SAT Collection CS 11
SAT Collection CS 11
1
Sample questions and marking scheme
Tasks for the Summative Assessment for the 1 term.
A B C S
0 0 0 0
[3]
2
9. Identify which programming languages generation refers to the following snippet of code.
………………………………………………………………………………………………………
[1]
10. Provide one example of a low level programming language.
………………………………………………………………………………………………………
[1]
11. Write one example of a high level programming language.
………………………………………………………………………………………………………
[1]
12. Analyze the assembly code below and figure out value of accumulator.
K:=1
X:=5 i X K
FOR i:= 1 TO 4
IF (i + K) < X
X:= X – 1
ELSE
K:=K + 1
ENDIF [4]
ENDFOR
3
a) Name the translator type.
……………………………………………………………………………………..………………….
[1]
b) Justify your choice, provide reasons.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
[1]
16. The System`s life cycle contains five main stages.
[4]
20. Draw a flowchart of algorithm that finds maximum number value in the array of numbers.
Note*: Use only the flowchart components above. Any of the components can be used several
times!
[4]
5
Mark scheme
№ Answer Marks Comments
1 Application software 1
2 Manage computer resources, memory/CPU 1 Maximum 1 mark for
Manage computer 1 3 correctly provided
Provide platform for application software 1 functions of Operating
Provide interface between user and hardware 1 System, no marks for
Input / output management 1 only 2 or 1 correct
Controls every task the computer carries out [max 1] answer
3 To store temporary results/values 1
To store intermediate results/values 1
[max 1]
4 Volatile Stores BIOS and Memory size may 1 mark if 3 correct
computer`s initial be about 8GB 1 answers are provided,
boot instructions no marks for only 1 or
RAM + + 2 correct answers.
ROM + [max 1]
5 If physical memory is full, virtual memory may be used 1
6 Cache memory 1
7 Applying De Morgan`s Law - NOTA AND NOTB 1 Using De Morgan`s
(NOT A) 1 Law, namely NOTA
[max 2] AND NOTB
8 A B C S For each correct row -
0 0 0 0 1 mark
0 1 0 1 1
1 0 0 1 1
1 1 1 0 1
[max 3]
9 Second generation 1
10 Assembly language 1
11 C++ 1 Accept any other
Pascal 1 reasonable answer
[max 1]
12 14 1
13 i X K 1 mark for 1 correct
row.
1 4 1 1
2 3 1 1
3 3 2 1
1
4 3 3
[max 4]
14 One line of code in high level programming language may be
many lines of code in low level programming language 1
6
c Evaluation 1
17 Advantages:
Client will get the desired system 1
Client is involved 1
Changes can be made at any stage 1
Disadvantage:
Might need involvement of different specialists 1
Time boundaries might be unpredictable(increased) 1
Expenditures for the project might increase 1
[max 4]
18a Questionnaire 1 Accept any of the
Survey 1 correct answers
[max 1]
b Interview 1 Accept any of the
System observation 1 correct answers
[max 1]
19 Customer can see the details of the product (External entity) 1
Seller can publish products` details for selling to the system So 1
everyone can see them online(External entity)
Administrator can make requests on data about customer, Seller 1
and products details(External entity)
All the entities connected to system(External entity) 1
[max 4]
20 Declaring
variables(i,max,Arr[])
– 1mark
Accept any array
element assigned to
max, e.g. max =
Arr[0]
Selection(if
Arr[i]>max) – 1mark
Operation (Max =
Arr[i]) – 1mark
Outer selection(IF i <
length(Arr) – 1 mark)
[max 4]
Total 40
7
Sample questions and mark scheme
Tasks for the Summative Assessment for the term 2
[3]
8
6. Look through the requirements of the 3rd Normal Form(3NF) below:
―It is already in 2NF‖
―There are no non – key attributes that depend on another non – key attribute‖
Following the rules above normalize the «Borrowed_Books» table to the 3rd Normal Form.
