chapter 12 - hkedcity.net · web viewdata stored in cd-rom will not be easily erased. iii. the cost...

98
Chapter 1 Basic Computer Concepts Part I - Multiple Choice Questions 1. Which of the following is NOT a hardware component of a computer system? A. Central Processing Unit B. Operating system C. Output device D. Memory 2. Which of the following is FALSE? A. Main memory is a hardware component of a computer system. B. Central Processing Unit functions as the “brain” of a computer. C. Computer software is the instructions that tell the computer what to do. D. A program is raw facts that tell a computer how to perform a task. 3. Which of the following is a program? A. Memory B. Keyboard C. Central Processing Unit D. Operating system 4. Which of the following is/are the advantage(s) of mainframe computers over microcomputers? I. Mainframe computers have higher storage capacity. II. Processing speed of mainframe computers are faster than that of microcomputers. III. Mainframe computers are less expensive than microcomputers. A. I only B. I and II C. II and III D. I, II and III 5. Which of the following is TRUE? 1

Upload: vudan

Post on 06-Apr-2018

216 views

Category:

Documents


2 download

TRANSCRIPT

Chapter 1 Basic Computer Concepts

Part I - Multiple Choice Questions1. Which of the following is NOT a hardware component of a computer system?

A. Central Processing UnitB. Operating systemC. Output deviceD. Memory

2. Which of the following is FALSE?A. Main memory is a hardware component of a computer system.B. Central Processing Unit functions as the “brain” of a computer.C. Computer software is the instructions that tell the computer what to do.D. A program is raw facts that tell a computer how to perform a task.

3. Which of the following is a program?A. MemoryB. KeyboardC. Central Processing UnitD. Operating system

4. Which of the following is/are the advantage(s) of mainframe computers over microcomputers?I. Mainframe computers have higher storage capacity.II. Processing speed of mainframe computers are faster than that of microcomputers.III.Mainframe computers are less expensive than microcomputers.A. I onlyB. I and IIC. II and IIID. I, II and III

5. Which of the following is TRUE?A. Computer software can be classified into system software and operating software.B. Hardware refers to the instructions that make a computer work.C. Computers accept input, process instructions and produce output.D. Data is a set of instructions that tells a computer to perform a specific task.

1

Part II - QuestionsLevel 11. (a) What are the five physical components of a computer system?

Input device, central processing unit, output device, main memory and backing store.(b) Which component of a computer system displays the processing results?

Output device

2. (a) What are the differences between computer hardware and software?Hardware is the physical components of a computer system. Software is a set of instructions that tells the computer what to do.

(b) Give one example of application software and one of system software.Application software : Microsoft Office 97System software : Windows NT

3. (a) Write down the difference between a program and data.A program is a set of instructions for a computer to perform a specific task. Data is raw facts about somebody or something.

(b) State the relation between a program and data.Data is raw facts while programs are instructions. A computer accepts data as its input and processes the data according to programs. The data will be transformed into information if the program is successfully executed.

Level 24. Compare the differences between mainframe computers, minicomputers and microcomputers in

terms of storage capacity, processing speed and cost in the following table.

Mainframe computer Minicomputer Microcomputer

Storage capacity Largest Large Small

Processing speed Highest High Relatively low

Cost Highest High Low

5. Choose the most appropriate type of computer to be used in the following situations. Explain your choice.(a) An office clerk in a secondary school has to prepare invitation letters for all the parents.

Microcomputer. It is because it is appropriate for handling office work and less expensive.(b) A company has to handle daily transactions of 100 supermarkets.

Minicomputer. It is because it can handle heavy volumes of transactions.(c) The school library has to install a database so that students can check the status of each

2

book in the library.Microcomputer. It is because its capacity is good enough to handle the database in a school library.

(d) A university has to provide network services for over 10,000 students.Mainframe computers. It is because over ten thousand students may use the system at the same time, a powerful computer is thus required.

5. When Mr. Chan checked the computer system at school, he found out several problems. First, one of the CPUs did not function. Second, two input devices had broken down. Third, one output device was damaged. What would happen if these problems are not solved?If the CPU is not replaced, data and instructions will not be processed. If the input devices are not repaired, data and instructions will not be able to accept. If the output device is not repaired, processing results will not be displayed.

Part III - Case StudyJack wanted to buy a computer for personal use; therefore he went to a computer store and sought the salesman’s advice. Here is the conversation between Jack and the salesman.Jack: I want to buy a computer for personal use. Which type of computers should I buy?Salesman: Well, I don’t think you need the big ones. The personal computers are good enough.Jack: Can I use the personal computer to do my homework, draw pictures and check my

monthly expenses?Salesman: Of course. Just buying the machine is not enough. You should also buy the programs.

1. What did the salesman mean when he said “the big ones”?Mainframe computer or minicomputer

2. What is the proper name of personal computers?Microcomputer

3. When the salesman told Jack to buy the machine and programs, he referred to two computer components. What are they?Hardware and software

4. Why must Jack buy the programs?Since a program is a set of instructions for a computer to perform a specific task, and Jack need to use the computer to do homework, draw pictures and check his monthly expenses, so he needs programs.

3

Chapter 2 Usage of Computers in Our Society

Part I - Multiple Choice Questions1. An embedded system

A. can be programmed by users.B. suggests solutions and makes recommendations to users.C. is used in speech and handwriting recognition.D. can be used in home appliances.

2. Robot is most suitable forB. fashion design.B. assembling cars.C. writing.D. producing movies.

3. The transfer of data electronically from one place to another isA. teleconference.B. expert system.C. telecommunications.D. telemarketing.

4. Which of the following statements is/are the advantage(s) of using multimedia presentation?I. It allows users to respond interactively.II. It is clear and easy to understand.III.It is attractive and interesting.A. I onlyB. I and IIC. II and IIID. I, II and III

5. Which of the following statements is false?A. Computer assisted learning benefits students only.B. Artificial intelligence makes computer systems behave intelligently like humans.C. Expert systems is a computer program that makes decisions or solves problem in a specific

field.D. Robots can be used to do mechanical or repetitive jobs.

4

Part II - QuestionsLevel 11. (a) What is an embedded system?

An embedded system is a built-in computer system for controlling a piece of equipment or machinery.

(b) List three machines or devices that have embedded systems.Camera, video cassette recorder and photocopier.

(c) Give one advantage and one disadvantage of using embedded systems.Advantage: It makes machine smarter and more user-friendly.

Disadvantage: It is difficult to modify the embedded system after the product is finished.

2. (a) What is the major difference between robotics and expert systems in terms of their functions?Robotics studies the use of computers in controlling robots to do mechanical or repetitive jobs. Expert systems can make decisions or solve problems in a specific field.

(b) Name two real life applications of robotics and expert systems.Robotics: (i) To handle explosive bombs.

(ii) To paint and polish automobiles.Expert systems: (i) To detect engine problem.

(ii) To search for oil.

3. What are the advantages of using computer assisted learning?Students can use computer assisted learning to review what they have learned in class. Furthermore, they can use it to evaluate their progress.

Level 24. Hong Kong International Airport has installed a computerized system to monitor the traffic in

the air.(a) Identify two functions of the air-traffic control system.

i. To control the ascent and descent of air-flights.ii. To avoid flight collisions in the air.

(b) What equipment is required for the monitoring and control system?A computer system

5. “Multimedia integrates all kinds of information.” Do you agree with this statement? Explain why.Yes. It is because multimedia is the combination of text, sound, graphics, images, animation, and video.

5

6. (a) Artificial intelligence attempts to simulate human intelligence. Do you think it can replace human intelligence? Explain your answer.No, artificial intelligence cannot replace human intelligence. It is because human beings have feelings and creativity

(b) List three applications of artificial intelligence.Voice recognitionHandwriting recognitionFinancial investment plan

Part III - Case StudyIn the summer vacation, ABC School students had a chance to visit an automobile manufacturer in Shenzhen.The assembly lines were automated, and the production activities could be seen on screen. The system would alert the supervisor whenever a problem occurred. According to the company supervisor, the company was conducting a joint project with a US company. Automobiles would be produced with built-in maps. The map could help drivers find out the shortest way to the destination. Since it was a new attempt, frequent communications between the two parties were required. Fortunately, the computers of the two companies were linked. They could easily exchange information. Sometimes, they would even have face-to-face discussion despite their geographical distance.1. In the automated assembly lines, which equipment should be used to do the screwing?

Robots

2. How can you tell that the company had installed a monitoring and control system?In the company, the system could show all the production activities on screen and could alert the supervisor whenever a problem occurred.

3. Can you explain how the company used the embedded system in its products?The company had built-in maps installed in automobles. These maps could help drivers find out the shortest way to the destination.

4. What type of computing technology was used by the company in exchanging information?Telecommunications

6

Chapter 3 Electronic Data Processing

Part I - Multiple Choice Questions1. Which of the following is NOT an example of electronic data processing?

A. Reserve an airline ticketB. Design a pictureC. Create a mailing list of customersD. Prepare payslips of employees

2. Which of the following statements about data is incorrect?C. Data is a collection of raw facts.B. Data can be in the form of text, picture and voice.C. Data is a collection of files.D. Data is the raw materials to produce useful information.

3. Which of the following systems is used to calculate employee salary?A. Mailing systemB. Payroll systemC. Point-of-sale systemD. Ticketing system

4. Which of the following is/are example(s) of electronic fund transfer system?I. Easy pay systemII. Ticketing systemIII.Payment by phoneA. I onlyB. I and IIC. I and IIID. I, II and III

5. Which of the following about point-of-sale system is true?A. It is used to transfer money from one account to another.B. It is designed for booking tickets.C. It is often used in banks.D. It is a computerized transaction processing system that records sales transactions.

7

Part II - QuestionsLevel 11. (a) What is the difference between data and information?

Data is a collection of raw facts. Information is processed data.(b) Why is it necessary to convert data into information?

Since data is a collection of raw facts only, it is not organized or structured. To make data meaningful and useful to users, it is necessary to convert data into information.

2. (a) Give three applications of electronic data processing.Payroll system, point-of-sale system and mailing list system

(b) Is it true that using ticketing system to reserve a seat is more accurate than human processing? Why?Yes, it is because information of the system is updated immediately, so the same seat will not be reserved again by other agents.

3. (a) Explain why the point-of-sale system is useful in retailing business.It helps the business analyze the sales patterns, stock levels and pricing strategies.

(b) Name two functions of payroll system.Payroll data is processed periodically and payslips are printed.

Level 25. A retailer plans to change from manual processing to electronic data processing.

(a) Give two reasons to justify the change.The retailer has expanded and the volume of data is increased. Therefore, it is more efficient to use electronic data processing. In addition, the company requires more accurate data in order to maintain its competence.

(b) Which new system will be required at the check-out counter?Point-of-sale system

5. UA7 runs several cinemas in different regions of Hong Kong. In the past, the audience had to visit the cinema and purchased tickets in person. The management now considers to use electronic data processing in order to provide better services for the audience.(a) Suggest a system that can improve the purchase and ordering procedures of UA7.

Ticketing system(b) Explain why the system in part (a) is used.

Large quantity of data transaction and accurate data is required.(c) What are the benefits to the audience of using the system mentioned in part (a).

i. The audience does not need to purchase tickets in person.ii. The audience can check the availability of seats in different cinemas.

8

Part III - Case StudyThe Student Union recruits members at the beginning of the school term. Committee members will visit every class to distribute and collect membership application forms. The application forms will be divided into two groups: existing members and new members. The data of new members will be entered into the computer system. The application forms of existing members will be checked for any change of information. These changes will be entered into the computer system. After the data is entered, the membership file will be updated. A new member list will be printed.1. What is the purpose of collecting application forms?

To collect data

2. Why is it necessary to divide the application forms into two groups?It can avoid entering the same data of existing members into the computer.

3. If the Student Union wants to send invitation letters to new members, what type of information should be created from the membership file?Mailing labels

4. Some committee members argue that it is NOT necessary to use the computer system to process the data. If you were the chairperson, how would you convince them?The data volume is great. It would be inefficient to handle the data manually. In addition, it is very important to maintain accurate membership information.

9

Chapter 4 Input and Output Devices

Part I - Multiple Choice Questions1. Which of the following is NOT an input device for a computer system?

A. DigitizerB. ScannerC. PrinterD. Touch screen

2. Which of the following output devices is suitable for producing posters?D. Liquid crystal display monitorB. Graph plotterC. Graphics display terminalD. Dot-matrix printer

3. Bar code readers are commonly used inA. public transportation.B. hospitals.C. restaurants.D. supermarkets.

4. Which of the following input devices are suitable for providing services via the Automatic Teller Machine (ATM)?I. Graphic tabletII. Touch-screen deviceIII.Magnetic strip card readerIV. Point-of-sale terminalA. I and IIB. II and IIIC. II, III and IVD. I, II, III and IV

5. A scanner can be used to capture the following items exceptA. graphics.B. photos.C. sound.D. handwriting.

10

Part II - QuestionsLevel 11. (a) Give two differences between a keyboard and a mouse.

i. A mouse can directly control the movement of a pointer but a keyboard cannot.ii. A mouse is suitable for drawing graphics whereas a keyboard is suitable for entering

numbers and characters into the computer system.(b) State two similarities between a Visual Display Unit (VDU) and a printer.

i. Both are output devices.ii. Both can display information to users.

(c) List two differences between a Visual Display Unit (VDU) and a printer.i. A VDU displays a soft copy while a printer displays a hard copy.ii. A VDU is faster than a printer in displaying output.

2. State the input and/or output device(s) which should be used in the following situations. (a) The cashier counter in a supermarket.

Input devices - Point-of-sale terminal and bar code reader(b) The design of an architectural floor plan for an airport.

Input device - A graphics tabletOutput device - A graph plotter

(c) The MTR turnstiles.Input device - Smart card reader

3. What are the advantages of using the sound/speech output device in electronic dictionaries?Users can listen to the correct pronunciation and make the learning process more interesting.

Level 26. The school secretary needs to prepare a letter to the students’ parents.

(b) What are the possible input devices that can be used by the secretary?A keyboard, a digitizer or a voice input device

(b) Give a reason for the choices in part (a).A keyboard works like a typewriter, and it is suitable for preparing text document. A digitizer is appropriate for entering Chinese character.A voice input device allows a user to create a text document by speaking to a microphone.

5. A hospital plans to install some inquiry terminals in the main lobbies so that the public can find out the hospital services by themselves.(a) What are the most appropriate input and output devices for these inquiry terminals?

Input device - Touch screenOutput device - Visual display unit

11

(b) What are the advantages of using the input and output devices in part (a)?A touch screen is an ideal input device for the public. It is because the user can search the information by touching the screen with a finger. A visual display unit is used because it can display information at high speed.

(c) What are the limitations of the devices suggested in part (a)?A touch screen is not suitable for the blind. A visual display unit cannot produce a hard copy.

6. The Computer Club has entered the “Keep Hong Kong Clean” poster design competition.(a) Which input and output devices would be used by the Computer Club?

A graphics tablet, a scanner, a mouse, a keyboard, a digitizer, a visual display unit and a printer

(b) The Computer Club wants to include a photo in the poster. Which input device should be used?A scanner, a digital camera or a digital video camera

(c) The Computer Club now wants to add some cartoons into the poster. Which input device should be used?A graphics tablet

(d) What are the advantages of using the input device in part (c)?A graphics tablet is a drawing and painting tool. A user can use it to create and modify drawings easily.

Part III - Case StudyCCC is a local publisher that publishes textbooks for secondary schools. In general, a textbook is produced in the following way:The textbook author gives the publisher the typescript. Then the editor of the publisher reads and modifies the text. The artist works on the page layout and adds photos and pictures such as cartoons and graphics into the text. Finally, a revised hard copy will be printed.Recently, CCC plans to produce some interactive compact disks for teaching and learning. The first CD will teach students English pronunciation. Furthermore, popular melodies will be used as background music. It is hoped that the CD will be useful to both teachers and students.1. Which input devices can help the artist who is not good at entering Chinese characters?

Voice input device or digitizer

2. What are the input devices that the artist needs in order to add photos and pictures in the document?Scanner, graphics tablet, digital camera or digital video camera

12

3. Name two output devices that should be used to produce the textbook? Explain your answer.Monitor and printer. To make modifications on the soft copy, the editor and artist needs to view the file on screen. A printer is required when a hard copy is printed.

4. What type of input and output devices must be used for the production of compact disks that teach English pronunciation? Explain why.Voice input device and sound/speech output device. Voice input device records correct English pronunciation while sound/speech output device plays the English pronunciation.

13

Chapter 5 Main Memory and Backing Storage

Part I - Multiple Choice Questions1. Which of the following media is not used for storage?

A. CD-ROMB. Cartridge tapeC. Hard diskD. Scanner

2. Each memory location in the main memoryE. must store the same type of data.B. has a unique memory address.C. provides permanent storage for data.D. is a path that is made up of electric wires.

3. Backing storage is used becauseA. it can store a large amount of data.B. it provides faster speed.C. data stored in it cannot be changed.D. it is smaller in size.

4. Which of the following expressions is correct?A. 1 megabyte < 1 terabyte < 1 kilobyte < 1 gigabyteB. 1 terabyte < 1 gigabyte < 1 megabyte < 1 kilobyteC. 1 kilobyte < 1 megabyte < 1 gigabyte < 1 terabyteD. 1 gigabyte < 1 kilobyte < 1 terabyte < 1 megabyte

5. Which of the following statements is/are correct?I. RAM is nonvolatile.II. RAM is used for temporary storage.IV. RAM is located inside a computer.A. I onlyB. I and IIC. II and IIID. I, II and III

14

Part II - QuestionsLevel 11. (a) List three limitations of the main memory.

iii. There is not enough space to hold all data and programs.iv. When the computer is turned off, all data and programs stored in RAM will be lost.v. It is relatively expensive.

(b) What are the differences between RAM and ROM?i. RAM stores temporary data and instructions while ROM stores permanent data and

instructions.iii. Users can read data from RAM or write into it. However, users can read data from

ROM but cannot write into it.iv. RAM is volatile while ROM is nonvolatile.

2. (a) What are the advantages of using CD-ROM?i. It can store a large volume of data.ii. Data stored in CD-ROM will not be easily erased.iii. The cost is relatively low.

(b) What are the disadvantages of using CD-ROM?CD-ROM stores read-only data. Data stored on CD-ROM cannot be updated or modified.

3. Compare CD-RW to DVD in terms of the following aspects: (a) storage capacity

CD-RW stores less data than DVD.(b) access method

Both use the direct access method.

Level 27. Working on his computer, Tom comes across the following problems. How could Tom solve

these problems?(c) His computer is always out of memory although there is a lot of space on the hard disk.

Tom needs to increase the storage capacity of RAM.(b) Tom wants to copy a compressed file for his friend, the compressed file is about 1

megabyte.Tom could use a floppy disk to store the file for his friend.

5. Jack, a computer assistant, needs to back up the School Administration and Management data every day.(a) Why is it necessary to back up the data every day?

Data can be recovered if the data is lost accidentally.

15

(b) Which storage medium should be used to back up a large amount of data?Magnetic tapes

(c) List one advantage and one disadvantage of using the storage media in (b)?Advantage (any one)i. Magnetic tapes can store a large amount of data. ii. Less expensiveDisadvantage (any one)i. The access time is slow since magnetic tapes adopt the sequential access method.ii. To access a file, the computer need to read all the preceding files.

6. Hong Kong Film Production Limited has produced a movie and plans to distribute the movie to different countries. Therefore, it is necessary to store the movie on a storage medium. The company has several options: magnetic tapes, compact disks, hard disks and digital video disks.(a) Suggest the most appropriate storage medium. Give reasons.

DVD. DVD has very large storage capacity. A double-sided DVD can store 17 gigabytes of data.

(b) Give three real life applications that use compact disks and digital video disks.i. Multimedia encyclopediaii. Computer gamesiii. Movies

Part III - Case StudyJack is a computer laboratory assistant. Every day, he needs to handle many computer-related problems. When he was working in the laboratory one afternoon, a student came up with a problem.Student: Jack, I created a file this morning, but it is lost now.Jack: Have you checked your own floppy disk and the hard disk?Student: Yes, I have. But it is not there.Jack: What did you do before you logged out?Student: I did not follow the normal log out procedures. I just turned off the computer.Jack: Did you do one important thing before you turned off the computer?Student: Oh, no! I forgot to do it.1. If the student really lost the file, what would be the most probable reason?

The student forgot to save his file before turned off the computer.

2. When the student turned off the computer, what would happen to the programs and data stored in the RAM? Why?When student turned off the computer, all the data and programs stored in the RAM would be lost. It is because RAM is volatile and is used for temporary storage.

16

3. The computer teacher asked Jack to prepare some storage devices and media, as the students would need to save some multimedia assignments. What should Jack prepare?CD-R and CD-R drive. It is because multimedia presentations require large memory size, and each CD-R can store 650 megabytes of data.

4. Jack needs to back up all the programs and data for the school office everyday. Which storage media should Jack use? Why?Magnetic tapes. It is because magnetic tapes are not expensive, and each tape can store a large amount of data.

17

Chapter 6 Computer Communication and Networking

Part I - Multiple Choice Questions1. The advantage(s) of using network include(s)

I. sharing computing resources.II. efficient communications.III. sharing data.IV. reducing cost.A. I and IIB. I, II and IIIC. II, III and IVD. I, II, III and IV

2. The following network is a

F. wide area network.B. bus network.C. star network.D. ring network.

3. A LAN isA. a geographical network.B. a network that connects computers and peripheral devices within the same building.C. a device connected to a network.D. a large centralized computer.

4. The typical hardware requirements for a network includeA. telephone lines, modems and communications software.B. printers, terminals and computers.C. terminals, modems, telephone lines and cables.D. e-mail, modems and computers.

5. Which of the following is not a network topology?I. RAM is nonvolatile.

18

II. RAM is used for temporary storage.V. RAM is located inside a computer.A. Ring networkG. Bus networkC. Line networkD. Star network

19

Part II - QuestionsLevel 11. (a) What are the advantages of networking?

vi. Sharing data and informationvii. Sharing computing resourcesviii. Efficient communications

(b) Name three computer network topologies.Star network, bus network and ring network

2. (a) What are the differences between LAN and WAN?A LAN connects a group of computers and peripherals within a relatively small area. A WAN is a communications network that connects widely dispersed geographic areas.

(b) Give two examples for LAN and WAN respectively.LAN - The school library and the computer laboratory in schoolWAN - Hong Kong Telecom and Hong Kong Education Department

4. In a computer network, computers are connected by some hardware. (b) What will be the hardware requirements if it is a local area network?

Telephone lines, coaxial cables and modems(b) What will be the hardware requirements if it is a wide area network?

Optical fibres, microwaves and satellites(c) What is the function of a modem?

A modem can convert data from digital signals into analog signals and vice versa.

Level 28. ABC company has a medium-sized office in a commercial building. To computerize the

administrative work, the company wants to build a computer network to connect all stand-alone computers.(d) Why is a computer network better than stand-alone computers?

If the computers are connected to a network, network users can communicate efficiently. They can exchange data and information between computers. Furthermore, computer resources can be shared.

(b) Which type of network should be used?Local area network

(c) Which topology will be more appropriate if the company needs a stable and reliable network?Bus network

5. The Hong Kong Computer Society plans to organize a computer exhibition in the Hong Kong

20

Convention and Exhibition Centre. Over 300 computer manufacturers and suppliers will be invited. In addition, famous scholars will deliver speeches in the exhibition.(a) What will be the most efficient way to send out the invitations to the computer

manufacturers and suppliers around the world?Electronic mail

(b) Can you suggest a method by which famous scholars can deliver speeches at the exhibition without coming to Hong Kong?Teleconferencing enables scholars to deliver speeches in the exhibition without coming to Hong Kong.

6. Company A and Company B have their own company networks. However, these two networks cannot communicate with each other. Why? The two networks do not use the same set of communication protocol.

Part III - Case StudyABC Trader is a medium-sized trading company. The company is going to use information technology to streamline its operations. First, customers could place orders on the Internet. Second, most of the company files could be accessed by the company employees. Third, business correspondence and memorandum would be prepared electronically. It is expected that these measures can reduce one-third of the processing time on customer orders.1. A customer has bought a new computer with a built-in modem. But the customer could not

place an order through the Internet. Why?The customer may not have an Internet account.

2. What would be the most efficient processing for business correspondence and memorandum?Electronic mail

3. How can the company manager access the company computers at home? What device is required?The company manager can access the company computers at home through telephone line. A modem is always required when data is transmitted over telephone lines.

4. ABC Trader hires 10 employees who share the same office. The employees used to save information on stand-alone computers. How could the employees share information efficiently and effectively? List the advantages of your recommendations.The company should set up a local area network that the employees can share information efficiently and effectively. As a result, the employees can share valuable resources such as company files and information, some hardware and software.

21

Chapter 7 Files and Databases

Part I - Multiple Choice Questions1. Which of the following gives the correct order of data hierarchy from the bottom to the top?

A. File, record, field, characterB. Field, file, character, recordC. Record, character, file, fieldD. Character, field, record, file

3. A database management systemH. refers to the procedures used to acquire, access and maintain data.B. is a software that allows users to create and maintain a database.C. is a person who manages the database.D. is the procedures used to keep data up-to-date.

3. Sequential files are suitable forI. ATM systemII. Monthly billing systemIII. Payroll systemIV. Library inquiry system.A. I and IIB. II and IIIC. II, III and IVD. I, II, III and IV

4. Which of the following is not the Structured Query Language command?A. SELECTB. UPDATEC. CREATED. ACCESS

5. Which of the following is NOT a means of file protection and security?A. Backup filesI. Encrypted dataJ. Write-protected disks or tapesD. High performance computer

22

Part II - QuestionsLevel 11. (a) What is the main difference between a direct access file and a sequential file?

In a direct access file, the location of a particular record is usually determined by the data value of its key field. In a sequential file, records are stored physically one after another.

(b) Give two advantages of using direct access files rather than sequential files.i. Files can be updated easily.ii. It is possible to store a record in its original location after amendment.

2. (a) State the difference between master files and transaction files.A master file stores relatively permanent information. A transaction file stores relatively transient data.

(b) The student file stores personal particulars of students. The enrollment file stores personal particulars of new students. Explain why it is necessary to merge these two files to create a new file.When the student file and the enrollment file is merged, data in the enrollment file will be updated to the master file. As a result, the student file will include up-to-date student information.

3. (a) What is the function of a database?A database collects, classifies, stores and displays data systematically. It integrates interrelated data.

(b) Give three reasons to support the statement “Databases are better than traditional files in file organization”.i. Data redundancy is reduced. ii. Data integrity can be maintained. iii. Data can be shared between users.

Level 29. Name the file operation in the following situations.

(e) Mary opens her homework file that she created last week.Retrieving

(b) Jack enters the singer’s name to find out his favorite CD.Searching

(c) The data operator changes a customer’s address because the customer has moved recently.Updating

(d) The data operator changes the customer address because the flat number is incorrect.Amending

23

5. HKLine is a company that provides Internet services. Customers can use the Internet services to send e-mail and transfer files. In addition, customers can read daily news on their computers. However, each customer must key in two sets of data before accessing the company services.(a) What are these two sets of data?

User’s account number and password(b) Why is it necessary for each customer to key in these two sets of data?

The company needs the user’s account number and password in order to identify the authorized user.

(c) A customer wants to send a confidential file by e-mail. Suggest a method to prevent the file from unauthorized reading.The customer can encrypt the file data before sending it by e-mail.

6. The telephone billing system bills its customers at the end of each month. The master file stores customer name, customer address and customer telephone number.(a) Can the company use the customer name to identify a specific customer? Explain.

No, it is because some customers may have the same name.(b) Name ONE or more data which should be included in order to identify a specific customer.

Customer account number(c) The transaction file stores the telephone expenses of each month. Which data should be

included in the transaction file?Customer account number, monthly expense, amount due

Part III - Case StudyThe Central Library has set up a multimedia center where citizens can enjoy CDs and VCDs. To borrow a VCD, the citizen needs to tell the librarian the name of the movie, the director or the actor/actress. But the fastest way to search a movie is to enter the ISBN for that movie.1. What are the advantages and disadvantages to search VCDs by the name of actor/actress?

Advantage: Citizens can easily tell the librarian the name of the actor or actress.Disadvantage: An actor or actress may act in more than one movie. If the movie is searched by

the name of the actor or actress, a list of movies will be returned to the user. As a result, the searching process is prolonged.

2. The library database can store the complete names of the movie and the actor/actress regardless of the actual data size. Can you explain the reason?The database consists of variable-length records. In a variable length record, the number of fields or the field size varies according to the actual data.

3. Why is it that the fastest way to search a movie is to enter the ISBN?ISBN is the key field of the database. A key field is a field that identify a record uniquely.

24

4. The library is going to set up a computerized inquiry system so that citizens can search the movies by themselves. Which type of access method is preferred? Why?Direct Access. Direct access is appropriate for public inquiry because of two major advantages: First, it is fast to access a record because it needs to search the record only one time. Second, it is flexible since the computer can access a record without affecting other records.

25

Chapter 8 Data Management

Part I - Multiple Choice Questions1. Which of the following methods can be used to detect the error:

LEE HOI MING is mistyped as LEE HO1 MINGA. Presence checkB. Reasonable checkC. Range checkD. Type check

2. Which of the following applications is/are example(s) of using check digits?I. Telephone numberII. Hong Kong identity card numberIII. Bank account numberIV. Student seat numberA. I and IIB. II and IIIC. II, III and IVD. I, II, III and IV

3. Data verification is used toA. ensure the accuracy of data.B. detect input errors.C. prevent data omission.D. make sure the input data is within the correct range.

4. Which of the following is not a data validation method?A. Error checkB. Check digitC. Control totalD. Type check

5. By using weighted modulo 11 check method, find the check digit of 246.A. 1B. 3C. 5D. 7

26

27

Part II - QuestionsLevel 11. (a) Explain why it is important to maintain data accuracy and completeness.

It is because incorrect data input will give rise to incorrect output. The incorrect output may lead to incorrect decisions.

(b) List three possible factors that cause data errors.Careless mistakes, human faults and computer program problems

2. (a) What is the difference between data verification and data validation?Data verification is the process of checking whether data has been correctly transcribed. Data validation is the process of checking whether the data input meets the predefined criteria.

(b) Name two methods of data verification.Double entry and parallel entry

3. (a) Name three methods, other than presence check, to validate data.Range check, type check and check digit

(b) What is the purpose of presence check?It prevents data omission.

Level 24. The design of the SFC Bank credit card is shown below:

(a) Suggest a validation method used to check the name field. Briefly explain your answer. Type check. It is because the name field should include alphabets only.

(b) Which validation method should be used to check the date field? Why?Range check. It is because the day should be between 1 and 31 while the month should be between 1 and 12.

(c) The accuracy of an account number is very important. How can the bank ensure that the account numbers are entered correctly?The bank should add a check digit to each account number. If any number is entered incorrectly, the account number will be rejected.

5. ABC school has decided to add a check digit (rightmost digit) to the student number. The algorithm to calculate the check digit is given below:

28

Step 1: From left to right, multiply the 1st digit by 9,2nd digit by 8,3rd digit by 7,4th digit by 6,5th digit by 5,6th digit by 4,7th digit by 3,8th digit by 2.

Step 2: Add up the products.Step 3: Divide the sum by 11 and find the remainder.Step 4: Subtract the remainder from 11 to get the check digit.

(a) Work out the check digit for the student number 34102895.

(b) A check digit is assigned to the student number as 123456789. Check whether the last digit is a valid check digit.

29

The last digit of the student number is a valid check digit.

6. Being the database administrator in a company, you need to ensure that data on the source documents is correctly and completely entered into the computer system.(a) If you have two data operators in your team, how can you verify the data input is correct?

The same batch of source documents should be entered independently by two operators. The computer system will print out an error report if two identical records are different. Then check the error report and make necessary corrections.

(b) The sales manager sends you application forms in batches. What will be your best evidence to prove that the complete data of all the application forms has been entered?The control total report which includes record count will be the best evidence. If the record count is equal to the number of application forms received, it means that all the customer application forms are entered.

Part III - Case StudyAn election office is preparing for the coming Legislative Council Election. Personal data from eligible voters must first be collected. The data is then entered into the computer system. The computer then prints a letter to each individual registered voter informing him/her regional constituency.The election officer has found out some problems.1. Some fields in the forms are not entered. Try to state a data validation method that can detect

this problem.Presence check

30

2. In the date-of-birth field, 31/06/1973 is entered. Try to state a data validation method that can detect this problem.Range check

3. “0” is misread as “6” and “n” is misinterpreted as “u”. State a method that can detect this error.Double entry or parallel entry

4. Some registration forms are not processed. State a method that can detect this problem.Control total

31

Chapter 9 Representation of Data

Part I - Multiple Choice Questions1. Which of the following is a hexadecimal number?

A. 2001HCFB. B4C5D6EC. 37CS20ED. ANSWER

2. The decimal number of 1101012 isA. 106.B. 58.C. 53.D. 28.

3. Which type of error occurred when is written as 3.142?

A. Truncation errorB. Overflow errorC. Rounding errorD. Underflow error

4. The problem of sign-and-magnitude representation is thatA. it requires simple circuitry for performing arithmetic.B. the magnitude and the sign of a number are represented separately.C. it cannot be used to represent a floating point number.D. zero can be represented in two different ways.

5. The range of a 9-bit fixed point representation in two’s complement isA. 256 to 255.B. 256 to 256.C. 255 to 255.D. 255 to 256.

32

Part II - QuestionsLevel 11. (a) Convert 1510 to a binary number.

(b) Convert ABC16 to a binary number.

(c) Convert 5678 to a hexadecimal number.

2. Compute the following arithmetical expressions with the 8-bit two’s complement representation.(a) 12 + 21

(b) 33 40

(c) 52 28

33

3. (a) Express the following integers in sign-and-magnitude representation and two’s complement representation using 6-bit pattern.

Integer Sign-and-magnitude representation

Two’s complement representation

21 010101 010101

23 110111 101001

(b) Write down the bit pattern of the string “ASC”.

A : 1000001S : 1010011C : 1000011

Level 27. Rewrite the following numbers in bit-patterns.

(a) 199910

(b) 2468

(c) AB16

34

8. A register in the computer uses 7-bit to represent integers.

(a) Write down the following integers in the sign-and-magnitude representation.(i) 6110

(ii) 2910

(c) What is the largest integer that can be represented in the register?+ 6310

(c) What is the smallest integer that can be represented in the register?6410

Part III - Case StudyBelow is a tic-tac-toe gameboard, and each number represents a unique position on the board.1 2 34 5 67 8 9Rules of the game are as follows:I. There are only two players in this game.II. The one who gets three X’s or O’s in any single row, column or diagonal is the winner.III.Each move is represented in a 4-bit binary number.IV. The final results will be displayed in 6 bits.

(i) Bit 0 to bit 3 represent each move.

35

1 = 00012 = 00103 = 00114 = 01005 = 01016 = 01107 = 01118 = 10009 = 1001

(ii) Bit 4 and bit 5 are used to represent the possible results:00 = the result is unknown01 = the first player wins the game10 = the second player wins the game11 = the result is a tie

Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0

1. Why are four bits required to represent all the possible moves on the gameboard?There are nine possible moves on the board. If three bits are used, only eight possible moves can be represented (23 = 8). Therefore, four bits are required (24 = 16).

2. David and Amy are playing the game. David moves first, and their moves are as follows:David Amy

First Move 0011 1001Second Move 0101 0111Third Move 0010

(a) It is Amy’s move now. Suggest the move that will enable Amy to win the gam.1000

(b) Write down the final results in 6 bits.101000

3. David and Amy take the following moves:David Amy0101 01100011 0111

(a) Suggest the move(s) that David should take to win the game.0001 or 0010

(b) Write down the move(s) that David should take to get a tie.

36

1000 or 1001

37

Chapter 10 Operating Modes

Part I - Multiple Choice Questions1. Which of the following are the advantages of batch processing?

I. The computer resources can be utilized more efficiently.II. It can reduce operation costs.III. It provides updated information.A. I and IIB. I and IIIC. II and IIID. I, II, and III

2. Which of the following is true about real-time processing?A. Users cannot get the latest information.B. It can be an on-line or off-line system.C. Users can get instant response from the computer system.D. It provides a high degree of security.

3. Multi-taskingA. allows users to run multiple operating systems at the same time.B. allows users to access several applications at the same time.C. reduces the computer throughput.D. allows several users to run the same programs at the same time.

4. Which of the following is a real life example of batch processing?A. Marking HKCEE examination papersB. Processing ATM fund transferC. Playing computer gamesD. Booking tennis courts

5. “Users communicate with the computer system directly and continually. They can modify data and receive feedback from the system for guidance and verification.” This describes theA. batch processing.B. interactive processing.C. multi-user processing.D. off-line processing.

38

Part II - QuestionsLevel 11. (a) Write down three features of on-line processing.

i. The input/output devices are controlled by the computer system.ii. The input/output devices are physically connected to the computer system.iii. Data can be directly entered into the computer system.

(d) Under what conditions should on-line and off-line processing be used?On-line processing should be used when updated information and fast response from the computer system are required. Off-line processing should be used when data is collected in groups before data input.

2. (a) What is the difference between real-time processing and batch processing?In real-time processing, data is processed as soon as it is entered into the computer system. The system always reflects the most updated data. Batch processing cannot reflect the most updated data. It is because data is accumulated in batches before it is processed by the computer system.

(b) Give two advantages of using real-time processing over batch processing.i. There is no time lag between data collection and data processing.ii. The user can always get the fastest and most updated information from the computer

system.

3. (a) What is the characteristic of using multi-tasking in data processing?A computer system can work on more than one task at one time.

(c) “Interactive processing requires a certain extent of user participation. Therefore, interactive processing must be operated by the multi-user mode.” Is this statement correct? Give reasons.No, the interactive processing can serve one user at a time.

Level 29. Below is a list of data processing procedures:

i. The master file is updated.ii. The data is entered into the computer system.iii. The application forms are filled in by students.iv. The application forms are collected by class teachers.v. New membership lists and cards are printed.vi. The application forms are classified and compiled into batches.

(b) Write down the correct order of the above procedures.iii iv vi ii i v

(b) Name the operating mode that should be used to process the above procedures. Briefly

39

explain your answer.Batch processing. It is because the application forms have to be collected and classified before they can be entered into the computer system. Most likely, the application forms are handled in batches over a period of time. Therefore, batch processing should be used.

10. State the most appropriate operating mode for each of the following situations:(b) Peace Cinema provides advance booking service on the Internet. To order movie tickets,

customers need to select the film, seat, date and time.Interactive processing

(d) Multiple users access the homepage of the Hong Kong Government at the same time.Multi-user system

(c) Heathplus Hospital has installed a computer system that monitors the patient’s health conditions during a surgical operation.Real-time processing

6. The MTR maintains computer records for train arrivals and departures.(a) Describe the most suitable operating mode to process these records.

Real-time processing. It is because the company needs the most updated information in order to monitor the traffic.

(b) Would you suggest using batch processing? Explain why.No, it is because batch processing cannot reflect the latest information to its users, and the whole file must be updated even if only one change is required. If batch processing is used, current traffic data will not be available. As a result, the company cannot give immediate response when train accidents and delays occur.

Part III - Case StudyHong Kong Freight is an airfreight company which handles 4 000 tons of cargoes each day. The company takes customer orders by phone. After an order is confirmed, the information will be updated to the freight-scheduling system. The company bills the customers after the cargoes are delivered.1. Which processing method should be used for taking orders? Why?

Real-time processing should be used since the company needs to know the latest information before taking an order.

4. Which processing method should be used for handling customer bills? What are the advantages of this method?Batch processing. First, billing data can be checked before it is entered into the computer system. Second, large amount of transactions can be processed when the computer system is not so busy. Third, the operation cost for batch processing is less expensive than real-time

40

processing.

5. If the company needs to check the customer’s record before accepting an order, which operating mode should be used? Explain.Multi-tasking. Multi-tasking means that a computer system can work on more than one task at one time. It is the appropriate operating mode because the company needs to check customer’s records and take orders simultaneously.

4. Hong Kong Freight requires that order-taking employees should be able to access the freight-schedule system simultaneously. Suggest an appropriate operating mode in order to achieve this company objective.Multi-user processing. In multi-user processing, different users can access the same computer system simultaneously.

41

Chapter 11 Operating a Microcomputer System

Part I - Multiple Choice Questions1. Which of the following is used to organize and group computer files?

A. PathB. MenuC. DirectoryD. Window

2. Which of the following is not a file operation?A. Saving filesB. Classifying filesC. Removing filesD. Retrieving files

3. The file Exercise1 is stored in the Homework directory. Homework directory is in a directory named Physics of drive C. Which is the correct path to locate the file Exercise1?A. Physics\C:\Homework\Exercise1B. Homework\Exercise1\C:\PhysicsC. C:\Exercise1\Homework\PhysicsD. C:\Physics\Homework\Exercise1

4. Which of the following is not a Chinese input method?A. Tsang-jei input methodB. Stroke number input methodC. Handwriting input methodD. User-friendly input method

5. Which of the following describes the above diagram?

A. File systemB. Pull-down menuC. A window

42

D. Cascading menu

43

Part II - QuestionsLevel 11. (a) What is the function of the filing system in a computer?

Computer files can be stored systematically.(e) Briefly describe the information that a user can find in a directory.

File location, file type, file size and file amendment date

2. (a) In the Window environment, the user may click either an icon or select a menu option to access a command. What is the difference between an icon and a menu?A menu is a list of options in text format while an icon is a graphical symbol.

(b) Name the file operations of the following situations:(i) Write data to a compact disk.

Saving files(ii) Remove a file from a floppy disk.

Deleting files(iii) Duplicate all records in directory A to directory C.

Copying files(iv)Locate and read a file from the hard disk.

Loading files

3. (a) Name the most user-friendly Chinese character input method.Handwriting input method

(d) To enter a Chinese character, a user has two methods:Method 1: Use a pen-like stylus and a pen tablet.Method 2: Use a keyboard to enter codes.

(i) Give one advantage of method 1 over method 2.Method 1 is very convenient to users who do not know Chinese input methods.

(ii) Give one advantage of method 2 over method 1.Method 2 can get Chinese characters directly and quickly because it does not have to analyze the handwriting before getting codes.

Level 24. (a) Draw the structure of the following filing system.

(i) The root directory is drive D.(ii) Three sub-directories exist in the root directory. The sub-directories are Home, School

and Game.(iii) There are two sub-directories, CS and Chinese, in School directory.(iv)Directory Game stores two files: QuakeII and Cyberx.(v) Directory CS contains two files: Hw1 and Hw2.

44

(vi)Directory Chinese also contains two files: Hw3 and Hw4.

(b) Write down the path to get the following files:(i) The file Hw1

D:\School\CS\Hw1(ii) The file Cyberx

D:\Game\Cyberx

5. Describe the steps to perform the following tasks in the Window environment.(a) Use the icon to open a file in the hard disk.

Step 1: Select the correct directory where the file locates.Step 2: Double click the icon of the file to open it.

(b) Use the menu to print the current file.Step 1: Click the File menu from the menu bar.Step 2: Select Print from the pull down menu.Step 3: Select the printing option in the dialog box.Step 4: Click the OK button to print.

6. The following table shows the Chinese character codes for some Chinese character components:

Chinese Character Code Chinese Character Component

A 日B 月C 金D 木E 水F 火G 土

(a) With reference to the above table, suggest the most possible Chinese characters which matches the following codes.(i) AB

45

明(ii) CCC鑫

(iii) FG灶

(iv)DGG桂

(b) Write down the number of strokes for the following Chinese characters.(i) 為

9(ii)難

17(iii) 怪

8

Part III - Case StudyTommy has installed his first personal computer, and he can run an application by clicking a graphical symbol. He will use his computer to create some artwork and to do his assignments such as English, Chinese and Computer Studies. He will also use the computer to create some artwork.1. How should Tommy create his computer file system so that he can easily find an assignment on

specific subjects?Tommy should create a directory for his assignment. In the directory, he should create a sub-directory for each subject.

6. Tommy has to create some artwork for his text assignments. How can Tommy view both his assignment file and the artwork file at the same time?Tommy can open two windows on the screen, one for the assignment and one for the artwork.

7. What is the correct computer term for graphical symbols in a computer? What are the advantages of using graphical symbols?Icon. Icons are easy to understand and provide quick access to programs or files.

4. Name three methods that Tommy can use to input Chinese characters.Tsang-jei input method, handwriting input method, and stroke number input method

46

Chapter 12 Word Processor and Spreadsheet

Part I - Multiple Choice Questions1. A word processor is not suitable for

A. creating letters, memos, reports and contracts.B. checking the grammar and spelling of a document.C. generating tables.D. compiling programs.

2. How many cells are there in the range K2:N7 in a spreadsheet?A. 24B. 18C. 15D. 10

3. Which of the following chart cannot be created in a spreadsheet?A. Column chartB. Volume chartC. Radar chart

D. 3-D pie chart

4. The formula=SUM(C2:C4, D5:D8)

is stored in cell E1. What will be the formula in cell E2 if the contents in cell E1 is copied to E2?A. =SUM(C2:C4, D5:D8)B. =SUM(D2:D4, E5:E8)C. =SUM(C3:C5, D6:D9)D. =SUM(D3:D5, E6:E9)

5. Which of the following is/are formatting feature(s) in word processing?I. Page breakII. MarginsIII.UnderlineIV. SearchA. I onlyB. I and IIC. I, II and IIID. II, III and IV

47

Part II - QuestionsLevel 11. (a) What are the advantages of using a word processor over a typewriter?

Users can easily create, edit and format a document. In addition, users can save documents for future use without typing again.

(b) Write down three types of document that can be prepared by a word processor.Letters, newsletters and reports

2. (a) List three different ways of aligning a paragraph.Align left, align right and center

(b) List five editing features of a word processor.Insert, delete, cut, copy and paste

3. (a) What is the difference between absolute address and relative address?Absolute address refers to the cell address in a formula that does not change when the formula is copied to another cell. It has the form $C$R. Relative address refers to the cell address in a formula that will be adjusted automatically when the formula is copied from one cell to another. It has the form CR.

(b) Under what situation(s) should absolute address used?If someone wants to copy a formula but does not want to change the cell address in it, one should use the absolute address in the formula.

Level 24. The figure shows the cover of a computer dictionary created by Microsoft Word.

(a) Name the possible format features used on the cover.The possible format features used on the cover are:i. underline (the company name)ii. bold (the title)iii. center (the title and subtitle)iv. align right (the author name)

48

(b) State the commands that can move the author name from the lower right hand corner to the center just below ‘A Comprehensive Tool for School’.Cut and paste

5. The following is a worksheet that records the revenue of a student bookstore.A B C D E F

1 Student Bookstore2 Income Statement3 Quarter 1 Quarter 2 Quarter 3 Quarter 4 Total4 Sales 13000 14000 30000 150005 Cost 10000 11000 20000 120006 Profit 3000 3000 10000 30007

(a) Name the cell range that stores the values of sales, cost and profit of all four quarters in the above worksheet.B4 to E6

(b) If cell F4 stores a formula which gives the total sales revenue,(i) write down the contents in cell F4.

=SUM(B4:E4)(ii) write down the value displayed in cell F4.

72000(c) Suppose cell F7 stores a function that finds out the maximum quarterly profits,

(i) write down the contents in cell F7.=MAX(B6:E6)

(ii) write down the value displayed in cell F7.10000

6. Mary is an accounts clerk who has to prepare financial reports such as the profit and loss statements. She usually adds a front page on the financial reports. The front page includes the company name and a few comments on the company’s financial situation.(a) Name the application software that Mary needs in order to complete her job.

Word processor, spreadsheet(b) The General Manager wants to know the difference in sales for the past two years. Suggest

a chart that Mary can use to present the comparison precisely.Bar chart

49

Part III - Case StudyThe following table contains the latest population data of each district in a city. Based on these data, town planners plan the city’s development.

District Current Population Projected PopulationA 1000000 6000000B 1500000 5000000C 3000000 4500000D 5000000 8000000E 7000000 10000000

1. If you need to compare the current population and projected population in each district, which type of chart will you use?Bar chart

2. Which chart is the most appropriate to present the distribution percentage of current population in the city?Pie chart

3. Write down the labels in the population data spreadsheet.Current Population, Projected Population, District, A, B, C, D, E

4. Describe the easiest way to calculate the total, average, minimum and maximum population distribution.The easiest way to calculate the total, average, minimum and maximum population distribution is using the functions SUM, AVERAGE, MIN and MAX.

5. What are the advantages of using charts to display numerical data?The advantage of using charts to display numerical data is the overall meaning of data and its trends can be easily shown.

50

Chapter 13 Using Databases and Graphics Software

Part I - Multiple Choice Questions1. The database is suitable for

A. creating letters and memos.B. checking grammar.C. compiling a program.D. organizing information.

2. Which of the following is an invalid data type in a database?A. RealB. CharacterC. NumericD. Memo

3. Which of the following can be included in the structure of database table?I. The field typeII. The field nameIII.The field widthIV. The field areaA. I onlyB. II onlyC. I, II and IIID. I, III and IV

4. Which of the following commands can be used to change the contents of a record?A. EditB. SortC. SearchD. Print

5. Which of the following objects can be produced by a drawing tool?I. II. III.

A. I onlyB. I and II

51

C. II and IIID. I, II and III

52

Part II - QuestionsLevel 11. What are the issues that a user should consider when designing a database?

The number of tables, the contents of each table, the structures of each table and the relation between tables.

2. Write down three common functions of a graphics package.Drawing pictures, adding text and creating geometric shapes

3. List three common functions that can be found in a database.Searching and sorting records, printing in label or report form and changing database records

Level 24. Consider the following table:

Student Number Student Name Date of Birth990001 Chan Tai Man 30-06-1987990002 Chu Yan Yan 15-09-1986

(a) List the field name(s) in the above table.Student Number, Student Name and Date of Birth

(b) List the data type(s) of each field in the above table.Student Number : numberStudent Name : characterDate of Birth : date

5. ‘Graphics software is designed for professionals.’ Is this statement true? Explain.The statement is not true because many graphics software are designed to help people (not only professionals) to draw graphs.

6. ‘The user of graphics software must use a graphics tablet to create drawings on the computer.’ Do you agree to this statement? Explain.No, it is because the user can also use the mouse or other input devices to control the drawing tools in the graphics software to draw picture.

Part III - Case StudyABC School offers tutorials to Secondary 5 students. The school has a database to record student particulars, course information and class enrollment details.

1. If two students have the same name, how can the database differentiate their records?

53

Since each student has a unique student number, so the database can differentiate his or her records by the student number.

2. If the school wants to maintain a mailing list for students, which fields should be included in the database?Student number, student name and mail address

3. If the school needs to print a class list, which fields should be included on the list?Class name, student number and student name

4. If the database has only three tables, suggest the contents of each table.Student particulars, the course information and the class enrollment

5. Suppose the school provides a tutorial for the Secondary 5 students. Is it necessary for the school to maintain a student table to record student particulars?No, it is not necessary for the school to maintain a student table to record student particulars since there is only one tutorial provided for the Secondary 5 students.

54

Chapter 14 Using the Internet

Part I - Multiple Choice Questions1. Which protocol is used by the Internet to communicate with one another?

A. TPP/CPB. TIP/CPC. TCP/IPD. TPC/IP

2. If you want to search local government information from the Internet, which of the following web sites are you likely to visit?A. http://courseware.ust.hkB. http://www.info.gov.hkC. http://www.shareware.comD. http://www.cuhk.edu.hk

3. Which of the following activities can be found on the Internet?I. Sending and receiving e-mail.II. Accessing the world-wide web.III.Searching information.A. I onlyB. I and II C. II and III D. I, II and III

4. The Internet isA. controlled by a central government.B. a hardware that connects different computer systems.C. a worldwide collection of networks that use a suite of protocols TCP/IP to communicate

with one another.D. a communication software used to connect computer networks.

5. The domain name is used toA. retrieve information from the Internet.B. help users to remember the Internet addresses.C. transmit data among computers.D. convert analog signals to digital signals.

55

Part II - QuestionsLevel 11. (a) What is the difference between a computer network and the Internet?

A computer network refers to the physical connections of computing equipment. But the Internet is the worldwide collection of interconnected networks that uses a suite of protocols TCP/IP to communicate with one another.

(b) What is the relationship between the Internet address and domain name?Both are used to identify a computer on the Internet. Internet address is a group of numbers while domain name consists of letters and words instead.

2. (a) Briefly describe the most common method to access the Internet.Users can access the Internet through dialing to the ISP with their computer.

(b) List three common activities on the Internet.Browsing information, sending and receiving e-mail, having live chat

3. What kind of information can be derived from the URL?The uniform resource locator can reflect which protocol is used, the nature of the resources and the information server.

Level 24. May has bought the following computer equipment and software for home use:

monitor, central processing unit, keyboard,Windows 98 and communication software

(a) Can she use them to access the Internet? If not, what computer equipment is required?No, she still needs modem in order to access the Internet.

(b) List two common communication software that are required to access the Internet.Internet Explorer and Winsock

5. (a) Write down the steps you should take to browse the web page of the Public Library (http://www.ipl.org/).Step 1 : Connect to ISP and open Internet Explorer.Step 2 : Type ‘http://www.ipl.org/’ in the [Address] dialog box and then press [Enter].

(b) Write down the steps you should take to search the web page that contains the branch offices of the Education Department.Step 1 : Connect to ISP and open Internet Explorer.Step 2 : Click the [Search] button on the toolbar.Step 3 : Select a search engine.Step 4 : Enter the key words (i.e. Education Department) of the topic.Step 5 : Click the [Search] button to start searching.

56

Step 6 : Select one of the sites to search the branch offices of the Education Department.

6. (a) Briefly describe the procedures to send an e-mail to a friend in Beijing.Step 1 : Open Outlook Express.Step 2 : Click the [New] button.Step 3 : Enter the recipient e-mail address in the [To] box.Step 4 : Type in the message.Step 5 : Click the [Send] button to send the message.

(b) Suggest one way to discuss an article posted in a newsgroup on the Internet.Participate in the newsgroup as an active member and give personal opinion in form of live chatting.

Part III - Case StudyMary bought a new multimedia computer for home use. She was very excited because she was going to connect her computer to the Internet. Mary contacted an ISP company and successfully applied for the Internet service. Now, she can connect to the Internet via the phone line.

1. Name the service charge that Mary has to pay to the ISP.Basic premium for the Internet service and Pnets fees.

2. When Mary told the salesperson that she would connect her computer to the Internet, the salesperson suggested that she should purchase a computer with a built-in modem. Why?A modem is required when the information is transmitted over telephone lines. Since telephone lines only carry analog signals, a modem is used to convert the analog signals to digital signals or vice versa.

3. Mary is going to write an essay about the millennium bug. Can she get help from the Internet? Explain how.Yes, Mary can search related information through the Internet. To search the information, she needs to open a web browser, then issue the search command and enter the topic that she wants to search.

4. Mary wants to invite her friends to attend her birthday party, and she has created an invitation card stored on her hard disk. What will be the most efficient way to send the invitation to her friends?Mary should send her invitation to her friends by e-mail with her invitation card attached.

57

Chapter 15 Computer Operations

Part I - Multiple Choice Questions1. Which of the following statements is TRUE about the central processing unit?

A. It consists of the control unit and logic unit.B. It consists of registers and arithmetic unit.C. It consists of the program counter and memory data register.D. It consists of the arithmetic and logic unit and control unit.

2. A machine code includesI. an operator.II. an operation code.III.an operand.A. I and IIB. I and IIIC. II and IIID. I, II and III

3. The major advantage of using mnemonics isA. more readable and easy to memorize than machine code.B. to execute the machine code faster.C. to reduce the number of machine code instructions.D. to specify the type of instructions to be processed.

4. An accumulator is a register used toA. perform logical operations on data.B. interpret the meaning of the instruction.C. hold the results of arithmetic and logical operations.D. hold the next instruction to be executed.

5. Which of the following statements is FALSE?A. Control unit functions as the ‘brain’ of a computer.B. Program counter is increased by one every time in order to fetch the next instruction to be

executed.C. A register acts as a temporary storage for data and instructions.D. A status register holds a set of condition flags.

58

Part II - QuestionsLevel 11. State the functions of the following components:

(a) Program counterIt holds the address of the next instruction to be executed.

(b) Instruction registerIt holds the current instruction fetched from the main memory.

(c) Memory data registerIt holds the data or instructions for specific purposes.

(d) Memory address registerIt holds the address of data or instructions.

(e) AccumulatorIt holds intermediate and final results of arithmetic and logical operations.

2. List four major functions of the control unit.i. Control the access of data and instructions from the main memory.ii. Direct the sequence of instructions.iii. Interpret each program instruction.iv. Give control signals (or commands) to appropriate hardware devices.

3. (a) Give a reason why machine code is needed.Machine codes are the instructions that consist of only binary numbers. It is the only language that computers can read and process.

(b) What are the two major disadvantages of machine code programs?i. Difficult to understandii. Easy to make mistakes

Level 24. An 8-bit machine code is used in a computer. The first four bits are the

operation code, and the last four bits are the operand. Some operation codes and operands are shown in the following table:Operation Code Operand Meaning

0001 1110 Replace the contents of the accumulator by the contents of address 1110.

0010 1111 Replace the contents of address 1111 by the contents of the accumulator.

0011 1110 Multiple the contents of the accumulator by the contents of address 1110 and store the result in the accumulator.

59

0100 1110 Replace the contents of the accumulator by the sum of the contents of the accumulator and the contents of address 1110.

0101 0000 Stop.(a) How many different operation codes can be defined for the computer?

16 (b) Study the following machine code program.

Machine code0001111100111110001011110100111001010000

If the initial contents of addresses 1110 and 1111 are 5 and 7 respectively, what are the contents of the accumulator at the end of the program?40

5. Consider the following instructions:Memory Address

Mnemonics Code

Operand Operation

10000001 LDA 11111010 Load the contents of memory address 11111010 to the accumulator.

10000010 STA 11111011 Store the contents of the accumulator to memory address 11111011.

10000011 INC 11111010 Increase the contents of memory address 11111010 by 1.10000100 LDA 11111001 Load the contents of memory address 11111011 into the

accumulator.10000101 SUB 11111010 Subtract the contents of memory address 11111010 from

those of the accumulator and store the result in the accumulator.

10000110 JPN 10001011 Branch to memory address 10001011 if the contents of the accumulator are less than zero.

10000111 LDA 11111010 Load the accumulator with the contents of memory address 11111010.

10001000 ADD 11111011 Add the contents of memory address 11111011 to the accumulator, and store the result in the accumulator.

10001001 STA 11111011 Store the contents of the accumulator in memory address 11111011.

10001010 JMP 10000011 Jump to memory address 10000011.

60

10001011 LDA 11111011 Load the accumulator with the contents of the memory address 11111011

10001100 OUT Output the contents of the accumulator.10001101 HLT Halt.

(a) Complete the following table to show the contents of the accumulator and the memory addresses 11111001, 11111010 and 11111011 during the execution of instructions.

Address 11111001

Address 11111010

Address 11111011

Accumulator

10 9 0 910 9 9 910 10 9 910 10 9 1010 10 9 010 10 9 010 10 9 1010 10 9 1910 10 19 1910 11 19 1910 11 19 1010 11 19 110 11 19 110 11 19 1910 11 19 19

(b) What is the purpose of this program?The purpose of this program is to find the sum of the numbers stored in address 11111001 and 11111010.

Part III - Case StudyA computer uses one byte to store an instruction. The first three bits contain an operation code followed by a 5-bit operand.The computer uses the following operation codes and the corresponding mnemonic codes:

Operation Code

Mnemonics Code

Meaning

001 INP Input the data from the input unit to the accumulator.

61

010 SUB Subtract the contents of the memory address indicated by the operand from those of the accumulator and store the result in the accumulator.

100 ADD Add the contents of the memory address indicated by the operand to those of the accumulator and store the result in the accumulator.

101 STA Store the contents of the accumulator in the memory address indicated by the operand.

110 OUT Output the contents of the accumulator.111 STP Stop.

1. How many operation codes can the computer have?8

2. A program Ch15 is written as follows:Instruction Location

Instruction

0 Input the first number to the accumulator.1 Store the number in the accumulator to memory address

10010.2 Input the second number to the accumulator.3 Store the number in the accumulator to memory address

00001.4 Add the value in the memory address 10010 to the

accumulator.5 Store the number in the accumulator to memory address

11111.6 Output the contents of the accumulator.7 Stop.

Rewrite the above program by using mnemonics code.Instruction Location

Mnemonics Operand

0 INP1 STR 100102 INP3 STR 000014 ADD 100105 STR 11111

62

6 OUT7 STP

3. Rewrite the program in question 2 by using machine codes.Instruction Location Machine Code

0 001000001 101100102 001000003 101000014 100100105 101111116 110000007 11100000

4. Suppose the values of the first and second input numbers are 7 and 9 respectively.(a) Complete the following table to show the contents of the memory locations 00001, 10010

and 11111 and the accumulator during the execution of instructions. The first one has been done for you.

Address 00001 Address 10010 Address 11111 Accumulator1 - - - 72 - 7 - 73 - 7 - 94 9 7 - 95 9 7 - 166 9 7 16 16

(b) What is the result of the program?16

5. What is the function of the program?The function of the program is to compute the sum of two input numbers.

63

Chapter 16 Programming Languages

Part I - Multiple Choice Questions1. Which of the following is/are the advantage(s) of high-level languages?

I. They are easy to learn.II. They can be run directly by the computer.III.They are machine-independent.A. I and IIB. I and IIIC. II and IIID. I, II and III

2. Which of the following is most suitable for logic programming?A. BASICB. CC. COBOLD. PROLOG

3. Which of the following programming languages is the most suitable tool for learning structured programming?A. BASICB. CC. PASCALD. Structured Query Language

4. Which of the following programs can convert a source program into an object program?A. TranslatorsB. AssemblersC. InterpretersD. Editors

5. To run on the computer, a program must be translated intoA. machine language.B. low-level language.C. high-level language.D. assembly language.

64

Part II - QuestionsLevel 11. (a) Suggest three reasons to show the need for high-level languages.

i. Easy to understandii. Machine independentiii. Problem oriented

(b) Name three high-level languages.FORTRAN, COBOL and C

2. (a) Give two advantages of high-level languages over low-level languages.Portable and efficient

(b) Give one advantage of low-level languages over high-level languages.Shorter running time

3. (a) What is the purpose of using a translator?Source program statements can be translated to machine code statements.

(b) List three major types of translator.Assembler, compiler and interpreter

Level 24. “FORTRAN is designed to train programmers to solve business problems.” Is this statement

correct? Explain why.No, FORTRAN is designed to solve scientific, engineering and mathematical problems.

