apr02certtreport
apr02certtreport
Certificate
April 2002
EXAMINERS’ REPORT
Technology
General Comments
The general comments made on previous occasions are worth repeating one again;
that is:
For questions that required some amount of computation, for example, binary
arithmetic, there were many instances where an answer was provided without showing
any working - it is important that the examiner can see the method used. There were
also cases where an obviously wrong method was used but the correct answer
mysteriously appeared. Full marks are only gained where a correct method is shown.
Section A - Comments
The answers to all the questions in Section A had a remarkable similarity in terms of
both the mark profile and popularity. Apart from examination technique, there were no
consistent mistakes or omissions.
Question 1
Answer Pointers:
W:\New Site\content\VERSION3\exam\examiner\apr02\certtech.DOC
1 (of 8)
The term megahertz is commonly used to express microprocessor clock speed in
cycles per second. 1 MHz is equivalent to 1,000,000 cycles per second. Typically, one
computer process (e.g. memory access, arithmetic) is carried out in a single cycle.
A bus is the data path on the computer’s motherboard that interconnects the
microprocessor with the other devices (e.g. memory, disks, I/O). A 64-bit Bus implies
there are 64 parallel data paths.
Cache memory is random access memory that a microprocessor can access more
quickly than regular RAM. The microprocessor looks first in the cache memory and if
the data is found there (from a previous reading of data), it does not have to access the
main RAM, which takes longer. Cache memory is sometimes described in levels of
closeness and accessibility to the microprocessor. An L1 cache is on the same chip as
the microprocessor. L2 is usually a separate static RAM chip.
Superscalar describes a microprocessor design that makes it possible for more than
one instruction at a time to be executed during a clock cycle. In a superscalar design,
the processor is able to determine whether an instruction can be carried out
independently of other sequential instructions, then uses multiple execution units to
simultaneously carry out two or more independent instructions at a time.
b) The following uses an ADD instruction with a memory access (ADD memory
contents to the ALU) to illustrate the answer.
Fetch:
MAR <== PC;
MBR <== M[MAR]; PC <== PC+1;
IR <== MBR;
Decode/Execute:
CU <== IR
PC <== Addr[CU]; The address part of the instruction is transferred to the PC
MAR<== PC;
MBR <== M[MAR];
ALU <== ALU+MBR;
W:\New Site\content\VERSION3\exam\examiner\apr02\certtech.DOC
2 (of 8)
Question 2
b) Describe the main stages of the compilation process, showing the purpose of
each stage.
(20 marks)
Answer Pointers:
Syntactic Analysis: the compiler then parses (or analyses) all of the language
statements syntactically one after the other to check it complies with the language
definition;
Code generation: builds the output code, making sure that statements that refer to other
statements are referred to correctly in the final code. The output of the compilation is
called object code. The object code is machine code that the processor can process or
"execute" one instruction at a time.
Linking/Consolidation: When more than one object module (or library routine) is to be
run, linking/consolidation is carried out to resolve the relative location of instructions and
data which are cross-referenced. This produces the executable program.
Question 3
Some of the problems associated with managing a computer network are related
to the security of data and equipment. Describe the potential security problems
with networking and identify possible solutions to these problems.
(30 marks)
Answer Pointers:
Viruses - a piece of program usually disguised as something else that causes some
unexpected and usually undesirable event. A virus is often designed so that it is
automatically spread to other computer users. Viruses can, for example, be transmitted
as attachments to an e-mail, as downloads, or be present on a diskette or CD.
W:\New Site\content\VERSION3\exam\examiner\apr02\certtech.DOC
3 (of 8)
Hacking - breaking into computer systems usually by experienced programmers or
engineers with sufficient technical knowledge to understand the weak points in a
security system.
Spoofing - to deceive for the purpose of gaining access to someone else's resources
(for example, to fake an Internet address so that one looks like a certain kind of Internet
user).
also - Spam/Piracy/Counterfeiting
Solutions can include: Good security policies, including acceptable use policy (AUP).
Intrusion detection systems; Firewalls - security systems designed to prevent
unauthorised access to or from a private network.
Question 4
b) The Internet has grown to an extent that it is now difficult to control the
activities taking place. Discuss ways you think illegal and unethical activities
can be curbed on the Internet.