Borrowed_Books
[4]
7. Explain the purpose of database Normalization
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
8. Explain, why data dictionary is necessary to include in system development documentation
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
9. Compare the following SQL statements, ALTER TABLE and UPDATE.
Explain the difference between them in terms of functionality.
ALTER TABLE
…………………………………………………………………………………….….……………
……………………………………………………………………………….…….………………
[1]
9
UPDATE
……………………………………………………………………….…………….………………
……………………………………………………………………………………..………………
[1]
10. Write SQL statement to add a new column called ―Email‖ to the ―Customers‖ table
………………………………………………………………………………………….…………
……………………………………………………………………………………….……………
[2]
11. Write SQL statement to remove the table named ―Games‖
……………………………………………………………………………………….……………
……………………………………………………………………..………………….…………..
[1]
12. Write SQL statement to change phone_number of student with ID “7” from
“Students” table to new number “87011234567”.
…………………………………………………………………………………….………………
……………………………………………………………….…………………..………………..
………………………………………………………………….…………….…….……………..
[2]
Write SQL statement to remove a record with ID ―3‖ from the ―Clients‖ table.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
13. Write one SQL statement to show FirstName, LastName and City from the
tables below with CountryID “7”.
Students Cities
ID FirstName LastName CityID ID City CountryID
1 Student1 Student11 3 1 City1 5
2 Student2 Student22 5 2 City2 7
3 Student3 Student33 2 3 City3 3
………………………………………………………………………….…………………………
……………………………………………………………………….……………………………
………………………………………………………….…………………………………………
[3]
14. Draw Level 1 Data Flow Diagram (DFD) of the system that allows user to log in with username
and password. Use the space below for working.
[3]
10
15. A new system must perform «operation1» and prompt to enter a value for variable «E». The
system runs while variable «E» equals to TRUE, otherwise if it is not TRUE, the system shuts
down.
Create a flowchart of the system in the space below.
[2]
16. Provide one advantages and one disadvantage of prototyping when developing solutions.
………………………………………………………..…………..………………………………
……………………………………………………………………………………………………
[2]
17. Provide two possible limitations of face recognition system with explained reasons(causes).
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………................................
[2]
18. Software developers usually use Integrated Development Environment(IDE) for developing
software. Describe what features does the IDE provide for the developers.
……………………………………………………………………………………………………
…………………………………………………………………………………………………....
[1]
19. A private medical center needs a system, that provides patients with useful functions, such as:
making appointments with doctors online;
view all available doctors;
make online payments
Provide appropriate software type and justify your choice
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
11
Mark scheme
one to many
relationship
between
students and
groups – 1
mark
one to many
relationship
between
teachers and
[max 3] groups – 1
mark
12
6 Creating
«Books» table
Borrowed_Books 1 mark
BorrowingID BookTitle* Borrowing StudentID*
date Making
1 The path of Abai 25.09.2018 3 «BookTitle»
2 Book of wisdom 17.06.2018 3 field as a
3 Beauty in 9.06.2018 8 foreign key in
Mourning «Borrowed_Bo
4 The path of Abai 15.08.2018 5 oks» table 1
mark
Books
BookTitle Author Making
The path of Abai Mukhtar Auezov «BookTitle»
Book of wisdom Abay Kunanbayev field as a
Beauty in Mourning Mukhtar Auezov primary key in
«Books» table
The path of Abai Mukhtar Auezov
1 mark
Adding
«Author» field
to «Books»
table 1 mark
Accept
«BookID» as a
primary key in
«Books» table
and as a
Foreign key in
the
«Borrowed_Bo
oks» table
Accept table
structures with
field names,
[max 4] without data
within tables
7 The purpose of normalisation is to avoid redundant data and to make it 1
easier to maintain a database by only having to update a record in one
place only. [max 1]
