Work Book 1 PDF
Work Book 1 PDF
/--
,___� .____,i
//
Lecture Notes
Revision
Gulde
2| Page
Contents
Syllabus content & assessment at a glance ............................................................................................4
1.1 Data representation ................................................................................................................................7
Denary (Decimal) Number System:- .....................................................................................................7
1.1.1 Binary Number System:- ...............................................................................................................8
1.1.2 Hexadecimal Number System:- ................................................................................................ 11
Examination Questions .................................................................................................................... 20
His entire career path revolves around computer science; either he was a
student or a teacher. He got a chance to polish his skills of teaching and
studying more about computers at various levels which has given him great
confidence in presenting himself for any senior level position of transferring
his knowledge to the youth.
He has not stopped, he is continuing with his education at the higher levels.
It is his second semester of M Phil computer studies from a well-know
university of Pakistan; The Institute of Business & Technology.
Paper 1
Theory of Computer Science
7| Page
1.1 Data representation
Number System:-
―The system of counting and calculating is called number system.‖
Number system is based on some characters called digits. The number of digits is
known as base or radix of the number system. For example binary number system uses
two characters 0 and 1 and its base is 2.
Computer uses following four numbers:
i) Denary (Decimal) number system
ii) Binary number system
iii) Hexadecimal number system
Using only 0 and 1 makes it easier to design the electronic circuits that the computers
will use. This is because, if the computer wants to check a value in any part of the circuit,
it only needs to detect whether or not there is any electricity. If there is electricity, the
value is 1, if there is no electricity, the value is 0.
0 = NO
1 = YES
This is making use of just 1 bit of data. Add another bit and you can say more:
00 = NO 10 = MAYBE
01 = NEXT WEEK 11 = YES
The more binary digits you have, the more information you can store and process. Most
computers store bits of data in memory in groups of eight. Eight bits stored at one
location is called a byte. Sometimes it is useful to work on just half a byte. Half a byte is
called a nibble.
1 1 1 1 1 1 1 1
bit bit bit bit bit bit bit bit
Nibble Nibble
Byte
A byte consists of eight bits. A byte was the number of bits used to encode a single
character of text in a computer and for this reason it is the basic addressable element in
many computer architectures.
A kilobyte (kB) is 1024 bytes. The reasoning behind it being 1024 and not 1000 is that
we use powers of 2, not 10, to represent binary numbers. (NOTE: the small k on kB).
1kB of memory could store roughly one full A4 page of text.
A megabyte (MB) is 1024 kB or 220. 1 MB is about the amount of data that is needed to
store a full screen image, 1 minute of MP3 music, 6 seconds of uncompressed CD audio
or a typical book.
A gigabyte (GB) is 1024 megabytes or 230 bytes. 1 GB is enough data for one hour of
standard video, 7 minutes of high definition video or 114 minutes of uncompressed CD
quality audio. A dual layered Blu-ray disc can hold about 25-100GB.
10 | P a g e
A terabyte (TB) is 1024 gigabytes or 240 bytes. This is a difficult amount to
comprehend, but Yahoo!® groups have about 40 terabytes of stored data. The first 1TB
hard drive was produced in 2007. Ancestry.com claims approximately 600 TB of
genealogical data with the inclusion of US Census data from 1790 to 1930. Released in
2009, the 3D animated film Monsters vs. Aliens used 100 TB of storage during
development. The first 20 years‘ worth of observations by the Hubble Space Telescope
has amassed more than 45 terabytes of data
Denary-to-Binary Conversion:
Binary notation is used to convert a denary number into binary numbers.
For example 12010 can be expressed as:
12010
Binary Notation:
=128 64 32 16 8 4 2 1
Put the 1 under notations which are required to find sum equals to the number and 0 in
remaining places as 64+32+16+8=120
= 128 64 32 16 8 4 2 1
= 0 1 1 1 1 0 0 0
Character Set:
Text and numbers can be encoded in a computer as patterns of binary digits.
Hexadecimal is a shortcut for representing binary. ASCII and Unicode are important
character sets that are used as standard.
ASCII (American Standard Code for Information Interchange)
The ASCII character set is a 7-bit set of codes that allows 128 different characters. That
is enough for every upper-case letter, lower-case letter, digit and punctuation mark on
most keyboards. ASCII is only used for the English language.
This table shows some examples of letters represented using the ASCII character set:
To convert a denary number into a binary number, create a binary notation in column
diagram where the leftmost column heading is greater than the denary number and
follow this algorithm (Note: Algorithm is series of steps to solve a problem):
1. Start on the left of the diagram.
2. If the column heading is less than the denary number:
a. Put a 1 in the column.
b. Subtract the column heading from the denary number.
c. Move to the next column to the right.
3. d. Go to step 2.
4. If the column heading is greater than the number:
a. Put a 0 in the column.
b. Move to the next column to the right.
c. Go to step 2.
You are normally only expected to be able to do this with numbers up to 255, because
that is the biggest number that can be stored in one byte. You may be asked to use more
bits for larger numbers.
As an example, we change the denary number 117 into a binary number. First, we set up
the column diagram up to column heading 128 (which is larger than 117).
128 64 32 16 8 4 2 1
To turn a binary number into denary, simply put the binary notation below the binary
number and add up all the binary notation numbers of each column with a 1 in it.
As an example, we change the binary number 10110110 into a denary number.
128 + 32 + 16 + 4 + 2 = 182
So 10110110 = 128 (in denary).
101101012 = B516
3=2+1 so 1s are written below 2 and 1 and 0s are written below 8 & 4.
7=4+2+1 so 1s are written below 4, 2 and 1 and 0s are written below 8.
4=4 so 1 is written below 4 and 0s are written under 1, 2 & 8.
F=15=8+4+2+1 so 1s are written under all of them.
374F16 = 00110111010011112
20 | P a g e
Examination Questions
Q 1) When texts are transferred large amounts of data are transmitted.
The characters are sent as ASCII characters.
Explain what is meant by an ASCII character.
.............................................................................................................................................
.............................................................................................................................................
............................................................................................................................... [2]
Q 2) Specimen 2015 P1 (Q13)
When a key is pressed on the keyboard, the computer stores the ASCII representation of
the character typed into main memory. The ASCII representation for A is 65 (denary), for
B is 66 (denary), etc.
There are two letters stored in the following memory locations:
Q 8a) (i) Change the denary integer 120 into a binary number.
.............................................................................................................................................
..................................................................................................................................... [2]
22 | P a g e
(ii) Change the binary number 1011011011 into a positive denary integer.
.............................................................................................................................................
....................................................................................................................................... [1]
The security code for an alarm system is a long binary number which begins
100111101000110101111010
b) The technicians prefer to use hexadecimal number to enter security code.
(i) When the number is converted into hexadecimal, the first two digits are 9E as
shown below:
Complete the gaps to show next three digits. [4]
Binary: 1001 1110 1000 1101 0111 1010
Hexadecimal: 9 E __ __ __ __
(ii) Convert the word CAB into binary using the ASCII character set.
………………………………………………………………………………………………….
………………………………………………………………………………………………….
………………………………………………………………………………………… [1]
Explain why the ASCII character set is not suitable for representing text in all t
(iii)
he languages of the world.
………………………………………………………………………………………………….
………………………………………………………………………………………………….
………………………………………………………………………………………… [1]
Q 11)
An artist is recording sound using a computer. The graph below represents the pressure
wave of the sound being recorded.
(i) At point A on the graph, the size of the sound wave is 90. This is stored digitally using
the binary value of 0101 1010 (or 5A in Hex).
Complete the table below to show how points B and C are stored:
Point A Point B Point C
Size 90
Binary Value 0100 1000
Hex Value 5A
(xi) How would the denary value 73 be represented as a positive binary integer?
.............................................................................................................................................
....................................................................................................................................... [1]
(xii) Binary representation is used for many different data values.
Consider the binary pattern 1010 0110. What is its value if it represents in denary?
.............................................................................................................................................
........................................................................................................................................ [1]
a hexadecimal number?
.............................................................................................................................................
....................................................................................................................................... [1]
(xiii) A computer system stores real numbers in floating point format using 12 bits. The
first 8 bits are the mantissa and the final 4 bits the exponent. Both the mantissa and the
exponent use two‘s complement format. Consider the binary pattern 0101 1000 0101
what is the exponent in denary?
.............................................................................................................................................
..................................................................................................................................... [1]
(xiv) A binary pattern can be used to represent different data used in a computer system.
25 | P a g e
Consider the binary pattern: 0101 0011
The pattern represents an integer. What number is this in denary?
.............................................................................................................................................
....................................................................................................................................... [1]
(xv) Change the denary integer 222 into a binary number, using 10 bits.
.............................................................................................................................................
........................................................................................................................................ [1]
(xvi) Change the binary number 01101100 into a positive denary integer.
.............................................................................................................................................
....................................................................................................................................... [1]
(xvii) Change the denary integer 278 into a binary number, using 10 bits.
.............................................................................................................................................
....................................................................................................................................... [1]
(xviii) Change the binary number 10101100 into a positive denary integer.
.............................................................................................................................................
...................................................................................................................................... [1]
(xix) The number of visits made by a member during the year is stored as an integer in a
single byte. Mr Jyu has visited 135 times. Change 135 into the binary representation for
the computer to store.
.............................................................................................................................................
........................................................................................................................................ [1]
26 | P a g e
1.1.3 Data storage
Computers understand 1s and 0s. The information about the real world, like images and
sound, is in analogue. This analogue information is firstly converted in digital format to
store in computer.
Images:
A Pixel (picture element) is the smallest unit of data that can be represented in an
image. Each pixel can represent a single, solid block of colour.
Vector Graphics
Vector images store set of instructions about HOW to draw each shape.
Vector graphics are created in graphics packages and consist of shapes called objects.
It is possible to edit each object separately, for example, change the shape, colour, size
and position.
The file size of a vector graphic is often very small.
Vector graphic is scalable – i.e. when you resize it, the entire image is redrawn and it
doesn‘t lose quality.
Bitmap Graphics
A bitmap or Raster image is a group of pixels. The colour of each pixel is stored as a
binary code. The following picture could be represented as:
Since the computer has to store information about every single pixel in the image, the file
size of a bitmap graphic is often quite large. When you resize a bitmap graphic, it tends
to lose quality.
Colour Depth:
27 | P a g e
The more bits are used to represent each pixel, the more combinations of binary
numbers are possible, and so more colours are possible in the image. This is known as
colour depth.
Colour Depth Number of Colours Represented Working
1 bit 2 (0, 1) (e.g. black & white) 21=2
2 bit 4 (00, 01, 10, 11) 22=4
4 bit 16 (0000, 0001, 0010, 0011, 0100, 0101, 0110, 0111, 24=16
1000, 1001, 1010, 1011, 1100, 1101, 1110, 1111 )
8 bit 256 28=256
16 bit 65,536 216=65,536
24 bit 16,777,216 224=16,777,216
Try yourself:
MP3 file compression reduces the size of a music file by 90%.
(a) A music track is 80 MB in size.
Calculate the file size after compression.
.............................................................................................................................................
How many MP3 files of the size calculated above could be stored on an 800 MB CD?
29 | P a g e
.......................................................................................................................................[2]
(b) (i) Explain how MP3 files retain most of the original music quality.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(ii) State the type of file compression used in MP3 files.
...................................................................................................................................... [1]
(iii) Name another file compression format.
...................................................................................................................................... [1]
MIDI
Pronounced middy, an acronym for musical
instrument digital interface, a standard adopted
by the electronic music industry for controlling
devices, such as synthesizers and sound cards,
which emit music. At minimum, a MIDI
representation of a sound includes values for the
note's pitch, length, and volume. It can also
include additional characteristics, such as attack and delay time.
Importance of compressing Files
File compression is the process of encoding information using fewer bits so that the
compressed file size is smaller.
31 | P a g e
It is important for files transmitted over the Internet because if they are not compressed
then there would be considerably more data to transmit. This would result in more
network traffic, slower download times and delays in viewing web pages, particularly
those with multimedia content. Streaming audio and video would be impractical without
file compression.
However, compressed data may be of lower quality (if using lossy compression) and
must be decompressed to be used. This extra processing may slow some applications
and in the case of video decompression, require dedicated hardware such as graphics
cards for the video to be viewed as it is actually being decompressed.
Lossless compression
This allows the original file to be re-created exactly from the compressed file. It works by
searching for patterns in the file so, instead of repeatedly storing a block of identical
data; the data is stored once and then indexed. Further occurrences are simply stored as
the index number so the decompression software can simply look up the data and place
it back in the correct position.
Text files compress well because certain letters and words will often appear together in
the same pattern. Software files also compress well for similar reasons, they are made
up of a relatively small number of different instructions, often arranged in a set pattern.
In both cases, the larger the original file, the better the compression ratio as there are
more likely to be repeating patterns and each pattern will be repeated more frequently.
Lossy compression
Files that include a lot of unique information, such as bitmap graphics, sound or video
files, cannot be compressed much with lossless compression because there is so little
repeated data.
Lossy compression works differently, it removes data that is not needed, either because
a drop in quality is acceptable or the difference cannot be detected by the human eye or
ear.
Streaming audio and video is possible with lossy compression.
Examination Questions:
Q 12) Files are often compressed before they are transmitted over the internet.
a) State what is meant by compression.
.............................................................................................................................................
.................................................................................................................................... [2]
b) State one advantage of file compression before sending them over internet.
.............................................................................................................................................
.................................................................................................................................... [2]
c) Two types of file compressions are lossy and lossless.
State which compression type is most appropriate for each of the following and
explain why it is appropriate.
(i) Downloading source code of a large program
Type of Compression: ........................... .....................................................................
Explanation: ..................................................................................................................
...................................................................................................................... [3]
i) Streaming a large video file
33 | P a g e
Type of compression: ........................ ..........................................................................
Explanation: ................................................................................................................
........................................................................................................................ [3]
Q13) Bitmaps may use compression techniques to reduce the file size.
Explain the difference between ‗lossless‘ and ‗lossy‘ techniques for achieving this
compression.
.............................................................................................................................................
................................................................................................................................... [4]
Q 14) A student has a stand-alone computer at home.
Describe the following examples of utility software and state how they would be used by
the student.
File compression
Description: .......................................................................................................................
..................................................................................................................................... [2]
Use: ...............................................................................................................................
...................................................................................................................................... [1]
Q15) Some students decide to do a survey to find out how good the general public are at
Mathematics. These surveys produced a lot of data. The students decided to run a file
compression utility.
(i) Describe why file compression would be useful in this application.
.............................................................................................................................................
.............................................................................................................................................
........................................................................................................................................ [2]
(ii) The students frequently send each other email with file attachments. Describe two
different file types where compression can be used.
1...........................................................................................................................................
..........................................................................................................................................
2...........................................................................................................................................
.............................................................................................................................................
....................................................................................................................................[2]
Check digits
This is an extra digit added to a
number which is calculated from
the other digits; the computer
recalculates the check digit after
the number has been input. Check digits are used on bar code numbers and ISBN‘s.
There are a number of ways that check digits are generated; in the example that follows,
we will consider the ISBN-10 method which makes use of the modulo 11 system.
Example we will consider the number 0-221 -43256-?
Checksums
A checksum is a way of summarising a block of data such as a USB or a network data
packet. At its simplest, it consists of the arithmetical sum of all the numerical values of all
the elements of the block. The sum is reduced to a standard number of digits and
transmitted with the block. When the block of data gets to its destination, the same
mathematical calculation is performed on the data by the receiving device and the
results is compared with the received checksum. If the two checksums match, the
integrity of the data has been maintained. If the two checksums do not match then an
error has been made in transmitting the data and the receiving device requests the
sending device to re-transmit the data. Even if one binary digit has changed in the data,
the recalculated checksum does not match the received checksum and the data are
rejected.
Checksum is similar in function to a parity bit for a byte or a check digit for a code
number. More complex implementations of checksum involve more complex arithmetic to
try to detect a wider range of errors.
Algorithm of calculating Checksum:
Step 1: Find out the size of file i.e. x
35 | P a g e
Step 2: IF file size (x)<256 then checksum = file size(x)
Step 3: IF file size >=256 then divide file size by 256 y is obtained (y=x/256)
Step 4: Round down the y
(ignore decimal part e.g. for y=3.9 y=3 and for y=3.1y=3)
Step 5: Multiply y by 256, z is obtained (z=y*256)
Step 6: Check sum is difference between z and x (Checksum=x-z)
For example: Suppose the value of X is 1185, then tracing through the algorithm, we get:
X = 1185
1 1185/256 = 4.629
2 Rounding down to nearest whole number gives Y = 4
3 Multiplying by 256 gives Z = Y * 256 = 1024
4 The difference (X – Z) gives the checksum: (1185 – 1024) = 161
5 This gives the checksum = 161
Calculate the checksum for blocks of data with the following byte sums:
a 148
b 905
c 1450
d 4095
Automatic Repeat reQuest (ARQ)
Automatic Repeat reQuest (ARQ), also known as Automatic Repeat Query, is an error
control method for data transmission that uses acknowledgements (messages sent by
the receiver indicating that it has correctly received a data frame or packet) and timeouts
(specified periods of time allowed to elapse before an acknowledgment is to be received)
to achieve reliable data transmission over an unreliable service. If the sender does not
receive an acknowledgment before the timeout, it usually re-transmits the frame/packet
until the sender receives an acknowledgment or exceeds a predefined number of
retransmissions.
The types of ARQ protocols include
Stop-and-wait ARQ
Go-Back-N ARQ
Selective Repeat ARQ
36 | P a g e
Examination Questions:
Q 17) When data is transmitted between devices it can be corrupted. One method to det
ect corruption is the use of a checksum.
Explain how a checksum can be used to detect the presence of errors in a transmission.
.............................................................................................................................................
.............................................................................................................................................
................................................................................................................................................ *4+
Examination Questions
Q 22) Winter 14 P12
An advertising sign uses large LED characters controlled by a microprocessor.
Each letter is formed from a grid made up of eight rectangles numbered 1 to 8:
Each rectangle has six LEDs that can light up; these LEDs are labelled ―a‖ to ―f‖:
The LEDs in a rectangle can be represented in a 6-bit register. For example, rectangle 3
of the letter ―Z‖:
(a) Show how the letter ―E‖ can be represented by the eight 6-bit registers (four
registers have been done for you).
(b) State which letter of the alphabet is represented by the following eight 6-bit
registers.
41 | P a g e
Q 23) Winter 2014 P13
Digits on an electronic display board can be represented on a 7 × 5 grid. For example, the digit 3
is represented as:
Each column in the grid is represented in a computer as a 7-bit register. Five registers are
required to represent the state of the whole digit. The value 1 represents a shaded square and
the value 0 represents an unshaded square. For example, the digit 3 is represented as:
(a) Show the contents of the five 7-bit registers when representing the digit 9:
(b) In order to prevent errors, an 8-bit register is used. The 8th bit will contain:
• 0 – if the first 7 bits add up to an even number
• 1 – if the first 7 bits add up to an odd number
Complete the 8th bit for each register. The first register has been completed for you.
42 | P a g e
Q 24) Specimen 2015 P1
A digital alarm clock is controlled by a microprocessor. It uses the 24-hour clock system
(i.e. 6 pm is 18:00). Each digit in a typical display is represented by a 4-digit binary code.
(a) What time is shown on the clock display if the 4-digit binary codes are: [2]
(b) What would be stored in the 4-digit binary codes if the clock display time was: [4]
Q 25)
Q 26) Summer 2013 P11
Letters from the Greek alphabet are to be transferred to a computer system. Each letter
can be represented on an 8 by 8 grid. Each column has a value from 1 to 128.
The value of each row is stored in a table. The values in the column headings are used
43 | P a g e
to work out the value for each row (e.g. in our example, row 8 has the value 64 + 32 + 4
+ 2 = 102).
Thus, in the example below, the letter (π) is stored as:
(a) What values would be stored in the table for the Greek character (Σ)?
(b) Draw the character formed from the following value table:
A byte is used to hold the data needed to light the correct segments. Bit 0 is always zero.
For example, 3 is represented by
44 | P a g e
(a) If the lift is to stop at more than one floor, the data is held in successive bytes. For example:
(c) The lift is travelling down to stop at Floors 5, 3 and 1. When it stops at Floor 5, a passenger
gets in and presses the button for Floor 2.
How does the system ensure that the lift stops at Floors 3, 2 and 1 in that order?
......................................................................................................................................
............................................................................................................................... [3]
(a) State what is happening when the above bit pattern is set?
.....................................................................................................................................[1]
(b) Write down the bit pattern that would be set if the water has reached the correct level,
the temperature is the required temperature, the clothes have been washed and the
pump is now pumping the water out of the machine.
(c) State one other process that the microprocessor could control.
.................................................................................................................................. [1]
45 | P a g e
(b) What bit patterns must be used to show the information 0L?
(a) What is shown on the display if the 4-bit binary registers contain?
(b) What would be stored in the 4-bit binary registers if display shows?
(d) If any one of the 4-bit binary register X, Y or Z contain the value 1 1 1 1 this indicates
an error.
(i) How could this error be shown on the instrument display?
………………………………………………………………………….. [1]
(ii) What could cause an error to occur?
…………………………………………………………………………………………
….………………………………………………………………………….. [1]
47 | P a g e
Q 31)
Electric guitars consist of strings and frets.
Musical notes on the guitar can be represented using the TAB notation:
Each line represents a string; the dots indicate which strings must be
held down with the fingers. These are shown with a binary value of 1;
otherwise the binary value is 0.
It is also important to indicate where the strings should be held down. This is shown on
the
FRET. If the fingers are to be held down at the 20th FRET, this is shown in binary as:
(NOTE: add up the numbers in the headings where binary 1s appear, i.e. 16 + 4 = 20)
(a) A note is being played according to the TAB notation:
Write down the binary notation for the TAB and for the FRET position: [2]
48 | P a g e
(b) (i) Show on the diagram below which note corresponds to TAB notation: 000010.
1
2
3
4
5
6
(ii) What FRET position corresponds to 010011?
[2]
(c) Describe two advantages of storing musical notes in this format.
1
2 [2]
A customer uses a keypad to make their choice. Each number entered is represented in
a 6-bit binary register. For example, key press 33 (hot chocolate with extra milk and extra
sugar) is represented by:
(a) (i) If a customer chooses coffee with milk and sugar what is the key press?
(c) A customer using the vending machine gets an error message after keying in their
selection. What could have caused this error message?
(d) It was decided to split the register so that each digit was represented by its own 3-
bit register: For example, would now be represented as:
42
(i) What drink has been chosen if the 3-bit registers contain:
(ii) How would the lemon option be shown on both types of register?
