Mock p1 Ais Comp Sci Cie Igcse
Mock p1 Ais Comp Sci Cie Igcse
Mock Exam
Grade 10
CANDIDATE
CLASS
NAME
CENTRE CANDIDATE
NUMBER NUMBER
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.
Do not use staples, paper clips, and glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
75
This document consists of 9 printed pages including the cover page
© AIS 2022
Ahmadhiyya International School Examinations [Turn over
MOCK EXAM 2021-22
- 2 of 9 -
1. Explain the working of a microphone. List any 3 ways it is used in smartphones. [5]
Statement T/F
1. SSD is faster than RAM.
2. SSD is faster than HDD & DVD to read and write data.
3. In a desktop system, SSD is found on the motherboard itself.
4. In most cases, systems that use SSD cannot be upgraded anymore.
5. SSD is made up of NAND EEPROM technology.
3. The picture below shows bullet CCTV cameras under operation with a certain feature.
a. Name two sensors present in the CCTV camera to detect the approaching people. [2]
b. Explain how the system is able to identify people and recognise any wanted person walking
towards it. Discuss the input, process and output in detail. [5]
c. What additional objects are needed for the camera to work in the same way at night as it works
in the day? [1]
4. Complete the blanks using the pool of terms / words / phrases give below. [5]
single direction.
_______________________ at a time.
5. Write one similarity and two differences between an MP3 and MIDI file. [4]
MP3 MIDI
Similarity:
Difference 1:
Difference 2:
Difference 3:
Description value
2.5 GB in MB 207
x
If 2 MB = 1 GB then x = 2560
7. Define a cookie. Discuss its origin. Discuss its destination. Write the purpose of a cookie. List two
advantages and one disadvantage of cookies. [6]
Define:
Origin:
Destination:
Purpose:
Advantage 1:
Advantage 2:
Disadvantage:
8. Draw the logic circuit that uses universal NAND gates to build the OR gate and show the truth table
for the circuit. [5]
9. Read the statements give below. A few are true and few are not. For those that are false, write down
the corrected statement. For those that are true and already mentioned, write the description. [6]
Identify the security issue if
Description T/F
false
A computer program that usually causes harm in the
form of showing insulting messages, hiding files,
deleting or corrupting files etc is a spyware.
A phishing attack uses a legitimate looking email with a
link to a fake website with the intention to gain
authentication details of a user.
A pharming attack uses a malicious code to divert a
browser to a fake website with the intention to gain
authentication details of a user.
T Hacking
T Dos Attack
Compiler:
11. A video file is 2 GB in size. Its file format is AVI. It is now converted to MP4 format.
a. While converting to MP4 format, 60% of the original file contents are removed. What would be
the size of the video file after converting to MP4? (show working) [2]
Answer:
b. In the above conversion, file contents are being compressed. Name the compression type used
in converting video files to MP4 format. [1]
c. After converting, the sound quality and video quality seems to be almost the same as the original
music file. State how this is achieved. [1]
12. The flowchart shows the working of buffers and interrupts when the processor sends data to a
printer. Complete the flowchart using the list of items. Write item number only in the blank flowchart
symbols. [6]
Any data No
to be sent
to printer?
Yes
all data No
sent to
printer?
Yes Item
Item
Number
1 Contents of printer buffer emptied to printer
Current task is suspended while interrupt is
2
interrupt signal is sent
serviced
Data to be printed out is sent to the printer
to request more data 3
buffer
to be sent to printer
4 Processor continues with its current tasks
Processor continues with current tasks while
5
printer buffer is emptied
When all the data is printed, printer buffer
6
becomes empty
14. Study the diagrams below. A firewall is being shown in the diagrams.
Internet
Internet
A B
a. In diagram 1, a firewall is being used in the device shown as A and in diagram 2 in a Machine
shown as B. Name the type of firewall being used in both cases. [2]
Firewall A -
Firewall B -
c. The Machine B connects to the Internet. Other machines in the network connect to the internet
and download content through the machine B. Name machine B. Write two advantages of using
machine B to provide connection within a network. [3]
Name:
Advantage 1:
Advantage 2: