the same, it is assumed that data has not been corrupted
    • otherwise a resend would be requested
  2. Compare magnetic tape with flash memory as a media for backing
    • Flash memory is more portable between devices, but is small and can be stolen
    • Tape has a larger storage capacity, more than flash memory
    • Tape has sequential data access (slower) while flash has direct data access (faster)
    • Tape is cheaper but the hardware is required is expensive
  3. Outline the need for interrupt priorities
    • interrupts can be generated by various devices or programs in a computer system; some doing more important jobs than others
    • some tasks require a faster response from the CPU than others because they are more important/operate faster

Longer questions

  1. This question is about defragmentation softwares
    1. Outline the function
      • in files, the free space on disk can be broken down into a number of smaller sized areas
      • only small parts of new files can be stored in these areas
      • a defragmentation software will recognise data on disk such that files are stored intact and free space is located in a single larger area for the storage of future files
    2. Outline reasons for using one [2]
      • Defragmentation software places sections of the same file next to each other
      • To allow faster access (to that file)
  2. This is a question about the OS
    1. State two examples of a use of an interrupt
      • software application reports an error
      • power problem alert
      • IO interrupt
      • Malfunctioning hardware interrupts
    2. Outline how the operating system processes an interrupt
      • OS is alerted that a service is needed
      • this also depends on the priority of the service required
      • the current processing is suspended – stack is used to store the current data
      • the service is dealt with and the processing is resumed
    3. Outline a situation where multi-tasking is necessary
      • a computer user may want more than one application at the same time to copy something from one app to a document
      • user may want to work on a word processing document while a database program is searching for or sorting data
      • user may want to work on spreadsheets or databases at the same time as printing something
    4. Outline features of the OS that need to be considered when running a game application [2]
      • Memory management: use a lot of memory and require constant refreshing
      • Processor loading and graphics handling of OS
      • GUI: needs to handle input from appropriate devices
  3. State one application for each of the following methods of data input
    1. OCR (optical character recognition)
      • scanning text into a computer readable form
      • so that it can be edited on a computer
      • example: bank processes without human involvement
    2. touchscreen
      • screen allows you to select options/work through menus
      • example: ticket machine at airport; information kiosk systems in product information
  4. This question is about the machine-instruction cycle
    1. State where all instructions and data are stored
      • primary memory/RAM
    2. Outline the function of a computer bus
      • a bus is a pathway through which the processor communicates with other parts of the system
      • data, addresses, or control signals are transmitted
    3. Outline the role of the data bus and address bus in the process
      • buses are used as physical connections to carry information to the CPU
      • the data bus transports date to/from the CPU, whereas the address bus transports the memory address where the data is supposed to go/be
  5. Outline the following functions of an operating system [2+2]
    1. Memory management
      • Allocates an appropriate section/amount of memory
      • For each program (currently) running
      • Holds contents of memory
      • Which are to be transferred from memory to other CPU components
      • Allowing processor and memory to act independently (processor not affected by differences in speed of operation)
    2. Security
      • Deals with passwords/access levels
      • So that only the appropriate people can work with particular files
  6. Explain the role of the following [2+2+2+4]
    1. Accumulator
      • Within the ALU
      • Temporarily stores the results of any calculation
    2. Instruction register
      • Within the CU
      • Stores the instruction that is currently being processed
    3. Program counter
      • Within the CU
      • Stores the address of the next instruction to be executed
      • Incremented each time an instruction is carried out
    4. Buses
      • Address bus: provides a pathway from the memory to processing unit that carries the address in the memory to and from which data is transferred; address only passes from CPU to external memory/IO ports (one way)
      • Data bus: carries data to and from memory/registers within the CPU (bi-directional)
      • Control bus: carries read/write signals/interrupt request signal between different parts of the processor
  7. This question is about the CPU
    1. Describe the function of the control unit (CU) in the CPU
      • Obtains data/instructions from the memory
      • Decodes them into commands
      • Controls transfer of data and instructions among other units of a CPU
      • Coordinates all units of a computer
  8. This question is about bits and floats
    1. Define the term bit [1]
      • binary digit
      • (minimal) unit of storage that can be set to 0 or 1
    2. State and define the problem that occurs when a (9 bit) data is stored in an 8-bit register [1]
      • Overflow error
      • The value to be stored in the memory location os too large/larger than the largest value that can be stored in this memory location
    3. State one reason for using floating-point representation and one for using integer representation [1+1]
      • Float: greater range of numbers and better accuracy
      • Integer: no rounding/truncation errors and faster processing
  9. This question is about the processor and cache
    1. State the purpose of cache memory [1]
      • Used to save time in accessing the RAM
    2. Describe how the cache memory can speed up the functioning of a processor [2]
      • Cache memory is closer to CPU
      • By holding frequently used data and instructions in cache, execution of program and fetching instructions and data is faster
    3. State features considered when comparing the speed of different processors
      • Word length
      • Bus size
      • Frequency
      • Number of cores
      • Cache size
  10. This question is on the operating system
    1. Outline the function of the MAR [2]
      • Register in the CPU that is loaded with the address of the next instructions/data to be taken from the RAM
    2. Outline the function of the MDR [2]
      • Register in the CPU that is holding the data which has been most recently taken from the RAM
    3. Identify functions of the OS [2]
      • Resource allocation
      • Memory management
      • Interrupt handling
    4. State where the OS is held when the computer is turned off
      • Hard disk
      • FROM
      • Solid state drive
    5. Construct a diagram to illustrate the structure of the CPU clearly showing the flow of data [4]
    6. Identify the part of the CPU which performs decoding and which executes the instructions [2]
      • Control unit performs decoding
      • Arithmetic and logic unit executes instructions

Networks

Short questions

  1. Outline the role of a gateway in wide area network
    • a gateway provides a link between systems
    • by providing appropriate conversions/adding to the appropriate data
    • it is a network point that leads to another network, may be with different protocols
  2. Define handshaking
  • the exchange of (predetermined) signals when a connection is established between modems/devices
  • a protocol used when communication with (peripheral devices) is taking place
  • the process by which both the sending and receiving devices in a computer network maintain and coordinate data communications
  1. Explain two ways of reducing the time required to transmit data in a computer network [4]
    • Data could be compressed before sending; which means less data to send
    • High speed lines/fiber optics/dedicated lines could be used; which allow faster transmission than traditional lines
    • OR greater bandwidth of a communication channel; higher data transfer rate
  2. Outline advantages and disadvantages of wireless networks [4]
    • Ease of use for mobile users: they can work from many different locations
    • Connectivity between different locations
    • Cost
    • Security: as wireless transmissions are easily intercepted
    • Positive change in working patterns (employees can work at home)
    • Health issues
  3. Outline ethical concerns of using the Internet [4]
    • Data/information is deliberately incorrect: data integrity
    • Data /information has not been validated
    • Intellectual property issues
    • Plagiarism
  4. Explain how compression of data may lead to negative consequences [3]
    • Some compression methods (lossy) discard data
    • Decompression will not return the completed file as some detail will have been removed
    • Which isn’t some cases may be unacceptable
    • If original not saved, there is not way to recover it
  5. Explain how the use of MAC addresses can improve security [3]
    • MAC address identifies a specific device
    • MAC address checked against list of approved addresses (if not on list, access to network denied)
    • Prevents unauthorized access with (it is an extra layer of protection)
    • Data sent to specific MAC address can only be accessed on that device

Longer questions

  1. This question is about data loss. Sate examples of how data can be lost by
  2. human error
    • forgetting to save newly created file
    • overwriting file/giving a file same name as an already stored file
    • accidentally erasing a file
    • hackers
    • hard-disk failure
    • disgruntled employees
    • server stolen
  3. not human error
    • viruses
    • lightning/storms
    • operation environment, like dust on disk
  4. Describe how data can be recovered
    • data from the disk is not physically erased
    • it is just removed from the index
    • so the software can be used to recreate links and place them back to idea
    • regularly create backups
    • so if data is lost, it can be recovered using the backup
  5. Describe why data loss is a more serious problem than software or hardware loss for a sales company
    • loss of a hardware not major because it is not too expensive for company; hardware substitute can be purchased
    • loss of software is not a critical problem if backups have been made
    • it is difficult/impossible to replace data
  6. Identify methods of protecting data
    • password
    • cryptography
    • internal controls/separating of employees/ secured waste
    • antivirus programs
    • backup systems
    • strengthen physical security
  7. This question is about WLAN
    1. Identify hardware components of WLAN (other than computer)
      • wireless router/modem
      • access points
      • switch
      • wireless repeater/extender
    2. Outline disadvantages of WLAN
      • data transfer rate less than LAN
      • WLAN has lower bandwidth than wired LAN
      • less data security as devices from outside can access network/intercept transmission
    3. Identify ways the network administrator can reduce risk of unauthorized access to confidential data
      • give each user appropriate login details
      • different access rights for students
      • all passwords to be encrypted
      • use latest WiFi protocols/WPA2
      • require MAC address authentication
      • password protected documents
  8. State the role of
    1. a client
      • a piece of computer hardware/software that accesses a service made available by a server OR
      • the role of the client is to access a service made available by a server by sending a request for service
    2. a server
      • a program/host computer that awaits and fulfils requests from client program (in the same or other computers) OR
      • the role of a server is to fulfil requests from client programs
  9. Packet switching over the internet makes use of standard protocols during its operations
    1. Define the term standard protocol
      • they are rules/procedures
      • governing the transmission of data
      • that allow data to be correctly received
    2. Outline the purpose of using protocols [2]
      • Set of rules for transmitting data correctly
      • Ensure that data is send from customer’s computer and received by shop’s computer
      • To create secure transmission of data from the client to the server through the use of HTTPS, so the customer can pay securely
    3. Outline the main differences between data security and data integrity
      • data security:
        • deals with preventing the data being intercepted by a third party
        • ensures that the people who must have access to the data are the only ones who have access to it
      • data integrity:
        • concerned with the data not being altered during transmission
        • making sure that the data is complete and not corrupted
  10. This question is about a high-speed network
    1. Distinguish between Ethernet and wireless in terms of reliability [4]
      • Wireless: reliability depends on
        • Strength of wireless network
        • topology/shape of surroundings
        • Interference of simultaneous contacts
      • Ethernet:
        • More reliable as strength of signal independent from distance from router
        • No issue with topology of surroundings
        • But connection depends on condition of cables (can’t be loose or broken)
    2. State technology necessary for a VPN [1]
      • SSL 3.0
      • TLS (transport layer security) with encryption
      • IPsec with encryption
    3. Explain how a VPN allows a person to connect securely to their company’s network [4]
      • Tunnelling protocols: allows the data to be encapsulated/hidden whilst travelling across the internet
      • Encryption protocols (IPSEC): so if hacked will not be understandable
      • Use of gateways: which allow the person to connect with the company’s server
  11. This question is about the OSI layer
    1. Outline the concept of the Open Systems Interconnection (OSI) model in communication across a network [3]
      • The OSI is a standardized system/model for network connection
      • Which consists of 7 layers
      • Each dealing with a specific part of network communication
      • For example, the physical layer which defines the physical connection
    2. Outline, with an example, the function of protocols [3]
      • Protocols are a set of roles to facilitate a process being carried out correctly
      • For example, in the physical layer, the protocols would define the methods for opening and closing communication
  12. This question is about packet switching
    1. Outline why packet switching helps provide better security and is less likely to be affected by network failure
      • Better security
        • Data is not sent all together
        • But is divided/sent in separate packets
        • Each packet is formatted, addressed, and routed
        • Packets sent by different routes
        • Making the complete message more difficult to intercept
      • Less likely to be affected by network failure
        • Individual packets can be sent by different routes
        • So if one route is down, others can be used
    2. Describe how to packets are correctly reassembled by the receiving computer
      • As each packet contains control data/packet sequence number
      • Receiving computer can combine packets in correct order
  13. This question is about personal information and shops
    1. State measures the book skop can take to address risks [2]
      • All private information must be encrypted
      • Transmission channel must be protected by encryption
      • Logging on to the system must be secured
      • Dual data backup system in case of accidental deletion
    2. Outline consequences to the customer if their data is not adequately protected [2]
      • Details stolen; used for fraudulent purposes
      • Contact details could be shared; used for fraud/junk mail
      • Personal details stolen; for identity theft
  14. This is a hospital question
    1. Identify two ways in which security of network within hospital can be ensured [2]
      • Each user should have a password that is changed regularly
      • Each computer should have access rights depending on location
      • Computers should not be unattended
    2. Describe how data could be recovered in case of corruption [4]
      • All data should be backed up daily/weekly
      • So most recent backup of master file is loaded during corruption
    3. Outline how the network administrator can reduce the risk that sensitive data is only seen by a doctor [4]
      • Each user should have appropriate access rights
      • Passwords should be encrypted
      • File systems should be encrypted
      • Administrator should record who has logged on from which computer and for how long
  15. This is a question in wires
    1. Outline advantages of WLAN over LAN [4]
      • Use on the move: more versatile staff, encouraged to collaborate
      • Allows employees to use their own devices: leads to greater productivity as familiarity with device
      • No extra equipment is needed for expansion after initial setup, therefore improved safety for employees
    2. Discuss issues and how to resolve [4]
      • Data can be intercepted
      • Resolved using strong encryption, WPA2, trusted MAC address, regular hanches of router password
      • BYOD (bring your own device) issues leading to insecure devices: solve by only allowing approved devices, with added security features
    3. Explain how a VPN is suitable in this solution [4]
      • Allows employee’s device to appear to be part of internal company network
      • Allowing them full access to network resources
      • Allows company’s own protocols to be used to ensure security
      • Even though data is passing over outside network

Programming concepts

Short questions

  1. Sate the BigO efficient of sequential and binary search
    • O(n)
    • O(log n)
  2. Define syntax and semantics in relation to programming languages
    • syntax: the rules of the structure (creation) of a programming language
    • semantics: the interpretation or meaning of the statements in a programming language
  3. State tasks performed by a compiler
    • translates HLL to machine code
    • generates error messages
    • accesses built-in routines provided by HLL used
    • creates a separate machine language program
    • performs lexical analysis
    • performs syntactical analysis
  4. Explain why subroutines are easier [1]
    • Can be written independently
    • Can be tested independently
    • Can be used many times
  5. Compare internal and external sorting
    • internal sorting methods allow a set of data to be sorted by loading data into primary memory and applying sorting algorithm there
    • external sorting is needed when the data is too large for the available primary memory space
    • sorting takes place by loading subsets of the data into primary memory to be sorted
  6. Outline differences between a compiler and an interpreter
    • an interpreter converts a single instruction to machine code before execution takes place
    • a compiler creates a separate machine code version of the entire program while an interpreter does not
    • to execute a compiled program, the compiler does not need to be in the primary memory while the execution of an interpreted program requires the interpreter to be located in the primary memory at all times
    • with a compiler, a program only needs to be translated once, whereas with an interpreter it needs to translate every time used
  7. Identify features of a computer language
    • fixed vocabulary
    • unambiguous meaning
    • consistent grammar and syntax
    • provide a way to define basic data types and operations on those types (ability to write functions/procedures)
    • provide the ability to to I/O handling
    • has to be able to be run/processed on computer
  8. State two fundamental operations other than add and retrieve
    • compare
    • Store
  9. Explain why x is never zero in (y/x)
    • To prevent a possible division by zero/run-time error/execution error/program from crashing

Longer questions

  1. This question is about HLLs
    1. Identify why consistent grammar and syntax are essential features [2]
      • Easy to learn/use
      • No compilation errors
      • Less logical errors
      • Further maintenance and development possible by other programmers
    2. Describe an advantage to application programmers having both interpreter and compiler [2]
      • Interpreter is faster and immediately warns about syntax errors/executes commands and they could use it instead of compiler while coding and debugging their programs
      • Compiler required when there is need to produce an executable version of the program
    3. Outline the need for predefined sub-programs and collections [2]
      • Reusability
      • Modularity
      • Reliability (reduces cost and time needed to develop large programs)

Abstract data structures

Short questions

  1. Define recursion [2]
    • Function that calls itself
  2. Describe the characteristics of a
    • Queue
      • FIFO data structure
      • Items can be added only to rear/tail and removed from front/head
  3. Compare the use of a linked list with an array to store an process the daily sales in a business [3]
    • size/length of a static array is predetermined/fixed, and the size of a linked list can be changed, it depends on the memory available
    • Linked list can be expanded to suite the daily sales
    • Each item in a static array can be directly accessed whilst access to the items in linked list is sequential
    • And searching for a given item in linked list is slower, as it cannot be searches for using binary search
  4. Explain benefits of using BST compared to stack when searching for a specific item [3]
    • Time efficiency
      • Data in BST is ordered
      • Such that as each node is checked for the item, half the remaining nodes are ignored
      • While all the elements in the stack have to be checked
      • So for large data sets, stacks may be inefficient as compared to BST
    • Memory efficiency
      • Each element on the stack has to be removed to be checked
      • When item is found, the stack’s contents will be changed
      • But when the element is found in the BST, the contents are not removed from the BST
      • So there is no need to create an additional copy of the BST, but a copy of a stack needs to be created
  5. Explain how elements in the stack may be reversed using a quee [4]
    • Create an empty queue
    • While stack is not empty
      • Pop an element from the stack
      • Enqueue the popped element
    • While queue is not empty
      • Dequeue
      • Push dequeued element back on the stack
  6. Compare a binary tree to a linked list in terms of searching and storage required [4]
    • A binary tree is faster and more efficient at searching as it can make use of binary search
    • A singly linked list is slower and less efficient as it is a linear/sequential data structure
    • More storage is required in a binary tree as it requires two pointers, and less storage is required for a singly linked list as it requires only one pointer
  7. Outline why recursive solutions can be memory intensive [2]
    • Recursive call involves use of stacks
    • For storing/pushing data
    • If many recursive calls are made, memory usage can be very large
  8. Explain why a stack was used in the game [2]
    • LIFO structure
    • In game, allows “undo” function so movements can be retraced
  9. Outline one advantage of making the queue dynamic [2]
    • Dynamic queue would not have fixed size
    • Memory is allocated as required/there is always sufficient memory to accommodate the queue

Resource management

Short questions

  1. Outline why a virtual machine is an example of abstraction that is particularly useful when testing software on different platforms [3]
    • Provide software emulation/virtualization of other OSs
    • While hiding/abstracting physical environment/OS/execution environment of host machine
    • Do not directly correspond to any real platform so software may be tested/executed on any platform=
    • Software to be tested is compiled into the language of the virtual machine, and this is interpreted into the language of the host machine
  2. Explain two functions that an operating system needs to perform in relation to multitasking [4]
    • Memory management:
      • OS allows more than one process to share memory
      • By allocating separate memory to each program
      • Provides memory isolation for each process
    • Processor management
      • To allow appearance of more than one program running at the same time
      • By allocation of time slices
      • Decides which process runs at a certain point in time
      • Arranges the execution of applications so that you believe that there are several things happening at once
      • Prioritizes tasks by importance
  3. Describe how memory management of an OS prevents the system from crashing when more than one program is run at the same time [2]
    • OS allocates and deallocates specific sections of memory to each program/module
    • Ensures that the memory assigned to one program is not overwritten
    • Uses secondary/virtual memory to allow more processes to run simultaneously
  4. Outline the use of paging in relation to virtual memory [2]
    • Paging allows similar-sized sections of data
    • Identified by specific addresses
    • To be swapped between RAM and secondary memory/storage
  5. Explain the consequences of 1GB RAM on a multimedia game laptop [3]
    • Software required more RAM to run efficiently
    • Paging would be regularly used
    • In order to load required modules
    • Slowing down operation of laptop
    • Laptop does not have dedicated graphics processor
    • Results in low graphics