(iii) What is the advantage of using two 3-bit registers rather than one 6-bit register?
50 | P a g e
Q 33)
A large hotel uses eight lifts (elevators) to carry passengers between its sixty floors. A
computer is used to control and monitor the lifts. Each lift has three registers to represent
its state
(c) (i) A customer is on the 14th floor and wants to go to the 50th floor. She presses the
button to call the lift. What two pieces of information would the computer check to identify
which of the eight lifts should be made available? [2]
(ii) Using your answers to part (i), which of the following lifts would be made available to
the customer?
51 | P a g e
(d) An engineer wishes to test that this computer system detects incorrect data. Describe
what input the engineer might use to check that the computer can correctly identify a
fault condition. [2]
This means the blue, yellow and black colour sequence is stored and displayed in that
order. The length of time each light is on is set by a binary value in another register, R2:
Thus
(c) What is the problem with trying to display green, blue, red in that order? [2]
52 | P a g e
Q 35) Winter2013. P12
A denary number can be represented as an 8-bit binary number.
For example: 27 would be represented as:
All the bits in the binary number have now been shifted (moved) one place to the left.
(a) What denary number does this now represent? [1]
(b) What effect did the shift have on the original denary number? [1]
(c) If the above binary number was shifted another one place to the left, what denary
number would it be equivalent to? [1]
(d) (i) Represent the denary number 46 as an 8-bit binary number. [1]
Thus,
(b) Three options (A, B, C) are shown on the touch screen below:
A 4-bit register is used to store the encryption key. This register shows how many places
the bits are shifted to the left in the 12-bit register when it is encrypted. So,
means each bit in the 12-bit register is shifted 5 places to the left and the register now
becomes:
Therefore, the letter ―S‖ would be transmitted with the 4-bit register and the 12-bit
register as follows:
Show how the letter ―W‖ is now stored in the 12-bit register in encrypted form:
(b) Find which letter of the alphabet has been encrypted here. (Show all your working.)
(c) (i) What is the largest encryption key that can be stored in the 4-bit register?
All the systems that have been mentioned so far have been stand-alone computers. This
means that the systems we have discussed so far are not connected to other machines.
Consider a classroom with 20 stand-alone computers. Every time a lesson ends, you
need to store your files on secondary storage. It would be possible to store the files on a
USB stick and take them away with you, but the likelihood is that the files are stored on
the hard disk. The next time you want to use those files, you need to sit at the same
computer. It would be much more sensible to have a system that allowed access to the
same files through any of the 20 computers. To allow for this, the computers need to be
connected to each other so that you can store your files on a shared disk drive. When
computers are connected together to share files, they form a network.
Generally, a network over short distances is called a local area network (LAN) while
those over great distances are wide area networks (WAN). Whether a network is a
WAN or a LAN, it allows the computers to:
communicate with one another
share information centrally
share copies of software
give access to data and program files to multiple user
In a LAN there is the added benefit of being able to share hardware. For example, the
classroom with 20 computers may only have one or two printers. Also, those printers
58 | P a g e
may be of different types and used for different tasks. This means that the type of printer
used is dependent on the job that the user wants it to do rather than on the type of
printer that happens to be connected to the computer from which the printout is sent.
To summaries:
A network is defined as a collection of computers and peripheral devices (such as
printers) connected together.
A local area network (LAN) is a network that interconnects computers in a limited area
such as a home, school, computer laboratory, or office building.
The connections can be cable, fibre-optic, or wireless (infra-red, microwave or radio).
Advantages of networks
Sharing resources:
o Sharing folders and files so you can access them anywhere on the network from any
computer
o Sharing peripheral devices such as printers and scanners
o Sharing an internet connection
Communication:
o Using email to communicate with colleagues
o Using messaging systems to chat while you are working on other things
o Transferring files between computers
Centralised management:
o User profiles and security can all be managed centrally
o Software can be distributed across the network rather than having to install it on
o each individual computer
o Users can use any PC on the network but still see their own files
o Data can easily be backed up centrally.
Hardware requirements
There are several kinds of hardware
used in home networks:
Network adapters. These
adapters (also called network
interface cards or NICs) connect
computers to a network so that
they can communicate. A network
adapter can be connected to the
USB or Ethernet port on your
computer or installed inside your
computer in an available
Peripheral Component
Interconnect (PCI) expansion slot.
Example Question 1:
The diagram shows a computer network with connection to the Internet.
Information flows through the computer in many ways. The CPU is the central point for
most information. When you start a program, the CPU instructs the storage device to
load the program into RAM. When you create data and print it, the CPU instructs the
printer to output the data.
Because of the different types of devices that send and receive information, two major
types of data transfers take place within a computer: parallel and serial.
Parallel cable
Why are parallel transfers so popular?
Multiple bits of information are sent at the same time.
At identical clock speeds, parallel transfers are faster than serial transfers
because more data is being transferred.
However, parallel transfers also have problems:
Many wires or traces (wire-like connections on the motherboard or expansion
cards) are needed, leading to interference concerns and thick, expensive cables.
Excessively long parallel cables or traces can cause data to arrive at different
times. This is referred to as signal skew
61 | P a g e
Advantages Disadvantages
Synchronous means:
a. Occurring at the same time; coinciding in time; simultaneous.
b. going on at the same rate and exactly together; recurring together
Synchronous transmission sends data as one long bit stream or block of data. There are
no gaps in transmission; each bit is sent one after the other. The receiver counts the bits
and reconstructs bytes. It is essential that timing is maintained as there are no start and
stop bits and no gaps. Accuracy is dependent on the receiver keeping an accurate count
of the bits as they come in.
Chat rooms and online conferences are good examples of synchronous communication.
Asynchronous Communication:
With asynchronous transmission signal timing is not required; signals are sent in an
agreed pattern of bits and if both ends are agreed on the pattern then communication
can take place.
Asynchronous transmission is relatively slow due to the increased number of bits and
gaps. It is a cheap and effective form of serial transmission and is particularly suited for
low speed connections such as keyboard and mouse.
Discussion forums and email are two examples of how asynchronous communication
Parity is used not only during data transfer between devices but also when data are
transferred between different components of the CPU. If two mistakes are made in the
same byte, they cancel each other out and the faulty data are accepted.
This problem can be overcome and a clever way of identifying mistakes can be
implemented by using parity blocks.
A byte can represent a character code in eight bits, giving potentially 256 different
characters. However, an ASCII character reserves one of the bits for a parity bit. This
leaves seven bits for the character code, reducing the number of different characters to
128.
Example Question 2:
What is wrong with the following statements?
a. The two checksums match so there is no error in the data file that has been
transmitted.
b. Odd parity means that correct bytes are always an odd binary number.
c. 01101100 has been received using odd parity therefore it has been correctly
transmitted.
There are two types of parity, odd and even. Try to think of reasons why odd parity may
be preferable to using even parity.
Parity blocks
A further check can be made on the data bytes which are transmitted. An additional byte,
called the parity byte, is calculated and
transmitted for each group of bytes. The data
bytes and parity byte together are called a
parity block.
A parity block is like a rectangle made up of
rows and columns. The last bit in each row,
i.e. in each data byte, is the parity bit, which
checks if there is an error in the byte. One
possible problem with a parity bit check is that two errors in the same byte are not picked
up by the parity bit check. They are however detected by the check which the parity byte
performs.
Think of the parity byte not as data but as a whole row of parity bits, each of which is
there to check the column of bits above it in the grid. Consider the following transmission
in which four data bytes are followed by the parity byte using odd parity. The correctly
transmitted parity block (four data bytes followed by the parity byte) is shown in Figure.
the calculation in column three. The conclusion is that the incorrect bit in byte three must
be the one in column 3, so change this from 0 to 1.
Consider Figure, which shows two bits received in error in the same data byte. Byte
three passes the parity bit check. The point here is that the parity bit is in error! The
parity byte, however, shows that there is an error – the bits in positions 4 and 8 of the
parity byte do not match the calculation for columns 4 and 8.
It is claimed that checking the parity bits and using a parity block check will identify 99%
of all transmission errors.
Examination Questions
Q1) Explain the difference between a wide area network (WAN) and a local area network
(LAN).
.............................................................................................................................................
........................................................................................................................................ [2]
(Hint: You need to give two distinct points of comparison. Saying that one covers a
large area and the other a local area is insufficient.)
1. a. State three pieces of hardware that are needed to create a LAN from a set of
stand-alone computers.
1. .............. ..........................................................................................................................
2. .........................................................................................................................................
3. ................................................................................................................................... [3]
b. Explain why the communication over a WAN differs from that across a LAN and state
how the hardware necessary for communication would differ from that used in part (a)
.............................................................................................................................................
.................................................................................................................................. [3]
Q2) Explain the difference between:
a. simplex transmission of data b. half-duplex transmission of data
c. duplex transmission of data
giving an example of the use of each. [6]
(Hint: Don‘t try to be imaginative – give the standard examples.)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.................................................................................................................................. [6]
Q3) The following bytes of data are sent to a second device using even parity:
11001100
01000100
10101011
10011010
An automatic checking technique is used to check that the data has been transmitted
67 | P a g e
without error.
a. State which byte has been received incorrectly, explaining how you arrived at your
answer.
.............................................................................................................................................
.............................................................................................................................................
....................................................................................................................................... [3]
b. Explain why it is possible that a byte of data could still be incorrect despite passing the
test that you used in part (a).
.............................................................................................................................................
....................................................................................................................................... [1]
c. If the parity byte 10110101 had been transmitted with the data block, explain how the
error could be self-checked and corrected.
.............................................................................................................................................
....................................................................................................................................... [3]
Q4) Data which is transmitted between survey sites and head office is liable to errors.
Data which is received is checked for errors.
a. One method of checking for errors is to use parity checks.
The following four bytes have been received:
01101001
10111100
10101010
00100100
i. One of the bytes contains an error. State which byte.
........................................................................................................................................ [1]
ii. Explain your choice of answer in (i).
.............................................................................................................................................
........................................................................................................................................ [2]
iii. Explain why a byte may still be in error even if it passes the parity test.
........................................................................................................................................ [1]
iv. Describe how a parity block may be used to identify the location of the error if one
occurs.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
....................................................................................................................................... [4]
Q5) (a) Two methods of connecting to the Internet are dial-up and broadband.
Give two advantages of using broadband.
.............................................................................................................................................
.............................................................................................................................................
.........................................................................................................................................[2]
(b) Computers often use wireless (Wi-Fi) technology to connect to the Internet. Give one
advantage and one disadvantage of using Wi-Fi.
68 | P a g e
Advantage of Wi-Fi:
.............................................................................................................................................
Disadvantage of Wi-Fi:
................................................................................................................... .................... [2]
(c) Apart from computers, name another device that uses Wi-Fi technology.
........................................................................................................................................ [1]
Q6 Summer 2014 P11) You have been asked to write a report on the use of the
following communication methods:
• mobile phones • video conferencing • emails
Describe a benefit and a drawback of each of the above communication methods.
mobile phones
Benefit ................................................................................................................................
Drawback ...........................................................................................................................
video conferencing
Benefit .................................................................................................................................
Drawback ............................................................................................................................
emails
Benefit .................................................................................................................................
Drawback........................................................................................................................ [6]
Q7) Most of the hotels offer wireless Internet (Wi-Fi) in the rooms.
Give two disadvantages of using wireless (Wi-Fi) rather than wired Internet access.
1 .........................................................................................................................................
2 ..................................................................................................................................... [2]
(a) Describe what is meant by:
(i) serial, simplex transmission
.........................................................................................................................................
(ii) parallel, full duplex transmission
........................................................................................................................................ [2]
(b) The word C O M P U T I N G is to be transmitted as nine bytes of data. Each
character in the word has an ASCII value. The system uses even parity and the left most
bit is added to make each byte even parity.
(i) Complete the codes so that they all have even parity.
69 | P a g e
(ii) Fill in the parity byte in the final row in the table above. [1]
(iii) The character ‗P‘ is received incorrectly as 0 1 0 1 1 0 0 0
Describe how horizontal and vertical parity checking would be used to detect the
erroneous
bit. .......................................................................................................................
.........................................................................................................................................
................................................................................................................................... [3]
1.2.3 Internet principles of operation
Web browser
Short for Web browser, a software application used to locate, retrieve and also display
content on the World Wide Web, including Web pages, images, video and other files. As
a client/server model, the browser is the client run on a computer that contacts the Web
server and requests information. The Web server sends the information back to the Web
browser which displays the results on the computer or other Internet-enabled device that
supports a browser.
An information resource is identified by a Uniform Resource Identifier (URI/URL) and
may be a web page, image, video or other piece of content. Hyperlinks present in
resources enable users easily to navigate their browsers to related resources.
Although browsers are primarily intended to use the World Wide Web, they can also be
used to access information provided by web servers in private networks or files in file
systems.
The major web browsers are Google Chrome, Mozilla Firefox, Internet Explorer, Opera,
and Safari.
Internet Server
Internet server (web server) is a special computer, on which websites are stored. Web
Server is constantly switched on and connected to the Internet so that each Internet user
around the world can access website at all times. This computer is built up with selected
high quality components, which can endure incessant work and high load.
Internet servers make the Internet possible. All of the machines on the Internet are
either servers or clients. The machines that provide services to other machines are
servers. And the machines that are used to connect to those services are clients. There
are Web servers, e-mail servers, FTP servers and so on serving the needs of Internet
users all over the world.
When you connect to www.ruknuddin.com to read a page, you are a user sitting at a
client's machine. You are accessing the Ruknuddin Web server. The server machine
finds the page you requested and sends it to you. Clients that come to a server machine
do so with a specific intent, so clients direct their requests to a specific software server
running on the server machine. For example, if you are running a Web browser on your
machine, it will want to talk to the Web server on the server machine, not the e-mail
server.
A server has a static IP address that does not change very often. A home machine that
is dialing up through a modem, on the other hand, typically has an IP address assigned
by the ISP every time you dial in. That IP address is unique for your session -- it may be
71 | P a g e
different the next time you dial in. This way, an ISP only needs one IP address for each
modem it supports, rather than one for each customer.
HTTP
Short for HyperTextTransferProtocol, the underlying protocol used by the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions
Web servers and browsers should take in response to various commands. For example,
when you enter a URL in your browser, this actually sends an HTTP command to the
Web server directing it to fetch and transmit the requested Web page.
HTML
HTML (HyperTextMarkupLanguage) is an authoring language used to create documents
to be viewed on the World Wide Web.
HTML is similar to SGML, although it is not a strict subset.
HTML defines the structure and layout of a Web document by using a variety of tags and
attributes. The correct structure for an HTML document starts with <HTML><HEAD>
(enter here what document is about) <BODY> and ends with </BODY></HTML>. All the
information you'd like to include in your Web page fits in between the <BODY> and
</BODY> tags.
There are hundreds of other tags used to format and layout the information in a Web
page. Tags are also used to specify hypertext links. These allow Web developers to
direct users to other Web pages with only a click of the mouse on either an image or
word(s). For a more complete list of tags, check out some of the URLs below.
IP Addressing
An Internet Protocol (IP) address is a unique 32-bit reference number that is allocated to
devices on a computer network that uses the Internet Protocol.
Although IP addresses are stored as 32-bit numbers, for our convenience they are
usually displayed as a series of 4 decimal numbers, each one representing 8 bits of the
original binary address.
32-bit binary version: 110010011010000001011011011111111
Decimal version: 201.64.182.255
Some IP addresses are reserved for private network ranges e.g.
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
IPv4
IPv4 is the most widely deployed Internet protocol used to connect devices to the
Internet. IPv4 uses a 32-bitaddress scheme allowing for a total of 2^32 addresses (just
over 4 billion addresses). With the growth of the Internet it is expected that the number
of unused IPv4 addresses will eventually run out because every device -- including
computers, smart phones and game consoles -- that connects to the Internet requires an
address.
72 | P a g e
IPv6
IPv6 addresses are 128-bit IP address for a total of 3.4x10^38 computers.
IPv6 is written in hexadecimal and separated by colons.
An example IPv6 address could be written like this: 3ffe:1900:4545:3:200:f8ff:fe21:67cf
Example Question 1:
The table shows four statements about IP addresses.
Tick (✓) to show which of the statements are true.
Statement True (✓)
The IP address consists of any number of digits separated by single dots (.)
Each number in an IP address can range from 0 to 255
IP addresses are used to ensure that messages and data reach their correct
destinations
Public IP addresses are considered to be more secure than private IP
addresses
MAC Addressing
In computer networking, a Media Access Control address (MAC address) is a unique 48-
bit number assigned to a network interface card (NIC) to identify it on a LAN. Because
they are so long, MAC addresses are usually displayed in hexadecimal.
48-bit binary version: 000000000000100101111100111100011111011110000101
Hexadecimal version: 00-09-7C-F1-F7-85
MAC addresses are limited to being used on a LAN while IP addresses can be used on
multiple types of networks including the Internet.
On a LAN, data packets that use a protocol such as TCP/IP will be packaged inside data
packets that use the MAC address to deliver them correctly.
Another use for the MAC address is as a security feature on cable and wireless systems,
only allowing computers with authorised MAC addresses to have access to the network.
This works by inspecting the data packet that is sent from a computer to see if its MAC
address matches one of the approved ones in a pre-defined table.
w w w . r u k n u d d i n . c o m
%77 %77 %77 %2E %72 %75 %6B %6E %75 %64 %64 %69 %6E %2E %63 %6F %6D
Some characters are not allowed in URL. URL encoding converts characters into a
format that can be transmitted over the Internet.
For example
%20 – is used in URL in place of <space> not allowed in a URL, %20 is the coding
for a space (32 in denary)
? – separates the URL from all parameters or variables
e.g. for query to search inqilabpatel in Google
https://www.google.com.pk/search?q=inqilab%20patel
here “q” is variable for query ―?‖ separates it from URL
“https://www.google.com.pk/search”
http ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
cie.org.uk ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
computerscience.html .......................................................................................................
...........................................................................................................................................
....................................................................................................................................... [3]
(ii) Sometimes the URL contains the characters %20 and ?.
Describe the function of these characters.
%20 ...................................................................................................................................
...........................................................................................................................................
? ........................................................................................................................................
...................................................................................................................................... [2]
75 | P a g e
Domain Name Server (DNS):
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They
maintain a directory of domain names and translate them to Internet Protocol (IP)
addresses.
1. User types URL of a website in web browser address bar.
2. The web browser sends the request of URL to DNS of internet service provider
(ISP).
3. DNS searches the IP address of the URL.
4. URL is translated into machine friendly IP address by DNS.
5. The translated IP address is sent to browser.
6. Browser sends http get command to the server of the IP address where website is
hosted.
7. The web server sends HTML data to the client web browser.
8. Web page is displayed on client‘s browser.
Example Question 3:
(a) (i) Describe what is meant by a client-server model of networked computers.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
................................................................................................................................[2]
(ii) Give two benefits of using the client-server model.
1 ..........................................................................................................................................
.........................................................................................................................................
2 ..........................................................................................................................................
.......................................................................................................................................[2]
76 | P a g e
(b) A web page offers a link for users to request another web page. The requested web
page contains HTML code.
Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-
hand column.
Statement Sequence
No
The requested web page is displayed on the client computer
The user clicks on the hyperlink and the web page is requested from
the web server
The requested web page content is transmitted to the client computer
The client computer processes the html code using the web browser
software
The web server locates the requested web page
77 | P a g e
WEB DESIGN
HTML is written as text, so you can use any pure text editor such as Notepad to produce
the page. The picture below shows one of the most basic web pages you can create.
78 | P a g e
A web page begins with a <HTML> tag and ends with a </HTML> tag. In between, there
are two other parts.
1. A head section that begins with <HEAD> and ends with </HEAD>
2. A body section that begins with <BODY> and ends with </BODY>
It is a good idea to use a <TITLE> .....</TITLE> tag that puts a title in the browser
window when you view the page.
Text can be formatted using a number of tags <P></P> are the paragraph tags.
Always save the file with an htm or html extension. The one above is called firstweb.HTM
We have actually created this page and can be viewed here. Right click on the new page
and select "View Source" to see the HTML code
Advantages Disadvantages
Very flexible as you have complete You have to know a lot about HTML
control of the HTML code code
Low cost - Notepad is free with Windows. Slow, as all the code has to be
And there are plenty of 'freeware' text written by hand.
editors available on the Internet.
Easy to make a mistake.
You have to save the file and look at
it in a web browser to see what it
actually looks like.
79 | P a g e
Some Common HTML tags:
Tag Description
<a> Defines an anchor
<b> Defines bold text
<body> Defines the document's body
<br /> Defines a single line break
<div> Defines a section in a document
<form> Defines an HTML form for user input
<h1> to <h6> Defines HTML headings
<head> Defines information about the document
<hr /> Defines a horizontal line
<html> Defines the root of an HTML document
<img /> Defines an image
<input /> Defines an input control
<li> Defines a list item
<p> Defines a paragraph
<script> Defines a client-side script
<table> Defines a table
<td> Defines a cell in a table
<th> Defines a header cell in a table
<title> Defines a title for the document
<tr> Defines a row in a table
HTML Structure
Presentation describes how elements must be rendered on screen.
HTML Presentation:
HTML presentation is format of webpage.
CSS is used to define presentation for web pages, including the design and variations in
display for different devices and screen sizes.
When a browser reads a style sheet, it will format the HTML document according to the
information in the style sheet.
With an external style sheet, you can change the look of an entire website by changing
just one file!
Each page must include a reference to the external style sheet file inside the <link>
element. The <link> element goes inside the <head> section:
<html>
<head>
<link rel="stylesheet" type="text/css" href="mystyle.css">
</head>
<body>
</body>
</html>
An external style sheet can be written in any text editor. The file should not contain any
html tags. The style sheet file must be saved with a .css extension.
body{
background-color: #0000ff;
}
h1 {
color: 000089;
margin-left: 20px;
}
Internal Style Sheet
An internal style sheet may be used if one single page has a unique style.
Internal styles are defined within the <style> element, inside the <head> section of an
HTML page:
Example:
<html>
<head>
<style>
body {
background-color: #0000ff;
}
81 | P a g e
h1 {
color: #980000;
margin-left: 40px;
}
</style>
</head>
<body>
</body>
</html>
Inline Styles
An inline style may be used to apply a unique style for a single element.
To use inline styles, add the style attribute to the relevant element. The style attribute
can contain any CSS property.
The example below shows how to change the color and the left margin of a <h1>
element:
<html>
<body>
</body>
</html>
82 | P a g e
Example Question 4:
HTML code for a website is given below:
(a) Which lines in the webpage script are related to presentation (style) code?
……………………………………………………………………………………………… [1]
(b) By studying the web page script and its use, what is the use in HTML of:
(i) the <h1> tag?
………………………………………………………………………………………………… [1]
(ii) the <p> tag?
………………………………………………………………………………………………… [1]
Examination Questions
Q1)Dima has decided to change his dial-up modem for a broadband modem.
(a) Give two advantages of doing this.
1 ..........................................................................................................................................
2 ..................................................................................................................................... [2]
(b) Dima has agreed to send Michaela a 20 megabyte file. They both have a broadband
connection. Dima has to upload his file to a server and then Michaela needs to download
it from the same server.
The broadband data transfer rates (speeds) are:
1 megabits per second to upload a file
8 megabits per second to download a file(Note: 8 bits = 1 byte)
(i) How long does it take to upload Dima‘s file?
.............................................................................................................................................
...................................................................................................................................... [2]
(ii) How long does it take to download Dima‘s file?
.............................................................................................................................................
83 | P a g e
...................................................................................................................................... [1]
(c) Dima has decided to use wireless LAN (Wi-Fi) connections.
Give one advantage and one disadvantage of doing this.
Advantage ...........................................................................................................................
.......................................................................................................................................
Disadvantage ......................................................................................................................
....................................................................................................................................... [2]
Q9) In each case below, state which Internet term is being described.
(a) Malicious software installed on a user‘s hard drive or a web server; the software re-
directs the user to a fake website without their consent or knowledge.
.................................................................................................................................... [1]
(b) Personal Internet journals where a writer enters text about a certain topic; anyone
can comment on the topic.
.................................................................................................................................... [1]
(c) Websites designed to promote the building of online communities who share the
same interests; usually free of charge; users can add friends, post messages to each
other and update personal profiles.
.................................................................................................................................... [1]
(d) Legitimate-looking email sent to a user in the hope of gathering personal information;
as soon as the recipient clicks on the link in the email (or email attachment) they are sent
to a fake website.
.................................................................................................................................... [1]
(e) Software that secretly gathers information by monitoring key presses on a user‘s
keyboard; this information is relayed back to the person who sent the software originally.
.................................................................................................................................... [1]
Q10) A rock band uses an internet website to advertise its music.
a) The website uses HTML.
i. Describe HTML
........................................................................................................................................
........................................................................................................................................
................................................................................................................................ [2]
ii. Explain the importance of HTML in the creation of web pages
........................................................................................................................................
........................................................................................................................................
................................................................................................................................ [2]
b) A list of file extension for common file standards used on the internet is shown
below:
JPG PDF MP3 MPEG ZIP
The rock band allows some files to be downloaded by fans.
Complete the table below to show which file format from the list given above
may be used for each of the following files:
84 | P a g e
File File Format
A high resolution image of the band to use as a
desktop background.
Sheet music of their songs ready to be printed in the
correct format for guitar players.
A short video extracted from their latest tour.
A compressed collection of 200 plain text files
containing lyrics of all their songs.
An audio recording of a song from their album.
Q11) Ahmed uses the Internet for some time and is puzzled by the terminology.
(a) Draw a line to match each description to the appropriate technical term. [5]
(b) Ahmed sees the message ―Set your browser to accept cookies‖.
Explain why some websites make this request.
..................................................................................................................................
............................................................................................................................... *2+
Q12) Summer 2011
A company has decided to introduce an intranet and remove Internet access for its staff.
(a) Describe TWO reasons why the company will not allow its staff Internet access.
85 | P a g e
1 ..........................................................................................................................................
2 ..................................................................................................................................... [2]
(b) Apart from removing Internet access, give TWO advantages to the company of using
an intranet.
1 ..........................................................................................................................................
2 ..................................................................................................................................... [2]
Marking Scheme – battery life poor
Example Questions: – data transfer rate can be slow
Q2) – not very large memories
(i) http – enables browser to know what protocol is being used to – small screens/keyboards make it more difficult to type/navigate
access information in the domain video conferencing
cie.org.uk – cie.org.uk is the domain name benefit:
computerscience.html – actual web page / file being viewed [3] – many people can take part in conference across the world
(ii) %20 – because <space> not allowed in a URL, %20 is the coding – can see all delegates on screen (and also talk in synchronised way)
for a space (32 in denary) – relatively inexpensive since uses Internet for communications
? – separates the URL from all parameters or variables [2] – can hold meeting of several people at short notice
– no need to pay for travelling/hotels/meeting rooms
– less time wasted travelling to meetings overseas/staff not out of
Q3)(a) (i) – at least one computer used to “serve” …
office
– … other computers are referred to as “clients”
– safer – recent increased risk of terrorist attacks
– server provides services / applications etc. …
drawback:
– … which may be requested by clients [2]
– equipment is expensive to buy initially
(ii) any two from:
– quality of sound/picture can be poor (poor reception)
– files and resources are centralised
– problems with time zones
– creation of security / manage security
– fast internet connection required
– user needs user name and password to access network
emails:
– centralised back-up
benefit:
– intranet capability
– can send at any time/recipient can open any time
– Internet monitoring
– inexpensive (same cost worldwide)
– clients can be less powerful machines, therefore less expensive to
– can send large multimedia files
buy
– no need for expensive equipment
– saving resources on server reduces the burden on the client [2]
– can send to multiple recipients
– can use attachment facility
Examination Questions:
drawback:
Q6) 1 mark for each benefit and 1 mark for each drawback (maximum
– if recipient doesn‟t have correct software, can‟t open attachments
of 2 marks for each
– possibility of virus infections/phishing from attachments
communication method).
– need Internet connection/ISP
mobile phones
– may not get immediate response (ONLY IF REVERSE NOT GIVEN
benefit:
UNDER BENEFIT) [6]
– wireless system (so can be used anywhere)
– small, portable device/always with you
– instantaneous (e.g. take photo and immediately transfer file)
– can leave messages if recipient not available
drawback:
– contracts tend to be expensive
– phone calls overseas are very expensive
– out of signal
1.3 Hardware and software
1.3.1 Logic Gates
Many electronic circuits have to make decisions. They look at two or more inputs and
Candidates should be able to:
• Use logic gates to create electronic circuits
• Understand and define the functions of NOT, AND, OR, NAND, NOR and
XOR (exclusive or) gates, including the binary output produced from all the
possible binary inputs (all gates, except the NOT gate, will have 2 inputs only)
• Draw truth tables and recognise a logic gate from its truth table
• Recognise and use the following standard symbols used to represent logic
gates:
•
For example, The most obvious use is for simple control. Imagine designing a washing
machine so that the water only turns on when the washing is loaded (logic-1), the door is
closed (logic-1) but the clothes are not yet wet (logic-0). This can be done by ANDing the
first two conditions, and inverting the third. Now, AND these together, and you get a high
88 | P a g e
Truth Tables:
―A truth table is used to show the output of a logic gate or circuit for all possible
combinations of input values.‖
Usually the binary values are used, 1 and 0, as shorthand for True and False.
The truth table for a two-input gate needs four rows (22=4) while for 3-input gate needs
eight rows (23=16).
The output X) =1 if
INPUT A is NOT 1(i.e. 0 or OFF).
89 | P a g e
2) AND Gate
An AND gate gives an output 1 only when both inputs are 1.
If one or more inputs are 0, then the output is also 0.
The output (called X) is true (i.e. 1 or ON) only if the (INPUT A AND INPUT B) are both
true (i.e. 1 or ON).
The x=1 if
INPUT A is 1 AND INPUT B is 1
3) OR Gate
An OR gate gives a high (1) output if any input is high (1). If all inputs are low (0), then
the output is low (0).
Input A Input B Output x
0 0 0
0 1 1
1 0 1
1 1 1
The output (called X) is true (i.e. 1 or ON) if the (INPUT A OR INPUT B) are true (i.e. 1
or ON).
The OUTPUT X=1 IF
Either INPUT A is 1
OR INPUT B is 1
4) NAND Gate
This NOT AND combination is shortened to just NAND. A NAND gate gives a 0 output
only when both inputs are 1. If one or more inputs are 0, then the output is 1.
Input A Input B A AND B OUTPUT X
0 0 0 1
0 1 0 1
1 0 0 1
1 1 1 0
The output (called X) is true (i.e. 1 or ON)
if (INPUT A AND INPUT B) are NOT both true (i.e. 1 or ON). Is 1
90 | P a g e
5) NOR Gate
This NOT OR combination is shortened to just NOR. A NOR gate gives a 1 output only if
no inputs are 1. If an input is 0, then the output is 0.
6) XOR Gate
The 'Exclusive-OR' gate is a circuit which will give a 1 output if either, but not both, of
its two inputs are 1. If both inputs are same then output will be 0 else output will be 1
Truth tables
A truth table is used to show the output of a logic gate or circuit for all possible
combinations of input values; we usually use the binary values, 1 and 0, as shorthand for
True and False.
The truth table for a two-input gate needs four rows.
INPUT OR AND NAND NOR XOR
A B
0 0 0 0 1 1 0
0 1 1 0 1 0 1
1 0 1 0 1 0 1
1 1 1 1 0 0 0
91 | P a g e
Examination Questions
Q1) Identify each of the following gates from truth table:
INPUT 1 INPUT 2 OUTPUT
0 0 0 INPUT 1 INPUT 2 OUTPUT
0 1 1 0 0 0
1 0 1 0 1 0
1 1 1 1 0 0
1 1 1
INPUT 1 INPUT 2 OUTPUT
0 0 1
0 1 0
1 0 0
1 1 0
INPUT 1 INPUT 2 OUTPUT
0 0 1
INPUT OUTPUT
0 1 1
0 1
1 0 1
1 0
1 1 0
Q3) Draw the logic circuit required to fulfil the following statements:
a Output C = (NOT(A AND B)) AND (A OR B)
93 | P a g e
Q4)Copy and complete the truth tables for the following logic circuits:
A T S Y
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
(b) Complete the truth table for this alarm system. [4]
Q6) Winter 2014 P12-13
(a) Complete the truth table for the following logic circuit:
A B C Working X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
95 | P a g e
(b) Re-draw the logic circuit shown opposite, using NAND and NOR gates only
(c) Write a logic statement that describes the following logic circuit:
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(c) Write a logic statement that describes the following logic circuit:
A B C Working X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
...........................................................................................................................................................
................................................................................................................................................ *3+
(b) Complete the truth table for the above system [4]
L F A Working X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
96 | P a g e
A B C Working X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
(b) Write the logic statement to describe the following logic circuit: [3]
A B Working X
0 0
0 1
1 0
1 1
(ii) What single logic gate has the same function as the above circuit? [1]
(b) Complete the truth table for the following logic circuit.
A B C Working X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
A B Working X
1 1
1 0
0 1
0 0
(ii) What single logic gate has the same function as the above logic circuit? [1]
98 | P a g e
(b) (i) Complete the truth table for the logic circuit.
A B C Working X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
b) Complete the truth table for the above logic statement. [4]
99 | P a g e
(a) Draw the required logic circuit using AND, OR and NOT gates only.
[5]
(b) Complete the truth table for the above system. [4]
P T W X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
100 | P a g e
A B C X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
(b) The above logic circuit uses AND, OR and NOT gates.
Name another logic gate and complete its truth table. [3]
Name : _______________________________________________
(ii) What single logic gate has the same function as the above logic circuit?
..................................................................................................................................................... [1]
b) Complete the truth table for the following logic circuit:
A B C X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
101 | P a g e
Truth Table:
T C V S
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
Q 17) Complete the truth table for the following logic circuit:
A B C X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
A B C X
102 | P a g e
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
Q19) Complete the truth table for the following logic circuit:
A B C X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
Q20) Show by drawing a truth table which single logic gate or what else has the same
function as the logic circuit drawn in
a)
103 | P a g e
b)
c)
d)
Half Adder‖
The half adder adds two single binary digits A and B. It has
two outputs, sum (S) and carry (C). The carry signal
represents an overflow into the next digit of a multi-digit
addition.
The simplest half-adder design, pictured on the right,
incorporates an XOR gate for S and an AND gate for C. With
the addition of an OR gate to combine their carry outputs, two
half adders can be combined to make a full adder
Inputs Outputs
A B C S
0 0 0 0
1 0 0 1
0 1 0 1
1 1 1 0
105 | P a g e
Control Unit
The control unit controls the sequencing and timing of all operations. It contains a
"clock," that is actually a quartz crystal that vibrates million times per second. The clock
emits an electronic signal for each vibration. Each separate operation is synchronized to
the clock signal. For example 1st pc operates at 4.7 MHz means 4.7 million instructions
per second.
The functions of CU are given below:
Interprets and carries out instruction of program.
Selects program statements from memory.
Moves these instructions to instruction registers
Carries out instructions
Directs flow of data between components of CPU and to and from other
devices.
Arithmetic & Logic Unit (ALU)
Arithmetic unit perform arithmetical operations like
+, -, *, and / while logical unit are to compare two
quantities. Logical operations are important in
computer programming.
ALU can be thought of as being similar to a
calculator, except that, in addition to normal math,
it can also do logical (true/false) operations.
The functions of ALU are given below:
The arithmetic unit carries out arithmetic like
addition, division.
The logic unit enables the processor to make
comparison like =, <, > and logical decisions
like AND, OR, NOT.
The arithmetic logic unit carries out
communication with peripheral devices.
It also carries out bit shifting operation.
Register:
Registers are Immediate Access Store (IAS) located on the CPU, and used temporarily
for storing data. Because the registers are close to the ALU, they are made out of fast
memory, efficiently speeding up calculations.
There are 14 registers. Some examples are
a) Program Counter (PC) - an incrementing counter that keeps track of the next
memory address of the instruction that is to be executed once the execution of the
current instruction is completed.
b) Memory Address Register (MAR) - the address in main memory that is currently
being read or written
107 | P a g e
Buses: ''The set of wires used to travel signals to and from CPU and different
components of computer is called Bus.''
Bus is a group of parallel wires that is used as a communication path. As a wire
transmits a single bit so 8-bits bus can transfer 8 bits (1 byte) at a time and 16-bits bus
can transfer 16 bits (2 bytes) and so on. There are three types of buses according to
three types of signals, these are:
a) Data Bus: ''The buses which are used to transmit data between CPU, memory and
peripherals are called Data Bus.''
b) Address Bus: ''The buses which are connecting the CPU with main memory and
used to identify particular locations (address) in main memory where data is stored
are called Address Buses.''
c) Control Bus: The wires which are used to transmit the control signals (instructions)
generated by Control Unit to the relevant component of the computer.
Example Question
Fetch-Execute Cycle:
At its core, all the computer ever does is, execute one instruction in memory after
another, over and over. Although there are many
different possible (assembly language) instructions
that the computer can execute, the basic steps
involved in executing an instruction are always the
same, and they are called the instruction cycle.
1. Fetch the instruction (transfer the instruction from
main memory to the decoder)
2. Decode the instruction (from machine language)
3. Execute the instruction (e.g., add, divide, load,
store...)
4.Store the result (for instructions like ADD, place
the 'answer' in the specified register.)
The control unit guides the computer's components through this cycle to execute one
instruction.
When that instruction is done, the cycle starts all over again with the next instruction.
Registers/circuits involved
Program Counter (PC) - an incrementing counter that keeps track of the next
memory address of the instruction that is to be executed once the execution of
the current instruction is completed.
Memory Address Register (MAR) - the address in main memory that is currently
being read or written
Memory Buffer Register (MBR) - a two-way register that holds data fetched from
memory (and ready for the CPU to process) or data waiting to be stored in
memory
Current Instruction register (CIR) - a temporary holding ground for the
instruction that has just been fetched from memory
109 | P a g e
Accumulator Register (ACC)is used for storing data for ALU to process and the
results those are produced by the ALU.
Control Unit (CU) - decodes the program instruction in the CIR, selecting
machine resources such as a data source register and a particular arithmetic
operation, and coordinates activation of those resources
Arithmetic logic unit (ALU) - performs mathematical and logical operations
The table shows six stages in the von Neumann fetch-execute cycle.
Put the stages into the correct sequence by writing the numbers 1 to 6 in the right hand
column. [6]
Description of stage Sequence
number
the instruction is copied from the Memory Data Register (MDR) and
3
placed in the Current Instruction Register (CIR)
the instruction is executed 6
the instruction is decoded 5
the address contained in the Program Counter (PC) is copied to the
1
Memory Address Register (MAR)
the value in the Program Counter (PC) is incremented so that it points to
4
the next instruction to be fetched
the instruction is copied from the memory location contained in the
Memory Address Register (MAR) and is placed in the Memory Data 2
Register (MDR)
Register notation
To describe the cycle we can use register notation. This is a very simple way of noting all
the steps involved. In all cases brackets e.g. [PC], means that the contents of the thing
inside the brackets are loaded. In the case of the first line, the contents of the program
counter are loaded into the Memory Address Register.
MAR [PC]
MBR [Memory] ; PC [PC] +1 (Increment the PC for next cycle at the same time)
CIR [MBR]
CIR sends instruction to Decoder of control unit
Decoder decodes
Or ACC [MBR]
ACC sends data to ALU
ACC executes
Detailed description of Fetch-Decode-Execute Cycle
To better understand what is going on at each stage we'll now look at a detailed
description:
110 | P a g e
The contents of the Program Counter, the address of the next instruction to be executed,
is placed into the Memory Address Register
The address is sent from the MAR along the address bus to the Main Memory. The
instruction at that address is found and returned along the data bus to the Memory Buffer
Register. At the same time the contents of the Program Counter is increased by 1, to
reference the next instruction to be executed.
The MBR loads the Current Instruction Register with the instruction to be decoded by
decoder of control unit or the MBR loads Accumulator with the data to be executed.
111 | P a g e
Examination Questions
Q1) Describe what differs a computer with a calculator
.... .............. ................................................................................................................
.................................. ............................................................................................ [1]
Q2) Differentiate an ALU with a calculator.
.... .............. ................................................................................................................
.................................. ............................................................................................ [1]
Q3) Von Neumann gave the idea how computer should be built.
a) Describe the purpose of each of the following parts of a processor:
(i) Control unit
112 | P a g e
(iii) Register
.... .............. ................................................................................................................
.................................. ............................................................................................ [1]
Q4) Draw the diagram and describe the stages of fetch-execute cycle.
……………………................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
................................................................................................................................ [6]
Q5) Jo buys a notebook computer which has a 3MHz quad-core central processing unit
(CPU).
113 | P a g e
Q6) (9693_13w_q12)
There are 4 processor component terms on the left and 10 descriptions of functions on
the right. Draw a line connecting each description to the correct component.
Q 7)Name 3 registers involved in the Fetch Execute Cycle and describe what each does:
1. ........................................................................................................................................
........................................................................................................................................
2. ........................................................................................................................................
........................................................................................................................................
3. ........................................................................................................................................
................................................................................................................................... [3]
Q8) Describe the purpose of the following registers in a processor:
(i) Program Counter (Sequence Control Register).
.............................................................................................................................................
........................................................................................................................................ [1]
(ii) Current Instruction Register.
.............................................................................................................................................
........................................................................................................................................ [1]
115 | P a g e
Q10)(i) State what is held in the Program Counter (PC) during the fetch/execute cycle.
.............................................................................................................................................
...................................................................................................................................... [1]
(ii) Explain how the contents of the PC change during the fetch/execute cycle.
.............................................................................................................................................
...................................................................................................................................... [1]
Q11)(b) At a particular point in a program, the program counter (PC) contains the value
200.State the expected value contained in the PC after the instruction held at location
200 has been fetched. Explain your answer.
.............................................................................................................................................
...................................................................................................................................... [1]
Marking Scheme
Q5)
a)To carry out the processing on the computer/To (fetch and) execute
instructions'
b) 3MHz. Two from
3MHz is the clock speed / how fast the processor is
Indicates how many instructions may be processed in each
second
Indicates how many clock cycles per second
c) Quad core
The computer has 4 cores...
…which are independent processors within the CPU ..
... working simultaneously / can perform multiple tasks
Q6)
1.3.3 & 1.3.4 Input & Output Devices
1.3.3 Input devices
• describe the principles of operation (how each device works) of a range of input devices including
2D and 3D scanners, barcode readers, digital cameras, keyboards, mice, touch screens,
microphones
• describe how these principles are applied to real-life scenarios, for example: scanning of
passports at airports, barcode readers at supermarket checkouts, and touch screens on mobile
devices
• describe how a range of sensors can be used to input data into a computer system, including
light, temperature, magnetic field, gas, pressure, moisture, humidity, pH/acidity/alkalinity and
motion/infra-red
• describe how these sensors are used in real-life scenarios, for example: street lights, security
devices, pollution control, games, and household and industrial applications
1.3.4 Output devices
• describe the principles of operation of a range of output devices, including: inkjet, laser and 3D
printers; 2D and 3D cutters; speakers and headphones; actuators; flat-panel display screens,
including Liquid Crystal Display (LCD) and Light-Emitting Diodes (LED); and LCD projectors and
Digital Light Projectors (DLP)
• describe how these principles are applied to real-life scenarios for example: printing single items
on demand or in large volumes; banks of digital displays; use of small screens on mobile devices;
smart boards
Input Devices:
Input devices allow us to enter raw data into a computer. The computer processes the
data and then produces outputs that we can understand using an output device. Input
devices can be manual or automatic.
There are two different categories of input device. They are:
Manual Input Devices : With a manual input device the user must enter data into
the computer by hand. e.g. mouse, keyboard, scanner.
Direct Data Entry (DDE) Devices : A direct data entry device can transfer
information automatically from a source document such as a form or barcode into
the computer. The user does not need to manually enter the information. e.g.
optical mark recognition, smart cards.
There are many different input devices available. Each input device is suitable for a
different purpose. Below you will find descriptions of the most common manual input and
direct data entry devices.
Manual Input Devices
With a manual input device the user must enter data into the computer by hand. e.g.
mouse, keyboard, scanner.
Two-dimensional scanners
2D scanner or an image
scanner—often abbreviated to
just scanner, is a device that
optically scans images, printed
text, handwriting, or an object,
and converts it to a digital image.
The image is converted into an
electronic form which can be
stored in a computer.
118 | P a g e
Commonly used in offices are variations of the desktop flatbed scanner where the
document is placed on a glass window for scanning.
Modern scanners typically use a charge-coupled device (CCD) or a contact image
sensor (CIS) as the image sensor
"A flatbed scanner is usually composed of a glass pane (or platen), under which there is
a bright light (often xenon, LED or cold cathode fluorescent) which illuminates the pane,
and a moving optical array in CCD scanning. CCD-type scanners typically contain three
rows (arrays) of sensors with red, green, and blue filters."
1 Cover is raised
Example Question 1)The seven stages in scanning a document are shown in the table
below.
Put each stage in the correct sequence by writing the numbers 1 to 8 in the left hand
column.
The first one has been done for you. Write down the steps
The focused image fall onto a charge couple device (CCD) which consists of
number of ICs
Document is placed in on glass panel and cover is closed
Software produces digital image from electronic form
CCD is made up of light-sensitive elements (pixels).
Each element of CCD creates an electric charge when light falls on it and the
scanned image is converted into digital form.
119 | P a g e
The image is sent to a lens using series of mirrors. The lens focuses the
document image.
1 Cover is raised
A scan head moves across the document. An image is produced.
A bright light illuminates the documents lamp like xenon which produce very
bright white light
Optical character recognition (optical
character reader) (OCR) is the mechanical or
electronic conversion of images of typed,
handwritten or printed text into machine-
encoded text.
It is widely used as a form of data entry from
printed paper data records, whether passport
documents, invoices, bank statements,
computerized receipts, business cards, mail,
printouts of static-data, or any suitable
documentation.
Scanner scans the document and then OCR
converts it into machine readable form.
Example Question:
Passengers fly into an airport from other countries. The airport has a security system that
uses:
• computers
• scanners
• digital cameras
To gain entry to the country, each passenger must have a passport or identification (ID)
card. This must contain a recent photograph and other personal data. The passenger
must:
• place their passport or ID card on a scanner that reads machine-readable characters
and scans the photograph
• look towards a camera that takes an image of the passenger‘s face
Describe how a computer checks whether the image just taken by the camera matches
the scanned photograph.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
................................................[2]
Three-dimensional scanners:
A 3D scanner is a device that analyses a real-world
object or environment to collect data on its shape and
possibly its appearance. Since real-world objects have x,
y and z coordinates, these scanners take images at
several points along these three coordinates. A digital
image which represents the solid object is formed. The
collected data can then be used to construct digital three-
dimensional models.
Application of 3D scanning – computed tomographic (CT) scanners
COMPUTED TOMOGRAPHIC (CT) SCANNERS are used to create a 3D image of a
solid object. This is based on TOMOGRAPHY technology which basically builds up an
image of the solid object through a series of very thin ‗slices‘. Together these 2D‗slices‘
make up a representation of the 3D solid object. Each slice is built up by use of X-rays,
radio frequencies or gamma imaging;
although a number of other methods exist. Each ‗slice‘ is then stored as a digital image
in the computer memory. The whole of the solid object is represented digitally in the
computer memory.
Depending on how the image is formed, the type of tomographic scanner can have
different names. For example:
o X-rays CT scanners computerised tomography
o radio frequencies MRI magnetic resonance imaging
o gamma rays SPECT single photon emission computed tomography.
In UPC (Universal Product Code) the actual left-hand and right-hand sides of the
barcode are separated using guard bars. The structure of these guard bars is shown in is
an example of a barcode showing the left-hand side and right-hand side and the three
sets of guard bars.
Dark lines of bar
codes are
represented by bit
1 and light lines
are represented
by bit 0.
7 bits make a digit
using different
coding method for
left and right
sides.
1 The barcode is first read by a red laser or red LED (LIGHT EMITTING
DIODE).
2 Light is reflected back off the barcode; the dark areas reflect little or no
light which allows the bars to be read.
For example: the digit ‗3‘ on the left generates the pattern L D DDD L D
5
(whereL = light and D = dark); this has the binary equivalent of 0 1 1 1 1
0 1 (where L =0 and D = 1
6 If barcode are not scanned correctly the bar code number is types in
manually using keyboard
123 | P a g e
Quick response (QR) codes
QR code (abbreviated from Quick Response Code) is the trademark for a type of
matrix barcode (or two-dimensional barcode) first designed for the automotive industry in
Japan.
A barcode is a machine-readable optical label that contains information about the item to
which it is attached. A QR code uses four standardized encoding modes (numeric,
alphanumeric, byte/binary, and kanji) to efficiently store data; extensions may also be
used.
A bar code can store up to 30 characters while in QR code 7000 digits can be stored.
The following QR Code at left stores web address http://www.ruknuddin.com while QR
Code at right stores contact information of Inqilab Patel
Because of modern smart phones, which allow internet access on the move, QR codes
can be scanned anywhere. This allows advertising of products on trains, buses,
shopping malls and many other places. By using the built-in camera facility on modern
phones and downloading the appropriate application (or app), it is possible to read the
QR code. The code may contain a website link or some form of advertising (e.g. special
offers on pizzas).
On scanning the QR code, the phone number and advertisement will appear on the
mobile phone‘s screen. Advantages of QR codes include:
there is no need for the user to write down or key in a website address; scanning the
QR code does this automatically
QR codes can store website addresses/URLs that appear in magazines, trains,
buses or even on business cards, giving a very effective method of advertising.
Benefits Drawbacks
− inexpensive/cheap to manufacture − poor visibility in sunlight
− can use stylus/finger/gloved finger/pen − vulnerable to scratching
− wears through time
− does not allow multi-touch facility
Capacitive
In a capacitive system, a transparent material that stares an electrical charge covers
the screen's glass panel. When you touch the monitor, some of the charge is transferred
to your finger and the capacitive layer's charge decreases. Circuits at each corner of the
screen constantly measure the change in the charge reaching them. From those
measurements, the computer calculates where the touch occurred.
128 | P a g e
Benefits Drawbacks
− good visibility in sunlight − screen (glass) will shatter/break/crack (on
− (very) durable surface impact)
− allows multi-touch facility − cannot use when wearing (standard)
gloves
Infra-Red
Infrared touch screens are based on light-beam interruption technology. Instead of an
overlay on the surface, a frame surrounds the display. The frame has light sources, or
light emitting diodes (LEDs) on one side and light detectors on the opposite side,
creating an optical grid across the screen.
When an object touches the screen, the invisible light beam is interrupted, causing a
drop in the signal received by the photo sensors.
129 | P a g e
Benefits Drawbacks
good durability − expensive to manufacture
allows multi-touch facility − screen (glass) will shatter/break/crack
can use stylus/finger/gloved finger/pen (on impact)
100% light transmission (not an − sensitive to dust/dirt No protection for
overlay) display surface
Accurate
Digital Cameras
Digital cameras are used in the same way as standard photographic
cameras. Most digital cameras look just like ordinary cameras. Unlike
photographic cameras digital cameras do not use film. Inside a digital
camera is an array of light sensors. When a picture is taken the array
of sensors is used to input the image. The image can then be stored
either in the camera's RAM or on a floppy disk. Later the pictures can be transferred onto
a computer for editing using a graphics package.
Some digital cameras are available relatively cheaply, for about £300. However these
cameras do not take very good pictures. More expensive cameras can take higher
quality pictures but these are still not quite as good as standard photographs. Digital
cameras are extremely useful for tasks such as producing newsletters.
Video Digitiser
A video digitiser takes an image from a video camera or television and converts it so that
it can used by and stored on a computer. Almost all video digitisers now work in colour.
Unlike scanners video digitisers can capture moving video sequences as well as still
images. When a video sequence is captured the computer stores this as a sequence of
still images called frames. These images are displayed quickly one after the other
(rather like a flick-book) to create the illusion of a moving picture.
When you want to capture a video sequence you must tell the computer:
Size: How big you want the image you capture to be. e.g. should it take up the
whole screen, 1/2 the screen, 1/8th of the screen ... ?
Frame Rate : How frequently the frames should be captured from the video.
If you want to capture large images you may have to settle for a slow frame rate which
will make the captured video film look jittery. If you want a fast frame rate you may only
be able to capture a small image size. Video sequences captured using a video digitizer
is often used in multimedia presentations.
Voice Recognition
Voice recognition systems listen to what people are saying and carry out the instructions
given to them when people speak.
Turnaround Documents
Optical mark recognition and optical character recognition are often used together in a
turnaround document. A turnaround document is a document which:
Has some information printed onto it by a computer?
Has more information added to it by a human?
Is fed back into a computer to transfer the added information into the computer.
Here is a turnaround document that a gas company could use to record meter readings.
Sensors
Sensors can be used to measure physical quantities such as temperature, light and
131 | P a g e
pressure. The measurements can then be stored for later use (data logging) or used to
control devices such as heaters or fans (computer control).
The image is produced inside the device and then projected out
through a large lens, using a powerful light source.
Loudspeaker
If you want to hear music or sounds from your computer, you
will have to attach loudspeakers. They convert electrical signals
into sound waves.
Inkjet Printer
Inkjet printers have a similar print-head mechanism to a dot-
matrix printer. The print-head passes left and right across the
paper. However, instead of using pins to hit inky marks onto
the paper, the ink-jet squirts tiny droplets of ink onto the
surface of the paper. Several coloured inks can be used to
produce full-colour printouts
How inkjet printers work:
S No Step
1 Printer driver translates data into a suitable format for the printer
2 Printer receives data from the computer and stores the data in the
printer's buffer
3 Paper feed stepper motor activated; sheet of paper fed from paper tray
4 The print head moves across page; ink is sprayed each time the print
head pauses for a fraction of a second
5 Paper feed stepper motor advances paper a fraction of a cm after each
complete head pass
Laser Printer
Laser printers are very complex devices, and thus expensive to buy. However they are
very cheap to use. This is because they produce marks on paper using a fine dust
called toner which is relatively cheap to buy. A single toner cartridge will often last for
5,000-10,000 pages of printing.
The laser printer uses a complex system, involving a laser, to make the toner stick to the
required parts of the paper. (This system is very different to a dot-matrix or ink-jet, and
you don‘t need to know the details.)
134 | P a g e
The laser and toner system allows very fast printing compared to other printers (just a
few seconds per page).
Laser printers are very common in offices since they print very quickly, are cheap to use
and are reasonably quiet.
S
Step
No
1 The printer driver ensures that the data is in a format that the laser printer can
understand
2 Data is then sent to the laser printer and stored temporarily in the printer buffer
3 The printing drum is given a positive charge
4 As the printing drum rotates, a laser scans across it; this removes the positive
charge in certain areas
5 Negatively-charged areas are then produced on the printing drum; these match
exactly with the text and images to be printed
6 The printing drum is coated in positively-charged toner; this then sticks to the
negatively-charged parts of the printing drum
7 A negatively-charged sheet of paper is then rolled over the printing drum
8 The toner on the printing drum is now transferred to the paper to reproduce the
required text and images
9 The paper goes through a fuser which melts the toner so it fixes permanently to the
paper
Plotter
Plotters create hard-copy in a very different way to printers. Instead of building up text
and images from tiny dots, plotters draw on the paper
using a pen.
The pens are held in an arm which can lift the pen up
or down, and which can move across the paper. The
arm and pen create a drawing just like a human could,
but much more accurately and more quickly.
Plotters are often used by designers and architects since they work with huge pieces
135 | P a g e
of paper, far bigger than anything a normal printer could work with...
Examaple Question 4)
(a) Inkjet printers and laser printers are two common types of printer.
Describe the features and principles of operation of each type of printer.
(i) Inkjet printer
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
(ii) Laser printer
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
(b) Another type of printer is the 3D printer.
Describe 3D printing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
137 | P a g e
Examination Questions
Q1) Winter 2014 P13
A cinema (movie theatre) uses automatic machines to allow customers to select tickets for movie
shows. Payments are made by credit or debit card.
(a) Identify two input devices which could be used by the cinema.
For each device, describe what it is used for.
input device 1 ............................................................................................................................
use....................................................................................................................................................
...........................................................................................................................................
input device 2 ............................................................................................................................
use....................................................................................................................................................
.......................................................................................................................................[4]
(b) Identify two output devices which could be used by the cinema.
For each device, describe what it is used for.
output device 1 ……………………………………………………………………………………
use....................................................................................................................................................
output device 2 .........................................................................................................................
use....................................................................................................................................................
.......................................................................................................................................[4]
Q2) A microwave oven cooks food when the food is placed on a rotating plate and the door is
closed.
The oven is controlled by a microprocessor.
(a) Name two sensors that could be used in the microwave oven.
1 ................................................................................................................................................
2 ............................................................................................................................................[2]
(b) Describe two items of data that the user would need to input before pressing the start button.
Describe how these data could be input.
data1.................................................................................................................................................
....................................................................................................................................................
method of input 1
...................................................................................................................................................
...................................................................................................................................................
data2.................................................................................................................................................
.....................................................................................................................................................
method of input 2
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) Describe the role of the microprocessor in the microwave oven.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
138 | P a g e
Q3) Summer2014 P12
The following diagram shows six descriptions of automatic data capture methods and six
terms.
Draw lines to connect each description to the correct term.
139 | P a g e
Q4) Winter 2013 P12
(a) Seven hardware items are shown on the right hand side in the diagram below. Three
applications are shown on the left in the diagram.
By drawing arrows, link each application to the appropriate hardware items (each
hardware item must be used once only):
(b) Name one additional item of hardware used in each of the three applications named
in the above diagram.
CAD:...............................................................................................................................................
Video conferencing: ......................................................................................................................
virtual reality : ........................................................................................................................... [3]
Q5)A shop uses an information screen linked to a computer to allow customers to order
goods directly. The first screen shows three options:
(a) What is the best input device to allow customers to choose one of the three options?
...........................................................................................................................................[1]
140 | P a g e
A user selects an element from the table and is then directed to another web page where
details of the chosen element can be found.
(a) (i) What would be the most suitable input device for this application?
..........................................................................................................................................................
....................................................................................................................................................[1]
(ii) Describe how your chosen input device would interact with the table.
..........................................................................................................................................................
....................................................................................................................................................[1]
(b) Give two advantages of this system when compared to finding the same information
from books.
..........................................................................................................................................................
.....................................................................................................................................................[2]
(c) Apart from security issues, give two disadvantages of this system compared to using
books.
..........................................................................................................................................................
.................................................................................................................................................. [2]
(b) Give one feature of each printer which makes it appropriate for the application.
3D printer........................................................................................................................................
Dot matrix printer: ..........................................................................................................................
143 | P a g e
Colour inkjet printer: ......................................................................................................................
Colour laser printer: .................................................................................................................[4]
Q19) Describe how a supermarket would use computer technology to carry out
automatic stock control.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
................................................................................................................................................ [3]
(b) The following are steps in the automatic stock control system.
Number the steps in the correct order.
[4]
Q21)A factory uses a computer system to store information about customers, spare parts
and general administration.
(a) Spare parts can be identified by selecting from diagrams on a computer screen.
Describe what hardware would be needed to allow the parts to be selected in this way
..........................................................................................................................................................
............................................................................................................................................... [2]
(b) The factory needs to buy a new printer. It has decided to buy either a dot matrix
printer or an inkjet printer. Discuss the advantages and disadvantages of using both
types of printer in this application.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
146 | P a g e
............................................................................................................................................... [3]
Q22) Winter 2009 P1
Explain, with examples where appropriate, the following five computer terms.
ROM
..........................................................................................................................................................
............................................................................................................................................... [1]
(a) How could a computer simulation be used by a supermarket to reduce queuing at
checkouts?
..........................................................................................................................................................
............................................................................................................................................... [2]
(b) The supermarket has decided to fit sensors at the shop entrance to count people
coming in and leaving.
i) What type of sensor would be suitable to detect people?
..........................................................................................................................................................
............................................................................................................................................... [1]
(ii) How could the supermarket use the information obtained from these sensors?
..........................................................................................................................................................
............................................................................................................................................... [2]
(c) The supermarket has decided to fit information screens at various locations for
customer use. These information screens do not use keyboards.
(i) Give one example of a suitable input device.
.................................................................................................................................................... [1]
(ii) What information could be made available to supermarket customers?
..........................................................................................................................................................
............................................................................................................................................... [1]
(iii) Give one advantage of using this system rather than displaying signs and notices
around the supermarket.
..........................................................................................................................................................
............................................................................................................................................... [1]
Name two types of automatic data capture and give one application for each type
named.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
................................................................................................................................................. [4]
Q26) Winter2008 P1
A supermarket uses a computer system to control and order stock. All products sold are
identified with a bar code which can be read at a Point Of Sale (POS) terminal.
(a) Apart from stock control, give one advantage to the supermarket of having bar codes
on the products.
............................................................................................................................................... [1]
(b) Give one advantage to the customer of using POS technology.
..........................................................................................................................................................
............................................................................................................................................... [1]
(c) Describe how a computerised stock control system works.
..........................................................................................................................................................
............................................................................................................................................... [3]
Explain, using examples where appropriate, the meaning of these computer terms.
(a)mouse
..........................................................................................................................................................
............................................................................................................................................... [2]
(d) RAM
..........................................................................................................................................................
............................................................................................................................................... [2]
Describe three ways you could modify a typical input/output environment to enable
people with disabilities to use the computer system.
..........................................................................................................................................................
............................................................................................................................................... [2]
Q29) Summer2006 P1
Name two devices used for direct data capture. Give one application for each device
named.
Device 1: ....................................................................................................................................
Use ............................................................................................................................................ [2]
Device 2: ....................................................................................................................................
Use ............................................................................................................................................ [2]
Marking Scheme • expensive to purchase / maintain
Example Questions: • very large footprint
• slow plotting process [2]
Q2) • barcode reader/scanner, • Keypad / numpad / number pad
• Touchscreen / touchpad, • Mouse Q4) (a) (i) Inkjet printer
Q3) (a) laser printer features Any four from:
• high speed printing – uses cartridges/liquid ink
• suitable for large volume printing – makes use of thermal bubble/piezoelectric technology
• high quality printing – sprays ink in droplets on the paper
drawbacks – uses a moving print head
• expensive to buy toner/diffuser – suitable for low volume (high quality) output, e.g. a photo [4]
• produce ozone/toner particulates in the air (ii) Laser printer
inkjet printer features
Any four from:
• high quality colour printing
– uses powdered ink/toner cartridges
drawbacks
• large print runs require frequent changing of cartridges – uses a (charged) printing drum
• ink needs time to dry or it smudges – makes use of static electricity charges
• heads can clog up with ink if left standing – uses a fuser to fix/melt ink onto the paper
• expensive running costs / high cost of ink – uses a discharge lamp to remove static charge from the drum
• too slow for large print runs [2] – useful for high volume (high quality) output, e.g. leaflets [4]
(ii) 3D printer features (b) Any three from:
• builds up a solid object by ―printing‖ thin layers (tomography – produces solid, 3D objects/prototypes
technique) – used in CAD/CAM
• creates prototypes
– makes use of tomography/slices of an object
• solid objects actually work which is ideal for CAD work
– solid built up in thin layers
• many types now exist that use resin, powdered metal, paper,
plastics, etc. – uses resin, powdered metal, paper, plastic… [3]
drawbacks Examination Questions:
• expensive to buy Q1)
• very slow to produce output (a) 1 mark for input device + 1 mark for its matching use
• raw materials / consumables expensive to buy input device: touch screen
• can only produce items of a small size use: select film / cinema seats / price
(graph) plotter features
input device: keyboard / keypad
• ability to produce very large drawings/blueprints
use: input number of tickets / card PIN
• they use ―pens‖ to draw lines / accurate shapes
drawbacks input device: magnetic stripe reader / chip and PIN reader / card
150 | P a g e
reader – use of barcode readers (to read barcodes on food packaging which
use: reading credit / debit card details stores an automatic
input device: scanner cooking programme)[4]
use: to read any promotional vouchers (etc.) [4] (c) Any four from:
(b) 1 mark for each different output device + 1 mark for its matching – (microprocessor) checks / receives readings / data / signals from
use sensors….
output device: screen / monitor – …..continuously
use: show films available / seating plan / prices of each seat / payment – if door open, (microprocessor) sends signal to sound alarm / stop
details process
output device: printer – (microprocessor) compares weight of food against stored values…
use: print receipt / tickets – …and automatically sets cooking time / power
output device: loudspeaker / beeper – cooking time controlled by (microprocessor) comparing with stored
use: to indicate error in input / confirmation of keys pressed [4] values
Q2) (a) 1 mark for each different sensor (max 2) – (microprocessor) sends signal to beeper / notify when cooking
– pressure sensor program complete [4]
– example of sensor to detect if door closed / open e.g. magnetic field Q15) (a) Any two input devices from:
sensor, proximity sensor touch screens/light pens
– moisture / humidity sensor roller/tracker ball/mouse/joystick
– temperature / infrared sensor[2] microphone
(b) 1 mark for each item of data (max 2): touch pads (containing options shown on keys)
– is the food frozen / uncooked / cooked? [2]
– cooking time (b) Any two examples from:
– start / end time maps/directions
– power prices of goods/shop products
– weight flight details
– type of food bank statements/bills
– additional cooking feature e.g. browning travel offers
1 mark for each corresponding input method (max 2): news updates
– turn dial to select option emails/messages [2]
– touch screen / buttons / concept keyboard / keypad to select options (c) Any one advantage from:
airport can advertise services/products
24/7 service
151 | P a g e
Secondary Storage
Secondary storage has to be non-volatile and includes:
• hard disks
• solid-state storage memory cards
Hard Drives
Hard-drives have a very large storage capacity (up to 1TB).
They can be used to store vast amounts of data. Hard-drives
are random access devices and can be used to store all types of films, including huge
files such as movies. Data access speeds are very fast.
Data is stored inside a hard-drive on rotating metal or glass discs (called ‗platters‘).
Hard disk stores information in the form of magnetic fields. Data is stored digitally in the
form of tiny magnetized regions on the platter where each region represents a bit. To
write a data on the hard disk, a magnetic field is placed on the tiny field in one of these
two polarities: N-S – If North Pole arrives before the south pole and S-N – if the south
pole arrives before the north pole while the field is accessed. An orientation in the one
direction (like N-S) can represent the ‗1‘ while the opposite orientation (S-N) represents
―0‖. This polarity is sensed by integrated controllers built within the hard disk.
155 | P a g e
Memory Cards
Many of our digital devices (cameras, mobile phones, MP3 players, etc.) require
compact, non-volatile data storage. Flash memory cards provide this and come in a
variety of shapes and sizes.
One of the most common formats used by digital cameras is the SD Card. The cards
store the digital images taken by the camera.
Mobile phones contain a Subscriber Identity Module (SIM) card that contains the phone‘s
number, the phonebook numbers, text messages, etc.
'Solid-State'?
The term ‗solid-state‘ essentially means ‗no moving parts‘.
Solid-state storage devices are based on electronic circuits with no moving parts (no
reels of tape, no spinning discs, no laser beams, etc.)
Solid-state storage devices store data using a special type of memory called flash
memory...
Off-line Storage
156 | P a g e
Offline storage refers to any storage medium that must be physically inserted into a
system every time a users wants to access or edit data. Offline storage can be any type
of internal or external storage that can easily be removed from the computer.
Offline storage is also known as removable storage and include:
• Optical devices like CDs, DVDs
• Solid state USB memory sticks
• External Hard disk
Optical Storage Devices / Media
Why 'Optical'?
Optical storage devices save data as patterns of dots that can be read using light. A
laser beam is the usual light source.
Flash Memory
Flash memory is a type of Electronically-Erasable Programmable Read-Only Memory
(EEPROM). Flash memory is non-volatile (like ROM) but the data stored in it can also
be erased or changed (like RAM).
Flash memory can be found in many data storage
devices...
You might wonder why, since flash memory is
non-volatile, normal computers don‟t use it instead
of RAM. If they did we would have computers that
you could turn off, turn back on again and no data
would be lost – it would be great!
The reason is speed – saving data to flash memory is very slow compared to saving it to
RAM. If a computer were to use flash memory as
a replacement for RAM it would run very slowly.
However some portable computers are starting
to use flash memory (in the form of solid-state
‘discs’ as a replacement for hard-drives. No
moving parts mean less to go wrong and longer
battery life.
USB Memory Sticks
Memory sticks (or ‗thumb-drives‘) have made many other forms of portable storage
almost obsolete (why burn a CD or DVD when you can more easily copy your files onto a
memory stick?).
Memory sticks are non-volatile, random-access storage devices.
Each of these small devices has some flash memory connected to a USB interface.
Plug it into your computer and it appears as a drive. You can then add files, erase files,
etc. You can use it to move any type of file between computers.
Flash memory used to be very expensive, but in recent years it has become much
cheaper and you can now buy a 16GB memory stick for just a few dollars.
Portable Hard Drive
158 | P a g e
A portable hard-drive is one that is placed into a small case along with some electronics
that allow the hard-drive to be accessed using a USB or
similar connection.
Portable hard-drives allow very large amounts of data to
be transported from computer to computer.
Many portable music players (such as the iPod classic)
contain tiny hard-drives. These miniature devices are just
not much bigger than a stamp, but can still store over 100MB of data!
Backing up Data
What is a Backup?
A backup simply means making one or more copies of
your data.
Note: If you move the photos from the hard-drive to a CD-R, you do not have a back-up
– you still only have one copy of the photos, but now they are on a CD instead of the
hard-drive.
You only have a backup if you have a second copy of your data.
Why Backup Your Data?
If you delete a file by accident, your computer breaks, your laptop is stolen, or your
business burns to the ground, having a backup copy means that you have not lost your
precious data. You can recover your lost files and continue working.
Summary
Media Use
Magnetic backing storage media
Fixed hard discs Used to store operating systems, software and working data. Any application
which requires very fast access to data for both reading and writing to. Not for
applications which need portability. Used for online and real time processes
requiring direct access. Used in file servers for computer networks
Portable hard discs Used to store very large files which need transporting from one computer to
another and price is not an issue. More expensive than other forms of removable
media
Magnetic tapes Any application which requires extremely large storage capacity and speed of
access is not an issue. Uses serial access for reading and writing. Used for
backups of file servers for computer networks. Used in a variety of batch
processing applications such as reading of bank cheques, payroll processing and
general stock control
Optical backing CDs tend to be used for large files (but smaller than 1Gb) which are too big for a
storage media such floppy disc to hold such as music and general animation. DVDs are used to hold
as CDs and DVDs very large files (several Gb) such as films. Both CDs and DVDs are portable i.e.
they can be transported from one computer to another. Both can be used to store
computer data
CD ROM/DVD ROM Applications which require the prevention of deletion of data, accidental or
otherwise. CDs used by software companies for distributing software programs
and data; by music companies for distributing music albums and by book
publishers for distributing encyclopaedias, reference books etc. DVDs used by
film distributors
CD R/DVD R Applications which require a single ‗burning‘ of data, e.g. CDs –recording of music
downloads from the internet, recording of music from MP3 format, recording of
data for archiving or backup purposes. DVDs – recording of films and television
programs
CD RW/DVD RW Applications which require the updating of information and ability to record over
old data. Not suitable for music recording but is very useful for keeping
generations of files. DVDs have between five and ten times the capacity of CDs
DVD RAM Same properties as DVD RW but quicker access and data can be overwritten
more easily. Similar to floppies in nature but has 3000–6000 times more storage
160 | P a g e
and uses optical technology
Blu-ray Capacities of 25Gb, 50Gb and 100 Gb. Used for storing films (movies). 25Gb
equates to 2 hrs HDTV, 13hrs standard definition TV. It is possible to playback
video on a disc while simultaneously recording HD video. (Will be) used for
storage of PC data
Solid state backing Smallest form of memory used as removable storage. More robust than other
storage forms of storage. More expensive than other forms, but can be easily written to
and updated
Memory sticks/Pen Can store up to many Gb. Used to transport files and backup data from computer
drives to computer
Flash memory cards Used in digital cameras, palmtops, mobile phones, MP3 players
161 | P a g e
Examination Questions
Q1) Winter 2014 P3
In the diagram below, there are two types of memory shown on the left and five typical
memory features shown on the right.
Link each feature to either RAM or ROM by drawing connecting lines.
(b) Modern mobile phones include a digital camera and an MP3 player.
(i) Give one disadvantage when compared to a dedicated MP3 player.
……………………………………………………………………………….………………………
……………………………………………………….………………………………………………
(ii) Give one disadvantage when compared to a dedicated digital camera. [2]
……………………………………………………………………………….………………………
……………………………………………………….……………………………………………
Q9) 9691_13W_P13
(a) Define the terms hardware and software.
hardware: ……………………………………………………………………………………….
software: ……………………………………………………………………………………. [2]
(b) A cinema allows its customers to buy tickets from an automatic dispensing machine.
Payment can be made either with cash, or by debit or credit card.
State two input and two output devices that would be needed and give reasons for
your choice of device.
Input device 1: ……………………………………………………………………………….
Reason: ……………………………………………………………………………….
Input device 2: ……………………………………………………………………………….
Reason: ……………………………………………………………………………….
Output device 1: ……………………………………………………………………………….
Reason: ……………………………………………………………………………….
164 | P a g e
Output device 2: ……………………………………………………………………………….
Reason: ………………………………………………………………………………. [8]
Q12) 9691_13W_P11
(a) Describe the main differences between RAM and ROM.
……………………………………………………………………………….………………………
……………………………………………….………………………………………………………
……………………….…………………………………………………………………………. [3]
(b) Data logging devices contain both RAM and ROM.
Describe the role of each type of memory in these devices.
RAM: ……………………………………………………………………………………………….
ROM: …………………………………………………………………………………………. [2]
Q13) 9691_s13_p11
(a) State three different types of secondary storage media.
Explain how digital data is stored on each.
Type 1: ……………………………………………………………………………………………
Type 2: …………………………………………………………………………………………….
Type 3: ……………………………………………………………………………………….. [6]
(b) A remote-controlled toy car contains both RAM and ROM. The car can be
programmed to carry out a number of manoeuvres.
(i) Describe the main differences between RAM and ROM.
……………………………………………………………………………….………………………
…………………………………………………….…………………………………………… [2]
(ii) How are the two types of memory used in the car?
…………………………………………………………………………….…………………………
…………………………………………………….……………………………………………. [2]
Q14 (a) Describe the main differences between Random Access Memory (RAM) and
Read Only Memory (ROM).
(b) Various external, removable memory devices exist. Choose which device (using a
different one in each case) you would use for the following, and give a reason for your
choice:
(i) Storing multimedia files
(ii) Storing music files
(iii) Storing documents produced on a word processor
Q16) (a) Mobile phones are communication devices. They allow communication via
speech or text messaging.
(i) Most mobile phones offer predictive texting.
State what is meant by this term.
……………………………………………………………………………….………………………
………………………………………………………………………….……………………… [1]
(ii) What two additional functions would you expect to find on a mobile phone?
1: ……………………………………………………………………………….…………………
2: ……………………………………………………………………………….……………… [2]
……………………………………………………………………………….………………………
(ii) Give one disadvantage of using VoIP rather than other telephone systems.
……………………………………………………………………………….………………………
(iii) To use VoIP, there is no need to use a USB telephone.
What other hardware could be used to allow verbal communications?
……………………………………………………………………….……………………… [3]
Q16) A company advertises its Internet broadband speeds as follows:
• download speed of 128 megabits per second
• upload speed of 16 megabits per second (8 bits = 1 byte)
(a) Explain what is meant by the two terms download speed and upload speed.
Download speed: ………………………………………………………….………………………
Upload speed: …………………………………………………………………………….… [2]
(b) Give two advantages of using broadband rather than dial-up.
1: ……………………………………………………………………………….…………………
166 | P a g e
2: …………………………………………………………………………….…………………[2]
(c) Give two different scenarios when a fast broadband connection is essential.
1: ……………………………………………………………………………….…………………
2: …………………………………………………………………………….…………………[2]
(d) How many 4-megabyte files could be downloaded per second using this company‘s
broadband? [1]
Q17) Specimen Paper 1 for 2011
State two desirable properties of processors found in laptop computers. Explain why the
selected property is desirable. ()
……………………………………………………………………………….………………………
……………………………………………………………………………….………………………
……………………………………………………………………………….………………………
Q18) Winter 2008
(b) Describe two special devices that are used for man–machine interaction in virtual
reality systems.
(c) Give two examples of typical output from a virtual reality system. ()
……………………………………………………………………………….………………………
……………………………………………………………………………….………………………
Q19) Winter 2009
The digital CCTV camera is connected to a computer. The computer can make the
camera move in any direction by sending out digital signals. The computer system has a
400 gigabyte hard disk.
(e) Each image size is 400 kilobytes (0.4 gigabytes).
(i) How many images can be stored before the hard disk is full?
……………………………………………………………………………….………………………
……………………………………………………………………………….………………………
(ii) Once the hard disk is full, how can the system ensure that the stored images are not
lost and new images can be stored?
……………………………………………………………………………….………………………
……………………………………………………………………………….………………………
Q20) Winter 2009
(b) The supermarket has decided to fit sensors at the shop entrance to count people
coming in and leaving.
(i) What type of sensor would be suitable to detect people?
……………………………………………………………………………….………………………
……………………………………………………………………………….………………………
(ii) How could the supermarket use the information obtained from these sensors?
(i) infra-red sensor: …………………………………………………………………………… [1]
Q21) Summer 2012 Question Paper 11
Video conferencing, Voice over Internet Protocol (VoIP) and instant messaging are all
used as communication methods. Certain devices are essential to enable each
of these communication methods to be used.
Tick () the appropriate cells in the table below to show which one or more devices are
167 | P a g e
essential for each method. [3]
keyboard microphone Speaker webcam
VoIP
video
conferencing
instant
messaging
Describe ways to guard against each of the following Internet security issues. (A different
method should be given in each case.)
Viruses: ……………………………………………………………………………….……………
Hacking: ……………………………………………………………………………….…………
Spyware: ……………………………………………………………………………….…………
Phishing: ……………………………………………………………………………….………
Tapping into wireless networks ………………………………………………………………[5]
Q25) Winter2007
1 Explain, with examples, the following five computer terms:
(a) Byte [2]
(b) CD-ROM [2]
Q 26) Summer 2008
A computer system comes equipped with DVD writer/reader, hard disk drive and RAM.
(a) Give a different use for each of these forms of memory.
DVD
Hard Disk
RAM
(b) Give another example of a memory device and give one advantage of the named
device.
Q32- 7010 S12 qp12) John has bought a 4 Gbyte MP3 player.
(You may assume: 1 byte = 8 bits, 1 Mbyte = 1024 Kbytes and 1Gbyte = 1024 Mbytes)
(i) We can assume that each song lasts 3 minutes and is recorded at 128 kbps (kilobits
per second).
How much memory is required per song? [2]
(ii) Using your answer in (i), how many songs can be stored on John‘s MP3 player? [2]
(b) John also bought a device for recording television programmes. It allows him to
record a programme at the same time as he is watching an earlier recording.
Describe how such a system would work.
Q33) Winter 2012 P12
The following statistics refer to a music track being recorded on a CD:
• music is sampled at 44 100 times per second
• each sample is 16 bits
• each track requires separate sampling for left and right speakers of a stereo recording
(8 bits = 1 byte, 1 megabyte = 1 048 576 bytes)
(a) (i) How many bytes are required to represent one second of sampled music?
[2]
(ii) If a typical music track is 3 minutes long, how much memory is used on the CD to
store one track? (Give your answer in megabytes.)
Q36) A company produces animation effects using computers rather than producing
them manually.
170 | P a g e
(b) Each image takes about 400 kilobytes of storage. 25 images per second are
produced.
How much memory would be needed to store a 30-minute animation?
(b) If each music track is 3.5 megabytes in size, how long would it take Juan to download
his 40 tracks?(Show your working.)
(c) He has decided to upload 36 photographs onto his social networking website. Each
photograph is 1.8 megabytes in size.
How long would it take to upload his photographs?
Q41) The following statistics refer to a music track being recorded on a CD:
• music is sampled at 44 100 times per second
• each sample is 16 bits
• each track requires separate sampling for left and right speakers of a stereo recording
(8 bits = 1 byte, 1 megabyte = 1 048 576 bytes)
(a) (i) How many bytes are required to represent one second of sampled music?
(ii) If a typical music track is 3 minutes long, how much memory is used on the CD to
store one track? (Give your answer in megabytes.)
172 | P a g e
Monitoring & Control System
Sensors and actuators
Sensors and actuators are devices that are used for automatic input and control in real-
time systems.
Sensors are electronic devices which generate signals in the response of an event like if
temperature increases beyond of a certain set limit temperature sensor generate signals
and send to processor. The signals generated by sensors are generally in analogue form
and need to be converted into digital form so as processor can understand it. ADC
(Analogue-to-Digital Converter) is used to convert these analogue signals into digital
signals.
Actuators are parts of machine which are controlled by processor. The processor sends
digital signals, which are converted into analogue signals using DAC (Digital-to-
Analogue Converter) so as actuator can act upon it.
Sensors (general) in control and measuring applications
Temperature Automatic washing machines, automatic cookers, central heating
sensor controllers, computer-controlled greenhouses, scientific experiments and
environmental monitoring
Pressure Burglar alarms, automatic washing machines, robotics, production line
sensor control, scientific experiments and environmental monitoring
Light sensor Computer controlled greenhouses, burglar alarm systems, robotics,
production line control, scientific experiments and environmental
monitoring
Graphics Inputting freehand drawings or retouch photographs
tablet
Optical Mark Inputting pencil marks on a form such as a school register, candidate
Reader exam answers, any application involving input of a choice of options
Optical Inputting text to a computer ready for processing by another software
Character package such as word processors, spreadsheets, databases etc.
Reader
Bar code Inputting code numbers from products at a POS terminal, library books
Reader and membership numbers
Video Inputting moving pictures, often pre-recorded, into a computer
camera
Web cam Inputting moving pictures from a fixed position into a computer
Light pen Where desktop space is limited, it is used instead of a mouse or for
drawing applications where a graphics tablet might be too big
173 | P a g e
Q42) Summer 2006 P1
Data-logging is used for monitoring the level of oxygen in a river.
(a) State one item of hardware that is used to collect the oxygen data. [1]
(b) Explain how the oxygen data is processed by the computer. [2]
(c) State two ways that the oxygen data could be displayed for a user to understand.
[2]
(d) Explain what the computer would do if the amount of oxygen in the water is too
high[1]
(e) Give two advantages of using data-logging for monitoring the oxygen data in a
river[2]
(a) State one type of sensor that could be used to detect a vehicle approaching the
bridge. [1]
(b) Give one reason why an analogue to digital converter (ADC) may be needed. [1]
(c) Describe how the data received from the sensors is used to control the timing of the
traffic lights. [3]
(d) If the computer controlling the traffic light system detects an error in the system, or
fails completely, what should the lights on the bridge do? [1]
Modern car engines use fuel injection systems which are controlled by microprocessors
called Engine Control Units (ECUs). The fuel injection system controls the amount of fuel
that goes into the engine. Sensors monitor engine conditions and feed the data back to
the ECUs.
174 | P a g e
(a) Name two types of sensors used to monitor engine conditions. [2]
(b) Describe how information from the sensors is used to control the fuel injection system
[3]
(c) Give an advantage of using automatic fuel injection systems rather than simple
mechanical fuel devices. [1]
(d) The fuel injection system operates in real time.
Why would batch processing not be appropriate in this application? [1]
Q48) Summer2009 P1
Aeroplanes use on-board computer power to allow them to operate more efficiently and
safely.
(a) How is data during a flight collected and fed back to on-board computers? [2]
(b) Why are computer systems thought to be safer than human pilots? [2]
(c) However, pilots are still used on all flights. Why is this? [2]
(d) What recent developments have led to more use of computer control in newly
designed aeroplanes? [1]
(e) Describe how the computer would know when to make course corrections during a
flight. [2]
(f) At the airport, baggage check-ins use bar codes which are read by computers.
(i) What information would be stored on the bar code? [1]
(ii) Why do airports use the bar codes on baggage? [1]
The digital CCTV camera is connected to a computer. The computer can make the
camera move in any direction by sending out digital signals. The computer system has a
400 gigabyte hard disk.
(a) What hardware is needed to inform the computer that the camera needs to over to
capture an image? [1]
(b) Why is the DAC needed? [1]
(c) How could the computer use the camera to detect an intruder? [1]
(d) Give two advantages of using digital cameras. [2]
(a) Describe how the sensors and microprocessor are used to ensure the correct water
flow and water temperature are maintained. [4]
(b) Give one safety feature that could be built into the shower unit in case the sensors
and/or microprocessor fail. [1]
(c) What is the advantage of having microprocessor control rather than manual control of
water flow and temperature? [1]
177 | P a g e
Q52) Summer2010 P12
A safety system has been developed to stop vehicles getting too close to each other on
the road.
If vehicle A gets too close to vehicle B, the brakes are automatically applied by a
computer system in vehicle A.
(a) What type of sensors could be used on the vehicles? [1]
(b) Describe what the safety system does to constantly monitor how close the vehicle is
to the vehicles in front and decide when to take action. [4]
(c) Describe two potential problems with this safety system. [2]
(a) Data are collected from sensors at regular intervals and compared with stored values.
(i) Describe how the computer uses this data when monitoring the chemical process.[1]
(ii) Describe how the computer uses this data when controlling the chemical process.[1]
(b) What steps are necessary for the computer to control the temperature of the chemical
process? [3]
(c) Name two other sensors and give a different application where they are used.
179 | P a g e
Q57) Summer 2012 P11
Vehicles passing over a bridge are detected automatically using sensors and a
computer.
(a) What sensors could be used? [1]
(b) The graph below shows the number of vehicles counted during certain periods of the
day.
This graph is produced automatically at the end of each day.
A record is created each time a vehicle is detected. These records are processed to
generate the graph and for other purposes.
What data need to be stored in each record? [2]
(c) State two other methods of automatic data capture. In each case, name an
application which would use this method. [4]
Q58) Summer 2012 P12
A room in a house is fitted with a computerised intruder alarm system:
(a) (i) Describe how the sensors and computer would be used to detect intruders.
(ii) Describe how the system warns that an intruder has been detected. [4]
(b) It is decided to automatically close door and window shutters if an intruder is
detected.
What additional processing and hardware would be needed? [2]
(c) Name another sensor that could have been used in this intruder alarm system.[1]
(d) What measures could be taken to stop or minimise the number of false alarms?[2]
Sensors are used to detect the sound of any liquid dripping into the protective pipe.
Actuators operate the valves that regulate the flow of liquid through the inner pipe.
This system is controlled by a computer.
(a) Describe how the sensors, actuators, valves and computer are used to monitor and
control the liquid in the pipe. [5]
(b) Give two advantages of using this computer-controlled system rather than visual
checks by the workforce. [2]
Q16) (a) (i) – as first character(s) keyed in, rest of word predicted /word(s)
suggested according to the letter(s) already entered [1]
(ii) Any two from (items below are only examples):
– MP3 player
– Bluetooth
– Wi-Fi
– Camera
182 | P a g e
An operating system (OS) is software that manages computer hardware and software
resources and provides common services for computer programs.
Not all computers have operating systems. The computer that controls the microwave
oven in your kitchen, for example, doesn't need an operating system. It has one set of
tasks to perform, very straightforward input to expect (a numbered keypad and a few
pre-set buttons) and simple, never-changing hardware to control. For a computer like
this, an operating system would be unnecessary baggage, driving up the development
and manufacturing costs significantly and adding complexity where none is required.
Instead, the computer in a microwave oven simply runs a single hard-wired program all
the time.
All desktop computers have operating systems. The most common are the Windows
family of operating systems developed by Microsoft, the Macintosh operating systems
developed by Apple and the UNIX family of operating systems (which have been
developed by a whole history of individuals, corporations and collaborators). There are
hundreds of other operating systems available for special-purpose applications, including
specializations for mainframes, robotics, and manufacturing, real-time control systems
and so on.
In any device that has an operating system, there's usually a way to make changes to
how the device works. This is far from a happy accident; one of the reasons operating
systems are made out of portable code rather than permanent physical circuits is so that
they can be changed or modified without having to scrap the whole device.
Functions of an OS
The main functions of a computer‘s operating system are to:
• complete its own loading into RAM when the computer is started up using a small
firmware program stored in ROM or FLASH memory
• manage user accounts and security
186 | P a g e
• provide an interface for the user
• control the application programs
• manage the processor‘s time
• manage the allocation of internal memory
• control peripheral devices keyboards, printers and hard disk drives
• provide ‗spooling‘ – temporary storage of input or output data for relatively slow
peripherals
• manage interrupt signals to the processor
• perform housekeeping tasks, such as file indexing or defragmenting a HDD drive.
Types of operating system
Types of operating system, which are not mutually exclusive, include:
• a batch OS
• a multi-tasking OS
• a multi-access OS
• a real-time OS of which there are two types:
– a real-time transaction processing OS
– a real-time process control OS
• a network OS.
User interface
A user interface, or human-computer interface (HCI), consists of all the hardware and
software through which a user provides input to a computer or receives information from
it. Types of user interface controlled by the OS include:
Command Line Interface
A Graphical User Interface:
In the early days of personal computers, all PCs used command-line interfaces.
File management
A file is a program or set of data saved in backing storage.
Examination Questions
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
(ii) The same student also wrote: ―to launch an application, a graphical user interface
189 | P a g e
(GUI) requires typing the name of the application using a keyboard‖.
Why is this statement incorrect? [1]
...........................................................................................................................................................
.....................................................................................................
……………………………………….
(b) A user interface is a function of a typical operating system.
Write down four other functions of a typical operating system.
1: ____________________________________________________________________
2: ___________________________________________________________________
3: ___________________________________________________________________
4: _________________________________________________________________ [4]
Q3) 9691_13w_qp11
(a) What is meant by an interrupt?
_____________________________________________________________________
___________________________________________________________________ [1]
(b) A user starts the printing of a document, and then carries on editing a second
document while printing continues.
Explain how interrupts make this possible.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
___________________________________________________________________ [4]
(c) Once a week the user runs a virus checker.
What action will be taken if the virus checker detects a virus in a file?
190 | P a g e
...........................................................................................................................................................
..................................................................................................................................................... *2+
(d) The computer is running a single-user operating system.
Describe what this means.
_____________________________________________________________________
_____________________________________________________________________
___________________________________________________________________ [2]
Q4 ) 9691_13s_qp11
(a) Describe the terms buffer and interrupt.
Buffer: _______________________________________________________________
___________________________________________________________________ [2]
interrupt: _____________________________________________________________
_____________________________________________________________________
___________________________________________________________________ [2]
(b) (i) Explain the role of the buffer and interrupts when a large document of over 200
pages is sent to a laser printer.
_____________________________________________________________________
___________________________________________________________________ [3]
(ii) The use of two buffers would speed up the printing process. Explain why.
______________________________________________________________________
______________________________________________________________________
___________________________________________________________ [2]
191 | P a g e
1.3.7 High- and low-level languages and their translators
Programming Language:
―A set of rules that provide a way of telling computer what operation to perform is
called a Programming Language.‖
Computer needs instructions to perform a task. Program is set of step by step
instruction which directs computer to do the task and to produce results. There are some
rules and regulations to write programs and these rules and regulations are
programming languages.
Different types of programming languages are given below:
1) Machine Language: (Low Level Language)
Machine languages are the most basic languages. They consist of a series of
current signals ‗On‘ and ‗Off‘. On is represented by ‗1‘ and off is represented by ‗0‘. It is
1st generation of language.
Machine language is also called Binary Digits. It is computer‘s language in which
different parts of computer communicate with each other. 0s and 1s are called bit (binary
digit).
Machine language is easy for computer Machine Language Code
and difficult for programmer. Every computer 000100101111010101001111010101
has its own unique machine language. It 0100010011000011111010101011110
means machine for Apple Macintosh is 0011110001010101010010100001111
different from IBM compatible. 1010101011110101000111110101011
101100100110000101010010101010
2) Assembly Language: (Middle Level Language)
Assembly language consists of English like symbolic codes known as mnemonics.
It is a second generation of language.
They represent common strings of machine codes. A language translator,
Assembler, is used to convert source code of Assembly language program into object
code of machine language. Though Assembly
languages are easier than machine language Assembly Code (Source code)
but they are highly detailed and cryptic. So
programmers seldom write programs in ADD R1 #6 #12
DIV R2 R1 #2
Assembly language. Instead programmers use STO R2000 R2
Assembly languages to fine-tune important parts
of programs written in a high level language.
3) High Level Languages
High-level languages consist of familiar English words as result programmers can
read, write and understand programs easily.
192 | P a g e
A language translator (compiler or interpreter) translates source code of High
Level Language into object code. That's why the program of High Level Language can
be executed on any machine.
For Count=1 to 10
Print ''Allah''
Next Count
Source Code:
''A program written in any language except the machine language is called Source
Code.''
Programmers can write programs in Machine Language, Assembly Language and
High Level Languages like COBOL, PASCAL, and GWBASIC etc. The programs, written
in Assembly Language or any High Level Language are called Source Code.
Object Code:
''A program written in Machine Language is called Object Code.''
Computer can understand only machine language code. Language translators
converts source code of High Level Language into machine code, these converted
codes are Object Codes.
Language Translator:
''Language Translators are programs that convert or translate the instructions in
Assembly Language or High Level Language i.e. source code into instructions of
machine language i.e. object codes are called Language Translators.''
Computer can understand only machine language. Programs written in Assembly
Language and High Level Language are translated into Machine Language so as
computer can understand execute them.
Following are three types of language translators:
1 Assembler:-
''Assembler is a language translator that translates source program written in
Assembly Language into object code in machine language.''
Computer can understand only machine language. Assemblers translate
programs written in Assembly Language into Machine Language so as computer can
193 | P a g e
understand execute them.
2 Interpreters:-
''An interpreter is a language translator that translates source program written in
High Level Language into object code in machine language during step by step
execution of program.''
Computer can only understand instruction written in machine language.
Interpreters translate one by one instruction of High Level Language source code into
object code of Machine Language.
Interpreter translates one instruction which is executed before translation of next
instruction. The object code is not saved so the source code is interpreted every time
before the execution.
Each high level language has its own language translator.
3 Compilers:-
''A compiler is a language translator that translates whole source program written
in High Level Language into object code in machine language before execution of
program.''
Compilers translate all instructions before executions. The object code is saved as
object file, which is executable. Object files don't need compiler or language for
execution.
1.4.1
• show understanding of the need to keep data safe from accidental damage, including corruption
and human errors
• show understanding of the need to keep data safe from malicious actions, including unauthorised
viewing, deleting, copying and corruption
1.4.2
• show understanding of how data are kept safe when stored and transmitted, including:
○ use of passwords, both entered at a keyboard and biometric
○ use of firewalls, both software and hardware, including proxy servers
○ use of Secure Socket Layer (SSL)
○ use of symmetric encryption (plain text, cypher text and use of a key) showing understanding that
increasing the length of a key increases the strength of the encryption
1.4.3
• show understanding of the need to keep online systems safe from attacks including denial of
service attacks, phishing, pharming
1.4.4
• describe how the knowledge from 1.4.1, 1.4.2 and 1.4.3 can be applied to real-life scenarios
including, for example, online banking, shopping
show understanding of computer ethics, including copyright issues and plagiarism
• distinguish between free software, freeware and shareware
• show understanding of the ethical issues raised by the spread of electronic communication and
computer systems, including hacking, cracking and production of malware
Data Integrity
Data integrity refers to maintaining and assuring the accuracy and consistency of data
over its entire life-cycle, and is a critical aspect to the design, implementation and usage
of any system which stores, processes, or retrieves data.
195 | P a g e
Data security is about keeping data safe. Many individuals, small businesses and major
companies rely heavily on their computer systems.
If the data on these computer systems is damaged, lost, or stolen, it can lead to disaster.
Key threats to data security
Data may get:
lost or damaged during a system crash - especially one affecting the hard disk
corrupted as a result of faulty disks, disk drives, or power failures
lost by accidentally deleting or overwriting files
lost or become corrupted by computer viruses
hacked into by unauthorised users and deleted or altered
destroyed by natural disasters, acts of terrorism, or war
deleted or altered by employees wishing to make money or take revenge on their
employer
Keeping data secure
Measures that can be taken to keep data secure include:
making regular backups of files (backup copies should be stored in fireproof safes
or in another building)
protecting yourself against viruses by running anti-virus software
using a system of passwords so that access to data is restricted
safe storage of important files stored on removable disks, e.g. locked away in a
fireproof and waterproof safe
allowing only authorised staff into certain computer areas, e.g. by controlling entry
to these areas by means of ID cards or magnetic swipe cards
always logging off or turning terminals off and if possible locking them
avoiding accidental deletion of files by write-protecting disks
using data encryption techniques to code data so that it makes no apparent sense
Online banking
When you bank online, after you‘ve logged in, you will notice that the http in the address
bar has changed to https. This indicates that a secure connection between your
computer and the bank's computer has been established. Data sent between the two
computers is encrypted so that anyone trying to intercept your data will receive
meaningless data. The data can only be decrypted into readable data by using a key that
is known only to the two computers - yours and the bank's.
Examination Questions
Exam questions on data security will usually ask about methods for keeping data safe
and secure.
Question
In a local doctor's surgery, data about the patients is stored in a database on a
computer.
Consider two physical precautions that should be taken to keep the data secure.
Answer
1. keep the computer area secure
2. keep backups in a safe place
Examiner's comment
196 | P a g e
The key word is physical - the question is asking for the physical precautions you can
take to protect data. Keeping the computer area secure and keeping backups in a safe
place are both physical precautions. Swipe card entry, locking terminals or controlling
access to computer areas would also have been good answers.
Question
The doctor needs to see all the information about patients. The receptionist only needs
to see some of the information.
Describe one way in which software could restrict access to patient information.
Answer
Make it so users must enter a password to gain access to certain areas of the database.
Examiner's comment
The question is looking for detail about different types of access for different users. This
answer clearly highlights the need for having passwords for different levels of access.
TRANSPORT LAYER SECURITY (TLS) is similar to SSL but is a more recent security
system. TLS is a form of protocol that ensures the security and privacy of data between
devices and users when communicating over the internet. It is essentially designed to
provide encryption, authentication and data integrity in a more effective way than its
predecessor SSL.
When a website and client (user) communicate over the internet, TLS is designed to
prevent a third party hacking into this communication causing problems with data
security.
TLS is formed of two layers:
• Record protocol: this part of the communication can be used with or without encryption
(it contains the data being transferred over the internet).
• handshake protocol: this permits the website and the client (user) to authenticate each
other and to make use of encryption algorithms (a secure session between client and
website is established).Only the most recent web browsers support both SSL and TLS
which is why the older SSL is still used in many cases. But what are the main differences
198 | P a g e
between SSLand TLS since they both effectively do the same thing?
• It is possible to extend TLS by adding new authentication methods.
• TLS can make use of SESSION CACHING which improves the overall performance
158 compared to SSL.
• TLS separates the handshaking process from the record protocol (layer) which holds all
the data.
Session caching
When opening a TLS session, it requires a lot of computer time (due mainly to the
complex encryption keys being used). The use of session caching can avoid the need to
utilise so much computer time for each connection. TLS can either establish a new
session or attempt to resume an existing session; using the latter can considerably boost
system performance.
Summer 2015 P12
(a) State what is meant by the term SSL.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(b) The following stages take place when a user wishes to access a secure website.
Put each stage in sequence by writing the numbers 1 to 6 in the column on the right. The first
one has been done for you. [5]
Stage Sequence
number
the encrypted data is then shared securely between the web browser and
the web server
the web browser attempts to connect to a website which is secured by SSL 1
the web server sends the web browser a copy of its SSL certificate
the web browser requests the web server to identify itself
the web server will then send back some form of acknowledgement to
allow the SSL encrypted session to begin
the web browser checks whether the SSL certificate is trustworthy; if it is,
then the web browser sends a message back to the web server
Marking Scheme
(a) Any one from:
− Secure sockets layer
− encrypts data being transmitted
− Use of https
− use public and private keys [1]
(b) 1 mark for each number in the correct order, next to the correct stage.
Stage Sequence
number
the encrypted data is then shared securely between the web browser and the web server 6
the web browser attempts to connect to a website which is secured by SSL 1
the web server sends the web browser a copy of its SSL certificate 3
the web browser requests the web server to identify itself 2
the web server will then send back some form of acknowledgement to allow the SSL 5
encrypted session to begin
the web browser checks whether the SSL certificate is trustworthy; if it is, then the web 4
browser sends a message back to the web server
Data Encryption
Encryption is the conversion of electronic data into another form, called cipher text,
199 | P a g e
which cannot be easily understood by anyone except authorized parties.
The word encryption comes from the Greek word kryptos, meaning hidden or secret.
SSL (Secure Sockets Layer) is standard security technologies for establishing an
encrypted links between a server and a client—typically a web server (website) and a
browser; or a mail server and a mail client (e.g., Outlook). It allows sensitive information
such as credit card numbers, social security numbers, and login credentials to be
transmitted securely. To establish this secure connection, the browser and the server
need an SSL Certificate.
Symmetric Encryption
Symmetric encryption (or pre-shared key encryption) uses a single key to both encrypt
and decrypt data. Both the sender and the receiver need the same key to communicate.
Protection
1. The most powerful weapon against phishing is common sense and the following
rules that every user should oblige to.
2. If you are not a customer of the site delete the email immediately. Don´t click on
the link or reply.
3. If you are a customer and you are not sure if the email is legit do one of the
following:
1. Contact the institute by phone or contact at the official website (do not use
the email link of course) and ask if the mail is official.
2. Instead of using the link provided open the website by typing in the official
link there. The site should have news about the email on their starting page. (Most of the
time). If not, use 2a to verify the email.
Pharming:
Pharming in Simple Steps:
Hacker creates a fake website which appears similar to the original website.
Hacker poisons the DNS servers thus domain names are resolved into fake IP address.
User types the URL of the original website in the browser.
The DNS server directs User to the fake website designed by hacker.
202 | P a g e
User not knowing that it is a fake website, shares his confidential information such as
login, password etc.
Hacker gets the user confidential information from his fake web site and uses it to access
the original website.
Hacker exploits user's confidential information to his liking.
Protection
Check the URL of any site that asks you to provide personal information. Make sure your
session begins at the known authentic address of the site, with no additional characters
appended to it.
Use a trusted, legitimate Internet Service Provider. Rigorous security at the ISP level is
your first line of defense against pharming.
Check the certificate. It takes just a few seconds to tell if a site you land on is legitimate.
Block suspicious Websites automatically
Internet Business Scam
Dear Friend, Inqilab Patel
as you read this, I don't want you to feel sorry for me, because, I believe everyone will
die someday. My name is Mr AdadaMuhammadu, a Crude Oil merchant in Nigeria and I
have been diagnosed with Esophageal cancer. It has defied all forms of medical
treatment, and right now I have only about a few months to live, according to medical
experts. I want God to be merciful to me and accept my soul so, I have decided to give
alms to charity organizations, as I want this to be one of the last good deeds I do on
earth. So far, I have distributed money to some charity organizations in Austria,
Cameroon, Liberia, Algeria and Malaysia. Now that my health has deteriorated badly, I
cannot do it myself anymore. The last of my money which no one knows of is the huge
cash deposit of Eighty million dollars $80,000,000 that I have with a finance/Security
Company abroad. I will want you to help me collect this deposit and dispatched it to
charity organizations. I have set aside 20% for you and for your time.
God be with you. ~
Mr AdadaMuhammadu"
203 | P a g e
Data misuse and unauthorised transfer or copying
Copying and illegal transfer of data is very quick and easy using online computers and
large storage devices such as hard disks, memory sticks and DVDs. Personal data,
company research and written work, such as novels and textbooks, cannot be copied
without the copyright holder's permission.
Copying and distributing copyrighted software, music and film
This includes copying music and movies with computer equipment and distributing it on
the Internet without the copyright holder's permission. This is a widespread misuse of
both computers and the Internet that breaks copyright regulations.
Email and chat room abuses
Internet services such as chat rooms and email have been the subject of many well-
publicized cases of impersonation and deception where people who are online pretend
to have a different identity. Chat rooms have been used to spread rumors about well
known personalities. A growing area of abuse of the Internet is email spam, where
millions of emails are sent to advertise both legal and illegal products and services.
Pornography
A lot of indecent material and pornography is available through the Internet and can be
stored in electronic form. There have been several cases of material, which is classified
as illegal, or which shows illegal acts, being found stored on computers followed by
prosecutions for possession of the material.
Identity and financial abuses
This topic includes misuse of stolen or fictional credit card numbers to obtain goods or
services on the Internet, and use of computers in financial frauds. These can range from
complex well thought out deceptions to simple uses such as printing counterfeit money
with colour printers.
Viruses
Viruses are relatively simple programs written by people and designed to cause
nuisance or damage to computers or their files.
How to prevent computer misuse
The Computer Misuse Act (1990)
This was passed by Parliament and made three new offences:
1. Accessing computer material without permission, e.g. looking at someone else's
files.
2. Accessing computer material without permission with intent to commit further
criminal offences, e. g. hacking into the bank's computer and wanting to increase the
amount in your account.
3. Altering computer data without permission, e.g. writing a virus to destroy someone
else's data, or actually changing the money in an account.
The Data Protection Act
The Data Protection Act (DPA) is a law designed to protect personal data stored on
computers or in an organised paper filing system.
The need for the Data Protection Act
204 | P a g e
During the second half of the 20th century, businesses, organisations and the
government began using computers to store information about their customers, clients
and staff in databases. For example:
names
addresses
contact information
employment history
medical conditions
convictions
credit history
Databases are easily accessed, searched and edited. It‘s also far easier to cross
reference information stored in two or more databases than if the records were paper-
based. The computers on which databases resided were often networked. This allowed
for organisation-wide access to databases and offered an easy way to share information
with other organisations.
The Data, information and databases section has more on searching databases.
Misuse and unauthorised access to information
With more and more organisations using computers to store and process personal
information there was a danger the information could be misused or get into the wrong
hands. A number of concerns arose:
Who could access this information?
How accurate was the information?
Could it be easily copied?
Was it possible to store information about a person without the individual‘s
knowledge or permission?
Was a record kept of any changes made to information?
The purpose of the Data Protection Act
The 1998 Data Protection Act was passed by Parliament to control the way information
is handled and to give legal rights to people who have information stored about them.
Other European Union countries have passed similar laws as often information is held in
more than one country.
The Eight Principles of Data Protection
For the personal data that controllers store and process:
1. It must be collected and used fairly and inside the law.
2. It must only be held and used for the reasons given to the Information
Commissioner.
3. It can only be used for those registered purposes and only be disclosed to those
people mentioned in the register entry. You cannot give it away or sell it unless you said
you would to begin with.
4. The information held must be adequate, relevant and not excessive when
compared with the purpose stated in the register. So you must have enough detail but
not too much for the job that you are doing with the data.
5. It must be accurate and be kept up to date. There is a duty to keep it up to date, for
example to change an address when people move.
205 | P a g e
6. It must not be kept longer than is necessary for the registered purpose. It is alright
to keep information for certain lengths of time but not indefinitely. This rule means that it
would be wrong to keep information about past customers longer than a few years at
most.
7. The information must be kept safe and secure. This includes keeping the
information backed up and away from any unauthorised access. It would be wrong to
leave personal data open to be viewed by just anyone.
8. The files may not be transferred outside of the European Economic Area (that's the
EU plus some small European countries) unless the country that the data is being sent
to has a suitable data protection law. This part of the DPA has led to some countries
passing similar laws to allow computer data centres to be located in their area.
The roles of those involved
1. The Information Commissioner is the person (and his/her office) who has
powers to enforce the Act.
2. A data controller is a person or company that collects and keeps data about
people.
3. A data subject is someone who has data about them stored somewhere, outside
of their direct control. For example, a bank stores its customers' names, addresses and
phone numbers. This makes us all data subjects as there can be few people in the UK
who do not feature in computer records somewhere.
Copyright law
This provides protection to the owners of the copyright and covers the copying of written,
musical, or film works using computers. FAST is the industry body which is against
software theft. You can find out more about it in the Copyright section.
There have been cases where laws such as Copyright have been used to crack down on
file sharing websites or individuals who store and illegally distribute copyrighted material,
e.g. music. There is a massive problem with many people around the world obtaining
copyrighted material illegally.
Close down chat rooms
Some chat rooms have been closed down due to abuses, especially where children are
vulnerable. Some have moderators who help to prevent abuses. Advice about sensible
use is important; especially to never give personal contact details or arrange meetings
without extreme caution.
Reduce email spamming
This may be reduced by:
never replying to anonymous emails
setting filters on email accounts
reporting spammers to ISPs, who are beginning to get together to blacklist email
abusers
governments passing laws to punish persistent spammers with heavy fines
Regular backups and security
Just making something illegal or setting up regulations does not stop it happening.
Responsible computer users need to take reasonable steps to keep their data safe. This
includes regular backups and sufficient security with passwords.
206 | P a g e
Examination Questions
Winter 2014 P12
The following five statements about Internet security are incomplete:
(i) Illegal access to a computer system is known as < - - - - - - - - >.
(ii) < - - - - - - - - > are programs that self-replicate (copy themselves) and are designed
to disrupt computer systems.
(iii) < - - - - - - - -> is where a user is sent legitimate-looking emails; as soon as the email
is opened and the recipient clicks on the embedded link, they are sent to a fake website.
(iv) Software that monitors key presses on a user‘s keyboard, and relays the information
back to the person who sent the software, is known as < - - - -- - - - >.
(v) < - - - - - - - - > is malicious code or software installed on the hard drive of a user‘s
computer or on a web server; the code or software will re-direct the user to a fake
website without their knowledge.
Complete the five statements using words from the following list:
• Cookies • hacking • pharming • phishing
• spam • spyware • viruses • web browsers
207 | P a g e
Summer 2014
The diagram below shows a number of descriptions and terms used in computer
security. By drawing arrows, connect the correct description to the computer security
term.
a) FALSE – encryption only stops data being read / making sense (but does not prevent
the act of hacking)
FALSE – data when backed up could still have the virus attached to it
– when the backed up data is re-loaded at a later date, the virus could be loaded again
into the system together with the stored data
TRUE – tapping into a Wi-Fi network is relatively easy (even when the network is
protected by passwords)
(b) (i) drop down boxes help defeat spyware / key logging software [1]
(ii) – to ensure that it was in fact Felipe who logged on last time [1]
– an additional authentication check
(iii) in case it is not Felipe who attempts to access the account[1]
Summer 2011
Q1) (a) Give TWO features you would expect to find in a
data protection act.
1
2 [2]
(b) Why would this act still not necessarily protect
data stored in a computer system? [2]
210 | P a g e
Summer 2014
Q2) An encryption system gives each letter of the alphabet a value:
A = 1, B = 2, C = 3, ……… , Y = 25, Z = 26.
Each letter is stored in a 12-bit binary register. The letter ―S‖ (19th letter) is stored as:
A 4-bit register is used to store the encryption key. This register shows how many places
the bits are shifted to the left in the 12-bit register when it is encrypted. So,
means each bit in the 12-bit register is shifted 5 places to the left and the register now
becomes:
Therefore, the letter ―S‖ would be transmitted with the 4-bit register and the 12-bit
register as
follows:
Winter 2010
Message character A B C D E F G H I J K L M
Substitute character P L F N O C Q U D Z V G I
Message character N O P Q R S T U V W X Y Z
Substitute character X M W J B K E A H S Y R T
Assume all messages are made up from the upper-case characters only.
Show the string after the message ATSEVEN is
encrypted. ...........................................................................................................................
.............................................................................................................................................
....... [2]
Q6) The encryption of data is widely used in computing.
(a) One application is online banking.
State two other applications where encryption is used.
Describe the reason for encrypting the data for each application.
Application 1.......................................................................................................................
Reason.......................................................................................................................
Application 2.......................................................................................................................
Reason ....................................................................................................................... [4]
(b) Explain the terms plain text and cipher text.
Plain text .......................................................................................................................
Cipher text ...................................................................................................................[2]
(c) Symmetric encryption uses a single key.
Explain how a message is encrypted and decrypted using symmetric encryption.
213 | P a g e
.............................................................................................................................................
.............................................................................................................................................
........................................................................................................................................ [3]
(d) Authorisation and authentication are processes designed to protect the computer
system and data.
Give one technique used for each.
Authorisation ......................................................................................................................
Authentication ............................................................................................................... [2]
Q6) Winter 12, Winter 11, Summer 11, Winter 10, Summer 08, Winter 07
1 Give three features of a data protection act.
1. ………………………………………………………………………………………………….
2. ………………………………………………………………………………………………….
3. ……………………………………………………………………………………………[3]
Computer Ethics
Ethics is a set of moral principles that govern the behaviour of a group or individual.
Therefore, computer ethics is set of moral principles that regulate the use of computers.
Some common issues of computer ethics include intellectual property rights (such as
copyrighted electronic content), privacy concerns, and how computers affect society.
For example, while it is easy to duplicate copyrighted electronic (or digital) content,
computer ethics would suggest that it is wrong to do so without the author's approval.
And while it may be possible to access someone's personal information on a computer
system, computer ethics would advise that such an action is unethical.
As technology advances, computers continue to have a greater impact on society.
Therefore, computer ethics promotes the discussion of how much influence computers
should have in areas such as artificial intelligence and human communication. As the
world of computers evolves, computer ethics continues to create ethical standards that
address new issues raised by new technologies.
Ten Commandments of Computer Ethics
214 | P a g e
This short code of ethics for using computers and information technology is the best-
known product of Computer Ethics Institute. It is often quoted in college-level textbooks
and adopted for practical use. The biblical reference in the title does not imply any
religious affiliation: it merely summarizes the importance of the rules compiled.
The Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization or
proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or
the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect
for your fellow humans.
Ethical Issues of Computer:
There are different ethical issues raised by the spread of electronic communication and
computer systems. These include:
Copyright infringement
Plagiarism
Hacking
Cracking
Production of malware
Copyright is a legal concept, enacted by most governments, that grants the creator of
an original work exclusive rights to its use and distribution, usually for a limited time, with
the intention of enabling the creator of intellectual wealth (e.g. the photographer of a
photograph or the author of a book) to receive compensation for their work and be able
to financially support themselves.
Copyright is a form of intellectual property (as patents, trademarks and trade secrets
are), applicable to any expressible form of an idea or information that is substantive and
discrete.
Copyright Issues
Very briefly, copyright gives the author of a work the right...
...to reproduce the work.
...to permit copies to be made by others.
...to prepare derivative works.
...to display the copyrighted work publicly.
Plagiarism is the practice of taking someone else's work or ideas and passing them off
215 | P a g e
as one's own.
“Plagiarism is the deliberate or reckless representation of another‘s words, thoughts, or
ideas as one‘s own without attribution in connection with submission of academic work,
whether graded or otherwise.‖
Plagiarism is considered academic dishonesty and a breach of Computer ethics. It is
subject to sanctions like expulsion.
Plagiarism is not a crime per se but in academia and industry it is a serious ethical
offense, and cases of plagiarism can constitute copyright infringement.
Hacking
Hacking means gaining unauthorised access to a computer, locally or over a network.
Hacking can be prevented by installing firewall, requiring a valid username and
password to gain access to the computer.
Use passwords that are long enough and are changed regularly.
Use encryption with sensitive data (e.g. credit card details).
Cracking
Software cracking is the modification of software to remove or disable features which
are considered undesirable by the person cracking the software, usually related to break
license.
Production of Malware
Malware (malicious software) is specifically designed to disrupt or damage a computer
system, such as a virus.
Malware, short for malicious software, is software used to disrupt computer operation,
gather sensitive information, or gain access to private computer systems. It can appear
in the form of code, scripts, active content, and other software. 'Malware' is a general
term used to refer to a variety of forms of hostile or intrusive software.
Computer virus is a program that has infected some executable software and, when
run, causes the virus to spread to other executables.
A worm is a program that actively transmits itself over a network to infect other
computers.
A Trojan horse is any program that invites the user to run it, concealing harmful or
malicious code.
Once a malicious program is installed on a system, it is essential that it stays concealed,
to avoid detection. Software packages known as root kits allow this concealment, by
modifying the host's operating system so that the malware is hidden from the user.
A backdoor is a method of bypassing normal authentication procedures. Once a system
has been compromised, one or more backdoors may be installed in order to allow easier
access in the future. Backdoors may also be installed prior to malicious software, to
allow attackers entry.
Freeware is copyrighted computer software which is made available for use free of
charge, for an unlimited time. Authors of freeware often want to "give something to the
community", but also want to retain control of any future development of the software.
216 | P a g e
The term shareware refers to commercial software that is copyrighted, but which may be
copied for others for the purpose of their trying it out with the understanding that they will
pay for it if they continue to use it.
Free software is computer software that is distributed along with its source code, and is
released under terms that guarantee users the freedom to study, adapt/modify, and
distribute the software.
Oct/Nov 2006
1 Explain, using examples where appropriate, the following computer terms:
(a) verification
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
3 (a) Give two examples of computer crime.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
(b) Describe two methods used to prevent computer crime.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
4 State three effects on society due to the increase of businesses using e-commerce.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………… [3]
May/June 2007
7 A hospital has decided to computerise its administration system.
220 | P a g e
(a) Give three ways this could affect the hospital workers.
………………………………………………………………………………………………………
…………………………………………………………….…………………………………………
……………………………………………………………………………………………… [3]
The hospital will be using a database which holds confidential personal data.
(b) State two precautions that the hospital should take to prevent unauthorised access to
the data.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
(c) Describe how the database could be recovered if it became corrupted.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
(d) Give one example, in each case, of when it would be necessary to amend data,
delete data and insert data into the patient database.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………… [3]
Oct/Nov 2007
4 Online banking using the Internet is now increasing.
(a) Give one advantage to the customer of using online banking.
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(b) Give one advantage to the bank of providing online banking.
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(c) Online banking has an impact on society as a whole.
(i) Give one positive effect.
………………………………………………………………………………………………………
………………………………………………………………………………
(ii) Give one negative effect.
………………………………………………………………………………………………………
……………………………………………………………………………… [2]
(d) Describe two concerns people might have regarding online banking
………………………………………………………………………………………………………
……………………………………………………………………………… [2]
5 (a) (i) Name one method used to protect data against unauthorised access.
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(ii) Name one method used to protect data in a file from being understood when an
unauthorised person has gained access to the file.
………………………………………………………………………………………………………
221 | P a g e
……………………………………………………………………………… [1]
A school Science department is going to use a database to record details about its
equipment.
(b) Part of the database is shown below:
(i) As data is entered it needs to be verified. Describe one way this could be done.[1]
………………………………………………………………………………………………………
………………………………………………………………………………
(ii) Data also needs to be validated. Using fields from the database as
examples,Describetwodifferent validation checks which could be performed on the data.
………………………………………………………………………………………………………
………………………………………………………………………………
May/June 2008
5 Computer systems can be affected by viruses.
(a) What is a virus?
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(b) Give one effect of a virus.
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(c) How can a system be protected from viruses?
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(d) Why would backing up data not guard against the effect of a virus?
………………………………………………………………………………………………………
………………………………………………………………………………
Students‘ records are kept on a stand-alone computer (no network connections) in the
principal's office.
(c) Students are concerned that their personal data could be misused. Name two
methods that could be used to ensure personal data is kept secure.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
(d) Examination results are stored in students‘ records as marks out of 100. Give two
different validation checks that could be performed on students‘ marks.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………… [2]
6 Students‘ records are kept on a stand-alone computer (no network connections) in the
222 | P a g e
principal‘s office.
(a) It is sometimes necessary to alter students‘ records. To do this efficiently, individual
records need to be retrieved quickly.
(i) What type of file access should be used?
………………………………………………………………………………………………………
………………………………………..…………………………………………………… [1]
(ii) What type of magnetic medium allows this type of access?
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(b) Give two examples of when a student‘s record would need to be altered.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
(c) Students are concerned that their personal data could be misused. Name two
methods that could be used to ensure personal data is kept secure.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
(d) Examination results are stored in students‘ records as marks out of 100. Give two
different validation checks that could be performed on students‘ marks.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
Oct/Nov 2008
4 Computer systems can be affected in various ways which could lead to data
corruption.
Give two ways that data might be corrupted and suggest a method of protection for
each.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………… [4]
7 Many people now bank through the Internet rather than using banks located in towns.
(a) Give one advantage to a bank that offers Internet banking.
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(b) Give one disadvantage to a bank that offers Internet banking.
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(c) Give two advantages to customers of using Internet banking.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
(d) Give two disadvantages to customers of using Internet banking.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
8 To gain access to a database, a user must first type in a user ID and then a password
which needs to be verified.
(a) How is a password usually verified?
………………………………………………………………………………………………………
223 | P a g e
……………………………………………………………………………… [1]
(b) In spite of these safeguards, unauthorised access to the database is still possible.
What could be done:
(i) to prevent data being used by unauthorised people?
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(ii) to prevent loss of data once the database has been illegally accessed?
………………………………………………………………………………………………………
……………………………………………………………………………… [1]
(c) Personal data is protected to some extent by a Data Protection Act. Give two
requirements of a Data Protection Act.
………………………………………………………………………………………………………
………………………………………………………………………………..………………… [2]
224 | P a g e
Winter 2014 P12
Six statements and six values are shown below.
Each statement will generate one possible value.
Draw a line to link each statement to its correct value.
225 | P a g e
Winter 2014 P13
Six statements and six values are shown below.
Each statement will generate one possible value.
Draw a line to link each statement to its correct value.
226 | P a g e
Past Papers
227 | P a g e
Summer 2015 P11
1 (a) State what is meant by the terms:
Parallel data
transmission: .............................................................................. ........................................
.............................................................................................................................................
.............................................................
Serial data transmission: .................................................................................
.............................................................................................................................................
............................................................................................... [2]
(b) Give one benefit of each type of data transmission.
Parallel data transmission
Benefit: ...........................................................................................................
.........................................................................................................................
Serial data transmission
Benefit: ...........................................................................................................
................................................................................................................... [2]
(c) Give one application of each type of data transmission. Each application must be
different.
Parallel data transmission
Application: .....................................................................................................
.........................................................................................................................
Serial data transmission
Application: ....................................................................................................
................................................................................................................... [2]
2 (a) State what is meant by the term USB.
.............................................................................................................................................
............................................................................................... [1]
(b) Describe two benefits of using USB connections between a computer and a device.
1: .....................................................................................................................
........................................................................................................................
........................................................................................................................
2: .....................................................................................................................
.........................................................................................................................
.................................................................................................................... [2]
3 (a) Complete the truth table for the following logic circuit:
228 | P a g e
A B C Workspace X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
(b) Draw a logic circuit which corresponds to the following logic statement:
X = 1 if ((A is NOT 1 OR B is 1) AND C is 1) OR (B is NOT 1 AND C is 1)
(c) Write a logic statement which corresponds to the following logic circuit:
.........................................................................................................................
.............................................................................................................................................
...............................................................................................[3]
229 | P a g e
4 Choose six correct terms from the following list to complete the spaces in the
paragraphs below:
• encryption
• file name
• firewall
• HTML tags/text
• IP address
• protocol
• proxy server
• SSL certificate
• web server name
A user enters a URL. The web browser breaks up the URL into three components:
1 ........................................................
2 ........................................................
3 ........................................................
The web server returns the selected web page.
The web browser reads the ............................................................ from the selected
page and shows the correctly formatted page on the user‘s screen.
A ............................................................ is used between the user‘s computer and the
network to examine the data traffic to make sure it meets certain criteria.
To speed up the access to the web pages next time, a ........................................... is
used between the computer and web server; this device uses a cache to store the
website home page after it has been accessed for the first time. [6]
Data bus
this uni-directional bus carries signals
relating to memory addresses between
processor and memory
231 | P a g e
(b) The seven stages in a von Neumann fetch-execute cycle are shown in the table
below. Put each stage in the correct sequence by writing the numbers 1 to 7 in the right
hand column. The first one has been done for you.
Stage Sequence
number
the instruction is then copied from the memory location contained in the
MAR (memory address register) and is placed in the MDR (memory
data register)
the instruction is finally decoded and is then executed
the PC (program counter) contains the address of the next instruction to 1
be fetched
the entire instruction is then copied from the MDR (memory data
register) and placed in the CIR (current instruction register)
the address contained in the PC (program counter) is copied to the
MAR (memory address register) via the address bus
the address part of the instruction, if any, is placed in the MAR (memory
address register)
the value in the PC (program counter) is then incremented so that it
points to the next instruction to be fetched
8 An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is
represented by an 8-bit register, A, and the number of minutes is represented by another
8-bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.
spiral track; red lasers are used – legitimate-looking emails sent to a user
to read and write data on the – as soon as recipient opens/clicks on link in the email/attachment …
media surface; makes use of – … the user is directed to a fake website (without their knowledge)
dual-layering technology to – To obtain personal/financial information/data
increase the storage capacity (b) (i) Any two from:
non-volatile memory chip; – spyware/key logging software can only pick up key presses
contents of the chip cannot be – using mouse/touch screen means no key presses to log
altered; it is often used to store ROM – the numbers on the key pad are in random/non-standard format,
the start up routines in a which makes it more difficult to interpret [2]
computer (e.g. the BIOS) (ii) 1 mark for name and 1 mark for description
optical media which use any one from:
concentric tracks to store the chip and PIN reader
DVD- – only the user and the bank know which codes can be generated
data; this allows read and write
RAM
operations to be carried out at request user name
the same time – additional security together with password/PIN
non-volatile memory device anti-virus
Solid – removes/warns of a potential virus threat which can‟t be passed on to
which uses NAND flash
state customers
memories (which consist of
Drive
millions of transistors wired in firewall
SSD – (helps) to protect bank computers from virus threats and hacking
series on single circuit boards)
optical media which use blue encryption
laser technology to read and – protects customer data by making any hacked information unreadable
write data on the media surface; Blu-ray security protocol
it uses a single 1.1 mm – governs the secure transmission of data
polycarbonate disc Biometric
– to recognise user through the use of, e.g. facial/retina/finger print
6 (a) virus Alerts
any two from: – users IP/MAC address is registered and user is alerted through, e.g. SMS
– program/software that replicates/copies itself if account is accessed through an unregistered address
– can delete or alter files/data stored on a computer
– can make the computer “crash”/run slow
pharming
any two from:
– malicious code/software installed on a user‟s hard drive/actual web server
– this code redirects user to a fake website (without their knowledge)
– to obtain personal/financial information/data
phishing
any two from:
237 | P a g e
8 (a) hours: 18
minutes: 53 [2]
(b)
Q 10)
Statement Interpreter Compiler
takes one statement at a time and executes it
generates an error report at the end of
Summer 2015 P12
1 (a) Four statements about cookies are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement is true or false.
Statement True False
they are a form of spyware
they are used only in advertising
they are used to track browser use
they act in the same way as a virus
(b) Five descriptions and five security issues are shown below.
Draw a line to connect each description to the correct security issue.
2 The majority of mobile phones use touch screens. Three common technologies are used by
different mobile phone manufacturers.
Choose one of the following mobile phone technologies:
• resistive • capacitive • infrared
Chosen technology ..........................................................................................................................
(i) Describe how your chosen technology works to allow a user to make selections by touching
the screen.
...................................................................................................................................................
240 | P a g e
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii) Give one benefit and one drawback of your chosen technology when used on mobile phone
touch screens.
Benefit
...................................................................................................................................................
...................................................................................................................................................
Drawback
...................................................................................................................................................
................................................................................................................................................... [2]
3 Four input devices, four descriptions and four applications are shown below.
Draw a line to connect each input device to its correct description. Then connect each
description to its correct application. [6]
5 Parity checks are often used to check for errors that may occur during data transmission.
(a) A system uses even parity.
Tick (✓) to show whether the following three bytes have been transmitted correctly or incorrectly.
Received byte Byte transmitted correctly Byte transmitted incorrectly
11001000
01111100
01101001
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per character).
A tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.
G C L Workspace X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
7 (a) Street lighting is controlled automatically. A light sensor and a microprocessor are
used to decide when to switch each street light on or off.
Describe how the sensor, microprocessor and light interact to switch the street light on or
off. Include in your answer how the microprocessor stops the street lights being
frequently switched on and off due to brief changes in the light intensity.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
........................................................[5]
(b) Name three different sensors (other than light and pH) and describe an application
for each of these sensors.
A different application is needed for each sensor.
Sensor
1 ...................................................................................................................................
244 | P a g e
Application ..........................................................................................................................
.............................................................................................................................................
Sensor 2 ..............................................................................................................................
Application ...........................................................................................................................
............................................................................................................................................
Sensor 3 .............................................................................................................................
Application .........................................................................................................................
....................................................................................................................................... [6]
Software that anyone can download for free from the Internet and then use without
having to pay any fees. The usual copyright laws apply and a user license is important.
................................................
Software that gives the user the chance to try it out free of charge before actually buying
it. The software is subject to the usual copyright laws. As a rule, not all the features found
in the full version are available at this stage. ................................................
Software where users have freedom to run, copy, change and adapt it. This is an issue
of liberty and not of price since the software guarantees freedom and the right to study
and modify the software by having access to the actual source code. ..............................
Set of principles that regulates the use of computers in everyday life. This covers
intellectual property rights, privacy issues and the effects of computers on society in
general. ................................................
The taking of somebody‘s idea or software and claim that the idea or software code were
created by the ―taker‖. ................................................ [5]
9 (a) Five statements about interpreters and compilers are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement refers to an interpreter or to a compiler.
Statement Interpreter Compiler
creates an executable file that runs directly on the
computer
more likely to crash the computer since the machine
code produced runs directly on the processor
easier to debug since each line of code is analysed
and checked before being executed
slow speed of execution of program loops
it is more difficult to modify the executable code, since
it is in machine code format
245 | P a g e
(b) State why a compiler or an interpreter is needed when running a high-level program
on a computer.
.............................................................................................................................................
.............................................................................................................................................
....................................................................................................................................... [1]
B: LDA X
INC X
STA Y
C: FOR x ← 1 TO 10
READ n
ENDFOR
Identify, using the letters A, B or C, which of the above codes is an example of assembly
code, high-level language code or machine code:
Assembly code ....................................................................................................................
High-level language code .................................................................................................
Machine code ............................................................................................................... [2]
10 Letters from the alphabet are represented in a computer by the following denary (base 10)
values:
A = 97
G = 103
I = 105
L = 108
N = 110
The word “A L I G N” is stored as: 97 108 105 103 110
246 | P a g e
(a) Convert each of the five values to binary. The first one has been done for you. [2]
Letter Denary value
A (97): 0 1 1 0 0 0 0 1
L(108):
I (105):
G (103):
N (110):
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A”
then becomes:
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these
values into hexadecimal: [4]
− … that transmit electric currents
Marking Scheme − when the top layer/screen is pushed/touched into the lower/bottom layer …
Q 1*a( Tick (✓) to show whether the statement is true or false. − … the electric current changes and location of ―touch‖ is found
Statement True False capacitive
they are a form of spyware ✓ − current sent/flows out from all 4 corners of the screen
they are used only in advertising ✓ − when finger/stylus touches screen, the current changes
− the location of ―touch‖ is calculated
they are used to track browser use ✓
infra-red
they act in the same way as a virus ✓ − an ―invisible‖ grid on the screen (pattern of infra-red LED beams)
− sensors detect where the screen has been touched through a break in an
infrared beam(s)
− the position where the screen touched is calculated [2]
(ii) 1 mark for benefit, 1 mark for drawback
Resistive
benefits:
− inexpensive/cheap to manufacture
− can use stylus/finger/gloved finger/pen
drawbacks:
− poor visibility in sunlight
− vulnerable to scratching
− wears through time
− does not allow multi-touch facility
capacitive
benefits:
− good visibility in sunlight
− (very) durable surface
− allows multi-touch facility
drawbacks:
− screen (glass) will shatter/break/crack (on impact)
− cannot use when wearing (standard) gloves
infra-red
benefits:
2 (i) Either of the three options, resistive, capacitive or infra-red must be
− good durability
chosen maximum of two marks from chosen technology:
− allows multi-touch facility
resistive
− can use stylus/finger/gloved finger/pen
− uses multiple layers of material …
248 | P a g e
drawbacks:
− expensive to manufacture
− screen (glass) will shatter/break/crack (on impact)
− sensitive to dust/dirt [2]
leak detection system − code needs to be produced that can be understood by the computer [1]
disco lighting (c) Any one from:
moisture/humidity clothes drier − close to English/native/human language
environmental control (greenhouse, air con) − easier/faster to correct errors/read/write
pressure burglar alarm system
− works on many different machines/operating systems (portable) [1]
traffic light control
(d) Any one from:
chemical process
carbon dioxide/ pollution monitoring in a river − work directly on registers/CPU
oxygen/gas greenhouse environment (growth control) − more control over what happens in computer
confined area (e.g. space craft) − can use machine specific functions [1]
Fish tank/Aquarium (e) 1 mark per correct letter, maximum 2 marks
magnetic field mobile phone Assembly code: B
anti-lock braking High-level language code: C
CD players [6] Machine code: A [2]
8 1 mark per correct word
Freeware
Shareware
Free software
(Computer) Ethics
Plagiarism [5]
Item Statement
number
1 Add flag to product record to
indicate re-order made
2 Any more barcodes to scan?
3 Has the scanned barcode been found
in the file?
4 Has the re-order flag already been
added to the product record?
5 Is number of product in stock <= re-
order level?
6 Number of product in stock is
reduced by 1
7 Output an error message
8 Automatically send out order for
new product
254 | P a g e
4 (a) (i) Convert the following two hexadecimal numbers into binary:
[4]
(ii) Now perform the AND (logic) operation on each corresponding pair of binary bits in
the two numbers from part (i).
[2]
(iii) Convert your answer in part (ii) into hexadecimal.
