Computer Studies Support Booklets
Computer Studies Support Booklets
These five booklets cover the CIE computer studies syllabus theory (0420/1,
7010/1). They should be used in conjunction with the appropriate syllabus
topic.
Whilst there are several examples on each topic, it is not envisaged that
students would use these booklets as their sole source of information. These
booklets don’t replace good teaching and should be used as an additional
resource together with text books and web-based knowledge systems.
Since computer studies, by its very nature, is a rapidly changing subject these
booklets will be reviewed on a regular basis to ensure they contain the latest
technological advances. Teachers of the subject are encouraged to keep
abreast of the latest developments in computing and apply their new
knowledge in the teaching of this subject. Students should find computer
studies both exciting and stimulating and it is hoped that these booklets will
help students in their thirst for knowledge and encourage further learning.
Booklet 1
This covers the following topics found in section 1 of the computer studies
syllabus:
Item Topic
1 Computer aided design
2 Virtual reality systems
3 Monitoring and control
4 Embedded web technology
5 Robotics
6 Global positioning satellite (GPS) systems
7 Expert systems
8 The internet
9 Simulations
10 Training and entertainment systems
11 Computer based training
12 Communications (including video conferencing)
13 Intranets
14 Further applications
15 Problems based on section 1 topics
Booklet 2
This covers the following topics found in section 2 of the computer studies
syllabus:
Item Topic
1 Feasibility study
2 Analysis
3 Design
4 Implementation
5 System maintenance and evaluation
6 Project tools
7 Systems flowcharts
8 Problems based on section 2 topics
Booklet 3
This covers the following topics found in section 3 of the computer studies
syllabus:
Item Topic
1 Common flowchart symbols
2 Writing flowcharts to solve problems
3 Dry running of flowcharts
4 Problems based on flowcharting
5 Pseudocode
6 Writing algorithms using pseudocode
7 Problems based on pseudocode
8 Introduction to logic
9 Description of common logic gates
10 Combinations of logic gates
11 Problems based on logic
Booklet 4
This covers the following topics found in section 4 of the computer studies
syllabus:
Item Topic
1 Automatic data capture
2 Validation techniques
3 Check digits
4 Verification techniques
5 Files
6 Binary data
7 Word processors
8 Desk top publishing (DTP)
9 Spreadsheets
10 Databases (DBMS)
11 Authoring software
12 “Off the shelf”/bespoke software
13 Macros
14 Problems based on section 4 topics
Booklet 5
This covers the following topics found in section 5 of the computer studies
syllabus:
Item Topic
1 Hardware
2 Computer memories
3 External storage systems
4 Credit cards and smart cards
5 Sensors
6 Operating systems
7 Batch processing
8 Real time systems
9 Network topology
10 Multimedia applications
11 Problems based on section 5 topics
Booklet 1
This covers the following topics found in section 1 of the computer studies
syllabus:
Item Topic Page numbers
1 Computer aided design 2
2 Virtual reality systems 3
3 Monitoring and control 5
4 Embedded web technology 6
5 Robotics 6
6 Global positioning satellite (GPS) systems 7
7 Expert systems 9
8 The internet 11
9 Simulations 14
10 Training and entertainment systems 17
11 Computer based training 18
12 Communications (including video conferencing) 19
13 Intranets 21
14 Further applications 21
15 Problems based on section 1 topics 23
1
CAD is used in the design and development of new products in a variety of
applications both at home and on a commercial/industrial basis. Examples of
typical
CAD applications include:
- aerospace
- architecture
- car/vehicle design
- construction (e.g. roads, services, surveying, tunnels, bridges, etc.)
-This consumer
booklet goods (e.ga kettles,
contains numbertoasters, etc.) of computer applications and ties in
of examples
-withdigital circuits
-section
factory
1 oflayouts1.1 Computer-Aided
(e.g.
the computer ergonomics) Design (CAD)
studies syllabus.
- fashion design
- garden/landscape gardening
- heating systems
- interior designs (houses, offices, etc.)
- lighting systems (e.g. to get lighting effects at a concert)
- machinery design
- plant design (chemical, nuclear, etc.)
- ship building
- large screens
- light pens
- devices such as trackerballs, mouse and graphics tablets
- plotters to draw scale and full size drawings
- high specification graphics cards
- spacemouse/spaceball
- some systems support stereoscopic drawings where 3D spectacles can be worn
and the user sees a 3D image
- wire frame
- 2D and 3D modelling
- library of parts which can be used in new drawings
- validation and verification of designs against original specification
- ability to link with computer-aided manufacture (CAM)
- facility to calculate the mass of the actual object once built
- facility to calculate the cost of producing the article
2
There are many advantages and disadvantages of using CAD rather than
manually
producing drawings using pen and paper:
Developments
This is an artificial 3D environment created by
1.2 Virtual Reality a computer system. Very often the
(VR)
user wears data goggles, data helmet or data gloves to give a feeling of “being
there”. Apart from feeding sensory input to the user, these devices also monitor user
CAD packages can now be linked to 3D ink jet printers which produce
actions e.g. data goggles track eye movement and respond by sending new video
input.
an actual
prototype model by building up slices/layers in fine powder (e.g. resin)
As indicated above, a number of devices are used to interface with virtual reality
systems. These can be summarised below:
which are
Data goggles/helmets – these use display screens and optical systems that send 3D
bonded
images to thebyeyes. an
Motionadhesive
sensors measurefrom theandprint
the position head.
orientation of the The models produced
head; this information is sent back to a computer which enables it to adjust the image
actually
being sent to work.
the user. Data gloves, suits containing sensors and joysticks are all
used to interface with a virtual reality system depending on the application.
This saves
The CAVE time
is a VR systemand
which money
provides the since
illusion ofan
3D actual prototype
by projecting images on doesn’t need to be
the walls and floor of a room. Participants wearing data goggles can enter the room
made.
and freely walk about. Sensors in the goggles and in the room continually track the
participants’ position and adjust the images based on this information.
(
3 projectors )
Areas of use
Entertainment Used in films/television as special effects (e.g. the “holodeck”
in Star Trek: The Next Generation and the Brazilian tv show
Conquista da Titã where the studio audience wear VR helmets
in a space simulation). Virtual reality is also used in many
computer arcade games.
When a virtual tour of, for example, a house is shown on a website the images need
to be first created and then manipulated. The following summarises how this can be
done (a similar method/technique could be used for various applications):
- it is safer (since techniques can be tried out in advance without the dangers of the
real operation e.g. maintaining a nuclear plant where it is possible to try a task on
a computer first to learn how to do it; if mistakes are made the results would be
harmless; e.g. doing a medical task on a “virtual” patient is much safer in case of
mistakes, etc.)
- cost savings (no need to build the real thing which could save large sums of
money e.g. testing out a real moon buggy or building a part of a chemical plant
would be very expensive).
- it is possible to do tasks which would normally be impossible (e.g. walking inside a
nuclear reactor, doing a task in outer space, etc.)
- there is a feeling of “being there” which makes the training more realistic and can
allow a number of very realistic scenarios to be tested out e.g. how to deal with an
emergency on a chemical plant which could be made to be really realistic!! 4
1.3 Monitoring and control
Examples of use
Monitoring hospitals (monitoring patient’s vital signs), chemical and nuclear plants
(monitoring key parameters), burglar alarms (monitoring for intruders),
etc.
How it is done
5
Why is this done?
- the robot is programmed with a series of instructions which enable it to carry out a
Itseries
is possible
of tasks to control any device in this way if it contains an embedded
- alternatively, an operator manually carries out a series of tasks which are relayed
processor
back to the robot; these instructions are remembered so that the robot can carry
e.g.
out the television,
tasks automatically DVD player/recorder, washing machine, scientific
7
satellite 1 Exact location
of vehicle
satellite 2
satellite 3
Morson Road
Dean Street
In airplanes GPS can also pinpoint its exact location in case of an accident which
enables search teams to quickly respond to the incident. 8
What can go wrong?
Explanation system
Working
Store
User
Interface Inference Engine
Knowledge
Base
(Knowledge Base) Editor
The system, once set up, needs to be tested using data with known outcomes to see
if it functions correctly.
If it is being used to diagnose faults, the expert system will output the probable fault
and how to rectify/deal with the problem. Usually a % probability of the accuracy of
the diagnosis will be given so the end user can decide whether or not to accept the
recommendations.
A: No
Q: Is there any make of car you would prefer?
A: No
Q: Do you want 2 doors?
A: No
Q: Do you want high performance?
A: Yes
Q: When you have a big engine, do you need a manual gearbox?
A: Why?
The system uses a rule base and an inference engine together to simulate human
reasoning when analysing a problem and arriving at a conclusion. To simulate
human processes it is necessary to have a vast amount of information stored in the
knowledge base and the reasoning set out as a set of rules in the rule base.
In the above example, the response Why? came up since the user wanted to know
the Expert System’s thought processes. The system would give the possible
response “I am trying to find the make of car you require. Up to now, coupes are not
likely. It is possible that saloon cars are a likely option. I know that you like high
performance which gives me strong evidence that the car should include a manual
gearbox”.
Search Engines
The most effective way of finding information on the internet is to use a search
engine. However, it is just as easy to use these inefficiently as well as efficiently.
Type in: CIE+sample papers and the search engine would return
about 1.2 million hits
Type in: CIE+sample papers+ICT and the search engine would return
about 6,500 hits
Security
When using the Internet, security can be enhanced using encryption. Credit and
debit card transactions can also be protected by a special type of password control.
For example, if a user chooses the password COMPUTE34 to protect their credit
card, when they buy something over the internet the card issuer will ask the user an
additional question such as: “Please type in the 2nd, 4th and 7th character of your
password in the following boxes:
The user will then type in O P E and the card purchase will be authorised. This
additional protection is used as well as encryption.
Some of the new systems use a chip and PIN card which is slotted into the
keyboard
and is used as additional security. The user slots the card into the side of the
keyboard and is required to type in a PIN before the Internet can be accessed.
This
gives an additional level of security since it is necessary to have the card, know
the Positive aspects for society Negative aspects for society
PIN
Shops associated with
and banks are open 24/7the card
Close down AND also know
of shops/banks the user’s log in id and password!!!
in city centres
Access to shops and banks is worldwide Increased risk of fraud/hacking
Less pollution since less travelling Less personal service/more impersonal
How
Disabledsociety
people areisnot
affected
disadvantaged Loss of jobs due to closures of
(no need to travel) shops/banks
Busy people can shop/bank when they Less social interaction between people –
Buying goods
want and where theyand
want services (e.g. banking) over
just sit at home the
using internet has
computer both positive and
negative
If you live inaspects on itsociety.
a remote area, is much TheseLess canactivity
be summarised
for people – leadsbelow:
to a less
easier to access shops/banks healthy/overweight population
Less expensive
In general, (cost savings
increased to shop/ has led to many
use of computers Less of
environmentally friendly
the above affects since more
. Other
bank + more competition –
aspects to consider include: savings are goods sent out by post – waste from
passed on to the customer) packaging significantly increases
- deskilling of the work force (e.g CAD has taken over draftsman skills, word
processors have taken over many office-based duties, etc.)
- the need to re-train the workforce in the use of new software/computers. 12
Computer systems have allowed companies to set up call centres in other
countries
where potential cost savings can be made. This, of course, can lead to job losses
in
the host country. The main advantages to companies adopting call centres
overseas includes:
Note 2: Backing up may allow files that have become lost/corrupted (due
to hacking
or viruses) to be reinstated; however, this would not recover the system
1.9 Simulations
nor would it
To demonstrate
prevent how a simulation
hacking/viruses can abesystem
affecting developed for first
in the use inplace.
a real situation the
following example has been chosen. The scenario chosen is a series of traffic
lights
Note 3: Other problems such as spam, pop ups, cookies, etc. are more of
at two busy junctions:
a nuisance
(although they can considerably slow down the operation of a computer
system) and
can be blocked or made inactive (since they can become active without
the user’s
In this simulation it is necessary to consider:
knowledge) using suitable software.
(1) how and what data is gathered
(2) how the simulation is done
(3) how the system would work in real life
(4) why simulations are done
(5) other examples of simulations
To make this as realistic as possible, data needs to be gathered over a long period of
time. This can be done by sensors in/near the road, using cameras or manual data
collection. Data gathered includes:
- count the number of vehicles passing in all directions at each junction …..
- ….. at a particular time of day
- count how many cars build up at a junction before lights change
- is it a week day or weekend or bank holiday
- how long it takes to clear vehicles at a junction
- other data (e.g. pedestrian crossings)
- time for largest/slowest vehicle to pass through a junction
- other factors (e.g. filtering of traffic to the right or left) 14
(2) How the simulation is done
The data is entered into the computer and the simulation is run. The following
scenarios may be tried out:
- sensors in/near the road gather data (these can be light/infra red sensors,
induction loops, pressure sensors, etc.) – the data is usually number of vehicles
passing a particular point
- the data is sent to a control box or computer system
- the gathered data is compared to data stored in the system (the stored data is
based on simulation runs, how the number of vehicles at a junction at a
particular time of day affects the traffic flow, etc.)
- the control box or computer “decides” what course of action to take and …..
- ….. sends signals to the traffic lights to change timing if necessary
- as with any system involving sensors, ADC and DAC interfaces may be needed
- sensors measure pressure, temperature, relative humidity, wind speed and wind
direction
- sensors are placed in weather balloons and/or weather stations
- information is also got from satellites
- pilots also send in information regarding weather conditions during long flights
There are many other software and hardware developments; the above is just a
summary of the more common elements.
Computer animation is the art of creating moving images via computer hardware and
software.
Avatars
- traineesare
cananother
work atexample
their ownofspeed
animation. These are often used to
represent
- traineespeople
can learn when they want
either in 3-D (as
- it is possible toused in sections
re-run computer ofgames) and in
the training 2-D (asifused
program in internet
necessary
message
- possible to come back at any time/pause training program at any point
boards).
- user getsSome avatarsassessment
immediate are animated consisting of a sequence of images
of performance
played oneto include multi-media elements in the training package
- possible
after
- no the
needother.
to have a teacher/classroom – potential cost savings therefore
possible
Ultimately,
- it is easieranimators
to keep upwant to create a human image which moves and
to date/amend
interacts with
its background in such a away that the viewers 18
can’t tell if a particular
Video Conferencing
- communication links are now much faster therefore images, sound quality etc.
are
now far better
- safety reasons 1.12
(increase in world-wide terrorist activity, frequent travelling, etc.
Communications
are
all risks to company employees if they have to travel to meetings)
- costs (the money saved on not having to travel, accommodation costs, lost time
to the company whilst employees are out of the office travelling to meetings,
etc.)
- improvements to the work/general environment (employees can work from
home,
less travel means less stress to employees but also means less pollution, disabled
employees are no longer disadvantaged, etc.)
- because of the above, it is possible to hold a meeting at short notice
Most areas in the world now offer broadband rather than dial up for
connecting to the
internet. The advantages of broadband over dial up include:
- the system is always “on”/no need to dial into ISP every time you want
access
- the connection rate/data transfer rate is much higher (for example
broadband
operates at 11 000 kbps compared to the dial up rate of 60 kbps)
- there is a flat monthly rate with broadband (dial up is charged per hour
of usage)
- it is possible to use the telephone at the same as the internet with
broadband/the
line isn’t tied up
- broadband permits other facilities such as “skype”/VOIP
22
1.15 Problems
(1) (a) Give three features you would expect to see in a typical Computer
Aided Design (CAD) package.
(b) A company uses CAD to design a child’s toy. Give two advantages of
using CAD in this application.
(b) A hotel decides to offer a virtual tour of its facilities on a web site.
(i) Describe how images are created and processed for use in the
virtual tour.
(ii) What features would you expect to see on the virtual tour web
site?
(3) (a) A large house with eight bed rooms is to be protected by an intruder
surveillance system (burglar alarm).
(a) Describe two problems the robot might encounter and how these
could be overcome.
(b) In general, what are the advantages of using robots rather than human
workers in manufacturing industries?
23
(5) A bus has been fitted with a Global Positioning Satellite (GPS) navigation
system (sat nav).
(a) Describe how the sat nav computer calculates the exact location of the
bus.
(b) How does the sat nav system indicate to the bus driver the correct
route that needs to be taken to reach the required destination?
(c) What are the advantages to the bus driver of having GPS installed?
(a) Describe how the expert system would be set up and made ready for
use.
(b) Explain the function of the Explanation System which forms part of the
expert system.
(7) (a) Describe four security issues associated with linking a computer to the
internet. How is it possible to guard against each of these security
issues?
(8) A supermarket has decided to model queues at the check outs using
simulation software.
(9) Describe how computer hardware and software are used to create animation
effects in films and television programmes.
(b) Give the main reasons why video conferencing has become
increasingly popular.
24
1(a) The features found in a typical CAD package include:
- hot spots on web page to allow user to move around the hotel
- plans and maps integrated to allow user to navigate the hotel
- ability to move from room to room to navigate whole hotel
2
5(a) How satellite navigation systems can be used to calculate a vehicle’s
position
(b) How the bus driver uses the satellite navigation system:
- if a user can’t answer one of the Expert system questions, the Explanation
System will come up with a response to try and explain its “thought process”
- training
- running/testing chemical and nuclear plants 4
10(a) Video conferencing:
5
Booklet 2
This covers the following topics found in section 2 of the computer studies
syllabus:
1
Systems Analysis
Many of the topics are covered elsewhere (such as how to choose hardware,
2.1 Feasibility Study
validation techniques, testing, etc.).
This involves writing a report to convince management of the merits of adopting
the
proposed new system. Some
• Terms aspects
of reference: of the study include:
- objectives
- boundaries
- constraints
• Description of the existing system (including any problems and the projected
costs)
If the feasibility study is accepted then the systems analyst moves to the
next stage
which is a full analysis of the system.
2.2 Analysis
The analysis involves some or all of the following stages:
• Fact finding – this is usually done in four ways (see page 2)
This involves watching the personnel using the existing system to find out
exactly how it works. There are a number of advantages and disadvantages
Questionnaires
of using this method to gather information about the existing system:
This involves sending out questionnaires
- it is possible to to
seethe work
exactly force
what and/or
is being done to
customers to find out-their
this isviews of the existing
an inexpensive system and
method compared to find out how
to other
Advantages - the analyst
some of the key taskstechniques
obtains reliable data
are carried out. As with observation, there are a
number of advantages and disadvantages in using this technique:
Disadvantages - people are generally uncomfortable being watched and
may work
Advantages in a different
- questions beway
canthey
- what answered quickly
are watching may not be representative of
- an inexpensive way of gathering data afrom a day’s
typical largework
number
- if workers perform tasks that violate standard procedures,
of people
they may not do this when being watched!!
- allows individuals to remain anonymous
- it is quick to analyse data
Interviewing
This involves a one to one question and answer session between the analyst
and employee/customer. A good method if the analyst wants to probe deeply
into one specific aspect of the existing system. As with the previous method,
there are a number of advantages and disadvantages:
3
Disadvantages - can be a very time consuming exercise
- can be expensive to carry out
- unable to remain anonymous
Looking at existing paperwork
This allows the analyst to see how paper files are kept, look at operating
instructions and training manuals, check accounts, etc. This will give
the
analyst some idea of the scale of the problem, memory size
requirements, 2.3 Design
type of
Once theinput/output devices
analysis has taken needed,
place and theand so on.
systems Theyhaswill
analyst someoften
ideagain
of the
information not obtained by any of the other methods described above.
scale of the problem and what needs to be done, the next stage is to design the
However, it can be a very time consuming exercise.
key
parts of the recommended system. The following is a list of tasks that are usually
• design the data capture forms/input forms
done (this is by no means an exhaustive list):
• design the screen layouts
4
- how to load/run 2.4the software
Implementation
- howthe
Once to “final”
save files
system has been designed it is then necessary to put together the
- how to do a search
hardware and software and introduce the new system. There are many stages in
- how to sort data
this
- how to do
complicated
• produce print outs there are two basic types here to consider:
theprocess:
documentation;
- how to add, delete or amend records
- the purpose ofUser thedocumentation
system/program/software package
- screen layoutsthis (input)
usually consists of:
- print layouts (output)
- hardware requirements
- software requirements
- sample runs (with results and actual test data used)
- error handling/meaning of errors
- troubleshooting guide/help lines/FAQs
- how to log in/log out
Technical documentation
- program listing/coding
- programming language(s) used
- flowchart/algorithm
- purpose of the system/program/software
- input formats
- hardware requirements
- software requirements
- minimum memory requirements
- known “bugs” in the system
- list of variables used (and their meaning/description)
- file structures
-it issample runs (with results and actual test data used)
necessary to develop a proper testing strategy to ensure all possible
-scenarios
outputareformats
covered and that
• install theallhardware
error trapping
and, iftechniques
necessary, are
the fully tested;
new software
-include:
forvalidation
example if rules
inputting data to represent somebody’s age, the test plan
0, 5, -2, fred, 3.5, 215, 85 etc. to see whether each piece of data is
may
• fully test the new system once installed
correctly dealt with; test data often falls into 3 types: 5
normal data
abnormal/erroneous data
extreme/boundary data
change over is usually• done in staff
train the one toofuse
four
the ways; the following
new computer system notes
- this is data at the limits of acceptability/validity
summarise these methods and gives advantages and disadvantages of all(for
the example, if a
techniques:
date is
• transfer the paper files across to the new system; this may involve the
following:
being
direct input, the
changeover two values at the extreme limits of valid days would be
1- scanning in the documents
-with
andkeying
this in the data
31)technique, the old system is stopped and the new system is used
-straight
createaway;
databases etc. to allow downloading of files etc.
• changeover to the new system
- this method can be disastrous if the new system fails at any point
- however, the benefits are immediate and less time is wasted
- costs are reduced (only one system in use so save on staff costs)
- less likelihood of a malfunction since the new system will have been fully
tested
parallel
with this technique, the old and new systems are run together for a time
- if the new system goes down for any reason, you still have the old system
to fall back on so a failure wouldn’t be disastrous
- it is possible to gradually train staff/time to get used to the new system
- more expensive than direct since need extra staff to run both systems
- more time consuming since both systems need to be run and evaluated
6
pilot
with this technique, the new system is introduced into one part of the
company (e.g. into one warehouse of a supermarket) and its performance
assessed
- if the new system fails only one part is affected; the rest is still functional
- it is possible to fully train staff in one area only which is much quicker and
less costly than parallel
- the costs are also less than parallel since only one system is being used in
the pilot warehouse
phased
in this technique only part of the new system is introduced and only when it
proves to work satisfactorily is the next part introduced, and so on, until the
old system is fully replaced
- if the latest part fails, only need to go back in the system to the point of
failure; hence a failure isn’t disastrous
- more expansive than direct since it is necessary to evaluate each phase
before moving to the next stage
- can ensure the system works properly before expanding
Systems analyst have a number of tools to help them in carrying out their work.
Since many of their projects are for big companies it is necessary to keep track of
costs, resources and time. The following are only mentioned as a basic
introduction and a guideline for further study:
System flowcharts are used to show how all the components in a system link
together (e.g. input, storage, output, processing, etc.). They are very different to
normal flowcharts since they don’t go into detail of how something is actually done –
they are a general overview. The table below shows the most common system flow
chart symbols:
Online storage
Connector Magnetic Tape
(a on
(files stored linkhard
to or discs,
from another
part of diagram)
etc)
Terminator
Visual Display Unit
(Start and end of the flow
Data processing
(Monitor) diagram) operation
Merge
Document output (e.g. join two files
Manual input
(printed hard copy) together)
(e.g. keyboard)
Connector, off-page.
Hard disk (file)
(link from this diagram to Input/Output operation
another diagram)
9
START
Write sorted
data to member Member
file file
STOP
10
2.7 Problems
(1) (a) A systems analyst was brought in to computerise a paper-based car
sales system. What methods could be used to gather data about the
existing system? Give reasons for your choice.
(b) What would need to be done before the new computerised system
became “live”?
(c) Why would PILOT and PARALLEL change over methods be suitable
in this application?
(2) A program is written to input daily temperatures. Name three types of test
data that could be used. Give examples of each type of test data which could
be used and discuss the outputs you would expect to get.
(3) Name five tasks that would be carried out at the DESIGN stage in systems
analysis.
(4) Name four methods used to change over from a manual system to a new
computerised system. Discuss the relative advantages and disadvantages of
these four methods.
(5) Describe how the effectiveness of a new computer system can be assessed.
(6) What tools exist to help the analyst draw up an action plan and ensure that
the project is completed on time and to budget?
(7) What information would a systems analyst need to gather to decide on what
hardware is required for a new computerised system?
(8) What five items need to be included in the USER GUIDE and in the
TECHNICAL GUIDE of a newly developed computerised system?
(9) Choose six symbols used in systems flow charts and explain what each
symbol means.
11
(10) A company selling CDs and DVDs presently uses a manual, paper-based
system to keep track of:
- stock levels
- files containing CD and DVD information
- sales information
When a customer comes into the shop s/he goes to the desk and either asks
the assistant to find a particular CD/DVD. The shop assistant locates the files
for the item the customer has requested and,
If the customer has requested the assistant to find a particular CD/DVD the
assistant keys in the name/artist and finds out if the item is in stock, where it
can be found and it’s price (the next stage is the same as above). If the item
isn’t in stock, the assistant takes the customer details and updates the
database and adds a request for the item to be ordered and this is added to
the customer’s file.
12
(a) Draw the systems flow charts to show how the above system
will work.
(c) Why would the new system reduce the shop’s costs?
13
Booklet 2 – answers and hints
- Pilot (could introduce system in one section of car dealership or, if a large
chain, introduce the whole system in one of the car dealerships and see how
it performs before rolling out to all the other dealerships in the chain)
- Parallel (could run the two systems together to make sure it works alright)
- normal (e.g. 15 – you would expect this data to be accepted since 150C is a
reasonable temperature)
- abnormal (e.g. -500, 200 – you would expect an error message since -2000C
or -5000C are not reasonable temperatures)
- extreme (e.g. -40, 50 – you would expect these extreme values (boundaries
of acceptability) i.e. -400C and 500C to be accepted as boundary values.
6
3 Design stage tasks:
4 Advantages andParallel
Direct disadvantages of changeover techniques:
Pilot Phased
- disastrous if - more expensive - if new system - if new system
new system fails than direct since fails can easily go fails can easily go
- immediate two systems in back to point back to point
benefits felt operation at the where system where system
- reduced costs same time failed failed
(only one system - more time - less expensive - less expensive
used) consuming than parallel than parallel
- less likelihood - still have old - can train staff - can train staff
of failure since system if new while system while system
fully tested system fails being introduced being introduced
- can gradually in stages in stages
train staff while - can ensure - can ensure
both systems are system works system works
running together before expanding before expanding
8
9 Systems flowchart symbols
Connector
Online storage Magnetic Tape
(files stored(aon
linkhard
to ordiscs,
from another
part of diagram)
etc)
Terminator
Visual Display Unit
(Start and end of the flow Data processing
(Monitor) diagram) operation
Merge
Document output (e.g. join two files
Manual input
(printed hard copy) together)
(e.g. keyboard)
Sample solution
stock items put – others
updated
exist
on d/base stock
d/base
item Yes
show
found? details
No
key in
information
No Yes
item show
STOP details
found?
STOP
stock
file
update stock file
update takings file
takings
file
stock level Yes
re-order supplier
< reorder file
item
level
No
Yes stock?
new 10
No STOP
Booklet 3
This covers the following topics found in section 3 of the computer studies
syllabus:
1
Booklet 3 covers the development of algorithms (both in pseudocode and
flowchart
form) and also introduces logictogates
Introduction which is a new topic from 2011.
Flowcharts
This section covers the use of flow diagrams (charts) in the production of
algorithms.
Systems flowcharts are different and these are covered in a different section
(Systems analysis).
The early part of section 3.1 (i.e. top down design, structure diagrams, menus,
This section primarily covers four areas:
libraries of procedures and subroutines) is covered adequately by standard text
books.
1 Common flow chart symbols
2 Writing flowcharts to solve problems
3 Dry running of flowcharts to determine its function and outputs
4 Exercises to test the above
1 Common concepts
flowchart symbols
END
2.2 Example 2
2.3 Example 3
2.4 Example 4
2.5 Example 5
Write an algorithm in the form of a flowchart which inputs the codes for
all items in stock and outputs the number of books, number of maps and
the number of magazines in stock. Include any validation checks
needed. 3
START
count = 1
Example 1
Input
house
Yes
Is house> tax = house *
200000 0.02
No
Yes
Is house> tax = house *
1000000 0.015
No
No
Tax = 0
print tax
No
count = Is count
count + 1 < 50001 END
Yes
4
START
Example 2
input X
is x = 0 Yes
? END
No
is x = 1 Yes
output
? “error”
No
n = (x*x)/(1-x)
output n, x
5
START
count = 1
total1 = 0, total 2 = 0
Example 3
input temp
is temp Yes
total1 = total1 + 1
< 20 ?
No
is temp Yes
total2 = total2 + 1
> 19 ?
No
count = count + 1
is count output
< 101 ? total1, total2 END
Yes No
6
START
Example 4
fastest = 0
slowest = 1000
total = 0
count = 1
input topspeed
is Yes
topspeed > fastest = topspeed
fastest ?
No
is Yes
topspeed < slowest = topspeed
slowest ?
No
total = total +
topspeed
END
count = count + 1
Output fastest,
Yes is5001
count? < 7 No slowest,
average average
=100/5000
total *
8
START
books = 0, maps = 0,
mags = 0 Example 5
input
code END
Yes
Is code = output books,
9999? maps, mags
No
No
Yes
Is 1999 < maps = maps + 1
code < 3000
No
Yes
Is 2999 < mags = mags + 1
code < 4000
No
output
“error”
9
3 Dry running of flowcharts
The following three examples show all stages in the dry running for the given
set of input data:
3.1 Example 1
Data2
3.2 Example to be used: X = 85, 3190, -40
This algorithm inputs 5 values and outputs how many input numbers
were negative and how many were positive.
3.3 Example 3
Data to be used: hours = 9.0, 7.8, 1.2, 4.5, 10.0, 6.4, 3.1
10
START
input X Example 1
N=1
T=X
X = X/10
Is X Yes Output
<1? T,N END
No
N=N+1
Trace Table
X N T Output T, N
85 1 85
8.5 2
0.85 85, 2
3190 1 3190
319 2
31.9 3
3.19 4
0.319 3190, 4
-40 1 -40
-4 11 -40, 1
START
C=1 Example 2
neg = 0, pos = 0
Input N
Yes
Is N < 0 neg = neg + 1
No
Yes
Is N > 0 pos = pos + 1
No
C=C+1
Is C < output
5 neg, pos END
Trace Table
12
START
C=1 Example 3
high = 0, total = 0
Input
hours
Yes
Is hours high = hours
> high
No
C=C+1
Yes
Is C < 7
No
avge = total/7 output
avge, high END
Trace Table
(1) Regis lives in Brazil and often travels to USA, Europe and Japan. He wants
to be able to convert Brazilian Reais into US dollars, European euros and
Japanese yen. The conversion formula is:
For example, if Regis is going to USA and wants to take 1000 Reais (and the
exchange rate is 0.48) then he would input USA, 1000 and 0.48 and the
output would be: 480 US dollars.
(2) As part of an experiment, a school measured the heights (in metres) of all its
500 students.
Write an algorithm, using a flowchart, which inputs the heights of all 500
students and outputs the height of the tallest person and the shortest person
in the school.
(4) A small shop sells 280 different items. Each item is identified by a 3 – digit
code. All items that start with a zero (0) are cards, all items that start with a
one (1) are sweets, all items that start with a two (2) are stationery and all
items that start with a three (3) are toys.
Write an algorithm, using a flowchart, which inputs the 3 – digit code for all
280 items and outputs the number of cards, sweets, stationery and toys.
14
(5) A company are carrying out a survey by observing traffic at a road junction.
Each time a car, bus or lorry passed by the road junction it was noted down.
(6) Speed cameras read the time a vehicle passes a point (A) on the road and
then reads the time it passes a second point (B) on the same road (points A
and B are 100 metres apart). The speed of the vehicle is calculated using:
100
speed = (metres/sec)
(time at point B – time at point A)
The maximum allowed speed is 100 kilometres per hour. 500 vehicles were
monitored using these cameras over a 1 hour period.
The train travels in both directions (i.e. from 1 to 10 and then from 10 to 1).
The fare between each station is $2.
A passenger inputs the number of the station at the start of his journey and
the number of the destination station and the fare is calculated (e.g if a
passenger gets on a station 3 and his destination is station 9 his fare will be
$12). The calculation must take into account the direction of the train (e.g. a
passenger getting on at station 7 and getting off at station 1 will also pay $12
and not a negative value!!).
(8) Draw the trace table and determine the output from the following flowchart
using the following data:
START
input
number
X=0
T = number
number = number - 10
X=X+1
Is Yes output X,
number number
No < 10
16 END
(9) Draw the trace table and determine the output from the following flowchart
using the following data (NOTE: input of the word “end” stops the program
and outputs results of the survey):
vehicle = car, car, lorry, bus, van, van, car, car, bus, car, end
START
input
vehicle
No
Yes
is vehicle
= car car = car + 1
No
Yes
is vehicle bus = bus + 1
= bus
No
Yes
is vehicle
= lorry lorry = lorry + 1
No
others = others + 1
17
(10) Draw the trace table and determine the output from the following flowchart
using the following data:
neg = 0, n = 0, pos = 0, p = 0
count = 1
input X
Yes
is X < 0 neg = neg + X
n=n+1
No
No
count = count + 1
is count
<11 END
Yes
No
avge1 = neg/n output avge1,
avge2 = pos/p 18 avge2
Introduction tp pseudocode
This section covers the use of pseudocode in the production of algorithms.
Candidates should use standard computing text books to find out information on
the
features
No of programming
specific programming languages (highislevel
language and low
referred to; level), interpreters,
development of
compilers,
algorithms using
assemblers, user documentation and technical documentation.
pseudocode uses generic descriptions of looping, branching, data
manipulation,
input/output, totalling and counting techniques.
1.5 loops
The following example input 100 numbers and finds the total of the 100 numbers
and outputs this total. All three looping techniques are shown:
20
2 Writing algorithms using pseudocode
The following five examples use the above pseudocode terms. These are the
same problems discussed in section 3.1 using flow charts – both methods are
acceptable ways of representing an algorithm.
2.1 Example 1
A town contains 5000 houses. Each house owner must pay tax based on
the value of the house. Houses over $200 000 pay 2% of their value in
tax, houses over $100 000 pay 1.5% of their value in tax and houses over
$50 000 pay 1% of their value in tax. All others pay no tax. Write an
algorithm
for count to
= 1solve the problem using pseudocode.
to 5000
input house
else tax = 0
Notes: (1) a while loop or a repeat loop would have worked just as well
(2) theprint taxisn’t essential in the pseudocode
use of endif
For example,
count = 0
next
while count < 5001
input house
if house > 50 000 then tax = house * 0.01
else if house > 100 000 then tax = house * 0.015
else if house > 200 000 then tax = house * 0.02
else tax = 0
endif
endif
endif
printcount
tax = count + 1
endwhile 21
EXERCISE: Re-write the above algorithm using a repeat loop and modify
the if … then … else statements to include both parts of the house price
range.
(e.g. if house > 50000 and house <= 100000 then tax = house * 0.01)
2.2 Example 2
NOTE: It is much easier in this example to input x first and then loop round
doing the calculation until eventually x = 0. Because of this, it would be
necessary to input x twice (i.e. inside the loop and outside the loop). If
input x occurred only once it would lead to a more complicated algorithm.
A while loop is used here, but a repeat loop would work just as well.
inputwhile
x x <> 0 do
else n = (x * x)/(1 – x)
print n, x
endif
input x
endwhile
22
2.3 Example 3
total1 = 0: total2 = 0
input temperature
endif
next
case temperature of
1: total1 = total1 + 1
2: total2 = total2 + 1
2.4 Example 4
endcase
Write an algorithm using pseudocode which:
• inputs the top speeds of 5000 cars
• outputs the fastest speed and the slowest speed
• outputs the average speed of all the 5000 cars
any one of the three loop structures could be used. It is necessary to set
(NOTE: values for thethe
Again since fastest
actual(usually
numberset
of at zero)
data andtothe
items beslowest
input is(usually
known set at
an unusually high value) so that each input can be compared. Every time
a value is input which > the value stored in fastest then this input value
replaces the existing value in fastest; and similarly for slowest).
23
fastest = 0: count = 0
slowest = 1000
repeat
input top_speed
endif
endif
count + count + 1
2.5 Example 5
unique 4 – digit code. All books have a code starting with a 1, all maps
have a code starting with a 2 and all magazines have a code beginning
with a 3. The code 9999 is used to end the program.
Write an algorithm using pseudocode which input the codes for all items in
stock and outputs the number of books, maps and magazine in stock.
Include any validation checks necessary.
(NOTE: A 4-digit code implies all books have a code lying between 1000
and 1999, all maps have a code lying between 2000 and 2999 and all
magazines a code lying between 3000 and 3999. Anything outside this
range is an error)
24
books = 0: maps = 0: mags = 0
repeat
input code
if code > 999 and code < 2000 then books = books + 1
else if code > 1999 and code < 3000 then maps = maps + 1
else if code > 2999 and code < 4000 then mags = mags + 1
endif:endif:endif
1: books = books + 1
2: maps = maps + 1
3: mags = mags + 1
otherwise print “error”
endcase
until code = 9999
print books, maps, mags
this is probably a more elegant but more complex solution to the problem)
25
4 PROBLEMS
Questions 1 to 3 contain sections of pseudocode which contain errors. Locate the
errors and suggest the correct coding. Questions 4 to 10 are problems which require
an algorithm to be written in pseudocode – there is “no right answer” here; as long as
the pseudocode works then the solution is acceptable.
(1) The following section of pseudocode inputs 1000 numbers and then outputs
how many were negative, how many were positive and how many were
zero.
1 negative = 1: positive = 1
2 for x = 0 to 1000
3 input number
4 if number < 0 then negative = negative + 1
5 if number > 0 then positive = positive + 1
6 endif
7 endif
8 next
9 print negative, positive
(2) The following section of pseudocode inputs rainfall (in cm) for 500 days and
outputs the average rainfall and the highest rainfall input.
1 highest = 1000
2 days = 1
3 while days > 0
4 input rainfall
5 if rainfall > highest then highest = rainfall
6 endif
7 total = total + rainfall
8 days = days + 1
9 average = total/500
10 endwhile
11 print average, highest
2
Locate for
the mult = 1and
3 errors to nsuggest a corrected piece of code.
3 sum = 0
41 input
sumn= sum * mult
5 result = n/sum
6 next 7 print result 26
(4) Regis lives in Brazil and often travels to USA, Europe and Japan. He wants
to be able to convert Brazilian Reais into US dollars, European euros and
Japanese yen. The conversion formula is:
For example, if Regis is going to USA and wants to take 1000 Reais (and
the exchange rate is 0.48) then he would input USA, 1000 and 0.48 and the
output would be: 480 US dollars.
(5) As part of an experiment, a school measured the heights (in metres) of all its
500 students.
Write an algorithm, using pseudocode, which inputs the heights of all 500
students and outputs the height of the tallest person and the shortest person
in the school.
(7) A small shop sells 280 different items. Each item is identified by a 3 – digit
code. All items that start with a zero (0) are cards, all items that start with a
one (1) are sweets, all items that start with a two (2) are stationery and all
items that start with a three (3) are toys.
Write an algorithm, using pseudocode, which inputs the 3 – digit code for all
280 items and outputs the number of cards, sweets, stationery and toys.
(8) A company are carrying out a survey by observing traffic at a road junction.
Each time a car, bus, lorry or other vehicle passed by the road junction it
was noted down.
100
speed = (metres/sec)
(time at point B – time at point A)
The maximum allowed speed is 100 kilometres per hour. 500 vehicles were
monitored using these cameras over a 1 hour period.
The train travels in both directions (i.e. from 1 to 10 and then from 10 to 1).
The fare between each station is $2.
A passenger inputs the number of the station at the start of his journey and
the number of the destination station and the fare is calculated (e.g if a
passenger gets on a station 3 and his destination is station 9 his fare will be
$12). The calculation must take into account the direction of the train (e.g. a
passenger getting on at station 7 and getting off at station 1 will also pay
$12 and not a negative value!!).
28
Introduction to Logic
Many electronic circuits operate using binary logic gates. Logic gates basically
process signals which represent true or false or the equivalent i.e. ON or OFF, 1
or 0
Whilst there are a number of logic gates, only the five simplest are covered in
this
booklet: NOT gate, AND gate, OR gate, NAND gate and NOR gate.
The five main logic gates
The following notes describe the function of all five gates, how to produce truth
The most common symbols used to represent logic gates are shown below. To
tables, how to design networks using logic gates, and how to determine the
avoid confusion the graphical representations will be used in exam questions but
output
candidates
1from
simple may use either
graphical set of symbols when answering questions.
representations
a logic network.
The next section describes the function of all five logic gates.
29
Description of the function of the five logic gates
A NOT X A X
The output (called X) is true (i.e. 1 or ON) when the INPUT A is NOT TRUE (i.e. 0 or
OFF).
INPUT A OUTPUT X
X = NOT A 10
01
A A
AND X X
B
B
The output (called X) is only true (i.e. 1 or ON) if the (INPUT A AND INPUT B)
are
both true (i.e. 1 or ON). INPUT A INPUT B OUTPUT X
111
= A AND B 100
010
000
The OR gate
A A
OR X X
B B
The output (called X) is true (i.e. 1 or ON) if the (INPUT A OR INPUT B) are
true
INPUT A INPUT B OUTPUT X
(i.e. 1 or ON). 111
X = A OR B 101
011
000
30
The NAND gate
A A
NAND X X
B B
The output (called X) is true (i.e. 1 or ON) if (INPUT A AND INPUT B) are NOT both
true (i.e. 1 or ON).
The output (called X) is true (i.e. 1 or ON) if NOT (INPUT A OR INPUT B) are true
(i.e. 1 or ON).
INPUT A INPUT B OUTPUT X
110
NOT (A OR B) 100
010
001
The tables above containing 1s and 0s are known as truth tables and are an
integral
part of logic gates functionality. These are used extensively throughout this
booklet
in the design and testing of logic networks built up from logic gates.
31
Combinations of logic gates
This booklet will only deal with a maximum of three inputs and up to six logic
gates.
The output from a logic network is checked by producing the truth table (as
shown in
the examples below).
Producing the truth table from a given logic network
Consider the following logic network which contains three inputs and three logic
We will deal with two different scenarios here. The first involves drawing the
gates:
truth
table from a givenA logic network; the second
S involves designing a logic network
for a NOR
given problem and then testing it by drawing the truth table.
B
OR X
AND
T
C
If we now look at the output in two stages. First let us consider the outputs being
produced at stages S and T. To do this we need to draw a truth table. There are
three inputs (A, B and C) which gives 23 (i.e. 8) possible combinations of 1s and 0s.
To work out the outputs at S and T we need to refer to the truth tables for the NOR
gate and for the AND gate. For example, when A = 1 and B = 1 then we have 1 NOR
1 which gives the value of S = 0. Continuing doing the same thing for all 8 possible
inputs we get the following interim truth table:
A ABCST
S 11101
11000
10100
10000
01101
01000
T 00110
00010 32
The final stage involves S OR T.
STX
011
000
0 0 This
0 gives
0 0 0 final truth
the
0 1table:
1
000
101
101
X
AB CX
1111
1100
1010
1000
0111
0100
0011
0001
Designing logic networks to solve a specific problem and testing using truth
tables
Consider the following problem:
“If button A or button B are on and button C is off then the alarm X goes
To draw the logic network, we do each part in brackets first i.e. A = 1 OR B = 1 is
on”
We
one can convert this onto logic gate terminology (ON = 1 and OFF = 0):
gate then C = NOTIf (A1 =is1the
ORsecond
B = 1)gate.
AND These are then
(C = NOT joined
1) then together
(X = 1) by the
AND
(Notice:
gate. Once the logic networkrather than write
is drawn 0 wethen
we can usetest
NOT 1) a truth table.
it using
Remember the original problem – we are looking for the output to be 1 when A
or B
is 1 and when C is 0. Thus we get the following logic network and truth table
from
the network. Looking at the values in the truth table, we will be able to clearly
see
that it matches up with the original problem which then gives us confidence that
the
logic network is correct.
33
ABCX
1110
1101
1010
X 1001
AND 0110
0101
0010
0000
The
Draw first
a thing
logic to do is to and
network try and turntable
truth the question
to show into
alla series of logicsituations
the possible gates and
then
when
the
• Theproblem
the stop becomes
signal
first statement could
can much as:simplified.
be received.
be re-written (L = 1 AND V = NOT 1) since Length >
100 metres corresponds to a binary value of 1 and Velocity < 10 m/s
corresponds to a binary value of 0 (i.e. NOT 1).
• The second statement can be re-written as (T = NOT 1 AND V = 1) since
Temperature < 1000C corresponds to a binary value of 0 (i.e. NOT 1) and
We can now draw
Velocity > 10 them/slogic networkto
corresponds and truth table
a binary valuetoofgive
1 the solution to the original
•problem (input
Both these L has been
statements areput at the
joined bottomby
together of OR
the which
diagram just us
gives to the
avoid crossing
logic
over statement:
of lines; it merely
if (L = makes
1 ANDitVlook= NOT
neater
1) OR
and (T
less= complex
NOT 1 ANDand isn’t
V = 1)
essential):
34then S = 1
T
NOT
AND
V
NOT S
OR
L AND
LTVS
1110
1101
1011
1001
0110
0100
0011
0000
PROBLEMS
In questions 1 to 6, produce truth tables from the given logic networks.
Remember
that if there are TWO inputs then there will be four (22) possible outputs and if
there
are THREE inputs Athere
BCX
will be eight (23) possible
AB X
outputs.
111 11
i.e.0 1 1 110 10
101 01
010
001 100 00
000 35
(1)
A
OR
NOT
X
AND OR
(2)
A
NOT
OR NOT
X
OR
AND
B
(3)
A
NOR NAND
X
AND
B NOT
(4)
A
OR
B
OR
C AND 36 AND X
(5)
A
AND NOT
X
NOR
B
OR
NAND
C
(6)
NOT
A
OR
AND X
OR
B
OR
AND
Questions 7 to 10 require both the logic network to be created and also the truth
table. The truth table can be derived from the logic network, but also from the
problem. This is a check that the logic network actually represents the original
problem.
(7) A computer will only operate if three switches P, S and T are correctly set. An
output signal (X = 1) will occur if R and S are both ON or if R is OFF and S
and T are ON. Design a logic network and draw the truth table for this
network.
37
(8) A traffic signal system will only operate if it receives an output signal (D = 1).
This can only occur if:
Design a logic network and draw a truth table for the above system.
(9) A chemical plant gives out a warning signal (W = 1) when the process goes
wrong. A logic network is used to provide input and to decide whether or not
W = 1.
either (a) Temperature > 120C and Cooling Water < 100 l/hr
or (b) Temperature < 120C and (Pressure > 10 bar or Cooling Water <
100 l/hr)
Draw a logic network and truth table to show all the possible situations when
the warning signal could be received. 38
Booklet 3.1 – answers and hints
(1)
START
INPUT
country
INPUT
conv rate
INPUT
reais
currency_value = reais x
conv_rate
Is country Yes
= USA? OUTPUT “$”,
currency_value
No
No
No
OUTPUT
“error” 11 STOP
(2)
START
tallest = 0
smallest = 1000
count = 1
INPUT
height
Yes
Is height > tallest =height
tallest ?
No
Yes
is height < smallest = height
smallest?
No
count = count + 1
Yes No OUTPUT
Is count <= tallest,
500? smallest
12 STOP
(3)
START
INPUT
temp, hours
count = count + 1
Yes Is count
<= 365?
No
mean_temp = sum_temp/365
mean_hours = sum_hours/365
OUTPUT
mean_temp,
mean_hours
STOP
13
(4)
START
INPUT code
Yes
Is code <
100? cards = cards + 1
No
No
No
count = count + 1
STOP
Yes No
is count <= OUTPUT cards,
280? stationery, toys
14
(5)
START
INPUT
vehicle
Is vehicle Yes
cars = cars + 1
= car?
No
Is vehicle Yes
buses = buses + 1
= bus?
No
Is vehicle Yes
lorry = lorry + 1
= lorry?
No
others = others + 1
count = count + 1
Yes No
Is count OUTPUT cars,
<= 10000? buses, lorry, others
15 STOP
(6)
START
highest = 0
count = 1
INPUT
start time
INPUT
end time
Is speed Yes
OUTPUT
> 100? “message”
No
OUTPUT speed
Yes
Is speed >
highest = speed
highest ?
No
count = count + 1
Yes No OUTPUT
Is count
<=500 ? 16 highest STOP
(7)
START
INPUT start
INPUT end
No
cost = no_stations x 2
INPUT
no_passengers
Is Yes
no_passengers cost = 0.9 x cost
> 2?
No
count = 1
OUTPUT
ticket Yes
number X T OUTPUT
45 0
45
35 1
25 2
15 3
5
4 4, 45
-2 0-2
-12 1
1, -2
20.5 0
20.5
10.5 1
0.5 2
2, 20.5
(9) (NOTE: there is an error in the question in booklet 3.1 – the “others = others + 1”
statement should by-pass all the other counting procedures)
(10)
19
(5) 1 tallest = 0
2 shortest = 500
3 for count = 1 to 500 do
4 input height
5 if height > tallest then tallest = height
6 if height < smallest then smallest = height
7 next
8 print tallest, shortest
20
(9) 1 highest = 0
2 for count = 1 to 500 do
3 input start_time, end_time
4 speed = 100/(end_time – start_time) {NOTE: m/second}
5 speed = speed * 3.6 {NOTE: conversion to km/hour}
6 if speed <= 100 then print “speed is OK”
7 else print “maximum speed exceeded”
8 print speed
9 if speed > highest then highest = speed
10 next
11 print highest
[NOTE: it is possible to use other loop structures other than for …. to; the
algorithms
would work equally as well with repeat …. until or while …. endwhile. The for
…. to
loops work particularly well when an exact count is known (e.g. exactly 100
temperatures). If we had to input temperatures until they became negative it
would be
best to use a while or repeat loop, for example].
21
Booklet 3.3 – answers and hints
(1)
ABX
111
100
010
001
(2)
ABX
111
101
010
000
(3)
ABX
110
101
010
000
(4)
AB CX
1111
1100
1011
1000
0111
0100
0010
0000
(5)
AB CX
1111
1100
1010
1000
0110
0100
0010
0000
22
(6)
AB CX
1111
1100
1011
1000
0111
0101
0011
0001
(7) Statement:
Logic network:
T AND
AND
NOT
OR
R AND
S
23
(8) Statement:
Truth table:
AB CD
1110
1100
1010
1001
0111
0101
0011
0001
Logic network:
A
NOT
OR
D
AND
NOT
B
AND
NOT
C
(9) Statement:
Truth table:
CTXW
1111
1100
1011
1001
0111
0101
0011
0001 24
Logic network:
NOT
C
AND
NOT OR
T W
OR
AND
X
0) Statement:
(1
S = 1 if ( T = 1 AND W = NOT 1 ) OR ( T = NOT 1 AND ( P = 1 OR W = NOT 1))
Truth table:
TPWS
1110
1101
1010
1001
0110
0101
0010
0000
Logic network:
P
OR
AND
NOT
W S
OR
T NOT AND
25
Booklet 4
This covers the following topics found in section 4 of the computer studies
syllabus:
1
4.1 Data
Automatic Data Capture
There are many techniques available to collect data automatically without the need
for manual entry. Manual entry is slower, more expensive (need to employ people to
key in data) and also prone to error (e.g. typing in 4.1 instead of 1.4). The following
is a list of available automatic data capture techniques:
Barcode readers these take data from printed barcodes and allow automatic
stock control in, for example, supermarkets.
Radio Frequency this method involves using small electronic devices containing a
Identification microchip and antenna; they work in a similar way to bar codes
(RFID) but can be read from a distance of 5 metres; often used to track
live stock, vehicles, library books and goods sold in shops.
Voice recognition these systems recognise spoken words e.g. for disabled people
who can’t use keyboards where they speak commands instead
of having to type.
Smart cards these contain embedded microchips and receive power from the
card readers; the microchip is made up of RAM, ROM and 16-
bit processor and the stored data is automatically read by the
card reader; used in credit cards, security cards, loyalty cards,
etc.
Optical mark OMR technology scans a printed form and reads pre-defined
recognition (OMR) positions (where specific fields have been filled in e.g. - or
_); the system records where marks have been made so can
automatically determine responses to, for example, a
questionnaire.
2
Data Collection
Data collection can be either automatic (see previous page) or manual. Manual
techniques can involve:
Validation Techniques
checks if a person’s age is > 0 but is also < 140.
Validation is a process of checking if data satisfies certain criteria when input i.e.
Length
falls check thischaracters
checks if the input data contains the required number of
e.g. if a field needs 6 digits, then inputting 5 digits
within accepted boundaries. or Examples of validation
7 digits, for example, techniques include:
should be rejected.
Character check
Range check thisthis checks
checks that the
whether input
data data doesn’t
is within contain invalid
given/acceptable values e.g.(type
check) characters; e.g. a person’s name shouldn’t contain numbers.
Format check this checks that data is in a specified format (template) e.g.
(picture check) date should be in the form dd/mm/yyyy.
(boundaries) is checked e.g. input data must be > 10.
Limit check
Presence thischeck
check is similar
that to a range
data checkpresent
is actually exceptand
onlynot
ONE of the
missed outlimits
e.g. in
an electronic form, somebody’s telephone number may be a
required field.
Consistency check/ this checks if fields correspond (tie up) with each other e.g.
if field must contain M or Male.
Cross field check Mr. has been typed into a field called “Title” then the
Check digit this is an extra digit added to a number which is calculated
“Gender” from the digits; the computer re-calculates and validates the
check digit following input of the number (see next page).
3
This section shows how check digits are calculated. The ISBN-10 (used on books)
has been chosen as the example; this uses a modulo 11 system which includes the
letter X to represent the number 10.
Example 1
10 9 8 7 6 5 4 3 2 1 digit position
0 - 2 0 1-5 3 0 8 2-? number
(ii) each digit is then multiplied by its digit position and the totals added together
0 x 10 + 2 x 9 + 0 x 8 + 1 x 7 + 5 x 6 + 3 x 5 + 0 x 4 +8 x 3 + 2 x 2
= 0 + 18 + 0 + 7 + 30 + 15 + 0 + 24 + 4
= 98
(iii) the total is then divided by 11 (modulo – 11) and the remainder, if any, is
subtracted from 11 to give the check digit.
98 ÷ 11 = 8 remainder 10
11 – 10 = 1
Example 2
(ii) each digit is then multiplied by its digit position and the totals added together
0 x 10 + 1 x 9 + 3 x 8 + 1 x 7 + 5 x 6 + 2 x 5 + 4 x 4 + 4 x 3 + 7 x 2 + X x 1
= 0 + 9 + 24 + 7 + 30 + 10 + 16 + 12 + 14 + 10 (recall that X = 10)
= 132
(iii) the total is then divided by 11; if there is no remainder then the check digit is
correct:
132 ÷ 11 = 12 remainder 0
Verification is a way of preventing errors when data is copied from one medium
to
another (e.g. from paper to disk/CD, from memory to DVD, etc.). There are a
number of ways inpeople);
which verification
the data canif both
is only accepted be done:
versions match up.
Often used to verify passwords by asking them to be typed
in again by the same person.
Double entry in this method, data is entered twice (using two different
Visual check this is checking for errors by comparing entered data with the
original document (NOTE: this is not the same as proof
reading!!).
their
Exampleaccounts would
(1 = ON and 0 = OFF)
Therefore, 1 0 1 0 1 0 1 0
means: front wheel turns left
back wheels turn left
the direction is forward
the motors are on
Answers
(ii) 0 1 1 0 1 0 1 0 6
4.4 Software
Some of the key features of software are considered in this section.
Familiarisation
with software packages is usually best achieved by carrying out a variety of tasks
on
the computer.
Word processors
Word processors now have many features over and above the original task of
generating a typed document. This section will concentrate purely on word
processing features.
Desk
C'est Top Publishing
un exemple (DTP)traduit d'anglais-français
d'un document
Essentially in DTP, a user creates a page layout with text, graphics, photos and
other
elements. The following is a list of key differences to word processors:
Spreadsheets
8
The following is a brief summary of the common features found in spreadsheets:
- it is made up of columns and rows; each row is identified by a number and each
column is identified with a letter (or letters)
- each cell is identified by its column id and row id e.g. A4, ET300 etc.
- a cell may contain a label (text entry such as MEAN VALUE) or a value (which can
be a number, a date, a formula, result of a calculation, or currency)
- the cursor identifies the current cell selected; it is possible to click on to a cell and
a “+” sign appears in the bottom right hand corner; by dragging the formula down
it is possible to replicate it in other cells
For example:
A B C
1 15 3 =(A1 * B1)
2 11 5
37 7
49 9
5 10 11
By selecting cell C1 and dragging the formula down to C5 the following formulae
will be replicated in C2 to C5: (A2*B2), (A3*B3), (A4*B4) and (A5*B5)
- formulas are used to represent a mathematical function
e.g. = (C5 * D5) * 100
= A5 + B5 + C5+ D5
- functions allow computations to take place
e.g. SUM, AVERAGE, MAX, MIN
e.g. the second formula above could be written as = SUM(A5:D5)
- it is also possible to use mathematical/logical expressions within cells
e.g. IF G5 > 100 THEN “Y” ELSE “N”
- it is also possible to create charts and graphs from spreadsheets (e.g. using a
chart wizard). For example:A B
1 rainfall temperature
2 10 17
3 12 15
Cells A1 to A13 are highlighted and
4 15 13
the first chart is created. Then cells
5 28 11
B1 to B13 are selected and the
6 37 10
second chart created.
7 62 8
8 58 9
Other aspects such as colours,
9 47 11
labels, etc. are then added.
10 32 12
11 20 15
12 15 16
13 8 22
14
9
temperature and rainfall
10
20
30
0 5
123456789101112 40 10
50 rain temp
15
month
60 20
70 25
- now consider the following spreadsheet:
A B C D
1 vehicle id kilometres litres kilometres/litre
2 A 150 12.5 12.0
3 B 200 27 7.4
4 C 300 20 15.0
5 D 250 15 16.7
6 E 100 10 10.0
7 F 400 33 12.1
8 average km/l 12.2
9 maximum km/l 16.7
Databases are used to collect and organise information. Most database have all
of
Tables
the following properties:
Data is stored in rows and columns (much like a spreadsheet – the main
difference is
how the data is organised). Each row in a table is called a record which is
made up
Forms
of a number of fields (columns in the table). The data type in the fields is
Forms
usuallyare commonly called data entry screens since they are the user interface
which
either allows data in theortables
text, numeric to be viewed,
date/time. Mostentered or edited.
databases Forms
contain permit the
a number of
control of how other users interact with the information in the database e.g. only
tables which
allow
are usually linked together in some way.
certain fields to be seen or only allow certain operations to be carried out. This
subsequently helpsReports
the protection of the information and also ensures it is entered
correctly.
Reports are produced as a result of questions such as “how many times has a type
of car broken down” or “which cities have the highest house prices”. Reports can
be
printed out, viewed on the screen or exported (e.g. to a word processor, an email
Queries
message, etc.).
Queries most commonly allow information to be retrieved from tables. Since the
information is often spread across several tables, queries allow it to be viewed as
one single datasheet. They also allow filtering so only the records required are
seen.
Queries can be either
Sampleresults seen directlyfrom
database/table on thea screen or the output to another
database
form or report. Example of a query: (house > 200 000) OR (no_of_rooms < 4).
Name of Toxic Smallest size Largest
Filtered
sizeout by 10
substance (microns) (microns)
micron mesh?
cement dust no 3 100 some
coal dust no 1 100 some
common sand no 10 2000 yes
paint pigments yes 0.01 5 no
talcum powder no 3 80 some
pollen no 10 100 yes
smog no 0.01 1 no
viruses yes 0.002 0.04 no
bacteria yes 0.2 20 some
human hair no 20 300 yes 11
Points to note: (1) there are 10 records in this section of the database
(2) each record has 4 fields
(3) sample queries:
The query should match up with the field titles to ensure a correct search is
carried out. Search engines on the Internet work in a similar way; the clever
part is how the information is stored on the databases so that the time to do
the search (based on key words) and the effectiveness of the search itself
results in a very powerful and very useful tool.
Authoring Software
Also known as authorware; this is a program that helps in the writing of hypertext or
multimedia applications. Authoring tools usually allow the creation of the actual
required application by linking together objects which can be text, graphics, music
file, etc. By defining the relationship between objects it is possible to produce very
useful and eye catching applications.
Many authoring packages support a scripting language to allow for even more
sophisticated applications to be produced. Scripting languages have pre-built
functionality (such as menu styles, graphic displays, etc.) that is embedded within
HTML. These pre-built functions allow users to engage with a web-site in real time.
The distinction between authoring tools and programming tools is not at first obvious.
However, authoring tools require less technical knowledge to master and are usually
used for applications that present a mixture of text, graphics, and audio/music files.
Macros
For example, suppose you want some data to be input into a spreadsheet if the result
of a calculation in cell K40 is negative:
Other software
4.5 Problems
Give a different validation check for each of the above fields and explain why
it is used.
(3) A system uses the ISBN-10 (modulo 11) method to generate and validate bar
codes:
- each digit in the number is multiplied by its digit position
- the result of each multiplication is added to a total
- the total is then divided by 11
- the remainder is subtracted from 11 to give the check digit (if the remainder
is 10, the letter “X” is used as the check digit)
(a) Which of the following numbers have the correct check digit?
(i) 0–555–21622–5
(ii) 0 – 1 2 1 – 9 0 0 2 1 – X
0 – 1 5 0 – 2 4 6 2 2 – ………
(c) Discuss the types of errors that check digits can identify.
14
(4) (a) Describe three ways of carrying out verification checks.
(5) A burglar alarm system uses an 8 – bit register. The first 4 bits indicate if a
sensor has picked up an intruder (shown with a 1 – value) and the second
four bits indicate the zone where the sensor has picked up an intruder:
8 4 2 1
A B C D
A B C D
Indicates: window sensor detected an intruder in zone (8 + 4 + 2) 14
8 4 2 1
0 0 1 0 1 0 1 1
(b) What would be the binary pattern for a window broken and an infra red
sensor detecting an intruder both in zone 15?
Which five features of a word processor could be used to ensure that the
advert fits onto one page only.
15
(7) A college has invested in a computer system to help carry out the following
tasks:
Describe four software packages the college could use to carry out the above
tasks and explain why each software package has been chosen.
(8) Describe three fundamental differences between word processors and desk
top publishing
A B packages.
C D E F G
new Value Value Value Depreciation
Value
1 name of car price after year after year after yearover
after
4 years
year
($) 1 ($) 2 ($) 3 ($) 4 ($) (%)
2 (9)
Fiat The
Bravo 150 following
28 000 21 000spreadsheet
15 600 11 200 9has
800 been
65 set up to compare the depreciation of 8
3 Honda Civic “R” 36 000 28 800 23 400 20 000 18 000 50
4 new
Range cars
Rover SE over
80 000 a644000
year period.
60 000 50 000 48 000 40
5 Mitsubishi Lancer 20 000 12 000 9 000 6 400 5 000 75
6 Citroen C8 LX 40 000 20 000 13 200 10 000 8 000 80
7 BMW 320 Conv. 72 000 57 600 50 000 43 200 36 000 50
8 Audi A3 1.6 SE 30 000 22 500 18 000 15 000 12 000 60
9 Mercedes SLK 350 68 000 57 800 51 000 48 000 45 600 33
10 Mean Deprecn 56.6
11 Highest Deprecn. 80.0
(b) What formula must be in cell G10 to calculate the mean (average)
depreciation of all 8 cars?
(c) What formula must be in cell G11 to find the highest (maximum)
depreciation of all 8 cars?
(d) Describe how it would be possible to predict the value of each car after
5 years and after 10 years?
16
(10) A database has been set up to compare certain features of freezers. A
section of the database is shown below.
Capacity Warranty
Item I.d. Price ($) Lowest Colour
temp (0C) (m3) (years)
A 300 - 20 0.16 1 white
B 250 - 18 0.15 1 silver
C 400 - 22 0.25 2 white
D 300 - 20 0.18 3 white
E 520 - 40 0.35 3 silver
F 360 - 25 0.30 1 white
G 410 - 30 0.30 2 white
H 290 - 18 0.20 2 silver
(a) How may records are shown in this section of the database?
(b) What items would be output if the following search condition was input:
(c) Give the search condition to find all freezers which operate below
- 250C and have a capacity of more than 0.25 m3.
17
Booklet 4 – answers and hints
Multiplication: (10x0)+(9x5)+(8x5)+(7x5)+(6x2)+(5x1)+(4x6)+(3x2)+(2x2)+(1x5)
10 9 8 7 6 5 4 3 2 1 position
Multiplication:
(10x0)+(9x1)+(8x2)+(7x1)+(6x9)+(5x0)+(4x0)+(3x2)+(2x1)+(1x10)
(b) 10 9 8 7 6 5 4 3 2 1 position
0 1 5 0 2 4 6 2 2 ?
bar code digits
Results: 104/11 = 9 remainder 5. Hence, bar code check digit is incorrect
Multiplication: (10x0)+(9x1)+(8x5)+(7x0)+(6x2)+(5x4)+(4x6)+(3x2)+(2x2)
(alternative: to make the total, i.e. 115 into a number which gives a remainder of
0 when divided by 11 (i.e. 121) we need to add 6 – which also gives us the check
digit). 26
(c) Check digits can identify the following errors:
- double data entry (two people type in the same data from source document)
- visual check (where the information on screen is compared to source document)
- parity check (where the number of bits is checked for even or odd)
5(a) B = 1 and D = 1
i.e. floor sensor and infra red sensor detect presence of an intruder
C=1
(b) 1 0 0 1 1111
--advertise theofcollege
keep track (use
students andDTP
staff–information
could also use
(useword processor or authoring
a database)
- keep track of payment of fees (use of spreadsheets)
- produce on line coursesprocessing)
software)
(use authoring software – could also use DTP27or word
8 Differences between word processing and DTP:
= AVERAGE(G2:G9) or
= (G2+G3+G4+G5+G6+G7+G8+G9)/8
(d) - draw a graph of the given data and use a tend line to predict; extend graph to
ten graph
(or use mathematical formula (best fit) based on existing curve to allow
predictions to be made)
- add additional columns assuming that depreciation follows a “known pattern”
(10)(a) 8 (A to H)
(b) E
(c) (Lowest temp (0C) < -25) AND (Capacity (m3) > 0.25)
28
Booklet 5
This covers the following topics found in section 5 of the computer studies
syllabus:
1
Laptop/notebook computers
Laptop computers have the obvious advantage over desk top computers (PCs) in
that they are fully5.1
portable.
HardwareThis is of particular value if a user wishes to do work
away from the office (e.g. when travelling) or if they want the freedom to work
anywhere within a building taking full advantage of WiFi technology.
One of the main considerations when buying a laptop is the battery life. This can
depend on a number of things but one major factor is the processor specification.
The following is a list for consideration:
Household devices
Digital
(Note: also check out thecameras
section on Embedded web Technology in booklet 1)
The microprocessor would be used to control the following functions, for example:
Many household devices now use microprocessors to control their various
functions.
- shutter speed
lens focus
- flash
The following
- aperture is just a sample of common devices (showing some of the
(light intensity)
functions
(Note 1: the sensitivity of the camera depends on the number of pixels used to
controlled by the
represent the picture takenmicroprocessor and takes
e.g. an 8 megapixel camera general notes
a sharper imageon
thanthe
a application; it is worth
doing further
5 megapixel camera.research
The camerato find size
memory outalso
more about
dictates these
how many devices):
photos
be taken or limits the pixel size of a photo. The sharpness of the image also
can
- water temperature
- time for each cycle
- the wash cycle (when to add powder, when to rinse, etc.)
- loading (i.e. weight of the washing in the drum)
(Note 1: the main advantages are that these machines are fully automatic (wash
Digital televisions
programs are fully stored) which makes them easy to use, they are cheaper to
manufacture
The microprocessor(modular design)
would be used to control and generally
the following more
features, reliable).
for example:
(Note 1: signals to televisions are now sent digitally so need a computer to interpret
and decode these signals into a picture/sound; need multi-functional system to
control plasma and LCD screens)
3
Information centres
Airports, supermarkets, and any application where information needs to be
relayed to
customers, gain benefit from having automatic information kiosks rather than
having
manned desks. These allow customers to automatically obtain information when
they require it. Output is normally on a screen but the input devices can vary and
are
usually:
(keyboards are usually not offered since the number of options is limited and the
owners of the system don’t want customers keying in information and attempting
to
“hack” into the system).
Using this automated information system affords the following advantages to the
Supermarkets/retailers
customers and company:
These use several types of specialist input/output hardware. For example:
- the system can be linked into websites to give live updates (very useful option
- bar code readers/scanners (to read product details and enable automatic stock
at
control)
airports, bus terminals, railway stations, etc.)
