Past Paper Questions (Paper 1 Complete)
Past Paper Questions (Paper 1 Complete)
Contents
Past Paper Questions...........................................................................................................................................4
Chapter No. 1......................................................................................................................................................4
Summer 2015..................................................................................................................................................4
Winter 2015.....................................................................................................................................................5
Summer 2016..................................................................................................................................................5
WINTER 2016...................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 2......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
WINTER 2015...................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 3......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
1
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2019..................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 4......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2015.....................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 5......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2015.....................................................................................................................................................5
WINTER 2015...................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
SUMMER 2017.................................................................................................................................................5
WINTER 2017...................................................................................................................................................5
SUMMER 2018.................................................................................................................................................5
WINTER 2018...................................................................................................................................................5
SUMMER 2019.................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 6......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2015.....................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
2
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2019..................................................................................................................................................5
CHAPTER No. 7....................................................................................................................................................5
PAST PAPER QUESTIONS......................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
CHAPTER No. 8....................................................................................................................................................5
PAST PAPER QUESTIONS......................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2015.....................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
3
Teacher’s Name: Akhtab Hussain Past Paper Questions
Past Paper Questions
Chapter No. 1
Summer 2015
8 An alarm clock is controlled by a microprocessor. It uses the 24 hour
clock. The hour is represented by an 8-bit register, A, and the number of
minutes is represented by another 8-bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.
[2]
b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to
represent the hours and minutes of the alarm time. Show how 07:30 would
be represented by these two registers:
[2]
(c) Describe how the microprocessor can determine when to sound the clock
alarm. [3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Give the denary (base 10) value of the byte: 10111110
[1]
________________________________________________________________________________
________________________________________________________________________________
4
Teacher’s Name: Akhtab Hussain Past Paper Questions
5
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) An encryption system works by shifting the binary value for a letter one
place to the left. “A” then becomes:
Winter 2015
4 (a) (i) Convert the following two hexadecimal numbers into binary: [4]
(ii) Now perform the AND (logic) operation on each corresponding pair of binary bits in the two numbers
from part (i). [2]
6
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
(b) (i) The following code shows HTML ‘tag’ pairs on either side of the text stating the colour that each
creates.
<font color “ # F F 0 0 0 0 “ > RED </font>
<font color “ # 0 0 F F 0 0 “ > GREEN </font>
<font color “ # 0 0 0 0 F F “ > BLUE </font>
<font color “ # X “ > YELLOW </font>
<font color “ # Y “ > MAGENTA </font>
<font color “ # Z “ > CYAN </font>
Yellow is a combination of red and green, magenta a combination of red and blue and cyan a
combination of green and blue. State what 6-digit hexadecimal values should replace X, Y and Z in the
above code. [3]
X ____________________________________________________________________
Y ____________________________________________________________________
Z ____________________________________________________________________
(ii) Describe how other colours, such as a darker shade of blue, are created. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) 1A – 16 – C5 – 22 – FF – FF is an example of a MAC address.
(i) Identify what the first six and last six hexadecimal digits represent. [2]
First six digits: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Last six digits: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The information from seven sensors is sent to an engine management system in the car. The status of
each sensor is stored in an 8-bit register; a value of 1 indicates a fault condition:
7
Teacher’s Name: Akhtab Hussain Past Paper Questions
For example, a register showing 0 1 0 1 1 0 0 0 indicates:
• Temperature too high • Fuel pressure too low • Voltage too low
(i) Identify the fault condition(s) that the following register indicates:
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
(iii) A car has a faulty airbag and the CO level is too high. Write what should be contained in the 8-bit
register. [2]
(iv) Give the hexadecimal value of the binary number shown in part (iii). [1]
________________________________________________________________________________
________________________________________________________________________________
Summer 2016
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 Each seat on a flight is uniquely identified on an LCD above the seat. For
example, seat 035C is shown as:
8
Teacher’s Name: Akhtab Hussain Past Paper Questions
The first three characters are digits that represent the row.
The fourth character is the seat position in that row. This is a single letter,
A to F, that is stored as a hexadecimal value. Each of the four display
characters can be stored in a 4-bit register. For example, 0 and C would be
represented as:
(a) Show how the 4-bit registers would store the remaining two characters, 3
and 5. [2]
(b) The 2016 Olympic Games will be held in Rio de Janeiro. A timer that
counts down to the opening of the Games is shown on a microprocessor-
controlled display.
The number of hours, minutes and seconds until the Games open are held
in three 8-bit registers. The present register values are:
9
Teacher’s Name: Akhtab Hussain Past Paper Questions
(ii) Write the hexadecimal value of the minutes register from part (b)(i).
[1]
________________________________________________________________________________
WINTER 2016
5 A computer uses an 8-bit register. The 8-bit register contains binary
integers.
(a) Write the denary (base 10) value represented by:
[1]
________________________________________________________________________________
(b) All the bits in the register are shifted one place to the right as shown below.
10
Teacher’s Name: Akhtab Hussain Past Paper Questions
Write the denary number that is represented after this shift.
[1]
________________________________________________________________________________
(c) State the effect the shift to the right had on the original denary number
from part (a). [1]
________________________________________________________________________________
(d) The original number in part (a) is shifted three places to the right.
(i) Show the new binary number:
Parity bit
1 1 1 1 1 0 0 1 Register Y
11
Teacher’s Name: Akhtab Hussain Past Paper Questions
0 1 0 1 1 1 1 1 Register Z
Register______________________________________________________________ [1]
10 (a) A manufacturer of aero plane’s engine assigns a denary identification
number (ID) to each engine. One engine has the ID: 0431
(i) Convert this denary number to a 12-bit binary format.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________ Kilobytes
(c) At the end of the flight, all of the data are sent to the aeroplane engine
manufacturer using the Internet. The computer in the aeroplane has a MAC
address and an IP address. State what is meant by these two terms.
[2]
12
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2017
1 The memory of a computer contains data and instructions in binary. The
following instruction is stored in a location of the memory.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Explain why a programmer might prefer to read the instruction in
hexadecimal rather than in binary.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Give two other uses of hexadecimal.
[2]
Use 1 ___________________________________________________________________________
________________________________________________________________________________
Use 2 ___________________________________________________________________________
________________________________________________________________________________
3 Steffi has a number of files of different sizes that contain her work.
Tick () to show whether each statement is true or false.
[4]
13
Teacher’s Name: Akhtab Hussain Past Paper Questions
5 (a) The denary number 57 is to be stored in two different computer registers.
Convert 57 from denary to binary and show your working.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Show the binary number from part (a) as it would be stored in the following
registers.
(c) A binary number stored in a register can have many different uses, for
example an address in main memory.
Give two other uses for a binary number stored in a register. [2]
Use 1 ___________________________________________________________________________
________________________________________________________________________________
Use 2___________________________________________________________________________
________________________________________________________________________________ (d) A
register in a computer contains binary digits.
Winter 2017
1 A robot arm in a factory is programmed to move products.
The binary instructions to operate the robot arm are:
14
Teacher’s Name: Akhtab Hussain Past Paper Questions
15
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [5]
4. A washing machine has a small display screen built into it. One use of the
display screen is to show an error code when a problem has occurred with
a washing cycle.
(b) The display screen shows a hexadecimal error code: E04
This error code means that the water will not empty out of the washing
machine.
Convert this error code to binary.
[3]
16
Teacher’s Name: Akhtab Hussain Past Paper Questions
……………………… number system; this is a base ……………………………………
number system. [6]
Summer 2018
1 Different units of data can be used to represent the size of a file, as it
changes in size.
Fill in the missing units of data, using the list given:
• Byte • Gigabyte (GB) • Megabyte (MB) • Nibble
The units of data increase in size from smallest to largest.
bit
__________________________________
__________________________________
kilobyte (kB)
17
Teacher’s Name: Akhtab Hussain Past Paper Questions
__________________________________
__________________________________
Terabyte (TB) [4]
(a) Write the 8-bit binary numbers that are currently stored for the Hours,
Minutes and Seconds.
[3]
Write the denary values that will now be shown on the stopwatch.
[3]
18
Teacher’s Name: Akhtab Hussain Past Paper Questions
19
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2018
2 (a) Six binary or hexadecimal numbers and six denary conversions are given.
Draw a line to connect each binary or hexadecimal number to the correct
denary conversion. [5]
20
Teacher’s Name: Akhtab Hussain Past Paper Questions
01001011 _______________________________
01000101 _______________________________
01011001 _______________________________
ii) Give three other uses of hexadecimal notation in computer science.
[3]
1 __________________________________________________________________________
2 __________________________________________________________________________
3 __________________________________________________________________________
(iii) State two benefits of using hexadecimal notation to represent binary
values. [2]
Benefit 1 __________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Benefit 1 __________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
21
Teacher’s Name: Akhtab Hussain Past Paper Questions
4 The MAC address of a device is represented using hexadecimal. A section
of a MAC address is shown. Each pair of hexadecimal digits is stored using
8-bit binary.
(a) Complete the table to show the 8-bit binary equivalents for the section of
MAC address. The first number has already been converted.
