0% found this document useful (0 votes)
61 views16 pages

Ol-Cs ZM

This document is a 16 page examination paper for a Computer Science course. It contains multiple choice and written response questions about binary numbers, data transmission, digital photography, and network security. Students are instructed to write in dark blue or black pen and show working for calculations. Electronic devices must be switched off and kept in bags during the exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views16 pages

Ol-Cs ZM

This document is a 16 page examination paper for a Computer Science course. It contains multiple choice and written response questions about binary numbers, data transmission, digital photography, and network security. Students are instructed to write in dark blue or black pen and show working for calculations. Electronic devices must be switched off and kept in bags during the exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

CEDAR COLLEGE EXAMINATIONS

CANDIDATE
NAME

STUDENT
COURSE O 2 - C S -
ID
e.g. A1-ACC-8

COMPUTER SCIENCE
Tests: July 2021

Teacher: Mr. Zain Merchant

Total Time: 1 hour 45


Additional Material: minutes

NONE

Total Marks: 75

READ THESE INSTRUCTIONS FIRST

All iPads and cell phones must be SWITCHED OFF and kept inside schoolbags.
Borrowing stationary is not permitted inside the examination room.
You must count each printed pages of the question paper to ensure no page is missing.
Do not write inside the margin. The margin is for teacher’s comments only.
You will not be permitted to leave the examination room before the end of examination.

Write your name & school ID on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.

Special Instructions

This document consists of 16 printed pages


2

1 A hockey club records the number of people that watch each match. An 8-bit binary register is
used to store this value.

(a) 46 people watch the first match and 171 people watch the second match.

Show how the registers would store these denary values as 8-bit binary.

Denary
8-bit binary
value
46

171
[2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give the largest denary value that can be stored in the 8-bit binary register.

............................................................................................................................................. [1]

(c) The hockey club wants to increase the number of people that can watch each match to 2000.
The 8-bit binary register may no longer be able to store the value.

Give the smallest number of bits that can be used to store the denary value 2000.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
3

(d) Electronic data about the final score for the match is transmitted to a central computer
30 kilometres away, using serial transmission.

(i) Explain why serial transmission is more appropriate than parallel transmission in this
scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The data transmission is also half-duplex.

Describe half-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The data transmission uses checksums.

Describe how checksums are used to detect errors in data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

[Turn over
4

2 Gurdeep takes high definition photographs using a digital camera. She has set up a website where
users can view thumbnails of her photographs. A thumbnail is a small version of the high definition
photograph.

(a) Gurdeep compresses the high definition photographs to create the thumbnails. She uses
lossy compression.

Describe how lossy compression creates the thumbnails.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Gurdeep sets up a web server to host her website. She reads about an Internet Protocol (IP)
address, a Media Access Control (MAC) address and a Uniform Resource Locator (URL).

Draw a line to connect each term to the correct example.

Term Example

IP address 192.168.0.255

MAC address https://www.cambridgeinternational.org

URL 00:15:E9:2B:99:3C

[2]
5

(c) Users can buy the high definition photographs from the website. When a user buys a high
definition photograph, a Secure Socket Layer (SSL) connection is created.

(i) Give one benefit of using an SSL connection.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain how the SSL connection is created.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

[Turn over
6

3 The given table shows the name or description of four devices. The table is incomplete.

Complete the missing device names and descriptions.

Device name Description

................................................... Uses either thermal bubble or piezoelectric technology

...............................................................................................

...............................................................................................
Actuator
...............................................................................................

...............................................................................................

Uses thousands of tiny mirrors that can move very quickly to


...................................................
create an image

...............................................................................................

...............................................................................................
Mouse
...............................................................................................

...............................................................................................
[4]
7

4 A supermarket sells many products. Each product has a barcode.

(a) Explain how the barcode is read at the supermarket checkout and how the price of the product
is found.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) The supermarket stores data using a Solid State Drive (SSD).

(i) Explain how an SSD stores data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) One advantage of an SSD rather than a Hard Disk Drive (HDD) is that it has no moving
parts, so it is more durable.

State one other advantage of the supermarket using SSD rather than HDD.

...........................................................................................................................................

..................................................................................................................................... [1]

[Turn over
8

5 Computers use logic gates.

(a) State the single logic gate that produces each truth table.

Truth table Logic gate

A B Output

0 0 1

0 1 1 ...................................................................................
1 0 1

1 1 0

A B Output

0 0 0

0 1 1 ...................................................................................
1 0 1

1 1 0

A B Output

0 0 1

0 1 0 ...................................................................................
1 0 0

1 1 0

[3]

(b) An aeroplane has a warning system that monitors the height of the aeroplane above the
ground, whether the aeroplane is ascending or descending, and the speed of the aeroplane.

Input Binary value Condition

Height 1 Height is less than 500 metres


(H) 0 Height is greater than or equal to 500 metres
Ascending or 1 Aeroplane is ascending or in level flight
Descending
(A) 0 Aeroplane is descending

Speed 1 Speed is less than or equal to 470 knots


(S) 0 Speed is greater than 470 knots
9

The warning system will produce an output of 1 that will sound an alarm (W) when either of
these conditions apply:

Height is less than 500 metres and the aeroplane is descending

or

The aeroplane is descending and speed is greater than 470 knots

Draw a logic circuit to represent the warning system.

A W

[5]

[Turn over
10

6 Hacking is one type of Internet risk used to obtain personal data that is stored on a computer.

(a) Explain how a firewall can help prevent hacking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Identify and describe two other types of internet risk that are used to obtain personal data.

Internet risk 1 ............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Internet risk 2 ............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]
11

7 Adeel has used a high-level language to program a mobile application.

(a) Describe what is meant by a high-level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Adeel uses an interpreter while developing and testing the application.

Adeel uses a compiler when the application is ready to be shared with others.

Compare the features of interpreters and compilers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Adeel is considering distributing his application as free software or shareware.

Explain the difference between free software and shareware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]
[Turn over
12

(d) Adeel is concerned about his application being plagiarised.

Define the term plagiarism.

...................................................................................................................................................

............................................................................................................................................. [1]

(e) Adeel copyrights his application.

State why Adeel copyrights his application.

...................................................................................................................................................

............................................................................................................................................. [1]
13

8 The Von Neumann model, for a computer system, uses the stored program concept.

(a) Describe what is meant by the stored program concept.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The fetch-execute cycle of a Von Neumann model, for a computer system, uses registers and
buses.

(i) Describe the role of the Program Counter.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Describe the role of the Control Bus.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) Computers based on the Von Neumann model, for a computer system, use interrupts.

Explain why interrupts are needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
14

BLANK PAGE
15

BLANK PAGE
16

BLANK PAGE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy