1.1.3 Data Storage ANSWERS
1.1.3 Data Storage ANSWERS
(b)
the instruction is then copied from the memory location contained in the
MAR (memory address register) and is placed in the MDR (memory data 3
register)
the PC (program counter) contains the address of the next instruction to be (1)
fetched
the entire instruction is then copied from the MDR (memory data register)
4
and placed in the CIR (current instruction register)
the address part of the instruction is placed in the MAR (memory address
6
register)
The incrementation of the program counter can appear at any stage after 2. All other
stages must be in the correct given order. [6]
8 (a) hours: 18
minutes: 53 [2]
(b)
0 0 0 0 0 1 1 1 : 0 0 0 1 1 1 1 0
[2]
– and checks the values against those stored in registers “A” and “B”
(NOTE: the first two statements can be interchanged, i.e. “A” and “B” read first)
– no need to warm up
– higher resolution
x
If 1 GByte = 2
value of X?
then what is the
12
(b) 1 mark for each number in the correct order, next to the correct stage.
Sequence
Stage
number
the encrypted data is then shared securely between the web browser and the
6
web server
the web browser attempts to connect to a web site which is secured by SSL (1)
the web server sends the web browser a copy of its SSL certificate 3
the web server will then send back some form of acknowledgement to allow the
5
SSL encrypted session to begin
the web browser checks whether the SSL certificate is trustworthy; if it is then
4
the web browser sends a message back to the web server
[5]
11001000
01111100
01101001
[3]
column number: 6
[2]
(c) 190
[1]
C X
[5]
(b)
G C L Workspace X
0 0 0 0
0 0 1 0
] 1 mark
0 1 0 1
0 1 1 0
] 1 mark
1 0 0 1
1 0 1 1
] 1 mark
1 1 0 1
1 1 1 0
] 1 mark
[4]
– fingerprint scanner
– face recognition software
– retina scanner/iris scanner
– voice recognition software [2]
9 (a) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
1 mark for any correct
line of working
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
10
5
Description Device
6 (a)
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
[6]
Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected
Check digit
• A digit that is calculated from the data // uses modulo to calculate digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error
Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error
32 + 16 + 8 + 1
(00)111001
5(b) registers must have leading zeros, allow follow through from 5(a) for an 2
incorrect value
1 mark for each correct register.
0 0 1 1 1 0 0 1
0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1
• data
• ASCII value / Unicode value / character
• number
• part of image / small image
• a sound / sound sample / small sound track
• instruction
5(d) 3A 1
Three from:
• Barcode is captured / scanned / imaged, by a camera / scanner /
barcode reader / QR code reader
• Read using a laser
• Processed by an app
• Light is reflected back
• Black squares reflect less light than white squares
• Modules are used for orientation / alignment
• Squares / data are decoded
9 − 1 4
− 0
− 1
− 1
Buy O / A Level & IGCSE Original Books, Solved Past Papers & Notes Online at Discounted Prices.
Home Delivery all over Pakistan Call / WhatsApp: (0331-9977798) Visit: www.TeachifyMe.com/Shop
QUESTION
Page 8 8. Mark Scheme
Cambridge IGCSE – October/November 2015
Syllabus
0478
Paper
12
parity bit
0 1 1 0 0 1 1 0
parity bit
1 0 0 0 0 0 0 1
[2]
8 1 mark for each step in correct order. (NOTE: Marks can be awarded for a correct sequence.)
As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas 4
The printing drum is coated in positively-charged toner; this then sticks to
the negatively-charged parts of the printing drum 6
The paper goes through a fuser which melts the toner so it fixes
permanently to the paper 9
The printer driver ensures that the data is in a format that the laser printer
can understand (1)
A negatively-charged sheet of paper is then rolled over the printing drum 7
Data is then sent to the laser printer and stored temporarily in the printer
buffer 2
The toner on the printing drum is now transferred to the paper to
reproduce the required text and images 8
The printing drum is given a positive charge 3
Negatively-charged areas are then produced on the printing drum; these
match exactly with the text and images to be printed 5
[8]
8
Statement TRUE or FALSE
MP3 files are, on average, 90% smaller than the music files
TRUE
stored on a CD
[4]
(b) 1 mark for each security threat and 1 mark for matching description
[4]
© UCLES 2016
0478/11 Cambridge IGCSE – Mark Scheme October/November
QUESTION 10. PUBLISHED 2017
Question Answer Marks
7(b) Benefit 2
1 mark for:
• quicker/faster data transfer
Drawback
One from:
• More chance of data being skewed due to bits being sent simultaneously/out of order // less safe transmission as bits
are sent simultaneously/out of order
• More expensive as requires more/several/multiple wires
• More chance of interference as more/several/multiple wires are used (than can create crosstalk)
9 Five from: 5
• The data is sent to the microprocessor
• The analogue data is converted to digital (using ADC)
• The microprocessor compares the data to a stored value of 5 kg
– If the value is greater than 5 kg
– a counter is added to/incremented
• The process is continuous
10 Four from: 4
• It performs a number of basic tasks, including controlling hardware/file handling (any other suitable examples)
• It allows the user to communicate with the computer using hardware // without it the user would not be able to
communicate with the computer using hardware
• It provides the user with a user interface // without it the user would not have a user interface to use
• PC’s are often used to perform many complex tasks at a time
– the OS is needed to handle this multitasking
– therefore, it provides the ability to handle interrupts
8 Four from: 4
• Used to attend to certain tasks/issues
• Used to make sure that vital tasks are dealt with immediately
• The interrupt/signal tells the CPU/processor (that its attention is required)
• A signal that can be sent from a device (attached to the computer)
• A signal that can be sent from software (installed on the computer)
• The interrupt will cause the OS/current process to pause
• The OS/CPU/ISR will service/handle the interrupt
• They have different levels of priority
• After the interrupt is serviced, the (previous) process is continued
• It enables multi-tasking to be carried out on a computer
• A valid example of an interrupt e.g. ‘out of paper’ message for a printer
Checksum
• Calculation performed on data (to get the checksum)
• Checksum sent with data
• Checksum recalculated after transmission
• Comparison made between checksum before and checksum after transmission
• Error detected if checksums are different
10 Five from: 5
• The sensor sends data to the microprocessor
• The analogue data is converted to digital (using ADC)
• The microprocessor compares the reading to the set range/stored values/stored data (6 to 8) «
– « If the reading is >8 or <6 / outside range «
o « the microprocessor sends a signal to output the alert
• The process is continuous/repeated
MIDI
• Instructions of how to make sound
• Non-audio recording
• File created using digital musical instruments
• Produced by synthesizer
• Used when composing music
• Individual notes/instruments can be changed
• Encryption «
• « Data will be scrambled
• « Key is required to decrypt the data
• « If data is stolen it will be meaningless
• Antispyware «
• « will remove any spyware from system
• « will prevent data being relayed to a third party
11(a) RAM 3
• To store the data / instructions / parts of OS that are currently in use
ROM
• To store the firmware / bootup instructions / BIOS
SSD
• To store files / software // by example
Parity
bit
Register A 0 0 1 0 0 0 1 1
Register B 0 0 0 0 0 1 1 1
Register C 0 0 0 0 0 0 1 1
6(b) • Freeware 1
6(c) • Shareware 1
6(e) • Copyright 1