(15 marks)
Answer Pointers:
a) This was an open ended question allowing the candidate to demonstrate their
broad understanding and appreciation of computing. One approach to answering the
question was as follows:-
b) As with part a), this section allowed the candidate to express their views and
thoughts. Some areas that could have been mentioned include the following:-
Strong powers to the police to seize and have access to records of cyber crimes like
hacking, pornography, racial incitement;
W:\New Site\content\VERSION3\exam\examiner\apr02\certtech.DOC
4 (of 8)
Proposals that email and other communications should be able to be intercepted by
appropriate government authorities.
Internet service providers and other carriers to provide a mechanism through which
government agencies could look at suspect communications.
International agreements on the jurisdiction that nation states have for activities that
happen over the Internet.
Section B - Comments
Question 5
This was not a popular question and those that attempted the question generally gained
poor marks. There appeared to be a basic lack of knowledge on the subject.
Answer Pointers:
a) Bandwidth is used to mean how fast data flows on a given transmission path,
expressed in bits per second.
Question 6
Most candidates had a reasonable understanding of the topic and addressed the issues
asked.
Answer Pointers:
b) Op-code the type of instruction to be carried out; Operand the "data" the
instruction operates with.
W:\New Site\content\VERSION3\exam\examiner\apr02\certtech.DOC
5 (of 8)
Question 7
a) State what RAM and ROM stand for, and describe the characteristics of each.
What is each used for in a computer system?
(8 marks)
A purely factual question and the most popular question on the paper as well as being
the best answered question.
Answer Pointers:
a) RAM (random access memory) is the place in a computer where the OS,
application programs, and data in current use is kept so that they can be quickly
reached by the processor. Volatile. ROM is computer memory containing data that
normally can only be read, not written to. ROM contains the programs that allows a
computer to be "booted up". Non-volatile.
b) A modem modulates outgoing digital signals from a computer (or other digital
devices) to analogue signals that are transmitted along telephone lines and
demodulates the incoming analogue signal and converts it to a digital signal for the
computer (or other digital device).
Question 8
Answer Pointers:
Bus: advantages - low cost, easy expansion; disadvantages - low speed, limited size
Ring: advantages - fast, low cost; disadvantages - if any node breaks the whole network
is down (unless FDDI).
Question 9
W:\New Site\content\VERSION3\exam\examiner\apr02\certtech.DOC
6 (of 8)
This question was surprisingly poorly answered. Part b) was very straightforward but
remarkably few candidates checked their answer by quickly converting their answer
back to a base 10 number.
Answer Pointers:
Fixed point: binary number with a fixed radix point (fractional part); Floating point
number does not have a fixed radix and is stored in three parts: sign (plus or minus),
mantissa which are the digits that are meaningful, and exponent or order of magnitude
of the mantissa, which determines the place to which the radix point floats.
Question 10
a) Write a Boolean expression for the exclusive-OR (XOR) operation. Show how
it can be implemented with AND, OR and NOT gates.
(6 marks)
Note: The XOR operation is true if either input is true but not both.
Two very simple answers were required. Candidates appeared to either know how to
tackle this type of question or did not really know how to approach the topic.
Answer Pointers:
a) AB' + A'B
b) AB + BC +AC
Question 11
Data transfer to and from peripherals may be handled in one of three modes:
Programmed I/O, Interrupt-driven I/O and Direct Memory Access (DMA). Describe
the characteristics of each transfer mode.
(12 marks)
Most candidates knew one or sometimes two approaches but few knew all three.
Answer Pointers:
Programmed I/O - data is exchanged between CPU and I/O; No other activity is
possible during data exchange; CPU has to sense I/O device status.
Interrupt-driven I/O - CPU issues I/O command and continues to execute other
instruction; is interrupted by I/O device when it is ready.
W:\New Site\content\VERSION3\exam\examiner\apr02\certtech.DOC
7 (of 8)
DMA - I/O and main memory exchange data without CPU involvement. Extra hardware
(DMA controller) is required.
Question 12
The least popular question on the paper by a long way and the weakest answered
question. Candidates clearly had little knowledge of virtual memory.
Answer Pointers:
W:\New Site\content\VERSION3\exam\examiner\apr02\certtech.DOC
8 (of 8)