5. Tommy is a programmer who writes application programs for business use. Identify two programming languages that Tommy would use most frequently. Explain why.C language and COBOL. C language is used since it is extremely compatible. Application software written in C language can be very portable. COBOL is used because the language is designed to handle data processing applications in the business environment.

6. Describe the difference between a compiler and an interpreter.A compiler translates a high-level language program into a machine language program. When a compiler is used, the source program needs to be translated once only. An interpreter also translates a high-level language program into a machine language program. But an interpreter translates only one program instruction at a time for immediate execution.

Part III - Case StudyABC Company has used computer systems for a long time. Some programs were developed by in-house programmers twenty years ago. Recently, the company has ordered new computing

65

equipment. But old programs cannot run on the newly purchased computers. The company has also installed some high-level language programs although such programs may not be as fast as the old ones.

1. Name the possible programming languages used in the old programs.Machine language

2. What are the most possible reasons that old programs cannot run on the newly purchased computers?The old programs are written in machine languages which are machine dependent. Therefore, a program written in one machine language can be executed by only one type of computers.

3. “High-level language programs may not be as fast as old programs.” Is this statement correct? Explain why.Yes, because programs written in high-level languages must be translated into machine language before execution. As a result, the running time is prolonged.

4. Name three factors that should be considered when choosing a computer language.Three factors that should be considered when choosing a computer language:

i. Is the program language portable?ii. Is the program language easy to understand?iii. Is the program language easy to learn and edit?

66

Chapter 17 The Operating System

Part I - Multiple Choice Questions1. The purpose of using an operating system is

A. to share data between users.B. to operate a computer company.C. to control the operations of a computer.D. to integrate all kinds of information.

2. Which of the following operating systems does not allow multitasking?A. DOSB. UNIXC. Windows NTD. Windows 98

3. Which of the following is/are the function(s) of an operating system?I. Input/output controlII. Error handlingIII.Security controlIV. Program translationA. I and IIB. I, II and IIIC. II, III and IVD. I, II, III and IV

4. Which of the following is responsible for controlling the access right to CPU time, main memory and input/output devices?A. An assemblerB. An operating systemC. A database management systemD. A computer operator

5. Which of the following operating systems is most suitable for a computer network?A. DOSB. Mac OSC. Windows NTD. Windows 98

67

Part II - QuestionsLevel 11. Give the major reason for installing an operating system in a computer.

An operating system serves as an interface between application software and computer hardware. It controls the computer operations and allocates computer resources effectively so that application software can run properly and efficiently.

2. Give two distinctions between DOS and Windows NT.i. DOS uses the command line interface while Windows NT uses the graphical user interface.ii. Windows NT users can run more than one program at a time but DOS users do not have

such convenience.

3. Write down the function of the operating system for performing each of the following activities.(a) To create a new directory on a hard disk.

File maintenance(b) To set priority for a print queue.

Job scheduling(c) To load the word processor into the main memory.

Program execution(d) To ask the user to enter the logon name and password.

Security control(e) To read data from the keyboard.

Input operation(f) To warn users in case of out-of-memory.

Error detection

Level 24. “A computer can perform tasks if it has installed proper application software.” Is this statement

correct? Explain why.No, because a computer needs to install the operating system first in order to run application software.

5. Why do most schools use Windows NT rather than DOS and Windows 98? Give two reasons to support your argument.i. Windows NT is more user friendly than DOS because it uses the graphical user interface.ii. Windows NT is appropriate for school networks because it supports multi-user processing

and networking operations.

68

6. ABC Publishing Company wants to order a new operating system that supports desktop publishing. What will be your suggestion? Give two reasons to support your answer.The company needs Mac OS because it uses the graphical user interface and good for desktop publishing.

Part III - Case StudyBelow is a conversation between Ken and Janet.Janet: I really love my software. I can easily add and delete files without worrying about the

storage.Ken: I like my word processor too. It can tell the pen tablet to read Chinese characters and

control the printer what to print. By the way, how do you protect your files from unauthorized access?

Janet: I give each file a password.Ken: That’s smart.

1. Name the type of software that Janet is talking about.System software

2. There is one piece of incorrect information in the conversation. What is it? Explain why it is not correct.Word processor is application software. The operating system rather than the application software controls the input and output devices. In this case, the word processor can neither control the pen tablet nor the printer.

3. Is it smart to give each file a password when there are thousands of files? If not, suggest a smart way to protect these files.No, it is not smart to give each file a password. We can set a password on the computer. The user must enter the correct password in order to access the computer.

4. Give three examples of operating systems on microcomputers.Windows 98, Windows NT, Mac OS

69

Chapter 18 Social Issues of the Widespread Use of Computers

Part I - Multiple Choice Questions1. Which of the following is the impact of computers on employment?

A. Unemployment rate has decreased.B. New jobs have been created.C. Teachers lose their jobs.D. People find it difficult to get a job.

2. To safeguard data, people should useA. identification and passwords.B. the alarm system to handle data.C. personal experience to protect data.D. a safety box to keep the data.

3. Which of the following statements correctly describes piracy?A. It is a program that infects computer files.B. It is the concept that personal data should not be examined by unauthorized people.C. It describes unauthorized access to the computer system.D. It refers to the unauthorized distribution and use of a computer program.

4. Which of the following is TRUE about computer crime?A. It is easy to detect a computer crime.B. Illegal use of the computer for fun is a computer crime.C. Computer crimes never happen in government departments.D. Duplicate software for backup purposes is a computer crime.

5. The person who uses computer expertise to break into somebody’s computer system for fun and challenges is a/anA. invader.B. hacker.C. cracker.D. aggressor.

70

Part II - QuestionsLevel 11. (a) Give three new positions created as a result of computerization.

Chief information officer, system analyst and programmer(b) Name two professions that have been benefited from the use of computers.

Teachers and accountants

2. (a) State the difference between computer crime and computer ethics.Computer crimes are against the law while computer ethics are undesirable behaviour that might not be appropriate for taking legal actions.

(b) Determine whether it is a computer crime for each of the following situations:(i) Using shareware after the expiry date.

No(ii) Sending electronic junk mail to your friends.

No(iii) Making extra copies of legal software for your schoolmates.

Yes

3. (a) Write down two methods to protect data.i. Make backupsii. Use grandfather-father-son method.

(b) Name two types of people who attempt to break into computer systems without authorization.Crackers and hackers

Level 24. (a) “Ken finds that his computer memory has stored a lot of unknown dummy files. These

dummy files multiply whenever he starts his computer.” Briefly describe the possible reason for this situation.Ken’s computer is infected by virus. The virus creates copies of itself in the computer memory.

(b) Give two suggestions that could help avoid the problem in part (a).i. Avoid downloading or copying files to the computer without anti-virus protection.ii. Install legal anti-virus software.

5. (a) “The use of unauthorized software helps promote the software and computerization.” Do you agree to this statement? Explain why.No, if the copyright is not protected, the work for developing and manufacturing the software will not be compensated. Consequently, people will lose incentive to develop and

71

manufacture software. Useful software will not be available to computer users.(b) Suggest two methods to protect software copyright.

i. Do not buy any unauthorized software.ii. Do not make extra copies of software for other persons.

6. Stephanie filled in a subscription form and ordered a book from an electronic bookstore. Some time later, she received a bunch of junk mail that promotes fashion, jewellery and other accessories.(a) Could the electronic bookstore sell Stephanie’s data like ID number, age, address and so

forth to other retailers without Stephanie’s consent? Explain why.No, it is against the Personal Data (Privacy) Ordinance that prohibits the use of personal data other than its original lawful purposes.

(b) Stephanie suspects her personal data is incorrectly recorded by the electronic bookstore. Can she verify her personal data with the bookstore?Yes, the Personal Data (Privacy) Ordinance that gives individual the right to review and correct personal files.

Part III - Case StudyAmy is a receptionist who collects all the incoming mail in a speed delivery company. She is also a direct sales agent and can access the company database. In order to promote her sales revenue, she makes calls to the customers of the speed delivery company. She also copies the company mailing lists. To maintain a database of her customers, she makes a copy of the company database software.

1. (a) Give one example of using computers in a speed delivery company.A speed delivery company can use computers to schedule delivery.

(b) Name the position of the person who should be in charge of the company database.Database administrator

2. (a) In which two ways has Amy violated the privacy ordinance?i. Amy makes use of the company customer data to undergo telemarketing. ii. Amy illegally copies the customer data for her own use.

(b) Suggest two methods that can prevent unauthorized access to the company data.The company needs to issue user identity numbers or passwords to authorized users only.

3. (a) Name the computer terminology that describes Amy’s copying of the database software.Computer piracy

(b) Why is it wrong to copy computer software other than for backup purposes?It is because developers who help develop the computer software should be compensated. Otherwise, nobody will be willing to develop software.

72

4. (a) Yesterday, Amy copied a file from a floppy disk to the hard disk. She soon found the speed of the computer slowing down. Also, free bytes in the computer memory were decreasing. What is the most likely explanation for this situation?The computer is virus infected.

(b) Suggest two methods that can prevent virus infection.i. Avoid downloading or copying files to the computer without anti-virus protection.ii. Install legal anti-virus software.

73

74