Paper 1 Exam 3
Paper 1 Exam 3
* 3 0 5 1 9 9 1 3 9 5 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK/SG) 202678/4
© UCLES 2021 [Turn over
2
1 Benedict has a computer that is assigned an Internet Protocol (IP) address. The IP address is:
198.167.214.0
(a) Convert the denary values 167 and 214 from the IP address to 8-bit binary.
167
214
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Benedict’s computer is also assigned a Media Access Control (MAC) address.
...........................................................................................................................................
..................................................................................................................................... [1]
Difference 1 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Difference 2 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(a) Six statements are shown about HDDs, SSDs and USB flash memory drives.
Tick (✓) to show which statements apply to each type of storage. Some statements can apply
to more than one type of storage.
USB flash
memory
Statement HDD SSD drive
(✓) (✓) (✓)
it is non-volatile
(b) Julia uses a USB connection to transfer data onto her USB flash memory drive.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
..................................................................................................................................... [1]
3 A firewall can be used to help keep the data secure that is stored on a computer.
(a) The given paragraph describes how the firewall operates to help keep the data secure.
Complete the paragraph using the most appropriate terms from the given list. Not all of the
terms on the list need to be used.
• Accept
• Criteria
• Hacking
• Input
• Network
• Outgoing
• Output
• Processor
• Reject
• Software
• Store
• Storage
the traffic based on this. It can help prevent ............................................ and malicious
(b) Identify three other methods that could be used to keep the data secure.
Method 1 ...................................................................................................................................
Method 2 ...................................................................................................................................
Method 3 ...................................................................................................................................
[3]
Phishing ...........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Pharming ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
5 Digital currency can be used to buy products from the world wide web.
...................................................................................................................................................
.............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
6 Jamelia has a greenhouse that she uses to grow fruit and vegetables. She needs to make sure
the temperature in the greenhouse stays between 25 °C and 30 °C (inclusive).
A system that has a temperature sensor and a microprocessor is used to maintain the temperature
in the greenhouse. The system will:
Describe how the system uses the temperature sensor and the microprocessor to maintain the
temperature in the greenhouse.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) Identify three other components that are present in an expert system.
Component 1 ............................................................................................................................
Component 2 ............................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.............................................................................................................................................................[1]
(i) Describe how the sound files are compressed using lossless compression.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) State one reason why the music company would compress the sound files using
lossless, rather than lossy, compression.
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) Give one benefit, to the user, of the music company compressing the sound files.
...........................................................................................................................................
..................................................................................................................................... [1]
(iv) Give one drawback of the music company using lossless, rather than lossy, compression
for the sound files.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) Describe how the web pages for the website are requested and displayed on a user’s
computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) The web server that hosts the website suffers a distributed denial of service (DDoS) attack.
Explain why this will prevent users from accessing the website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
9 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
correctly.
(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column.
01100100
10010001
00000011
10110010
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
(i) Describe how data is sent using parallel half-duplex data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
Drawback 1 .......................................................................................................................
...........................................................................................................................................
Drawback 2 .......................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
10 Explain how echo checks are used to check data following data transmission.
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………[3]
BLANK PAGE