.............................................................................................................................................
........................................... [2]
(b) (i) The following code shows HTML ‗tag‘ pairs on either side of the text stating the
colour that each creates.
<font color ― # F F 0 0 0 0 ― > RED </font>
<font color ― # 0 0 F F 0 0 ― > GREEN </font>
<font color ― # 0 0 0 0 F F ― > BLUE </font>
<font color ― # X ― > YELLOW </font>
<font color ― # Y ― > MAGENTA </font>
<font color ― # Z ― > CYAN </font>
Yellow is a combination of red and green, magenta a combination of red and blue and
cyan a combination of green and blue.
State what 6-digit hexadecimal values should replace X, Y and Z in the above code.
X ........................................................................................................................................
Y ........................................................................................................................................
Z .....................................................................................................................................[3]
(ii) Describe how other colours, such as a darker shade of blue, are created.
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................[2]
(c) 1A – 16 – C5 – 22 – FF – FF is an example of a MAC address.
(i) Identify what the first six and last six hexadecimal digits represent.
First six digits ....................................................................................................................
...........................................................................................................................................
Last six digits .....................................................................................................................
...........................................................................................................................................
....................................................................................................................................... [2]
(ii) State why MAC addresses are used.
...........................................................................................................................................
........................................................................................................................................ [1]
255 | P a g e
5 A security system uses sensors, a camera and a microprocessor to capture images of
each person entering a large shopping mall.
(a) Describe how the sensors, camera and microprocessor interact to identify certain
people entering the mall.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.........................................................................................................................................[5]
(b) Each image taken requires 1 MB of storage. If the camera captures an image every 5
seconds over a 24 hour period, how much storage is required?
Give your answer in gigabytes and show all your working.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
........................................................................................................................................[2]
(c) The shopping mall has over 100 cameras. At the end of each day all these cameras
send their images, captured over the last 24 hours, to a central computer.
Explain why the mall uses dedicated fibre optic cable rather than transmitting the data
over the local broadband network.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
........................................................................................................................................[2]
6 (a) Explain what is meant by HTML.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
................................................................................................................................ [3]
(b) HTML uses both structure and presentation.
Describe what is meant by the two terms.
Structure: ............................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Presentation: ......................................................................................................................
.............................................................................................................................................
............................................................................................................................................
256 | P a g e
(c) Explain the function of a web browser.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
........................................................................................................................................[3]
7 (a) Check digits are used to ensure the accuracy of input data.
A 7-digit code number has an extra digit on the right, called the check digit.
Digit position 1 2 3 4 5 6 7 8
Digit– – – – – – – –
The check digit is calculated as follows:
• each digit in the number is multiplied by its digit position
• the seven results are then added together
• this total is divided by 11
• the remainder gives the check digit (if the remainder = 10, the check digit is X)
(i) Calculate the check digit for the following code number. Show all your working.
4241508…
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Check
digit ........................................................................................................................[2]
(ii) An operator has just keyed in the following code number:
3240045X
Has the operator correctly keyed in the code number?
...........................................................................................................................................
Give a reason for your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................[
3]
(b) When data are transmitted from one device to another, a parity check is often carried
out on each byte of data. The parity bit is often the leftmost bit in the byte.
(i) If a system uses even parity, give the parity bit for each of the following bytes:
[2]
(ii) A parity check can often detect corruption of a byte.
Describe a situation in which it cannot detect corruption of a byte.
257 | P a g e
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
8 The steps to print a document using a laser printer are shown in the table below.
Put each step in the correct order. The first step has been done for you. [8]
Step Order
As the printing drum rotates, a laser scans across it; this removes the positive
charge in certain areas
The printing drum is coated in positively-charged toner; this then sticks to the
negatively-charged parts of the printing drum
The paper goes through a fuser which melts the toner so it fixes permanently to
the paper
The printer driver ensures that the data is in a format that the laser printer can 1
understand
A negatively-charged sheet of paper is then rolled over the printing drum
Data is then sent to the laser printer and stored temporarily in the printer buffer
The toner on the printing drum is now transferred to the paper to reproduce the
required text and images
The printing drum is given a positive charge
Negatively-charged areas are then produced on the printing drum; these match
exactly with the text and images to be printed
9 A remote-controlled model car contains RAM, ROM and a solid state drive. The car
receives radio signals from its remote control. It can only receive radio signals of a
certain frequency. The manufacturer sets this frequency and the owner cannot change it.
The owner of the model car can input their own sequence of movements from an
interface underneath the car.
(a) Describe the purpose of each of the three types of memory supplied with the car.
RAM: .................................................................................................................................
............................................................................................................................................
ROM: .................................................................................................................................
.............................................................................................................................................
Solid state
drive: .................................................................................................................. ................
........................................................................................................................[3]
(b) The owner needs to be able to enter their own sequence of movements for the model
car.
Name a suitable input device.
Input
device: .................................................................................................................................
.................................................................................................................................
Give a reason for your choice of device.
.............................................................................................................................................
258 | P a g e
.............................................................................................................................................
........................................................................................................................................[2]
(c) Explain why the model car uses a solid state drive rather than another type of
secondary storage.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.......................................................................................................................................[2]
Marking Scheme Winter P12
1 1 mark for each risk + 1 mark for corresponding reason why it is a risk and
1 mark for method of minimisation
Risk: hacking
Reason: illegal/unauthorised access to data
deletion/amendment of data
Minimised: use of passwords/user ids
use of firewalls
encrypt data/encryption
Risk: virus
Reason: can corrupt/delete data
cause computer to crash/run slow
can fill up hard drive with data
Minimised: use of /run anti-virus (software)
do not download software or data from unknown sources
Risk: spyware/key logging (software)
Reason: can read key presses/files/monitors on a user‘s computer
Minimised: use of/run anti-spyware (software)
use data entry methods such as drop-down boxes to minimise risk
Risk: phishing
Reason: link/attachments takes user to fake/bogus website
website obtains personal/financial data
Minimised: do not open/click emails/attachments from unknown sources
some firewalls can detect fake/bogus websites
Risk: pharming
Reason: redirects user to fake/bogus website
redirection obtains personal/financial data
Minimised: only trust secure websites, e.g. look for https
check the URL matches the intended site
Risk: credit card fraud/identity theft
Reason: loss of money due to misuse of card/stealing data
Minimised: set passwords
encrypt data/encryption
Risk: cracking
Reason: illegal/unauthorised access to data
Minimised: setting strong passwords
encrypt data/encryption
There may be other valid answers given that are outside the provided mark
scheme.
260 | P a g e
(iii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
D 2 6 [2]
(b) (i) (X) FF FF 00
(Y) FF 00 FF
(Z) 00 FF FF [3]
(ii) – hex values between 0 to F are combined together to create a hex code
– different combinations in hex codes will create different
shades/tones/colours [2]
(c) (i) First six digits: manufacturer code/manufacturer ID
Last six digits: serial number/serial ID of device/product [2]
(ii) Allows all devices to be uniquely identified [1]
Presentation:
– instructs how the content will be formatted e.g. colour/style/CSS [2]
(c) Any three from:
– displays web page
– interprets/translates the HTML document
– interprets/translates embedded scripting, for example JavaScript
– provides functions, such as bookmarks and history
– identifies protocols, such as https, SSL [3]
7 (a) (i) 1 mark for correct check digit and 1 mark for showing the
calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
check digit is: 6 [2]
(ii) – No/incorrect check digit
– Total is 78 9(a) RAM: contains instructions/program/data currently in use
– 78/11 … ROM: any one from:
– … gives 7 remainder 1 – contains the start-up/bootstrap program
– check digit should be 1 [3] – contains/stores the setting for frequency (can‟t be changed)
Solid state drive: – stores the instructions/program/data (to operate the car)
(b) 1 mark for device and 1 mark for corresponding reason
Device:– touch screen
– key pad (NOT keyboard)
Reason: – easy to use interface
– limited number of options
– small space/space is limited
– other devices such as mouse, keyboard, tracker ball, … not suitable
(c) Any two from:
(ii) Any one from: – A solid state drive has no moving parts
– A solid state drive has faster random access
– an even number of digits are changed
– A solid state drive has a quick start up/shut down time (reduced latency)
– a transposition error(s) has occurred [1] – A solid state drive is very small
8 1 mark for each step in correct order. (NOTE: Marks can be awarded for a – A solid state drive is very light
correct sequence.) – A solid state drive consumes very little power
– A solid state drive does not generate a lot of heat (therefore safer in this
application)
Winter 2015 P13
1 (a) Name an application which makes use of the following sensors. A different
application should be used in each case.
Temperature .....................................................................................................................
............................................................................................................................................
Magnetic field ..................................................................................................................
..........................................................................................................................................
Motion ..............................................................................................................................
....................................................................................................................................... [3]
(b) The flowchart on the opposite page shows how a light sensor and microprocessor
are used to switch a street lamp on or off. When the sensor reading is <= 50 light units,
the lamp is turned on automatically.
Several of the instructions have been omitted from the flowchart.
Using item numbers only from the list below, complete the flowchart:[5]
Item Instruction
number
1 Count down in minutes
2 Is light reading <= 50?
3 Is street lamp already on?
4 Is time = 0?
5 The microprocessor compares the
sensor reading with stored values
6 The sensor reading is sent to the
microprocessor
7 Switch the street lamp off
8 Switch street lamp on
9 Time set to 10 minutes
263 | P a g e
2 Sensors and a microprocessor monitor a car exhaust for high temperature and high
carbon monoxide (CO) levels.
(a) Describe how the sensors and microprocessor are used to monitor the temperature
and CO levels and warn the driver if either is out of range.
............................................................................................................................................
.............................................................................................................................................
............................................................................................................................................
.............................................................................................................................................
...........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
.........................................................................................................................................
........................................................................................................................................[5]
(b) The information from seven sensors is sent to an engine management system in the
car. The status of each sensor is stored in an 8-bit register; a value of 1 indicates a fault
condition
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) The system uses odd parity.
Write the correct parity bit in each register.
[2]
(iii) A car has a faulty airbag and the CO level is too high.
Write what should be contained in the 8-bit register.
(iv) Give the hexadecimal value of the binary number shown in part (iii).
...........................................................................................................................................
.......................................................................................................................................[1]
264 | P a g e
3 A section of computer memory is shown below:
Address Content
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
`
1000 1100
1000 1101
1000 1110
1000 1111
(a) (i) The contents of memory location 1000 0001 are to be read.
Show the contents of the Memory Address Register (MAR) and the Memory Data
Register (MDR) during this read operation:
[2]
(ii) The value 0111 1001 is to be written into memory location 1000 1110.
Show the contents of the MAR and MDR during this write operation:
[2]
(iii) Show any changes to the computer memory following the read and write operations
in part (a)(i) and part (a)(ii). [1]
Address Content
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
`
1000 1100
1000 1101
1000 1110
1000 1111
(b) Name three other registers used in computers.
265 | P a g e
1 .........................................................................................................................................
2 .........................................................................................................................................
3 ................................................................................................................................... [3]
(c) The control unit is part of a computer system.
What is the function of the control unit?
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..........................................................................................................................................
....................................................................................................................................... [3]
4 (a) Computer ethics involves a number of different topics.
(i) A student made the following statement on an examination paper:
―It allows a user to have the freedom to run, copy, change and adapt the software and
then pass it on to a colleague, friend or family member.‖
Identify which computer term the student was describing.
...................................................................................................................................... [1]
(ii) Explain what is meant by computer ethics.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(b) The four statements below refer to firewalls and proxy servers. Study each
statement.
Tick (9) the appropriate column(s) to indicate whether the statement refers to a firewall
and/or a proxy server. [4]
Statement Firewall Proxy
server
Speeds up access of information from a web server by using a
cache
Filters all Internet traffic coming into and out from a user‘s
computer, intranet or private network
Helps to prevent malware, including viruses, from entering a
user‘s computer
Keeps a list of undesirable websites and IP addresses
(c) Explain three ways of preventing accidental loss or corruption of data.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [6]
266 | P a g e
5 A security system records video footage. One minute of video requires 180 MB of storage. The recording
system can store several hours of video footage.
(a) Name and describe a suitable storage device for this recording system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Calculate how much storage would be needed for 2 hours of video footage.
Show your working and give the answer in Gigabytes (GB).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
6 Passengers fly into an airport from other countries. The airport has a security system
that uses:
• computers
• scanners
• digital cameras
To gain entry to the country, each passenger must have a passport or identification (ID)
card. This must contain a recent photograph and other personal data. The passenger
must:
• place their passport or ID card on a scanner that reads machine-readable characters
and scans the photograph
• look towards a camera that takes an image of the passenger‘s face
Describe how a computer checks whether the image just taken by the camera matches
the scanned photograph.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
................................................[2]
7 Name a suitable output device for each of the following applications. A different device
should be used for each application.
Application Suitable output
device
Production of one-off photographs of very good quality
High volume colour printing of advertising flyers
Production of an object, which is built up layer by layer; used in
CAD applications
Converting electrical signals into sound
Showing enlarged computer output on a wall or large screen
8 Four input devices are shown in the table below.
Give an application which makes use of each device and state a reason why the device
is appropriate for that application. Your application must be different in each case.
Input device Application and reason
Light sensor Application .............................................................................................
Reason ..................................................................................................
................................................................................................................
................................................................................................................
Keyboard Application .............................................................................................
Reason ..................................................................................................
267 | P a g e
................................................................................................................
................................................................................................................
Barcode Application .............................................................................................
reader Reason ..................................................................................................
................................................................................................................
................................................................................................................
Touch screen Application .............................................................................................
Reason ..................................................................................................
................................................................................................................
................................................................................................................
(b) – CIR (Current Instruction Register) – …to prevent damage to components/ stored files
– PC (Program Counter) – use correct procedures before disconnecting portable storage device…
– Acc (Accumulator) [3] – …to prevent damage to device/ data corruption
(c) – Controls operation of memory, processor and input/output – keep storage devices in a safe place…
– Instructions are interpreted – …away from fire hazards [6]
– Sends signals to other components telling them “what to do” [3] 5 (a) – Memory card/ SSD / HDD/ magnetic tape
4 (a) (i) Free software/ open source software [1] – Suitable description of device given [2]
(ii) Any three from: (b) 2 hours = 120 minutes
– Set of principles/ laws that regulate the use of computers 120 × 180 = 21600
– Covers intellectual property rights (e.g. copying of software) 21600/ 1024 (or 21600/ 1000)
– Privacy issues (e.g. accessing personal information) = 21.1GB (or 21.6GB)
– Impact of computers on society (relevant examples can be credited) [3] (1 mark for correct answer and 1 mark for correct calculation) [2]
6 Any two from:
– facial recognition software/ biometric software used to scan face
– face image converted to digital format/ data by the camera
– digital image formed from scanned photo/ biometric data stored in passport
– key features of the face are checked/ compared
7
Application Suitable
output device
Production of one-off photographs of very Inkjet Printer
good quality
High volume colour printing of advertising Laser Printer
(c) one mark for method + one mark for linked reason (maximum 6 marks) flyers
– back up files… Production of an object, which is built up layer 3D Printer
– …on a regular basis/ to another device/ to the cloud by layer; used in CAD applications
– set data to read only… Converting electrical signals into sound Speaker
– …to prevent accidental editing Showing enlarged computer output on a wall Projector
– save data on a regular basis… or large screen
– …to prevent loss/ corruption of data in unexpected shutdown/failure
– use correct shut down/ start up procedures…
Winter 2015 0478 P11
1 (a) Four hardware items are shown in the table below.
For each hardware item:
• name a suitable application
• state how it is used in the application
Give a different application in each case. [8]
Hardware Application How the hardware item is used
item
Microphone .......................................................... ..........................................................
.......................................................... ..........................................................
.......................................................... ..........................................................
Barcode .......................................................... ..........................................................
reader .......................................................... ..........................................................
.......................................................... ..........................................................
Touch .......................................................... ..........................................................
screen .......................................................... ..........................................................
.......................................................... ..........................................................
Infrared .......................................................... ..........................................................
sensor .......................................................... ..........................................................
.......................................................... ..........................................................
(b) Two features of Von Neumann architecture are the use of registers and the use of
buses.
Give the names of two registers and two buses.
Registers
1: .......................................................................................................................................
.............................................................................................................................................
2: .........................................................................................................................................
............................................................................................................................................
Buses
1 ..........................................................................................................................................
..........................................................................................................................................
2: .........................................................................................................................................
........................................................................................................................................[4]
4 Six computer terms and six descriptions are shown below.
Draw a line to link each term to its appropriate description.[5]
Signal sent to a processor which may cause a
Browser break in execution of the current routine,
according to priorities
7 (a) Describe what is meant by lossy and lossless compression when applied to files.
Lossy: .................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Lossless: ............................................................................................................................
.............................................................................................................................................
........................................................................................................................................[2]
(b) Name and describe one type of file that uses lossy compression.
Name: .................................................................................................................................
Description: .........................................................................................................................
.............................................................................................................................................
.......................................................................................................................................[2]
(c) A company advertises its backup memory device as having 500 GB of storage.
A customer wishes to know how many 8 MB files could be stored on the device.
The company claimed that up to 62 500 files (assuming each file is 8 MB) could be
stored.
The customer calculated that 64 000 files could be stored.
Explain the difference between these two storage values. Show any calculations you use
273 | P a g e
in your explanation.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
....................................................................................................................................... [3]
b) Complete the web address from the given hexadecimal codes: [3]
%77 %77 %77 %2E %72 %6F %63 %6B %69 %63 %74 %2E %63 %6F %6D
w w w
11 A passenger logs onto an airline website and types in the reference number for their
flight. Once the passenger accesses their account they can choose their seat and also
print out a boarding pass which contains a unique barcode. This barcode is scanned at
the airport check-in desk.
274 | P a g e
Name one input and one output device found at the check-in desk and give a reason for
your choice.
Input device: ........................................................................................................................
Reason: ..............................................................................................................................
...........................................................................................................................................
Output device: ....................................................................................................................
Reason: ...............................................................................................................................
.......................................................................................................................................[4]
12 Parity checks are used to check for errors during data transmission. A system uses
odd parity.
(a) Complete the following two bytes of data so that they both have odd parity:
1 1 1 1 0 0 0
0 0 0 0 1 1 1
(b) Name and describe another method which can be used to check whether data has
been correctly transmitted.
Name of method: .................................................................................................................
Description: ........................................................................................................................
............................................................................................................................................
.......................................................................................................................................[2]
13 Identify which five computer terms are being described below.
(a) A system designed to prevent unauthorised access to or from a private network or
intranet; it examines all data traffic to and from the network and filters out anything that
does not meet certain criteria.
....................................................................................................................................... [1]
(b) Software that can be used on a trial basis before buying the full version; it often does
not include all the features of the full version or has a time limit before it stops working.
.......................................................................................................................................[1]
(c) A protocol for transmitting private documents via the Internet; it uses two keys to
encrypt the data – a public key and a private key.
.......................................................................................................................................[1]
(d) A standard adopted by the electronic music industry for controlling devices that
produce music, such as synthesisers and sound cards.
....................................................................................................................................... [1]
(e) A device that allows audio signals to be converted into electrical signals which can be
interpreted by a computer after being converted into digital signals.
...............................................................................................................................................[1]
– Blu-ray discs use blue/violet lasers rather than red lasers as used by DVDs
Marking Scheme – storage capacity of Blu-ray discs is much higher than standard DVDs
Q1)a – Blu-ray discs use one polycarbonate layer; DVDs use two layers
Hardware Application How the hardware item is used – Blu-ray discs have a built-in secure encryption system [2]
item (c) Any two from:
– DVD has one spiral track; DVD-RAM has several concentric tracks
Barcode Supermarket checkout – read barcodes to find prices,
– DVD-RAM can be written to and read from at the same time; DVD-R only
reader description
allows the read operation to occur
Library system – allows automatic stock control
– DVD-R only allows data to be read (can‟t write to it) whereas DVD-RAM
– can track books on loan
allows reading and writing operation [2]
– can link books to borrowers using
2 (a) 1 0 1 1 0 1 0 1
barcoded cards
F 6 [2]
Airport checkouts – barcodes on luggage to track
(b) Any two from:
whereabouts
– HTML
Microphon Voice recognition – allows computer to recognise
– MAC address
e system spoken words and use them as input
– used in assembly language/machine code
to, e.g., a word processor
– debugging (displays bytes in hex when using memory dumps) [2]
(c) – Can represent 16 bit words as only 4 hexadecimal digits
Multimedia – allows voice-overs on presentations
– It is easy to convert hex digits back to binary if necessary [2]
presentations
– allows users to speak to each other
Video
conferencing/VoIP
Touch Mobile – allows user to select apps/icons
screen telephone/tablet – easy method to input data
Q4) – suitable for low volume (high quality) output, e.g. a photo [4]
(ii) Laser printer
Any four from:
– uses powdered ink/toner cartridges
– uses a (charged) printing drum
– makes use of static electricity charges
– uses a fuser to fix/melt ink onto the paper
– uses a discharge lamp to remove static charge from the drum
– useful for high volume (high quality) output, e.g. leaflets [4]
(b) Any three from:
– produces solid, 3D objects/prototypes
– used in CAD/CAM
– makes use of tomography/slices of an object
– solid built up in thin layers
– uses resin, powdered metal, paper, plastic… [3]
6 (a) Any one from:
– jumbling up/scrambling characters so that message makes no sense
– requires an encryption key to encrypt data
– need decryption key to decipher encrypted message [1]
(b) Uses the same key to encrypt and decrypt message [1]
(c) 1 mark for correct name in box
7 (a) Lossy
– when decompressed, some detail is lost and file is not exactly like the
original (but difference is usually not noticeable)
5 (a) (i) Inkjet printer
Lossless
Any four from:
– when decompressed the original file is restored with no loss of data
– uses cartridges/liquid ink
[2]
– makes use of thermal bubble/piezoelectric technology
(b) 1 mark for type of file + 1 mark for description e.g:
– sprays ink in droplets on the paper
– JPG
– uses a moving print head
– Used to store images/pictures
– MP3
277 | P a g e
(b) 1 mark for error detection method and 1 mark for description
– Check sum
– … sum of bits is transmitted and checked against the sum of the received
bits
– Check digit
– … a digit that is calculated (e.g. using modulo-11) and transmitted with the
data
– ARQ
– … when an error is detected in a packet of data a request is automatically
sent for the data to be resent
13 (a) Firewall [1]
(b) Shareware [1]
(c) SSL (secure socket layer) (accept HTTPS and TLS) [1]
(d) MIDI [1]
(e) Microphone [1]````````````````````````