1 | PrePSPM 2022 KMPP KOLEJ MATRIKULASI PULAU PINANG SEMESTER / SESI : 01 - 2022 / 2023 NAMA SUBJEK: SAINS KOMPUTER 1 PRA PSPM SC015 MASA: 120 MINIT NAMA PELAJAR : KUMP. PRAKTIKUM : Answer all the questions in the space provided in the question paper. 1. All computers, whether they are smartphones in your hand or large, powerful servers, operate on the same four basic principles. These are input, processing, storage and output. Each component of a computer performs one of these functions, but they all work together to make the computer work. (a) Identify one (1) activity involved in each input, process and output when Alia pays for parking at the KB mall with her e-wallet. [3 marks] Input ● Scan the user’s e-wallet QR Code ● Enter the date and time of the transaction Select any one (1) J1 Process ● Verify the balance in the e-wallet ● Deduct the payment from the balance of the e-wallet ● Update the balance in the e-wallet Select any one (1) J1 Output ● The gate opened. ● Display the message “Thank You” Select any one (1) J1 (b) Identify the steps of the information processing cycle based on the following statement. [2 marks] Statement Step of Information Processing Cycle The ATM could not verify Jibam's card after he failed to enter the PIN correctly three times. Process -----J1 Project the World Cup soccer match at Mamak’s Restaurant LED projector. Output ----J1 2. (a) The numbering system is used to represent any input from a user to be stored in a computer. (i) Show the conversion of the binary number 111001 to a decimal number. 1 1 1 0 0 1 2 5 2 4 2 3 2 2 2 1 2 0 J1 32 16 8 4 2 1 J1 [3 marks] Section A Q1 : / 5 Q2 : / 21 Q3: / 20 Q4: / 22 Q5: / 4 Q6: / 9 Total : /80
2 | PrePSPM 2022 KMPP 113 ------J1 (ii) Show the conversion of the binary number 11101111 to a decimal number. [3 marks] 1 1 1 0 1 1 1 1 2 7 2 6 2 5 2 4 2 3 2 2 2 1 2 0 J1 128 64 32 16 8 4 2 1 J1 239 -----J1 (iii) Show the conversion of the decimal number 52 to a binary number. [3 marks] 2 5 2 4 2 3 2 2 2 1 2 0 J1 32 16 8 4 2 1 1 1 0 1 0 0 52 - 32 20 - 16 4 - 4 0 1101002 ----------J1 Note: Deduct J1 if no base is written in an answer (iv) Show the conversion of the decimal number 696 to a hexadecimal number. [3 marks] 162 161 160 J1 256 16 1 2 B(11) 8 696 -512 184 -176 8 - 8 2B816 ----------J1 0 Note: Deduct J1 if no base is written in an answer (v) Show the conversion of the hexadecimal number 4F6A to binary. [3 marks] 4 F(15) 6 A(10) J1 J1
3 | PrePSPM 2022 KMPP 8 4 2 1 8 4 2 1 8 4 2 1 8 4 2 1 J1 1 0 0 1 1 1 1 0 1 1 0 1 0 1 0 J1 1001111011010102 ---------J1 Note: Deduct J1 if no base is written in an answer (b) Computer works only with binary numbers. It stores all types of data in the form of binary digits. The data is converted to binary form before it is stored inside the computer the process of converting data into a binary form is known as encoding. Data can be converted into binary form by using different coding schemes. Coding Scheme A: This type of coding scheme allowed the use of more European language characters and accents Coding Scheme B: The first 128 codes in this coding system represent the same characters as the first 128 in coding scheme A. Name and differentiate these two (2) coding schemes based on the given criteria. [6 marks] Criteria Coding Scheme A: ASCII Coding Scheme B: Unicode The total number of characters represented 256 65536 The number of bits to represent a character 8 16 3. (a) Two switches control a bulb at a staircase in a computer lab building, one on the 3rd floor and the other on the ground floor. Regardless of the position of the other switch, one of the switches can turn on and off the bulb. Create a Boolean expression to manage the lightbulb, then create a truth table for this situation. [5 marks] Legend A – Switch is ON/upward/downward B- Switch is ON/upward/downward Y – bulb turns ON Legend – J1 Y = A B ------------------------- J1 for the gate, J1 for output A B Y 0 0 0 --------------J½ 0 1 1 -------------- J½
4 | PrePSPM 2022 KMPP 1 0 1 -------------- J½ 1 1 0 -------------- J½ (b) FIGURE 1 shows an example of a logic circuit. FIGURE 1 (i) Construct a truth table based on this logic circuit. [2 marks] A B C D Z 0 0 1 0 0 J½ 0 1 1 1 1 J½ 1 0 1 1 1 J½ 1 1 0 0 1 J½ (ii) Derive the Boolean Expression for the logic circuit shown in FIGURE 1. [5 marks] Z =( (A •B )’ (A B ))’ Output – J1 Gate : NAND – J1 + J½, XOR – J1, XNOR- J1 + J½ (c) Seat belt warning buzzer in a car will sound when the system detects the presence of a passenger on the front seat and does not fast the seat belt while the car is moving forward. Given: S – Buzzer sound P – Sensor detect passenger on front seats B – Seat belt on M – Car moving forward Construct a truth table for the above scenario. [4 marks] S = P• B' • M P B M B’ S 0 0 0 1 0 J½ 0 0 1 1 0 J½ 0 1 0 0 0 J½ 0 1 1 0 0 J½ 1 0 0 1 0 J½ 1 0 1 1 1 J½ 1 1 0 0 0 J½ 1 1 1 0 0 J½
5 | PrePSPM 2022 KMPP (d) You can’t print your tickets unless you have entered all the details needed and have paid the amount but can straight away print it if you already got your booking number. Inputs Binary Values Condition D 1 Complete all details needed 0 Incomplete details P 1 Paid 0 Unpaid B 1 Have booking number 0 No booking number Draw a logic circuit for the above scenario. [3 marks] = ( ∙ ) + Each gate – J1, J1 Output – J1 4. (a) Haziq, Arman & Ihsan want to set up the network in their room for their laptops to be connected. Each of them agreed to allow full access to their shared folders. Since their laptop have no problem with the Wireless Network Interface Card, they decided not to use a wired transmission media. Ihsan will allow his printer to be accessed by Haziq and Arman’s laptops. Draw the suitable network architecture for this scenario [3 marks] Three peers – J1 Printer – J1 Label – J1 Or D P B T PEER 1 PEER 2 PEER 3 PRINTER PEER 1 PEER 2 PEER 3 PRINTER
6 | PrePSPM 2022 KMPP Three peers – J1 Printer – J1 Label – J1 (b) KMPP library is planning to have a network that will contain four (4) computers in their new meeting room. Each of the four (4) computers will be assigned their IP address including the gateway IP address automatically from another of the computer in the same network. The computer that releases the IP address also has the function to manage the printer in the network. Draw the suitable network architecture based on the given scenario. [4 marks] 4 clients + switch – J1 Label – J1 Server – J1 Printer – J1 Or Client1 Client3 Client4 Client2 Client1 Client2 server
7 | PrePSPM 2022 KMPP 4 clients – J1 Label – J1 Server – J1 Printer – J1 (c) DIAGRAM 1 and DIAGRAM 2 show different classifications of a network. Label and differentiate between DIAGRAM 1 and DIAGRAM 2 based on the area of coverage. [4 marks] DIAGRAM A: Local Area Network DIAGRAM B: Wide Area Network Differentiate the area of coverage It covers limited geographical areas such as computer laboratory The area covered by a WAN is large, usually covering two or more cities, states, countries or continents. (d) The PNG college offers email, a student information system, a web server, a printing server, and internet access to facilitate staff and student operations and communication within the organisation. The college also makes it possible for parents to view their children's exam results for each semester. Differentiate between Intranet and Extranet by giving an example from the given statement. [4 marks] Internet Technologies Example from the statement Client3 Client4 printer
8 | PrePSPM 2022 KMPP Intranet The PNG college offers email, a student information system, a web server, and a printing server, to facilitate staff and student operations and communication within the organisation. Extranet The college also makes it possible for parents to view their children's exam results for each semester. (e) Name the Internet technology used in this situation. [2 mark] No Description Internet Technologies (i) A package shipping company allows its customers to access their intranet to print shipment bills, schedule pick-ups, and even track shipped packages. Extranet (ii) This Internet technology is made to allow both bottom-up and top-down communication. Topdown is necessary to get employees aligned with the organization's vision and mission, whereas bottom-up communication is unmissable for real employee engagement. Intranet (f) An online device can be identified by its Internet address, which is a group of special numbers. There are no longer enough IPv4 addresses due to the amazing increase in devices connecting to the Internet. (i) Name the new version of the IP address. [1 mark] IPv6 (ii) Describe one (1) reasons why a new version of IP addthe ress is used nowadays instead of the old version. [2 marks] IPv6 provides a much larger address space. IPv6 improves traffic routing and gives better security. (iii) The Internet supports domain names because long IP addresses might be hard to remember. Explain the relationship between IP address and domain name. [2 marks] A domain name is a text-based name that corresponds to the IP address of a server. 5. (a) Computer ethics is a branch of practical philosophy that addresses how computing workers should decide on appropriate social and professional behaviour. Identify the area of computer ethics based on the given statements: [2 marks] No Statement Area of computer ethics
9 | PrePSPM 2022 KMPP (i) Mr Adam conducts an online examination for Chemistry subject. Green Computing (ii) Ms Kiah printed the KFC logo on her stall’s banner to increase the sales of crispy fried chicken. Intellectual Property (b) Netiquette is a made-up word from the words net and etiquette. Apply the suitable rules of Netiquette applied in FIGURE 2 and FIGURE 3 below: [2 marks] No Scenario Rules of Netiquette (i) FIGURE 2 Read the FAQ (Frequently asked questions), if one exists
10 | PrePSPM 2022 KMPP No Scenario Rules of Netiquette (ii) FIGURE 3 Use emoticons to express emotion. 6. A conceptual model for project management known as the systems development life cycle (SDLC) details the phases of an information system development project, from the early phase of a feasibility study to the ongoing maintenance of the finished application. (a) Explain the purpose of the last step in the Systems Development Life Cycle (SDLC). [2 marks] The purpose of the support and security phase is to provide ongoing assistance for an information system and its users after the system is implemented. (b) One of the major activities in the fourth step of the Systems Development Life Cycle (SDLC) is install and test the new system. Describe the test that involved the end users. [2 marks] An acceptance test is performed by end users and checks the new system to ensure that it works with actual data. (c) Identify the phase of the Systems Development Life Cycle (SDLC) based on the given statements: [5 marks] No Statement Phase i. Teguh company plans to use the pilot conversion method to convert the existing system to a newly built system. Implementation ii. The purpose of this phase is to develop a clear understanding of the new system’s development. Analysis iii. At this phase, the IT staffs maintain, enhances, and protects the system. Support and Security iv. To ensure the system runs smoothly, the programmers and system analysts will fix errors that occurred and improve a system’s operations. Support and Security
11 | PrePSPM 2022 KMPP v. One of the activities involved in this phase is to determine the users' wants, needs, and requirements. Analysis ENDS OF QUESTIONS