- Point of Sale (POS) terminals – usually include the bar code readers/scanners
- information is usually more up to date using this method
- CAD output/input devices (the supermarkets produce their own notices etc. and
- no language problems (manually operated desks may have limited language
need this specialist hardware to carry out these tasks)
capability)
- sensors (counting customers entering and leaving the supermarket to allow
- no need to wait in queues
efficient check out performance)
- companies can advertise special offers, special services, key notices, etc.
- lower costs to companies (fewer staff needed)
- automatic information kiosks are always open
4
Facilities for the disabled
There are many input/output devices to help disabled people. Some of these are
summarised below:
Device Application
For people who can’t use a keyboard allowing input;
Touch screensalso
+ head
helps
wand
people with learning difficulties since icons
are easier to understand
On-screen keyboards For people who can’t use keyboards (use head wand
to select letters)
Blind and partially-sighted people can communicate
Voice recognition
with a computer using microphone and software
(keyboard and touch screens can’t be used)
Easier to use than a mouse if people have problems
Trackerball using their arms and hands or if they have a
coordination problem
Helps people who are partially-sighted since the larger
Large font size/use
icons and/or
of colour
colourful outputs on large screens are
much easier to see
Dot matrix printers can be modified to produce raised
Braille printers
dots (i.e. Braille) – this helps blind and partially-sighted
people to read the output
Loud speakers and special software are used to output
information in the form of sound to help blind and
Voice synthesis
partially-sighted people; it also helps people who have
difficulty reading/understanding text
These help people who have difficulty using normal
Large/conceptkeyboards
keyboards(either because of difficulty using hands/
arms or coordination problems)
Prediction software To help dyslexic people when typing
Foot activated controls To allow people with restricted hand/arm movement to
communicate
5
MEMORY
ROM RAM
(Read Only (Random Access
Memory) Memory)
ROM holds the instructions for starting up the computer. This type of memory can
only be read and cannot be altered (i.e. deleted or written to) and is non-volatile (i.e.
it doesn’t lose its contents when the computer is switched off).
A PROM is a memory chip on which data can be written only once. Once a program
has been written onto a PROM, it is permanent. Unlike RAM, PROM's retain their
contents when the computer is turned off. The difference between a PROM and a
ROM (read only memory) is that a PROM is manufactured as a blank memory,
whereas a ROM is programmed during the manufacturing process. To write data
onto a PROM chip, a special device called a PROM programmer or PROM burner is
required.
This is a special type of PROM that can be erased by exposing it to ultraviolet (UV)
light. Once it has been erased, it can be re-programmed using an EPROM burner.
An EEPROM is a special type of PROM that can be erased by exposing it to an
electrical charge. Like other types of PROM, EEPROM retains its contents even
when the power is erasable
Electrically turned off. Also, as withread
programmable other types
only of ROM,
memory EEPROM access
(EEPROM)
time is not as fast as RAM. EEPROMs are similar to flash memories (sometimes
called flash EEPROM). The principal difference is that an EEPROM requires data to
be written or erased one byte at a time, whereas a flash memory allows data to be
written or erased in whole blocks. 6
usually internal; hard drives contain much of the applications software to
enable the
computer to run effectively).
MP3 (MPEG-3)
SD (secure digital) cards are a type of flash memory used in digital cameras
and 7
Compact disks (CD)
These are an optical storage media which have basically taken over from
the floppy
disk. Software is now usually supplied on a CD (in the form of CD-R
Credit cards and smart cards
which can be
read
Creditonly or CD-RW
cards contain awhich allows
magnetic reading
stripe on the and
backwriting ofmade
which is data).up of iron-
based
Digital
particlesversatile diskfilm.
in a plastic (DVD)
The stripe
This is anisoptical
split upsystem
into three
fortracks which
storing data.are It
read
is by a magnetic
similar to CDstripe
but
reader.
typically can hold 4.7
Usually only tracks 1 and 2 are used. The information stored usually follows
Gbyte of data compared to only 700 Mbyte of data on a CD. This is due
the
to dual format:
following
layering and higher density of data storage.
track 2 track 1 description
Batch processing
In this process, a number of tasks (or jobs) are all collected together over a set
period of time. They are then all loaded into the computer system (in a job queue)
and processed in one go (or batch). Once a batch job begins, it continues until it is
completed or an error is encountered. No user interaction is required once execution
begins.
This has the advantage that jobs can be processed when computer resources are
less busy (e.g. during the evening or at night); thereby utilising an expensive
resource. Batch processing is often used in the following application areas:
When booking seats on a flight, for example, real time (transaction) processing would
be used. Response to a query needs to be very fast and once a seat is booked it
needs to marked as “not available” immediately to avoid any risk of double booking.
Using this example of booking seats on a flight, the following sequence of events
would take place:
airport
- the airline database is searched and availability of seats checked
- if seats are available on the required day/time then a booking is made
- the database/file is updated immediately to indicate that these seats are no
longer available and prevents double booking from occurring
- if no seats are available a message is sent back to the customer/travel agent
- this uses real time (transaction) processing since the files are updated in real
time; interrogation of files will have access to totally updated information
(NOTE: the above is sometimes referred to as pseudo real time since some
applications don’t need immediate updating of the files)
10
Real time process control
Process control is a real time system. But this is very different to real time
(transaction) processing; this system usually involves sensors and feed back
loops
i.e. the output can influence the next input to the system.
Networks Comments
Tree networks:
Comments
Multimedia applications
- text
- graphics
- video
- animation
- sound
(1) (a) Name two household appliances that are microprocessor controlled.
(2) (a) Name four different types of sensors and give an application for each
one named.
(b) Choose one of your named applications and describe how the
sensors are used to control and monitor it.
(3) (a) Describe the main differences between Random Access Memory
(RAM) and Read Only Memory (ROM).
Name three input/output devices and describe how they would help a
disabled person.
(5) Compare the type of data that would be stored on a barcode with the data
that would be stored on a credit card magnetic stripe.
Describe the different types of validation checks that would be made on data
stored on:
(i) barcodes
(ii) magnetic stripes on credit cards
13
(6) A railway station management team has decided to set up automatic
information kiosks to keep passengers up to date with train times,
cancellations, and general information.
(c) What advantages does this system give to the station management?
(d) Using the space below show a typical “home page” which could be
presented to passengers at the railway station. Show any links,
menus, etc. which you think would be needed to make the system as
user friendly as possible.
(7) (a) Give four functions carried out by a typical operating system.
(9) A very large city library is changing over to a fully computerised system to
control all their operations.
(a) What features should the trainer use in the design of the presentation
to make it is as interesting as possible?
(c) Many of the books in the library have been scanned in and stored on
the computer.
(10) (a) A music file is 45 Mbyte in length. Approximately how much memory
space would this same file need if stored in MP3 format?
(c) Why have CDs and DVDs taken over from floppy disks as the main
secondary storage media on home computer systems?
15
Booklet 5 – answers and hints
29
3(a) Differences between RAM and ROM
On-screen keyboards For people who can’t use keyboards (use head wand
to select letters)
Blind and partially-sighted people can communicate
Voice recognition
with a computer using microphone and software
(keyboard and touch screens can’t be used)
Easier to use than a mouse if people have problems
Trackerball using their arms and hands or if they have a
coordination problem
Helps people who are partially-sighted since the larger
Large font size/use
icons and/or
of colour
colourful outputs on large screens are
much easier to see
Dot matrix printers can be modified to produce raised
Braille printers
dots (i.e. Braille) – this helps blind and partially-sighted
people to read the output
Loud speakers and special software are used to output
information in the form of sound to help blind and
Voice synthesis
partially-sighted people; it also helps people who have
These help
difficulty people who have difficulty
reading/understanding text using normal
keyboards (either because of difficulty using hands/
Foot activated controls Large/concept
To allow people
arms
keyboards
with
or coordination
restricted hand/arm
problems)
communicate
movement30 to
5 Data stored on magnetic stripes and bar codes:
- bar codes would contain key data such as product details (data is coded in the
form of light and dark bands of variable thickness)
- magnetic stripes (these contain key data such as customer account number, etc.
and is stored in an electronic form)
validation check on a bar code and credit card is usually a check digit
- touch screen
- mouse/trackerball
- light pens
- no language problems
- no need to wait in a queue
- always open
- information usually more up to date and more accessible
Platform map
Car hire
Local hotels
15/10/2010 16:40
for (1) layout is sensible (not crammed into one corner) (2) logical screen options
[NOTE:
given (3)there
clearly
is no
a computer
“right answer”
screen to
(e.g.
thisdrop
typedown
of question.
menu boxes)]
Examiners 31
will look out
7(a) Operating system
(b) Advantages of ring:provides, for example:
Advantages of star:
- -user
works well under heavy loading - if one station fails/connection fails
interface
the other stations are not affected
- device management
- possible to create large networks - easier to identify faults in the system
- handles interrupts
- spooling to expand network
- easy
- Disadvantages
memory managementof ring: Disadvantages of star:
- multitasking
- -batch
faultyprocessing
connection between - if central hub breaks down, the whole
- multiprogramming
two stations can cause network network fails
-failure
error reporting/handling
- -loading/running software
difficult to add new stations
- processor management
- maintain user accounts
9(a)- utilities
Features(e.g.
expected
copy,insave,
the presentation:
re-name, sort, etc.)
- multimedia (text, graphics, video, animation, sound, etc.)
(b) RTTP features:
(b) Laptop features:
- fast response needed
- -files updated
can store immediately
presentations on the hard drive
-- portable
used when making bookings (etc.)
system can link into any to stop system
multimedia double booking
- take
no control takes place, but human
full advantage of WiFi system involvement takes place
(c) Advantages
RTPC of scanning in books to customers:
features:
-- easy to sensors
use of import text,
andgraphics,
feedbackphotos,
loops etc. into own work
-- easier to locate information
output can influence the inputin books
- easier to cross-check information in books
- used to monitor and control processes
- access to old and rare books (more accessible)
-- can
usually
“blow noup”
human involvement
text/diagrams needed
to make them clearer
- easier to “make notes” on the pages for future reference
(c)- more
Applications
than one include:
customer can access a book at the same time
RING STAR
32
33