COMPUTER STUDIES PAPER 2

learnedmooseupvalleyΗλεκτρονική - Συσκευές

7 Νοε 2013 (πριν από 3 χρόνια και 11 μήνες)

100 εμφανίσεις


香港考試局 保留版權

Hong Kong Examinations Authority
All Rights Reserved 2002


2002-CE-COMP STUD 2–1
HONG KONG EXAMINATIONS AUTHORITY
HONG KONG CERTIFICATE OF EDUCATION EXAMINATION 2002


COMPUTER STUDIES PAPER 2



11.15 am – 12.15 pm (1 hour)



1. Read carefully the instructions on the Answer Sheet and insert the information
required (including the Subject Code) in the spaces provided.

2. When told to open this book, you should check that all the questions are there.
Look for the words ‘END OF PAPER’ after the last question.

3. All questions carry equal marks.

4. ANSWER ALL QUESTIONS. You should mark all your answers on the
Answer Sheet.

5. You should mark only ONE answer for each question. If you mark more
than one answer, you will receive NO MARKS for that question.

6. No marks will be deducted for wrong answers.

Subject Code 200
2002-CE
COMP
STUD
PAPER 2
2002-CE-COMP STUD 2–2 −1−

保留版權 All Rights Reserved 2002

There are 50 questions in this paper.

1. Which of the following are commonly used in human-like robots?

(1) artificial intelligence
(2) image recognition
(3) computer programming
(4) speech synthesis

A. (2) and (4) only
B. (1), (2) and (3) only
C. (1), (3) and (4) only
D. (1), (2), (3) and (4)

2. Which of the following is/are (an) example(s) of an electronic funds transfer
system?

(1) an electronic payroll transfer system
(2) an electronic inventory system
(3) an automatic teller machine

A. (1) only
B. (1) and (2) only
C. (2) and (3) only
D. (1) and (3) only

3. Which of the following is NOT a use of computers in the farming industry?

A. retrieving weather information
B. selling products through the Internet
C. replacing all staff on farms
D. monitoring machines on farms

4. In a hospital, ___________ can help doctors diagnose patients’ illnesses.

A. a robot
B. an expert system
C. an electronic funds transfer system
D. a computer assisted instruction system


2002-CE-COMP STUD 2–3 −2−

保留版權 All Rights Reserved 2002

Go on to the next
5. Which of the following are disadvantages of having a computer network in a
school?

(1) Data may be accessed by unauthorised persons.
(2) Computer viruses may spread more easily.
(3) File sharing is possible.
(4) A computer network requires two or more computers.

A. (1) and (2) only
B. (2) and (3) only
C. (3) and (4) only
D. (1) and (4) only

6. In a school, a computer teacher stores educational TV programmes in a
server. Students can choose any of the programmes to watch on the
computers in a multimedia learning centre.

Which of the following best describes the above?

A. teleconferencing
B. electronic mail
C. dialup network
D. video on demand

7. Below is part of a file MEMBER:

name class
student
number
membership
expiry date
Chan Tai Man 1A 15687 14/7/2003
Wong Li Li 2B 35984 15/7/2004
… … … …

If MEMBER is to be updated using a transaction file TRANS, which of the
following fields must be included in TRANS?

A. name
B. class
C. student number
D. membership expiry date

2002-CE-COMP STUD 2–4 −3−

保留版權 All Rights Reserved 2002

8. Which of the following is/are data verification?

(1) checking if the data is mistyped
(2) entering data twice by two different operators
(3) checking if the data is reasonable
(4) printing a hard copy for checking against the original data

A. (3) only
B. (1) and (2) only
C. (1), (2) and (4) only
D. (1), (3) and (4) only

9. Computer file protection and security involve

(1) backing up files
(2) putting backing store that holds files in a safe place
(3) keeping hard copies of files
(4) setting up a password system

A. (1) and (2) only
B. (1), (2) and (4) only
C. (1), (3) and (4) only
D. (2), (3) and (4) only

10. Which of the following can be done to protect against data loss from hard
disk failure?

A. data encryption
B. read-only access control
C. password protection
D. file back-up and file generation

11. Which of the following is a characteristic of a multi-tasking system?

A. It must be a multi-user system.
B. It allows a user to run several programs at the same time.
C. It must be an off-line system.
D. It requires a user’s immediate response.


2002-CE-COMP STUD 2–5 −4−

保留版權 All Rights Reserved 2002

Go on to the next
12. ‘A data processing method whose input and output are interleaved, like a
conversation, allows the user’s input to depend on earlier output from the
same run.’

Which of the following best describes this data processing method?

A. real-time processing
B. on-line non-interactive processing
C. on-line processing
D. interactive processing

13. For a Sports Day, a file is used to store information about participating
students and the events. Which of the following CANNOT be used as the
key field?

A. Hong Kong Identity Card Number
B. student registration number
C. class together with class number
D. student name together with event

14. Consider the following worksheet in a spreadsheet package:


A
B
1
Amount 10000
2
Interest Rate 3%
3

4
Year Interest
5
1 300
6
2 600

Cell B6 stores the product of B1, B2 and A6. If the formula stored in cell
B6 is produced by copying the formula stored in cell B5, what should be the
formula in cell B5?

(A $ sign before any column letters or row numbers represents absolute
addressing. Without the $ sign, relative addressing is used.)

A. B1*B2*A$5
B. B$1*B$2*A5
C. $B1*$B2*A5
D. B1*B2*$A5

2002-CE-COMP STUD 2–6 −5−

保留版權 All Rights Reserved 2002

15. Which of the following are advantages of using electronic spreadsheets over
manual spreadsheets?

(1) Data format can be changed more easily.
(2) Chart can be drawn more easily.
(3) Calculation can be performed faster.

A. (1) and (3) only
B. (1) and (2) only
C. (2) and (3) only
D. (1), (2) and (3)

16. Which of the following are usually required to access the Internet at home?

(1) an Internet Service Provider (ISP) account
(2) an electronic mail account
(3) a modem
(4) a search engine

A. (1) and (3) only
B. (1) and (4) only
C. (2) and (3) only
D. (2) and (4) only

17. In using a word processor, which of the following may affect the number of
lines in a document?

A. changing the margins of the document
B. changing the line spacing
C. changing the justification of the text
D. underlining the text

18. Which of the following files can be attached to electronic mail?

(1) graphics files
(2) audio files
(3) video files

A. (1) and (2) only
B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

2002-CE-COMP STUD 2–7 −6−

保留版權 All Rights Reserved 2002

Go on to the next
19. Which of the following can be used in data communication?

(1) twisted-pair wires
(2) optical fibres
(3) microwaves

A. (1) and (2) only
B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

20. Which of the following software is commonly used to retrieve information
on the Internet?

A. a browser
B. a word processing package
C. a spreadsheet package
D. a graphics package

21. Mary has produced the following picture using a graphics package.










Which of the following drawing tool functions is the LEAST useful in
producing the picture?

A. fill colour
B. copy and paste
C. flip
D. lines

2002-CE-COMP STUD 2–8 −7−

保留版權 All Rights Reserved 2002

22. P, Q, R and S are working in a company. Q, R and S want to know what is
in P’s electronic mail account. One day, they did the following:

(1) Q stole P’s electronic mail account password.
(2) R logged into P’s electronic mail account.
(3) S read the mail in P’s electronic mail account.

Who has/have probably committed a computer crime?

A. Q only
B. Q and S only
C. Q and R only
D. Q, R and S

23. Peter is a _________ in an office. He provides first-hand support to staff
for problems in operating computers.

A. computer technician
B. programmer
C. system analyst
D. network manager

24. Which of the following statements is INCORRECT?

A. Random access memory (RAM) is volatile and so we need backing
store to hold data permanently.
B. Main memory is more costly than backing store.
C. Read only memory (ROM) has to hold user programs so that the
programs can be executed faster.
D. Random access memory (RAM) can hold user programs so that the
programs can be executed faster.

25. Which of the following devices is used to read data on a credit card?

A. a magnetic ink character reader
B. a magnetic strip card reader
C. a bar code reader
D. an image scanner


2002-CE-COMP STUD 2–9 −8−

保留版權 All Rights Reserved 2002

Go on to the next
26. Which of the following is the correct order of categories of computers from
the highest computing power to the lowest?

A. Supercomputer, Mainframe computer, Palm computer, Microcomputer
B. Microcomputer, Minicomputer, Mainframe computer, Supercomputer
C. Supercomputer, Mainframe computer, Microcomputer, Palm computer
D. Mainframe computer, Microcomputer, Palm computer, Minicomputer

27. The main function of a Control Unit is to _____________________.

A. perform arithmetic operations
B. send out control signals
C. perform logic operations
D. store data

28. Mr. Cheung has found a good passage in a textbook. He wants to make a
copy for reference using a computer. He needs a __________ and a
printer.

A. scanner
B. bar code reader
C. touch screen
D. graph plotter

29. David is unable to delete a file in a directory on a hard disk. Which of the
following is a possible reason?

A. The file is in use.
B. The hard disk is full.
C. There is another copy of the file in another directory.
D. The file size is very small.

30. Why are two bytes used to represent a Chinese character?

A. Most Chinese characters are composed of two parts.
B. The display size of a Chinese character on screen is usually twice that
of an alphanumeric character.
C. Two bytes have sufficient combinations to represent all Chinese
characters.
D. Some Chinese applications software is designed for 16-bit computers.

2002-CE-COMP STUD 2–10 −9−

保留版權 All Rights Reserved 2002

31. In a certain computer system, each integer is stored in 6 bits using
sign-and-magnitude representation. The range of the integers that can be
stored is from __________________.

A. -6 to 6
B. -31 to 31
C. -32 to 31
D. -32 to 32

32. Which of the following can be executed directly by the CPU of a computer?

A. a Pascal program
B. a BASIC program
C. a machine code program
D. an assembly language program

33. Which of the following about a compiler and an assembler is correct?

A. They both take equal time to translate a program.
B. They both translate high level language programs into machine code
programs.
C. They both generate a machine code program at the end of translation.
D. They both translate one instruction at a time as the program is executed.

34. The following diagram shows a computer operation.








Register X represents ___________.

A. ACC
B. IR
C. MAR
D. MDR

CPU
PC
Memory Unit
X

2002-CE-COMP STUD 2–11 −10−

保留版權 All Rights Reserved 2002

Go on to the next
35. Which of the following is a reason for using mnemonics to represent
machine instructions?

A. Programmers can understand the program more easily.
B. The program runs faster.
C. There are fewer instructions in the program.
D. The program can be executed directly by the computer.

36. Which of the following about an operating system is INCORRECT?

A. It is responsible for resource allocation of a computer system.
B. It is an interface between a computer and its user.
C. It can handle errors.
D. A word processing package is an example of an operating system.

37. In a simple model computer, each instruction consists of a 3-bit operation
code and a 5-bit operand. What is the maximum possible number of
operation codes in the computer?


operation code operand




A. 3
B. 5
C. 8
D. 32


2002-CE-COMP STUD 2–12 −11−

保留版權 All Rights Reserved 2002

38. Below is an algorithm to swap the values stored in the variables A and B.

Step 1: assign the value of (A + B) to A
Step 2: assign the value of (A – B) to B
Step 3: assign the value of (A – B) to A

Which of the following is a limitation of the above algorithm?

A. The values stored in variables A and B must not be zero.
B. The values stored in variables A and B must not be of the string data
type.
C. A must be larger than B.
D. B must be larger than A.

39. Which of the following is NOT an advantage of using the modular approach
in writing a large program?

A. It allows a team of programmers to work together in writing the
program.
B. Modules can be reused in other programs.
C. It is easier to modify and debug the program.
D. There are fewer lines in the program.

40. Which of the following about program documentation is INCORRECT?

A. It aims to make the program easier to understand.
B. It helps programmers modify the program in order to meet users’
changing requirements.
C. It is completed before program coding.
D. It involves meaningful identifier names and descriptive comments.

2002-CE-COMP STUD 2–13 −12−

保留版權 All Rights Reserved 2002

Go on to the next
For questions 41-50, find the output of the given program.

41. program p41;
var x, y, z : integer;
begin
x := round(abs(-10.5));
y := 11 mod 4;
z := x div 6 * y;
writeln(z)
end.

A. -2
B. 1
C. 2
D. 3

42. program p42;
var N, X : integer;
infile : text;
begin
assign(infile, 'sample.txt');
reset(infile);
N := 0;
while NOT eof(infile) do
begin
N := N + 1;
read(infile, X)
end;
close(infile);
writeln(N)
end.

The content of the file 'sample.txt' is as follows:

7 2 6 12 33 100 255 17<eof>

<eof> represents the end-of-file character.

A. 7
B. 8
C. 9
D. 17

2002-CE-COMP STUD 2–14 −13−

保留版權 All Rights Reserved 2002

43. program p43;
var st1, st2 : string;
i : integer;
begin
st1 := 'PQRST';
st2 := '123';
st1 := copy(st1+st2, length(st1), length(st2));
writeln(st1)
end.

A. ST123
B. RST12
C. T12
D. 123

44. program p44;
var sum, k, m : integer;
begin
sum := 0;
for k := 4 downto 1 do
for m := 1 to 5-k do
sum := sum + 1;
writeln(sum)
end.

A. 5
B. 10
C. 15
D. 20













2002-CE-COMP STUD 2–15 −14−

保留版權 All Rights Reserved 2002

Go on to the next
45. program p45;
var x, y, z : integer;
begin
x := 1;
y := 2;
z := 3;
if (x >= y) or (y <= z) then
begin
x := y + z;
y := x + y
end
else
begin
x := y – z;
y := x – y
end;
writeln(x, y:4)
end.

A. 1 2
B. 5 7
C. -1 -3
D. 5 3

46. program p46;
var i, j, target : integer;
N : array [1..10] of integer;
begin
N[1] := 1;
for i := 2 to 10 do
N[i] := N[i-1] + 5;
j := 0;
target := 20;
repeat
j := j + 1
until target <= N[j];
writeln(j)
end.

A. 4
B. 5
C. 6
D. 7

2002-CE-COMP STUD 2–16 −15−

保留版權 All Rights Reserved 2002

47. program p47;
var col : char;
row : integer;
x : array['A'..'D', 1..5] of integer;
begin
for col := 'A' to 'D' do
for row := 1 to 5 do
begin
x[col, row] := row;
case col of
'B' : x[col, row] := x[col, row] * 2;
'C' : x[col, row] := x[col, row] * 3;
'D' : x[col, row] := x[col, row] * 4
end
end;
writeln(x['A', 1], x['B', 2]:3, x['C', 3]:3,
x['D', 4]:3)
end.

A. 1 2 3 4
B. 2 4 6 8
C. 3 6 9 12
D. 1 4 9 16











2002-CE-COMP STUD 2–17 −16−

保留版權 All Rights Reserved 2002

Go on to the next
48. program p48;
var i : integer;

procedure S(p : integer);
begin
p := 1;
write(p)
end;

begin
i := 2;
write(i);
S(i);
writeln(i)
end.

A. 211
B. 212
C. 221
D. 222

49. program p49;
var x, y : integer;
begin
x := 2;
y := 5;
if x < 1 then
if y > 4 then
x := x – y
else
x := x – 3
else
if y > 4 then
x := x * 4
else
x := x + 2;
writeln(x)
end.

