Cameroon GCE advanced level June 2025 ICT 2

Cameroon GCE advanced level June 2025 ICT 2

Cameroon GCE advanced level June 2025 ICT 2

(i) The operating system performs several activities in a computer such as job scheduling in a pre-emptive and non-pre-emptive manner.
(a) What is job scheduling?
(b) Describe TWO scheduling strategies and say whether they are pre-emptive or non-pre-emptive.
(c) State three other functions of the operating system.
(ii) Telemedicine and expert system are two applications that are common in the health domain.
(a) What is telemedicine?
(b) State two advantages of telemedicine.
(c) Describe ONE application of expert system in health.
(d) Describe ONE other application of the computer in health.
(iii) Briefly describe the following information systems
(a) Automation.
(b) GPS.
(c) Transaction Processing System.

(i) Data is collected and stored free of errors with the use of data validation and verification techniques
(a) Describe data validation and data verification.
(b) Describe ONE method of data validation and ONE method of data verification.
(ii) A file in storage is represented using TWO components as follows: diameter.PDF.
(a) Define the two components in the representation.
(b) Give the full meaning of PDF and state two advantages of files that terminate with PDF.
(c) State the name given to the software that assigns PDF to the representation.
(d) State an application that can be used to open the stated file above.
(e) State the complete representation of a file named communication that I created in Notepad.
(iii) Describe the following concepts in task management in the computer.
(a) Multitasking.
(b) Multiprocessing.

(i) A project schedule is given below
| Task | Predecessor | Duration |
|—|—|—|
| A | – | 3 |
| B | – | 2 |
| C | A | 4 |
| D | B | 1 |
| E | D | 2 |
| F | B | 3 |
| G | C | 2 |
(a) What is a task?
(b) Represent the schedule above in a Gantt chart.
(c) Determine the critical path.
(d) Determine any slack task if it exists.

Page 2

(i) (a) What is a malware?
(b) State and describe three types of malware.
(c) Describe three measures that can be taken to protect a school from malware attacks.
(ii) (a) Define the term information system.
(b) State four components of a basic information system.
(c) State two factors that determine the reliability of an information system.
(d) Describe briefly an expert system.
(iii) (a) State the THREE divisions of a CPU.
(b) Make a labelled diagram of the machine cycle.

(i) (a) What is E-commerce?
(b) State two limitations of e-commerce.
(c) Give two security measures to ensure during e-commerce.
(ii) A computer is divided into two main components: hardware and software.
(a) Describe two types of software that manage hardware in a computer.
(b) Describe tailor-made software stating an example of it.
(c) State one reason to buy and use licences software.
(iii) The algorithm given by a student to assess body temperature is given as:

0 – Start
1 – Get body temperature
2 – Check if the temperature is equal to 37
3- Print Normal if YES
4- Print Abnormal if NO
5- Stop
(a) State the form of the algorithm above.
(b) Convert the above algorithm to a flowchart.
(c) State the control structure used in the algorithm.

PDF is loading please wait...

information and communication technologies
information and communication technologies

Click Here for answers and pamphlets

A LEVEL 2025 ICT 2

 

Leave a comment

Your email address will not be published. Required fields are marked *

JOIN OUR WHATSAPP GROUP! / REJOIGNEZ NOTRE GROUPE WHATSAPP!
sponsors Ads