0% found this document useful (0 votes)
63 views12 pages

Revision Worksheet Computer Science Year 10

Null null null null

Uploaded by

nextyze
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views12 pages

Revision Worksheet Computer Science Year 10

Null null null null

Uploaded by

nextyze
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Year 10 Revision Worksheet

1) An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented by an
8-bit register, A, and the number of minutes is represented by another 8- bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.

Ans : 18 hours and 53 minutes

(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the hours and
minutes of the alarm time. Show how 07:30 would be represented by these two registers:

Ans: 00000111 hours


00011110 minutes

2)

Ans: 010010101111

(b) Convert the about binary numbers to hexa decimal number.

Ans: 29FC
3) Victoria is building a website for her cake design business. She uses the hexadecimal colour code #D2E3F5
as the background colour for her website. The colour code is stored in two 12-bit binary registers. Show
how the code would be stored in the registers.

Ans: 1101 0010 1110


0011 1111 0101

4) Letters from the alphabet are represented in a computer by the following denary (base 10) values:
A = 97
G=103
I=105
L=108
N=110
The word “A L I G N” is stored as: 97 108 105 103 110
(a)Convert each of the five values to binary. The first one has been done for you

Ans: L = 01101100

I= 01101001

G=01100111

N=01101110
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A” then
becomes:

This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these values into
hexadecimal:

Ans:
11011000 D8

11001110 CE

5 Write any 4 uses of hexa decimal system.


IP ADDRESS
MAC ADDRESS
COLOR CODES
ERROR CODES

6 Explain IP address
Each device connected to a network is given an address known as the Internet Protocol (IP) address. An
IPv4 address is a 32-bit number. An IPv6 address is a 128-bit number broken down into 16-bit chunks.
IPv6 uses a colon (:) rather than a decimal point (.) as used in IPv4.

7 Add the following binary number

Ans: 01101111
8

a) 29=00011101
51=00110011

b) 01010000

c) 00001010

d) 01001011

e) 01010101

f) 10101010

9 Convert the following negative denary numbers into binary numbers using the two’s complement
format:

-88 = 10101000

−127= 10000001

10 Explain each of the following terms:


i color depth
The number of bits used to represent the colours of a pixel
ii ASCII code and Extended ASCII code
ASCII code – a character set for all the characters on a standard keyboard and control codes
Extended ASCII- ASCII uses 8-bit codes (0 to 255 in denary or 0 to FF in hexadecimal). This gives another
128 codes to allow for characters in non-English alphabets and for some graphical characters to be
included

iii Unicode
A character set which represents all the languages of the world (the first 128 characters are the same
as ASCII code

iv sampling rate
the number of bits used to represent sound amplitude in digital sound recording (also known as bit
depth)

v bitmap image
an image made up of pixels

11 Uma is concerned about risks that she may encounter when using the Internet.
Two of the risks she is concerned about are phishing and pharming.

(a) Give one similarity and two differences between phishing and pharming.

Similarity
Difference 1
Difference 2

Ans:

(b) Identify two other risks that Uma could encounter when using the Internet.

Risk 1
Risk 2
Ans:
(c ) Edie is concerned that her children may download a virus when accessing websites.
State what is meant by a virus and explain what could happen if a virus was downloaded.

12) Secure socket layer (SSL) is used in the security of information on Internet websites.
(a) State how it is possible for a user to know that a website is secure by looking at the web address

Ans :

(b) Describe three of the stages a web browser goes through to detect whether a website is
Secure

13) Describe three tasks carried out by a firewall.


14) The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set
Ans:
 All the characters and symbols that can be represented by a computer system.
 Each character and symbol is assigned a unique value.

(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is that the
text stored takes up more storage space. Give one reason why it takes up more storage space.
Ans:
Each character is encoded using more bits.
15) A student is concerned about the threats to their computer when using the internet. The student
wants to use some security solutions to help protect the computer from the threats. (a) Identify a
security solution that could be used to protect the computer from a computer virus, hacking and
spyware. Each security solution must be different.

Ans:

16)
Ans:

Ans:

17) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.
18) Complete the table by identifying and describing two other examples of malware.
19) Write two advantages and disadvantages of each biometric.

20) A sanctuary for pheasants has set up a new database table called PheasantList to store details of the different
species of bird at the sanctuary. Part of this table is given, showing: species, description, number of birds at the
sanctuary, if the birds are breeding or not, and number of young born this year

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy