Computer Studied Past Papers 2210
Computer Studied Past Papers 2210
Paper-I
“Theory of Computer Science”
Compiled by:
Farhan Rahmat
Table of Contents
2|Page
1.1 Data representation
1.1.1 Binary systems
1.1.2 Hexadecimal
1. Express the denary value 109 as
(i) a binary number using an 8-bit byte;
(iii) a hexadecimal number.
128 64 32 16 8 4 2 1
Is Is Is Is Is Is Is Is
109>=128? 109>=64? 45>=32? 13>=16? 13>=8? 5>=4? 1>=2? 1>=1?
N Y Y N Y Y N Y
0 1 1 0 1 1 0 1
=109-64 =45-32 =13-8 =5-4 =1-1
=45 =13 =5 =1 =0
=(01101101)2
128 64 32 16 8 4 2 1
Is Is Is Is Is Is Is
78>=128?N 78>=64?Y 14>=32?N 14>=16?N 14>=8?Y 6>=4?Y 2>=2?N
0 1 0 0 1 1 1 0
=78-64 =14-8 =6-4 =2-2
=14 =6 =2 =0
=(01001110)2
Is 78<255?Y
=78÷16
=4 remainder 14
=(4E)16 (Note: A=10,B=11,C=12,D=13,E=14,F=15)
1|Page
=64+16+8+4+1
=(93)10
4. Convert the following binary numbers into decimal number & hexadecimal
number:
(i) (00001100)2
(ii) (01011001)2
(iii) (00000111)2
128 64 32 16 8 4 2 1
0 0 0 0 1 1 0 0
0x128 0x64 0x32 0x16 1x8 1x4 0x2 0x1
0 0 0 0 8 4 0 0
=8+4
=(12)10
8 4 2 1 8 4 2 1
0 0 0 0 1 1 0 0
0x8 0x4 0x2 0x1 1x8 1x4 0x2 0x1
0 0 0 0 8 4 0 0
=0 =8+4
=0 =12
=0 =C
=C
=(C)16
(01011001)2
128 64 32 16 8 4 2 1
0 1 0 1 1 0 0 1
0x128 1x64 0x32 1x16 1x8 0x4 0x2 1x1
0 64 0 16 8 0 0 1
=64+16+8+1
=(89)10
8 4 2 1 8 4 2 1
0 1 0 1 1 0 0 1
0x8 1x4 0x2 1x1 1x8 0x4 0x2 1x1
0 4 0 1 8 0 0 1
=4+1 =8+1
=5 =9
=59
=(59)16
(00000111)2
128 64 32 16 8 4 2 1
0 0 0 0 0 1 1 1
0x128 0x64 0x32 0x16 0x8 1x4 1x2 1x1
0 0 0 0 0 4 2 1
=4+2+1
=(7)10
2|Page
8 4 2 1 8 4 2 1
0 0 0 0 0 1 1 1
0x8 0x4 0x2 0x1 0x8 1x4 1x2 1x1
0 0 0 0 0 4 2 1
=0 =4+2+1
=0 =7
=7
=(7)16
5. Is there a short cut to working out a binary number that is made of solid ones,
such as: (01111111)2?
127 (=128-1)
128 64 32 16 8 4 2 1
0 1 1 1 1 1 1 1
0x128 1x64 1x32 1x16 1x8 1x4 1x2 1x1
0 64 32 16 8 4 2 1
=64+32+16+8+4+2+1
=(127)10
63(=63-1)
128 64 32 16 8 4 2 1
0 0 1 1 1 1 1 1
0x128 0x64 1x32 1x16 1x8 1x4 1x2 1x1
0 0 32 16 8 4 2 1
=32+16+8+4+2+1
=(63)10
31 (=32-1)
128 64 32 16 8 4 2 1
0 0 0 1 1 1 1 1
0x128 0x64 0x32 1x16 1x8 1x4 1x2 1x1
0 0 0 16 8 4 2 1
=16+8+4+2+1
=(31)10
6. Convert the following Hexadecimal numbers into denary system and binary
system:
(i) A1
(ii) 37
(iii) FF
(iv) 0D
(v) ABC
3|Page
1. A1
Binary:
A1-->(10,1)
10 1
8 4 2 1 8 4 2 1
1 0 1 0 0 0 0 1
=(10100001)2
Decimal: 10 1
16^1 16^0
16 1
=10x16 =1x1
=160 =1
=160+1
=(161)10
2. 37
Binary:
37(3,7)
3 7
8 4 2 1 8 4 2 1
0 0 1 1 0 1 1 1
=(00110111)2
Decimal: 3 7
16^1 16^0
16 1
=3x16 =7x1
=48 =7
=48+7
=(55)10
3. FF
Binary:
FF-->(15,15)
15 15
8 4 2 1 8 4 2 1
1 1 1 1 1 1 1 1
=(11111111)2
Decimal: 15 15
16^1 16^0
16 1
=15x16 =15x1
=240 =15
=240+15
=(255)10
4|Page
4. ABC
Binary:
(A,B,C)(10,11,12)
10 11 12
8 4 2 1 8 4 2 1 8 4 2 1
1 0 1 0 1 0 1 1 1 1 0 0
=(101010111100)2
Decimal:
A B C
16^2 16^1 16^0
256 16 1
=10x256 =11x16 =12x1
=2560 =176 =12
=2560+176+12
=(2572)10
7. When a key is pressed on the keyboard, the computer stores the ASCII
representation of the character typed into main memory.
The ASCII representation for A is 65 (denary), for B is 66 (denary), etc.
There are two letters stored in the following memory locations:
(a) (i) Show the contents of Location 1 and Location 2 as binary. [2]
(ii) Show the contents of Location 1 and Location 2 as hexadecimal. [2]
(b) The following machine code instruction is stored in a location of main memory:
5|Page
Q25. Electric guitars consist of strings and frets.
6|Page
7|Page
8|Page
Q26. Digits on an electronic display board can be represented on a 7 × 5 grid. For
example, the digit 3 is represented as:
Each column in the grid is represented in a computer as a 7-bit register. Five registers
are required to represent the state of the whole digit. The value 1 represents a
shaded square and the value 0 represents an unshaded square. For example, the
digit 3 is represented as:
(a) Show the contents of the five 7-bit registers when representing the digit 9:
(b) In order to prevent errors, an 8-bit register is used. The 8th bit will contain:
• 0 – if the first 7 bits add up to an even number
• 1 – if the first 7 bits add up to an odd number
Complete the 8th bit for each register. The first register has been completed for you.
9|Page
10 | P a g e
1.1.3 Data storage
Q52. Give one benefit of storing music files in MP3 format.
(a) Any one from:
– file size is small
– fast to download/upload files
– format can be played on several types of devices, e.g. mobile phone, CD player,
laptop etc. [1]
(b) Describe the type of memory used in MP3 players. [2]
(b) Any two from:
– type of EEPROM
– non-volatile memories
– solid state memories
– NAND based memories
– mini hard disk drives [2]
11 | P a g e
1.2 Communication and Internet technologies
1.2.1 Serial and parallel data transmission
1.2.2 Security aspects
1.2.3 Internet principles of operation
Q40. State two advantages and one disadvantage of having a network of
Computers, rather than a series of standalone machines, in a school classroom. [3]
Q42. During transmission data can be corrupted. Check sums and parity checks can be
carried out on the data.
(a)Explain how check sums and parity checks are used to detect transmission errors.
-Check sum is the result of adding all the bytes of data (and ignoring the carry out of
the
byte)
-The result is sent along with the data and
-Checked against the total calculated as the data arrives
-If the two totals differ then a transmission error has occurred
-Parity involves every byte having its bits adding to either an odd or even total
-Type of parity must be agreed between sender and recipient
-Use of a parity bit to make each byte the correct type
-If bit is changed during transmission then the sum of bits will not match parity type
(1 per -, max 2 per type of check, max 4) (4)
[4]
(b)Bytes of data transferred using a serial cable are checked for errors at the
receiving end using an even parity check.
Can these bytes of data pass the even parity check?
(a) 01010101 [1]
(b) 11001000 [1]
(c) How can any errors be corrected? [2]
Q43. The data which is transmitted between survey sites and head office is liable to errors.
Data which is received is checked for errors.
(a) One method of checking for errors is to use parity checks.
The following four bytes have been received:
01101001 10111100 10101010 00100100
12 | P a g e
(i) One of the bytes contains an error. State which byte. [1]
(ii) Explain your choice of answer in (i). [2]
(iii) Explain why a byte may still be in error even if it passes the parity test.
[1]
(b) A second method of checking for errors is to use check sums.
Explain how check sums are used to check data for transmission errors. [4]
-Set of rules...
-to control the transmission of data [2]
Short for HyperText Transfer Protocol, the underlying protocol used by the
World Wide Web. HTTP defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take in response to
various commands
Q45. (a) State two differences between a local area network (LAN) and a wide area
network(WAN). [2]
(b) State what is meant by each of the following types of data transmission. Give
an advantage of each.
(i) Serial
– Individual bits sent one after another/along single wire
– can be used over long distances
– Less chance of corruption/less chance of bits having order changed [2]
13 | P a g e
Parity is being used as an error check.
State which one of the bytes has been corrupted. Explain why you chose the one that
you did.
Corrupted byte
Reason [3]
Q46. (a) Give one effect of hacking. [1]
(b) Give two ways of protecting computer systems against hacking. [2]
Q47. Many bank customers now bank on-line using the Internet.
(a) State two advantages for the bank of on-line banking. [2]
(b) State two disadvantages for a bank customer of on-line banking. [2]
14 | P a g e
possible to still bank even when banks closed/can bank 24/7
don’t have to wait for post/immediate payments can be made
disabled people don’t have to travel to a bank
less chance of being robbed for cash [2]
Q48. A company has set up an Internet website to sell their electrical goods online.
(a) Give two features you would expect to see on the website. [2]
(b) Payments for goods can be made by credit/debit cards. Data from the cards is
encrypted.
(i) What is encryption?
(ii) Why is data encrypted? [2]
(c) Apart from credit card fraud, people have other fears about buying from the
Internet.
Describe one of these fears. [1]
(c) Any one from:
– viruses being downloaded from the site
– bogus/fake sites
– “unwanted sites”/porn sites coming up when searching
– unsolicited mail
– “cookies” (etc.) being stored on hard drive (spying software)
– hacking [1]
15 | P a g e
Q49. To log on to a computer, a user needs to type in a user id followed by a password;
these should match up.
(b) Sometimes it is necessary to key in the password twice.
Name this type of data check. [1]
16 | P a g e
(b) Five security or data loss issues are shown on the left-hand side.
Five possible methods of data recovery or protection are shown on the right.
Draw a line to match each definition/description of Issues to the most appropriate
Methods of Data Recovery.
17 | P a g e
18 | P a g e
Q51. Describe THREE ADVANTAGES and TWODISADVANTAGES to the general public of
using the Internet to do online shopping. [5]
Any three advantages from:
– can shop 24–7/in own time
– worldwide therefore greater choice
– no need to waste money on travelling to shops
– no need to waste time travelling
– disabled/elderly people don’t have to leave their homes
– cost savings often passed on to customer
– can look for “best value” in a short time
– less pollution since fewer car journeys
Any two disadvantages from:
– shops close down in cities/unemployment/”ghost towns”
– increased risk of fraud/hacking
– less social interaction between people
– can’t see the goods first
– goods may not arrive/”bogus” web sites
– environmental issues/wasted packaging
– “ties up” the phone line if broadband not available
– increase in phone bills [5]
Q53. A company selling CDs uses a unique 6-digit identification number for each CD title.
The right-most digit (position 1) is a check digit.
For example,
19 | P a g e
(b) Find the check digit for the following identification number:
5 0 2 4 1 __
working:
check digit: [2]
(c) Describe, with examples, two different types of data entry errors that a check
digit would detect. [2]
(a) – program/software that allows a user to display web pages, web sites, etc.
NOT access the Internet
Give the names of the three parts that have been labelled: [3]
20 | P a g e
(b) (i) webpage (part of)
(ii) radio button
(iii) hyperlink NOT link
(c) How does the website recognise the user’s buying preferences as soon as
they visit the website? [1]
(d) Hacking is one security issue associated with the Internet and emails.
State two other security issues. [2]
(b) Ahmed uses the Internet for some time and is puzzled by the terminology.
Draw a line to match each description to the appropriate technical term.
21 | P a g e
22 | P a g e
(c) Ahmed sees the message “Set your browser to accept cookies”.
Explain why some websites make this request. [2]
23 | P a g e
fails, retransmission of the data is requested – this may be done repeatedly, until
the data can be verified.
Forward error correction (FEC): The sender encodes the data using an error-
correcting code (ECC) prior to transmission. The additional information
(redundancy) added by the code is used by the receiver to recover the original
data. In general, the reconstructed data is what is deemed the "most likely"
original data.
Q57. In each case below, state which Internet term is being described.
(a) Malicious software installed on a user’s hard drive or a web server; the software
re-directs the user to a fake website without their consent or knowledge. [1]
(b) Personal Internet journals where a writer enters text about a certain topic;
anyone can comment on the topic. [1]
(c) Websites designed to promote the building of online communities who share the
same interests; usually free of charge; users can add friends, post messages to each
other and update personal profiles. [1]
(d) Legitimate-looking email sent to a user in the hope of gathering personal
information; as soon as the recipient clicks on the link in the email (or email
attachment) they are sent to a fake website. [1]
(e) Software that secretly gathers information by monitoring key presses on a user’s
keyboard; this information is relayed back to the person who sent the software
originally. [1]
(a) pharming
(b) blog(s) [1]
(c) social networking (sites) [1]
(d) phishing [1]
(e) spyware/key logging (software) [1]
Q59. Explain, using examples where appropriate, the following computer terms:
(a) verification
(b) validation
(c) phishing
(d) pharming
(e) DOS
24 | P a g e
(f) spyware
(g) tapping into wireless networks
(a) Verification
any two points from:
check on input for errors
on screen checking/checked by human
comparing input/use of second operator/by double entry
examples: password entry, email entry [2]
(c) ‘Phishing’ refers to emails that trick people into giving out their personal and
banking information; they can also be sent by SMS. These messages seem to come
from legitimate businesses, normally banks or other financial institutions or
telecommunications providers. The scammers are generally trying to get information
like your bank account numbers, passwords and credit card numbers, which they
will then use to steal your money.
(d) Pharming is when you are redirected to a fake/scam version of a website which
may look identical to the website you were trying to view. This is sometimes referred to
as page-hijacking or page-jacking. In this scam, the legitimate url you typed into your
browser or the bookmarked link you followed automatically changes and redirects
you to a fake address, often which looks very similar to the legitimate address.
(e) DoS stands for Denial of Service. A malicious hacker uses a DoS attack to make a
computer resource (i.e. – website, application, e-mail, voicemail, network) stop
responding to legitimate users. The malicious hacker does this by commanding a
fleet of remotely-controlled computers to send a flood of network traffic to the
target. The target becomes so busy dealing with the attacker’s requests that it
doesn’t have time to respond to legitimate users’ requests. That can cause the
target system to stop responding, resulting in long delays and outages.
(f) Spyware is a software that monitors key presses on a user’s keyboard, and relays
the information back to the person who sent the software.
25 | P a g e
(b) Describe two methods used to prevent computer crime. [2]
(c) Describe ways to guard against each of the following Internet security issues. (A
different method should be given in each case.)
1. viruses
2. hacking
3. spyware
4. phishing
5. tapping into wireless networks [5]
Q61. State three effects on society due to the increase of businesses using e-commerce.
(ii) Name one method used to protect data in a file from being understood
when an unauthorised person has gained access to the file. [1]
26 | P a g e
(ii) encryption [1]
Q63. A company is concerned about three aspects of the security of data stored in
computer files:
• data corruption
• data loss
• illegal access to data
For each of the above, give one reason why it could occur and state one method
of prevention. Your reasons must be different in each case. [6]
Q64. (a) State three reasons why a computer system failure might occur (malfunction).[3]
(b) One effect of a computer system failure is the loss or corruption of files. State one
way of recovering a file if it has been lost or corrupted. [1]
(c) How is it possible to ensure illegally accessed files are unreadable? [1]
27 | P a g e
– encryption
– encrypt files [1]
Q65. A college secretary inputs data into fields on a computer screen as shown below:
(b) Apart from validation, how would it be possible to ensure only certain data could
be input into each of the fields on the computer screen? [1]
28 | P a g e
– to prevent RSI
– to prevent neck/back problems possible
– to prevent eye sight problems/headaches [1]
Q66. Which validation methods are being carried out by the following three pseudocode
statements?
(i) ifage > 10 and age < 20 then print "correct"
(ii) ifgender = "male" and title = "Mr" then print "correct"
(iii) iffield = "" then print "input data is missing"
(b) Name a different validation technique and give an example to show how it
works.
(b) 1 mark for name and 1 mark for example. Example must match name
Name Example
– type/character check only letters typed into name field
– format check ensure date typed in correct format
– length check ensure year field has four digits
– check digit on barcodes to ensure they have been read correctly
Q67. A hospital holds records of its patients in a database. Four of the fields are:
• date of visit (dd/mm/yyyy)
• patient’s height (m)
• 8-digit patient ID
• contact telephone number
The presence check is one possible type of validation check on the data. For each
field, give another validation check that can be performed. Give an example of
data which would fail your named validation check.
A different validation check needs to be given for each field.
Example of data which
Field Name Name of validation check would fail the validation
check
Date of visit
Patient’s height
Patient ID
Contact
telephone
number
29 | P a g e
30 | P a g e
Q68. The diagram below shows a number of descriptions and terms used in computer
security.
By drawing arrows, connect the correct description to the computer security term.
Program installed.
31 | P a g e
Q69. The following five statements about Internet security are incomplete:
(i) Illegal access to a computer system is known as < - - - - (a) - - - - >.
(ii) < - - - - (b) - - - - > are programs that self-replicate (copy themselves) and are
designed to disrupt computer systems.
(iii) < - - - - (c) - - - -> is where a user is sent legitimate-looking emails; as soon as the
email is opened and the recipient clicks on the embedded link, they are sent to a
fake website.
(iv) Software that monitors key presses on a user’s keyboard, and relays the
information back to the person who sent the software, is known as < - - - - (d) - - - - >.
(v) < - - - - (e) - - - - > is malicious code or software installed on the hard drive of a
user’s computer or on a web server; the code or software will re-direct the user to a
fake website without their knowledge.
Complete the five statements using words from the following list:
• cookies
• hacking
• pharming
32 | P a g e
• phishing
• spam
• spyware
• viruses
• web browsers
(a) ....................................................................................................................................... [1]
(b) ....................................................................................................................................... [1]
(c) ....................................................................................................................................... [1]
(d) ....................................................................................................................................... [1]
(e) ....................................................................................................................................... [1]
“backing up data removes the risk of the data being infected by viruses”
TRUE/FALSE ............................................................................................................................
Reason .....................................................................................................................................
(a) FALSE – encryption only stops data being read / making sense (but does not
prevent the act of hacking)
FALSE – data when backed up could still have the virus attached to it
– when the backed up data is re-loaded at a later date, the virus could be
loaded again into the system together with the stored data
TRUE – tapping into a Wi-Fi network is relatively easy (even when the network is
protected by passwords)
1 mark for each correct TRUE / FALSE with correct corresponding reason [3]
(b) Felipe uses Internet banking. When he logs on, the website asks for the 1st,
4th and 8th characters in his password. He selects the characters from drop-down
boxes.
