2000-CE COMP STUD
HONG KONG EXAMINATIONS AUTHORITY HONG KONG CERTIFICATE OF EDUCATION EXAMINATION 2000
1A
COMPUTER STUDIES PAPER 1 (SECTION A) Subject Code 200
1.
Read carefully the instructions on the Answer Sheet and insert the information required (including the Subject Code) in the spaces provided.
2.
When told to open this book, check that all the questions are there. the words ‘END OF SECTION A’ after the last question.
3.
ANSWER ALL QUESTIONS. Answer Sheet.
4.
Note that you may only mark ONE answer to each question. answers will score NO MARKS.
5.
All questions carry equal marks. answers.
香 港 考 試 局 保 留 版 權
Hong Kong Examinations Authority All Rights Reserved 2000
2000-CE-COMP STUD 1A–1
Look for
All the answers should be marked on the Two or more
No marks will be deducted for wrong
There are 50 questions in this section. 1.
Which of the following statements does NOT comply with the Personal Data (Privacy) Ordinance? A. B. C. D. E.
2.
Which of the following is considered a computer crime? A. B. C. D. E.
3.
Personal information cannot be changed without authorization. Personal information is kept up-to-date. Personal information is not disclosed to unauthorized parties. Personal information is kept longer than necessary. Personal information is used for a specified purpose.
Selling “Freeware” downloaded from the Internet Downloading “Freeware” from the Internet Using a computer in a public library to log onto the Internet Making a fund transfer through the Internet Backing up data files downloaded from the Internet
The following diagram shows a queue containing five items : C
T
U
X
Front
B
Rear
Which of the following diagrams shows the queue after the deletion of two items and the insertion of three items P, Q and F? A.
C
T
U
P
Q
B.
U
X
B
P
Q
C.
U
X
B
P
Q
F
D.
C
T
U
X
B
P
E.
P
Q
F
U
X
B
2000-CE-COMP STUD 1A−2
F
−1−
保留版權 All Rights Reserved 2000
Q
F
4.
Given three two’s complement 8-bit integers X, Y and Z such that Z = X + Y , where Y is the one’s complement of X. What is the value of Z in decimal? A. B. C. D. E.
5.
−127 −1 0 255 127
In the following diagram, bits 1 to 7 are used to store the ASCII code of a character and bit 0 is the odd parity bit. 7
6
5
4
3
2
1
0
bit number
parity bit Which of the following bit patterns represents the character 'U'? A. B. C. D. E. 6.
1110 1010 1010 1010 0101 0101 1101 0101 1010 1011
Which of the following software can be used to create a data file for mailmerging? (1) (2) (3) (4) A. B. C. D. E.
Spreadsheet Word processing Graphics Database
(4) only (1) and (4) only (2) and (3) only (2) and (4) only (1), (2) and (4) only
2000-CE-COMP STUD 1A−3
−2−
保留版權 All Rights Reserved 2000
Go on to the next page
7.
Which of the following area(s) is/are (an) application(s) of computer graphics? (1) Computer Aided Design (2) Computer Animation (3) Computer Assisted Learning A. B. C. D. E.
8.
Which of the following mode of processing systems can respond quickly to some external events? A. B. C. D. F.
9.
(1) only (2) only (1) and (2) only (2) and (3) only (1), (2) and (3)
Time sharing Batch Real time Multitasking Interactive
Records in a random file are stored … A. B. C. D. E.
in a location assigned by an addressing algorithm. in a location assigned by a random number generator. in any empty location. in the order of input. in the order of the key.
2000-CE-COMP STUD 1A−4
−3−
保留版權 All Rights Reserved 2000
10.
Which of the following networks is a star network? A.
B.
C.
D.
E.
11.
Which of the following data transmission media is NOT subject to electrical interference? A. B. C. D. E.
Twisted pair wire Coaxial cable Optical fiber Radio None of the above
2000-CE-COMP STUD 1A−5
−4−
保留版權 All Rights Reserved 2000
Go on to the next page
12.
The function(s) of the Control Unit is/are (1) to interpret the instructions (2) to direct all operations within the processor (3) to send and receive control signals from peripheral devices A. B. C. D. E.
13.
Which of the following is NOT a register inside the CPU? A. B. C. D. E.
14.
(2) only (3) only (1) and (2) only (2) and (3) only (1), (2) and (3)
Status register Instruction register Program counter Accumulator RAM
Which of the following peripherals are output devices? (1) (2) (3) (4) A. B. C. D. E.
Plotter CD-ROM Drive Scanner Hard Disk Drive
(1) and (2) only (2) and (4) only (1) and (3) only (1) and (4) only (3) and (4) only
2000-CE-COMP STUD 1A−6
−5−
保留版權 All Rights Reserved 2000
15.
