Computing (Modular) 
CP1
June 2005

(1.5 Hours)

1(a) Employee information held on a computer system includes the employee's name, their number of whole years with the firm, their department name and whether they are in the firm's pension scheme.  
(i) State the most appropriate data type for each of the following:  
  Employee's name; [1]
   
  Number of whole years with firm; [1]
   
  Department name; [1]
   
  Whether in pension scheme. [1]
   
(ii) Give an example of other employee information which could sensibly be stored in a real data type. [1]
   
(iii) Using a labelled diagram, give an example of employee information which would best be stored in a  two-dimensional array. [2]
 

 

 
(b) Give one reason why it is generally not sensible to store telephone numbers in an integer data type.  
   
 
2. A computer package has a Human-Computer interface (HCI)  designed for a variety of users. Describe two features in each case which would be helpful for :  
(i) a beginner : [2]
   
(ii) an expert user: [2]
   
     
3. A certain computer program analyses data on the number of items bought in a clothes shop by each customer. The data below is input and the computer then carries out relevant calculations.

3  2  5  4  2  4  1  3  2  2  4  8  -1

 
(i) What is the name and purpose of the last number (-1)? [2]
   
(ii) Why is -1 a suitable value for this purpose? [1]
   
     
4. (a) A certain integrated package combines word processing, spreadsheet and database facilities. The package allows users to create their own macros, and there is also a programming facility.  
(i) Describe what is meant by the term macro and give an example of its use. [2]
   
(ii) Describe one benefit of having a programming facility. [1]
   
(b) An integrated package is an example of applications software. Name a different type of software and give an example of this type of software. [2]
   
     
5. (a) Computer programmers often use standard modules and self-documenting identifiers.

Explain each of these terms, giving an example in each case:

 
(i) standard module ; [2]
   
(ii) self-documenting identifier. [2]
   
(b) Errors often occur during program development. Describe each of the following types of error, giving an example in each case:  
(i) syntax error; [2]
   
(ii) logical error. [2]
   
(c) Explain why careful version control is important when developing computer programs. [1]
   
(d) Programs need to be maintained. One type of maintenance is adaptive maintenance. Name one other type of maintenance, and describe when it would be necessary. [2]
   
     
6. (a) A binary search is used to search for the number 12 in the following array:
  7    9    12    16    21    24   32 
 

 

  Write down in order the numbers which are accessed to complete the search. [2]
   
(b) An attempt is made to use a binary search to search for the number 47 in the following array:
 25    8    31    8    47    23    14 
 
(i) Explain why the binary search is not appropriate in this case. [1]
   
(ii) Name a type of search which would be appropriate in this case. [1]
   
     
7. Police fraud officers are concerned about a group of businesses and have decided to investigate any business in this group where the profits announced are very large or are considerably higher than in the previous year.

The algorithm used is shown below:

Statement

1. input ProfitThisYear
2. input ProfitLastYear
3. if ((ProfitThisYear>1 000 000) OR ((ProfitThisYear>500 000) AND (ProfitThisYear>1.5*ProfitLastYear)))
4.        then output ''Investigate''
5.        else output ''Don't investigate''

 
(a) State what the output will be when:  
(i) the inputs are 600 000 and 200 000; [1]
   
(ii) the inputs are 600 000 and 600 000; [1]
   
(iii) the inputs are 2 000 000 and 3 000 000. [1]
   
(b) The word OR is correctly used is statement 3 above. If it were replaced with the word AND, as shown below, the algorithm would not produce the required output.

3.  if ((ProfitThisYear>1 000 000) AND ((ProfitThisYear>500 000) AND (ProfitThisYear>1.5*ProfitLastYear)))
 
  Tick one box to show which of the inputs given in part (a) would give the same output as the original algorithm.
  inputs 

  tick one box 

600 000 and 200 000
600 000 and 600 000
2 000 000 and 3 000 000 
[1]
 

 
     
8. A bank has a national call centre where customers can telephone to make enquiries about their account. Sometimes, during the phone conversation, the customer decides to make a complaint, and all complaints are logged by the call centre. This situation is as shown in the following data flow diagram:
 
(i)  A systems analyst finds it very useful to show this type of diagram to users. Give one reason why this might be the case. [1]
   
(ii) What type of object does the rounded box in the diagram represent? [1]
   
(iii) Draw the shape used in the diagram to represent a data store. [1]
   
(iv) Give a suitable name for the object shown as a in the diagram. [1]
   
(v) Give a suitable name for the object shown as b in the diagram. [1]
   
(vi) Give a suitable name for the object shown as c in the diagram. [1]
   
     
9. An algorithm is to be developed to investigate world-wide climate change.  
(i) Give one reason why it will be very important to document this algorithm carefully. [1]
   
(ii) The algorithm is to be implemented using a high-level computer language. What is meant by the term high-level computer language? [1]
   
(iii) It will be important in this case to choose a suitable high-level language. Describe one feature of a suitable language which will be particularly useful. [1]
   
(iv) Describe what is meant by a global variable in a computer program. [1]
   
(v) Describe what is meant by a local variable in a computer program. [1]
   
     
10. In the following question, additional credit (up to 3 marks) will be gained if your answer demonstrates skill in written communication.

A sports club employs a systems analyst to enable it to computerise all the information it holds about members and sporting events.

The systems analyst will need to carry out a requirements analysis, then produce a requirements specification, and will need to select suitable software.

The systems analyst will also need to specify the most suitable type of changeover to be used.

Describe in detail how the systems analyst would carry out each of the four steps in italics above.

[7+3]