A. -3
B. 2
C. 8
D. 4

2002-CE-COMP STUD 2–18 −17−

保留版權 All Rights Reserved 2002

50. program p50;
var x, y : integer;
flag : boolean;
begin
x := 7;
y := 1;
flag := TRUE;
while (x > 0) AND FLAG do
begin
x := x – 2;
y := y + 1;
FLAG := x > y
end;
writeln(x:2, y:2)
end.

A. 3 3
B. 1 4
C. 0 5
D. -1 5






END OF PAPER




2002-CE-COMP STUD 2–19 −18−

保留版權 All Rights Reserved 2002



A Partial Character List for ASCII
Character ASCII
Character
ASCII
Character ASCII
0
48
J
74
d
100
1
49
K
75
e
101
2
50
L
76
f
102
3
51
M
77
g
103
4
52
N
78
h
104
5
53
O
79
i
105
6
54
P
80
j
106
7
55
Q
81
k
107
8
56
R
82
l
108
9
57
S
83
m
109
:
58
T
84
n
110
;
59
U
85
o
111
<
60
V
86
p
112
=
61
W
87
q
113
>
62
X
88
r
114
?
63
Y
89
s
115
@
64
Z
90
t
116
A
65
[
91
u
117
B
66
\
92
v
118
C
67
]
93
w
119
D
68
^
94
x
120
E
69
_
95
y
121
F
70
`
96
z
122
G
71
a
97
{
123
H
72
b
98
|
124
I
73
c
99
}
125

List of Operators and Reserved Words
+, -, *, /, div, mod, >, <, =, >=, <=, <>, and, or, not, sqrt, trunc, round, random, abs,
+(string concatenation), length, ord, chr, val, str, copy, const, procedure, var, integer, real,
char, string, boolean, true, false, text, array...of, program, input, output, begin...end, :=,
for...to/downto...do, (*...*), if...then...else, while...do, repeat...until, case...of...end, write,
writeln, read, readln, assign, reset, rewrite, eof, close





2002-CE-COMP STUD 2–20 −19−

保留版權 All Rights Reserved 2002


Appendix
List of Commands in Mnemonics

Op-code
Operand Meaning
INP XXX
input data to address XXX
OUT XXX
output the contents of address XXX
STA XXX
store the contents of accumulator to address XXX
LDA XXX
load accumulator with the contents of address XXX
JMP XXX
jump to address XXX
JPN XXX
branch to address XXX if the contents of accumulator
are negative
JPZ XXX
branch to address XXX if the contents of accumulator
are zero
INC XXX
increase the contents of address XXX by 1
DEC XXX
decrease the contents of address XXX by 1
ADD XXX
add to accumulator the contents of address XXX and
store the result in accumulator
SUB XXX
subtract from accumulator the contents of address
XXX and store the result in accumulator
STP -
stop






2002-CE-COMP STUD 2–21 −20−

保留版權 All Rights Reserved 2002


2002 HKCE Computer Studies (Paper 2)


Question No. Key Question No.Key

1. D (69) 26. C (83)
2. D (64) 27. B (78)
3. C (68) 28. A (98)
4. B (67) 29. A (82)
5. A (85) 30. C (58)

6. D (76) 31. B (46)
7. C (79) 31. C (83)
8. C (41) 33. C (59)
9. B (64) 34. C (58)
10. D (84) 35. A (71)

11. B (86) 36. D (60)
12. D (66) 37. C (64)
13. D (77) 38. B (72)
14. B (43) 39. D (53)
15. D (79) 40. C (60)

16. A (85) 41. D (77)
17. A (51) 42. B (61)
18. D (85) 43. C (71)
19. D (75) 44. B (69)
20. A (90) 45. B (65)

21. C (70) 46. B (61)
22. D (77) 47. D (67)
23. A (73) 48. B (64)
24. C (62) 49. C (81)
25. B (88) 50. A (66)




Note: Figures in brackets indicate the percentages of candidates choosing
the correct answers.