Ol-Cs ZM
Ol-Cs ZM
CANDIDATE
NAME
STUDENT
COURSE O 2 - C S -
ID
e.g. A1-ACC-8
COMPUTER SCIENCE
Tests: July 2021
NONE
Total Marks: 75
All iPads and cell phones must be SWITCHED OFF and kept inside schoolbags.
Borrowing stationary is not permitted inside the examination room.
You must count each printed pages of the question paper to ensure no page is missing.
Do not write inside the margin. The margin is for teacher’s comments only.
You will not be permitted to leave the examination room before the end of examination.
Write your name & school ID on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.
Special Instructions
1 A hockey club records the number of people that watch each match. An 8-bit binary register is
used to store this value.
(a) 46 people watch the first match and 171 people watch the second match.
Show how the registers would store these denary values as 8-bit binary.
Denary
8-bit binary
value
46
171
[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) Give the largest denary value that can be stored in the 8-bit binary register.
............................................................................................................................................. [1]
(c) The hockey club wants to increase the number of people that can watch each match to 2000.
The 8-bit binary register may no longer be able to store the value.
Give the smallest number of bits that can be used to store the denary value 2000.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3
(d) Electronic data about the final score for the match is transmitted to a central computer
30 kilometres away, using serial transmission.
(i) Explain why serial transmission is more appropriate than parallel transmission in this
scenario.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
[Turn over
4
2 Gurdeep takes high definition photographs using a digital camera. She has set up a website where
users can view thumbnails of her photographs. A thumbnail is a small version of the high definition
photograph.
(a) Gurdeep compresses the high definition photographs to create the thumbnails. She uses
lossy compression.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Gurdeep sets up a web server to host her website. She reads about an Internet Protocol (IP)
address, a Media Access Control (MAC) address and a Uniform Resource Locator (URL).
Term Example
IP address 192.168.0.255
URL 00:15:E9:2B:99:3C
[2]
5
(c) Users can buy the high definition photographs from the website. When a user buys a high
definition photograph, a Secure Socket Layer (SSL) connection is created.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
[Turn over
6
3 The given table shows the name or description of four devices. The table is incomplete.
...............................................................................................
...............................................................................................
Actuator
...............................................................................................
...............................................................................................
...............................................................................................
...............................................................................................
Mouse
...............................................................................................
...............................................................................................
[4]
7
(a) Explain how the barcode is read at the supermarket checkout and how the price of the product
is found.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) The supermarket stores data using a Solid State Drive (SSD).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) One advantage of an SSD rather than a Hard Disk Drive (HDD) is that it has no moving
parts, so it is more durable.
State one other advantage of the supermarket using SSD rather than HDD.
...........................................................................................................................................
..................................................................................................................................... [1]
[Turn over
8
(a) State the single logic gate that produces each truth table.
A B Output
0 0 1
0 1 1 ...................................................................................
1 0 1
1 1 0
A B Output
0 0 0
0 1 1 ...................................................................................
1 0 1
1 1 0
A B Output
0 0 1
0 1 0 ...................................................................................
1 0 0
1 1 0
[3]
(b) An aeroplane has a warning system that monitors the height of the aeroplane above the
ground, whether the aeroplane is ascending or descending, and the speed of the aeroplane.
The warning system will produce an output of 1 that will sound an alarm (W) when either of
these conditions apply:
or
A W
[5]
[Turn over
10
6 Hacking is one type of Internet risk used to obtain personal data that is stored on a computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Identify and describe two other types of internet risk that are used to obtain personal data.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
11
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Adeel uses an interpreter while developing and testing the application.
Adeel uses a compiler when the application is ready to be shared with others.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
[Turn over
12
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
13
8 The Von Neumann model, for a computer system, uses the stored program concept.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The fetch-execute cycle of a Von Neumann model, for a computer system, uses registers and
buses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) Computers based on the Von Neumann model, for a computer system, use interrupts.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
14
BLANK PAGE
15
BLANK PAGE
16
BLANK PAGE