(i) State why drop-down boxes are used. [ 1]
(ii) Felipe is also asked to confirm the last date and time when he logged onto the
website.
State why he is asked to confirm this. [1]
(iii) When Felipe wishes to return to a previous page on this website, he clicks on the
View My Account option rather than using the browser arrows. If he uses the browser
arrows, he is logged out of the website.
Give a reason why the website does this. [1]
(b) (i) drop down boxes help defeat spyware / key logging software
[1]
33 | P a g e
(ii) – to ensure that it was in fact Felipe who logged on last time [1]
– an additional authentication check
(iii) in case it is not Felipe who attempts to access the account [1]
Q71. Data sent across the Internet are frequently encrypted. The following flowchart
shows a basic encryption method (Note: the → symbol in the flowchart means “is
replaced by”).
34 | P a g e
(c) Any three from:
– customers need a password / PIN
– use of card readers / use of Transaction Authentication Number (TAN)
– only certain characters from password / PIN requested…
– …the requested characters change each time user logs on
– card security code requested
35 | P a g e
– use of drop down boxes
– use of a customer reference number
– inform customer when they last logged on to the website
– use of image verification code e.g. CAPTCHA
– make reference to something unique to the customer e.g. their mobile
phone number
– use of secure protocol e.g. https, padlock symbol [3]
Q72. In a simple symmetric encryption system, each letter of the alphabet is substituted
with another.
The plain text message:
The quick brown fox jumps over the lazy dog.
becomes the cypher text message:
Zag towns jumpy dmh coilp mngu zag bfke qmx.
Q73. Can you decipher this code? Here's a hint: Z=A; +=1; ~=10. Enter the message in the
space below. Try to figure out the code without using the decryption tool for every
letter. Can you think of a faster or easier way to solve this puzzle?
Q74. No need for a decoder. Just pick out every third letter!
Use all CAPITAL letters when entering your answer.
36 | P a g e
GENERAL DONOVAN IS CONSIDERED THE FATHER OF MODERN AMERICAN
INTELLIGENCE GATHERING.
Q75. Can you decipher this code? Here's a hint: 11 = A; 10 = Z. Enter the message in the
space below.
37 | P a g e
1.3 Hardware and software
1.3.1 Logic gates
Q76. A car has an engine management system (EMS). The EMS outputs the following
signals.
(a) (i) Draw a logic circuit for the following fault condition:
All three signals (A = 1, B = 1 and C = 1) indicate a fault. The driver is warned to stop
the engine – output X = 1.
38 | P a g e
(ii) Draw a logic circuit for the fault condition:
Either (A = 1 and B = 1) or (B = 1 and C = 1) indicate a fault. The driver is warned that
the engine needs a service – output Y = 1.
39 | P a g e
Q77. Complete the truth table for the following logic circuit:
40 | P a g e
(b) Draw a logic circuit corresponding to the following logic statement:
41 | P a g e
Q78. (a) Draw the logic circuit corresponding to the following logic statement:
X = 1 IF ( (A is NOT 1 AND B is 1) OR (B is 1 AND C is 1) ) OR (C is 1)
[5]
42 | P a g e
(b) Complete the truth table for the above logic statement:
[4]
43 | P a g e
44 | P a g e
Q79. Complete the truth table for the following logic circuit:
(b) Re-draw the logic circuit shown opposite, using NAND and NOR gates only. [2]
45 | P a g e
(c) Write a logic statement that describes the following logic circuit: [3]
46 | P a g e
Q80. Complete the truth table for the following logic circuit:
(b) Write the logic statement to describe the following logic circuit:
47 | P a g e
48 | P a g e
Q81. (a) (i) Complete the truth table for the logic circuit which is made up of NAND gates
only.
49 | P a g e
50 | P a g e
Q82. A power station has a safety system based on three inputs to a logic network. A
warning signal (S = 1) is produced when certain conditions occur based on these 3
inputs:
Q83. A chemical plant gives out a warning signal (W = 1) when the process goes wrong. A
logic network is used to provide input and to decide whether or not W = 1.
51 | P a g e
1.3.2 Computer architecture and the fetch execute cycle
Q28. (i) Explain what the accumulator holds and how the contents change
during the fetch-execute cycle. [2]
(ii) Explain what the program counter (PC) holds and how the contents
change during the fetch-execute cycle. [3]
(i) -Hold the data currently being processed
-Result of calculation is held in accumulator...
-before being passed to memory unit
(1 per -, max 2) [2]
Q1. (i) What information would be stored on the bar code? [1]
(ii) Why do airports use the bar codes on baggage? [1]
Q2. Name two devices used for direct data capture. Give one application for each
device named. [4]
Q3. An interactive information system is being designed for use in the terminal building of
an airport.
(a) (i) State an input device which would be suitable for use in this
application.
Justify your choice. [2]
(ii) State an output device which would be suitable for use in this
application.
Justify your choice. [2]
(a) (i) -e.g. Touch screen
53 | P a g e
-because it has limited options / is a simple user interface
-acts as both an input and an output [2]
(ii) -e.g. screen / speaker
-To show directions / to see the options
-Output sound warning for incorrect input / verbal instructions [2]
Q4. A supermarket uses barcodes as part of its item price retrieval and automatic stock
control system.
A customer takes items to the point-of-sale (POS) checkout. The barcodes are
scanned.
(a) Describe what happens next regarding data retrieval and stock control. [5]
(b) Name two devices needed at the POS checkout.
Give a reason for your choice of device. [4]
Q5. Two devices used by the supermarket Point-Of-Sale (POS) terminal are a barcode
reader and a keyboard.
Name two other input/output devices used at the POS and give a use for each
device.
54 | P a g e
device 1
use
device 2
use [4]
(b) 1 mark for each device + 1 mark for correct matching use
device: beeper/loud speaker
use: to indicate barcode correctly read/error in reading barcode
device: (LCD) screen/monitor
use: to show prices and other information about goods
device: touch screen
use: to show prices and other information about goods/to select items that
need to be weighed/identified
device: weighing machine
use: to find weight of loose items (e.g. fruit) to enable pricing
device: (magnetic) card reader/CHIP and PIN reader
use: to read customer’s debit/credit card/enable customer to pay for
goods using a credit or debit card
device: printer
use: to print receipts
(NOT keypad) [4]
Q6. Items sold in supermarkets are all marked with bar codes.
(a) Customers are given an itemised bill at the checkout. Give two advantages to
the customer. [2]
(b) Give two ways the information on the bar code can be input at the checkout.
[2]
(c) Describe how bar codes are used in automatic stock control. [3]
Q7. Describe the difference between speech recognition and speech synthesis. [2]
Q8. Describe three ways you could modify a typical input/output environment to
enable people with disabilities to use the computer system.
[3]
Any three points from: (NB if disability mentioned, shouldn’t conflict with
method/device)
large/concept keyboards/switches
braille keyboards (for partially sighted/blind)
tracker ball to move pointer if keyboard/mouse can’t be used
touch screens (using head wands)
software to predict words (e.g. for dyslexic people)
speech recognition
foot activated control (if no arm movement)
large icons/fonts on screens ( – if partially sighted)
braille printers
speech synthesis speakers = 0
large screen
choice of colours [3]
Q9. A supermarket makes use of barcodes on all its goods as part of its automatic stock
control system.
(a) Describe how the price is found for each item sold. [2]
(b) The following are steps in the automatic stock control system.
Number the steps in the correct order.
[4]
56 | P a g e
Q10. A factory uses a computer system to store information about customers, spare parts
and general administration.
(a) Spare parts can be identified by selecting from diagrams on a computer screen.
Describe what hardware would be needed to allow the parts to be selected in this
way. [2]
(b) The factory needs to buy a new printer. It has decided to buy either a dot matrix
printer or an inkjet printer. Discuss the advantages and disadvantages of using both
types of printer in this application. [3]
Q11. The following table shows three applications which require specialist output devices.
57 | P a g e
For each application, suggest one possible output device and give a reason for your
choice.
58 | P a g e
Q12. A list of four printers and four different applications which use printers is shown below.
(a) Using arrows, link each printer to the most appropriate application.
(b) Give one feature of each printer which makes it appropriate for the application.
3D printer
Dot matrix printer
Colour inkjet printer
Colour laser printer [4]
59 | P a g e
Q13. For each of the following five groups of hardware items, write down a computer
application that would need those items.
Q14. (a) An airport uses electronic devices as part of its security systems.
One system matches the face of a passenger with the photograph in their
passport.
What two input devices would be needed to do this? Give reasons for your
choice of
device. [4]
(b) When the passenger goes to the check-in desk, their luggage is weighed.
(i) How does the computer system capture the luggage weight? How
does it Then check that it does not exceed the airline’s weight limit?[3]
(ii) The computer also prints out a label identifying passenger ID, flight
number and destination. This label, which is tied onto the luggage, is
computer readable.
Describe a suitable data capture system which could be used to read
these labels so that the luggage can be tracked. [2]
60 | P a g e
scanner
to produce an electronic/digital map version of the passport photograph
(scans) into computer readable format
digital camera/video camera
to produce an electronic image of the passenger’s face
produces a similar format to the scanned image [4]
Q15. Name a suitable hardware device to enable automatic data capture in each of the
following applications. Each device must be different.
Q16. The following diagram shows six descriptions of automatic data capture methods
and six terms.
61 | P a g e
Draw lines to connect each description to the correct term.
62 | P a g e
Q17 (a) State two differences between random access memory (RAM) and read only
memory(ROM). [2]
(b) Describe what is stored on
(i) RAM,
(ii) ROM
explaining why that type of memory is appropriate. [4]
Q18 Name THREE different types of storage media and give an example of each.
Q19. A company produces animation effects using computers rather than producing
them manually.