Below are 3 storage media : (1) Random Access Memory (2) Hard Disk (3) Magnetic Tape Drive Arrange these in term of access speed, from the slowest to the fastest A. B. C D. E.
16.
(3), (2), (1) (2), (1), (3) (1), (3), (2) (2), (3), (1) (1), (2), (3)
The following shows part of the contents of the memory : Memory Location 120 130 140 150 160
Memory Content 140 150 160 170 180
The final content of the accumulator is found to be 150 if the following three instructions are executed sequentially. What will the value be at memory locations 130, 140, 150 respectively? Instruction(s) MOV 150, A MOV A, &150 MOV A. B. C. D. E.
150 150 170 150 170
Meaning Copy the value of 150 into the accumulator. Copy the content of the accumulator into memory location 150. &150, &130 Copy the contents of the memory location 150 into the memory location 130. 160 160 160 160 160
2000-CE-COMP STUD 1A−7
170 0 0 150 150
−6−
保留版權 All Rights Reserved 2000
Go on to the next page
17.
Which of the following is/are true about a laser printer? (1) It outputs high-quality hard copy. (2) It is an impact printer. (3) It operates quietly. A. B. C. D. E.
18.
(1) only (2) only (1) and (3) only (2) and (3) only (1), (2) and (3)
Which of the following will affect the output quality of a visual display unit? (1) Number of colours (2) Resolution (3) Memory size A. B. C. D. E.
19.
(1) only (1) and (2) only (1) and (3) only (2) and (3) only (1), (2) and (3)
People can work at home using a home computer connected to the computer in their office. Which of the following is false? A. B. C. D. E.
It provides a relax working atmosphere. There is better team spirit. There is possible family distraction. Less office space is needed. It allows flexible working hours.
2000-CE-COMP STUD 1A−8
−7−
保留版權 All Rights Reserved 2000
20.
Which of the following is NOT normally sold as part of an office automation software package? A. B. C. D. E.
21.
In stages of computerization , the person mainly responsible for producing the system flowchart is the ____________ . A. B. C. D. E.
22.
User's manual Operation guide Tutorial manual Program listing Trouble shooting manual
electronic data processing manager systems analyst systems engineer programmer computer operator
The following steps are supposed to sum the integers of 1 to 9 and store the result in Y. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6
assign 1 to X if X > 9 then go to step 6 assign the value of (Y + X) to Y assign the value of (X + 1) to X go to step 2 output the value of Y
Execution of the above steps cannot get the correct answer. followings is the possible reason for the error? A. B. C. D. E.
Which of the
Variable X is not initialized. Variable Y is not initialized. There is an infinite loop. The value of X is not output. Step 3 and Step 4 are misplaced.
2000-CE-COMP STUD 1A−9
−8−
保留版權 All Rights Reserved 2000
Go on to the next page
23.
Which of the following is/are example(s) of the infringement of copyright? (1) Peter downloaded a shareware from the Internet and continued to use it after the free trial period. (2) When Mary submitted her assignment to her teacher via the network, the teacher’s computer became infected. (3) Tom sold pirated software. A. B. C. D. E.
24.
(3) only (1) and (3) only (1) and (2) only (2) and (3) only (1), (2) and (3)
Which of the following about a stack is/are true? (1) It is a first-in-first-out data structure. (2) Two pointers are required for a stack operation. (3) It can be used to store returning addresses for procedure calls in Pascal. A. B. C. D. E.
25.
(1) only (2) only (3) only (1) and (2) only (1) and (3) only
The decimal number 3.375 in binary normalized form is A. B. C. D. E.
0.11011× 1010 0.11011× 10−10 11011× 1011 11011× 10−11 1.1011 × 1001
2000-CE-COMP STUD 1A−10
−9−
保留版權 All Rights Reserved 2000
26.
Using 13-bit, 2’s complement representation, what is the result of −513 − 512? A. B. C. D. E.
27.
1000000000001 1101111111111 0111111111111 underflow occurs overflow occurs
Which of the following tasks can be performed by a database management system? (1) listing customers who used mobile phone for more than 1000 minutes in last month (2) sorting students’ marks in descending order (3) producing invitation letters to customers A. B. C. D. E.
28.
(1) only (3) only (1) and (2) only (2) and (3) only (1), (2) and (3)
Which of the following tasks can be performed by a spreadsheet software? (1) seeing how different interest rates will affect the monthly repayment of mortgage loans (2) plotting charts of weekly temperatures (3) analysing the test marks of students A. B. C. D. E.
(1) only (3) only (1) and (2) only (2) and (3) only (1), (2) and (3)
2000-CE-COMP STUD 1A−11
− 10 −
保留版權 All Rights Reserved 2000
Go on to the next page
29.
