0% found this document useful (0 votes)
41 views

SAT Collection CS 11

The document provides a sample marking scheme for a summative assessment on computer science for grade 11 students. It includes 20 multiple choice and written response questions testing students on topics like software categories, operating system functions, CPU components, memory types, programming languages, algorithms, systems development life cycle stages, and data collection techniques. The marking scheme at the end provides the answers and point values for each question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

SAT Collection CS 11

The document provides a sample marking scheme for a summative assessment on computer science for grade 11 students. It includes 20 multiple choice and written response questions testing students on topics like software categories, operating system functions, CPU components, memory types, programming languages, algorithms, systems development life cycle stages, and data collection techniques. The marking scheme at the end provides the answers and point values for each question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Collection of tasks for summative assessment for the term

on the subject"Computer science"


Grade 11

1
Sample questions and marking scheme
Tasks for the Summative Assessment for the 1 term.

1. Name software category that helps users to complete specific tasks.


…………………………………………………………………………………………………………
[1]
2. Provide three basic functions of the operating systems.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[1]
3. Explain the purpose of accumulator inside the Central Processing Unit (CPU).
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[1]
4. Compare two computer memory types, RAM and ROM. Fill in the table with plus (―+‖) sign
where necessary only once for each feature.
Provide at least three correct answers.
Stores BIOS and Memory size
Volatile computer initial may be about
boot instructions 8GB
RAM
ROM
[1]
5. Explain, when virtual memory might be used by the computer system.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[1]
6. Name the fastest memory unit that usually resides in the CPU.
……………………………………………………………………………...………………………….
[1]
7. Simplify the logical expression below using De Morgan`s law, show your workings
NOT(A OR B)OR NOT A AND B
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[2]
8. Complete the truth table for the following logic circuit of ―half adder‖.

A B C S
0 0 0 0

[3]

2
9. Identify which programming languages generation refers to the following snippet of code.

………………………………………………………………………………………………………
[1]
10. Provide one example of a low level programming language.
………………………………………………………………………………………………………
[1]
11. Write one example of a high level programming language.
………………………………………………………………………………………………………
[1]
12. Analyze the assembly code below and figure out value of accumulator.

JNP – Jump if not positive


JMP – Jump
Address Contents LDA 2
1 7 SUB #3
2 14 JNP num2
3 5 LDA 2
4 9 JMP end
Accumulator: num2 LDA 3
……………...……….. end HLT
……………………….
[1]
13. Fill in the trace table below.

K:=1
X:=5 i X K
FOR i:= 1 TO 4
IF (i + K) < X
X:= X – 1
ELSE
K:=K + 1
ENDIF [4]
ENDFOR

14. Provide two disadvantages of low level programming languages.


…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[2]
15. After translating some piece of code the translator provided the following message:

3
a) Name the translator type.
……………………………………………………………………………………..………………….
[1]
b) Justify your choice, provide reasons.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[1]
16. The System`s life cycle contains five main stages.

a) Name stage where system objectives have to be listed.


………………………………………………………………………………………………………
[1]
b) In which stage interface of the program must be developed.
………………………………………………………………………………………………………
[1]
c) Name the missing stage of the System Life Cycle from the picture above.
………………………………………………………………………………………………………
[1]
17. Provide two advantages and two disadvantages of the Agile model over Waterfall model.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………........
[4]
18. Different data collection techniques are used in project development.
a) Name data collection technique that would be appropriate to gather statistical data.
………………………………………………………………………………….……………………..
[1]
b) Name data collection technique that would be appropriate to gather data about a system
thoroughly.
…………………………………………………………………………………………………………
[1]
19. Draw a Context Data Flow Diagram (DFD) of the Online Shopping system which incorporates
the followings:
4
 customer can see the details of the product
 seller can publish products` details for selling to the system so everyone can see them online
 administrator can make requests on data about customer, seller and products details
 system connects all the entities

[4]
20. Draw a flowchart of algorithm that finds maximum number value in the array of numbers.

Note*: Use only the flowchart components above. Any of the components can be used several
times!

[4]

5
Mark scheme
№ Answer Marks Comments
1 Application software 1
2 Manage computer resources, memory/CPU 1 Maximum 1 mark for
Manage computer 1 3 correctly provided
Provide platform for application software 1 functions of Operating
Provide interface between user and hardware 1 System, no marks for
Input / output management 1 only 2 or 1 correct
Controls every task the computer carries out [max 1] answer
3 To store temporary results/values 1
To store intermediate results/values 1
[max 1]
4 Volatile Stores BIOS and Memory size may 1 mark if 3 correct
computer`s initial be about 8GB 1 answers are provided,
boot instructions no marks for only 1 or
RAM + + 2 correct answers.
ROM + [max 1]
5 If physical memory is full, virtual memory may be used 1
6 Cache memory 1
7 Applying De Morgan`s Law - NOTA AND NOTB 1 Using De Morgan`s
(NOT A) 1 Law, namely NOTA
[max 2] AND NOTB
8 A B C S For each correct row -
0 0 0 0 1 mark

0 1 0 1 1
1 0 0 1 1
1 1 1 0 1
[max 3]
9 Second generation 1
10 Assembly language 1
11 C++ 1 Accept any other
Pascal 1 reasonable answer
[max 1]
12 14 1
13 i X K 1 mark for 1 correct
row.
1 4 1 1
2 3 1 1
3 3 2 1
1
4 3 3
[max 4]
14 One line of code in high level programming language may be
many lines of code in low level programming language 1

Difficult to find errors( to debug ) 1

Difficult to learn in comparison with high level programming 1


languages [max 2]
15a Compiler 1
b Compiler checks all the code and finds all the errors in one go 1
If interpreter finds a bug, it will not translate further and stop 1
[max 1]
16a Design 1
b Implementation 1

6
c Evaluation 1
17 Advantages:
Client will get the desired system 1
Client is involved 1
Changes can be made at any stage 1
Disadvantage:
Might need involvement of different specialists 1
Time boundaries might be unpredictable(increased) 1
Expenditures for the project might increase 1
[max 4]
18a Questionnaire 1 Accept any of the
Survey 1 correct answers
[max 1]
b Interview 1 Accept any of the
System observation 1 correct answers
[max 1]
19 Customer can see the details of the product (External entity) 1
Seller can publish products` details for selling to the system So 1
everyone can see them online(External entity)
Administrator can make requests on data about customer, Seller 1
and products details(External entity)
All the entities connected to system(External entity) 1
[max 4]
20 Declaring
variables(i,max,Arr[])
– 1mark
Accept any array
element assigned to
max, e.g. max =
Arr[0]
Selection(if
Arr[i]>max) – 1mark
Operation (Max =
Arr[i]) – 1mark
Outer selection(IF i <
length(Arr) – 1 mark)
[max 4]
Total 40

7
Sample questions and mark scheme
Tasks for the Summative Assessment for the term 2

1. The «Students» table is illustrated below.


ID FirstName LastName Email
1 Student1 Student11 [email protected]
2 Student2 Student22 [email protected]
3 Student3 Student33 [email protected]

a) Provide term name for the following elements of the table:


ID, FirstName, LastName and Email.
……………………………………………………………………………………………..
[1]
b) Provide term name for the whole row with underlined data.
……………………………………………………………………………………………..
[1]
2. Explain why compound primary key might be used instead of simple primary key when
designing tables.
………………………………………………………………………….…......……………………
……………………………………………………...……….………………….…..………………
[1]
3. Explain the role of foreign key in comparison with simple primary key.
……………………………..……………………………………………………….………………
…………………………..……………………………………………….…………………………
………………………..…………………………………………………………….………………
…………………………………………………………………………….……..…………………
[2]
4. Provide appropriate data types for the following fields.
a) Price…………………………………………………………………..………………...[1]
b) Telephone number………...…………………………………………………..………..[1]
c)
5. Draw an entity relationship diagram (ERD) according to the following criteria:
 Students can be in different groups
 Teachers can create 5 tests
 Teachers can create more than one group

[3]
8
6. Look through the requirements of the 3rd Normal Form(3NF) below:
 ―It is already in 2NF‖
 ―There are no non – key attributes that depend on another non – key attribute‖
Following the rules above normalize the «Borrowed_Books» table to the 3rd Normal Form.

Borrowed_Books

BorrowingID Author Book title Borrowing date StudentID*


1 Mukhtar Auezov The path of Abai 25.09.2018 3
2 Abay Kunanbayev Book of wisdom 17.06.2018 3
3 Mukhtar Auezov Beauty in Mourning 9.06.2018 8
4 Mukhtar Auezov The path of Abai 15.08.2018 5

Use the space below to complete the task.

[4]
7. Explain the purpose of database Normalization
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
8. Explain, why data dictionary is necessary to include in system development documentation
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
9. Compare the following SQL statements, ALTER TABLE and UPDATE.
Explain the difference between them in terms of functionality.
ALTER TABLE
…………………………………………………………………………………….….……………
……………………………………………………………………………….…….………………
[1]

9
UPDATE
……………………………………………………………………….…………….………………
……………………………………………………………………………………..………………
[1]
10. Write SQL statement to add a new column called ―Email‖ to the ―Customers‖ table
………………………………………………………………………………………….…………
……………………………………………………………………………………….……………
[2]
11. Write SQL statement to remove the table named ―Games‖
……………………………………………………………………………………….……………
……………………………………………………………………..………………….…………..
[1]
12. Write SQL statement to change phone_number of student with ID “7” from
“Students” table to new number “87011234567”.
…………………………………………………………………………………….………………
……………………………………………………………….…………………..………………..
………………………………………………………………….…………….…….……………..
[2]
Write SQL statement to remove a record with ID ―3‖ from the ―Clients‖ table.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
13. Write one SQL statement to show FirstName, LastName and City from the
tables below with CountryID “7”.

Students Cities
ID FirstName LastName CityID ID City CountryID
1 Student1 Student11 3 1 City1 5
2 Student2 Student22 5 2 City2 7
3 Student3 Student33 2 3 City3 3
………………………………………………………………………….…………………………
……………………………………………………………………….……………………………
………………………………………………………….…………………………………………
[3]
14. Draw Level 1 Data Flow Diagram (DFD) of the system that allows user to log in with username
and password. Use the space below for working.

[3]

10
15. A new system must perform «operation1» and prompt to enter a value for variable «E». The
system runs while variable «E» equals to TRUE, otherwise if it is not TRUE, the system shuts
down.
Create a flowchart of the system in the space below.

[2]
16. Provide one advantages and one disadvantage of prototyping when developing solutions.
………………………………………………………..…………..………………………………
……………………………………………………………………………………………………
[2]
17. Provide two possible limitations of face recognition system with explained reasons(causes).
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………................................
[2]
18. Software developers usually use Integrated Development Environment(IDE) for developing
software. Describe what features does the IDE provide for the developers.
……………………………………………………………………………………………………
…………………………………………………………………………………………………....
[1]
19. A private medical center needs a system, that provides patients with useful functions, such as:
 making appointments with doctors online;
 view all available doctors;
 make online payments
Provide appropriate software type and justify your choice
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]

11
Mark scheme

№ Answer Mark Comments


1a Attribute/Field Name 1
b Record 1
2 Composite primary key might be used when one attribute/simple 1 Give maximum
primary key is not enough to provide a unique record one mark for
each similarity
Composite primary key made up of two or more fields or attributes, 1 and difference
whereas simple primary key is made of only one field [max 1]
3 Simple primary key ensures that there are no repeated records in the 1
database
Make sure that there are no repeated records 1
Simple primary field provides unique record 1
Foreign key is used to link(connect ) tables 1
A foreign key points to a record in another table whose primary key is 1
the same value. [max 2]
4a Real/double/float 1
b Text/string 1
5 one to many
relationship
between
teachers and
tests – 1 mark

one to many
relationship
between
students and
groups – 1
mark

one to many
relationship
between
teachers and
[max 3] groups – 1
mark

12
6 Creating
«Books» table
Borrowed_Books 1 mark
BorrowingID BookTitle* Borrowing StudentID*
date Making
1 The path of Abai 25.09.2018 3 «BookTitle»
2 Book of wisdom 17.06.2018 3 field as a
3 Beauty in 9.06.2018 8 foreign key in
Mourning «Borrowed_Bo
4 The path of Abai 15.08.2018 5 oks» table 1
mark
Books
BookTitle Author Making
The path of Abai Mukhtar Auezov «BookTitle»
Book of wisdom Abay Kunanbayev field as a
Beauty in Mourning Mukhtar Auezov primary key in
«Books» table
The path of Abai Mukhtar Auezov
1 mark

Adding
«Author» field
to «Books»
table 1 mark

Accept
«BookID» as a
primary key in
«Books» table
and as a
Foreign key in
the
«Borrowed_Bo
oks» table

Accept table
structures with
field names,
[max 4] without data
within tables
7 The purpose of normalisation is to avoid redundant data and to make it 1
easier to maintain a database by only having to update a record in one
place only. [max 1]
8 It lists all the variables, tables, attributes, data types, forms of the 1
program being developed
It contains all the metadata of the variables, tables, attributes, data 1
types, forms of the program being developed [max 1]
9 ALTER TABLE is used to change or update table structure 1 Accept one
The ALTER TABLE statement is used to add, delete, or modify 1 correct answer
columns in an existing table. for ALTER
The ALTER TABLE statement is also used to add and drop various 1 TABLE and
constraints on an existing table. one answer for
UPDATE table is used to change or update data/information within 1 UPDATE
table
The UPDATE statement is used to modify the existing records in a 1
table. [max 2]
10 ALTER TABLE Customers 1 Accept string

13
ADD Email varchar(255) 1 or text instead
of varchar

Accept any
other other
correct number
[max 2] instead of 255
11 Don`t accept
DROP TABLE ―Games‖ 1 DELETE
statement

Accept DROP
[max 1] ―Games‖
12 UPDATE Students SET phone_number = ―87011234567‖ 1 1 mark for
WHERE Student_id = ―7‖ 1 UPDATE
Students SET
phone_number
=
―87011234567‖

1 mark for
WHERE
Student_id =
[max 2] ―7‖
13 DELETE FROM Clients 1
WHERE ID = 3 1
[max 2]
14 SELECT Students.FirstName, Students.LastName, Cities.City FROM 1 mark for
Cities 1 using SELECT
JOIN Students ON Cities.ID = Students.CityID 1
WHERE Cities.CountryID = ‗7‘ 1 1 mark for
using JOIN

1 mark for
using WHERE
clause

Accept INNER
JOIN, LEFT
JOIN, OUTER
JOIN

[max 3] Accept * after


SELECT
15 External
entity(user) and
labelled data
flow – 1mark

Process with
labelled data
flow– 1mark

Datastore with
[max 3] labelled data
flow – 1mark

14
16 While loop – 1
mark

Operation – 1
mark

[max 2]

17 Advantages: Accept any


reasonable
Detect errors in earlier stages and save time and money 1 answer

Prototyping can provide an opportunity to get feedback from the 1


customers themselves about the product to see how it fits their needs

Disadvantages:

Excessive Development Time: Prototypes are by nature designed to 1


be developed quickly. If a developer spends too much time developing
a complex prototype, the project can run into roadblocks (especially if
there are disagreements over prototype details) and run over both time
and cost budgets.

Insufficient analysis: A focus on a limited prototype can distract 1


developers from properly analyzing the complete project. The
potential end result: A potential overlooking of better solutions,
incomplete specifications or the conversion of limited prototypes into
poorly engineered and developed final projects that are hard to
maintain.

Developer misunderstanding of user objectives: For every project to 1


be successful, developers and customers must be on the same page and
share the same project objectives. If customers require all proposed
features of a prototype be included in the final product, this can lead to
team and mission conflicts. [max 2]
18 Example of possible limitation: Accept any
IMAGE QUALITY reasonable
Reason(Cause): example with
Image quality affects how well facial-recognition algorithms work. explanation
The image quality of scanning video is quite low compared with that 1
of a digital camera.

Example of possible limitation:


IMAGE SIZE
Reason(Cause):
When a face-detection algorithm finds a face in an image or in a still
from a video capture, the relative size of that face compared with the
enrolled image size affects how well the face will be recognized. An 1
already small image size, coupled with a target distant from the
camera, means that the detected face is only 100 to 200 pixels on a
side. Further, having to scan an image for varying face sizes is a
processor-intensive activity.

15
Example of possible limitation:
FACE ANGLE
Reason(Cause):
The relative angle of the target‘s face influences the recognition score
profoundly. When a face is enrolled in the recognition software,
usually multiple angles are used (profile, frontal and 45-degree are
common). Anything less than a frontal view affects the algorithm‘s 1
capability to generate a template for the face. The more direct the
image (both enrolled and probe image) and the higher its resolution,
the higher the score of any resulting matches.

Example of possible limitation:


PROCESSING AND STORAGE
Reason(Cause):
Even though high-definition video is quite low in resolution when
compared with digital camera images, it still occupies significant
amounts of disk space. Processing every frame of video is an
enormous undertaking, so usually only a fraction (10 percent to 25 1
percent) is actually run through a recognition system. To minimize
total processing time, agencies can use clusters of computers.
However, adding computers involves considerable data transfer over a
network, which can be bound by input-output restrictions, further
limiting processing speed. [max 2]
19 IDE might be provided with WYSIWYG technology 1
IDE might include all necessary libraries 1
IDE might include all necessary tools for convenient software 1
development [max 1]
20 Bespoke software/Custom software 1 Accept any
Software is developed to meet specific user needs 1 other
This kind of software is impossible to buy in the shops 1 reasonable
[max 2] answers
Total 40

16
Sample questions and mark scheme
Tasks for the Summative Assessment for the term 3

1. The data structure below contains 7 indexed elements and has a name ‗prime_nums‘.
Index 0 1 2 3 4 5 6
prime_nums
Element 1 3 5 7 11 15 17
a) Identify type of the data structure.
……..……………………………………………………………………………………..….…….
[1]
b) Write one line of pseudocode or use any programming language of your choice to assign number
13 to 5th element of the data structure.
……………………………………………………………………………………………….…….
[1]
2. Write pseudocode or use any programming language of your choice to display the element with
index 3 from the following sequence of integer numbers: 7, 8, 5, 7, 3, 6, 1, 9.
………………………………………………………………………………………………..……
[1]
3. The picture below illustrates a chess game board.
1 2 3 4 5 6 7 8
A
B
K
C
D
E
F
G
H

a) Define type of applied data structure for creating the chess board above.
……………………………………………………………………………………………...………
[1]
b) Write a line of code in any programming language of your choice or use a pseudocode to change
position of the ―K‖ from B3 to D2 on the chess board named ―myBoard‖.
………………………………………………………………………………………………...……
[2]
4. The numbers below are not listed in ascending order. Sort them applying «Insertion sort»
algorithm.
Note*: the index starts from «0»
5, 7, 10, 4, 13, 3, 8, 11, 15
Count and write total number of swaps when outer loop counter is 5.
……………………………………………………………….........................................……........
[1]
5. Show sequence of the following numbers: 4, 9, 7, 3, 5, 6, 8, 11, 2 after two pass of «Bubble sort»
algorithm.
………………………………………………………………………………………...……………
…………………..……………………...……………………………..……………………………
[1]
6. Applying binary search algorithm write how many comparisons are needed to find 20 in the list
9, 11, 12, 13, 15, 17, 20, 23, 25.

………………………………………………………………………………………….…………..
[1]
17
7. Analyze two algorithms below.
A B

Identify time complexity of each algorithm.


a) Time complexity of Algorithm - «A» is O(……….……).
[1]
b) Time complexity of Algorithm - «B» is O(……….……).
[1]
8. Explain the term «Space efficiency of algorithm»
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
9. Create a basic structure of a web document using HTML tags
<html>………………………………………………………………………………………………
……………………………………………………………………………………………………...
……………………………………………………………………………………………………...
……………………………………………………………………………………………………...
……………………………………………………………………………………………………..
</html>…………………………………………………………………………………………….
[2]
10. The image below illustrates autorisation data input form developed using HTML code.