[3]
Summer 2019
(a) Elle has a file stored on her computer that is 20 MB in size. Jordan has a
file that is 10 GB in size. Tick () to show which is the larger file.
[1]
(b) Bob has a file stored on his computer that is 3500 kB in size. Gerty has a
file that is 3 MB in size. Tick () to show which is the larger file.
[1]
3 (a) A long distance running race uses an electronic counter that counts each
competitor who finishes the race. The count is stored as binary in a 12-bit
register. A denary value of the count is displayed on a screen above the
finish line.
22
Teacher’s Name: Akhtab Hussain Past Paper Questions
(i) The screen currently displays:
0039
State the binary value that is currently stored to display the count shown.
[2]
________________________________________________________________________________
________________________________________________________________________________
(ii) More competitors cross the finish line and the screen now displays:
0350
State the binary value that is currently stored to display the count shown.
[2]
________________________________________________________________________________
________________________________________________________________________________
(iii) At the end of the race the binary value stored is:
011011000111
Give the denary value that would be displayed on the screen at the end of
the race.
Show your working.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Screen display:
23
Teacher’s Name: Akhtab Hussain Past Paper Questions
24
Teacher’s Name: Akhtab Hussain Past Paper Questions
State what is meant by HTML.
[1]
________________________________________________________________________________
________________________________________________________________________________
(c) Give one application of each type of data transmission. Each application
must be different.
Parallel data transmission
[1]
Application
25
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
Serial data transmission
[1]
Application
________________________________________________________________________________
________________________________________________________________________________
2 (a) State what is meant by the term USB.
[1]
________________________________________________________________________________
________________________________________________________________________________
(b) Describe two benefits of using USB connections between a computer and a
device. [2]
1. __________________________________________________________________________
__________________________________________________________________________
2. __________________________________________________________________________
__________________________________________________________________________
5 Parity checks are often used to check for errors that may occur during
data transmission.
(a) A system uses even parity. Tick (✓) to show whether the following three
bytes have been transmitted correctly or incorrectly.
[3]
(b) A parity byte is used to identify which bit has been transmitted incorrectly
in a block of data. The word “F L O W C H A R T” was transmitted using
nine bytes of data (one byte per character). A tenth byte, the parity byte,
was also transmitted.
26
Teacher’s Name: Akhtab Hussain Past Paper Questions
The following block of data shows all ten bytes received after
transmission. The system uses even parity and column 1 is the parity bit.
(d) A parity check may not identify that a bit has been transmitted incorrectly.
Describe one situation in which this could occur.
[1]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
WINTER 2015
(c) The shopping mall has over 100 cameras. At the end of each day all these cameras send their images,
captured over the last 24 hours, to a central computer.
Explain why the mall uses dedicated fibre optic cable rather than transmitting the data over the local
broadband network. [2]
27
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) When data are transmitted from one device to another, a parity check is often carried out on each byte
of data. The parity bit is often the leftmost bit in the byte.
(i) If a system uses even parity, give the parity bit for each of the following bytes: [2]
28
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2016
4 (a) Nikita wishes to print out some documents and connects her printer to the
computer using one of the USB ports.
(i) Identify what type of data transmission is being used.
[1]
________________________________________________________________________________
(ii) Give three reasons for using a USB port.
[3]
1. __________________________________________________________________________
________________________________________________________________________________
2. __________________________________________________________________________
________________________________________________________________________________
3. __________________________________________________________________________
________________________________________________________________________________
6 (a) Three descriptions of data transmission are given below.
Tick (✓) the appropriate box in each table to show the:
• Type of transmission
• Method of transmission
Description 1:
Data is transmitted several bits at a time down several wires in both directions
simultaneously.
Description 2:
Data is transmitted in one direction only, one bit at a time, down a single wire.
Description 3:
29
Teacher’s Name: Akhtab Hussain Past Paper Questions
Data is transmitted one bit at a time down a single wire; the data is transmitted
in both directions but not at the same time.
(b) Give two reasons why serial transmission, rather than parallel transmission,
is used to connect devices to a computer.
[2]
1.______________________________________________________________________________
________________________________________________________________________________
2.______________________________________________________________________________
________________________________________________________________________________
11 Describe the use of structure and presentation in a HTML document.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 Check digits are used to ensure the accuracy of entered data.
A 7-digit number has an extra digit on the right, called the check digit.
Digit position: 1 2 3 4 5 6 7 8
digit: – – – – – – – –
check digit
The check digit is calculated as follows:
• Each digit in the number is multiplied by its digit position
• The seven results are then added together
• This total is divided by 11
• The remainder gives the check digit (if the remainder = 10, the check
digit is X)
(a) Calculate the check digit for the following number. Show all your working.
4241508…
30
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Check digit ____________________________________________________________________ [2]
(b) An operator has just keyed in the following number:
3240045X
Circle below correct if the check digit is correct OR incorrect if the check digit
is incorrect.
correct incorrect
Explain your answer.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4 Nigel wants to send a large text file electronically to Mashuda.
(b) This file will be transmitted to Mashuda as an email attachment. Mashuda
then stores it on her computer.
Explain how checksums can be used to verify that the file has not been
corrupted during transmission or data storage.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Winter 2016
3 (a) Explain what is meant by:
(i) Serial data transmission
[2]
________________________________________________________________________________
31
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Parallel data transmission
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) A computer in a factory is connected to a printer. The printer is located in
an office 1 km away from the factory. Identify which data transmission
method would be most suitable for this connection.
[1]
________________________________________________________________________________
Give two reasons for your choice.
[2]
1.______________________________________________________________________________
________________________________________________________________________________
2.______________________________________________________________________________
________________________________________________________________________________
4 Nine bytes of data are transmitted from one computer to another. Even
parity is used. An additional parity byte is also sent. The ten bytes arrive at
the destination computer as follows:
32
Teacher’s Name: Akhtab Hussain Past Paper Questions
33
Teacher’s Name: Akhtab Hussain Past Paper Questions
This URL is composed of three parts.
State the part of this URL that is the:
[3]
File name ______________________________________________________________
Protocol ______________________________________________________________
Web server name ___________________________________________________________
3 Five computer terms and seven descriptions are shown below. Draw a line to
connect each computer term to its correct description.
[5]
34
Teacher’s Name: Akhtab Hussain Past Paper Questions
(d) When eight bytes of data have been collected, they are transmitted to a
computer 100 km away. Parity checks are carried out to identify if the data
has been transmitted correctly. The system uses even parity and column 1 is
35
Teacher’s Name: Akhtab Hussain Past Paper Questions
the parity bit. The eight bytes of data are sent together with a ninth parity
byte:
c) At the end of the flight, all of the data are sent to the aero plane engine
manufacturer using the Internet. The computer in the aero plane has a
MAC address and an IP address. State what is meant by these two terms.
[2]
MAC address ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
IP address _________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
36
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2017
4 Five statements about serial half-duplex data transmission are shown in the
table below. Tick () to show whether each statement is true or false.
[5]
5 (a) Parity checks are often used to detect errors that may occur during data
transmission. The received bytes in the table below were transmitted
using odd parity.
Tick () to show whether each byte has been corrupted during transmission or not
corrupted during transmission. [3]
37
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4 There are various methods used to detect errors that can occur during
data transmission and storage.
Describe each of the following error detection methods.
[8]
Parity check
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Check digit
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Checksum
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Automatic Repeat request (ARQ)
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 Computer A is communicating with computer B.
(a) Draw an arrow or arrows to show simplex, duplex and half-duplex data
transmission. The direction of the data transmission must be fully labelled.
38
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) State a use for the following data transmission methods. The use must be
different for each data transmission method.
[2]
Simplex
________________________________________________________________________________
________________________________________________________________________________
Duplex ________________________________________________________________________________
________________________________________________________________________________
(c) A computer includes an Integrated Circuit (IC) and a Universal Serial Bus
(USB) for data transmission. Describe how the computer uses these for data
39
Teacher’s Name: Akhtab Hussain Past Paper Questions
transmission, including the type of data transmission used.
[4]
IC _____________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
USB ____________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Explain why your answer to part (a)(i) is the most suitable data transmission.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
40
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
(b) Identify and describe two methods of error checking that can be used to
make sure that the data stored after transmission is accurate.
[6]
Method 1
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Method 2
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
http://www.cie.org.uk/index.htm
Part 1 Part 2 Part 3
Identify the three parts that make up this URL.
[3]
Part 1: ____________________________________________________________________
Part 2: ____________________________________________________________________
Part 3: ____________________________________________________________________
(b) Describe what is meant by an Internet Protocol (IP) address.
[4]
________________________________________________________________________________
________________________________________________________________________________
41
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6 Selma writes the following four answers in her Computer Science
examination.
State which computer terms she is describing.
“When data is transmitted, if an error is detected in the data received a
signal is sent to ask for the data to be retransmitted. This continues until
the data received is correct.”
Summer 2018
3 The three binary numbers in the registers A, B and C have been
transmitted from one computer to another.
[4]
One binary number has been transmitted incorrectly. This is identified through the
use of a parity bit. Identify which register contains the binary number that has
been transmitted incorrectly. Explain the reason for your choice.
The binary number that has been transmitted incorrectly is in Register
_______________________
Explanation:
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
42
Teacher’s Name: Akhtab Hussain Past Paper Questions
10 RockICT is a music business that has a website to allow customers to
view and buy the products it sells.
The website consists of web pages.
(a) Describe what is meant by HTML structure and presentation for a web
page. [4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The URL for the music company’s website is:
43
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Winter 2018
7 Computers can use different methods of transmission to send data from
one computer to another. Parallel data transmission is one method that
can be used.
(a) Explain what is meant by parallel data transmission.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Give one benefit and one drawback of parallel data transmission, compared
to serial data transmission, over short distances.
[2]
Benefit
________________________________________________________________________________
44
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
Drawback
________________________________________________________________________________
________________________________________________________________________________
(c) Give one example where parallel data transmission is used.
[1]
________________________________________________________________________________
________________________________________________________________________________
45
Teacher’s Name: Akhtab Hussain Past Paper Questions
46
Teacher’s Name: Akhtab Hussain Past Paper Questions
(iii) Duplex data transmission
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Data can sometimes be corrupted when it is transmitted from one
computer to another, causing errors to be present in the data. Identify and
describe three methods of error detection that could be used to see if an
error has occurred. [9]
Error detection method 1: _____________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Error detection method 2:_____________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Error detection method 3: _____________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check
for errors during data transmission and storage.
(a) A system uses even parity. Write the appropriate parity bit for each byte.
[2]
47
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Explain how Automatic Repeat reQuests (ARQ) are used in data
transmission and storage.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
(c) State one other method that could be used to check for transmission errors.
[1]
________________________________________________________________________________
5 Data can be transferred using half-duplex serial transmission.
(a) Describe serial transmission.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Give one application of serial data transmission.
[1]
________________________________________________________________________________
________________________________________________________________________________
(c) Describe half-duplex data transmission.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 Alice enters a URL into a web browser to access a webpage.
48
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) State what URL represents.
[1]
U ____________________ R ____________________ L ____________________
(b) Explain how the web browser uses the URL to access the webpage.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Summer 2019
5 (d) Errors can occur when data is transmitted, stored or entered into a
system. Darius could use an error detection method to find whether errors
have occurred. One error detection method he could use is a checksum.
(i) Describe how a checksum detects errors.
[5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) State three other error detection methods that Darius could use.
[3]
49
Teacher’s Name: Akhtab Hussain Past Paper Questions
Method 1 _________________________________________________________________
Method 2 _________________________________________________________________
Method 3 _________________________________________________________________
6 Nadia purchases a printer to print out her homework. She connects the
printer to her computer using USB.
(a) Explain what is meant by USB.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6 Priya creates a website to sell her old comic books and superhero figures.
(a) She uses HTML to create her website. The HTML she produces has both
structure and presentation. Explain what is meant by HTML structure and
presentation. Include an example of each.
[4]
Structure
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Presentation
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Priya stores her website on a webserver. To transmit the website data to
the webserver she uses parallel duplex data transmission. Describe how
50
Teacher’s Name: Akhtab Hussain Past Paper Questions
data is transmitted using parallel duplex data transmission.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) Priya has a URL for her website. State what is meant by a URL
[1].
________________________________________________________________________________
________________________________________________________________________________
9 The contents of three binary registers have been transmitted from one
computer to another. Even parity has been used as an error detection
method. The outcome after transmission is:
Register A and Register C have been transmitted correctly. Register B has been
transmitted incorrectly. Complete the Parity bit for each register to show the
given outcome.
[3]
51
Teacher’s Name: Akhtab Hussain Past Paper Questions
(d) Customers will use a web browser to access Victoria’s website. Victoria
writes a paragraph of text to explain how the website will be displayed on
a customer’s computer. Use the list given to complete Victoria’s paragraph
by inserting the correct six missing terms. (Not all terms will be used).
• browser • domain name • firewall
• hexadecimal • HTML • https
• MAC address • search engine • web server
• Uniform Resource Locator (URL)
The user enters the website __________________________into the address bar. The
protocol that is used is __________________________. The URL contains the
____________________ for the website. This is used to look up the IP address of the
company. A DNS server stores an index of IP addresses. The browser sends a
request to the __________________________ as this is where the files for the website
are stored. The files are sent back to the __________________________ as
__________________________ files. This is interpreted by the browser and the web
page is displayed.
[6]
52
Teacher’s Name: Akhtab Hussain Past Paper Questions
Four statements are given about MAC addresses and IP addresses.
Tick (✓) to show whether each statement is True or False.
[4]
5 The three binary numbers in the registers given have been transmitted
from one computer to another.
One binary number has been transmitted incorrectly. This can be identified
by the use of a Parity bit. Identify the binary number that has been
transmitted incorrectly. Explain how you identified the incorrect binary
number. [4]
53
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
54
Teacher’s Name: Akhtab Hussain Past Paper Questions
3 (a) Complete the truth table for the following logic circuit:
[4]
55
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Draw a logic circuit which corresponds to the following logic statement:
X = 1 if ((A is NOT 1 OR B is 1) AND C is 1) OR (B is NOT 1 AND C is 1)
[3]
(c) Write a logic statement which corresponds to the following logic circuit:
[3]
________________________________________________________________________________
________________________________________________________________________________
56
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
57
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Complete the truth table for the safety system.
[4]
58
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2016
5 A computer-controlled machine produces plastic sheets. The thickness of
each sheet must be within a certain tolerance. The sheets are kept below
50 °C as they move over rollers at 10 metres per second. Three parameters
need to be monitored all the time.
59
Teacher’s Name: Akhtab Hussain Past Paper Questions
60
Teacher’s Name: Akhtab Hussain Past Paper Questions
7 (a)
61
Teacher’s Name: Akhtab Hussain Past Paper Questions
(c) Re-draw the following logic circuit using NAND gates only.
[4]
62
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2016
7 (a) Complete the truth tables and name the single logic gate that could
replace each logic circuit:
i)
ii)
(b) (i) Draw a logic circuit to represent the following logic statement:
X = 1 if (A = 1 AND B = 1) OR ( (B = NOT 1) AND C = 1) [4]
63
Teacher’s Name: Akhtab Hussain Past Paper Questions
64
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2017
10 (a) Complete the truth table for the NOR gate.
[1]
65
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Write a logic statement that corresponds with the following logic circuit.
[3]
X = __________________________________________________________________________________
66
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Complete the truth table for the given logic statement.
[4]
67
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2017
7 Draw a logic circuit to represent the logic statement: [7]
X = 1 if (A is NOT 1 AND B is 1) AND (A is NOT 1 AND C is NOT 1) OR (B is 1 AND
C is 1)
68
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Draw the symbol for an XOR gate and explain the function of this logic
gate.
Symbol [1]
Explanation [4]
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Summer 2018
6 Consider the logic statement:
X = 1 if ((A is NOT 1 OR B is 1) NOR C is 1) NAND ((A is 1 AND C is 1) NOR B
is 1)
(a) Draw a logic circuit to represent the given logic statement.
[6]
69
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Complete the truth table for the given logic statement.
[4]
70
Teacher’s Name: Akhtab Hussain Past Paper Questions
X = 1 if ((A is 1 AND B is NOT 1) NAND C is 1) XOR ((A is 1 AND C is 1) OR B
is 1)
(a) Draw a logic circuit to represent the given logic statement.
[4]
(b) Complete the truth table for the given logic statement.
[4]
71
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2018
3 A logic circuit is shown:
(a) Complete the truth table for the given logic circuit.
[4]
72
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Explain the difference between the functions of an AND gate and an OR
gate. [3]
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
The system will sound an alarm when certain conditions are detected.
Alarm (X) will sound (=1) when:
Window is closed and temperature >=26 °C OR
Temperature <26 °C and humidity >=50%
Draw a logic circuit to represent the system.
[5]
73
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) Complete the truth table for the given logic circuit.
[4]
74
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Draw a logic circuit corresponding to the logic statement:
[6]
X = 1 if ((A is 1 AND B is 1) AND (A is 1 OR C is NOT 1)) OR (B is 1 AND C is
NOT 1)
Summer 2019
2 Rajesh creates a logic circuit.
He uses three different logic gates in his circuit. Each logic gate has a
maximum of two inputs.
He describes the logic of each gate.
(a) “The only time the output will be 1 is when both inputs are 1.”
State the single logic gate: _________________________________________
(b) “The only time the output will be 1 is when both inputs are 0.”
75
Teacher’s Name: Akhtab Hussain Past Paper Questions
(c) “The only time the output will be 0 is when both inputs are 1.”
State the single logic gate: _________________________________________
(b) Complete the truth table for the given logic statement.
[4]
76
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) Redraw the logic circuit using only 4 logic gates. Each logic gate used
must have a maximum of two inputs
[4]
77
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Complete the truth table for the given logic circuit.
[4]
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
78
Teacher’s Name: Akhtab Hussain Past Paper Questions
Past Paper Questions
Chapter No. 4
Summer 2015
7 (a) One of the key features of von Neumann computer architecture is the use of buses. Three
buses and three descriptions are shown below. Draw a line to connect each bus to its correct
description. [3]
(b) The seven stages in a von Neumann fetch-execute cycle are shown in the table below. Put
each stage in the correct sequence by writing the numbers 1 to 7 in the right hand column.
The first one has been done for you. [6]
79
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2015
3 A section of computer memory is shown below:
(a) (i) The contents of memory location 1000 0001 are to be read. Show the contents of the Memory Address
Register (MAR) and the Memory Data Register (MDR) during this read operation:
[2]
MAR
MDR
(ii) The value 0111 1001 is to be written into memory location 1000 1110.
Show the contents of the MAR and MDR during this write operation: [2]
MAR
MDR
1 ___________________________________________________________________
2 ___________________________________________________________________
3 ___________________________________________________________________
80
Teacher’s Name: Akhtab Hussain Past Paper Questions
(iii) Show any changes to the computer memory following the read and write operations in
part (a)(i) and part (a)(ii). [3]
(c) The control unit is part of a computer system. What is the function of the control unit? [3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Winter 2016
1 __________________________________________________________________________
2 __________________________________________________________________________
3 __________________________________________________________________________
4 __________________________________________________________________________
81
Teacher’s Name: Akhtab Hussain Past Paper Questions
Stage 1 ____________________________________________________________________
Stage 2 ____________________________________________________________________
Stage 3 ____________________________________________________________________
Summer 2017
6 Signals are sent to and from the components of a processor using buses.
82
Teacher’s Name: Akhtab Hussain Past Paper Questions
Identify and describe the purpose of two different buses.
Bus 1 ____________________________________________________________________
Purpose
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [3]
Bus 2 ____________________________________________________________________
Purpose
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [3]
11 State three functions provided by an operating system.
[3]
Function 1 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Function 2 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Function 3 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 Name three different buses that are used in the fetch-execute cycle.
[3]
Bus 1: ____________________________________________________________________
Bus 2: ____________________________________________________________________
83
Teacher’s Name: Akhtab Hussain Past Paper Questions
Bus 3: ____________________________________________________________________
84
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2017
85
Teacher’s Name: Akhtab Hussain Past Paper Questions
86
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2018
5 Six components of the Von Neumann model for a computer system and six
descriptions are given. Draw a line to match each component to the most
suitable description. [5]
87
Teacher’s Name: Akhtab Hussain Past Paper Questions
The data from this address is sent to the ___________________________. The
instruction can then be decoded and ___________________________. Any calculations
that are carried out on the data are done by the___________________________. During
calculations, the data is temporarily held in a register called the
___________________________. [8]
88
Teacher’s Name: Akhtab Hussain Past Paper Questions
10 Personal computers (PCs) use an operating system. Explain why this type
of computer needs an operating system.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
89
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2018
Summer 2019
90
Teacher’s Name: Akhtab Hussain Past Paper Questions
• RAM • ROM • Secondary storage
The CPU processes ___________________ and ___________________. An instruction is
___________________ from ___________________ into the CPU where it is then
___________________. Once this has taken place the instruction is then
_________________.
(b) A computer uses the Von Neumann model and the stored program concept.
(i) Explain what is meant by the stored program concept.
[2]
________________________________________________________________________________
________________________________________________________________________________
(ii) The Von Neumann model has several components that are used in the
fetch-execute cycle. One component is the Arithmetic Logic Unit (ALU).
Describe the role of the ALU. [4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) The computer has an operating system.
(i) A signal causes the operating system to stop and assess what to do next.
Identify the name of this signal.
[1]
________________________________________________________________________________
(ii) State two functions of an operating system.
[2]
1 __________________________________________________________________________
2 __________________________________________________________________________
91
Teacher’s Name: Akhtab Hussain Past Paper Questions
Past Paper Questions
Chapter No. 5
Summer 2015
(d) The LCD (liquid crystal display) on the clock face is back-lit using blue
LEDs (light emitting diodes). The brightness of the clock face is
determined by the level of light in the room. The amount of light given out
by the LEDs is controlled by a control circuit. Describe how the sensor,
microprocessor and LEDs are used to maintain the correct brightness of
the clock face.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(e) Modern LCD monitors and televisions use LED back-lit technology. Give two
advantages of using this new technology compared to the older cold
cathode fluorescent lamp (CCFL) method.
[2]
1. __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 The majority of mobile phones use touch screens. Three common
technologies are used by different mobile phone manufacturers. Choose
one of the following mobile phone technologies:
• Resistive
• Capacitive
• Infrared
Chosen Technology: _________________________________________________________
(i) Describe how your chosen technology works to allow a user to make
selections by touching the screen.
[2]
________________________________________________________________________________
92
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Give one benefit and one drawback of your chosen technology when used on
mobile phone touch screens.
[2]
Benefit
________________________________________________________________________________
________________________________________________________________________________
Drawback
________________________________________________________________________________
________________________________________________________________________________
3 Four input devices, four descriptions and four applications are shown
below. Draw a line to connect each input device to its correct description.
Then connect each description to its correct application.
[6]
93
Teacher’s Name: Akhtab Hussain Past Paper Questions
Describe how the sensor, microprocessor and light interact to switch the
street light on or off Include in your answer how the microprocessor stops
the street lights being frequently switched on and off due to brief changes
in the light intensity. [5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Name three different sensors (other than light and pH) and describe an
application for each of these sensors.
A different application is needed for each sensor.
[6]
Sensor 1: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
Sensor 2: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
Sensor 3: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
8. The flowchart on the opposite page shows what happens when the barcode on a product is scanned at
the checkout in a supermarket. The barcodes are used in an automatic stock control system.
Several of the statements in the flowchart are missing. Complete the flowchart using item number
only from the list below. [4]
94
Teacher’s Name: Akhtab Hussain Past Paper Questions
95
Teacher’s Name: Akhtab Hussain Past Paper Questions
96
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2015
5 A security system uses sensors, a camera and a microprocessor to capture images of each person
entering a large shopping mall.
(a) Describe how the sensors, camera and microprocessor interact to identify certain people entering the
mall. [5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 The steps to print a document using a laser printer are shown in the table below. Put each step in the
correct order. The first step has been done for you. [8]
97
Teacher’s Name: Akhtab Hussain Past Paper Questions
9(b) The owner needs to be able to enter their own sequence of movements for the model car. Name a
suitable input device. [2]
Input device: ______________________________________________________________
Give a reason for your choice of device.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 (a) Name an application which makes use of the following sensors. A different application should be used
in each case. [3]
Temperature ____________________________________________________________________
________________________________________________________________________________
Magnetic field ____________________________________________________________________
________________________________________________________________________________
Motion ____________________________________________________________________
________________________________________________________________________________
(b) The flowchart on the opposite page shows how a light sensor and microprocessor are used to switch a
street lamp on or off. When the sensor reading is <= 50 light units, the lamp is turned on automatically.
Several of the instructions have been omitted from the flowchart. Using item numbers only from the
list below, complete the flowchart:
98
Teacher’s Name: Akhtab Hussain Past Paper Questions
99
Teacher’s Name: Akhtab Hussain Past Paper Questions
[5]
100
Teacher’s Name: Akhtab Hussain Past Paper Questions
2 Sensors and a microprocessor monitor a car exhaust for high temperature and high carbon monoxide
(CO) levels.
(a) Describe how the sensors and microprocessor are used to monitor the temperature and CO levels and
warn the driver if either is out of range. [5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
WINTER 2015
6 Passengers fly into an airport from other countries. The airport has a security system that uses:
• Computers
• Scanners
• Digital cameras
To gain entry to the country, each passenger must have a passport or identification (ID) card. This
must contain a recent photograph and other personal data. The passenger must:
• Place their passport or ID card on a scanner that reads machine-readable characters and scans
the photograph
• Look towards a camera that takes an image of the passenger’s face
Describe how a computer checks whether the image just taken by the camera matches the scanned
photograph. [2]
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
101
Teacher’s Name: Akhtab Hussain Past Paper Questions
7 Name a suitable output device for each of the following applications. A different device should be
used for each application. [5]
102
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2016
3 (a) Five sensors and five applications are shown below.
Draw a line to link each sensor to its most appropriate application.
[4]
(b) Automatic doors in a building are controlled by the use of infrared sensors
and a microprocessor. Describe how the sensors and the microprocessor
are used to automatically open a door as a person approaches.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4 (a) Nikita wish to print out some documents and connects her printer to the
computer using one of the USB ports.
103
Teacher’s Name: Akhtab Hussain Past Paper Questions
(iii) The printer runs out of paper while it is printing the documents. A signal is
sent to the processor to request that the problem is dealt with.
Name this type of signal.
[1]
________________________________________________________________________________
(b) State one suitable application for each printer below. A different application
must be given for each printer.
[2]
Inkjet printer: ______________________________________________________________
________________________________________________________________________________
3D printer: ______________________________________________________________
________________________________________________________________________________
(c) Name another type of printer and describe one way in which it is different
from the printers named in part (b). Give an application for this printer.
[3]
Type of printer: _____________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
12 (a) Name the following type of barcode:
[1]
________________________________________________________________________________
104
Teacher’s Name: Akhtab Hussain Past Paper Questions
(c) An airport uses the type of barcode shown in part (a) to advertise local
places of interest. Describe how a visitor landing at the airport could use
these barcodes to help plan their visit.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [3]
2 Motion sensors are used in a security system to detect intruders. Name
three other sensors that could be used in the following applications. Give a
different type of sensor for each application.
[3]
Application Sensor
Controlling street lights ___________________________________________
Monitoring a river for pollution ___________________________________________
Controlling traffic lights ____________________________________________
9 In the following barcode, each binary number is made up of seven bars.
Each bar is black or grey. A black bar is interpreted as a “1” and a grey bar
is interpreted as a “0”.
(a) Write the binary numbers that would be produced from this barcode:
Winter 2016
105
Teacher’s Name: Akhtab Hussain Past Paper Questions
Sensor 1 __________________________________________________________
Description
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Sensor 2 __________________________________________________________
Description
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
4 The Henslows Diner is a local restaurant.
(a) Staff currently use a keyboard to input a customer food order into a
computer. The food order is then sent to the kitchen. State two
disadvantages of using a keyboard to input a customer food order
[2]
1. __________________________________________________________________________
____________________________________________________________________________
2. __________________________________________________________________________
____________________________________________________________________________
106
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) A concept keyboard has a flat surface that is overlaid with images of food
items available from the restaurant menu. Staff can click on an image to
add the food item to a customer food order. The Henslows Diner wants to
change to a concept keyboard to input customer food orders.
107
Teacher’s Name: Akhtab Hussain Past Paper Questions
Explain two benefits of making this change.
[4]
1. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode
(LED) backlit technology.
Give four benefits of using LED technology.
[4]
1. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3. ______________________________________________________________________________
________________________________________________________________________________
4. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 A security light is controlled by sensors and a microprocessor. Describe
how the sensors and microprocessor interact to switch on the security
light when an intruder is detected. [6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
108
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
SUMMER 2017
9 A supermarket has a system that allows customers to check out their own
shopping. Identify and describe the purpose of two input devices and one
output device used in this system.
Input device 1: ________________________________________________________
Purpose
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
Input device 2: ________________________________________________________
Purpose
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Output device: _____________________________________________________ [2]
Purpose
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
12 The processes in a chemical factory are monitored by sensors connected
to a microprocessor.
(a) Identify two different sensors used in this application. Give an example of
how each sensor could be used in the chemical factory.
[4]
109
Teacher’s Name: Akhtab Hussain Past Paper Questions
Sensor 1: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
Sensor 2: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
(b) Describe how the sensors and a microprocessor are used to monitor a
process. [5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 The diagram shows five output devices and five descriptions.
Draw a line between each output device and its description.
110
Teacher’s Name: Akhtab Hussain Past Paper Questions
Identify what type of barcode A is an example of. Explain how the data stored in
this type of barcode is read.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
111
Teacher’s Name: Akhtab Hussain Past Paper Questions
9 A cold store is kept at a constant low temperature using a sensor, a
microprocessor and a cooling unit. Explain how the sensor and
microprocessor will maintain a constant low temperature.
[6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
WINTER 2017
9 Anna has a farm that grows fruit. She has a system that monitors the
conditions for growing the fruit. Sensors are used in this system.
(a) Explain what is meant by the term sensor.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) State two sensors that could be used in this system and describe how they
could be used.
[6]
Sensor 1: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
112
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
Sensor 2: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 A washing machine has a small display screen built into it. One use of the
display screen is to show an error code when a problem has occurred with
a washing cycle.
(a) State whether the display screen is an input, output or storage device.
[1]
________________________________________________________________________________
(d) Identify three sensors that could be used in the washing machine.
State what each sensor could be used for.
[6]
Sensor 1: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
Sensor 2: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
Sensor 3: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
6 Describe the operation of a 2D scanner and a 3D scanner.
[6]
2D Scanner
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
113
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
3D Scanner
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
SUMMER 2018
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Explain how the barcode system could help the supermarket manage its
stock. [3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
114
Teacher’s Name: Akhtab Hussain Past Paper Questions
(c) An infrared touch screen is used to view and navigate the supermarket
stock system.
Explain how the infrared touch screen detects a user’s touch.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 (a) Nancy has captured images of her holiday with her camera. The captured
images are stored as digital photo files on her camera. Explain how the
captured images are converted to digital photo files.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 An advertisement in a magazine displays this barcode:
115
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 Alexandra has a new mobile device. It has a touch screen that uses
capacitive technology.
(a) Describe how a capacitive touch screen registers Alexandra’s touch.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
____________________________________________________________________________
(b) Alexandra is wearing gloves because it is cold. She presses an icon on her
touch screen but her action is not registered.
(i) Explain why the touch screen will not register her touch.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
116
Teacher’s Name: Akhtab Hussain Past Paper Questions
(ii) Alexandra does not want to remove her gloves. Explain how Alexandra
could use her mobile device whilst still wearing gloves.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 State five sensors that could be used in the following applications. Give a
different type of sensor for each application.
[5]
7 A train stations use large touch screens to allow passengers to search for
train information and buy tickets.
(a) State three benefits of using a touch screen in the train station.
[3]
Benefit 1: ____________________________________________________________________
________________________________________________________________________________
Benefit 2: ___________________________________________________________________
________________________________________________________________________________
Benefit 3: ____________________________________________________________________
________________________________________________________________________________
117
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) The touch screens at the station use resistive touch technology. Describe
how resistive touch technology works.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
WINTER 2018
(b) Identify the software used to create the computerised designs for 3D
printing. [1]
________________________________________________________________________________
(c) A Digital Light Projector (DLP) is another example of an output device.
Describe how a DLP displays an image.
[3]
118
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 A sports stadium uses a pressure sensor and a microprocessor to monitor
the number of people entering the sports stadium. For the counter to
increment the weight on the pressure sensor must exceed 5 kg. Explain
how the system uses the pressure sensor and the microprocessor to
monitor the number of people entering. [5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
5 (a ) Karina is taking her Computer Science examination. She has three
questions to answer about output devices.
(i) For the first question she writes the answer:
“It is a high powered laser that cuts materials such as thin metals or
wood.”
Identify the output device that Karina is describing.
[1]
________________________________________________________________________________
(ii) For the second question she writes the answer:
“The screen is made up of blocks of red, green and blue pixels. The screen
uses layers of different types of liquid.”
Identify the output device that Karina is describing.
[1]
119
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(iii) For the third question she writes the answer:
“It is responsible for powering and moving a motor in machinery, such as a
robot arm in a factory.”
Identify the output device that Karina is describing.
[1]
________________________________________________________________________________
(b) Karina correctly answers another examination question about some more
output devices.
Five different terms have been removed from her answer.
Complete the sentences in Karina’s answer, using the list given. Not all
terms in the list need to be used.
[5]
• 3D • digital light projector • inkjet
• Interactive whiteboard • laser • rotating
• Scanning • sliding • speaker
• Thermal bubble
120
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 An elevator (lift) has a maximum weight limit of 2400 kg. The weight
carried is monitored by a sensor and a microprocessor.
Describe how the sensor and the microprocessor are used to make sure
the maximum weight limit is not exceeded.
[6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 There are six output devices and six descriptions shown.
Draw a line to connect each output device to the most appropriate
description [5].
121
Teacher’s Name: Akhtab Hussain Past Paper Questions
122
Teacher’s Name: Akhtab Hussain Past Paper Questions
SUMMER 2019
(b) Sensors are used at the finish line to identify the number of competitors
who finish the race.
(i) Identify two different sensors that could be used to identify the number of
competitors.
Sensor 1 ___________________________________________________________ [1]
Sensor 2 ___________________________________________________________ [1]
(ii) The sensors are used with a microprocessor to count how many
competitors finish the race. Explain how the sensor and the
microprocessor are used. [6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Nadia’s printer uses powdered toner rather than liquid ink.
(i) State the type of printer Nadia has purchased.
[1]
________________________________________________________________________________
(ii) Give two benefits of using this type of printer.
[2]
Benefit 1 ________________________________________________________________________
________________________________________________________________________________
Benefit 2 ________________________________________________________________________
123
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(iii) Give one drawback of using this type of printer.
[1]
Drawback1 ______________________________________________________________________
________________________________________________________________________________
3 Five descriptions of different input or output devices are given in the table.
Complete the table by stating the name of each input or output device.
[5]
124
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) Identify three input devices that can be connected to a personal computer.
[3]
1. ______________________________________________________________________________
2. ______________________________________________________________________________
3. _____________________________________________________________________________
(b) Identify three output devices that can be connected to a personal computer.
[3]
1. ______________________________________________________________________________
2. ______________________________________________________________________________
3. _____________________________________________________________________________
(ii) Marley prints the images for his project using an inkjet printer.
Describe how the inkjet printer prints an image.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 (a)An office has an automated lighting system. When movement is detected
in the office the lights are switched on. If movement is not detected for a
period of 2 minutes the lights are switched off. The system uses a sensor
and a microprocessor.
Describe how the automated lighting system uses a sensor and a
microprocessor. [6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
125
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 Remy has a mobile device that has a capacitive touch screen.
Describe how the capacitive touch screen registers Remy’s touch.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6 A museum has an information point. Visitors to the museum can use the
information point to plan their visit to the museum. The information point
allows visitors to access the information using a resistive touch screen.
Visitors can either listen to the information or read it on the screen. They
can also select to output a paper copy of the information they require.
(a) Describe how the resistive touch screen registers the visitor’s touch.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
126
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(b) The information point has a screen to allow visitors to read information.
Identify two other output devices that are present in the information point.
[2]
Output device 1: ________________________________________________________
Output device 2: ________________________________________________________
127
Teacher’s Name: Akhtab Hussain Past Paper Questions
Past Paper Questions
Chapter No. 6
Summer 2015
5 Five storage devices are described in the table below. In column 2, name
the storage device being described. In columns 3, 4, or 5, tick () to show
the appropriate category of storage.
128
Teacher’s Name: Akhtab Hussain Past Paper Questions
129
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Each image taken requires 1 MB of storage. If the camera captures an image every 5 seconds over a 24
hour period, how much storage is required?
Give your answer in gigabytes and show all your working. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 A remote-controlled model car contains RAM, ROM and a solid state drive. The car receives radio
signals from its remote control. It can only receive radio signals of a certain frequency. The
130
Teacher’s Name: Akhtab Hussain Past Paper Questions
manufacturer sets this frequency and the owner cannot change it. The owner of the model car can input
their own sequence of movements from an interface underneath the car.
(a) Describe the purpose of each of the three types of memory supplied with the car. [3]
RAM __________________________________________________________________________
________________________________________________________________________________
ROM __________________________________________________________________________
________________________________________________________________________________
Solid state drive ______________________________________________________________
________________________________________________________________________________
(c) Explain why the model car uses a solid state drive rather than another type of secondary storage.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Winter 2015
5 A security system records video footage. One minute of video requires 180 MB of storage. The
recording system can store several hours of video footage.
(a) Name and describe a suitable storage device for this recording system. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Calculate how much storage would be needed for 2 hours of video footage. Show your working and
give the answer in Gigabytes (GB). [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 MP3 file compression reduces the size of a music file by 90%.
(a) A music track is 80 MB in size.
Calculate the file size after compression. [1]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
How many MP3 files of the size calculated above could be stored on an 800 MB CD? [1]
________________________________________________________________________________
131
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
(b) (i) Explain how MP3 files retain most of the original music quality. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) State the type of file compression used in MP3 files. [1]
________________________________________________________________________________
(iii) Name another file compression format. [1]
________________________________________________________________________________
Summer 2016
11 (a) Four examples of optical storage media are:
• DVD-RW • DVD-RAM • CD-ROM • Blu-ray disc
The table below shows four features of optical storage media.
Tick (✓) the appropriate boxes in the table to indicate which of the
features apply to each example of optical storage media.
[4]
(b) Solid state drives (SSD) are replacing hard disc drives (HDD) in some
computers.
(i) Give three reasons why this is happening.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
132
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(ii) Explain why many web servers still use hard disc drive (HDD) technology.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4 Nigel wants to send a large text file electronically to Mashuda.
(a) Describe how the size of the text file can be reduced.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 There are six descriptions in the table below.
Complete the table below by writing the correct storage device or media in
the box next to each Description
[6]
133
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2016
8 Identify whether the four statements about file compression are correct by
writing TRUE or FALSE in the following table.
[4]
134
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________kilobytes
Summer 2017
8 Complete the paragraph by choosing six correct terms from the list.
• Optical • On-line • RAM • HDD
• Primary • SSD • Secondary • ROM
• Off-line
A computer has two different types of memory _____________________memory is not
directly accessed by the CPU, but it allows a user to store data that can easily
be accessed by applications.
Two examples of this type of memory are _____________________and
_____________________. The second type of memory is _____________________ memory.
This memory is directly accessed by the CPU. It allows the processor to access
data and instructions that are stored in this memory. Two examples of this
memory are _____________________and _____________________. [6]
13 (a) Gurdeep wants to send a large file to Jennifer over the Internet.
State two benefits of compressing the file to send it
[2]
Benefit 1 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Benefit 2 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Two types of compression are lossy and lossless.
Choose the most suitable type of compression for the following and
explain your choice.
(i) Downloading the code for a computer program:
Type of compression: ________________________________________________________
Explanation: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
135
Teacher’s Name: Akhtab Hussain Past Paper Questions
_____________________________________________________________________________ [3]
(ii) Streaming a video file:
Type of compression: ________________________________________________________
Explanation: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [3]
2 Give two examples of primary, secondary and off-line storage.
[6]
Primary
Example 1: ______________________________________________________________
Example 2: ______________________________________________________________
Secondary
Example 1: ______________________________________________________________
Example 2: ______________________________________________________________
Off-line
Example 1: ______________________________________________________________
Example 2: ______________________________________________________________
Winter 2017
136
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
____________________________________________________________________________ GB (b)
Describe one item that is stored in RAM.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Explain three ways that RAM is different to ROM.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 Data files are stored in different file formats.
Complete the table by providing a suitable file format for each file type.
The first one has been done for you.
[3]
137
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Kamil wants to store a 16-bit colour image file. The image size is 1000
pixels.
Calculate the size of the file.
Give your answer in bytes. Show your working.
[2]
Working ___________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Answer ________________ bytes
(c) Describe the differences between primary and secondary storage.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Summer 2018
4 Michele wants to email a file to Elsa. The file is too large so it must be
compressed.
138
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) Name two types of compression that Michele could use.
[2]
Compression type 1 ________________________________________________________
Compression type 2 ________________________________________________________
(b) The file Michele is sending contains the source code for a large computer
program.
Identify which type of compression would be most suitable for Michele to
use.
Explain your choice.
[4]
Compression type ________________________________________________________
Explanation ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) The supermarket uses secondary storage and off-line storage to store data
about its stock.
Explain what is meant by secondary storage and off-line storage.
Secondary storage
__________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
Off-line storage ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
(b) Nancy wants to email the photos to Nadia.
Many of the photos are very large files, so Nancy needs to reduce their file
size as much as possible. Identify which type of compression would be
139
Teacher’s Name: Akhtab Hussain Past Paper Questions
most suitable for Nancy to use. Explain your choice.
[4]
Compression type ________________________________________________________
Explanation ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
11 Identify three similarities between CDs and DVDs.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
12 An image is to be stored electronically.
The image is 256 pixels high by 200 pixels wide with a 16-bit colour depth.
Calculate the file size of the image. You must show all of your working.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
140
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2018
1 (a) Computer files can be saved in different file formats.
Four file formats and four file types are given.
Draw a line to match each file format to the most suitable file type.
[3]
(b) Jamelia wants to store an image file. The image has an 8-bit resolution and
is 150 pixels by 100 pixels in size. Calculate the file size of the image. Give
your answer in kilobytes (kB). Show all of your working.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
141
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) The table contains four different file formats that use compression.
Tick () to show whether each file format uses lossy or lossless compression.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
142
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) A sports events company uses a digital camera attached to a drone (small
flying system), to video their events from the sky.
The video is stored as it is captured, on a device that is attached to the
drone.
(i) Circle the most suitable type of storage to store the video.
Optical Magnetic Solid state [1]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Circle the storage category that includes both RAM and ROM.
Primary Secondary Off-line
[1]
(c) Explain what is meant by off-line storage.
[2]
________________________________________________________________________________
143
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) David needs to send a large section of the programming code as an email
attachment.
He uses lossless compression to reduce the file size.
Explain how the file size is reduced.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 Describe two differences between Read Only Memory (ROM) and Random
Access Memory
(RAM)
[4]
Difference 1
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Difference 2
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
144
Teacher’s Name: Akhtab Hussain Past Paper Questions
12 Explain the difference between a Musical Instrument Digital Interface
(MIDI) file and a MP3 file.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
13 State which types of storage device or media would be most suitable for
these scenarios.
For each device or media, justify your choice.
(a) Creating a backup of 150 GB of data.
[2]
________________________________________________________________________________
Justification ________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Justification ______________________________________________________________________
________________________________________________________________________________
(c) Storing a 1200 MB high-definition promotional movie about a new car. The
movie is to be given to people who are interested in buying a new car.
[2]
________________________________________________________________________________
Justification ____________________________________________________________________
________________________________________________________________________________
145
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2019
Darius is sending several programs that he has created to his friend Selma.
(c) He wants to compress the files to send them as he needs to attach them
to an email.
Darius tells Selma he is going to use lossy compression. Selma tells him
that he should use lossless instead.
Explain why Selma tells Darius to use lossless compression instead of
lossy. [4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Nadia uses several types of computer storage for her homework and other
projects.
(i) Five examples of computer storage are given.
Tick () to show if the computer storage is Primary, Secondary or Off-line.
[5]
146
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(iii) Give two advantages of using a magnetic storage device rather than a solid
state storage device.
[2]
Advantage 1 ____________________________________________________________________
________________________________________________________________________________
Advantage 2: ____________________________________________________________________
________________________________________________________________________________
She sells sea shells on the seashore. The shells that she sells are sea shells
I am sure.