8 It lists all the variables, tables, attributes, data types, forms of the 1
program being developed
It contains all the metadata of the variables, tables, attributes, data 1
types, forms of the program being developed [max 1]
9 ALTER TABLE is used to change or update table structure 1 Accept one
The ALTER TABLE statement is used to add, delete, or modify 1 correct answer
columns in an existing table. for ALTER
The ALTER TABLE statement is also used to add and drop various 1 TABLE and
constraints on an existing table. one answer for
UPDATE table is used to change or update data/information within 1 UPDATE
table
The UPDATE statement is used to modify the existing records in a 1
table. [max 2]
10 ALTER TABLE Customers 1 Accept string
13
ADD Email varchar(255) 1 or text instead
of varchar
Accept any
other other
correct number
[max 2] instead of 255
11 Don`t accept
DROP TABLE ―Games‖ 1 DELETE
statement
Accept DROP
[max 1] ―Games‖
12 UPDATE Students SET phone_number = ―87011234567‖ 1 1 mark for
WHERE Student_id = ―7‖ 1 UPDATE
Students SET
phone_number
=
―87011234567‖
1 mark for
WHERE
Student_id =
[max 2] ―7‖
13 DELETE FROM Clients 1
WHERE ID = 3 1
[max 2]
14 SELECT Students.FirstName, Students.LastName, Cities.City FROM 1 mark for
Cities 1 using SELECT
JOIN Students ON Cities.ID = Students.CityID 1
WHERE Cities.CountryID = ‗7‘ 1 1 mark for
using JOIN
1 mark for
using WHERE
clause
Accept INNER
JOIN, LEFT
JOIN, OUTER
JOIN
Process with
labelled data
flow– 1mark
Datastore with
[max 3] labelled data
flow – 1mark
14
16 While loop – 1
mark
Operation – 1
mark
[max 2]
Disadvantages:
15
Example of possible limitation:
FACE ANGLE
Reason(Cause):
The relative angle of the target‘s face influences the recognition score
profoundly. When a face is enrolled in the recognition software,
usually multiple angles are used (profile, frontal and 45-degree are
common). Anything less than a frontal view affects the algorithm‘s 1
capability to generate a template for the face. The more direct the
image (both enrolled and probe image) and the higher its resolution,
the higher the score of any resulting matches.
16
Sample questions and mark scheme
Tasks for the Summative Assessment for the term 3
1. The data structure below contains 7 indexed elements and has a name ‗prime_nums‘.
Index 0 1 2 3 4 5 6
prime_nums
Element 1 3 5 7 11 15 17
a) Identify type of the data structure.
……..……………………………………………………………………………………..….…….
[1]
b) Write one line of pseudocode or use any programming language of your choice to assign number
13 to 5th element of the data structure.
……………………………………………………………………………………………….…….
[1]
2. Write pseudocode or use any programming language of your choice to display the element with
index 3 from the following sequence of integer numbers: 7, 8, 5, 7, 3, 6, 1, 9.
………………………………………………………………………………………………..……
[1]
3. The picture below illustrates a chess game board.
1 2 3 4 5 6 7 8
A
B
K
C
D
E
F
G
H
a) Define type of applied data structure for creating the chess board above.
……………………………………………………………………………………………...………
[1]
b) Write a line of code in any programming language of your choice or use a pseudocode to change
position of the ―K‖ from B3 to D2 on the chess board named ―myBoard‖.
………………………………………………………………………………………………...……
[2]
4. The numbers below are not listed in ascending order. Sort them applying «Insertion sort»
algorithm.
Note*: the index starts from «0»
5, 7, 10, 4, 13, 3, 8, 11, 15
Count and write total number of swaps when outer loop counter is 5.
……………………………………………………………….........................................……........
[1]
5. Show sequence of the following numbers: 4, 9, 7, 3, 5, 6, 8, 11, 2 after two pass of «Bubble sort»
algorithm.
………………………………………………………………………………………...……………
…………………..……………………...……………………………..……………………………
[1]
6. Applying binary search algorithm write how many comparisons are needed to find 20 in the list
9, 11, 12, 13, 15, 17, 20, 23, 25.
………………………………………………………………………………………….…………..
[1]
17
7. Analyze two algorithms below.
A B
Provide pure HTML code for creating the data input form.
Note*: don`t bother for styling!
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[3]
18
11. A web developer wants to create a data output form, which displays the followings: №, First
Name, Last Name and Email of all customers in a table format. The first HTML tags are
already written for you. Help web developer to complete rest of the HTML code.
<table>……………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
</table>……………………………………………………………………………………………
[2]
12. The image below demonstrates a piece of HTML code.
Write CSS code for the HTML above. Perform the followings:
Change horizontal length of the DIV to 70%;
Change text font of the first three paragraphs to blue color;
Change text color of the last paragraph to «Green»;
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
……………………………………………………………………………………….……………
………………………………………………………………………………………….…………
…………………………………………………………………………………………….………
[3]
13. Use Inline CSS to make the paragraph`s font «Arial»
Line 3 …………………………………………………………………………….………..[1]
Line 5 ……………………… Line 6 ………………………………..…………………….[1]
Line 8 ………………………………………………………………….……………..........[1]
20
19. Mobile app developer designed a flowchart of program that prompts password three times. If
password is incorrectly entered three times, the system shuts down, otherwise it allows to enter
the system. The flowchart of the system is illustrated below.
Write code of the program using any programming language for mobile app development or
use pseudocode.
……………………………………………………………………………………………….……
……………………………………………………………………………………………….……
……………………………………………………………………………………………….……
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
…………………………………………………………………………………………….………
…………………………………………………………………………………………….………
………………………………………………………………………………………….…………
………………………………………………………………………………………….…………
…………………………………………………………………………………………………….
[5]
20. Nowadays most websites have adaptive interface. Explain the term «Adaptive interface» and
why it is important when developing website interfaces.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
21
Mark scheme
Additional
№ Answer Mark
information
1a Array 1
One dimensional array 1
[max 1]
b prime_nums[5] = 13 1
[max 1]
2 OUTPUT(Nums[3]) 1
3a 2 dimensional array 1
Multidimensional array 1
[max 1]
b myBoard[3][1] = «K» Accept
for index – 3 1 myBoard[4][2] = «K»
for index – 1 1 Or
[max 2] Accept
myBoard[4][2] = «K»
In case if index starts
from 1
4 8 1
5 4,3,5,6,7,8,2,9,11 1
6 2 1
7a O(n) 1
b O(n^2) 1
8 Algorithm «A» is more space efficient, since size of 1
array is only ten elements in comparison with
algorithm «B».
Algorithm «B» has array of size 4x4, which takes
more space
9 <head></head> 1
<body></body> 1
[max 2]
10 Email<input type="text"> 1
Password<input type="password"> 1
<input type="submit" value="Submit"> 1
or
<button type="submit">Submit</button> 1
[max 3]
11 <tr> 1st – mark for first
<th>№</th> <tr>
<th>First Name</th>
<th>Last Name</th> 1 2nd - mark for second
<th>Email</th> <tr>
</tr>
Accept <td> instead
<tr><td></td><td></td><td></td><td></td></tr> 1 of <th>
[max 2]
12 width:70% and selector div or id; 1
color:blue and using class .pr ; 1
#last_p and color:green; 1
22
[max 3]
13 < p style=‖font-family:Arial‖ > Make me Arial </p> 1
14 CSS is used to change styles of the webpage 1 Accept any other
reasonable answers
15 Hostname 1
Database name 1
[max 2]
16 F = 1; Accept While loop
for(i=1; i<=N; i++) {
F = F * i; 1
}
Loop 1
[max 2]
17 Line 2: age = prompt(―Enter your age‖); 1
Line 5 and 8: alert(message); 1
[max 2]
18 Line 3: if (number == 1) 1
Line 5: else Line 6: page2.html 1
Line 8: page.html 1
[max 3]
19 1 Accept any other
1 reasonable or similar
1 solutions.
1 Don`t accept while
loop, if it is a loop
with precondition
Don`t accept for loop
1
Or
1
1
1
1
[max 5]
20 Adaptive interface means that the interface can 1 Accept any other
automatically be adapted to devices with various sizes reasonable answers
of screens.
The interface`s appearance will look good in all 1
devices with different screen sizes
23
Sample questions and mark scheme
Tasks for the Summative Assessment for the term 4
1. The image below demonstrates a piece of incomplete code from «Crosses and noughts» game.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[3]
2. Write a code or a pseudocode for a game, that does followings:
prompts(asks to enter) a number from a user in range from 1 to 10;
computer randomly generates a number and compares it with the entered number;
if number is found by the computer, the program should stop and output total number of
guessing attempts.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[5]
24
3. The snippet of code below illustrates a program that calculates sum of the numbers from 0 to
100, and outputs even results on the browser window. The program works fine, and have no bugs
in it. However, the program code is badly written.
Rewrite the code so that, it will meet requirements of a good code, show your workings.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[3]
4. Explain the purpose of using «Data integrity» while designing database
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
5. Compare data backup and disk mirroring techniques, explain the difference between them.
……………………………………………………………………………………….……………
……………………………………………………………………………………….……………
……………………………………………………………………………………….……………
……………………………………………………………………………………….……………
……………………………………………………………………………………….……………
[2]
6. Explain, why passwords in database are stored in encrypted format.
……………………………………………………………………………………….……………
………………………………………………………………………………………….…………
……………………………………………………………………………………….……………
[1]
7. Explain the difference between terms data validation and data verification.
Data validation
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
Data verification
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
25
8. Provide two benefits of applying Blockchain technology
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
9. Provide two characteristics of closed source software.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
10. Give two uses of Firewall in computer systems
…………………………………………………………...………………………………………..
….…………………………………………………………………………………………………
…...…………………………………………………………..……………………………………
……...…………………………………………………..…………………………………………
…..…….………………………..…………………………………………………………………
[2]
11. Provide reasons, why web browsers sometimes block cookies.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
12. Explain the difference between the Local Area Network(LAN) and Wide Area Network(WAN)
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
13. Compare «Bus» and «Star» network topologies, and provide one advantage for each
26
14. Compare and explain the difference between the following network devices.
Switch
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
Hub
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
15. Identify three parts of the URL below, protocol, host name and location on the server
«https://a-teach.com/teacher/edit_student»
Host name…………………………………………………………………..……..…….……..[1]
Location on the server…………………………………………………………..……………..[1]
Protocol………………………………………………………………………..…….………....[1]
16. Explain, why people use domain names instead of IP addresses, and what is the role of Domain
Name Service (DNS) server
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
17. Explain working principle of the «Client – Server» model.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
18. Explain why some websites require only HTTPS connection instead of HTTP, give example of
companies, which might use HTTPS.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[2]
19. Describe the role of POP3 network protocol.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
[1]
20. Identify class, network and host addresses of the following IP address 172.112.45.17
Network address…………………………………………………………………………...……..
[1]
27
Mark Scheme
Additional
№ Answers Mark
information
1 IF number = grid[i][j] 1
assigning «X» to grid[i][j] 1
ELSE OUTPUT(«Try again!») 1
[max 3]
2 1 Accept any
other
reasonable
solution
1
1
1
1
[max 5]
3
Adding comments 1
Indenting 1
Using sensible variable names(e.g. ‗sum‘ instead of ‘a‘ ) 1
[max 3]
4 Data integrity ensures that the data is clean and has no errors in it. 1
It ensures that the data was not corrupted and it is correct. 1
[max 1]
5 Data backup is a process of making a copy of disk periodically. If disk 1 Accept any
fails the last copied version of data can be restored other
Disk mirroring is when data is saved in two or more disks 1 reasonable
simultaneously. If one disk fails the second one will have saved data [max 2] answers
6 Passwords in database are stored in encrypted format due to security 1 Accept any
measures other
In case if someone will hack the database, the hackers will not be able to 1 reasonable
use the passwords [max 1] answers
7 Data validation is a process that ensures the delivery of clean and Accept any
clear data to the programs, applications and services using it. other
Example, checking for @ sign in email, checking for password 1 reasonable
length, check for data format, etc. answers
Data verification is a way of ensuring the user types in what he or
she intends, in other words, to make sure the user does not make a 1
mistake when inputting data.