Provide pure HTML code for creating the data input form.
Note*: don`t bother for styling!
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[3]
18
11. A web developer wants to create a data output form, which displays the followings: №, First
Name, Last Name and Email of all customers in a table format. The first HTML tags are
already written for you. Help web developer to complete rest of the HTML code.
<table>……………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
</table>……………………………………………………………………………………………
[2]
12. The image below demonstrates a piece of HTML code.

Write CSS code for the HTML above. Perform the followings:
 Change horizontal length of the DIV to 70%;
 Change text font of the first three paragraphs to blue color;
 Change text color of the last paragraph to «Green»;

………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
……………………………………………………………………………………….……………
………………………………………………………………………………………….…………
…………………………………………………………………………………………….………
[3]
13. Use Inline CSS to make the paragraph`s font «Arial»

< p .......................................................................... > Make me Arial </p>


[1]
14. Explain the purpose of using CSS while developing web pages.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
15. Web apps have to be connected to the database in order to work with it. Usually function which
connects database with web app requires four parameters, two of them are listed below. Write
two more parameters.
1. Username
2. Password
3. ………………………………………………………………………………….…………….
[1]
4. …………………………………………………………………………………………….….
[1]
19
16. Factorial of N is a product of all numbers from 1 to N. Applying loop structure write a
Javascript code that finds factorial of any N number.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
17. The image below illustrates Javascript code of an interactive web app. The app shows pop-up
window that asks user to enter the age and allows to input the value for age (code line 2), then
the program outputs the message via pop-up window (code lines 5 and 8).

Complete the javascript with appropriate code


Line 2:
……………………………………………………………………………………………………
[1]
Line 5 and 8:
……………………………………………………………………………………………………
[1]
18. The Javascript below is piece of mobile application code, that performs the followings:
 prompts user to enter numbers, 1 or 2;
 opens «page1.html» in case number is 1;
 opens «page2.html» in case number is 2;
 otherwise opens «page.html»;
Fill in the spaces with appropriate javascript code.

Line 3 …………………………………………………………………………….………..[1]
Line 5 ……………………… Line 6 ………………………………..…………………….[1]
Line 8 ………………………………………………………………….……………..........[1]

20
19. Mobile app developer designed a flowchart of program that prompts password three times. If
password is incorrectly entered three times, the system shuts down, otherwise it allows to enter
the system. The flowchart of the system is illustrated below.

Write code of the program using any programming language for mobile app development or
use pseudocode.
……………………………………………………………………………………………….……
……………………………………………………………………………………………….……
……………………………………………………………………………………………….……
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
…………………………………………………………………………………………….………
…………………………………………………………………………………………….………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
…………………………………………………………………………………………………….
[5]

20. Nowadays most websites have adaptive interface. Explain the term «Adaptive interface» and
why it is important when developing website interfaces.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]

21
Mark scheme

Additional
№ Answer Mark
information
1a Array 1
One dimensional array 1
[max 1]
b prime_nums[5] = 13 1
[max 1]
2 OUTPUT(Nums[3]) 1
3a 2 dimensional array 1
Multidimensional array 1
[max 1]
b myBoard[3][1] = «K» Accept
for index – 3 1 myBoard[4][2] = «K»
for index – 1 1 Or
[max 2] Accept
myBoard[4][2] = «K»
In case if index starts
from 1
4 8 1
5 4,3,5,6,7,8,2,9,11 1
6 2 1
7a O(n) 1
b O(n^2) 1
8 Algorithm «A» is more space efficient, since size of 1
array is only ten elements in comparison with
algorithm «B».
Algorithm «B» has array of size 4x4, which takes
more space
9 <head></head> 1
<body></body> 1
[max 2]
10 Email<input type="text"> 1
Password<input type="password"> 1
<input type="submit" value="Submit"> 1
or
<button type="submit">Submit</button> 1
[max 3]
11 <tr> 1st – mark for first
<th>№</th> <tr>
<th>First Name</th>
<th>Last Name</th> 1 2nd - mark for second
<th>Email</th> <tr>
</tr>
Accept <td> instead
<tr><td></td><td></td><td></td><td></td></tr> 1 of <th>
[max 2]
12 width:70% and selector div or id; 1
color:blue and using class .pr ; 1
#last_p and color:green; 1

22
[max 3]
13 < p style=‖font-family:Arial‖ > Make me Arial </p> 1
14 CSS is used to change styles of the webpage 1 Accept any other
reasonable answers
15 Hostname 1
Database name 1
[max 2]
16 F = 1; Accept While loop
for(i=1; i<=N; i++) {
F = F * i; 1
}
Loop 1
[max 2]
17 Line 2: age = prompt(―Enter your age‖); 1
Line 5 and 8: alert(message); 1
[max 2]
18 Line 3: if (number == 1) 1
Line 5: else Line 6: page2.html 1
Line 8: page.html 1
[max 3]
19 1 Accept any other
1 reasonable or similar
1 solutions.
1 Don`t accept while
loop, if it is a loop
with precondition
Don`t accept for loop
1

Or

1
1
1
1

[max 5]
20 Adaptive interface means that the interface can 1 Accept any other
automatically be adapted to devices with various sizes reasonable answers
of screens.
The interface`s appearance will look good in all 1
devices with different screen sizes

It is important feature nowadays, because there are 1


lot`s of various devices with various screen sizes [max 2]
Total 40

23
Sample questions and mark scheme
Tasks for the Summative Assessment for the term 4

1. The image below demonstrates a piece of incomplete code from «Crosses and noughts» game.

Write selection statement, that meets the following requirements:


 compare the entered number with the numbers in the grid,
 if the numbers are equal, the number in the grid is substituted with character ‗X‘.
 otherwise, if the entered number is not in the grid, output message «Try again!».

……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[3]
2. Write a code or a pseudocode for a game, that does followings:
 prompts(asks to enter) a number from a user in range from 1 to 10;
 computer randomly generates a number and compares it with the entered number;
 if number is found by the computer, the program should stop and output total number of
guessing attempts.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[5]
24
3. The snippet of code below illustrates a program that calculates sum of the numbers from 0 to
100, and outputs even results on the browser window. The program works fine, and have no bugs
in it. However, the program code is badly written.