Explain how lossless compression would compress this file.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
147
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
148
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________ (b)
The computers in the finance company use both primary and secondary
storage.
(i) Give one example of primary storage.
[1]
________________________________________________________________________________ (ii)
Give two examples of secondary storage.
[2]
1 __________________________________________________________________________
2 __________________________________________________________________________
4 (a) Marley wants to store a video he has created for his school project. He
considers using a DVD or a Blu-ray to store the video. Explain two
differences between a DVD and a Blu-ray.
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [4]
(b) (i) Marley also needs to store ten 8-bit colour images in a file for his project.
Each image is 500 pixels wide and 300 pixels high. Calculate the total file
size in megabytes (MB) for all Marley’s images.
Show all your working. [3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
149
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
File size _____________________________ MB
(b) A microprocessor uses ROM.
Explain what is meant by ROM.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) The information point uses both primary and secondary storage.
Explain what is meant by primary and secondary storage.
[4]
Primary ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Secondary ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
CHAPTER No. 7
PAST PAPER QUESTIONS
Summer 2015
1. Five statements about interpreters and compilers are shown in the table below.
Study each statement.
Tick () to show whether the statement refers to an interpreter or to a compiler. [5]
150
Teacher’s Name: Akhtab Hussain Past Paper Questions
9 (a) Five statements about interpreters and compilers are shown in the table
below.
Study each statement.
Tick (✓) to show whether the statement refers to an interpreter or to a
compiler. [5]
151
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) Give one benefit of writing a program in a low-level language.
[1]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(e) Study the following three sections of code.
A: 10101101
11001110
10110111
B: LDA X
INC X
STA Y
C: FOR x ← 1 TO 10
READ n
END FOR
152
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2016
1 (a) Give two reasons why a programmer would choose to write code in a low-
level language.
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
153
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
Low-level language advantage 2
__________________________________________________
________________________________________________________________________________
8 Four descriptions about compilers and interpreters are shown below.
Draw lines to indicate which descriptions refer to a compiler and which
descriptions refer to an interpreter.
[4]
Summer 2017
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) A program written in a high-level language is translated into machine code.
This is so that it can be processed by a computer.
Name one type of translator that can be used.
[1]
________________________________________________________________________________
(c) Describe how your answer to part (b) translates this program.
[3]
154
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Selma writes the following four answers in her Computer Science examination.
State which computer terms she is describing.
“It takes source code written in a high level language and translates it into
machine code. It translates the whole of the source code at once.”
155
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2017
Summer 2018
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Interpreter: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 Dimitri is writing a computer program in a high-level language.
156
Teacher’s Name: Akhtab Hussain Past Paper Questions
He needs to send just the machine code for the program to his friend,
electronically. It is important that the program is executed as quickly as
possible.
Identify which translator will be most suitable for Dimitri to use. Explain
your choice. [4]
Explanation
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 Three types of translators are assemblers, compilers and interpreters.
Tick (✓) the appropriate boxes to show which statements apply to each
type of translator. [4]
Winter 2018
157
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Explain two reasons why a computer programmer may choose to write a
program in a high-level language, rather than a low-level language
[4]
Reason 1 ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Reason 2 ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
158
Teacher’s Name: Akhtab Hussain Past Paper Questions
Feature 3: ______________________________________________________________
________________________________________________________________________________
(b) David compiles the program when he has completed it.
Explain two benefits of compiling the program.
[4]
Benefit 1: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Benefit 2: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
159
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2019
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Darius will use a translator to translate the program. He could use a
compiler or an interpreter.
Five statements are given about compilers and interpreters.
Tick () to show if the statement applies to a Compiler or an Interpreter.
Statements may apply to both.
[5]
160
Teacher’s Name: Akhtab Hussain Past Paper Questions
The structure of language statements in a computer program is called the
_______________________________. A programming language that uses natural
language statements is called a _______________________________. When programs
are written in this type of language they need a _______________________________ to
convert them into _______________________________.
A programming language that is written using mnemonic codes is called a
_______________________________. An example of this type of language is
_______________________________ language.
CHAPTER No. 8
PAST PAPER QUESTIONS
Summer 2015
4 Choose six correct terms from the following list to complete the spaces in
the paragraphs below:
[6]
• Encryption • File name • Firewall
• HTML tags/text • IP address • Protocol
• Proxy server • SSL certificate • Web server name
A user enters a URL. The web browser breaks up the URL into three
components:
1 _________________________
2 _________________________
3 _________________________
The web server returns the selected web page. The web browser reads the
_________________________ from the selected page and shows the correctly
formatted page on the user’s screen.
A _________________________ is used between the user’s computer and the network
to examine the data traffic to make sure it meets certain criteria.
To speed up the access to the web pages next time, a _________________________ is
used between the computer and web server; this device uses a cache to store
the website home page after it has been accessed for the first time.
161
Teacher’s Name: Akhtab Hussain Past Paper Questions
6 (a) Viruses, pharming and phishing are all examples of potential Internet
security issues.
Explain what is meant by each of these three terms.
[6]
Virus ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Pharming __________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Phishing __________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Software that anyone can download for free from the Internet and then use
without having to pay any fees. The usual copyright laws apply and a user
license is important.
____________________________
Software that gives the user the chance to try it out free of charge before
actually buying it. The software is subject to the usual copyright laws. As a
rule, not all the features found in the full version are available at this
stage.
____________________________
Software where users have freedom to run, copy, change and adapt it. This
is an issue of liberty and not of price since the software guarantees
freedom and the right to study and modify the software by having access
to the actual source code.
____________________________
162
Teacher’s Name: Akhtab Hussain Past Paper Questions
Set of principles that regulate the use of computers in everyday life. This
covers intellectual property rights, privacy issues and the effects of
computers on society in general.
____________________________
The taking of somebody’s idea or software and claim that the idea or
software code were created by the “taker”.
____________________________
8. An online bank requires a client to supply an 8-digit code each time they wish to access their
account on the bank’s website.
Rather than ask the client to use a keyboard, they are requested to use an on-screen keypad
(shown on the right) to input the 8-digit code.
The position of the digits on the keypad can change each time the website is visited.
The client uses a mouse or touch screen to select each of the 8 digits.
(i) Explain why the bank has chosen to use this method of entering the 8 digits. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Name and describe another measure that the bank could introduce to improve the security
of their website. [3]
Name: ______________________________________________________________
Description ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 (a) Four statements about cookies are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement is true or false.
[4]
163
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The following stages take place when a user wishes to access a secure
website.
Put each stage in sequence by writing the numbers 1 to 6 in the column on
the right. The first one has been done for you.
[5]
(b) Five descriptions and five security issues are shown below.
Draw a line to connect each description to the correct security issue.
[4]
164
Teacher’s Name: Akhtab Hussain Past Paper Questions
1 There are a number of security risks associated with using the Internet.
Name three of these risks. For each, state why it is a risk and describe how the risk can be minimised.
[9]
Security risk 1: ________________________________________________________
Why it is a risk? ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
How to minimise the risk? __________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security risk 2: ________________________________________________________
Why it is a risk? ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
165
Teacher’s Name: Akhtab Hussain Past Paper Questions
How to minimise the risk? __________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security risk 3: ________________________________________________________
Why it is a risk? ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
How to minimise the risk? __________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 (a) Check digits are used to ensure the accuracy of input data.
A 7-digit code number has an extra digit on the right, called the check digit.
Digit position 1 2 3 4 5 6 7 8
Digit – – – – – – – –
The check digit is calculated as follows:
• Each digit in the number is multiplied by its digit position
• The seven results are then added together
• This total is divided by 11
• The remainder gives the check digit (if the remainder = 10, the check digit is X)
(i) Calculate the check digit for the following code number. Show all your working.
4241508… [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Check digit ______________________________________________________________
(ii) An operator has just keyed in the following code number:
3240045X
Has the operator correctly keyed in the code number? [1]
________________________________________________________________________________
Give a reason for your answer. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
166
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2015
4 (a) Computer ethics involves a number of different topics.
(i) A student made the following statement on an examination paper:
“It allows a user to have the freedom to run, copy, change and adapt the software and then pass it on to
a colleague, friend or family member.”
Identify which computer term the student was describing. [1]
________________________________________________________________________________
(ii) Explain what is meant by computer ethics. [3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The four statements below refer to firewalls and proxy servers.
Study each statement. Tick () the appropriate column(s) to indicate whether the statement refers to a
firewall and/or a proxy server [4]
167
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
10 Choose five correct terms from the following list to complete the spaces in the sentences below:
[5]
Summer 2016
168
Teacher’s Name: Akhtab Hussain Past Paper Questions
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 (a) Five statements and three types of software are shown below.
Draw lines to connect each statement with the correct type of software.
[5]
169
Teacher’s Name: Akhtab Hussain Past Paper Questions
8 A bank offers an online service to its customers. The bank has developed a
“SafeToUse” system that asks each customer to enter four randomly chosen
characters from their password each time they log in.
The customer selects these four characters from drop-down boxes. For
example:
170
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) (i) Explain why it is more secure to use drop-down boxes rather than entering
characters using a keyboard.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Give a reason why the system asks for four characters chosen at random.
[1]
________________________________________________________________________________
________________________________________________________________________________
(b) Biometrics is an additional form of security.
Give two examples of biometrics.
[2]
1 __________________________________________________________________________
2 __________________________________________________________________________
(b) Describe three ethical issues that should be considered when using
computers. [3]
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Security of data is very important.
Three security issues are viruses, pharming and spyware.
171
Teacher’s Name: Akhtab Hussain Past Paper Questions
Explain what is meant by each issue.
[6]
Viruses: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Pharming: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Spyware: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) Describe three tasks carried out by a firewall.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
172
Teacher’s Name: Akhtab Hussain Past Paper Questions
173
Teacher’s Name: Akhtab Hussain Past Paper Questions
174
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2016
175
Teacher’s Name: Akhtab Hussain Past Paper Questions
drive or a web server which redirects
the user to a fake website without their
knowledge __________________________
(c) The Henslows Diner stores personal data on a computer. This computer is
connected to the Internet to allow the data to be backed up. There is
currently one security method in place to protect the data on the computer
from unauthorised access. This is a password.
Give two other security methods that could be added to improve the
security of the data. Describe how each method will keep the data safe.
[4]
Security method 1 ________________________________________________________
Description ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security method 2 ________________________________________________________
Description ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) During data transmission, security is very important. Data are sent over
the Internet using Transport Layer Security (TLS) protocol.
Name the two layers that make up TLS.
[2]
1 __________________________________________________________________________
2 __________________________________________________________________________
11 Explain why ethics are important when using computers.
[6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
176
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
12 Explain the differences between freeware and free software.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
177
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2017
178
Teacher’s Name: Akhtab Hussain Past Paper Questions
Explain how SSL protocol and a firewall will keep the company’s data safe.
[4]
SSL protocol
________________________________________________________________________________
________________________________________________________________________________
Firewall
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) A company stores personal details of its customers on a computer system
behind a firewall.
Explain, with reasons, what else the company should do to keep this data
safe. [6]
________________________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
11 A company sells smartphones over the Internet.
Explain how the information stored on the company’s website is requested
by the customer, sent to the customer’s computer and displayed on the
screen. [7]
________________________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
179
Teacher’s Name: Akhtab Hussain Past Paper Questions
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Winter 2017
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Give two examples of the use of cookies.
[2]
Example 1 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Example 2 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 (a) Describe what is meant by Transport Layer Security (TLS).
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
180
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Name three different applications of TLS.
[3]
1 __________________________________________________________________________
2 __________________________________________________________________________
3 __________________________________________________________________________
11 Complete the paragraphs choosing the correct five terms from the list.
Each term can only be used once:
[5]
• Ethics • Freeware • Free Software • Hacking
• Malware • Plagiarism • Shareware • Virus
Taking another person’s work from the Internet and claiming it as your own is
called ______________________. It is possible to protect your work online with
copyright. One product that people may want to protect is software.
______________________ does allow a person to share copy and change software
freely, but ______________________ does not allow a person to do this legally.
Software that has a license allowing free use for a trial period is called
______________________. The name given to this area of Computer Science is
______________________.
7 Six statements about firewalls are shown.
Tick () to show whether each statement is true or false
[6]
181
Teacher’s Name: Akhtab Hussain Past Paper Questions
8 (a) Data is valuable. It needs to be kept secure and it can easily be damaged.
Give three different ways that data can be accidentally damaged.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
(b) The Secure Socket Layer (SSL) protocol can be used to securely transmit
data in online banking. State three other different applications that use SSL.
[3]
Application 1 ____________________________________________________________________
Application 2 ____________________________________________________________________
Application 3 ____________________________________________________________________
(c) Online banking is increasing in popularity.
Online banking can be a risk as it can raise a number of security issues.
SSL can be used as a security method to make online banking safer.
Identify and describe three other security methods that could be used to
make online banking safer.
[6]
Security method 1: ______________________________________________________________
________________________________________________________________________________
182
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
Security method 2: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security method 3: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Summer 2018
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Describe what is meant by https.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
183
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(c) When a customer enters the website, a message is displayed:
“RockICT makes use of cookies. By continuing to browse you are agreeing
to our use of cookies.” Explain why the music company uses cookies.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) The music company is concerned about the security of its website. The
company uses a proxy server as part of its security system. Describe the
role of a proxy server in the security system.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
11 A factory uses a security system to control a security light. The system
uses a sensor and a microprocessor. Explain how the security system
makes use of the sensor and the microprocessor to control the security
light. [6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
184
Teacher’s Name: Akhtab Hussain Past Paper Questions
12 (a) Selma has some important personal information that she needs to email to
her employer.
She wants to make sure that if the personal information is intercepted, it
cannot be understood.
(i) State how Selma could email her personal data more securely.
[1]
________________________________________________________________________________
(ii) Describe how your chosen solution works.
[5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 Three security issues that could affect users online are phishing, pharming
and spam.
Explain what is meant by each security issue.
[6]
Phishing
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Pharming
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Spam
________________________________________________________________________________
________________________________________________________________________________
185
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
(c) Data transferred over a network is encrypted to improve data security.
The system uses 64-bit symmetric encryption.
(i) Explain how encryption improves data security.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Explain one method that could be used to increase the level of security
provided by the encryption.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Winter 2018
186
Teacher’s Name: Akhtab Hussain Past Paper Questions
Security threat 1 ________________________________________________________
Security threat 2 ________________________________________________________
(c) Give two security measures that can help to protect a computer system
from online security threats.
[2]
Security measure 1 ________________________________________________________
Security measure 2 ________________________________________________________
4 (a) Identify three security issues that can put a computer system at risk.
[3]
Security issue 1 ________________________________________________________
Security issue 2 ________________________________________________________
Security issue 3 ________________________________________________________
(b) Explain how a firewall can help to protect a computer system from
security issues. [4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6 Sarah stores data electronically.
Describe three methods that she could use to avoid loss of stored data.
[6]
Method 1
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Method 2
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
187
Teacher’s Name: Akhtab Hussain Past Paper Questions
Method 3
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Summer 2019
7 Arya regularly uses the Internet as a research tool for her school projects.
Identify and describe three risks to Arya’s computer when she is using the
Internet for research.
[6]
Risk 1: ____________________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
Risk 2: ____________________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
Risk 3: ____________________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
4 (a) Fatima is concerned about the risks to her computer when using the
Internet.
She wants to use some security methods to help protect her computer
from the risks. Identify a security method she could use for each of the
following risks. Each security method must be different.
Describe how each security method will help protect Fatima’s computer.
(i) Computer virus [3]
Security method ________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Hacking [3]
Security method ________________________________________________________
188
Teacher’s Name: Akhtab Hussain Past Paper Questions
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(iii) Spyware [3]
Security method ________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Fatima is also concerned that the data she stores could be subject to
accidental damage or accidental loss.
(i) State three ways that the data Lola stores could be accidentally damaged or
accidentally lost.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
(ii) Give two methods that Lola could use to help keep her data safe from
accidental damage or accidental loss.
[2]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
189
Teacher’s Name: Akhtab Hussain Past Paper Questions
Improvement 1 ________________________________________________________
________________________________________________________________________________
Explanation ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Improvement 2 ________________________________________________________
________________________________________________________________________________
Explanation ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 An art gallery has a website that is used to display and sell art.
(a) The gallery uses Secure Socket Layer (SSL) to provide a secure connection
when selling art.
Describe the process of SSL and how it provides a secure connection.
[6]
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The art gallery also uses a firewall.
Six statements are given about firewalls.
Tick () to show if the statement is True or False.
[6]
190
Teacher’s Name: Akhtab Hussain Past Paper Questions
(c) The art gallery is concerned about computer ethics relating to its website.
Explain what is meant by computer ethics and why the art gallery is
concerned about computer ethics [4].
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
5 A music company wants to send a new music file to many radio stations. It
will send the music file the day before the release date so that the radio
stations can store the file ready for release.
The music company does not want the radio stations to be able to open
the music file until 09:00 on the release date.
Identify two security measures and describe how each measure can be used
to make sure the music file cannot be opened until the release date.
[4]
Security measure 1: ______________________________________________________________
Description: ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security measure 2: ______________________________________________________________
Description: ____________________________________________________________________
________________________________________________________________________________
191
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(e) Priya is concerned about a denial of service attack (DoS) occurring on her
webserver.
(i) Explain what is meant by a denial of service attack.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Give one security device that can be used to help prevent a denial of
service attack. [1]
________________________________________________________________________________(e)
When customers access Victoria’s website they will be given the message:
192
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Explain why Victoria would use cookies as part of her website.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7. A finance company is concerned that its employees are being distracted
by using gaming websites at work.
(a) Explain how a firewall could help prevent this distraction.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The finance company is also worried about the security of the data stored
on its servers.
The company has decided to encrypt the data to improve the security.
Describe how the data are encrypted.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
193
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) The finance company realises that its computer systems have been
hacked. The company thinks that spyware was used to obtain a user’s
password.
Explain how spyware could have been used to obtain the user’s password.
[6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
194