(b) Each image takes about 400 kilobytes of storage. 25 images per second are
produced.
How much memory would be needed to store a 30-minute animation?
64 | P a g e
Q56. (a) John has bought a 4 Gbyte MP3 player.
(You may assume: 1 byte = 8 bits, 1 Mbyte = 1024 kbytes and 1Gbyte = 1024 Mbytes)
(i) We can assume that each song lasts 3 minutes and is recorded at 128
kbps(kilobits per second).
How much memory is required per song? [2]
(ii) Using your answer in (i), how many songs can be stored on John’s MP3 player?[2]
(b) John also bought a device for recording television programmes. It allows him to
record a programme at the same time as he is watching an earlier recording.
Describe how such a system would work. [3]
Q21. The doors on a train are opened and closed automatically. Motors are used to
operate the doors.
The system is controlled by a microprocessor.
Each door has a sensor which detects if a passenger enters or leaves the train as the
doors are closing. If a passenger is detected, the doors are automatically re-
opened.
(a) Name a sensor which could be used to detect a passenger. [1]
(b) If the sensor in one of the doors fails, describe a safety mechanism to prevent
injury to a passenger. [1]
65 | P a g e
(c) Describe how the sensors, microprocessor and door motors interact to ensure a
passenger is not trapped in a closing door. [4]
Q23. A computer is used to control the traffic lights at each end of a narrow bridge.
(a) State one type of sensor that could be used to detect a vehicle approaching
the bridge. [1]
(b) Give one reason why an analogue to digital converter (ADC) may be needed.
[1]
(c) Describe how the data received from the sensors is used to control the timing of
the traffic lights.[3]
(d) If the computer controlling the traffic light system detects an error in the system,
or fails completely, what should the lights on the bridge do? [1]
(e)List use of following sensors:
• temperature
• magnetic field
• gas
• pressure
• moisture
• humidity
• pH/acidity/alkalinity
• motion/ infra-red
Pressure sensor:
A pressure sensor produces a signal that depends on the pressure to which it is
exposed.
Pressure sensor can be used in many appliances such as automatic blood pressure
monitor. Pressure sensor can also control the pressure of gases or liquids in chemical
reaction vessel.
Magnetic Field:
The Magnetic Field Sensor can be used to study the field around permanent
magnets, coils, and electrical devices
Gas:
A gas sensor produces a signal depending on the concentration of a particular gas
or vapor. We can use gas sensor for an inflammable gas to monitor the atmosphere
and sound an alarm if there is a leakage. We can use gas sensor in other
applications such as:
Breathalyser, which measure the concentration of alcohol vapour in a sample of
breath and estimate the concentration of alcohol in blood.
Process control in chemical industry.
Environment monitoring of air pollution.
pH/acidity/alkalinity sensor:
pH Sensor measures the pH of aqueous solutions in industrial and municipal process
applications. It is designed to perform in the harshest of environments, including
applications that poison conventional pH sensors.
Typical activities using our pH sensor include:
Acid-base titrations
68 | P a g e
Studies of household acids and bases
Monitoring pH change during chemical reactions or in an aquarium as a result of
photosynthesis
Investigations of acid rain and buffering
Analysis of water quality in streams and lakes
Infrared sensor:
An infra (IR) sensor produces a signal that depends on the level of invisible IR
radiation falling on it.
All objects (unless they are extremely cold) emit significant IR radiation. Security
camera equip with lens and grid of IR sensors uses these IR radiation to form a
detector for a person.
Disadvantage of using sensors are that they may need a power source to work and
may need regular calibration to check their accuracy.
Q92. The following flowchart shows how a burglar alarm system uses light sensors to
determine if an intruder has entered the house and decides to sound an alarm.
Select statements from the list below, using numbers only, to complete the flowchart.
69 | P a g e
70 | P a g e
71 | P a g e
Q93. The following flowchart shows how sensors (which can be analogue or digital) and a
computer are used to control the temperature of a greenhouse for plants.
Complete the flowchart using the items from the list below.
72 | P a g e
73 | P a g e
Q94. The following flowchart shows what happens when a customer uses a credit card to
pay for goods at a supermarket. Ten of the boxes are blank.
Using the items from the list, insert the ten missing statements using the appropriate
number only. Each statement may be used once only.
74 | P a g e
75 | P a g e
Q95. The following flowchart shows how the bar code written on an item is used to find
the price, do stock control and produce an itemised bill. Select statements from the
list below to complete the flowchart.
76 | P a g e
77 | P a g e
Q96. A digital camera contains a microprocessor. The camera’s specification includes:
• 20 megapixel resolution
• 32 gigabyte memory card
• autofocus facility
(a) A more expensive model of the camera has 40 megapixel resolution.
(i) Describe one advantage of increasing the resolution. [1]
(ii) Describe one disadvantage of having 40 megapixel resolution. [1]
(b) (i) Describe the type of memory used in the memory card. [1]
(ii) Give one benefit of using this type of memory. [1]
(c) (i) What is the meaning of the term pixel? [1]
(ii) If a compressed image file requires an average of 1 byte per pixel, what is the
maximum number of photos that can be stored on the memory card? [1]
(d) Apart from autofocus, describe one other feature you would expect to see on a
digital camera controlled by a microprocessor.
Q97. The workers in the office use three different types of storage medium.
For each of the three types, state a use to which the medium could be put and
justify your answer.
(i) Hard Disk
(ii) DVD-RW
(iii) CD-ROM
78 | P a g e
Q98. State an example of each of the following types of storage medium and give a use
for each.
(i) Magnetic [2]
(ii) Solid state [2]
(iii) Optical [2]
79 | P a g e
1.3.6 Operating systems
• buffer
any two points from:
temporary store/memory
allows speed of CPU/devices to be matched
to hold data being transferred between peripherals and CPU
e.g. pages stored waiting to be printed [2]
• polling
Method in which operating system periodically checks each peripheral device for
communication is called polling
• interrupts
any two points from:
a signal/request generated by a device/program power cut = 0
causes a break in execution of a program/stops program
e.g. printer out of paper [2]
• handshaking
any two from:
exchange of signals/protocols
to establish communication/readiness (to send and receive)
between two devices/computers
examples: printer and computer, modem and computer [2]
• checksum.
(v) count of the number of bits before transmission which is sent with the transmission
so that the receiver can check to see whether the same number of bits have arrived
Q33. Give three file management tasks that are done by a computer operating system.
The operating system is responsible for the following activities in connections with file
management:
• File creation and deletion.
• Directory creation and deletion.
• Support for manipulating files and directories.
• Mapping files onto secondary storage.
• File backup on stable (nonvolatile) storage media.
• Identify and locate a selected file
• Use a directory to describe the location of all files plus their attributes
• On a shared system describe user access control
• Blocking for access to files
• provide simple and fast algorithms to read and write files
• give and deny access rights on files to users and programs
• allocate and de allocate files to processes
• provide users and programs with simple commands for file handling
81 | P a g e
Q34. A student gave the following three computer definitions.
Give the name of the term being described in each case.
(i) “a signal from a device sent to a computer causing the CPU to stop its current
operation temporarily”
(ii) “an exchange of signals between two devices when communicating to ensure
synchronisation”
(iii) “a temporary memory to store data waiting to be sent to a device”
(i) interrupt
(ii) handshaking
(iii) buffer [3]
Q36. State why the process known as handshaking is necessary between a computer
and the file server before use.
To ensure that both are on and ready for communication/to ensure that both are
using same protocol. [1]
Q37. Describe how buffers and interrupts are used in the transfer of data from primary
memory to secondary storage.
-Data sent to buffer from primary memory
-Processor can continue with other tasks
-Data downloaded from buffer to file server
-When buffer empty, interrupt sent to processor requesting refill of buffer
-Interrupt added to queue and dealt with when top of queue/interrupt dealt with on
receipt by processor.
(1 per -, max 4) [4]
Q38. Describe the stages of the process of transferring data from memory to backing
store. Your answer should include references to buffers and interrupts.
Q39. (i) Explain the role of the buffer and interrupts when a large document of over
200pages is sent to a laser printer. [3]
(ii) The use of two buffers would speed up the printing process.
Explain why.
(i) Any three points from:
data is transferred from (primary) memory to printer buffer
when the buffer is full, the processor can carry on with other tasks
printer buffer is emptied to printer
when printer buffer is empty, printer sends an interrupt to the processor
requesting more data to be sent
according to priorities [3]
(ii) Any two points from:
first (block) of data sent to the first buffer
whilst this data is being printed by the printer
next block of data is sent to the second buffer
when the first buffer is empty
data from the second buffer is then printed
meanwhile more data is then sent to the first buffer
this continues until all data has been processed by the printer [2]
83 | P a g e
1.3.7 High- and low-level languages and their translators
84 | P a g e
1.5 Ethics
Q85. List ten commandments of computer ethics.
Shareware Software:
The software is licensed for copying and sharing for a trial period, but payment must
be made to the owner for permanent use.
Q87. Explain Lossy and Lossless Compression. Give example of each compression
technique.
Lossless
These are used to make a file a smaller size but without losing any of the
information. Using this method you can always get back to the original file
Example:
PNG
RAW
Lossy
Sometimes some loss of quality is acceptable. For example the human ear
cannot hear all frequencies, so a file format that throws away parts that people
can't hear may end up with a smaller file, but it is not possible to get back to how
exactly the original music sounded.
Example:
MP3
JPEG
85 | P a g e
Q91. List the difference between Copyright Vs. Plagiarism
Copyright Plagiarism
One who violets copyright breaks laws One who plagiarizes breaks a moral
that protect the right of the creator of code by claiming credit for the work of
an original work. someone els.
Violation of copyright law may results Plagiarism may result in academic
in fines, imprisonment or both. dismissal or loss of job.
86 | P a g e