Computing (Modular)
CP5
June 2007
(2 Hours)
[1](a) | A buffer is used when data is entered via a keyboard into
the computer.
|
|||||||||||||||||||||||||||||||||||||||||||||||||
(i) | Explain the role of this buffer. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(ii) | Why is the buffer required? | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(b) | Explain double buffering and give an advantage over single buffering. | [2] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[2] | A football club allows seats to be booked over the telephone. Telephone calls are handled by several sales assistants. As each seat is booked a sales assistant types the details into a computerised real-time transaction processing system. A record in the booking file is updated to indicate that the seat has been booked and a copy of the booking is stored in a transaction log. | |||||||||||||||||||||||||||||||||||||||||||||||||
(i) | Describe how the system prevents a seat being booked twice. | [2] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(ii) | Following a system failure, the booking file is damaged and the booking data lost. Explain how this transaction log could be used to restore the booking file. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(iii) | Other than name, address and telephone number, give two other fields you would expect to find in a transaction log record. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[3](a) | Explain why networks require protocols. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(b) | Describe in detail: |
|||||||||||||||||||||||||||||||||||||||||||||||||
(i) | token passing (within a ring network) | [3] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(ii) | data collisions and their detection (within a bus network). | [3] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(c) | Name the device that is required to link two dissimilar computer networks. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[4] | Operating systems use interrupts to manage tasks. | |||||||||||||||||||||||||||||||||||||||||||||||||
(i) | A task can be in one of three states: ready, running or blocked. Briefly describe each of these states. | [3] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(ii) | What is a computer interrupt? | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(iii) | Give two examples of computer interrupts. | [2] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(iv) | The operating system is processing an interrupt when another interrupt with a higher priority is generated. Explain in detail the sequence of events following the second higher priority interrupt. | [3] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[5](a) | The following diagram is a simplified example of a
multi-level index for an indexed sequential file with three levels of
indexes.
Explain in detail how each of the indexes is used to locate the record with a key value of 4183.
|
[3] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(b) | Random access files use a hashing
algorithm and an overflow area.
Explain in detail how a record is located using a hashing algorithm when the record is stored in the overflow area. |
[4] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[6](a) | The table below shows some data stored in an un-normalised
database for products and their suppliers.
|
|||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Explain what is meant by the term data inconsistency, giving one example from the above table. | [2] | |||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(b) | Explain what is meant by data being in first normal form. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[7] | A government is proposing to build a new motorway that
will allow cars to be controlled by computer systems with minimal
intervention from the driver. Each car will be fitted with appropriate
sensors which will ensure that it can travel safely on the motorway.
|
|||||||||||||||||||||||||||||||||||||||||||||||||
(i) | Describe two uses of feed-back in this system. | [2] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(ii) | Describe two safety features that should be included in this type of system. | [2] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[8](a) | Data can be transmitted using simplex
and full duplex.
|
|||||||||||||||||||||||||||||||||||||||||||||||||
(i) | Explain what is meant by the term simplex. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(ii) | Explain what is meant by the term full duplex. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(b) | Explain the role of a multiplexor in a computer system. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(c) | Using an example, describe the term distributed system. | [2] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[9](a) | In addition to a microphone, explain what hardware is required to input speech into a computer. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(b) | Explain why this hardware is required. | [1] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[10](a) | Explain the roles of primary keys and foreign keys in a relational database. | [2] | ||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(b)(i) | A surgery has several doctors
and many patients. Each patient
can make one or more appointments with a doctor.
The surgery receptionist records which patient has made an appointment with which doctor and the time and date of the appointment. Design a three-table database in third normal form to handle the information required for this application. Each table should include only relevant information. You should clearly indicate the table names and any primary or foreign keys that you use. |
[8] | ||||||||||||||||||||||||||||||||||||||||||||||||
Underlined fields are key fields, overlined fields are foreign fields.
|
||||||||||||||||||||||||||||||||||||||||||||||||||
(ii) | Doctors sometimes visit
patients away from the surgery. The surgery receptionist records which doctor
is to visit which patient and the address,
date and time of the visit.
Add an extra table to your database design, to accommodate this extra information. |
[2] | ||||||||||||||||||||||||||||||||||||||||||||||||
The Patient's address is to be found in the PATIENTS table.
|
||||||||||||||||||||||||||||||||||||||||||||||||||
[11] | In the following question,
additional credit (up to 3 marks) will be given if your answer
demonstrates skill in written communication.
A car manufacturer has thousands of dealerships throughout the world. Mechanics in each dealership repair and service the manufacturer's cars. The manufacturer decides to install a new computer system in all the dealerships' workshops. The system will allow access to:
Describe how the mechanics could make use of the expert system, the Internet and the manufacturer's intranet. Describe any advantages for the mechanics, the customers and the manufacturer of installing such a system. Describe any drawbacks of installing such a system. |
[9+3] | ||||||||||||||||||||||||||||||||||||||||||||||||
The
mechanics could use the expert system to input car faults and output a
diagnosis of the fault, together with an advised method of
repair.
The expert system is able to store vast amounts of information about different cars - far more than a mechanic can remember. There is also less chance of the computer being mistaken about a diagnosis, which means that customers will get a more reliable service. The accumulated knowledge of an expert system is not diminished by a mechanic leaving or retiring. As new makes and models of cars are developed, information can be added to the expert system. The mechanics could use the Internet to find out specific information about cars, or order car parts directly from the manufacturers. The manufacturer would be able to advertise on a website and reach prospective customers all over the world. Customers could use the Internet from their homes to book cars in for repair or service, and the mechanics could use email for booking confirmations. Mechanics could access the manufacturer's intranet to get news and information about latest developments, new cars, common faults etc. One of the drawbacks of the expert system may be the initial cost of equipment and installation.
|
||||||||||||||||||||||||||||||||||||||||||||||||||