Rewrite the code so that, it will meet requirements of a good code, show your workings.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[3]
4. Explain the purpose of using «Data integrity» while designing database
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
5. Compare data backup and disk mirroring techniques, explain the difference between them.
……………………………………………………………………………………….……………
……………………………………………………………………………………….……………
……………………………………………………………………………………….……………
……………………………………………………………………………………….……………
……………………………………………………………………………………….……………
[2]
6. Explain, why passwords in database are stored in encrypted format.
……………………………………………………………………………………….……………
………………………………………………………………………………………….…………
……………………………………………………………………………………….……………
[1]
7. Explain the difference between terms data validation and data verification.
Data validation
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
Data verification
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
25
8. Provide two benefits of applying Blockchain technology
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
9. Provide two characteristics of closed source software.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
10. Give two uses of Firewall in computer systems
…………………………………………………………...………………………………………..
….…………………………………………………………………………………………………
…...…………………………………………………………..……………………………………
……...…………………………………………………..…………………………………………
…..…….………………………..…………………………………………………………………
[2]
11. Provide reasons, why web browsers sometimes block cookies.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
12. Explain the difference between the Local Area Network(LAN) and Wide Area Network(WAN)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
13. Compare «Bus» and «Star» network topologies, and provide one advantage for each

«Bus» network topology


…………………………………………………………………………………………..…………
…………………………………………………………………………………..…………………
…………………………………………………………………………..…………………………
…………………………………………………………………..…………………………………
………………..………………………………………………………………………
[1]
«Star» network topology
…………………………………………………………………………………………..…………
…………………………………………………………………………………..…………………
…………………………………………………………………………..…………………………
…………………………………………………………………..…………………………………
………………………………………………………………………..………………
[1]

26
14. Compare and explain the difference between the following network devices.
Switch
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
Hub
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
15. Identify three parts of the URL below, protocol, host name and location on the server
«https://a-teach.com/teacher/edit_student»
Host name…………………………………………………………………..……..…….……..[1]
Location on the server…………………………………………………………..……………..[1]
Protocol………………………………………………………………………..…….………....[1]

16. Explain, why people use domain names instead of IP addresses, and what is the role of Domain
Name Service (DNS) server
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
17. Explain working principle of the «Client – Server» model.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]

18. Explain why some websites require only HTTPS connection instead of HTTP, give example of
companies, which might use HTTPS.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
19. Describe the role of POP3 network protocol.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]

20. Identify class, network and host addresses of the following IP address 172.112.45.17
Network address…………………………………………………………………………...……..
[1]

27
Mark Scheme
Additional
№ Answers Mark
information
1 IF number = grid[i][j] 1
assigning «X» to grid[i][j] 1
ELSE OUTPUT(«Try again!») 1
[max 3]
2 1 Accept any
other
reasonable
solution
1
1
1

1
[max 5]
3

Adding comments 1
Indenting 1
Using sensible variable names(e.g. ‗sum‘ instead of ‘a‘ ) 1
[max 3]
4 Data integrity ensures that the data is clean and has no errors in it. 1
It ensures that the data was not corrupted and it is correct. 1
[max 1]
5 Data backup is a process of making a copy of disk periodically. If disk 1 Accept any
fails the last copied version of data can be restored other
Disk mirroring is when data is saved in two or more disks 1 reasonable
simultaneously. If one disk fails the second one will have saved data [max 2] answers
6 Passwords in database are stored in encrypted format due to security 1 Accept any
measures other
In case if someone will hack the database, the hackers will not be able to 1 reasonable
use the passwords [max 1] answers
7 Data validation is a process that ensures the delivery of clean and Accept any
clear data to the programs, applications and services using it. other
Example, checking for @ sign in email, checking for password 1 reasonable
length, check for data format, etc. answers
Data verification is a way of ensuring the user types in what he or
she intends, in other words, to make sure the user does not make a 1
mistake when inputting data.
An example of this includes double entry of data (such as when
creating a password or email) to prevent incorrect data input. [max 2]
8 Greater transparency 1 Accept any
Enhanced security 1 other
Improved traceability 1 reasonable
Increased efficiency and speed 1 benefits
Reduced costs 1
[max 2]
9 The source code of the closed source software can`t be edited and 1 Accept any

28
changed other
The source code of the closed source software can`t be downloaded 1 reasonable
and can`t be shared with anybody [max 2] answers
10 Firewall can control incoming and outgoing traffic 1
To prevent unwanted traffic, malware 1
[max 2]
11 Some web sites and search engines use them to track users as they 1
browse the web, collecting highly personal information and often
surreptitiously transferring that information to other web sites without
permission or warning.
Cookies can be dangerous because they essentially save your session in 1
tiny bits. If your computer becomes or is compromised, hackers can look
at those cookies and find your last session, be it your bank statement. [max 1]
12 A LAN (local area network) is a group of computers and network devices 1
connected together, usually within the same building. A WAN connects
several LANs, and may be limited to an enterprise (a corporation or an 1
organization) or accessible to the public. The technology is high speed
and relatively expensive. [max 2]
13 Don`t discard
mark if
«Bus» network topology is very simple and cheap to implement 1 diagram is
not provided

If one computer fails except node, others will still work 1


[max 2]
14 Switch sends data to particular device in the network 1 Accept any
Hub sends data to all devices in the network 1 other
[max 2] reasonable
answers
15 Host name: a-teach.com 1
Location on the server: teacher/edit_student 1
Protocol: https 1
[max 3]
16 People use domain names instead of IP addresses, because it is 1 Accept any
easier to remember for people other
Domain Name Service (DNS) servers are used to convert domain 1 reasonable
name to IP address of the requested website. [max 2] answers
17 Client sends request to the server, server processes and sends 1
response back to the client computer. [max 1]
18 HTTPS is more secure than HTTP 1 Accept any
HTTPS is used when payment process has to take place 1 other
HTTPS is used when sending or receiving sensitive data 1 reasonable
Examples: Bank websites, Online payment systems, Websites working 1 answers,
with sensitive data [max 2] examples
19 POP3 (Post Office Protocol 3) is the most recent version of a standard 1 Accept any
protocol for receiving e-mail. other
POP3 is a client/server protocol in which e-mail is received 1 reasonable
[max 1] answers
20 Network address: 172.112 1
[max 1]
Total 40

29
Collection of tasks for summative assessment for the term
on the subject"Computer science"
Grade 12

30
Sample questions and marking scheme
Tasks for the Summative Assessment for the 1 term.

1. Explain term «Artificial Intelligence».

[2]

2. Discuss about pros and cons outcomes of application AI for application area «Medicine».
+ -

[2]

3. Give 2 characteristics of augmented reality.

[2]

4. Indicate the scope for using augmented reality. Give an example.

[2]

5. Briefly explain the difference between declarative and imperative languages.

31
[2]

6. Write one example of imperative programming language and one example of declarative
programming language.

[2]

7. List the 3 characteristics of Expert Systems

[3]

8. Describe difference between Artificial Intelligence and Expert systems.

[1]

9. A simple logic processing language is used to represent, as a set of facts and rules, the valid
construction of sentences. The set of facts and rules are shown below in clauses labelled 1 to 13.
1. determiner (the).
2. adjective (big).
3. adjective (little).
4. verb (is).
5. verb (climbs).
6. noun (thomas).
7. noun (hill).
8. noun_phrase(X) :- noun(X).
9. noun_phrase(X,Y) :- determiner(X) , noun(Y).
10. noun_phrase(X,Y,Z) :- determiner(X) , adjective(Y) , noun(Z).
11. sentence (A,B,C) :- noun_phrase(A) , verb(B) , noun_phrase(C).
12. sentence (A,B,C,D,E) :- noun_phrase(A) , verb(B) , noun_phrase(C,D,E).
13. sentence (A,B,C,D,E) :- noun_phrase(A,B,C) , verb(D) , noun_phrase(E).

Clause 1 has the meaning ‗the is a determiner‘.


Clause 9 has the meaning ‗X followed by Y is a noun_phrase if X is a determiner and Y is a noun‘.
Using the given set of facts and rules (1–13) above, give one example of

(a) a fact: [1]

32
(b) Using the given set of facts and rules (1–13) above, state whether or not the following sentences
are valid.

dias climbs the little hill:


the little hill climbs dias: [2]

10. There is an expert system structure. Fill in the gaps where the numbers are indicated.

2 [2]

11. Describe term «Lexicon» in computer programming.

[2]

12. Explain stage of compilation «Syntax analysis».

[2]

13. A programmer has been asked to write a routine which will calculate a person‘s age in years
from the date of birth supplied as a parameter to the routine and today‘s date, taken from the
system. The date of birth is supplied in the format dd/mm/yyyy and has already been checked by the
system to be a valid date before it is passed to the routine. No person is expected to be over 120
years old.
Suggest suitable values for each of the types of test data, normal, boundary and erroneous, and
explain why you have chosen these values.
(a) two values of normal data:
(i) (ii) [2]

33
14. Explain term «Normal data».

[1]

15. Explain term «Extreme data».

[1]

16. Give an example of extreme data for checking the age of people. Justify answer

[2]

17. Give an example of erroneous data for checking the age of people.

[1]

18. Explain term «Erroneous data».

[2]

19. Define the term "Syntax error". Give an example.

[3]

20. A programmer has created an algorithm to reset the contents of an array with ten items back to
zero. This is the algorithm but it contains a logical error.
34
State why the algorithm above contains a logic error.

i=1
REPEAT
Array(i) = 0
i=i+1
UNTIL i = 10

[3]

35
Mark scheme
Additional
№ Answer Marks
information
1 Artificial Intelligence is a field of computer science wherein MAX=2
the cognitive functions of the human brain are studied and
tried to be replicated on a machine/system. Artificial
Intelligence is today widely used for various applications like
computer vision, speech recognition, decision-making,
perception, reasoning, cognitive capabilities, and so on
2 Answer: MAX=2 for each
+ - correct
The phrase ―human error‖ There is little doubt that answer is
was born because humans, artificial intelligence will awarded 1
naturally, make mistakes displace many low-skilled point
from time to time. jobs. Arguably, robots have
Computers however, do not already taken many jobs on
make these mistakes – that the assembly line – but now
is, of course, assuming they this could extend to new
are programmed properly. levels. Take, for example, the
With artificial intelligence, concept of driverless cars,
data could be processed which could displace the
errorfree, no matter how need to have millions of
big the dataset might be human drivers, from taxi
drivers to chauffeurs, very
quickly. Of course some
would argue that artificial
intelligence will create more
wealth than it destroys – but
there is genuine risk that this
will not be distributed
evenly, particularly during its
early expansion.

3 Answer: 2 for each


1. combines virtual and real; correct
2. interacts in real time; answer is
3. Works in 3D. MAX=2 awarded 1
point
4 Answer: MAX=2 for correct
For example, education. Example: using textbooks with answer is
elements of augmented reality: animated graphic elements, awarded 1
etc. point
For example, medicine. Example: vein search, etc.

5 Answer: MAX=2 for correct


A declarative language consists of statements of facts. These answer is
facts can be consulted using questions to be used to query awarded 1
those facts. point

36
An imperative language consists of statements which cause
actions to happen/ give commands for the computer to
perform. For example, in

6 Imperative programming language – Pascal MAX=2 Any correct


Declarative programming language – Prolog answer

7 Answer: MAX=3 for each


correct
High performance answer is
Understandable awarded 1
Reliable point
Highly responsive

8 Answer: 1 for correct


AI imitates human thinking and behavior. AI can learn, answer is
working without complete information, analyze nonlinear awarded 1
information. point

9 (a) Any from clauses 1 - 7 1 for each


answer is
awarded 1
point
9(b) Valid MAX=2 for each
correct
Valid answer is
awarded 1
point

10 Answer: MAX=2 for each


correct
Answer: 1) User interface 2) Knowledge engineer answer is
awarded 1
point

11 A lexicon is a set of terms, called ‗keywords‘ or ‗reserved MAX=2 for each


words‘ that the compiler is designed to understand. correct
answer is
Compilers for each language will have different lexicons, awarded 1
containing the keywords used by that language. point
12 Any comments that are marked using comment symbols are MAX=2 for each
ignored by the compiler. correct
So are removed during lexical analysis. answer is
awarded 1
point
13 Answer MAX=2

37
14 Normal data is the data that is expected to be entered into the MAX=1 for correct
application. It is data that will ‗normally‘ be used. answer is
awarded 1
point

15 This is data that is at the boundaries of what the program MAX=1 for correct
expects to be entered. answer is
awarded 1
point

16 1 mark for example MAX=2


1 mark for justify
17 ANSWER: for example: -90, 120 MAX=1 for correct
answer is
awarded 1
point
18 This is data that will not be accepted by the program. MAX=2 for each
correct
Either it is the wrong data type, it contains characters that are answer is
not allowed or the value falls outside the accepted parameters awarded 1
of the program. point
19 ANSWER MAX=3 for each
A syntax error is an error in the source code of a program. correct
Since computer programs must follow strict syntax to compile answer is
correctly, any aspects of the code that do not conform to the awarded 1
syntax of the programming language will produce a syntax point
error. Syntax errors are small grammatical mistakes,
sometimes limited to a single character.

For example, a missing semicolon at the end of a line or an


extra bracket at the end of a function may produce a syntax
error.

20 ANSWER MAX=3 for each


correct
It will only reset the first 9 elements / will not reset the 10th answer is
element After setting Array(9) = 0, i will become10... ... and awarded 1
the loop will stop It should be UNTIL i > 10 / or other point
working correction

TOTAL 40

38
Sample questions and marking scheme
Tasks for the Summative Assessment for the 2 term.

1. Describe how data encryption is used to keep information safe from unauthorized users.

[2]

2. A virus checker has been installed on a PC. Give two examples of when a virus checker should
perform a check.

[2]

3. The bank uses biometrics to protect personal data.


Give two examples of biometrics.

[2]

4. Five statements about firewalls are shown.


Tick (√) to show whether each statement is true or false
Statement True (√) False (√)

Firewalls can monitor incoming and outgoing traffic.

Firewalls operate by checking traffic against a set of rules.

Firewalls cannot block access to a certain website.

Firewalls can act as intermediary servers.

Firewalls can block unauthorized traffic.

[2]

39
5. A student is writing up her Course Project documentation.
Why is data backed up?

[2]

6. Amira used full backup method of data for protection data. Describe one disadvantage of this
method.

[1]

7. Explain one reason why an external hard drive is suitable for storing backups

[2]

8. Amir decides to crack password with Dictionary attack method.


(a) Explain method Dictionary attack.

[2]

(b) Write down one ethical problem arising due to Dictionary attack method.

[1]

40
9. Explain how the use of the Internet has increased threats to computer systems.

[2]

10. Antivirus program can detect trojan horses and viruses. Explain the difference between virus
and Trojan horse.

[2]

11. Jasmin works for a company specializing in the sale of computer parts and accessories. She
works in the Nur-Sultan office and her colleague Aigerim works in the Almaty office. Jasmin
emails confidential information to Aigerim so that only Aigerim can read the information.
The manager of the company is concerned about the threat of malware.
State three vulnerabilities that a malware can exploit.

[3]

12. Madeniet is a designer who wants to add high-quality photos to his promotional website. State
three legal ways he might achieve this.

[3]

41
13. Many e-books are now listed as in the public domain. Explain what this means.

[2]

14. Define the term «Copyright»

[2]

15. Give two reasons why selling illegal products online is appealing to criminals.

[2]

16. Give different statements. Indicate in a tick which of the following is NOT a copyright
infringement.
Statement Tick (√)
a) Risa went to a museum with a pen and paper and drew several of the
paintings she saw.
b) Alisher typed up the book Green Eggs and Ham word for word and
then only changed the title to Blue Carrots and Chicken, and sold copies.
c) Gabit wrote a sequel to one of his favorite books.
d) Marat carved a wooden statue of his state senator.
[1]
17. Aydar created a new system for office workers. Small group of users within an organization
uses a new system prior to wider use. Identify type of system implementation method.

[1]

42
18. Give the situation. A school has a new system to manage student athletics. The old system is
paper and pencil. Slowly, over time, a new system is introduced to manage students, their teams,
seasons, and their coaches. At first, the new system simply manages teams. Then the new system
manages seasons (and school years), slowly, the new system is increased to manage coaches,
players and finally events.
Identify type of system implementation method. Justify your choice.

[2]

19. Give one advantage and one disadvantage of parallel method to implement a system.

[2]

20. Give one advantage and one disadvantage of direct method to implement a system.

[2]

43
Mark scheme

Additional
№ Answer Max mark
information
1 Two from: MAX=2 1 mark for
 data is scrambled each correct
 key used to encrypt/decrypt answer.
 data cannot be understood unless decrypted/have
key
2 any two from: MAX=2 1 mark for
– checks for boot sector viruses when machine is first each correct
turned on answer.
– when an external storage device is connected
– checks a file / web page when it is accessed /
downloaded

3 Any two from: MAX=2 1 mark for


– fingerprint scanner each correct
– face recognition software answer.
– retina scanner/iris scanner
– voice recognition software
4 Statement True False MAX=2 1 mark for
(√) (√) column True.
Firewalls can monitor √ 1 mark for
incoming and outgoing column False.
traffic.
Firewalls operate by √
checking traffic against a set
of rules.
Firewalls cannot block √
access to a certain website.
Firewalls can act as √
intermediary servers.
Firewalls can block √
unauthorised traffic.
5 Data is backed up: MAX=2 One mark for
So that if lost or corrupted; It can be restored; each of 2 points
A retrieve, recover, replaced, etc to max 2 marks

A prevent data being lost //To protect against data


loss; /Safeguard the security of the data;
6 ANSWER: MAX=1
Most of the files rarely change; each full backup
following the first is merely a copy of what has
already been backed up. (1)

Full backups take longer to perform – Full backups


can be time consuming. (1)

Security issue- as everything is stored in once place


an entire copy of the data could be stolen. (1)
44
7 ANSWER MAX=2 1 mark for
One explanation of a reason from e.g.: each correct
 portable: can be stored away from answer.
netbook/computer
 small: easily stored
 large enough memory : to store large/many files
 Ease of use: no special software needed/can simply
plug in the device. The second mark is for the
explanation of the reason.
8 ANSWER MAX=3 1 mark for
(a) A dictionary attack enters every word in a each correct
dictionary as a password. (1) answer.
This removes some of the randomness of a brute-
force attack, reducing the amount of time needed to
find the password—provided that the password is in
the dictionary, of course. (1)

(b) access to personal data (1)


9 ANSWER: MAX=2 1 mark for
The number of computer viruses has increased. each correct
The number of phishing attacks has increased. answer.
10 ANSWER MAX=2 1 mark for
distinction from true viruses is that they do not each correct
replicate themselves, as viruses do. (1) answer.

Trojans contain malicious code, that, when triggered,


cause loss, or even theft, of data. (1)
11 ANSWER MAX=3 1 mark for
each correct
1 mark per bullet to max 3 answer.

• Attaching a portable storage device


• Opening an email attachment // clicking links on an
email attachment
• Accessing a suspicious website
• Downloading a file from the Internet
• Buffer overflow
• Software not up to date // Software poorly written
• No up-to-date anti-virus/anti-malware software
installed
• Regular virus/malware scans not completed
• A firewall that is not set up correctly
• Weak/easily cracked passwords
• Lack of user/staff training
12 1) Take the photos himself. MAX=3 1 mark for
2) Purchase royalty-free images online. each correct
3) download photos from a website that provides free answer.
images for commercial use.
13 MAX=2 1 mark for
The copyright and ownership of the book has each correct
expired. (1) answer.

45
Meaning that the book can be used and shared for
any purpose (1)
14 ANSWER MAX=2 1 mark for
Copyright is the legal right of the creators of music, each correct
books, films and games. (1) answer.
To control how their products are accessed and sold.
(1)
15 the ability to sell products across the world. (1) MAX=2 1 mark for
each correct
the ability to hide one's identity. (1) answer.
16 Statement Tick (√) MAX=1
a) Risa went to a museum with a
pen and paper and drew several of
the paintings she saw.
b) Alisher typed up the book Green
Eggs and Ham word for word and
then only changed the title to Blue
Carrots and Chicken, and sold
copies.
c) Gabit wrote a sequel to one of his
favorite books.
d) Marat carved a wooden statue of (√)
his state senator.
17 type of system implementation methods: pilot. MAX=1
18 type of system implementation methods: Phased. MAX=2
Justify your choice: When small parts of the new
system gradually replace small parts of the old
system, the implementation method is said to
be phased.
19 Advantages: MAX=2 1 mark for
 Users can can compare the output of the old correct one
system with the output of the new system, to advantage
ensure correctness
 There is little risk of data loss because the 1 mark for
known-good system is running correct one
Disadvantages: disadvantage
 Users must take more time to enter data into
two different systems
 Data could be different in two different
systems if there is intensive data entry.
20 Advantages: MAX=2 1 mark for
 If the system is not critical, this can be a good correct one
method for implementation advantage
Disadvantages:
 If you are not sure the system will work, this 1 mark for
method of implementation may not be a good correct one
idea disadvantage

46
Sample questions and marking scheme
Tasks for the Summative Assessment for the 3 term.

1. Different operating systems have been developed with different operating requirements.
Give two operating requirements of a real time operating system.
1

[2]

2. Give image.

2.1 What type of operating system interface is shown above?


[1]

2.2 Give two advantages of this type of interface over alternative types of operating interface.
1

2
[2]

3. State three features of RISC architecture

[3]

47
4. Describe memory segmentation.

[2]

5. Describe term «Рagination».

[2]

6. Describe the term «Virtual machine»

[2]

7. Identify the expected components

1
2
3
4 [2]

48
8. The main job of the CPU is to execute programs using the fetch-decode-execute cycle (also
known as the instruction cycle).
8.1 Explain what is meant by ―fetch an instruction.‖

[1]

8.2 Explain what is meant by ―decode and instruction.‖

[1]

8.3 Explain what is meant by ―execute an instruction.‖

[1]

9. Simplify the following Boolean expressions.


Q  B.(A  C)  A  A.(A  B)
[2]
10. Figure 1 contains a bit pattern

10.1 What is the hexadecimal equivalent of the bit pattern shown in Figure 1?

[1]

10.2 Why do programmers often use hexadecimal instead of binary to represent bit patterns?

49
[1]

11. Multiply 2 binary numbers. Show the solution.


110112*11002

[1]
12. Add 2 binary numbers. Show the solution.
Number 1: 11001102
Number 2: 11101102

[1]

13. Convert this decimal number to an 8-bit two‘s complement binary integer.

-122

[1]
14. Convert this decimal number to an 8-bit two‘s complement binary integer.

50
72

[1]

15. In a particular computer system, real numbers are stored using floating-point representation
with:
• 12 bits for the mantissa
• 4 bits for the exponent
• two‘s complement form for both mantissa and exponent

Calculate the floating-point representation of + 2.5 in this system. Show your working.

[3]

16. What is meant by the terms ‗pushing‘ and ‗popping‘?

[2]

17. A binary tree is a data structure where item of data are stored such that they can be search for
51
quickly and easily.
The following data items are to be entered into a binary search tree in the order given.
Draw a diagram to show how these values will be stored in the tree.
Informatics, physics, mathematics, biology, chemistry, economics, ART.

[2]

18. Explain the differences between the World Wide Web and the Internet.

[2]

19. List the 2 functions of Application layer.

[2]

20. Explain what is meant by circuit switching.

[2]

52
Mark scheme

№ Answer Max mark Additional


information
1 To support programs/processes which are non- MAX=2 1 mark for
sequential in nature; each correct
To deal with a number of events which happen in answer.
parallel;
To deal with events at unpredictable moments in
time;
To carry out processing and produce a response
within a specified interval of time;
To produce output fast enough to effect next input.

2 2.1 command line interface MAX=3 1 mark for


each correct
2.2 user has access to all instructions – GUI can answer.
restrict access/ can control hardware;
CLI takes up less memory than a GUI / uses less
processing power / No powerful graphics card
required;
Instructions execute faster than those given via a
GUI/ CLI is quicker to use for the experienced user
than a GUI.
3 State three features of RISC architecture: MAX=3 1 mark for
- Limited instruction set each correct
- Complex instructions constructed by chaining answer.
together multiple simple ones
- Processor design is simple
- Contains many registers
4 A way of dividing main memory MAX=2 1 mark for
Segments are assigned to individual processes each correct
Segments are made up of a stack, free memory, answer.
data and code segments
Map relative addresses from a process to absolute
addresses in memory
The stack holds memory addresses for the process
while subroutines are called.
The stack expands into free memory as required.
5 A way of dividing main memory MAX=2 1 mark for
Pages are fixed size each correct
Pages are physical divisions of memory addresses answer.
Pagination is used whenever virtual memory is in
use
6 A virtual machine is a software copy MAX=2 1 mark for
Of a hardware computer each correct
It will use the resources of the host computer answer.
To emulate the desired device, operating system, or
environment
7 1) Address bus MAX=2 1 mark for 2
2) Data bus correct
3) Control bus answers.
4) Arithmetic logical unit 53
8 8.1 The control unit goes to the address named in MAX=3 1 mark for
the program counter, makes a copy of the contents each correct
of that address, puts the copy into the instruction answer.
register, and increments the program counter.

8.2 The control unit determines what the


instruction is and accesses any memory locations
that contain operands for the instruction.

8.3 Signals are sent to the arithmetic/logic unit to


carry out the processing.
9 Q  B.( A  C)  A  A.( A  B) MAX=2 1 mark
partial solution.
Q  A.B  B.C  A  A.A  A.B
Q  A.B  B.C  A 2 mark for
complete
Q  A.(B  1)  B.C solution
Q  A  B.C

10 10.1 MAX=2 1 mark for


39; A. #39 each correct
answer.
10.2 More compact when displayed; Easier (for
people) to understand/remember;
OR read Lower likelihood of an error when typing
in data; Saves (the programmer) time
writing/typing in data;
11 1010001002 MAX=1
12 110111002 MAX=1
13 10000110 MAX=1
14 01001000 MAX=1
15 MAX=3

16 Pushing is the name given to the process of adding MAX=2 1 mark for
an item of data to the top of a stack. each correct
answer.
Popping is the process of reading and removing the
top-most item from a stack.

17 Answer MAX=2 1 mark:


Informatic Correct left sub
tree.
biology physics 1 mark:
ART chemistry mathemati Correct right
sub tree.
economics
18 WWW MAX=2 One mark for 1
A system of interlinked / hypertext documents; correct
54
Accessed via the Internet; definition.
Using HTTP protocol;

A network of interconnected computer networks;


a network of computers;
Using a globally unique address space;
Using end-to-end communication protocol //
Internet Protocol // ―TCP / IP‖;
Supports a range of application protocols;

two examples of different protocols;


19 1)The application layer is responsible for receiving MAX=2 1 mark for
webpage request from user or client using the most each correct
widely used protocol namely HTTP protocol and answer.
displaying response back in the browser.

2)It is also responsible for sending data or files


from one place to another place.

3)It is used to send Emails

4)It is responsible for converting a domain name i.e


website name into IP address i.e DNS.

5)Application layer uses HTTP, HTTPS, DNS,


FTP, SMTP etc protocols

20 Dedicated circuit/channel/physical path . MAX=2 1 mark for


each correct
Which lasts for duration of connection. answer.

55

You might also like