Search Header Logo
SQA H Computing SQP

SQA H Computing SQP

Assessment

Presentation

Computers

12th Grade

Practice Problem

Medium

Created by

E Reavey

Used 1+ times

FREE Resource

6 Slides • 36 Questions

1

Higher Computing

Specimen Paper

2

media

Not all questions have points but for those that do there are more points for quick answers and no points for wrong answers!

Points make prizes

3

Multiple Choice

1. Convert the following 16-bit two’s complement number into denary. 1

1111 1110 1110 1011

1

-436

2

-277

3

-183

4

56

4

Multiple Select

2. A developer and their client are based in different time zones in the world.

Explain the impact that this can have when using an agile methodology compared to an iterative one.

1

One of them might be sleepy when they meet

2

It is harder to manage the project when you cannot meet the client regularly

3

The agile methodology requires more client interaction throughout the whole project, than the iterative one does.

4

They are both the same

5

Multiple Select

3. A website is subject to a DOS attack.

State two symptoms users experience when this happens.

1

Slow performance

2

The site redirects to a false website

3

All data becomes corrupted

4

Inability to access data

6

media

4. A database table is shown below.

7

Draw

Complete the table below showing the output from the following SQL statement.

SELECT category, MAX(price) AS [Most expensive item] FROM Model

GROUP BY category;

8

Multiple Select

5. Describe one problem that can occur when using global variables in a program.

1

Arrays will not work across the whole program.

2

Accidental use of the same variable in different modules.

3

It may be difficult for more than one programmer to work on the code.

4

Nothing, its just to make programmers look smarter.

9

media

6. A text file stores the names of players and the time (in seconds) that they took to complete a game. Players who played the game more than once appear more than once in the file, as shown below.

Harry,1745

Gemma,1028

Jeremy,1209

Harry,1358

10

Open Ended

(a) Describe the purpose of the following steps in the algorithm.

(i) Steps 3 to 8

11

Open Ended

(a) Describe the purpose of the following steps in the algorithm.

(ii) Steps 9 to 16

12

Draw

8. Many sports clubs in Scotland have one president but they have many members. A member can only belong to one club.

Complete the entity-occurrence diagram below to represent the relationship between clubs, presidents and members.

13

Fill in the Blank

9. Convert 0·001011 to floating-point representation. There are 16 bits for the mantissa and 8 bits for the exponent.

14

Open Ended

11. Two computer systems have the same number of processor cores, the same width of data bus and the same clock speed.

(a) State one other factor that could account for one computer system performing better than the other, when tested for processing speed.

15

Open Ended

11. Two computer systems have the same number of processor cores, the same width of data bus and the same clock speed.

(b) Explain why increasing the width of the data bus will improve the system performance.

16

Open Ended

12. Describe the role of public and private keys when transferring secure data.

17

media

14. The International Bowling Federation maintains a relational database that consists of three linked tables, storing data on players, tournaments and tournament entries.

Extracts from these tables are shown below.

18

Open Ended

14. (a) Identify the compound key used in the Federation’s database.

19

Draw

14. Query 2 — Display largest amount of money when finishing first

20

Multiple Choice

14. (c) The Federation writes the following SQL statement to find how many times each country has awarded prizes of over 7000.

SELECT country, COUNT(prizeMoney)

FROM Tournament, Entry

WHERE prizeMoney > 7000

AND Tournament.tournamentID = Player.tournamentID

GROUP BY country;

(i) State the purpose of the GROUP BY line of the SQL statement.

1

To create a link between the tables

2

So that each country only appears once

3

To sort the results alphabetically

4

Because it does not work otherwise

21

Multiple Select

Question image

14. (c) (ii) The expected output of the SQL statement is shown.

When the SQL statement was tested, the actual output did not match the expected output.

Identify two errors in the SQL statement.

1

The query should have been split into two seperate queries.

2

The second half of JOIN should be = Entry.tournamentID

3

(AS) [Over 7000] is missing from SQL

4

SUM should have been used instead of COUNT

22

Multiple Choice

Question image

14(d) The Federation retains 10% of the total prize money.

Write the SQL statement that would produce the output shown.

1

SELECT Count(prizemoney*10)

AS [Retained prize money]

FROM Entry;

2

SELECT SUM(prizemoney*0.1)

AS [Retained prize money]

FROM Entry

GROUP BY TournamentID;

3

SELECT SUM(prizemoney*0.1)

AS [Retained prize money]

FROM Player;

4

SELECT SUM(prizemoney*0.1)

AS [Retained prize money]

FROM Entry;

23

Draw

(e) Each player can only be a member of one bowling club.

Complete the entity-relationship diagram below to show how the club could be added to the database.

24

media

16. The Caesar cypher is a simple encryption method that takes each letter in a message and changes it to a different letter.

The program below asks the user to enter a message and an integer used to change the letters in the string.

Both inputs are passed to a function that generates and returns an encrypted version of the message.

25

Fill in the Blank

16. (a) The above code contains actual parameters and formal parameters. Identify an actual parameter in the code.

26

Draw

16. (b) A breakpoint is set at line 19.

The function is tested by entering the two inputs shown below.

Input 1: cab

Input 2: 3

Complete the table below to show the values of character and

newMessage each time execution is stopped.

27

Multiple Choice

16. (c) Using a programming language of your choice (VISUAL BASIC!), state the pre-defined function used to convert:

(i) Character to ASCII

1

CHR

2

MOD

3

ASC

4

SubString

28

Multiple Choice

16. (c) Using a programming language of your choice (VISUAL BASIC!), state the pre-defined function used to convert:

(ii) ASCII to Character

1

CHR

2

MOD

3

ASC

4

SubString

29

Open Ended

16. (d) An execution error occurs for some values of "message" or "shiftLettersBy".

Explain why this happens.

30

Open Ended

16. (e) The function could be re-written to reverse the characters in the message string.

For example, inputting ‘jfx’ would produce the output ‘xfj’.

Using a recognised design technique, design an algorithm to reverse and store the new message.

31

Open Ended

17. In Formula One motor racing, teams can enter two drivers for each race. Every driver has a unique number on their car, which is allocated annually at the start of each new racing season.

A database is required to store data on the teams, drivers and race results since the sport started in 1950. Users would be able to collate information on team or driver wins to find the most successful racers or find how the success of teams has changed over the years.

(a) State two functional requirements of the above database.

32

Open Ended

Question image

17. (b) The entity-relationship diagram below shows how information on the teams, drivers and the races since 1950 could be stored. There are errors in the design. Describe three errors in the design.

33

Draw

17. (i) Complete the table below to show the output from the following

SQL statement.

SELECT country, SUM(championshipWins)

FROM Team

GROUP BY country

ORDER BY country ASC;

34

Draw

17. (ii) Design a query using wildcards, to find and display all the teams formed in the 1950s.

35

Open Ended

18. (a) The data from the file is imported into an array of records.

(i) Using a programming language of your choice, define a suitable record structure.

36

Open Ended

18. (a) The data from the file is imported into an array of records.

(ii) Using a programming language of your choice, declare a variable

that can store the data for 5000 participants.

37

Open Ended

18. (c) A participant manages to access the file and change their own score.

State two different offences the participant has committed under the Computer Misuse Act 1990.

38

Draw

20. (a) Complete the table below to show the data flow in and out of steps 2

and 3.

39

Open Ended

20. (b) Using a recognised design technique, refine step 2.

40

Open Ended

20. (c) Using a recognised design technique, refine step 4.

41

Multiple Select

(d) The program is modular and uses procedures.

Which are benefits of designing a modular solution to this program.

1

Different programmers can implement different parts of the design

2

Easier to implement as there is no need for parameter passing

3

Each part of the design can be tested separately when implemented

4

Design shows main processes

42

Poll

Do you enjoy this as a task / find this a good way to revise?

Yes

No

Maybe

Depends on the final scores!

Higher Computing

Specimen Paper

Show answer

Auto Play

Slide 1 / 42

SLIDE