Which of the following is/are the advantage(s) of real-time processing over batch processing? (1) It is easier to set up the system. (2) The hardware is cheaper. (3) The information is more up-to-date. A. B. C. D. E.
30.
(1) only (2) only (3) only (1) and (3) only (2) and (3) only
Which of the following tasks should be accomplished using an interactive system? (1) withdrawing money from a bank account through an automatic teller machine (2) sending bank statements to customers (3) booking airline tickets A. B. C. D. E.
31.
(1) only (2) only (3) only (1) and (2) only (1) and (3) only
A company uses a sequential file to store the records of its employees. Which of the following statements is/are true? (1) An employee’s record can be located using a sequential search. (2) An employee’s record can be located using a binary search. (3) An employee’s record can be located directly. A. B. C. D. E.
(1) only (2) only (3) only (1) and (2) only (1) and (3) only
2000-CE-COMP STUD 1A−12
− 11 −
保留版權 All Rights Reserved 2000
32.
In a school, Name, Class, Class_no are three fields in a file used to store student names, classes and class numbers respectively. Which of the following can be used as the key field? A. B. C. D. E.
33.
Name Class_no Class and Name Class and Class_no Class_no and Name
To avoid network failure caused by the malfunction of a node in a network, which of the following network topologies should be implemented? (1) Ring (2) Bus (3) Star A. B. C. D. E.
34.
(1) only (1) and (2) only (1) and (3) only (2) and (3) only (1), (2) and (3)
Which of the following is/are the duties of a computer operator? (1) mounting disks (2) backing up data (3) collecting and entering data A. B. C. D. E.
35.
(1) only (2) only (1) and (2) only (2) and (3) only (1), (2) and (3)
Which of the following techniques can be used during algorithm design? A. B. C. D. E.
decomposing the problem documenting the program defining the problem coding the program debugging the program
2000-CE-COMP STUD 1A−13
− 12 −
保留版權 All Rights Reserved 2000
Go on to the next page
For questions 36 to 45, find the output of the given program. 36.
program Q36; begin writeln(trunc(abs(-9.5)-2)div 2) end. A. B. C. D. E.
37.
0 1 2 3 4
program Q37; var x, y, z : string; begin x := '10101010'; y := '10101'; z := x + y; writeln(copy(z,2,3) + copy(z,5,2)) end. A. B. C. D. E.
00100 01010 01011 01101 01110
2000-CE-COMP STUD 1A−14
− 13 −
保留版權 All Rights Reserved 2000
38.
program Q38; const k = 7; var s : string[k]; i : integer; begin s := 'legco'; case s[k-length(s)]of 'o': i:=2; 'c': i:=4; 'g': i:=6; 'e': i:=8; 'l': i:=10; else i :=5 end; writeln(i mod k) end. A. 0 B. 1 C. 2 D. 3 E. 4
2000-CE-COMP STUD 1A−15
− 14 −
保留版權 All Rights Reserved 2000
Go on to the next page
39.
program Q39; var x, y, z : integer; procedure change (x, y, z : integer); begin x := y; y := z; writeln(x, y, z) end; begin x := 1; y := 2; z := 3; change(y, z, x); writeln(x, y, z) end. A. 231 123 B. 233 123 C. 311 123 D. 231 231 E. 311 311
2000-CE-COMP STUD 1A−16
− 15 −
保留版權 All Rights Reserved 2000
40.
program Q40; var data : array [1..6] of integer; k : integer; begin for k := 1 to 6 do data[k] := 7-k; k := data[data[k-1]]; writeln(data[data[k]*k-data[3]]+data[k]) end. A. B. C. D. E.
41.
3 6 8 11 12
program Q41; var i,j : integer; begin i := 2; for j := 3 downto 0 do begin i := i + j; write(i) end end. A. 543 B. 578 C. 5432 D. 5433 F. 5788
2000-CE-COMP STUD 1A−17
− 16 −
保留版權 All Rights Reserved 2000
Go on to the next page
42.
program Q42; var a, b : string; function GREAT (x, y : string) : integer; begin if length(a) > length(b) then GREAT := length(a) else GREAT := length(b) end; begin a := 'greater'; b := 'less'; writeln(GREAT(a,b) + GREAT (b,a)) end. A. B. C. D. E.
43.
8 11 14 74 77
program Q43; type link = record a: integer; b: char end; var i: integer; x: array[1..10] of link; begin for i := 1 to 10 do begin x[i].a := 11 mod i; x[i].b := chr (91-i) end; for i := 1 to 10 do if x[i].a < 3 then write (x[i].b) end. A. B. C. D. E.
ZY ZYXV ZYXVR ZYXVRQ ZYXVURQ
2000-CE-COMP STUD 1A−18
− 17 −
保留版權 All Rights Reserved 2000
44.
program Q44; var a, b , c : integer; procedure p1; var a, c : integer; procedure p2; var b : integer; begin a :=4; b :=5; write(a,b,c) end; begin a := 4; c := 6; write(a,b,c); p2; write(a,b,c) end; begin a := 1; b := 2; c := 3; p1; write(a,b,c) end. A. B. C. D. E.
456456456123 456453456123 426453426426 426456426123 426456456123
2000-CE-COMP STUD 1A−19
− 18 −
保留版權 All Rights Reserved 2000
Go on to the next page
45.
program Q45; type rec = record x: char; y: integer; z: integer end; var r : rec; begin r.x := 'L'; r.y := trunc(sqrt(ord(r.x))) + 1; r.z := ord(r.x) mod r.y; writeln(r.z) end. A. B. C. D. E.
4 5 6 7 8
2000-CE-COMP STUD 1A−20
− 19 −
保留版權 All Rights Reserved 2000
Directions:
Questions 46 – 50 consist of two statements each. Decide whether each of the two statements is true or false. If both are true, decide whether or not the second statement is a correct explanation of the first statement. Then select one of options A – E according to the following table:
A.
1st statement true
2nd statement true
B.
true
true
C. D. E.
true false false
false true false
the 2nd statement is a correct explanation of the 1st statement the 2nd statement is not a correct explanation of the 1st statement − − −
1st statement
2nd statement
46.
Multimedia files must be compressed before saving to the mass storage media.
Rewritable CDs are suitable media for storing multimedia files.
47.
In a microcomputer, the number of bytes required to store a Chinese character is more than an English character.
Chinese character can be inputted by a combination of keys on a keyboard.
48.
Compression can improve file security.
A compressed file cannot be viewed using software which originally created the uncompressed file.
49.
An object program is free of syntax errors.
A compiler can be used to detect all errors in a source program.
50.
A machine code program is generally difficult for people to read.
A machine code program cannot include comment statements.
END OF SECTION A
2000-CE-COMP STUD 1A−21
− 20 −
保留版權 All Rights Reserved 2000
Character 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I
A Partial Character List for ASCII ASCII Character ASCII Character J d 48 74 K e 49 75 L f 50 76 M g 51 77 N h 52 78 O i 53 79 P j 54 80 Q k 55 81 R l 56 82 S m 57 83 T n 58 84 U o 59 85 V p 60 86 W q 61 87 X r 62 88 Y s 63 89 Z t 64 90 [ u 65 91 \ v 66 92 ] w 67 93 ^ x 68 94 _ y 69 95 ` z 70 96 a { 71 97 b | 72 98 c } 73 99
ASCII 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125
List of Operators and Reserved Words +, -, *, /, div, mod, >, <, =, >=, <=, <>, and, or, not, sqrt, trunc, round, random, abs, +(string concatenation), length, ord, chr, val, str, copy, const, type, procedure, function, var, integer, real, char, string, boolean, true, false, text, array...of, record...end, program, input, output, begin...end, :=, for...to/downto...do, (*...*), if...then...else, while...do, repeat...until, case...of...end, write, writeln, read, readln, assign, reset, rewrite, eof, eoln, close, sqr, sin, cos, arctan, ln, exp, with...do
2000-CE-COMP STUD 1A−22
− 21 −
保留版權 All Rights Reserved 2000
Appendix List of Commands in Mnemonics Op-code Operand Meaning INP XXX input data to address XXX OUT XXX output the contents of address XXX STA XXX store contents of accumulator to address XXX LDA XXX load accumulator with the contents of address XXX JMP XXX jump to address XXX JPN XXX branch to address XXX if contents of accumulator are negative JPZ XXX branch to address XXX if the contents of accumulator are zero INC XXX increase the contents of address XXX by 1 DEC XXX decrease the contents of address XXX by 1 ADD XXX add to accumulator the contents of address XXX and store the result in accumulator SUB XXX subtract from accumulator the contents of address XXX and store the result in accumulator STP stop
2000-CE-COMP STUD 1A−23
− 22 −
保留版權 All Rights Reserved 2000
2000 HKCE Computer Studies (Paper 1A) Question No.
Key
Question No.
Key
1. 2. 3. 4. 5.
D A C B E
26. 27. 28. 29. 30.
B E E C E
6. 7. 8. 9. 10.
E E C A C
31. 32. 33. 34. 35.
A D D C A
11. 12. 13. 14. 15.
C E E D A
36. 37. 38. 39. 40.
D B B C A
16. 17. 18. 19. 20.
This item was deleted. C E B D
41. 42. 43. 44. 45.
E C D D A
21. 22. 23. 24. 25.
B B B C A
46. 47. 48. 49. 50.
D B D C A
保留版權 All Rights Reserved 2000