Computing (Modular) 
CP5
June 2003

(2 Hours)

1 A multi-user system manages file access.  
(i) Describe one security method the operating system could use to restrict users to accessing only their own files. [1]
   
(ii) Several users may be able to access the same file.  
  I.   Explain why it may be important to record which user has accessed a file. [1]
   
  II.   Describe one method that would allow the operating system to keep track of this type of file access. [1]
   
 
2(a) A wide area network can use either packet switching or circuit switching to send data.  
(i) Explain in detail the term circuit switching. [2]
   
(ii) Give an example of the type of information that would be contained in a packet and state one reason why packet switching may be preferred. [2]
   
(b) Two network topologies are bus and ring.  
(i) Give one benefit of each of these types of network topology. [2]
   
(ii) Explain the main features of token passing on a ring network. [3]
   
 
3. TicketToday has a computerised real-time transaction processing system, which is used to sell tickets for concerts and sporting events. They receive bookings over the telephone. As each sale is made a sales assistant types in the details. A record in the master file is updated to indicate that the seat has been sold and a copy of the sale is stored in a transaction log.  
(i) Several sales assistants may try to access and update the same record to sell a particular seat. Describe how the operating system prevents a seat being double booked. [2]
   
(ii) In a system failure, the master file could be damaged and the data lost. Explain in detail how the transaction log could be used to restore the master file. [3]
   
 
4(a) Explain the term sequential file access. [1]
   
(b) Explain the purpose of the index in an index sequential file and describe in detail the contents of the index. [2]
   
(c) A particular multilevel index file has a three level index. Explain, with the aid of a diagram, how a record is located using these indexes. [2]
     
(d) Random access files are accessed directly. Explain in detail how a hashing algorithm allows direct access to a record. [3]
   
(e)(i) Explain why a random access file requires an overflow area. [2]
   
(ii) How will accessing a record in the overflow area affect the access time? [1]
   
 
5(a)(i) What is the difference between serial transmission and parallel transmission? [1]
   
(ii) State the advantage of using parallel transmission over serial transmission. [1]
   
(b)(i) A modem is used to connect a computer to the telephone network.
Describe the role of the modem in a computer system.
[1]
   
(ii) State a faster method than using a modem for connecting to the Internet. [1]
   
(c) Explain the need for multiplexing in a computer system [1]
   
 
6. A multi-user operating system ensures that all users have access to the computer's resources.  
(i) Explain in detail how the operating system uses time slices to allocate processor time. [2]
   
(ii) Describe two different interrupts that could terminate a time slice. [2]
   
(iii) Explain in detail the term partitioning when used to allocate main memory [2]
   
 
7. A local health authority has employed a software company to write an expert system to diagnose illnesses. The general public will be able to access the expert system in their local health centres.

Describe the role the doctors would have in the development of an expert system. Describe one possible benefit for the doctors and one possible benefit for the general public of using this system.

[4]
   
 
8(a) Explain why primary keys are important in a database. [1]
   
(b) What are foreign keys and why are they used in a relational database? [2]
   
(c) Meaningful names are given to tables in a database, explain why this is important. [1]
   
(d) A specialist mountain bike shop purchases parts from different suppliers and assembles them into mountain bikes. The table below shows a sample of bikes, the parts on the bikes and who supplied each part. It should be possible to trace the supplier for every part on every bike. The data are stored in a database.  
 
Bike
Code
Bike
Name
Bike
Cost
Part
Code
Part
Name
Part
Cost
Supplier
Code
Supplier Name Supplier
Contact
B235 Extreme £800 P091 Front
Wheel
75 S76 Alloys Direct Mr Brown
B235 Extreme £800 P225 Rear
Wheel
85 S76 Alloys Direct Mr Brown
B176 Hill
Climber
£500 P088 Seat 35 S54 Hi Tech
Supplies
Mrs Orwell
B176 Hill
Climber
£500 P454 Gears 190 S82 XL
Engineering
Ms Lloyd
B176 Hill
Climber
£500 P643 Front
Wheel
50 S98 Big Wheels Mr Brown
B235 Extreme £800 P287 Seat 65 S11 DGH Parts Mr Smith
B235 Extreme £800 P454 Gears 190 S82 XL
Engineering
Ms Lloyd
B481 Gorge
Jumper
£650 P287 Seat 65 S11 DGH Parts Mr Smith
 
(i) Using a specific example from the data in the table above, describe in detail one problem with duplicated data. [2]
   
(ii) Restructure this database into third normal form using four tables.
There is no need to copy the items of data.
[10]
   
 
9. In the following question, additional credit (up to 3 marks) will be given if your answer demonstrates skill in written communication.

Engineers use complex software and powerful computers to create flight-training simulators. These simulators are used to train airplane pilots.

Explain why powerful computers are essential for this application and describe any difficulties in producing a realistic simulator. Discuss the benefits of using flight-training simulators to train pilots.

 

[8+3]