Ordinary level 2025 North West regional mock computer science 2

Ordinary level 2025 North West regional mock computer science 2

Ordinary level 2025 North West regional mock computer science 2

1. a) A police station has just decided to digitalize their office and to receive complains by network.
i. List any two digital devices and state the function of each.
ii. Describe any two security risks for the digitalization
iii. Describe any two ways to overcome the risks described in (ii) above
(b) Most devices access data stored in storage devices either serially, randomly or
sequentially
. With the aid of a device as an example in each case, describe serial access,
sequential access, random access.
(c) (i) Explain briefly each of the following database concepts. Record, Field, File,
Primaiy key
.
(ii) With the aid of a diagram, name and describe computer buses
(2 marks)
(2
marks)
(2
marks)
(6 marks)
(4
marks)
(4
marks)
2. (a) (i) In developing a system or a software, an engineer goes through a series of stages known as the
system or software development life cycle. Name in order the stages involved in software development.
(5 marks)
(5 marks)
(b) The following algorithm has been written to validate the average Temperature (Temp) of a body
on a particular day.
*
(ii) State an activity in each of the named stages in question 2 (a) (i) above
1. Start
2. Temperatures are all numeric data.
.
3
Enter
measure of Temp 1 and Temp 2
.4
If Temp is less than zero
5.
Print “Body Temperature
cannot be negative
6. Enter Temp 1 and Temp 2
.7
Else Average Temp
= (Temp 1 + Temp 2)/2
.8
Display Temp 1
, Temp 2, Average Temp
9. End

(i) What is an algorithm?
(
ii) In what format is the algorithm above represented?
(2 marks)
(1
marks)
(iii) Using the flow charting tools, and using X for Temp 1 and Y for Temp 2, represent the above
(5 marks)
(2 marks)
algorithm on a flow chart.
(
iv) Using the algorithm above copy and complete table 1 below.

In Puts Expected Out Put
X = 14,Y = 10
X = ten, Y= 18
Table 1
3. (a) (i) State a difference between data validation and data verification.
(ii) State a method of checking data in each of verification and validation.
b) (i) What is a software?
(ii) State a difference between application software and system software, with an
example in each case.
c) The questions in this section are related to software piracy and security.
(i) State the meaning of software piracy.
(ii) Give two impacts of software piracy to the software owner.
(iii) Give two ways that software piracy can be reduced in Cameroon.
(iv) Give two technological reasons why software piracy is common
(v) Differentiate between data integrity and data confidentiality
4. a) (i) Define the following terms as used in computer, giving an example in each case!
Primary memory
I/O devices
(n) Using binary arithmetic, evaluate the binary number 11011011110 leavinn vonr
answer in Octal ’ h

(iii) Consider the Boolean expression AB + (A+B).
How many input variables make up this expression?
(3 marks)
Construct a Boolean circuit (logic diagram) for this Boolean
t,r*V>mCOSrA/0595 P2 MOC.K 2025
expression.
(2 marks)
(I mark)

PDF is loading please wait...


Leave a comment

Your email address will not be published. Required fields are marked *

Download our application
kawlo
sponsors Ads