0% found this document useful (0 votes)
22 views13 pages

Computer Paper

o levels computer 2210 full lenght paper of chapter 1,2,4,5,6,10

Uploaded by

a47077187
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views13 pages

Computer Paper

o levels computer 2210 full lenght paper of chapter 1,2,4,5,6,10

Uploaded by

a47077187
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Cambridge O Level

COMPUTER SCIENCE 2210/11


Paper 1 & 2 Mid Term 2024

O Level 1 1 hour 45 minutes

You must answer on the question

paper.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name in the box at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].

This document has 10 pages.

[Turn over
1 Hypertext markup language (HTML) colour codes can be represented as hexadecimal.

(a) Tick (✓) one box to show which statement about the hexadecimal number system
is incorrect.

A It uses the values 0 to 9 and A to F.

B It can be used as a shorter representation of binary.

C It is a base 10 system.

D It can be used to represent error codes.


[1]

(b) Denary numbers can be converted to hexadecimal.

Convert the three denary numbers to hexadecimal.

20 ...............................................................................................................................
...............

32 ...............................................................................................................................
...............

165 ..........................................................................................................................................
..
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 The binary number 10100011 is stored in random access memory (RAM).

A logical left shift of three places is performed on the binary number.

(a) Give the 8-bit binary number that will be stored after the shift has taken place.

............................................................................................................................. [1]

(b) Tick (✓) one box to show which statement about a logical left shift of two places is
correct.

A It would divide the binary number by 2.

B It would multiply the binary number by 2.


C It would divide the binary number by 4.
[1]
D It would multiply the binary number by 4.

(c) 10100011 can be stored as a two’s complement integer.

Convert the two’s complement integer 10100011 to denary. Show all your
working.

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

............................................................................................................................. [2]

(d) The binary number is measured as a byte because it has 8 bits.

State how many bytes there are in a kibibyte (KiB).

............................................................................................................................. [1]

3 Data packets are transmitted across a network from one computer to another
computer.

(a) Describe the structure of a data packet.

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

............................................................................................................................. [3]

(b) Packet switching is used to transmit the data packets across the network.

Identify the device that controls which path is taken by each data packet.

............................................................................................................................. [1]
(c) Serial data transmission is used to transmit the data packets across the network.

Explain why serial data transmission is used to transmit the data packets.

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

............................................................................................................................. [3]

4 Data is encrypted to keep it safe during transmission.

Complete the paragraph about asymmetric

encryption. Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

asymmetric certificate cipher text

decrypted encrypted parallel key plain text private


key

protected public key serial key symmetric

.............................................................. is encrypted into


..............................................................

using a........................................................The encrypted data is then transmitted


from the

sender to the receiver. The encrypted data is then decrypted using a

.............................................................. . [4]

5 A farmer uses an automated robot to plant seeds in the field.

(a) State what is meant by the robot being automated.

......................................................................................................................................
.............

............................................................................................................................. [1]
(b) Give three characteristics of a robot.

1 ...................................................................................................................................
.............

......................................................................................................................................
.............

2 ...................................................................................................................................
.............

......................................................................................................................................
.............

3 ...................................................................................................................................
.............

...................................................................................................................................................
[3]

(c) The robot plants seeds and stops when it reaches a fence. It then turns and
continues planting seeds. The robot uses sensors and a microprocessor to know
when it reaches a fence.

Explain how the robot uses sensors and a microprocessor to know it has reached
a fence.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................. [6]

(d) Give two advantages of the farmer using an automated robot to plant seeds.

1 ................................................................................................................................................

...................................................................................................................................................
...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(e) Give two disadvantages of the farmer using an automated robot to plant seeds.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(f) The robot is adapted to have machine learning capabilities.

Explain how this will improve the robot.

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

............................................................................................................................. [2]

6 A company owner has installed a new network. Data is correct before it is


transmitted across the network.

The company owner is concerned that data might have errors after transmission.

(a) Explain how the data might have errors after transmission.

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

......................................................................................................................................
.............

............................................................................................................................. [3]

(b) The company owner decides to introduce an error detection system to check
the data for errors after transmission.

The error detection system uses an odd parity check and a positive automatic
repeat query (ARQ).

(i) Describe how the error detection system operates to check for errors.

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
............. ................................................................................................................
...........................
..............................................................................................................................
........ [8]

(ii) Give two other error detection methods that could be used.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

b What is meant by RLE.

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
.............

..............................................................................................................................
........ [3]
BLANK PAGE

© UCLES 2210/11/M/J/
2024 24

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy