The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by ruzman.kmkt, 2023-11-15 20:07:56

KMK SC015_Conquer(answerScheme)

KMK SC015_Conquer(answerScheme)

SULIT SULIT SC015 SET 4 SC015 Computer Science 1 Sains Komputer 1 Semester I Semester I Session 2022/2023 Sesi 2022/2023 2 hours 2 jam No. Matrik Matric No. No. Kad Pengenalan Identity Card No. No. Tempat Duduk Seat No. (Isikan maklumat dengan lengkap) KOLEJ MATRIKULASI KEDAH KEDAH MATRICULATION COLLEGE PROGRAM CONQUER CONQUER PROGRAM JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU. DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE TOLD TO DO SO. Untuk Kegunaan Pemeriksa For Examiner’s Use No. Soalan Question No. Markah Mark Pemeriksa Examiner KP / KKP 1 11 2 16 3 14 4 18 5 4 6 7 JUMLAH TOTAL 80 Kertas soalan ini mengandungi 11 halaman bercetak. This question paper consists of 11 printed pages. © Kolej Matrikulasi Kedah S C 0 1 5


SC025 2 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT 1 As a new citizen in Kedah, Amril wants to go to Aman Central. He uses Google Map to find route as it showed in Figure 1. Analyse the use of information processing cycle for process and output operations when Amril clicks on Start button. [5 marks] Figure 1 Operations Description Process The computer determines the best route to reach the destination (Aman Central) The computer calculates the time required to reach the destination The computer calculates the distance from the vehicle location to the destination Output The computer displays the best route on user’s device The computer produces audio for the direction


SC025 3 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT 2 (a) A number system is defined as a system of writing to express numbers. Convert between number systems. (i) 10110112 = ________ 10 [3 marks] = (1 x 2 6 ) + (1 x 2 4 ) + (1 x 23 ) + (1 x 21 ) + (1 x 2 0 ) = 64 + 16 + 8 + 2 + 1 = 9110 (ii) 47310 = ________ 2 [3 marks] 2 473 - 2 236 1 2 118 0 2 59 0 2 29 1 2 14 1 2 7 0 2 3 1 2 1 1 2 0 1 Hence, 473 = 1 1101 10012 (iii) BECA16 = ___________ 10 [3 marks] = (B x 163 ) + (E x 162 ) + (C x 161 ) + (A x 160 ) = (11 x 4096) + (14 x 256) + (12 x 16) + (10 x 1) = 45056 + 3584 + 192 + 10 = 4884210 (iv) 537410 = ___________ 16 [3 marks] 16 5374 14 (E) 16 335 15 (F) 16 20 4 16 1 1 0 Hence, 5374 = 14FE16


SC025 4 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT (v) 75E16 = ___________ 2 [2 marks] Hexadecimal digit 7 5 E Decimal Value 7 5 14 Binary 4-digit 8 4 2 1 8 4 2 1 8 4 2 1 0 1 1 1 0 1 0 1 1 1 1 0 = 111 0101 11102 (vi) 1011101100012 = ___________ 16 [2 marks] Binary 4-digit 8 4 2 1 8 4 2 1 8 4 2 1 1 0 1 1 1 0 1 1 0 0 0 1 Decimal Value 11 11 1 Hexadecimal Digit B B 1 = BB116 (b) An information coding scheme is a standard which tells the user's machine which character represents which set of bytes. (i) Find the two similarities between ASCII and EBCDIC [2 marks] use 8 bits to represent a character ________________________________________________________ capable to represent 28 or 256 different characters with values that range from 0 through 255. ________________________________________________________ (ii) Differentiate between Unicode and EBCDIC based on number of bits and context use. [3 marks] Unicode EBCDIC Number of bits use 16 bits to represent a character use 8 bits to represent a character Context use Used on all types of computer and operating systems EBCDIC used mainly on IBM mainframe and IBM midrange computer operating systems.


SC025 5 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT 3 A logical operator are typically used with Boolean (logical) values, true or false. Two or more Boolean expressions can be combined using Boolean operators. (a) Boolean expression is a logical statement that is either TRUE or FALSE. (i) Derive Boolean expression based on a given logic statement. "Amin has a hectic schedule. He will have his lunch at 1.00 pm if he has no class starts at 2.00pm. However, if the fried chicken is crispy and the sambal gravy is hot, he will have his lunch regardless the time." [3 marks] Let A – Amin having lunch C – Class start at 2pm B – Chicken is crispy S – Sambal is hot Boolean expression is A = C’ + B.S (ii) Derive Boolean expression based on a given logic circuit. [4 marks] D = A B’ + B C


SC025 6 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT (b) A truth table is a tabular representation of all the combinations of values for inputs and their corresponding output. (i) Construct a truth table based on a given Boolean expression. Y = ( (A’ . B )’ + C) [4 marks] A B C A’ A’ . B (A’ . B )’ Y 0 0 0 1 0 1 1 0 0 1 1 0 1 1 0 1 0 1 1 0 0 0 1 1 1 1 0 1 1 0 0 0 0 1 1 1 0 1 0 0 1 1 1 1 0 0 0 1 1 1 1 1 0 0 1 1 (ii) Construct a truth table based on a given logic circuit. [4 marks] A B C AA’ (A’.B)’ (A’.B)’+ C Y 0 0 0 1 1 1 0 0 0 1 1 1 1 0 0 1 0 1 0 0 1 0 1 1 1 0 1 0 1 0 0 0 1 1 0 1 0 1 0 1 1 0 1 1 0 0 1 1 0 1 1 1 0 1 1 0


