• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

140 Computing A-Level Revision Questions

Extracts from this document...


COMPUTING A LEVEL REVISION QUESTIONS 1. What three factors comprise the ACCESS TIME for disk. Explain each briefly. 2. A file has a high hit rate. Explain this and its significance in file design. 3. Describe the three functional parts of a shared bus. 4. Explain batch and transaction processing. Give a suitable application of each and suggest an advantage and disadvantage of one over the other. 5. Explain buffering, why it is necessary and give two examples of its use. 6. Define bit, byte and word. 7. Explain cache memory. 8. Explain character set and control characters (with examples). 9. COM is a WORM method of storage. Explain this and state a more up to date example of a WORM. 10. Name and briefly describe the five main functional parts of a computer. 11. Define cylinder with respect to magnetic disk. 12. Explain, with an example, the difference between data and information. 13. Define a database and a DBMS. What are the advantages of a database over the conventional multiple file approach? 14. Give four examples of data capture. 15. Describe how records are organised in a) indexed sequential files b) direct access files 16. How does overflow occur in direct access files? 17. Explain EFTPOS. ...read more.


Numbers are in normalised floating point form with 8 bits for the mantissa and 4 bits for the exponent. Twos complement is used for both parts. What decimal numbers do the following represent: i) 01100101 0011 ii) 10100011 0100 72. Perform the following subtraction using the twos complement method, showing all working: 72.25 - 38.75 (use a 12-bit word and fixed point format with 8 bits before the point) 73. What are the two features of Assembly languages which make them easier to use than machine code? 74. What are the advantages of high level languages over assembly code? 75. State two advantages of low level languages over high level languages? 76. A stock control system uses batch processing. State 6 items of data which the Master File might contain. State the items of data needed in the Transaction File for each stock record. 77. Explain block packing density and cylinder packing density with reference to the creation of indexed sequential and direct access files. 78. Suggest, with reasons, a method of processing for each of the following applications (in some cases more than one might be used): payroll stock control airline reservations insurance company banking library borrowers' file library book catalogue 79. ...read more.


128. One of the functions of an operating system in multiprogramming is memory management. What does the operating system need to do and how might it be achieved? 129. On what basis might the schedular issue a high priority to a process in multiprogramming? 130. Why can priorities not normally be issued in a multi-access system? What scheduling policy might be used instead? 131. Why is normalisation generally carried out on a relational database? Give a simple example to illustrate your answer. 132. Discuss briefly the problems of concurrent access in databases and how it may be overcome. 133. State three provisions of the UK Data Protection Act concerning the storage of and access to personal data within computer systems. Name some exemptions from these provisions by the act. 134. What is meant by the term ASCII character? 135. State one advantage and one disadvantage of static ram over dynamic ram. 136. Explain the term bit-mapped screen display. 137. What are the advantages of packet switching? 138. Describe two checks which may be made to detect errors in data transmission 139. What is the purpose of the process descriptor (process control block) of a process in multiprogramming? Give three items of information contained in this block.. 140. Give three error conditions which would give rise to an interrupt. ?? ?? revision\revquns.doc Joyce Veitch 15/03/00 page6 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Compilers and Interpreters

    5 star(s)

    Compiler A compiler takes a computer program that is written by the programmer (the source program) and translates it into machine code (the target program). This process comprises three main steps, as illustrated below Lexical Analysis The main purpose of the lexical analysis is to convert the source program into

  2. What are the principle advantages and disadvantages of the Airbus A380 in respect of ...

    Code E requirements affect Aerodromes/Airports wishing to provide services for A380 in that there are new runway requirements. One of which follows: "A minimum 45m of runway pavement of full load bearing strength shall be provided. 'Inner' shoulders of at least 7.5m of pavement of a load bearing strength that will permit occasional A380 aircraft incursion shall be provided.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Variations have been developed which use the same basic principles but are designed for particular applications. An example is the tracker ball used in many laptop computers. This is like an upside down mouse where the user moves the ball directly rather than moving an object around a flat surface.

  2. Different ways of data capture

    To make the info useful, which could be used to make a decision in business for example, info needs to be: * Relevant * Complete * Accurate * Clear * Timely - Info must be available when needed * Concise - principle of reporting by exception is very important I

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    - Applicable for Mastek 5. West Bengal (Monthly) - Applicable for Mastek 6. Tamil Nadu (Half-Yearly) - Applicable for Mastek 7. Madhya Pradesh (Annual) - Not applicable for Mastek These reports are to be generated at the relevant frequency for those states where PTax is applicable. The selection screen captures the following information: - 1.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    All types of organisations are serious about their Internet access use Leased Lines. In today's business environment the Internet has become an essential communication, information, and marketing tool, this may needs to be available all of the time. Many companies might lose money if they could not receive orders or

  1. Purposes and Features of a Relational Database

    Linking the tables up in such a way that if the data needs to be changed, and is duplicated throughout the databases , when it is changed these changes are also applied It means that the database will conform to similar standards with that of other normalised databases, but also

  2. LAN & WAN Protocols

    IPv4 IPv4 is the data oriented protocol used on a packet switched internetwork such as Ethernet. It does not guarantee the delivery but avoids duplicate deliveries. IPv4 using packet checksums provides data integrity protection. It works at the data link layer.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work