Information Processing: Main Aims of The Unit
Information Processing: Main Aims of The Unit
1. Read the whole question before starting this one. Select a particular company or organisation that you have studied.
a) State the name of the company and its main functions. [2]
b) Describe ALL the uses of computing in this company. Indicate the type of processing in EACH case. [5]
c) Describe the specific outputs that computers produce in the company and explain who uses these and how they are
used. [5]
d) List the hardware used in the main applications of the company including the number and types of computers used.
[5]
e) Describe the input data needed to produce the results. [3]
2. a) i The PC is incremented during a fetch-execute cycle. Explain what this means and WHY it happens. [2]
ii In the diagram below, A to D represents the sequence of events over one fetch-execute cycle.
A_________FETCH___________B C_________EXECUTE_________D
→ time
State at which of the times A, B, C or D will the PC be incremented. [1]
iii The PC could be altered at another time during the cycle. State the circumstances when this
happens and at which point in the cycle (A, B, C and D) it occurs. [2]
b) Memory location 4567 holds the variable X and location 4568 holds the variable Y.
Referring to the fetch-execute cycle, describe IN DETAIL the sequence of events that occurs when the value X – Y
is calculated and the result returned to memory location R (4569).
The program routine for this begins in location 1000. Show how the registers change throughout. [15]
3. a) In business, a computer user may use two types of application software – general purpose and special purpose.
i Distinguish between the two.
ii An employee uses a special-purpose package. Explain how his subsequent actions will be different
from using a general-purpose package. [5]
b) A user wishes to sort a very large data file of employee records (key field = employee number) so that the file is
sorted by employee name – surname must be the prime key and first name the secondary key. State the
information the sort program will need to achieve this. [5]
c) Name a particular operating system.
Describe FIVE major features the operating system provides. Your choices must be significantly different from
each other. [10]
4. a) Outline the possible effects of a company with inadequate security in its computer system. [4]
b) Discuss possible ways in which a computer system could be vulnerable and suggest ways of eliminating or
minimising EACH. Your answer should consider:
i accidental loss of data
ii hardware problems
iii deliberate acts to create problems by staff or other people [16]
5. Write notes about FIVE of the following. Each of your answers must have at least FOUR different and significant points.
a) Comparison between the speeds of input, output, storage devices and memory
b) Minicomputers
c) Batch processing
d) Plotters
e) Distinction between special purpose and general purpose software
f) Spooling [4 each]
6. Choose any FOUR of the following methods of data capture. For EACH:
describe how the data input device works using appropriate diagrams
identify precisely a particular application that is most suited to its use
a) Barcode reading
b) MICR
c) OCR
d) OMR
e) Voice recognition [5 each]
8. Name a particular operating system and describe, in detail, FIVE significantly different tasks that it performs.
[4 each]
JUNE 2011
INFORMATION PROCESSING (NEW)
Instructions to candidates:
a) Time allowed: Three hours (plus an extra ten minutes’ reading time at the start – do not write anything during this time)
b) Answer any FIVE questions
c) All questions carry equal marks. Marks for each question are shown in [ ]
d) Mark allocations should determine the length and depth of your answer and the time you spend on it. A part question
carrying 4 marks normally requires 4 different and valid points
e) In definitions, do not use the word being defined in your definition e.g. avoid the word SERIAL when defining SERIAL FILE
f) Ensure that you pay particular attention to words underlined, in CAPITALS or in bold. FEW OR NO MARKS will be awarded to
any question where these are ignored
g) No computer equipment, books or notes may be used in this examination
2. a) Check digit validation cannot realistically be used for checking all numeric data. Identify a situation where it is
appropriate and one in which it is not. [2]
b) Employee numbers are six digits long and are created using the modulo-11 system with traditional weights
6, 5, 4, 3, 2, 1.
Investigate the number 354287 and state whether it is valid or not. Show all stages of your working. [6]
c) Give specific BUSINESS examples where EACH of the following validation checks would be used. Include in
your answer for EACH:
two realistic examples of data – one VALID and one INVALID
explanation of how the computer could detect the invalid one
i range check
ii format check
iii presence check
iv any other check (excluding check digit verification) [12]
3. A company holds details of all its products on an indexed-sequentially organised file. In a telephone enquiry, a customer
asks for details about product 3456. The product file is then accessed directly.
a) Describe all the internal processes, logical and mechanical, that occur from the moment 3456 is keyed until the
details of the product appear on the screen. [10]
b) Explain why the file is unlikely to be held on CD-ROM. [2]
c) The file would not be held on magnetic tape. Explain why magnetic tape is still used for other purposes. [3]
d) Using the following table, add FIVE more fields that you would expect to find on this PRODUCT file. [5]
Field Name Datatype Purpose – how it is used
ProductName Character Identification and for printing on a customer invoice
8. a) A company receives 500 orders per week through the mail for items which are not urgent and as a result BATCH
PROCESSING is used.
i Explain what happens in batch processing. Describe also how BATCH TOTALS would be used and how
they are calculated. [6]
ii Explain how errors detected in data submitted for batch processing are corrected. [4]
iii There is now far less batch processing than in the past. Explain why. [2]
b) i Identify the files that would be needed in THIS batch processing example. [2]
ii Draw a labelled systems diagram to show how these files would be used during the batch processing
update. Describe briefly the various stages that occur in the process. [6]
SEPTEMBER 2011
INFORMATION PROCESSING (NEW)
Instructions to candidates:
a) Time allowed: Three hours (plus an extra ten minutes’ reading time at the start – do not write anything during this time)
b) Answer any FIVE questions
c) All questions carry equal marks. Marks for each question are shown in [ ]
d) Mark allocations should determine the length and depth of your answer and the time you spend on it. A part question
carrying 4 marks normally requires 4 different and valid points
e) In definitions, do not use the word being defined in your definition e.g. avoid the word SERIAL when defining SERIAL FILE
f) Ensure that you pay particular attention to words underlined, in CAPITALS or in bold. FEW OR NO MARKS will be
awarded to any question where these are ignored
g) No computer equipment, books or notes may be used in this examination
1. a) A file-handling program might contain a command to read a single record into a program buffer.
i Describe all the steps, logical and physical, which take place to execute this command if the file has
INDEXED-SEQUENTIAL organisation. [6]
ii Repeat this for a file organised as RANDOM. [4]
b) It is unusual to amend a SINGLE record on a file with SERIAL organisation. However, it is realistic for small files.
Describe in full how a single record can be changed without altering or losing any of the other records
i so that a new file is created [5]
ii so that the SAME file area is used for the updated version [5]
Consider EACH FIELD IN TURN and identify the validation that can be performed by the data input program on that
field. [12]
3. a) Draw a labelled diagram showing the component parts of the central processor. Omit control signals but show
directions of data flow using arrows. [6]
b) Distinguish clearly between a laptop and a desktop computer. [4]
c) Describe the steps in the fetch-execute cycle which would be undertaken when the instruction in memory during
the run is ADD X,M. Take this to mean that the contents of address M are added to register X. [10]
4. a) Printers used with large networks have different characteristics from those normally attached to microcomputers.
Explain what these are. [5]
b) Select a printer suitable for printing invoices which will be handed to customers of a car hire company when they
reserve their cars. Explain why it is suitable and describe its method of printing. [7]
c) Select a different type of printer suitable for printing tax statements to be sent to over one million customers.
i Explain why it is suitable and describe its method of printing.
ii Explain why the choices you have made in each of b) and c) would not be suitable for the other. [8]
6. a) With the aid of a diagram, explain how a plotter is able to print diagrams in different colours and with associated
text of different fonts, font sizes and at different inclinations. [8]
b) Modern printers can print diagrams with included text. Describe applications from the world of commerce and
industry where diagrams are produced and where:
a plotter would be MORE appropriate [4]
a printer would be MORE appropriate [4]
Your answers should explain why EACH is more appropriate.
Identify:
i TWO types of printers which are able to print good quality diagrams and
ii TWO printers which either cannot print diagrams or the quality is poor [4]
7. Name a particular operating system and describe, in detail, FIVE significantly different tasks that it performs. [4 each]
8. a) Describe the differences between high- and low-level languages, illustrating your answer with brief examples of coding.
Discuss the differences during the processes of
writing a program
correcting program errors
translating a program
run-time [10]
b) Define the term UTILITY program. Give TWO examples of utility programs, explaining what EACH achieves. [5]
c) Briefly describe FIVE significantly different features of an operating system. Your examples can be from different types of
operating systems provided you indicate which type.
DECEMBER 2011
INFORMATION PROCESSING (NEW)
Instructions to candidates:
a) Time allowed: Three hours (plus an extra ten minutes’ reading time at the start – do not write anything during this time)
b) Answer any FIVE questions
c) All questions carry equal marks. Marks for each question are shown in [ ]
d) Mark allocations should determine the length and depth of your answer and the time you spend on it. A part question
carrying 4 marks normally requires 4 different and valid points
e) In definitions, do not use the word being defined in your definition e.g. avoid the word SERIAL when defining SERIAL FILE
f) Ensure that you pay particular attention to words underlined, in CAPITALS or in bold. FEW OR NO MARKS will be awarded to
any question where these are ignored
g) No computer equipment, books or notes may be used in this examination
2. The table below shows the contents of part of memory at a given time during the running of a program. The contents are
shown in their most convenient forms but are of course held in binary.
ADDRESS CONTENTS MEANING
2000 5000 Store location P
4100 SUB P Subtract contents of P from accumulator
4101 BPZ G If content of accumulator is positive or zero, branch to G
6123 STP Location G. STOP. End the program
4. A company holds its 8000 product RECORDS on its product file. This MASTER file is organised as SEQUENTIAL using
product number as the KEY field. On the file are details of products numbered 4567, 5678, 6789 and 7890.
a) Define carefully the FOUR terms above in CAPITAL letters. [8]
b) A single new product (product number 7000) is to be added to this file. A program is available to do this. Describe
carefully the steps this PROGRAM will take. [4]
c) Unaware that the product has already been added to the file, a different stock controller also tries to add 7000 to
the file. Describe the features needed in the PROGRAM to handle the problem this could cause. [2]
d) The SINGLE product 6789 is being discontinued and should be removed from the stock file. Again, a program is
available to do this. Describe the steps this PROGRAM takes. [4]
e) Explain what data would need to be held on file for each product so that a program run could print a list of those
products which need reordering because they are running low. [2]
5. a) Outline the possible effects of a company with inadequate security in its computer system. [4]
b) Discuss possible ways in which a computer system could be vulnerable and suggest ways of eliminating or
minimising EACH. Your answer should consider:
i accidental loss of data
ii hardware problems
iii deliberate acts to create problems by staff or other people [16]
6. Select TWO of the following methods of data capture:
a) MICR
b) OCR
c) OMR
d) Barcode reading
For EACH:
i state a typical application which uses that method
ii describe the format of the data before input
iii describe how the appropriate input device works from the computer point of view
iv explain why it is the MOST appropriate method for that particular application [10 each]
7. a) List FIVE causes of computer hardware failure. For EACH, state a precaution that could be taken to minimise or
eliminate that problem. [10]
b) List FIVE possible causes of data loss other than through hardware failure. For EACH, state a precaution that could
be taken to minimise or eliminate the problem. [10]
8. Read the whole question before starting this one. Select a particular company or organisation that you have studied.
a) State the name of the company and its main functions. [2]
b) Describe ALL the uses of computing in this company. Indicate the type of processing in EACH case. [5]
c) Describe the specific outputs that computers produce in the company and explain who uses these and how they are
used. [5]
d) List the hardware used in the main applications of the company including the number and types of computers
used. [5]
e) Describe the input data needed to produce the results. [3]