Jyss 2019 P1
Jyss 2019 P1
CANDIDATE NAME
COMPUTING 7155/01
Paper 1 3 Sep 2019
Candidates answer on the Question Paper. 2 hours
No Additional Materials are required.
Write your name, class and index number in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.
Do not use staples, paper clips, glue or correction fluid.
The number of marks is given in brackets [ ] at the end of each question or part question.
You should show all your working.
The total number of marks for this paper is 80.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..............................GB [2]
..................................................................................................................................................
..................................................................................................................................................
............................................................................................................................................ [2]
1...............................................................................................................................................
.................................................................................................................................................
.................................................................................................................................................
2...............................................................................................................................................
.................................................................................................................................................
........................................................................................................................................... [2]
3
Draw a line to match the security term with the most appropriate statement.
Pharming
Uses rules and criteria, set by the user, to
help protect a network or system from
unauthorised access.
Phishing
Legitimate-looking email is sent in the
hope of gathering personal information; it
requires the user to click.
Spyware
A message given to a web browser by a
web server; it is stored in a text file; the
message is then sent back to the server
each time the browser requests a page
from the server.
Firewall
Malicious code installed on the hard drive
of a user’s computer; this code will redirect
the user to a fake website without the
user’s knowledge.
[5]
3 Match the three descriptions below using the following list of types of software.
[3]
.......................................................................................................................................... [1]
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
........................................................................................................................................... [2]
5
FA7
D3E
FA7
D3E
[4]
(b) Now perform the AND (logic) operation on each corresponding pair of binary bits in the two
numbers from part (a).
[2]
(c) Convert your answer in part (b) into hexadecimal.
................................................................................................................................................
........................................................................................................................................... [2]
(d) Hexadecimal numbers are often used by computer programmers to represent binary
values.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
.......................................................................................................................................... [2]
6 A greenhouse uses a system to monitor the conditions that plants need to grow.
1 Window is open
W
0 Window is closed
1 Temperature >=26 °C
T
0 Temperature <26 °C
1 Humidity >=50%
H
0 Humidity <50%
The system will sound an alarm when certain conditions are detected.
(a) Write a Boolean statement that matches the description of the logic required.
X = ………………………………………………………………………….………………………...
…………………………………………………………………………………………….… [2]
7
T X
[5]
W T H X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
7 A pseudo-code algorithm:
1 InRange = 0
2 OutRange = 1000
3 FOR Count = 1 TO 10
4 INPUT Num
5 IF Num > 10 AND Num < 20 THEN InRange = InRange + 1
6 ELSE OutRange = OutRange - 1
7 NEXT X
8 OUTPUT InRange, OutRange
State the line number for each error and write the correct pseudo-code.
Correction......................................................................................................................................
……..……………………………………………………………………………………………………….
Correction......................................................................................................................................
……..……………………………………………………………………………………………………….
Correction......................................................................................................................................
……..……………………………………………………………………………………………………….
[6]
9
8 State which types of storage device would be most suitable for these scenarios.
For each device, give a reason for your choice.
Device: ...................................................................................................................................
Reason: ....…….......................................................................................................................
....……................................................................................................................................ [2]
(b) Storing a 1200 MB high-definition promotional movie about a new car. The movie is to be
given to people who are interested in buying a new car.
Device: ...................................................................................................................................
Reason: ....……......................................................................................................................
....……............................................................................................................................... [2]
(a) State why the computer needs to translate the code before it is executed.
.…………..…………………………………………………………………………………………….
..……................................................................................................................................. [1]
(b) Harry can use either a complier or an interpreter to translate the code.
Describe two differences between how a complier and an interpreter would translate
Harry’s computer game.
.….…………………………………………………….……………………………………………….
.…….………………………………………………….……………………………………………….
.……….……………………………………………….……………………………………………….
.……….……………………………………………….……………………………………………….
.……….……………………………………………….……………………………………………….
.……….……………………………………………….……………………………………………….
.…………….………………………………………….……………………………………………….
.……………………………………………………….…………………………………………… [4]
10 Parity checks can be used to check for errors during data transmission. The parity bit is often
the leftmost bit in the byte.
(a) A system uses even parity. Write the appropriate parity bit for each byte of data.
Parity Bit
1 0 1 0 0 1 1
1 0 1 1 1 1 1
1 0 1 0 0 0 1
[2]
….............................................................................................................................................
..…...........................................................................................................................................
.…...................................................................................................................................... [1]
(c) State one other method that could be used to check for transmission errors.
...….................................................................................................................................... [1]
11
A 7-digit code number has an extra digit on the right, called the check digit.
Digit position 1 2 3 4 5 6 7 8
Digit - - - - - - - -
(a) Calculate the check digit for the following code number. Show all your working.
4 2 4 1 5 0 8 …
….............................................................................................................................................
….............................................................................................................................................
….............................................................................................................................................
3 2 4 0 0 4 5 X
..…...........................................................................................................................................
................................................................................................................................................
................................................................................................................................................
..…...........................................................................................................................................
…….................................................................................................................................... [3]
12 Andrew has a spreadsheet to keep track of the number of members in his CCA Club. He
records down their names and student IDs. The first character of the ID represents the
gender of the student while the second to fifth character represent the year they are born in.
A B C D E F G
1 Number of 4
Today's date: 16/7/2019
Boys
2 Number of 3
Year 2019
Girls
3
4 S/No. Name Student ID Gender Year of Birth Age
5 1 Andrew Simmons M20051233 M 2005 14
6 2 Catherine Lim F20030089 F 2003 16
7 3 Balakrishnan M20040988 M 2004 15
8 4 Charlotte Koh F20041092 F 2004 15
9 5 Tammy Wong M20050291 M 2005 14
10 6 Ahmad Ibrahim M2006423 M 2006 13
11 7
12 8
.…………………………………………………………………………………………...……….. [1]
(b) The cell E5 shows the year of birth for Andrew Simmons.
.………………………………………………………………………………...………………….. [1]
(c) The formula in cell F1 calculates the number of boys in the club.
.……………………………………………………………...…………………………………….. [1]
.…………………………………………………………………………………...……………….. [1]
13
Advantage 1............................................................................................................................
................................................................................................................................................
........................................................................................................................................... [1]
Advantage 2............................................................................................................................
................................................................................................................................................
…........................................................................................................................................ [1]
Disadvantage..........................................................................................................................
................................................................................................................................................
........................................................................................................................................... [1]
Advantage 1............................................................................................................................
................................................................................................................................................
........................................................................................................................................... [1]
Advantage 2............................................................................................................................
................................................................................................................................................
…........................................................................................................................................ [1]
Disadvantage..........................................................................................................................
................................................................................................................................................
........................................................................................................................................... [1]
14 The algorithm allows a number to be entered. It then calculates and outputs the next number
in the mathematical series.
Fib = 1
Prev2 = 0
Prev1 = 1
INPUT Number
IF Number = 0
THEN Fib = 0
ENDIF
WHILE Number > 2
Fib = Prev2 + Prev1
Prev2 = Prev1
Prev1 = Fib
Number = Number - 1
ENDWHILE
OUTPUT Fib
[4]
15
(note: a palindrome reads the same way backwards or forwards. For example, 1331 is
a palindrome but 1541 is not).
Use separate variables to store the separate digits of a number (for example D1, D2,
D3, D4).
….………………………..…………………………………………………………………………………
………………….………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
….………………………..…………………………………………………………………………………
[4]
End of Paper
Blank Page