0478/12/o/n/24 © Ucles 2024
0478/12/o/n/24 © Ucles 2024
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Utility software is one type of software that can be run on a computer.
Tick (3) one box to show which software is an example of utility software.
B anti-virus
C web browser
D database
[1]
(c) Identify the type of software that manages inputs and outputs for the computer.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
Calculate the file size of the sound effect in kibibytes (KiB). Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
3
, ,
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..................................................................................................................................... [1]
3 A user enters data that is hexadecimal into a computer system. The data is converted to binary to
be processed by the computer.
...........................................................................................................................................
..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
Give the binary number for each of the three denary numbers.
15 ..............................................................................................................................................
180 ............................................................................................................................................
235 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Ĭ×ú¾Ġ´íÈõÏĪÅĊàú¸þ×
© UCLES 2024 Ĭç°ñÜīöėØûñ÷÷ĎğÉğĂ
ĥĥĕÕõõåõąÅõąąÕÅÕåÕ
0478/12/O/N/24 [Turn over
* 0000800000004 *
Give the hexadecimal number for each of the three denary numbers.
14 ..............................................................................................................................................
100 ............................................................................................................................................
250 ............................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(d) A binary integer that is stored in a register in the computer has a logical left shift performed on it.
(i) Describe the process of the logical left shift that is performed on the binary integer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
..................................................................................................................................... [1]
Give the name of the number system that can be used to represent negative binary integers.
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
ĬÕú¾Ġ´íÈõÏĪÅĊÞü¸Ā×
© UCLES 2024 Ĭç°ôÜġĈĒãõúðÕ²½ÙėĂ
ĥÕÅÕµõåÕĥĥąąÅÕĥÕµÕ
0478/12/O/N/24
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN
5
, ,
Identify two input devices that can be built into the smartwatch.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN
(b) Identify one output device that can be built into the smartwatch.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
............................................................................................................................................. [2]
(d) The smartwatch uses a text message application that receives data from cloud storage.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..................................................................................................................................... [2]
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
Ĭ×ú¾Ġ´íÈõÏĪÅĊÞú¸Ā×
© UCLES 2024 Ĭç¯óÔħČĢÖăć¹āÊęÙħĂ
ĥÕµĕõĕŵõĕÕąÅµąĕåÕ
0478/12/O/N/24 [Turn over
* 0000800000006 *
(e) The smartwatch only displays the time and text messages.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5 A barcode scanning system uses a check digit to check for errors in data on input.
(a) Explain how the barcode scanning system operates to check for errors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) After a barcode is scanned, data is sent to a stock control system to update the stock value
The data is sent to the stock control system using serial simplex data transmission.
(i) Explain how the data is sent using serial simplex data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
..................................................................................................................................... [3]
ĬÙú¾Ġ´íÈõÏĪÅĊßúµþ×
© UCLES 2024 Ĭç°óÏĝĤĬÎĈöÄġ²üñėĂ
ĥąĕĕõµÅĕµõõąąµåÕõÕ
0478/12/O/N/24
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN
7
, ,
(ii) Explain why serial simplex is the most appropriate method of data transmission for this
purpose.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
..................................................................................................................................... [3]
(iii) The data is checked for errors after it has been transmitted to the stock control system.
Give two error detection methods that could be used for this purpose.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN
6 The table contains names and descriptions of components in a central processing unit (CPU).
Complete the table by giving the missing component names and descriptions.
...............................................................................................
DO NOT WRITE IN THIS MARGIN
program counter
...............................................................................................
...............................................................................................
stores the address of the data that is about to be fetched
............................................................ from random access memory (RAM) into the CPU
...............................................................................................
accumulator
DO NOT WRITE IN THIS MARGIN
...............................................................................................
...............................................................................................