Computing (Modular) CP5
2009
(2 Hours)
[1](i) | Briefly describe the difference between serial transmission and parallel transmission. | [1] |
|
||
(ii) | Give one advantage of using parallel transmission. | [1] |
|
||
(iii) | Explain the term multiplexing in a computer system. | [1] |
|
||
[2] | Asteroid is a company that
sells electrical items via their web site. The customer selects the
items they want to purchase and are shown the quantity of items
currently in stock. They proceed to a new web page to pay for the items. The quantity of items left in stock is then updated in the stock file and a copy of every transaction is stored in a separate file called a transaction log.
|
|
(a) | Explain how other customers can be prevented from purchasing the same stock item when the customer is paying for the items. | [1] |
|
||
(b) | Briefly describe the processing carried out on the stock file when a transaction is completed. | [1] |
|
||
(c) | If the stock file becomes corrupted the company would not know how many items were left in stock. Explain in detail how the transaction log could be used to restore the corrupted stock file. | [2] |
|
||
[3] | Two network administrators are discussing the merits of different types of network topologies and communication methods. One prefers a ring network using token passing while the other prefers a bus network with collision detection. | |
(a) | Explain in detail the main features of token passing on a ring network and give one reason why the first administrator may prefer this method of network communication. | [4] |
|
||
(b) | Describe what is meant by the term data collision on a bus network and describe how a data collision is detected. Briefly explain how the network deals with data collisions. Give one reason why the second administrator may prefer this type of network topology. | [4] |
|
||
[4](i) | Random access files use a hashing algorithm and an overflow area. | |
(a) | State the purpose of a hashing algorithm. | [1] |
|
||
(b) | State the purpose of an overflow area. | [1] |
|
||
(c) | Explain how a record is located if it is in the overflow area. | [2] |
|
||
(ii) | Indexed sequential files use indexes to locate records. | |
(a) | Describe the contents of an index. | [2] |
|
||
(b) | Explain how a three level index system is used to access a record in a multilevel index sequential file. | [3] |
|
||
[5] | A wide area network uses packet switching. Explain in detail how packet switching works and give one example of data that would be contained in a packet. | [4] |
|
||
[6] | A multi-user operating system uses interrupts, time slices and partitioning. | |
(a) | State what is meant by the term interrupt and give examples of two conditions or events that could generate an interrupt. | [3] |
|
||
(b) | Describe the term time slice and briefly describe how the operating system uses time slices to allocate processor time. | [2] |
|
||
(c) | Describe the term partitioning and briefly describe how the operating system uses partitioning to allocate main memory. | [2] |
|
||
[7](i) | Briefly describe the term distributed processing. | [1] |
|
||
(ii) | Describe one advantage of using this type of processing. | [1] |
|
||
[8] | A garage has installed an expert system to help the mechanics identify faults on cars. | |
(a) | Describe two parts of an expert system. | [2] |
|
||
(b) | Outline a typical interaction that a mechanic would have with the expert system when trying to identify a fault. | [2] |
|
||
[9](a) | Explain the difference between a primary key and a foreign key in a relational database, and explain the purpose of a foreign key. | [3] |
|
||
(b) | Explain what is meant by the terms data redundancy and data inconsistency in a database. | [2] |
|
||
(c)(i) | Every September a college enrols many students on one or
more courses. Each course has one teacher who may also be a teacher for
other courses. The college need to know which courses a student is studying, and all the students studying any given course. It also needs to know which courses a teacher teaches. Design a four-table database in third normal form to handle the information required for this application. Where appropriate you should include primary and foreign keys and other additional relevant fields in each table. You should also use meaningful table names and clearly indicate any primary or foreign keys that you use. |
[10] |
Primary keys are underlined NB: STUDENT_COURSES table has a compound primary key field consisting of two fields. |
||
(ii) | Each student achieves one overall grade for each course. The teachers would like to store this grade in the database. Amend your database design to store this grade. You only need to show amended table(s). | [1] |
|
||
[10] | Sensitive personal data stored in an electronic format is frequently transferred between different departments of large organisations. | |
(a) | Briefly describe why it would be sensible to encrypt this data. | [1] |
|
||
(b) | Explain how encrypted data can be read by the appropriate person. | [1] |
|
||
[11] | In the following question,
additional credit (up to 3 marks) will be given if your answer
demonstrates skill in written communication.
|
|
Car manufacturers have been using computer controlled
robots to help build motor cars for many years. Describe in detail the effect that using computer controlled robots to help build motor cars has had on the quality of the cars produced. Describe the cost benefits for the car manufacturers. The introduction of the computer controlled robots has had a significant effect on the health and safety of the workforce and employment within car manufacturing companies. Describe in detail the effects on the workforce and on employment.
|
[8+3] | |
|
||