SC025 7 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT (c) Draw a simple logic circuit for a given logic statement or scenario. "Dian loves to travel. She plans to travel to Norway with her friends. She will travel if either Betty and Camila go or Sofea goes. However, Sofea will only agree to go if Ana goes but Betty does not go. " [4 marks] D = Dian goes to Norway A = Ana goes B = Betty goes C = Camila goes D = A B’ + B C Dian = Ana Betty’ + Betty Camila 4 A network is a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications. (a) Network architecture is the design of a computer network. (i) Illustrate types of network architecture based on the given scenarios. Kelvin plans to set up his mini office network at home. He needs to install all of the following devices and peripherals. Draw a network architecture layout if he needs to set up 2 workstations, 2 laptops and 1 wireless printer. [4 marks]


SC025 8 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT (ii) Aaron works as IT officer and wants to setup office network for his company. His manager wants to setup a network which can expand the capacity and number of computer connected up to 30 units before end of this year. Suggest the most appropriate network architecture for that company. Justify your answer. [3 marks] ________________________________________________________________ ________________________________________________________________ (b) Network is classified based on area of coverage. Differentiate between A and C in term of coverage and ownership in Figure 2. [5 marks] Figure 2 A C Area of coverage A network that connects LANs and computers in large area such as a country or the world. A network that connects computers and devices in a small area such as a home, school computer lab, office building or closely located buildings. Ownership Multiple/ Shared/ Distributed ownership: WAN is not owned by any one organization but rather exist under collective or distributed ownership and management. Single ownership: Typically owned by an individual or a single organization, such as school, college, university or company. Client/server. Support many computer and suitable for large scale of networks A B C


SC025 9 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT (c) The Internet is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. Differentiate between these two types of private networks in Figure 3. [5 marks] Private Network 1 Private Network 2 Figure 3 (d) The Internet address is a group of unique number that identifies a device on the Internet or a network. (i) IPv6 has been replacing IPv4 as it has some limitation. Explain IPV4 limitation. [3 marks] The lack of address space - the number of different devices connected to the Internet grows exponentially, and the size of the address space is quickly depleted. The problem of security of communications. Lack of quality of service support - placement of information about bandwidth, delays required for smooth operation of some network applications are not supported. Private Network 1 Private Network 2 A private network of an organization which uses internet technologies to share organization’s information or operations with its employees. A private network of an organization that securely share parts of organization’s information with its suppliers, vendors, partners, customers, or other organizations. It only provides access to employees within an organization. It provides limited access to authorized people outside the company. Facilitate communication and operations among employees within an organization. Facilitate communication and business operations between the organization and related people or organizations.


SC025 10 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT (ii) Explain how domain name system (DNS) create the relationship between IP address and domain name. [2 marks] The domain name system is responsible for translating domain names into a specific IP address so that the client can load the requested Internet resources


SC025 11 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT 5 (a) Computer ethics are a set of moral standards that govern the use of computers. Identify the area of computer ethics based on the given scenario. [2 marks] Scenario Area of Computer Ethics (i) Ahmad always clear history file after he use online banking to make payment through internet. Information privacy (ii) Authorities in China destroyed 3,000 tonnes of counterfeit products valued at 500 million yuan ($69 billion) at an event held across 17 provinces and cities, state broadcaster CCTV reported. The counterfeit products were purported to be from the brands such as Nike and Louis Vuitton. Intellectual property rights (b) Netiquette is the set of rules about behaviour that is acceptable when communicating with people over the Internet. The purpose is to ensure that every user feel comfortable while communicating with others on the Internet. Apply the two rules of Netiquette in the given scenario. [2 marks] Scenario Rules of netiquette i) i) Use proper grammar, spelling and punctuation ii) ii) Avoid sending or posting flames, which are abusive or insulting messages.


SC025 12 SULIT No. Matrik.............................................................. No. Kad Pengenalan.................................................. SULIT 6 System Development Life Cycle (SDLC) is a systematic approach which explicitly breaks down the work into phases that are required to implement either new or modified Information System. a) Explain the first phase of SDLC. [2 marks] Planning - Used to identify the potential projects and to allocate required resources. __________________________________________________________________ b) Determine two (2) benefits of documenting the solution during develop program activities in implementation phase. [3 marks] Helps future developers understand the system. Makes it easier for successor to maintain and update. Helps focus on goals - Without documentation, development teams can easily derail from their targets. Prevents miscommunication - When working on projects, developers don’t normally get involved with the different stakeholders. Having documentation can prevent miscommunication between the different stakeholders of a project and improving customer satisfaction metrics. c) Determine the SDLC phase based on the following activities in developing Health Care System in General Hospital. [3 marks] Activities SDLC Phase The software they were using was at least seven years old and could simply not keep up with all the changes in billing practices and Medicare requirements and payments. Analysis The Home Care unit of General Hospital utilized the Parallel Installation method for approximately 60 days before the “go live” date. Clinicians would “double enter” patient records and admissions data into both the old and new systems to ensure that the new database was populated, while at the same time maintaining patient care with the former product until its disposal. Implementation Software upgrades are performed every six weeks. The Director noted that all end users, including nurses, physical therapists, physicians, and other staff, were very happy with the new system and had no major complaints about it. Maintenance / Support & Security END OF QUESTIONS KERTAS SOALAN TAMAT


Click to View FlipBook Version