SUBJECT: Computer Science Grade 11 - E - Term III Summative Assessment 20 Marks
SUBJECT: Computer Science Grade 11 - E - Term III Summative Assessment 20 Marks
SUBJECT: Computer Science Grade 11 - E - Term III Summative Assessment 20 Marks
Teacher:
Grade 11 __E__
Term III
Summative Assessment
20 marks
Student Instructions:
2. If you need more space for any answer, use the pages provided at the
back of this booklet and clearly number the question.
3. For all numerical answers, full working of solutions should be shown and
the answer should be rounded to the correct number of significant figures
and given with an SI unit.
For compare and contrast both items in question should be fully explained)
Sample questions and mark scheme
Tasks for the Summative Assessment for the term 4
1. The image below demonstrates two code snippets with identical input and outputs.
a)Compare code snippet 1 and 2 to show the difference between two cases.
The main difference is if and else if They may seem the same, however, the difference is
that if the first if statement is true, the elses are just going to be ignored, meaning, if the
value of number changes in if body, then other if statements can be true, while if it is else
if they wont 'work anyway.
c) What other conditional operators can be used in if statements in scenarios where multiple
expressions are to be evaluated to execute a code block?
|| for OR
&& for AND
[3]
2. Three variables, x, y and z, supposedly hold strings of digits, suitable for converting to
integers. Write code that converts these to integers and print the sum of these three integers.
However, if any variable has a value that cannot be converted to an integer, print out, the string
"bad value(s) in: " followed by the names of the variables that have bad values.
[3]
3. Explain the purpose of using «Data backup» in case of data loss.
Duplicate the data, to allow its retrieval after any accident that might be occurred.
[1]
4. Take the word "ROBOT" and encrypt it with a key of 1 using this simple algorithm:
[1]
5. Explain the difference between terms data validation and data verification.
Data validation
The guarantee or method for checking the accuracy and quality of your data, typically
performed prior to importing and processing.
[1]
Data verification
is a process in which different types of data are checked for accuracy and inconsistencies
after data migration is done.
[1]
6. Provide two benefits of applying Blockchain technology
1) Reduced cost (By using blockchain, organizations can bring down a lot of costs
associated with 3rd party vendors.)
2) High security (Blockchain technology utilizes advanced security compared to other
platforms or record-keeping systems.)
[2]
7. Provide examples of when and how SQL used to restrict access to data.
Informational and logical language designed to describe, modify and retrieve data stored in
relational databases.
[1]
8. Explain the uses of the Local Area Network(LAN) and Wide Area Network(WAN) and their
main differences:
WAN - a global computer network covering and uniting many computer systems around
the world.
LAN - local area network that unites a limited number of computers in a relatively small
area. WAN is an external network that connects groups of local networks and individual
computers regardless of their location. Network participants can interact with each other,
considering the limitations of connection technologies. Whereas LAN can cover up to
several kilometers of territory, and communication between network sections is provided
by high-quality cables with high bandwidth.
[3]
9. Identify three parts of the URL below, protocol, host name and location on the server
«https://a-teach.com/school/edit_lesson»
Host name……………a-teach………………………………..……..…….… [1]
Location on the server………
school/edit_lesson…………………………………………………..………… [1]
Protocol………https………………………………………………………………..…….
………....[1]
10. Explain why some websites require only HTTPS connection instead of HTTP, give example
of companies, which might use HTTPS.
The companies in which in the safety of the data is required may use HTTPS due to
its protection against hacker attacks aimed at listening to the connection. For
instance,
[1]