0% found this document useful (0 votes)
17 views12 pages

XMSS 2018 P1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views12 pages

XMSS 2018 P1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

2

For
1 Insert five of the following words about computer architecture in the correct place Examiner’s
in the text below. Use

memory data bus computer program input device

address bus output device computer processor

A ………………..…………………… carries out the instructions in a

………………..…………………… . The ………………..…………………… is where

data and instructions are stored ready to be processed. The

………………..…………………… identifies the location of data. The

………………..…………………… transports the data from one location to another. [5]

2 Give an example for each type of data storage.

Volatile data storage ………………………………………………………..…………......

Non-volatile data storage ………………………………………………...……………….. [2]

3 A school wants to use a computer program to find out which student has achieved
the lowest score in a Physics class. There are 24 students in the class and all the
students’ scores are different.

State the inputs, the outputs and the processes required to find the name and the
score of the student with the lowest score.

Inputs ……………………………………………………………………………………….

………………………………………………………………………………………………..

………………………………………………………………………………………………..

Outputs ……………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

Processes required ………………………………………………………………………..

………………………………………………………………………………………………..

……………………………………………………………………………………………….. [6]

7155/01/Computing/XMSS 2018 Preliminary Exam


3
For
Examiner’s
4 The problem of calculating the remainder when a number is divided by 4 can be Use
defined as follows:

Input Output
• Number: a positive whole number • Remainder when Number is divided
by 4

A possible solution to this problem is as follows:

Step 1: If Number is less than 4, proceed to Step 3. Otherwise, proceed to Step 2.


Step 2: Subtract 4 from Number and then proceed to Step 1.
Step 3: Output Number as the final answer.

A similar problem is as follows:

Input Output
• Number: a positive whole number • Remainder when Number is divided
• Divisor: a positive whole number by Divisor.

Write down the solution to the second problem by generalising the first solution.

………………………………………………………………………..……………………….

………………………………………………………………………………..……………….

……………………………………………………………………………………..………….

…………………………………………………………………………………..…………….

………………………………………………………………………………..……………….

………………………………………………………………………………..……………….

………………………………………………………………………………..………………. [3]

7155/01/Computing/XMSS 2018 Preliminary Exam


4
For
Examiner’s
5 Fig. 5 shows a flowchart of an algorithm Use

START

INPUT num

sum = 0
n = num

Is n >= No
1?
Yes
rem = n MOD 10

sum = sum + (rem*rem*rem)

n = n//10

No Is num
= sum?

Yes

OUTPUT TRUE

OUTPUT
FALSE

END

Fig. 5

7155/01/Computing/XMSS 2018 Preliminary Exam


5
For
Examiner’s
Complete the trace table for the following set of data. Use

371

Trace table

num sum n rem OUTPUT

[5]

6 Constants, variables and arrays are used in programming.

Describe what is meant by:

a constant …………………………………………………………………………………..

………………………………………………………………………………………………..

a variable ……………………………………………………………………………………

………………………………………………………………………………………………..

an array ……………………………………………………………………………………...

……………………………………………………………………………………………….. [3]

7155/01/Computing/XMSS 2018 Preliminary Exam


6
For
Examiner’s
7 Write a program using Python that asks the user to input 2 positive integers and Use
output their sum to the screen. However, if the 2 integers are the same, output
twice their sum to the screen. Input verification is not required.

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

……………………………………………………………………………………………….. [9]

8 Length check and range check are common checks that are performed in data
validation.

Describe what is meant by:

length check …………………………………………………………………………….….

………………………………………………………………………………………………..

range check …………………………………………………………………………………

……………………………………………………………………………………………….. [2]

7155/01/Computing/XMSS 2018 Preliminary Exam


7
For
Examiner’s
9 An algorithm is required to find the average of 10 numbers stored in an array. The Use
input is provided in an array called “Number” and the output is provided through a
variable named “Average”. Study the following pseudo-code.

Total = 500
Counter = 1
WHILE Counter > 11 DO
Total = Total – Number[Counter]
Counter = Counter + 1
ENDWHILE
Average = Total / Counter

There are four errors in this pseudo-code. Locate the errors and state the correct
pseudo-code.

Error 1 ……………………………………………………………………………………….

Correction …………………………………………………………………………………...

………………………………………………………………………………………………..

Error 2 ……………………………………………………………………………………….

Correction …………………………………………………………………………………...

………………………………………………………………………………………………..

Error 3 ……………………………………………………………………………………….

Correction …………………………………………………………………………………...

………………………………………………………………………………………………..

Error 4 ……………………………………………………………………………………….

Correction …………………………………………………………………………………...

……………………………………………………………………………………………….. [8]

7155/01/Computing/XMSS 2018 Preliminary Exam


8
For
Examiner’s
10 Five descriptions and five security issues are shown below. Use

Draw a line to connect each description to the correct security issue.

Description Security issue

malicious code installed on the hard drive of a


user’s computer or on the web server; this code
hacking
will re-direct user to a fake web site without their
consent

software that gathers information by monitoring


key presses on a user’s computer and relays the
pharming
information back to the person who sent the
software

program or code that replicates itself and is


designed to amend, delete or copy data and phishing
files on a user’s computer without their consent

the act of gaining illegal access to a computer


spyware
system without the owner’s consent

creator of code sends out a legitimate-looking


email in the hope of gathering personal and
virus
financial data; it requires the recipient to follow a
link in the email or open an attachment
[5]

7155/01/Computing/XMSS 2018 Preliminary Exam


9
For
Examiner’s
11 (a) Convert the hexadecimal number BC into a binary number. Show your Use
working.

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

…………………………………………………………………………………………. [2]

(b) Convert the denary number 401 into a binary number. Show your working.

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

…………………………………………………………………………………………. [2]

(c) Convert the denary number 11001 into a hexadecimal number. Show your
working.

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

…………………………………………………………………………………………. [2]

7155/01/Computing/XMSS 2018 Preliminary Exam


10
For
Examiner’s
12 An alarm sounds when a car fuel injection system gives certain fault conditions. Use
The inputs are:

Input Binary value Condition


0 pressure < 5 bar
P
1 pressure >= 5 bar
0 revs > 8000 rpm
R
1 revs <= 8000 rpm
0 temp > 120 ˚C
T
1 temp <= 120 ˚C

The output, X, of a logic circuit that drives the alarm must have a value of 1 only if:
either pressure < 5 bar and revs > 8000 rpm
or revs <= 8000 and temp > 120 ˚C

Draw a logic circuit for the system.

[6]

7155/01/Computing/XMSS 2018 Preliminary Exam


11
For
Examiner’s
13 A spreadsheet has been set up to compare the costs of types of fruit juice sold by a Use
shop.

A B C D
1 NAME OF FRUIT NORMAL PRICE VOLUME OF COST PER
JUICE PER BOTTLE ($) BOTTLE (LITRES) LITRE ($)
2 Apple 3.50 1.0 3.50
3 Orange 2.80 1.0 2.80
4 Pomegranate 4.55 0.7 6.50
5 Caju 2.00 2.0 1.00
6 Mango 1.05 0.7 1.50
7 Average cost: 3.06

(a) What formula is in cell D5 to calculate the cost of Caju juice per litre?

…………………………………………………………………………………………. [1]

(b) What formula is in cell D7 to calculate the average cost of fruit juice per litre?

…………………………………………………………………………………………. [1]

(c) Three extra columns are added to this spreadsheet:


Column E will show a percent discount on the normal price of a bottle of fruit
juice (number datatype);
Column F will show this discount in dollars ($);
Column G will show the price of a bottle of fruit juice after discount.

Complete the spreadsheet below by showing the formulas that are needed to
be placed in cells F2 to F6 and G2 to G6.

E F G
Percentage Discounted price per
1 Discount amount ($)
discount (%) bottle ($)

2 10

3 20

4 15

5 10

6 5
[4]

7155/01/Computing/XMSS 2018 Preliminary Exam


12
For
Examiner’s
14 A computer network is a system of two or more computers that are connected Use
together by a transmission medium for the exchange of data.

(a) Give two advantages of networking computers.

1. ……………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

2. ……………………………………………………………………………………….

………………………………………………………………………………………….

…………………………………………………………………………………………. [2]

(b) Explain the use of parity bits during data transmission.

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

………………………………………………………………………………………….

…………………………………………………………………………………………. [4]

7155/01/Computing/XMSS 2018 Preliminary Exam


13
For
15 Write an algorithm, using only pseudo-code or a program flowchart, that Examiner’s
Use
• inputs twenty different numbers and stores these numbers in an array
• outputs the array index of any number less than 50
• outputs how many numbers were less than 0 and outputs how many
numbers were greater than 0.

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

………………………………………………………………………………………………..

……………………………………………………………………………………………….. [8]

End of paper

7155/01/Computing/XMSS 2018 Preliminary Exam

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy