St. Augustine'S High School Computing Paper 1: Term 1 U6 End of Term Exam 2014 Instructions: Answer All Questions
St. Augustine'S High School Computing Paper 1: Term 1 U6 End of Term Exam 2014 Instructions: Answer All Questions
1. (a) One of the essential components of an expert system is the knowledge base. Using a
suitable example, describe the nature and structure of data within a knowledge base. [4]
(b) Describe any two benefits and two limitations of expert systems. [4]
2. (a) Suggest a type of file organisation suitable to an ATM system and give two reasons for
your choice. [3]
(b) State
(i) two advantages and [2]
(ii) One disadvantage of using variable length records. [1]
(c) Explain two reasons why a CD-ROM is more suitable than a floppy in storing system
and application software [2]
(d) Describe one example when it is more appropriate to use a variable length records. [2]
4. (a) Describe the main components of a typical PC-based control system [4]
(b) Explain the term feedback [2]
(c) Describe a system that uses feedback [4]
8. (a) Explain how records in an indexed sequential file are accessed. Assume the use of full
indexes. [5]
(b) Explain one disadvantage of using indexed sequential file. [1]
(c) Using a relevant example, explain the use of sequential access file structure in batch
processing. [2]
(d) State the main benefit of indirect addressing. [1]
9. Tradesman Company is upgrading its stock control system. OMR was used as a method of
data capturing in the previous system. One of the objectives of the system is to monitor and
control stock levels at regular basis.
(a) Name any 3 methods of collecting stock control data. [3]
(b) List 4 factors that determine the method of data collection. [4]
(c) The software to be used should support audit trail. Explain the term audit trail and state
reasons for this functionality. [6]
10. A university gives unique identification codes to each of the registered students. The code is
made up of letters and 6 digits. All the student codes are in the format: R035874K. Records
are stored by the computer on hash files.
(a) Validation is done on the codes each time data is entered.
(i) Explain the purpose of validation [1]
(ii) Describe two types of validation that can be applied on this code [2]
(b) Explain why a hash file is most appropriate for storage of records [2]
(c) Give a full description of what happens when a new record is being added to the hash file
storage. [5]
11. ZimPost mail order sets up a wide area network so that members of the public can place
orders directly with the company’s computer system.
(a) (i) State two advantages to the company and one to the customer of such a system. [3]
(iii) State the hardware needed by the public in addition to the basic computer system
to allow communication to take place. [3]
(b) Customers will be able to order goods by entering a code number. There is likelihood that
they will make errors.
(i) Identify and explain any three types of input errors. [3]