An example of this includes double entry of data (such as when
creating a password or email) to prevent incorrect data input. [max 2]
8 Greater transparency 1 Accept any
Enhanced security 1 other
Improved traceability 1 reasonable
Increased efficiency and speed 1 benefits
Reduced costs 1
[max 2]
9 The source code of the closed source software can`t be edited and 1 Accept any
28
changed other
The source code of the closed source software can`t be downloaded 1 reasonable
and can`t be shared with anybody [max 2] answers
10 Firewall can control incoming and outgoing traffic 1
To prevent unwanted traffic, malware 1
[max 2]
11 Some web sites and search engines use them to track users as they 1
browse the web, collecting highly personal information and often
surreptitiously transferring that information to other web sites without
permission or warning.
Cookies can be dangerous because they essentially save your session in 1
tiny bits. If your computer becomes or is compromised, hackers can look
at those cookies and find your last session, be it your bank statement. [max 1]
12 A LAN (local area network) is a group of computers and network devices 1
connected together, usually within the same building. A WAN connects
several LANs, and may be limited to an enterprise (a corporation or an 1
organization) or accessible to the public. The technology is high speed
and relatively expensive. [max 2]
13 Don`t discard
mark if
«Bus» network topology is very simple and cheap to implement 1 diagram is
not provided
29
Collection of tasks for summative assessment for the term
on the subject"Computer science"
Grade 12
30
Sample questions and marking scheme
Tasks for the Summative Assessment for the 1 term.
[2]
2. Discuss about pros and cons outcomes of application AI for application area «Medicine».
+ -
[2]
[2]
[2]
31
[2]
6. Write one example of imperative programming language and one example of declarative
programming language.
[2]
[3]
[1]
9. A simple logic processing language is used to represent, as a set of facts and rules, the valid
construction of sentences. The set of facts and rules are shown below in clauses labelled 1 to 13.
1. determiner (the).
2. adjective (big).
3. adjective (little).
4. verb (is).
5. verb (climbs).
6. noun (thomas).
7. noun (hill).
8. noun_phrase(X) :- noun(X).
9. noun_phrase(X,Y) :- determiner(X) , noun(Y).
10. noun_phrase(X,Y,Z) :- determiner(X) , adjective(Y) , noun(Z).
11. sentence (A,B,C) :- noun_phrase(A) , verb(B) , noun_phrase(C).
12. sentence (A,B,C,D,E) :- noun_phrase(A) , verb(B) , noun_phrase(C,D,E).
13. sentence (A,B,C,D,E) :- noun_phrase(A,B,C) , verb(D) , noun_phrase(E).
32
(b) Using the given set of facts and rules (1–13) above, state whether or not the following sentences
are valid.
10. There is an expert system structure. Fill in the gaps where the numbers are indicated.
2 [2]
[2]
[2]
13. A programmer has been asked to write a routine which will calculate a person‘s age in years
from the date of birth supplied as a parameter to the routine and today‘s date, taken from the
system. The date of birth is supplied in the format dd/mm/yyyy and has already been checked by the
system to be a valid date before it is passed to the routine. No person is expected to be over 120
years old.
Suggest suitable values for each of the types of test data, normal, boundary and erroneous, and
explain why you have chosen these values.
(a) two values of normal data:
(i) (ii) [2]
33
14. Explain term «Normal data».
[1]
[1]
16. Give an example of extreme data for checking the age of people. Justify answer
[2]
17. Give an example of erroneous data for checking the age of people.
[1]
[2]
[3]
20. A programmer has created an algorithm to reset the contents of an array with ten items back to
zero. This is the algorithm but it contains a logical error.
34
State why the algorithm above contains a logic error.
i=1
REPEAT
Array(i) = 0
i=i+1
UNTIL i = 10
[3]
35
Mark scheme
Additional
№ Answer Marks
information
1 Artificial Intelligence is a field of computer science wherein MAX=2
the cognitive functions of the human brain are studied and
tried to be replicated on a machine/system. Artificial
Intelligence is today widely used for various applications like
computer vision, speech recognition, decision-making,
perception, reasoning, cognitive capabilities, and so on
2 Answer: MAX=2 for each
+ - correct
The phrase ―human error‖ There is little doubt that answer is
was born because humans, artificial intelligence will awarded 1
naturally, make mistakes displace many low-skilled point
from time to time. jobs. Arguably, robots have
Computers however, do not already taken many jobs on
make these mistakes – that the assembly line – but now
is, of course, assuming they this could extend to new
are programmed properly. levels. Take, for example, the
With artificial intelligence, concept of driverless cars,
data could be processed which could displace the
errorfree, no matter how need to have millions of
big the dataset might be human drivers, from taxi
drivers to chauffeurs, very
quickly. Of course some
would argue that artificial
intelligence will create more
wealth than it destroys – but
there is genuine risk that this
will not be distributed
evenly, particularly during its
early expansion.
36
An imperative language consists of statements which cause
actions to happen/ give commands for the computer to
perform. For example, in
37
14 Normal data is the data that is expected to be entered into the MAX=1 for correct
application. It is data that will ‗normally‘ be used. answer is
awarded 1
point
15 This is data that is at the boundaries of what the program MAX=1 for correct
expects to be entered. answer is
awarded 1
point
TOTAL 40
38
Sample questions and marking scheme
Tasks for the Summative Assessment for the 2 term.
1. Describe how data encryption is used to keep information safe from unauthorized users.
[2]
2. A virus checker has been installed on a PC. Give two examples of when a virus checker should
perform a check.
[2]
[2]
[2]
39
5. A student is writing up her Course Project documentation.
Why is data backed up?
[2]
6. Amira used full backup method of data for protection data. Describe one disadvantage of this
method.
[1]
7. Explain one reason why an external hard drive is suitable for storing backups
[2]
[2]
(b) Write down one ethical problem arising due to Dictionary attack method.
[1]
40
9. Explain how the use of the Internet has increased threats to computer systems.
[2]
10. Antivirus program can detect trojan horses and viruses. Explain the difference between virus
and Trojan horse.
[2]
11. Jasmin works for a company specializing in the sale of computer parts and accessories. She
works in the Nur-Sultan office and her colleague Aigerim works in the Almaty office. Jasmin
emails confidential information to Aigerim so that only Aigerim can read the information.
The manager of the company is concerned about the threat of malware.
State three vulnerabilities that a malware can exploit.
[3]
12. Madeniet is a designer who wants to add high-quality photos to his promotional website. State
three legal ways he might achieve this.
[3]
41
13. Many e-books are now listed as in the public domain. Explain what this means.
[2]
[2]
15. Give two reasons why selling illegal products online is appealing to criminals.
[2]
16. Give different statements. Indicate in a tick which of the following is NOT a copyright
infringement.
Statement Tick (√)
a) Risa went to a museum with a pen and paper and drew several of the
paintings she saw.
b) Alisher typed up the book Green Eggs and Ham word for word and
then only changed the title to Blue Carrots and Chicken, and sold copies.
c) Gabit wrote a sequel to one of his favorite books.
d) Marat carved a wooden statue of his state senator.
[1]
17. Aydar created a new system for office workers. Small group of users within an organization
uses a new system prior to wider use. Identify type of system implementation method.
[1]
42
18. Give the situation. A school has a new system to manage student athletics. The old system is
paper and pencil. Slowly, over time, a new system is introduced to manage students, their teams,
seasons, and their coaches. At first, the new system simply manages teams. Then the new system
manages seasons (and school years), slowly, the new system is increased to manage coaches,
players and finally events.
Identify type of system implementation method. Justify your choice.
[2]
19. Give one advantage and one disadvantage of parallel method to implement a system.
[2]
20. Give one advantage and one disadvantage of direct method to implement a system.
[2]
43
Mark scheme
Additional
№ Answer Max mark
information
1 Two from: MAX=2 1 mark for
data is scrambled each correct
key used to encrypt/decrypt answer.
data cannot be understood unless decrypted/have
key
2 any two from: MAX=2 1 mark for
– checks for boot sector viruses when machine is first each correct
turned on answer.
– when an external storage device is connected
– checks a file / web page when it is accessed /
downloaded
45
Meaning that the book can be used and shared for
any purpose (1)
14 ANSWER MAX=2 1 mark for
Copyright is the legal right of the creators of music, each correct
books, films and games. (1) answer.
To control how their products are accessed and sold.
(1)
15 the ability to sell products across the world. (1) MAX=2 1 mark for
each correct
the ability to hide one's identity. (1) answer.
16 Statement Tick (√) MAX=1
a) Risa went to a museum with a
pen and paper and drew several of
the paintings she saw.
b) Alisher typed up the book Green
Eggs and Ham word for word and
then only changed the title to Blue
Carrots and Chicken, and sold
copies.
c) Gabit wrote a sequel to one of his
favorite books.
d) Marat carved a wooden statue of (√)
his state senator.
17 type of system implementation methods: pilot. MAX=1
18 type of system implementation methods: Phased. MAX=2
Justify your choice: When small parts of the new
system gradually replace small parts of the old
system, the implementation method is said to
be phased.
19 Advantages: MAX=2 1 mark for
Users can can compare the output of the old correct one
system with the output of the new system, to advantage
ensure correctness
There is little risk of data loss because the 1 mark for
known-good system is running correct one
Disadvantages: disadvantage
Users must take more time to enter data into
two different systems
Data could be different in two different
systems if there is intensive data entry.
20 Advantages: MAX=2 1 mark for
If the system is not critical, this can be a good correct one
method for implementation advantage
Disadvantages:
If you are not sure the system will work, this 1 mark for
method of implementation may not be a good correct one
idea disadvantage
46
Sample questions and marking scheme
Tasks for the Summative Assessment for the 3 term.
1. Different operating systems have been developed with different operating requirements.
Give two operating requirements of a real time operating system.
1
[2]
2. Give image.
2.2 Give two advantages of this type of interface over alternative types of operating interface.
1
2
[2]
[3]
47
4. Describe memory segmentation.
[2]
[2]
[2]
1
2
3
4 [2]
48
8. The main job of the CPU is to execute programs using the fetch-decode-execute cycle (also
known as the instruction cycle).
8.1 Explain what is meant by ―fetch an instruction.‖
[1]
[1]
[1]
10.1 What is the hexadecimal equivalent of the bit pattern shown in Figure 1?
[1]
10.2 Why do programmers often use hexadecimal instead of binary to represent bit patterns?
49
[1]
[1]
12. Add 2 binary numbers. Show the solution.
Number 1: 11001102
Number 2: 11101102
[1]
13. Convert this decimal number to an 8-bit two‘s complement binary integer.
-122
[1]
14. Convert this decimal number to an 8-bit two‘s complement binary integer.
50
72
[1]
15. In a particular computer system, real numbers are stored using floating-point representation
with:
• 12 bits for the mantissa
• 4 bits for the exponent
• two‘s complement form for both mantissa and exponent
Calculate the floating-point representation of + 2.5 in this system. Show your working.
[3]
[2]
17. A binary tree is a data structure where item of data are stored such that they can be search for
51
quickly and easily.
The following data items are to be entered into a binary search tree in the order given.
Draw a diagram to show how these values will be stored in the tree.
Informatics, physics, mathematics, biology, chemistry, economics, ART.
[2]
18. Explain the differences between the World Wide Web and the Internet.
[2]
[2]
[2]
52
Mark scheme
16 Pushing is the name given to the process of adding MAX=2 1 mark for
an item of data to the top of a stack. each correct
answer.
Popping is the process of reading and removing the
top-most item from a stack.
55