Advanced level 2026 South West mock ICT 2

Advanced level 2026 South West mock ICT 2

Advanced level 2026 South West mock ICT 2

I have extracted the text from your most recent image, which covers topics including Data Representation, Cloud Computing, Networking in Cameroon, and Data Security.


COMPUTER SCIENCE EXAMINATION SECTION

1. (i)

  • (a) What aspect of the binary number system makes it a suitable storage unit for computer systems? (2 marks)

  • (b) ASCII is one of the oldest coding methods for data representation in the computer. State the coding method use in representing photos, sound and characters in computing devices before converting them to their binary representation. (3 marks)

  • (a) Give the main difference between bit and byte. (1 mark)

(ii)

  • (a) Define the concept data capture. (1 mark)

  • (b) Giving two examples of each case explain the following data capture terms:

    • Data verification.

    • Data validation. (4 marks)

(iii) Cloud computing has revolutionized the use of computing hardware as storage media.

  • (a) Explain two benefits of cloud computing to an organization using cloud-based software. (2 marks)

  • (b) What precaution should the organization mentioned in (a) above take to safeguard its information stored in cloud systems? (1 mark)

  • (c) Give three advantages of local or traditional storage over cloud-based storage system. (3 marks)


2. (i)

  • (a) With clear examples describe an ISP in the context of Cameroon. (1 mark)

  • (b) Describe three technologies use by Cameroon ISPs to connect users to public networks. (3 marks)

  • (c) Explain the key technology that distinguishes the intranet from the extranet. (2 marks)

(ii) Convert the following:

  • (a) $11101.11_2$ to Decimal. (2 marks)

  • (b) $1101010_2$ to octal. (1 mark)

  • (c) $A2F_{16}$ to octal. (2 marks)

(iii) Simulation and prototyping are two essential elements taking into consideration to validate the quality a newly design product.

  • (a) Identify two distinctive features between simulation and prototyping. (2 marks)

  • (b) Explain the various phases of prototyping. (2 marks)

  • (c) State two advantages of prototyping to a product developer. (2 marks)


3. (i)

  • (a) <u>Integrity</u>, <u>confidentiality</u> and <u>availability</u> are examples of key pillars governing data security. Explain the three underlined concepts. (3 marks)

  • (b) Describe two measures that can be used to maintain the integrity of data in computer systems. (2 marks)


Would you like me to provide examples of ISPs in Cameroon for question 2(i)(a), or perhaps show the working for the binary-to-decimal conversion in 2(ii)(a)?

PDF is loading please wait...


Leave a comment

Your email address will not be published. Required fields are marked *

JOIN OUR WHATSAPP GROUP! / REJOIGNEZ NOTRE GROUPE WHATSAPP!
sponsors Ads